NL2012817B1 - Storage container, computer system and method for delivering and returning a tangible item. - Google Patents

Storage container, computer system and method for delivering and returning a tangible item. Download PDF

Info

Publication number
NL2012817B1
NL2012817B1 NL2012817A NL2012817A NL2012817B1 NL 2012817 B1 NL2012817 B1 NL 2012817B1 NL 2012817 A NL2012817 A NL 2012817A NL 2012817 A NL2012817 A NL 2012817A NL 2012817 B1 NL2012817 B1 NL 2012817B1
Authority
NL
Netherlands
Prior art keywords
storage container
computer system
access key
item
storage
Prior art date
Application number
NL2012817A
Other languages
Dutch (nl)
Inventor
Carels Nikolai
Johannes Hubertus Sanders Andreas
Martinus Leonardus Diterwich Rudolf
Original Assignee
Sesam Solutions B V
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sesam Solutions B V filed Critical Sesam Solutions B V
Priority to NL2012817A priority Critical patent/NL2012817B1/en
Priority to PCT/NL2015/050293 priority patent/WO2015174829A1/en
Application granted granted Critical
Publication of NL2012817B1 publication Critical patent/NL2012817B1/en

Links

Classifications

    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/145Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle comprising means for identifying a deposit; Deposits carrying identification means, e.g. a bar code
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/149Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means with central server link

Abstract

The disclosure relates to a storage container for storing a tangible item, wherein the tangible item is associated with a first access key and the storage container is associated with a second access key. The storage container a container component providing access to a storage portion of the storage container and a reader configured for reading the first access key of the tangible item. A control system is configured for controlling the component to provide access to the storage portion when the first access key read by the reader of the storage container corresponds to the second access key associated with the storage container.

Description

Storage container, computer system and method for delivering and returning a tangible item
FIELD OF THE INVENTION
The invention relates to a storage container, a computer system for use with at least one storage container and to a method for delivering and/or returning tangible items (goods, parcels, letters, etc.) to resp. from such a storage container.
BACKGROUND
Online shopping is rapidly becoming the most preferred manner of shopping. As a consequence thereof, delivery of the online bought items by delivery service providers to the premises of consumers is increasing. In addition, most online shops allow returning of the bought items by the consumer, again requiring a service to pick up the item or require the consumer to visit a postal office. A growing frustration with both consumers and the services delivering or picking up the items is that the consumers need to be present at the address they have indicated for delivery of the item. Often, items are not delivered or are handed over to neighbours or a nearby deposit where consumers may pick up the item. Returning items require a consumer to go to a post office to hand over the item. Such practice is not efficient and is disadvantageous for the online ordering of items.
It is an aim of the present disclosure to provide a more efficient way for delivering and returning tangible items (e.g. parcels, letters, etc.).
SUMMARY
In one aspect of the disclosure, a storage container for storing at least one tangible item is presented. The tangible item is associated with a first access key and the storage container is associated with a second access key.
The storage container comprises a container component, e.g. a door, a lid, a mailbox slot or other access means, to provide access to a storage portion of the storage container.
The storage container also comprises a reader configured for reading the first access key associated with the tangible item. The reader may e.g. comprise a radio frequency identification (RFID) reader or a near field communication (NFC) reader. As an example, the first access key may be provided to or allocated to an item as a label, ticket, tag or any other suitable means for associating a first access key with a tangible item. The first access key may be programmed in the RFID. One example includes an RFID tag attached to the item. It should be appreciated that the first access key is not necessarily attached to the item, but may also be offered separately from the item, e.g. from a display of e.g. a handheld device of an employee of the delivery services provider or via a Bluetooth connection .
The storage container also comprises a control system configured for controlling the container component to provide access to the storage portion. Access is provided when the first access key corresponds to the second access key associated with the storage container.
In another aspect of the disclosure, a computer system configured for use with at least one storage container is disclosed. The computer system comprises a generator for generating the first access key for the tangible item enabling at least one of delivery of the tangible item to the storage portion and returning of the tangible item from the storage portion of the storage container in a manner as disclosed herein.
In a still further aspect of the disclosure, a method for at least one of delivery to and returning from a storage container for a tangible item is presented. The storage container is associated with a second access key. In a first step, the first access key associated with the tangible item is obtained. The first access key may be obtained by the party generating the first access key or may be received by a delivery service provider from a party generating the first access key. Next, at delivery, the first access key is exposed to the reader of the storage container, e.g. by exposing the item to which the first access key is attached. Access is obtained to the storage portion of the storage container when the first access key corresponds to the second access key. The tangible item may then be put in the storage portion and/or be taken from the storage portion.
The control system may be configured to control the container component in any manner to provide access to the storage portion of the storage container. In one example, control is performed by controlling a servomotor and/or a locking structure affecting a state (e.g. open or close) of the container component.
The storage container may comprise multiple storage portions. Each of the storage portions may have an associated container component providing access to the storage portion. In one example, the storage container has a dedicated storage portion for registered items, e.g. registered mail or registered parcels, typically requiring signature of the recipient.
The storage container can be placed at the home of the consumer and enables safe delivery and returning of tangible items without requiring the consumer to be present. The consumer only has to access the storage container in a way very similar to how letters and other mail are commonly received.
The consumer may access the storage container using a common (hardware) key or using an electronic key (e.g. a tag containing an identifier corresponding to a pre-programmed key in the storage container). Any other party can only access the storage container if in the possession of the first access key (such as the employee of the delivery service provider delivering the item to which the first access key is attached) as generated in the computer system. Verification of the key correspondence is applied locally and may not need communication with an external computer system.
The storage container may also be stored at another location, e.g. a third party location, e.g. a public location such as a shop or a gas station.
It should be appreciated that the first access key and the second access key are electronic keys. The first and second access keys may be generated by, respectively, the computer system and the storage container using a private key associated with the storage container.
The first access key may be associated with the item. Further information may also be associated with the item, including at least one of an identifier of the item, a time window indicating validity of the access key and on or more properties of the item (e.g. dimensions, weight, etc.). This further information, or parts thereof may be used in generating the first access code using an encryption algorithm. The first access code may comprise a hash of this information and the private key of the storage container. The encryption algorithm is an irreversible algorithm as known to a skilled person to avoid recalculation of the input data.
The access key and the other information may be associated with the first item as fields of a single code. The code may be programmed on a label attached to the tangible item in a form readable by the reader of the storage container.
In one embodiment, the storage container further comprises a generator for generating the second access key using a private key of the storage container. The generator uses a corresponding encryption algorithm as for generating the first access key. The control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box. In this embodiment, the first access key is tied to a particular storage container.
In one embodiment, the storage container further receives from the tangible item at least one of an item identifier, a validity time window, and an item property and the control system applies at least one of the item identifier, the validity time window and the item property to generate the second access key.
The validity time window enables tying the first access key to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated.
To that end, the storage container consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key .
An access key may be valid for a only single item.
The item identifier may be a unique identifier for the item. A modification of any of the data of used for generating the access key render the unusable. A security token may be applied as a checksum for the other data. Preferably, item keys can only be used once for security reasons. Even if the algorithm gets compromised, the first and second access codes may not be generated as these access codes may be generated using the private key associated with the storage container. The private key is securely stored in the storage container and/or in the computer system in a manner known as such.
It should be noted that multiple items may be stored in a box, wherein each of the items contains a first access key (and the box does not). Each of the items may also contain an individual item identifier, enabling return of individual items as will be explain in further detail below. Alternatively, only the box contains a first access key and not the individual items in the box do not.
It should be appreciated that the disclosed storage container, the computer system and the delivery and return method may not only be employed for consumers but also for business related purposes.
In one embodiment, the storage container comprises a communication module configured for communicating with a computer system over a network. The control system is configured for generating status information to be transmitted with the communication module to the external computer system. Status information may be related to at least one of a status of the storage container and a delivery/return status of the tangible item. This embodiment facilitates the computer system to be aware of the status of the storage container (e.g. operational status, filling status, power status, safety status, temperature etc.) and the delivery/return status (e.g. delivery completed, delivery failed, return pending, return failed, etc.) and appropriate actions to be taken.
One action relates to generating or providing a first access key to be associated with a tangible item. For example, if it is determined that the storage container cannot accommodate a further item (based on filling status) the first access key may not be generated or released until the filling status indicates that sufficient storage space is available.
Filling status may e.g. be obtained from reading an item identifier and associating the item identifier with dimensions of the item. The dimensions may also be pre-stored at or retrieved or received by the computer system. The dimensions may also be read from the same label or tag as the first access key (the dimensions may be included in the first access key) or may be determined by the storage container.
An alternative action relates to message transmission to at least one of the consumer and the delivery service provider in dependence on the status of the storage container and/or the status of the delivery/return. For example, a delivery completed status obtained from the storage container may trigger the computer system to initiate transmission of an SMS message to the consumer. The delivery service provider may also be notified, e.g. using system integration. A similar message that may be transmitted from the computer system is that return of the item has been successful. A message may also be generated if delivery is temporarily not possible because of lack of storage space in the storage container. A message or notification may also be transmitted if an item has not been delivered or picked up for some time, e.g. if the status indicates that a first access key associated with a particular item has not been read by the reader in the storage box.
Yet another message that may be generated relates to a sensor detecting an event at the storage container, e.g. a vibration sensor or a temperature sensor.
In one embodiment, the control system is configured for establishing a return status of the tangible item. The return status indicates that the item is put back into the storage container to be returned. Return status may be established based on detecting conditions of the storage container and/or detecting readings of the first access key. In one embodiment, at least one of the following events is used to establish a return status for the item: - comparing the number of readings of the first access key with a predetermined number, wherein the number of readings is, optionally, the number of readings during a pre-set time interval; - determining a status of the component of the storage box; - determining which key is used to provide access to the storage container.
Conditions for the storage container, such as detecting opening of the storage container when reading the first access key or an access key of a user, may also assist in establishing the return status of the item. The embodiment facilitates easy return of items (e.g. without having to access the computer system and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome) .
In one embodiment, the storage container comprises a power source and an activator configured for activating at least one of the reader and the control system. The activator may comprise a button, a proximity sensor or any other means for activating part of the storage container to consume power of the power source. The power source may comprise a battery. Providing the storage container with a power source simplifies installation of the storage container and enables stand-alone operation. The activator prolongs the duration of the power source .
In one embodiment, the computer system is configured for monitoring and, optionally, updating at least one of a status of the storage container and a delivery/return status of the tangible item. The status information enables the computer system to take appropriate actions dependent on the status, e.g. to generate and/or release the first access key. The monitoring process keeps track of the contents of the storage container and/or the operation status of the storage container and takes appropriate measures if differences from an expected state are detected, e.g. transmitting a message to a user and/or system operator .
The computer system may log events and status data (e.g. temperature) to generate reports.
In one embodiment, the computer system is configured for receiving at least one characteristic of the tangible item, e.g. one or more dimensions (size) and/or weight of the tangible item, from the storage container. Characteristics of the item (e.g. size information) may be read by the reader from the label, e.g. if size information is contained in the first access key. Other characteristics include temperature and/or any other data that may be sensed by the storage container. The characteristic (s) enables the computer system to take appropriate actions dependent on the characteristic (s), e.g. to transmit a message to the consumer and/or the delivery services provider.
In one embodiment, the computer system further comprises a memory for storing a storage status of the storage container based on at least one characteristic of the tangible item. The computer system may determine the status of the storage container from the received characteristics. It should be noted that this embodiment may be applied independent on how access to the storage container is arranged as disclosed herein.
In one embodiment, the computer system is configured for communicative connection with a web shop or a facilitator.
The web site of the web shop may provide an option for the consumer to indicate the availability of the storage container for the consumer. The web shop may also have integrated the computer system into its operation and is aware of the availability of a storage container for a particular user of the web shop. The generated first access key is obtained by at least one of the web shop and the facilitator (a party manufacturing labels containing the first access key and, optionally, other information; a delivery service or any other party in the delivery chain) to associate (e.g. attach) the first access key to the tangible item.
In one embodiment, the computer system stores a user account of a user of the storage container. The computer system may have a web site where consumers can set up a user account enabling consumers to indicate the availability of a storage container when online shopping. The user may indicate trusted storage containers (e.g. of neighbours) that may be used e.g. when his own storage container has not sufficient storage capacity. Of course, guest use of a storage container may require approval of the owner of the storage container. A user may also grant access to a storage container associated with his user account to other user. The user account enables a social delivery network .
In one embodiment, the computer system comprises a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or returning of the tangible item. This embodiment facilitates payment of the item after delivery of the item instead of pre-payment.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, a software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system". Functions described in this disclosure may be implemented as an algorithm executed by a microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium (s) having computer readable program code embodied, e.g., stored, thereon.
Any combination of one or more computer readable medium (s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a solid-state drive, a random access memory (RAM), a non-volatile memory device, a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fibre, a portable compact disc read-only memory (CD-ROM) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless (using electromagnetic and/or optical radiation), wired, optical fibre, cable, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on a user's computer (e.g. a user device) or on a computer facility in a network (e.g. a computer facility in the radio access network system and/or in the core network system), partly on the computer, as a stand-alone software package, partly on the user's computer and partly on a computer facility in the network, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor, in particular a microprocessor or central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the func-tion/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the functions noted in the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions .
It is noted that the invention relates to all possible combinations of features recited in the claims.
It should be noted that each of the independent claims may be used separately from the access through the key correspondence as disclosed herein.
For example, the disclosure also relates to a storage container comprising a tamper detection sensor, e.g. a vibration sensor, for detecting tampering of the storage container and a communication module for communicating with an external computer system, wherein the communication module is configured for transmitting a notification message to an external computer system upon detecting tampering the tamper detection sensor.
In particular, the storage container may comprise an on-board power source and the communication module is powered by the power source, optionally upon reading by the tamper vibration sensor.
As another example, a storage container is disclosed comprising an action detector detecting distinguishable actions at the storage container and a communication module for communicating detected actions to an external computer system.
Preferably the actions include one or more of: - putting an item in the storage container by the user; - getting an item from the storage container by the user; - putting an item in the storage container by a party other than the user; - getting an item from the storage container by a party other than the user.
The storage container may be configured to distinguish actions based on at least one of a key used to get access to the storage container and the state of a component (e.g. a door) of the storage container. Alternatively, actions are communicated to a computer system configured to distinguish between the actions .
As another example, the disclosure also relates to a computer system configured for receiving communication from the communications module of the storage container. The communication may relate to status information, including information from sensors and information from actions as described in the previous paragraphs.
BRIEF DESCRIPTION OF THE DRAWINGS
Aspects of the invention will be explained in greater detail by reference to exemplary embodiments shown in the drawings, in which: FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system; FIGS. 2A and 2B are embodiments of a storage container and a functional module for the storage container FIG. 2C provides a schematic illustration of generation of access keys for items and verification of access key correspondence at a storage container; FIGS. 3A-3D are flow charts illustrating steps of embodiments of delivery and return methods; FIG. 4A is a combined system and flow illustration of a system for ordering and return of tangible items; and
Fig. 5 is a schematic block diagram of an embodiment of a general system or element of used in the system, e.g. in the storage container or in the computer system.
DETAILED DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system 1. A storage container 2 is provided to a consumer. Storage container 2 will be described in further detail with reference to FIGS. 2A and 2B. It should be appreciated that a plurality of storage containers may be employed within the system 1. A key 3 is provided for a consumer to open storage container 2. Key 3 may comprise at least one of a conventional hardware key or an electronic key, as shown in FIG. 1. Storage container 2 stores a pre-programmed key corresponding to the electronic key to enable unlocking of the storage container by the consumer.
The consumer has access to a computer (not shown) to visit a web site of a web shop 4 over the internet 5. The web shop may offer goods, such as tangible item 6. The consumer has also access to a computer system 7 that is associated with the storage container 2. Computer system 7 may have a web site enabling subscription to services related to storage container 2.
The subscription process to such services is known as such to a skilled person. The consumer may set preferences in the computer system 7, such as a preferred manner of receiving messages of successful and failed delivery and return (e.g. telephone number and/or e-mail address). The consumer may also indicate time intervals during which no items can be delivered (e.g. during a holiday). The consumer may also indicate other storage containers, e.g. in his neighbourhood or of family, that should be considered trusted containers to which delivery of the item is allowed. The consumer may also allow other users to use his storage container 2 and establish a social delivery network.
It should be noted that the order of the user does not have to be through a web shop. Item ordering may occur via other channels.
Computer system 7 monitors the status of the storage container 2 and/or the delivery/return of items to/from the storage container 2. The monitoring process keeps track of the contents of the storage container 2 and/or the operation status of the storage container 2 and takes appropriate measures if differences from an expected state are detected, e.g. transmitting a message to a user and/or system operator.
The computer system 7 may log events and status data (e.g. temperature) to generate reports.
The system further comprises at least one delivery service provider 8 that provides delivery and return services for tangible item 6.
Storage container 2 may communicate with computer system 7 over a wireless data communication network 9 and, possibly, internet 5. In one exemplary embodiment, wireless data communication network 9 provides machine-to-machine services in relation to storage container 2. Storage container 2 may use a local wifi connection or use a telecommunications network .
As shown in FIG. 1, item 6 is associated with a first access key AK1, e.g. by attaching a label to it. The label may comprise a code containing the access key AK1 and further information, e.g. an item identifier and a validity time window. A private key PK of the storage container is stored in the storage container 2 and is available to the computer system 7 as will be discussed in further detail with reference to FIG. 3A. FIG. 2A is a schematic illustration of a storage container 2 .
Storage container 2 may be a container for home use and may be installed e.g. near the entrance of the home of a consumer. Storage container 2 may be placed on a pole, be attached to the house or be integrated in a wall or door of the house. Storage container 2 typically has a volume less than 1 m3 but may be larger (including a storage building that may be entered via a door to which access is provided as disclosed herein). Storage container 2 may also be used for business use.
As illustrated in FIG. 2A, the storage container may contain multiple storage portions, e.g. a parcel box 20 and a letter box 21. Parcel box 20 has a door 22 hinged to the parcel box that provides access to the parcel box 20. Letter box 21 has a mailbox slot 23 enabling access to the letter box 21. It should be appreciated that storage container 2 may comprise more or less storage portions. Instead of a front-loadable storage container 2 as shown in FIG. 2A, storage container 2 may be top loadable in which case door 22 may be replaced by a lid (not shown) .
Considerations regarding selection of the material for the storage container 2 involve heat resistance, impact resistance, water proof characteristics, etc., dependent on e.g. where the storage box is placed in the home of the consumer and costs. In one embodiment, the outer walls of storage container 2 are made of plastic, e.g. HDPE. Some parts of the storage container 2 comprise metal, e.g. hinges, fasteners etc. The storage container 2 may also be made mainly of metal material.
The front side of the storage container 2, e.g. door 22 and/or mailbox slot 23 may be customizable enabling consumers to give storage container 2 an individual appearance. The walls of the storage container may provide for thermal isolation, e.g. to store hot or cold items 6 within the storage container 2. Storage container 2 may be provided with heating and/or cooling facilities .
Storage container 2 contains a functional module 24 comprising electronic components. Functional module 24 may be easily replaced, e.g. for repair purposes. One or more of the electronic components may be activated using activator 25. Activator 25 may comprise a button to be used when functions of functional module 24 are required. Other types of activators 25 may be used, e.g. a proximity sensor.
Storage container 2 may comprise an indicator 26, e.g. one or more light emitting diodes, to indicate a status of the storage container 2 (e.g. door 22 open or closed). This status may be translated to a delivery or return status of the item 6. Indicator 2 may comprise noise generating means, e.g. a speaker, to generate an audible signal.
Storage container 2 also contains a battery 27. Battery 27 omits the need to connect storage container 2 to the mains, providing more freedom in installing the storage container 2 at a desired location. Activator 25 may interact with battery 27 to wake up one or more components of functional module 24. It should be appreciated, however, that storage container 2 may be connected to the mains. Such connection may be facilitated, for instance, when storage container 2 is integrated in a wall of a building. FIG. 2B is a schematic illustration of a functional module 24 for a storage container 2.
The central component of functional module 24 is control system 30. Other components include reader 31, communication module 32 and an electromechanical component 33 to provide access to a storage portion 20, 21 of the storage container, e.g. a servo. In addition, functional module 24 may comprise a memory 34 storing private key PK of the storage container 2. Functional module 24 may comprise or be connected to one or more sensors 35, e.g. to provide safety and/or to report events. One example includes a vibration sensor configured for sensing vibrations of the storage container 2 above a certain threshold being indicative of an attempt to compromise storage container 2. Such an event may be communicated to a user of the storage container 2, e.g. via computer system 7. Another sensor includes a temperature sensor monitoring temperature inside the storage container.
In one particular embodiment, control system 30 includes a key derivation function 36 to generate a second access key AK2 associated with the storage container 2.
Control system 30 may comprise a central processing unit (CPU) comprising circuitry and may be suitably programmed to perform one or more of the steps disclosed herein. Control system 30 also has access to a local clock.
Control system 30 includes a key generator 36. Key generator 36 is configured to generate a second access key AK2 associated with the storage container 2. To that end, key generator may employ the private key PK of the storage container 2 from memory 34.
The first access key AK1 may be associated with the item 6. The item may be associated with further information as mentioned above. This information may comprise at least one of an identifier ID of the item 6, a time window indicating validity of the access key AK1 and on or more properties of the item 6 (e.g. dimensions, weight, etc.). This further information, or parts thereof may have been be used in generating the first access code using an encryption algorithm at the computer system 7. The first access code may comprise a hash of this information and the private key PK of the storage container 2. The encryption algorithm is an irreversible algorithm as known to a skilled person to avoid recalculation of the input data.
The access key and the other information may be associated with the item 6 as fields of a single code. The code may be programmed on a label attached to the tangible item in a form readable by the reader 31 of the storage container 2.
The key derivation function 36 uses a corresponding encryption algorithm as for generating the first access key. The control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box.
The reader 31 may read the further information from the item 6 (more particularly, from a label attached to the item 6), such as the item identifier ID, the validity time window and/or the item characteristics. If this information has been used in generating the first access key at the computer system, this information is also used in generating the second access key at the storage container 2.
Furthermore, the validity time window enables tying the first access key AK1 to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated. To that end, the storage container 2 consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key.
An access key AKI, AK2 may be valid for a only single item.
The item identifier ID may be a unique identifier for the item.
Reader 31 is configured to read an identifier, e.g. an identifier of an RFID tag or NFC information, associated with the tangible item 6. Reader 31 may comprise an RFID reader and/or an NFC reader.
Communication module 32 is configured to enable communication from the storage container 2 to the computer system 7 via wireless data communication channel 9. Communication module 32 may comprise a modem, e.g. a machine-to-machine modem. The connection enables information, e.g. status information, to be transmitted from storage container 2 to computer system 7. The connection also enables transmission of events detected by one or more sensors to the computer system 7.
Communication module 32 may enable two-way communication with computer system 7. Two-way communication facilitates control actions and/or other information (e.g. software updates, a new second access key AK2, etc.) to be received by storage container 2 from computer system 7.
Electromechanical component 33 comprises a motor to be controlled from control system 30 in order to operate a container component of the storage container, e.g. door 22 and/or mailbox slot 23, to provide access to the corresponding storage portion if control system 30 detects that certain conditions are fulfilled. FIG. 2C provides a schematic illustration of generation of access keys AKI, AK2 for delivery and return purposes of items 6 and verification of access key correspondence at a storage container 2.
Third party 8 provides computer system 7 with information regarding an intended delivery or return of an item 6.
Said information may comprise a time window TTTTT for delivery and/or return and/or item characteristics CCCCCC.
Computer system 7 generates a first access key AK1 using this information and private key PK securely stored in the computer system 7 in association with the storage container 2 using a key derivation function KDF. The first access key AK1 is provided to third party 8.
Third party 8 provides a label L using e.g. label printer LP. Said label L contains the information concerning the time window, the item characteristics and the generated access key AK1. This information forms a code TTTTT-CCCCCC-AK1.
Label L may subsequently be scanned using reader 31 provided in storage container 2. Control system 30 comprises a key derivation function KDF using the read information of the time window TTTTT an<^ the item characteristics CCCCCC and private key PK from secure memory 34 to obtain a second access key AK2. Control system 30 compares the read first access key AK1 from label L with the generated second access key AK2. If AK1=AK2, access is provided to storage container 2. FIGS. 3A and 3B are flow charts illustrating steps of performing a delivery method using storage container 2.
In step SI, a consumer orders a tangible item 6 at a web shop 4. It is assumed that the consumer has a storage container 2 and is registered as such with computer system 7.
During ordering tangible item 6 at the web site of web shop 4, the consumer may e.g. indicate availability of a storage container 2 for delivery of the item 6.
In step S2, computer system 7 is informed of the order and generates a first access key AK1. Since the consumer has a subscription with computer system 7, computer system 7 has stored a private key PK of the storage container 2. The private key PK has been used in generating AK1.
In step S3, computer system 7 sends the first access key AK1 to delivery service provider 8 (or any other party in the delivery chain). Delivery service provider 8 is responsible for delivery of item 6 ordered by the consumer via web shop 4 to the consumer. Delivery service provider 8 may e.g. attach identifier AK1 to the tangible item 6, e.g. by attaching an RFID label containing AK1.
In step S4, an employee of delivery service provider 8 exposes the first access key AK1 to reader 31. The employee may first have activated storage container 2 using activator 25. Control system 30 receives AK1 and determines whether access should be provided to storage container 2 on the basis of AK1 to allow the employee to store the item 6 in the storage container 2.
Step S5 involves the control system 30 comparing the received first access key AK1 with a second access key AK2 of the storage container 2. Second access key AK2 is generated using private key PK stored locally in memory 34 and key generating function 36. If it is determined that the first access key AK1 corresponds to the second access key AK2, control system 30 controls electromechanical component 33 to provide access to e.g. storage portion 20, e.g. by operating a lock of the door 22. If the first access key AK1 is found not to be related to the second access key AK2, no access is provided to the storage container 2.
It should be noted that data communication network 9 may be employed to have online authorization, comparing AK2 generated at the storage container 2 with AKl stored in the computer system 7 and transmitting an approval signal to the storage container if AK2 received from the storage container 2 matches with AKl stored at the computer system 7. It should be noted that this embodiment in fact does not require a first access key AKl to be applied to the item 6; only the further information (e.g. an item identifier) would be sufficient for the computer system to derive the first access key AKl.
Once the employee has obtained access to the storage container 2, he puts the item into the storage portion and closes the storage container 2 again (step S6). This event may be detected by the control system 30 triggering the control system 30 to transmit a status update to the computer system 7 via communication module 32. Computer system 7 may update the status of the storage container 2 stored therein, e.g. by registering that the storage container contains item 6. The status may also include a filling status indicating e.g. the remaining volume of the storage container or storage portion. Delivery of the item may be confirmed from the computer system 7, e.g. using SMS, to at least one of the consumer (who may have selected this option when registering with the system 7 in addition to providing e.g. a telephone number or e-mail address to deliver the confirmation message) and the delivery service provider 8 .
In one exemplary embodiment, the event of completion of delivery is only triggered if the storage container 2 is locked appropriately. The appropriate delivery may be signalled by indicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate delivery may be signalled by red light.
It should be clear from the above description, that the consumer does not need to be present or involved for delivery of the item 6 after ordering the item at the web shop 4. If the consumer arrives, he may simply operate any of the keys 3 to open the storage container and get the item 6. Electronic key 3 may e.g. contain a key corresponding to a pre-programmed key stored memory 34 of the storage container 2.
Computer system 7 may be informed of the event of item 6 being retrieved from the storage container 2 and update the storage container status (e.g. the filling status is set to empty) contained therein accordingly. This retrieval event may e.g. be detected from detecting use of the electronic key 3 of the user or from any other sensor, e.g. sensing opening of door 22 again after closing by the employee of the delivery service provider . FIG. 3B illustrates a flow chart comprising similar steps as in FIG. 3A. Only, step 5 comprises a step S5a wherein time window information obtained from item 6 is checked against clock information available to control system 30 in order to determine whether or not the second access key AK2 may be generated. If the current time falls within the time window, the access key AK2 is generated in step S5B. If not (not shown), then AK2 is not generated and access to the storage container will not be granted. Such failed delivery may be communicated to computer system 7 which may trigger one or more of the actions disclosed herein
It is now assumed that the consumer desires to return item 6. FIG. 3C illustrates some steps for returning the item 6 using the storage container 2.
Various methods have been envisaged for returning item 6. In one method, the consumer visits the web site of web shop 4 and indicates that he desires to return item 6 (S10). Again, the consumer may indicate availability of storage container 2. The consumer may then put back item 6 in the storage container 2. Web shop 4 communicates this event to computer system 7.
Alternatively, the consumer opens the storage container using the key 3. This event may be detected by computer system 7. In addition, information associated with the item 6 may be read by reader 3. It should be appreciated that if the access key AK was a time-constrained access key, AK1 is of no use in opening storage container 2. However, the further information (e.g. an item identifier ID and/or item characteristics) may still be read. It may also be detected that the reading by reader 30 occurred some time after a previous reading and/or a previous opening of storage container 2.
In one embodiment the intended return may be established on the basis of the number of readings of the first access key AK and comparing this with a predetermined number by control system 30. For example, a first reading of AK1 is likely to be reading when item 6 was delivered. The second reading may have occurred when item 6 was taken out of the storage container 2 by the consumer. A third reading would indicate an intended return such that a return status may be established and registered in computer system 7.
Control system 30 may apply a time interval to avoid unintended reading of the first access key or unintended establishment of the return status. In the above mentioned example, if the third reading occurs (very) shortly after the second reading, this third reading is less likely to indicated an intended return of the item, whereas a third reading after a certain amount of time (e.g. more than five minutes) may indicate an intention to return the item. Other conditions for the storage container, such as detecting opening of the storage container when reading the first access key, may also assist in establishing the return status of the item 6. The embodiment facilitates easy return of items (e.g. without having to access the computer system and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome).
As an alternative, tern 6 may contain another access key , e.g. a dedicated return key AKr, that should be used if the item 6 is to be returned. The return key AKr may be obtained using a time window different from the time window used in generating the delivery access key AK1 Computer system 7 may store this code. If the return key AKr is received, the computer system 7 is informed that the item 6 is stored in the storage container 2 for return purposes. Computer system 7 may update the storage container status again, e.g. the filling status. Computer system 7 may generate and/or release a new first access key in response to detecting establishment of a return status for an item.
Detection of the event is performed in step Sll. Information on the event is transmitted to computer system 7 in step S12. It should be noted that the decision of establishing a return status for an item is preferably taken at the computer system 7.
When computer system 7 is informed that item 6 is to be returned, a new first access key AK1 is generated (step S13), again possibly using a validity time window. Computer system 7 transmits the new first access key AK1 and delivery service provider 8 obtains the identifier. In step S14, the employee exposes the new first access key AK to the reader 31. If the new first access key AK1 corresponds to the second access key AK2 generated in a manner similar as for delivery, storage container 2 opens and the employee gets access to the item 6 stored therein previously by the consumer.
The computer system 7 may be informed of the retrieval of the item 6 via communication module 32 and data network 9 and update the storage container status (e.g. the filling status). Computer system 7 may also inform at least one of the customer and the delivery services provider 8 of the successful return. Again, the event of successful return may be triggered only if the storage container 2 is locked appropriately. The appropriate return may be signalled by indicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate return may be signalled by red light. FIG. 3D is a flow chart depicting some steps at the storage container 2 and computer system 7 for an exemplary case wherein the customer orders three items 6A, 6B, 6C with one or several web shops 4 (step S20). Items 6A, 6B, 6C may be delivered by one or more delivery service providers 8.
The combined volume of items 6A, 6B and 6C exceeds the storage capacity of storage container 2. This information, i.e. at least one of the dimensions of each of the items 6A, 6B, 6C and the total volume of the combination of these items is available to the computer system 7. A similar case may be envisaged for other properties of the items, e.g. weight and/or items that should not be stored with each other for other reasons, including safety reasons, food preservation reasons, etc.
In one variant, illustrated by the left branch of FIG. 3D, web shop 4 informs computer system 7 of the dimensions of an item 6A, 6B, 6C once the customer orders the item (step S21). Computer system 7 may e.g. generate first access keys AK1A, AK1B for items 6A and 6B respectively in step S22, but not generate the identifier AK1C for item 6C, recognizing from the known dimensions of both the storage container 2 and the items 6A-6C that item 6C may not fit into the storage container 2 together with items 6A and 6B. It is noted that customers may prioritize delivery of certain items and that computer system 6 may take such priority settings into account when deciding which identifiers to generate (and, consequently which items will be delivered). Of course, computer system 7 may still generate the identifiers, e.g. identifier AK1C, but not release the identifier for delivery purposes.
In step S23, an employee of delivery service provider 8 exposes access keys AK1A and AK1B (and possibly the further information) to reader 31. If at least one of these access keys AK1A, AK1B is found to correspond to corresponding second access keys AK2A, AK2B generated in the storage container 2, the employee gets access to storage container 2. Computer system 7 will update the status of the storage container 2 accordingly.
For example, the filling status may be updated to indicate the remaining storage capacity of storage container 2 now that both items 6A, 6B are stored therein.
In step S24, the customer opens storage container 2 using one of the keys 3 and gets the items 6A and 6B from storage container 2. The status of the storage container 2 is automatically updated in computer system 7 via communication module 32 controlled by control system 30. Now that items 6A and 6B have been retrieved from the storage container 2, computer system 7 may generate or release the identifier AK1C for item 6C since storage container 2 now has sufficient storage capacity to contain item 6C.
In another variant, illustrated by the right branch of FIG. 3D, delivery service provider 8 attaches further information regarding item dimensions to the item 6, e.g. using a label (possibly the same label as for the first access key AK1C) that may be read by reader 31 of the storage container. This information may be obtained from web shop 4. Computer system 7 may already have generated first access keys AK1A, AK1B and AK1C for items 6A-6C respectively. The further information regarding dimensions of the item has not been used in deriving the first access keys AK1A, AK1B, AK1C.
An employee of delivery service provider 8 delivering item 6C may first arrive at the storage container 2. Reader 31 reads first access key AK1C and information regarding the dimensions of the item 6C (step S25). If the first access key AK1C corresponds to AK2C generated in the storage container 2, item 6C may be stored successfully in the storage container 2. In step S26, the information regarding the dimensions of item 6C is transmitted to the computer system 7, e.g. in response to finding successful delivery by control system 30. Computer system 7 may update a filling status of storage container 2 in its records .
Next, in step S27, an employee of a different service provider arrives with item 6A. Reader 31 reads AK1A and dimension information of item 6A. If item 6A is successfully delivered, the dimension information of item 6A is transmitted to computer system 7 in step S28. Again, computer system 7 may update the storage container status, e.g. the filling status. Computer system 7 may determine that insufficient storage space remains for a delivery service provider 8 delivering item 6B.
This status remains until the customer has retrieved at least one of the items 6A, 6C and has not put in another item (e.g. an item to be returned). Accordingly, computer system 7 may inform delivery service provider that item 6B cannot be delivered.
Also, customer 7 may be informed of the event.
In yet another variant, computer system 7 has access to information regarding dimensions of the items, e.g. in a memory (e.g. a database) or via a connection to a web shop 4. If an item is delivered to the storage container 2, the storage container 2 may forward an item identifier ID associated with the item in steps S26 and S29. Computer system 7 may find the corresponding dimension information using the received identifier and update the storage container status.
In each of the above embodiments, computer system 7 may comprise a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or returning of the tangible item. This embodiment facilitates payment of the item after delivery of the item instead of prepayment or as soon as the item is registered as being returned.
As mentioned previously, events at the storage container 2 may be detected, either at the storage container 2 itself or at the computer system 7.
If a user puts an item 6 in the storage container 2, originally, the storage container 2 is closed and item 6 is not in the storage container 2. If storage container 2 is closed and the user wants to put the item in the storage container, the label attached to the item 6 is read by the reader 31. Since the storage container was detected to be closed, item 6 could not have been within the storage container 6. In a next step, the storage container 2 is opened using user key 3 (which can be distinguished from reading the label on item 6). The user may then put the item 6 in the key and close the storage container 2 (which can be detected). A renewed scan of the label of item 6 after some time is with item 6 stored with the storage container 2.
Similary, an event of getting item 6 from the storage container 2 can be detected using the following steps: 1) read label of item 6 with storage container 2 closed : item 6 is in the storage container 2; 2) detect opening storage container 2 with user key 3; 3) detect closing of storage container 2; 4) if label of item 6 is read after some time, the item 6 is not in the storage container 2.
Similarly, an event of putting an item 6 in the storage container by another party than the user can be detected using the following steps: 1) read label of item 6 with container closed; item 6 is not in storage container 2; 2) detect opening storage container 2 with first access key ΆΚ1; 3) detect closing of storage container 2; 4) reading label of item 6 after some time: item 6 is in the storage container 2.
Similarly, an event of getting an item from the storage container 2 by another party than the user can be detected using the following steps: 1) read label with container closed; item 6 is in storage container 2; 2) detect opening storage container 2 with first access key AK1; 3) detect closing of storage container 2; 4) reading label after some time: item 6 is not in the storage container 2. FIG. 4 is a schematic illustration of another delivery and return system for an item 6.
Storage container 2 comprises a functional module 24 comprising communication and locking functions. Functional module 24 may comprise the following components: a microprocessor, a power source (battery), light emitting diodes, a sound producing component, an RFID/NFC reader or scanner 31, a transmission/receiving component, a servo component, a locking component, an on/off switch, a vibration sensor and a secure memory for storing the private key PK. In addition, a power charger may be provided. All components are housed in a housing providing the functional module 24.
Storage container 2 comprises a lockable space of particular dimensions suitable for safe and dry storage of postal packages 6. The storage container 2 may or may not comprise a separate lockable space for receiving mail, e.g. registered mail.
Computer system 7 comprises an online platform provided with a data processing system DAT. Computer system 7 provides a user interface for users of the online platform. Users may manage a subscription (an account), manage access settings to the account, set user preferences and/or activate an electronic key 3.
The online platform 7 is configured to generate unique access keys, AKl, using key generator AK-GEN. The generated keys AKl enable access to a particular storage container 2 at a particular day during a certain time interval. The time interval may e.g. span a maximum of 4 hours, 2 hour, 1 hour. The unique key AKl may be generated using time constrained key technology and may or may not be provided with a physical unclonable
function. AKl may be provided, e.g. programmed, on an RFID/NFC label 40. RFID label 40 may be printed at a production site 41 comprising an RFID/NFC printer 42 and/or an RFID/NFC writer 43. The production site 41 may also provide, e.g. program, electronic key 3. Key 3 may or may not be provided with a physical unclonable function.
Production site 41 may also produce return RFID/NFC labels 44 programmed with a new first access key AKl to enable unlocking of a storage container 2 to pick up an item 6.
Online platform 7 may comprise a parcel management system PMS for managing delivery and return of items 6. Online platform 7 also comprises pay-after-delivery/pay-back-after-re-turn module PAY.
Wireless data network 9 enables data transmission from storage container 2 to online platform 7. Further information and status information may be transmitted over the wireless data network 9. Wireless data network 9 may also be used to communicate with other parties, e.g. maintenance services providers. Wireless data network may allow two-way communication.
Online platform 7 has access to the internet 5 in order to enable communication with web shops 4, service providers 8 (see FIG. 1) and users of storage containers 2. Service providers 8 and/or production site 41 may verify via the internet 5 whether or not the consumer has a subscription via an API/web service of online platform 7 and whether any restrictions apply (e.g. temporal unavailability due to lack of storage space or holiday period). If the user has a subscription and no restrictions apply, the generated key AK1 may be transmitted to a relevant party, e.g. production site 41.
Online platform 7 also comprises a message transmission module MSG to transmit messages or notifications, e.g. SMS messages or e-mail messages. Messages and notifications may be transmitted via a telecommunications network 45.
Fig. 5 is a block diagram illustrating an exemplary control system 30 or a data processing system DAT in computer system 7.
Data processing system 50 may include at least one processor 51 coupled to memory elements 52 through a system bus 53. As such, the data processing system 50 may store program code within memory elements 52. Further, processor 51 may execute the program code accessed from memory elements 52 via system bus 53. In one aspect, data processing system 50 may be implemented as a computer system that is suitable for storing and/or executing program code. It should be appreciated, however, that data processing system 50 may be implemented in the form of any system including a processor and memory that is capable of performing the functions or steps described within this specification.
Memory elements 52 may include one or more physical memory devices such as, for example, local memory 54 and one or more bulk storage devices 55. Local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. A bulk storage device 55 may be implemented as a hard drive or other persistent data storage device. The data processing system 50 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from bulk storage device 55 during execution.
Input/output (I/O) devices depicted as input device 56 and output device 57 optionally can be coupled to the data processing system 50. Examples of input devices may include, but are not limited to, for example, a keyboard, a pointing device such as a mouse, a touch screen, or the like. Examples of output device may include, but are not limited to, for example, a monitor or display, speakers, or the like. Input device 56 and/or output device 57 may be coupled to data processing system 50 either directly or through intervening I/O controllers. A network adapter 58 may also be coupled to data processing system 50 to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter 58 may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to said data processing system 50 and a data transmitter for transmitting data to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapters that may be used with data processing system 50.
As pictured in Fig. 5, memory elements 52 may store an application 59. It should be appreciated that data processing system 50 may further execute an operating system (not shown) that can facilitate execution of the application. Applications, being implemented in the form of executable program code, can be executed by data processing system 50, e.g., by processor 51. Responsive to executing the application 59, the data processing system 50 may be configured to perform one or more operation as disclosed in the present application in further detail.
In one aspect, for example, data processing system 50 may represent a data processing system DAT of central computer 7 performing one or more of functions using one or more applications 59.
It is noted that the method has been described in terms of steps to be performed, but it is not to be construed that the steps described must be performed in the exact order described and/or one after another. One skilled in the art may envision to change the order of the steps and/or to perform steps in parallel to achieve equivalent technical results.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising, " when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. Various embodiments of the invention may be implemented as a program product for use with a computer system or a processor, where the program(s) of the program product define functions of the embodiments (including the methods described herein). In one embodiment, the program(s) can be contained on a variety of non-transitory computer-readable storage media (generally referred to as "storage") , where, as used herein, the expression "non-transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a transitory, propagating signal.
In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.

Claims (23)

1. Opslagcontainer voor het opslaan van ten minste één tastbaar voorwerp, waarbij het tastbare voorwerp geassocieerd is met een eerste toegangssleutel en de opslagcontainer geassocieerd is met een tweede toegangssleutel, waarbij de opslagcontainer omvat: een containercomponent die toegang verschaft tot een opslaggedeelte van de opslagcontainer; een lezer ingericht voor het lezen van de eerste toegangssleutel van het tastbare voorwerp; een stuursysteem ingericht voor het sturen van de component om toegang te verschaffen tot het opslaggedeelte wanneer de eerste door de lezer gelezen toegangssleutel van de opslagcontainer overeenstemt met de tweede toegangssleutel die is geassocieerd met de opslagcontainer.A storage container for storing at least one tangible object, wherein the tangible object is associated with a first access key and the storage container is associated with a second access key, the storage container comprising: a container component providing access to a storage portion of the storage container; a reader adapted to read the first access key of the tangible object; a control system adapted to control the component to provide access to the storage portion when the first access key of the storage container read by the reader corresponds to the second access key associated with the storage container. 2. Opslagcontainer volgens conclusie 1, waarbij de opslagcontainer bovendien een generator omvat voor het voortbrengen van de tweede toegangssleutel onder gebruikmaking van een private sleutel van de opslagcontainer en waarbij het stuursysteem is ingericht voor het sturen van de component wanneer de eerste, met het voorwerp geassocieerde toegangssleutel overeenstemt met de tweede, in de opslagcontainer voortgebrachte toegangssleutel.A storage container according to claim 1, wherein the storage container further comprises a generator for generating the second access key using a private key of the storage container and wherein the control system is adapted to control the component when the first object associated with the object access key corresponds to the second access key generated in the storage container. 3. Opslagcontainer volgens conclusie 1 of 2, waarbij de opslagcontainer bovendien vanaf het tastbare voorwerp ten minste eén van een voorwerpidentificatie, een geldigheidstijdvenster, en een voorwerpeigenschap ontvangt en het stuursysteem ten minste één gebruikt van de voorwerpiden-tificatie, het geldigheidstijdvenster, en de voorwerpeigenschap om de tweede toegangssleutel voort te brengen.A storage container according to claim 1 or 2, wherein the storage container additionally receives from the tangible object at least one of an object identification, a validity time window, and an object property and the control system uses at least one of the object identification, the validity time window, and the object property to generate the second access key. 4. Opslagcontainer volgens een of meer voorgaande conclusies, waarbij de opslagcontainer een communicatiemodule omvat die is ingericht voor het communiceren met een extern computersysteem, waarbij het stuursysteem is ingericht voor het voortbrengen van met de communicatiemodule naar het externe computersysteem over te dragen statusinformatie en waarbij, optioneel, de statusinformatie verband houdt met tenminste één van een status van de opslagcontainer en een bezorg-/teruggeefstatus van het tastbare voorwerp.Storage container according to one or more of the preceding claims, wherein the storage container comprises a communication module which is adapted to communicate with an external computer system, wherein the control system is adapted to generate status information to be transmitted with the communication module to the external computer system and wherein, optionally, the status information is related to at least one of a status of the storage container and a delivery / return status of the tangible item. 5. Opslagcontainer volgens een of meer voorgaande conclusies, waarbij het stuursysteem is ingericht voor het vaststellen van een teruggeefstatus van het tastbare voorwerp, waarbij het vaststellen van een teruggeefstatus optioneel ten minste één omvat van: het vergelijken van het aantal lezingen van de eerste toegangssleutel met een vooraf bepaald aantal, waarbij het aantal van de lezingen, optioneel, het aantal is van lezing tijdens een vooraf ingestelde tijdspanne; het vaststellen van een status van de component van de opslagcontainer; het vaststellen welke sleutel er is gebruikt om toegang te verschaffen tot de opslagcontainer.5. Storage container according to one or more of the preceding claims, wherein the control system is adapted to determine a return status of the tangible object, wherein the determination of a return status optionally comprises at least one of: comparing the number of readings of the first access key with a predetermined number, the number of the readings being, optionally, the number of reading during a preset time period; determining a status of the storage container component; determining which key is used to provide access to the storage container. 6 . Opslagcontainer volgens een of meer voorgaande conclusies, waarbij de opslagcontainer een energiebron omvat en een activeereenheid ingericht voor het activeren van ten minste één van de lezer en het stuursysteem.6. Storage container according to one or more of the preceding claims, wherein the storage container comprises an energy source and an activating unit adapted to activate at least one of the reader and the control system. 7. Opslagcontainer volgens een of meer voorgaande conclusies, waarbij de opslagcontainer een knoeidetectiesen-sor omvat, waarbij de opslagcontainer is ingericht voor het op de hoogte stellen van een extern computersysteem van het detecteren van knoeien van de opslagcontainer.Storage container according to one or more of the preceding claims, wherein the storage container comprises a tamper detection sensor, the storage container being adapted to notify an external computer system of detecting tampering of the storage container. 8. Opslagcontainer volgens een of meer voorgaande voor geregistreerde voorwerpen, bijvoorbeeld aangetekende post of aangetekende pakketten.8. Storage container according to one or more preceding for registered objects, for example registered mail or registered packages. 9. Computersysteem ingericht voor gebruik met tenminste één opslagcontainer volgens een of meer voorgaande conclusies, bovendien een generator omvattend voor het vóórtbrengen van de eerste toegangssleutel voor het tastbare voorwerp om tenminste één van de bezorging van het tastbare voorwerp aan het opslaggedeelte en teruggeven van het tastbare voorwerp uit het opslaggedeelte van de opslagcontainer toe te laten.A computer system adapted for use with at least one storage container according to one or more of the preceding claims, further comprising a generator for bringing the first tangible object access key to at least one of delivering the tangible object to the storage portion and returning the tangible object from the storage part of the storage container. 10. Computersysteem volgens conclusie 9, waarbij de voortgebrachte eerste toegangssleutel wordt voortgebracht onder gebruikmaking van een private sleutel van de opslagcontainer en, optioneel, tenminste een van een voorwerpidentificatie, een geldigheidstijdvenster, en een voorwerpeigenschap van het voorwerp.The computer system of claim 9, wherein the generated first access key is generated using a private key of the storage container and, optionally, at least one of an object identification, a validity time window, and an object property of the object. 11. Computersysteem volgens een of meer van de conclusies 8 tot en met 10, waarbij het computersysteem is ingericht voor het bewaken van de opslagcontainer en, optioneel, bijwerken van ten minste één van een status van de opslagcontainer en een bezorg-/teruggeefstatus van het tastbare voorwerp.The computer system according to one or more of claims 8 to 10, wherein the computer system is arranged for monitoring the storage container and, optionally, updating at least one of a status of the storage container and a delivery / return status of the storage container. tangible object. 12. Computersysteem volgens een of meer van de conclusies 7 tot en met 11, waarbij het computersysteem is ingericht voor het vanaf de opslagcontainer ontvangen van ten minste één eigenschap van het tastbare voorwerp, bijvoorbeeld één of meer afmetingen van het tastbare voorwerp.A computer system according to one or more of claims 7 to 11, wherein the computer system is adapted to receive from the storage container at least one property of the tangible object, for example one or more dimensions of the tangible object. 13. Computersysteem volgens een of meer van de conclusies 7 tot en met 12, waarbij het computersysteem bovendien in geheugen omvat voor het opslaan van een opslagstatus van de opslagcontainer op basis van tenminste één eigenschap van het tastbare voorwerp.A computer system according to any of claims 7 to 12, wherein the computer system further comprises in memory for storing a storage status of the storage container based on at least one property of the tangible object. 14. Computersysteem volgens een of meer van de conclusies 7 tot en met 13, waarbij het computersysteem is ingericht voor communicatieve verbinding met een webwinkel.A computer system according to one or more of claims 7 to 13, wherein the computer system is adapted for communicative connection with a web store. 15. Computersysteem volgens een of meer van de conclusies 7 tot en met 14, waarbij in het computersysteem een gebruikersaccount van een gebruiker van de opslagcontai-ner is opgeslagen, waarbij, optioneel: de gebruikersaccount door de gebruiker kan worden geassocieerd met een veelheid opslagcontainers; en/of de gebruikersaccount beschikbaarheid kan aanduiden van de opslagcontainer voor een andere gebruiker.A computer system according to any of claims 7 to 14, wherein a user account of a user of the storage container is stored in the computer system, wherein, optionally: the user account can be associated by the user with a plurality of storage containers; and / or the user account can indicate availability of the storage container for another user. 16. Computersysteem volgens een of meer van de conclusies 7 tot en met 15, waarbij het computersysteem een betalingsmodule omvat ingericht voor het voortbrengen van een betaalsignaal in reactie op het ontvangen van statusinforma-tie vanaf de opslagcontainer die er ten minste één aanduidt van bezorging van of teruggeven van het tastbare voorwerp.A computer system according to one or more of claims 7 to 15, wherein the computer system comprises a payment module adapted to generate a payment signal in response to receiving status information from the storage container indicating at least one delivery of or returning the tangible object. 17. Werkwijze voor ten minste één van bezorging aan en teruggeven uit een opslagcontainer van een tastbaar voorwerp, waarbij de opslagcontainer geassocieerd is met een tweede toegangssleutel, waarbij de werkwijze de stappen omvat : verkrijgen van een eerste toegangssleutel geassocieerd met het tastbare voorwerp; het blootstellen van de eerste toegangssleutel aan een lezer van de opslagcontainer; het verkrijgen van toegang tot een opslagge-deelte van de opslagcontainer wanneer de eerste toegangssleutel gerelateerd is aan de tweede toegangssleutel; het in het opslaggedeelte zetten van het tastbare voorwerp en/of het tastbare voorwerp uit het opslaggedeelte halen.A method for at least one of delivery to and return from a storage container of a tangible object, the storage container being associated with a second access key, the method comprising the steps of: obtaining a first access key associated with the tangible object; exposing the first access key to a reader of the storage container; gaining access to a storage portion of the storage container when the first access key is related to the second access key; placing the tangible object in the storage portion and / or removing the tangible object from the storage portion. 18. Werkwijze volgens conclusie 16, waarbij de eerste toegangssleutel een in de tjd begrensde identificatie is, waarbij de werkwijze de stap omvat van het blootstellen van de eerste toegangssleutel aan de lezer onder voldoening aan tijdbeperkingen van de in de tijd begrensde identificatie .The method of claim 16, wherein the first access key is a time-limited identification, the method comprising the step of exposing the first access key to the reader while complying with time constraints of the time-limited identification. 19. Opslagcontainer omvattende een knoeidetectie-sensor, bijvoorbeeld een trillingssensor, voor het detecteren van knoeien met de opslagcontainer en een communicatiemodule voor het communiceren met een extern computersysteem, waarbij de communicatiemodule is ingericht voor het overdragen van een meldingsbericht aan een extern computersysteem bij het detecteren van knoeien door de knoeidetectiesensor.A storage container comprising a tamper detection sensor, for example a vibration sensor, for detecting tampering with the storage container and a communication module for communicating with an external computer system, the communication module being adapted to transfer a notification message to an external computer system upon detection of tampering with the tamper sensor. 20. Opslagcontainer volgens conclusie 19, waarbij de opslagcontainer een ingebouwde energiebron omvat en de communicatiemodule door de energiebron wordt gevoed, optioneel bij het lezen door de knoeidetectiesensor.The storage container of claim 19, wherein the storage container comprises a built-in energy source and the communication module is powered by the energy source, optionally when read by the tamper detection sensor. 21. Opslagcontainer omvattende een actiedetector die onderscheidbare handelingen detecteert bij de opslagcontainer en een communicatiemodule voor het communiceren van acties aan een extern computersysteem, waarbij acties een of meer omvatten van: een voorwerp in de opslagcontainer zetten door de gebruiker; het uit de opslagcontainer halen van een voorwerp door de gebruiker; een voorwerp in de opslagcontainer zetten door een andere partij dan de gebruiker; een voorwerp uit de opslagcontainer halen door een andere partij dan de gebruiker.A storage container comprising an action detector that detects distinguishable actions at the storage container and a communication module for communicating actions to an external computer system, actions comprising one or more of: putting an object into the storage container by the user; the user taking an object out of the storage container; placing an object in the storage container by a party other than the user; retrieve an item from the storage container by a party other than the user. 22. Opslagcontainer volgens conclusie één 20, waarbij de opslagcontainer actie onderscheidt op basis van tot de opslagcontainer, de toestand van een component (bijvoorbeeld een deur) van de opslagcontainer.The storage container of claim one, wherein the storage container distinguishes action based on up to the storage container, the condition of a component (e.g., a door) of the storage container. 23. Computersysteem volgens een of meer van de conclusies 19 tot en met 22, waarbij het computersysteem is ingericht voor het ontvangen van communicatie vanaf de commu-nicatiemodule van de opslagcontainer.The computer system according to one or more of claims 19 to 22, wherein the computer system is adapted to receive communication from the communication module of the storage container.
NL2012817A 2014-05-15 2014-05-15 Storage container, computer system and method for delivering and returning a tangible item. NL2012817B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
NL2012817A NL2012817B1 (en) 2014-05-15 2014-05-15 Storage container, computer system and method for delivering and returning a tangible item.
PCT/NL2015/050293 WO2015174829A1 (en) 2014-05-15 2015-04-30 Storage container, computer system and method for delivering and returning a tangible item

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL2012817A NL2012817B1 (en) 2014-05-15 2014-05-15 Storage container, computer system and method for delivering and returning a tangible item.

Publications (1)

Publication Number Publication Date
NL2012817B1 true NL2012817B1 (en) 2016-03-02

Family

ID=51541247

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2012817A NL2012817B1 (en) 2014-05-15 2014-05-15 Storage container, computer system and method for delivering and returning a tangible item.

Country Status (2)

Country Link
NL (1) NL2012817B1 (en)
WO (1) WO2015174829A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017138825A1 (en) * 2016-02-08 2017-08-17 Юрий Иванович ДРОБОТЯ Individual foldable delivery container and home delivery system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015758A2 (en) * 2000-08-25 2002-02-28 Bearbox Ltd. Secure unattended delivery system
US20020147919A1 (en) * 2001-02-03 2002-10-10 Gentry Daniel W. Secured delivery system for unattended receiving and shipping of parcels and letters

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015758A2 (en) * 2000-08-25 2002-02-28 Bearbox Ltd. Secure unattended delivery system
US20020147919A1 (en) * 2001-02-03 2002-10-10 Gentry Daniel W. Secured delivery system for unattended receiving and shipping of parcels and letters

Also Published As

Publication number Publication date
WO2015174829A1 (en) 2015-11-19

Similar Documents

Publication Publication Date Title
CA3002197C (en) Methods and systems for ensuring secure delivery of parcels using internet-enabled storage receptacle
US11695780B2 (en) Automated delivery security system
CN106934946B (en) Storage cabinet operation method, information sending method, device and system
CN105793875B (en) Selecting an access control device on an access authorization verification device based on cargo information
US11659145B2 (en) Event identification and notification via an automation hub
US10853759B2 (en) Compartment-specific access authorization information
US20150371468A1 (en) Delivery and collection apparatus, method and system
GB2522287A (en) Delivery and collection apparatus, method and system
CN106256115A (en) Express delivery safe deposit box and utilize its express delivery to get method and cipher authentication method
KR20160093662A (en) Smart mailbox, smart mailbox system and related method
KR101693358B1 (en) Remote delivery control system using each household parcel locker
JP2021504617A (en) Systems, methods, and equipment to secure deliveries
JP2020053047A (en) Automatic door control server
KR102149729B1 (en) A parcel service management system for occupants of buildings with smartphone parking location and one-pass system
CN110033566A (en) Method and apparatus for wrapping up save set
NL2012817B1 (en) Storage container, computer system and method for delivering and returning a tangible item.
US11858703B2 (en) Apparatus, system and method for securing and preventing tampering of food delivery items
JP2017021398A (en) Stocker management device and program
US20220189263A1 (en) Container
JP2014148850A (en) Delivery article reception box and delivery system
KR20080071227A (en) System and method for managing articles
CA3167739A1 (en) Systems and methods for coordinating secure delivery of goods
KR101810064B1 (en) Sensor System sensing open door and Method thereof
GB2582630A (en) Container