US20190325719A1 - Preventing anonymous theft by drones - Google Patents
Preventing anonymous theft by drones Download PDFInfo
- Publication number
- US20190325719A1 US20190325719A1 US15/960,933 US201815960933A US2019325719A1 US 20190325719 A1 US20190325719 A1 US 20190325719A1 US 201815960933 A US201815960933 A US 201815960933A US 2019325719 A1 US2019325719 A1 US 2019325719A1
- Authority
- US
- United States
- Prior art keywords
- data
- tracking
- altitude
- tracking server
- alert
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 33
- 230000004044 response Effects 0.000 claims abstract description 13
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 12
- 238000012545 processing Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 230000008859 change Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000013479 data entry Methods 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000010411 cooking Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
-
- G06Q50/28—
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1436—Mechanical actuation by lifting or attempted removal of hand-portable articles with motion detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B5/00—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
- G08B5/22—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission
- G08B5/36—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission using visible light sources
Definitions
- the present invention generally relates to securing property and, more particularly, to methods and systems for preventing anonymous theft of property by drones.
- Drones also referred to as unmanned aerial vehicles or UAVs
- UAVs unmanned aerial vehicles
- a drone provides a mechanism for a user to perform certain tasks remotely, i.e., without the user being physical present at the location of the task being performed.
- a computer implemented method that includes: accessing, by a tracking server, a secure database that stores data about an object of personal property; determining, by the tracking server and from the data about the object, that a tracking state of the object is set to ON; obtaining, by the tracking server and in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; comparing, by the tracking server, the altitude data to a predefined criteria; and repeating, by the tracking server, the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF.
- IoT Internet of Things
- a computer program product that includes a computer readable storage medium having program instructions embodied therewith.
- the program instructions are executable by a computing device to cause the computing device to: access a secure database that stores data about an object of personal property; determine, from the data about the object, that a tracking state of the object is set to ON; obtain, in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; compare the altitude data to a predefined criteria; and repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF.
- IoT Internet of Things
- a system that includes: a hardware processor, a computer readable memory, and a computer readable storage medium associated with a computing device; program instructions to access a secure database that stores data about an object of personal property; program instructions to determine, from the data about the object, that a tracking state of the object is set to ON; program instructions to obtain, in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; program instructions to compare the altitude data to a predefined criteria; and program instructions to repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF, wherein the program instructions are stored on the computer readable storage medium for execution by the hardware processor via the computer readable memory.
- IoT Internet of Things
- FIG. 1 depicts a computer system in accordance with aspects of the invention.
- FIG. 2 depicts a block diagram of an illustrative environment in accordance with aspects of the invention.
- FIG. 3 depicts an exemplary delivery scenario in accordance with aspects of the invention.
- FIG. 4 depicts a flowchart of an exemplary method in accordance with aspects of the invention.
- the present invention generally relates to securing property and, more particularly, to methods and systems for preventing anonymous theft of property by drones.
- Unattended delivery of packages can leave goods exposed to theft and other malicious behaviors once the package/payload is delivered.
- the confluence of the increase in drone use and the increase in online shopping provides a situation in which a drone may be used with nefarious intent to anonymously take a package that is left on a doorstep after delivery.
- Aspects of the invention are directed to systems and methods that leverage a secure database that is configured to selectively enable and disable altitude-based tracking of objects such as delivered packages.
- an object to be tracked is provided with an IoT (Internet of Things) device that is configured to detect altitude data of the object to which it is attached.
- IoT Internet of Things
- One or more trusted entities may update the secure database to add data defining a current tracking state for the object (e.g., track or do not track).
- a trusted entity updates the secure database to set the tracking state of the object.
- a server Based on the state being set for tracking, a server continuously tracks altitude data received from the IoT device associated with the object and generates an alert when the altitude data satisfies a preset criteria, such as a change in altitude exceeding a threshold value as would be expected when the object is lifted away by a drone.
- an intended recipient of the object may provide input to one of the trusted entities (e.g., the merchant or shipping entity) indicating that the object has been received, at which point the trusted entity updates the state of the object in the secure database to turn off the tracking. Implementations of the invention thus provide for altitude-based tracking of an unattended object for a time period between a time of delivery of the object and a time of indicated acceptance of the object. In this manner, implementations of the invention provide systems and methods for preventing anonymous theft of objects by drones.
- the secure database is a blockchain.
- the secure database is a blockchain that can only be modified by a trusted entity (e.g., the merchant, the shipping entity, etc.).
- the server reads data from the blockchain to determine the state of an object for the purpose of determining whether to track the object.
- the recipient of the package indicates acceptance of the object to one of the trusted entities through a website or mobile application and, based on this indication from the recipient, the trusted entity updates the blockchain to change the state of the object to turn off the tracking.
- Implementations of the invention are useful for tracking delivered objects, i.e., after the shipping process is complete. However, aspects of the invention may also be used to selectively track an object during shipping, i.e., while the object is under the control of a merchant and/or one or more shipping entities. Aspects of the invention may also be used with non-delivered objects, such as personal property that is kept outside a residence or place of business.
- the present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- memory stick a floppy disk
- a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
- a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the Figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- Computing infrastructure 10 is only one example of a suitable computing infrastructure and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless, computing infrastructure 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove.
- computing infrastructure 10 there is a computer system (or server) 12 , which is operational with numerous other general purpose or special purpose computing system environments or configurations.
- Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
- Computer system 12 may be described in the general context of computer system executable instructions, such as program modules, being executed by a computer system.
- program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types.
- Computer system 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer system storage media including memory storage devices.
- computer system 12 in computing infrastructure 10 is shown in the form of a general-purpose computing device.
- the components of computer system 12 may include, but are not limited to, one or more processors or processing units (e.g., CPU) 16 , a system memory 28 , and a bus 18 that couples various system components including system memory 28 to processor 16 .
- processors or processing units e.g., CPU
- Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
- bus architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
- Computer system 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system 12 , and it includes both volatile and non-volatile media, removable and non-removable media.
- System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32 .
- Computer system 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media.
- storage system 34 can be provided for reading from and writing to a nonremovable, non-volatile magnetic media (not shown and typically called a “hard drive”).
- a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”).
- an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided.
- memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
- Program/utility 40 having a set (at least one) of program modules 42 , may be stored in memory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment.
- Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
- Computer system 12 may also communicate with one or more external devices 14 such as a keyboard, a pointing device, a display 24 , etc.; one or more devices that enable a user to interact with computer system 12 ; and/or any devices (e.g., network card, modem, etc.) that enable computer system 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22 . Still yet, computer system 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20 . As depicted, network adapter 20 communicates with the other components of computer system 12 via bus 18 .
- LAN local area network
- WAN wide area network
- public network e.g., the Internet
- FIG. 2 depicts a block diagram of an illustrative environment in accordance with aspects of the invention.
- the environment includes a secure database 50 that stores data defining the state of objects being tracked by the system.
- the secure database 50 comprises a blockchain, e.g., a distributed blockchain database.
- the secure database 50 may comprise data storage on plural computer devices connected in a distributed network environment that function as a distributed ledger of the data. Implementations of the invention are not limited to a blockchain, however, and the secure database 50 may comprise, for example, a single computer device that stores and manages data in the manner described herein.
- the secure database 50 is connected to a communication network 55 that may comprise one or more computer networks (such as a LAN, WAN, or the Internet) and/or one or more telecommunications networks (such as a cellular network).
- a merchant system 60 a shipping entity system 65 , a tracking server 70 , and a user device 75 are also connected to the network 55 .
- Each of the merchant system 60 , the shipping entity system 65 , the tracking server 70 , and the user device 75 may comprise one or more computer devices such as computer system 12 of FIG. 1 .
- the merchant system 60 is configured to receive an online shopping order from the user device 75 , e.g., via a website or mobile application.
- the merchant system 60 may be configured to initiate shipping an object 80 defined in the order to a delivery location defined in the order (e.g., a delivery address such as a residence or place of business).
- the object 80 may comprise personal property such as consumer goods.
- the merchant system 60 and the shipping entity system 65 may communicate with one another via the network 55 to coordinate shipping the object 80 to the delivery location.
- the user device 75 may be used to provide input indicating receipt of the object 80 by the intended recipient, the input being provided for example via a website or mobile application of the merchant system 60 or the shipping entity system 65 .
- an IoT device 85 is attached to the object 80 while the object 80 is shipped to the delivery location.
- the IoT device 85 may be placed inside, or otherwise attached to, a cardboard box or an envelope that contains the object 80 being shipped. Other methods of attaching may also be used.
- the IoT device 85 comprises a computer processor 86 , a computer memory 87 , a power source 88 , a communication system 89 , and an altitude sensor 90 .
- the IoT device 85 may comprise other components, such as a GPS sensor 91 .
- the power source 88 provides electrical power to the components of the IoT device 85 .
- the computer memory 87 stores program code that is run by the computer processor 86 to perform functions described herein.
- the computer memory 87 may also store data defining a unique identifier of the IoT device 85 relative to other IoT devices associated with other objects in the environment.
- the communication system 89 comprises at least one antenna that provides for wireless communication via the network 55 .
- the communication system 89 may be configured to employ one or more wireless communication protocols including but not limited to Bluetooth, WiFi, and cellular.
- the altitude sensor 90 is a sensor that is configured to detect altitude data associated with the IoT device 85 .
- the altitude sensor 90 may comprise, for example, a digital barometric pressure sensor that detects changes in barometric pressure that can be converted to changes in altitude.
- one or more trusted entities are permitted to write data to the secure database 50 , via the network 55 , to define a state of the object 80 .
- the trusted entities include the merchant system 60 and the shipping entity system 65 , although other entities may be defined as trusted entities based on the intended use of the system.
- the merchant system 60 creates a new entry for the object 80 in the database upon receipt of the order from the user device 75 , and the new entry defines the one or more trusted entities that are permitted to write data to the secure database 50 regarding this object 80 .
- the merchant system 60 may enter an identifier of the object 80 , an identifier of the IoT device 85 associated with the object 80 (e.g., matching the unique identifier stored in the computer memory 87 of the IoT device 85 ), and credentials defining one or more trusted entities that are authorized to write to an entry of the secure database 50 associated with this particular object 80 (e.g., to set the tracking state of the object at one or more defined points in the delivery chain).
- the one or more trusted entities identified in the initial entry may write new data to the entry associated with the object 80 .
- the data may include: a current location of the object 80 , a tracking state of the object, and a timestamp.
- the current location of the object may be obtained from conventional inventory and shipping management systems that are utilized by the merchant (associated with the merchant system 60 ) and/or the shipping entity (associated with the shipping entity system 65 ).
- the tracking state of the object is a data field that can be set by the trusted entity to one of: a first state to turn ON altitude-based tracking of the object 80 , and a second state to turn OFF altitude-based tracking of the object 80 .
- the timestamp may be used to arrange plural data entries associated with a single object 80 , such that a latest (e.g., most recent) data entry for the object 80 may be identified.
- a trusted entity e.g., the merchant system 60 or the shipping entity system 65
- updates the secure database 50 to set the tracking state of the object 80 to ON.
- the tracking server 70 continuously tracks altitude data received from the IoT device 85 associated with the object 80 and generates an alert when the altitude data satisfies a preset criteria, such as a change in altitude exceeding a threshold value as would be expected when the object is lifted away by a drone.
- the intended recipient of the object may provide input to one of the trusted entities (e.g., via the user device 75 communicating with the merchant system 60 or the shipping entity system 65 ) indicating that the object 80 has been received, at which point the trusted entity updates the state of the object in the secure database 50 to turn off the tracking.
- the trusted entities e.g., via the user device 75 communicating with the merchant system 60 or the shipping entity system 65 .
- the tracking server 70 accesses the secure database 50 , via the network 55 , to determine the tracking state of the object 80 .
- the tracking server 70 may comprise a tracking module 72 , which may be one or more program modules 42 as described with respect to FIG. 1 and that is configured to perform one or more of the functions described herein.
- the tracking module 72 periodically reads the latest data entry in the secure database 50 associated with the object 80 to determine the current tracking state of the object 80 as defined in the secure database 50 .
- the tracking module 72 determines the tracking state for the object 80 is OFF, the tracking module 72 takes no action regarding tracking the altitude of the object 80 and waits a predefined amount of time until again reading the latest data entry in the secure database 50 associated with the object 80 to determine the current tracking state of the object 80 .
- the tracking module 72 determines the tracking state for the object 80 is ON, the tracking module 72 continuously obtains altitude data from the IoT device 85 associated with the object 80 and compares the altitude data to one or more predefined criteria.
- the tracking module 72 obtains the altitude data from the IoT device 85 via communication through the network 55 .
- the tracking module 72 may pull the altitude data from the IoT device 85 at repeated time intervals that are sufficiently small as to be considered continuous.
- the IoT device 85 may be configured to continuously push its altitude data to the tracking server 70 , and the tracking module 72 may disregard the pushed altitude data when the tracking state for the object 80 is OFF and utilize the pushed altitude data when the tracking state for the object 80 is ON.
- the one or more predefined criteria comprise a threshold value representing a change in altitude.
- the tracking module 72 continuously analyzes values of the altitude data from the IoT device 85 , and determines whether the altitude data changes by more than the threshold value. In the event the tracking module 72 determines the altitude data does not change by more than the threshold value, the tracking module 72 continues the tracking without generating an alert. In the event the tracking module 72 determines the altitude data does change by more than the threshold value, the tracking module 72 generates an alert.
- the threshold value may be initially set to a default value, and may be adjusted as a configuration setting in the system.
- the tracking server 70 may receive input defining the threshold value from one or more of the merchant system 60 , the shipping entity system 65 , and the user device 75 , and the tracking server 70 may store and subsequently utilize a new threshold value based on the input.
- the tracking module 72 sends the generated alert to at least one designated alert recipient, which may include at least one of: one of the trusted entities (e.g., the merchant system 60 or the shipping entity system 65 ), the user device 75 of the intended recipient of the object, law enforcement, and other designated people.
- the alert may be a message (e.g., text message, email, smartphone notification, etc.) that is communicated by the tracking server 70 via the network 55 .
- the alert may include a designation of the object 80 and last known location of the object 80 , which may be determined by the tracking server 70 from accessing data stored in the secure database 50 .
- the alert can also include an altitude of the object as determined from the altitude data obtained from the IoT device 85 .
- the tracking server 70 may continue to obtain altitude data from the IoT device 85 and periodically send (to the at least one designated alert recipient) an updated alert that includes updated altitude data for the object 80 . In this manner, the tracking server 70 may provide real-time updates of the altitude of the object after the alert is initially generated.
- the designated alert recipient(s) may be defined as a configuration option in the system by storing data defining their contact information.
- the tracking server 70 may receive input defining the designated alert recipient(s) from one or more of the merchant system 60 , the shipping entity system 65 , and the user device 75 , and the tracking server 70 may store and subsequently utilize the designated alert recipient(s) when an alert is generated and sent.
- an intended recipient of the object 80 may designate their neighbor as a designated alert recipient so that the neighbor can visually look at the intended recipient's delivery location (e.g., front porch) when an alert is received.
- the IoT device 85 includes a sensor configured to determine a location of the object, such as a GPS sensor 91 . In this manner, when the tracking module 72 generates the alert in response to the altitude data satisfying the preset criteria, the IoT device 85 may transmit location data to the tracking module 72 so that the object 80 can be tracked using the location data. The tracking module 72 may transmit the location data to the designated alert recipients. In this manner, GPS-based tracking of the object 80 may be initiated based on the altitude-based tracking triggering the alert.
- the tracking server 70 may continue to obtain altitude data and GPS data from the IoT device 85 and periodically send (to the at least one designated alert recipient) an updated alert that includes the updated altitude data and GPS data for the object 80 . In this manner, the tracking server 70 may provide real-time updates of the altitude and GPS location of the object 80 after the alert is initially generated.
- FIG. 3 depicts an exemplary shipping scenario of the object 80 from a merchant to the delivery location.
- the object 80 is initially at merchant facility 150 .
- the object 80 is packaged with the IoT device 85 and moved (e.g., by ground transportation) from the merchant facility 150 to a first shipping entity facility 151 .
- the object 80 packaged with the IoT device 85 is then moved (e.g., by air transportation) from the first shipping entity facility 151 to a second shipping entity facility 152 .
- the object 80 packaged with the IoT device 85 is then moved (e.g., by ground transportation or drone delivery) from the second shipping entity facility 152 to the delivery location 153 and left unattended at the delivery location 153 .
- the merchant system 60 or the shipping entity system 65 updates the secure database 50 to set the tracking state to ON when the object 80 is left unattended at the delivery location 153 .
- the tracking server 70 then continuously tracks the altitude data of the IoT device 85 packaged with the object 80 and generates an alert if the altitude data changes by more than a predefined amount.
- the merchant system 60 or the shipping entity system 65 updates the secure database 50 to set the tracking state to OFF, and the tracking server 70 stops tracking the altitude data of the IoT device 85 packaged with the object 80 .
- Implementations of the invention are useful for tracking delivered objects, i.e., after the shipping process is complete. However, aspects of the invention may also be used to selectively turn the tracking state of the object 80 on and off during shipping, i.e., while the object 80 is under the control of the merchant and/or one or more shipping entities.
- the shipping entity system 65 may update the secure database 50 to set the tracking state to ON when the object 80 is expected to sit idle, e.g., at a warehouse or intermediate facility.
- the shipping entity system 65 may update the secure database 50 to turn on tracking at a first time when the object 80 is expected to sit idle, e.g., at facility 151 .
- the shipping entity system 65 may subsequently update the secure database 50 to turn off tracking at a second time when the object 80 is in transit, e.g., carried by an airplane from facility 151 to facility 152 .
- the shipping entity system 65 may subsequently update the secure database 50 to turn on tracking again when the object 80 is delivered to an unattended location defined by the intended recipient, e.g., at delivery location 153 .
- aspects of the invention may be used to track objects both during shipment (i.e., prior to delivery) and after delivery.
- the shipping entity system 65 may update the secure database 50 to turn on tracking of the object 80 when the object 80 is carried by an airborne shipping vehicle 95 comprising an altimeter 97 .
- the tracking module 72 may compare altitude data of the airborne shipping vehicle 95 (obtained from altimeter 97 ) to the altitude data of the IoT device 85 (obtained from altitude sensor 90 ), and the tracking module 72 may generate an alert when the altitude data of the airborne shipping vehicle 95 and the altitude data of the IoT device 85 deviate from one another by more than a predefined amount. In this manner, aspects of the invention may be used to track the object 80 based on comparing a detected altitude to an expected altitude.
- this determination can be used to infer that the object 80 is not in the airplane and thus is misplaced.
- this determination can be used to infer that the object unintentionally disengaged from the delivery drone (e.g., was unintentionally dropped by the delivery drone).
- aspects of the invention may be used to track the object 80 during shipment and prior to delivery, and are not limited to tracking the object after the object has been delivered and left unattended.
- Implementations of the invention are useful for tracking delivered objects. However, aspects of the invention may also be used with other objects, such as personal property that is kept outside a residence or place of business.
- a user may wish to attach an IoT device 85 as described herein to their cooking grill that is kept in their yard.
- the trusted entity may comprise a service provider that accesses the secure database 50 on behalf of the user, e.g., as part of a subscription.
- the user may communicate with the service provider through a website and/or mobile application to instruct the service provider to selectively turn on and off the altitude based tracking for an identified IoT device 85 .
- the user may attach the IoT device 85 to their grill that is stored outside, instruct the service provider to turn on tracking of the IoT device 85 , and receive an alert from the service provider in the event that the service provider detects that the altitude of the IoT device 85 changes by more than a predefined threshold amount.
- the merchant system 60 , the shipping entity system 65 , and the tracking server 70 are each controlled by separate entities.
- the merchant system 60 and the shipping entity system 65 may be combined into a single system in situations where a single entity performs the functions of both.
- the merchant system 60 and the tracking server 70 may be controlled by a same entity.
- FIG. 4 depicts a flowchart of an exemplary method in accordance with aspects of the invention. The steps of the method may be performed in the environment of FIG. 2 and are described with reference to the elements and steps described with respect to FIGS. 2 and 3 .
- step 405 a merchant receives an order for an object.
- step 405 comprises the merchant system 60 receiving the order for the object 80 from the user device 75 via the network 55 .
- the merchant attaches an IoT device to the object.
- the IoT device 85 may be placed inside, or otherwise attached to, a cardboard box or an envelope that contains the object 80 being shipped.
- step 415 the merchant creates a new entry for the object in the secure database.
- step 415 comprises the merchant system 60 accessing the secure database 50 and creating a new entry for the object 80 .
- the new entry may contain: an identifier of the object 80 , an identifier of the IoT device 85 associated with the object 80 , and credentials defining one or more trusted entities that are authorized to set the tracking state of the object at one or more defined points in the delivery chain.
- the new entry may also set the tracking state of the object 80 to OFF.
- the merchant and/or one or more shipping entities ships the object.
- the physical acts involved in shipping the object 80 may be performed using conventional techniques including but not limited to: humans and/or automated systems moving the object 80 within various facilities; vehicles such as aircraft, trains, and/or automobiles moving the object 80 between various locations during legs of the shipping; and human or drone delivery of the object 80 in the last leg of the shipping (e.g., delivery to the delivery location).
- the tracking state of the object 80 as defined in the secure database 50 , may be set as OFF during shipping such that altitude-based tracking of the object 80 is not performed during shipping.
- one or more trusted entities may write data to the secure database 50 to selectively set the tracking state to ON or OFF at different locations throughout the shipping (e.g., to provide tracking while the object is sitting idle at a facility, to compare the altitude data of the IoT device to altitude data of a shipping vehicle, etc.).
- the tracking server 70 may perform altitude-based tracking during selected legs of the shipping, as described with respect to FIG. 3 .
- the shipping entity leaves the object unattended.
- the shipping entity delivers the object 80 to the delivery location and leaves the object 80 unattended at the delivery location.
- the shipping entity may leave the object 80 unattended on the front porch of the residence of the intended recipient.
- the shipping entity sets the tracking state of the object to ON.
- the shipping entity system 65 accesses the secure database 50 and sets the tracking state of the object 80 to ON, as described with respect to FIG. 2 .
- the tracking server tracks the altitude of the object.
- the tracking module 72 of the tracking server 70 continuously obtains altitude data from the IoT device 85 associated with the object 80 and compares the altitude data to one or more predefined criteria.
- Step 435 may also include the tracking server 70 periodically checking the secure database 50 to determine whether the tracking state is set to ON or OFF, as described with respect to FIG. 2 , and the tracking may be performed based on determining the tracking state is ON.
- the tracking server determines whether a change in the altitude of the object exceeds a predefined threshold value.
- the tracking module 72 analyzes the continuously obtained altitude data from the IoT device 85 and determines whether the altitude data changes by more than the predefined threshold value.
- the tracking server determines whether the recipient has indicated receipt of the object.
- the intended recipient of the object 80 may provide input to user device 75 indicating that they received the object 80 .
- the process returns to step 435 at which the tracking server 70 continues to track the altitude of the object.
- the system causes the tracking state to be set to OFF. For example, in response to receiving the recipient indication that the object has been received, the merchant system 60 or the shipping entity 65 updates the secure database 50 to set the tracking state to OFF.
- the tracking server 70 determines at step 440 that the altitude data exceeds the threshold amount, then at step 455 the tracking server 70 generates and sends an alert.
- the tracking server 70 stores data that defines contact information for at least one designated alert recipient, and step 455 comprises the tracking server 70 sending a message to the at least one designated alert recipient via the network 55 .
- the alert may include a designation of the object 80 and last known location of the object 80 .
- the alert can also include an altitude of the object as determined from the altitude data obtained from the IoT device 85 .
- Step 455 may comprise the tracking server 70 continuing to obtain altitude data from the IoT device 85 and periodically sending an updated alert that includes updated altitude data for the object 80 .
- the tracking server 70 tracks the object 80 using location data obtained from the IoT device 85 .
- the tracking server 70 may obtain GPS data from the IoT device 85 to determine a GPS location of the object after the alert has been triggered.
- the tracking module 72 may transmit the location data to the designated alert recipients and may continue to obtain one or both of altitude data and location data from the IoT device 85 and provide real time updates to the at least one designated alert recipient.
- the tracking server 70 may be configured to: access the secure database 50 that stores data about the object 80 ; determine, from the data about the object 80 , that a tracking state of the object 80 is set to ON; obtain, in response to the determining that the tracking state is set to ON, altitude data from the altitude sensor 90 of the IoT device 85 associated with the object 80 ; compare the altitude data to a predefined criteria; and repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object 80 is set to OFF.
- embodiments of the present invention provide technical solutions to the problem of anonymous theft of unattended property by drones, by providing a system that can selectively apply altitude-based tracking of an IoT device associated with the property.
- the system performs an unconventional ordered arrangement of steps that includes accessing a secure database (such as a blockchain) to determine whether altitude based tracking is set, and obtaining altitude data from an altitude sensor-equipped IoT device based on the determining.
- a secure database such as a blockchain
- a service provider could offer to perform the processes described herein.
- the service provider can create, maintain, deploy, support, etc., the computer infrastructure that performs the process steps of the invention for one or more customers. These customers may be, for example, any business that uses cloud computing technology.
- the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
- the invention provides a computer-implemented method, via a network.
- a computer infrastructure such as computer system/server 12 ( FIG. 1 )
- one or more systems for performing the processes of the invention can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer infrastructure.
- the deployment of a system can comprise one or more of: (1) installing program code on a computing device, such as computer system/server 12 (as shown in FIG. 1 ), from a computer-readable medium; (2) adding one or more computing devices to the computer infrastructure; and (3) incorporating and/or modifying one or more existing systems of the computer infrastructure to enable the computer infrastructure to perform the processes of the invention.
- the GPS data of the IoT device can be further combined with latitude and longitude geo-fencing techniques to provide more stringent tracking.
Landscapes
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Electromagnetism (AREA)
- Emergency Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- The present invention generally relates to securing property and, more particularly, to methods and systems for preventing anonymous theft of property by drones.
- Drones (also referred to as unmanned aerial vehicles or UAVs) have become increasingly available to the public. A drone provides a mechanism for a user to perform certain tasks remotely, i.e., without the user being physical present at the location of the task being performed. Concurrently with the rise of popularity and accessibility of drones, online shopping and associated package delivery to residences and places of business has gained immense popularity in recent times.
- In a first aspect of the invention, there is a computer implemented method that includes: accessing, by a tracking server, a secure database that stores data about an object of personal property; determining, by the tracking server and from the data about the object, that a tracking state of the object is set to ON; obtaining, by the tracking server and in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; comparing, by the tracking server, the altitude data to a predefined criteria; and repeating, by the tracking server, the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF.
- In another aspect of the invention, there is a computer program product that includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: access a secure database that stores data about an object of personal property; determine, from the data about the object, that a tracking state of the object is set to ON; obtain, in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; compare the altitude data to a predefined criteria; and repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF.
- In another aspect of the invention, there is a system that includes: a hardware processor, a computer readable memory, and a computer readable storage medium associated with a computing device; program instructions to access a secure database that stores data about an object of personal property; program instructions to determine, from the data about the object, that a tracking state of the object is set to ON; program instructions to obtain, in response to the determining, altitude data from an altitude sensor of an Internet of Things (IoT) device associated with the object; program instructions to compare the altitude data to a predefined criteria; and program instructions to repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of the object is set to OFF, wherein the program instructions are stored on the computer readable storage medium for execution by the hardware processor via the computer readable memory.
- The present invention is described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present invention.
-
FIG. 1 depicts a computer system in accordance with aspects of the invention. -
FIG. 2 depicts a block diagram of an illustrative environment in accordance with aspects of the invention. -
FIG. 3 depicts an exemplary delivery scenario in accordance with aspects of the invention. -
FIG. 4 depicts a flowchart of an exemplary method in accordance with aspects of the invention. - The present invention generally relates to securing property and, more particularly, to methods and systems for preventing anonymous theft of property by drones. Unattended delivery of packages can leave goods exposed to theft and other malicious behaviors once the package/payload is delivered. The confluence of the increase in drone use and the increase in online shopping provides a situation in which a drone may be used with nefarious intent to anonymously take a package that is left on a doorstep after delivery. Aspects of the invention are directed to systems and methods that leverage a secure database that is configured to selectively enable and disable altitude-based tracking of objects such as delivered packages.
- In embodiments, an object to be tracked is provided with an IoT (Internet of Things) device that is configured to detect altitude data of the object to which it is attached. One or more trusted entities (such as a merchant or shipping entity) may update the secure database to add data defining a current tracking state for the object (e.g., track or do not track). In embodiments, when the object is delivered and left unattended, a trusted entity updates the secure database to set the tracking state of the object. Based on the state being set for tracking, a server continuously tracks altitude data received from the IoT device associated with the object and generates an alert when the altitude data satisfies a preset criteria, such as a change in altitude exceeding a threshold value as would be expected when the object is lifted away by a drone. In accordance with aspects of the invention, an intended recipient of the object may provide input to one of the trusted entities (e.g., the merchant or shipping entity) indicating that the object has been received, at which point the trusted entity updates the state of the object in the secure database to turn off the tracking. Implementations of the invention thus provide for altitude-based tracking of an unattended object for a time period between a time of delivery of the object and a time of indicated acceptance of the object. In this manner, implementations of the invention provide systems and methods for preventing anonymous theft of objects by drones.
- In embodiments, the secure database is a blockchain. In a preferred embodiment, the secure database is a blockchain that can only be modified by a trusted entity (e.g., the merchant, the shipping entity, etc.). In this implementation, the server reads data from the blockchain to determine the state of an object for the purpose of determining whether to track the object. Also in this implementation, the recipient of the package indicates acceptance of the object to one of the trusted entities through a website or mobile application and, based on this indication from the recipient, the trusted entity updates the blockchain to change the state of the object to turn off the tracking.
- Implementations of the invention are useful for tracking delivered objects, i.e., after the shipping process is complete. However, aspects of the invention may also be used to selectively track an object during shipping, i.e., while the object is under the control of a merchant and/or one or more shipping entities. Aspects of the invention may also be used with non-delivered objects, such as personal property that is kept outside a residence or place of business.
- The present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
- The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
- Referring now to
FIG. 1 , a schematic of an example of a computing infrastructure is shown.Computing infrastructure 10 is only one example of a suitable computing infrastructure and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless,computing infrastructure 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove. - In
computing infrastructure 10 there is a computer system (or server) 12, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use withcomputer system 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like. -
Computer system 12 may be described in the general context of computer system executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types.Computer system 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices. - As shown in
FIG. 1 ,computer system 12 incomputing infrastructure 10 is shown in the form of a general-purpose computing device. The components ofcomputer system 12 may include, but are not limited to, one or more processors or processing units (e.g., CPU) 16, asystem memory 28, and abus 18 that couples various system components includingsystem memory 28 toprocessor 16. -
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus. -
Computer system 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible bycomputer system 12, and it includes both volatile and non-volatile media, removable and non-removable media. -
System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/orcache memory 32.Computer system 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only,storage system 34 can be provided for reading from and writing to a nonremovable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected tobus 18 by one or more data media interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention. - Program/
utility 40, having a set (at least one) ofprogram modules 42, may be stored inmemory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment.Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein. -
Computer system 12 may also communicate with one or moreexternal devices 14 such as a keyboard, a pointing device, adisplay 24, etc.; one or more devices that enable a user to interact withcomputer system 12; and/or any devices (e.g., network card, modem, etc.) that enablecomputer system 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22. Still yet,computer system 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) vianetwork adapter 20. As depicted,network adapter 20 communicates with the other components ofcomputer system 12 viabus 18. It should be understood that although not shown, other hardware and/or software components could be used in conjunction withcomputer system 12. Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc. -
FIG. 2 depicts a block diagram of an illustrative environment in accordance with aspects of the invention. The environment includes asecure database 50 that stores data defining the state of objects being tracked by the system. In embodiments, thesecure database 50 comprises a blockchain, e.g., a distributed blockchain database. For example, thesecure database 50 may comprise data storage on plural computer devices connected in a distributed network environment that function as a distributed ledger of the data. Implementations of the invention are not limited to a blockchain, however, and thesecure database 50 may comprise, for example, a single computer device that stores and manages data in the manner described herein. - As illustrated in
FIG. 2 , thesecure database 50 is connected to acommunication network 55 that may comprise one or more computer networks (such as a LAN, WAN, or the Internet) and/or one or more telecommunications networks (such as a cellular network). In embodiments, amerchant system 60, ashipping entity system 65, a trackingserver 70, and a user device 75 are also connected to thenetwork 55. Each of themerchant system 60, theshipping entity system 65, the trackingserver 70, and the user device 75 may comprise one or more computer devices such ascomputer system 12 ofFIG. 1 . - In embodiments, the
merchant system 60 is configured to receive an online shopping order from the user device 75, e.g., via a website or mobile application. In response to receiving the order from the user device 75, themerchant system 60 may be configured to initiate shipping anobject 80 defined in the order to a delivery location defined in the order (e.g., a delivery address such as a residence or place of business). Theobject 80 may comprise personal property such as consumer goods. Themerchant system 60 and theshipping entity system 65 may communicate with one another via thenetwork 55 to coordinate shipping theobject 80 to the delivery location. The user device 75 may be used to provide input indicating receipt of theobject 80 by the intended recipient, the input being provided for example via a website or mobile application of themerchant system 60 or theshipping entity system 65. - According to aspects of the invention, an
IoT device 85 is attached to theobject 80 while theobject 80 is shipped to the delivery location. For example, theIoT device 85 may be placed inside, or otherwise attached to, a cardboard box or an envelope that contains theobject 80 being shipped. Other methods of attaching may also be used. - In embodiments, the
IoT device 85 comprises acomputer processor 86, acomputer memory 87, apower source 88, acommunication system 89, and analtitude sensor 90. TheIoT device 85 may comprise other components, such as aGPS sensor 91. Thepower source 88 provides electrical power to the components of theIoT device 85. Thecomputer memory 87 stores program code that is run by thecomputer processor 86 to perform functions described herein. Thecomputer memory 87 may also store data defining a unique identifier of theIoT device 85 relative to other IoT devices associated with other objects in the environment. Thecommunication system 89 comprises at least one antenna that provides for wireless communication via thenetwork 55. Thecommunication system 89 may be configured to employ one or more wireless communication protocols including but not limited to Bluetooth, WiFi, and cellular. Thealtitude sensor 90 is a sensor that is configured to detect altitude data associated with theIoT device 85. Thealtitude sensor 90 may comprise, for example, a digital barometric pressure sensor that detects changes in barometric pressure that can be converted to changes in altitude. - In accordance with aspects of the invention, one or more trusted entities are permitted to write data to the
secure database 50, via thenetwork 55, to define a state of theobject 80. In embodiments, the trusted entities include themerchant system 60 and theshipping entity system 65, although other entities may be defined as trusted entities based on the intended use of the system. In a preferred embodiment, themerchant system 60 creates a new entry for theobject 80 in the database upon receipt of the order from the user device 75, and the new entry defines the one or more trusted entities that are permitted to write data to thesecure database 50 regarding thisobject 80. As an example of a new entry for anobject 80, themerchant system 60 may enter an identifier of theobject 80, an identifier of theIoT device 85 associated with the object 80 (e.g., matching the unique identifier stored in thecomputer memory 87 of the IoT device 85), and credentials defining one or more trusted entities that are authorized to write to an entry of thesecure database 50 associated with this particular object 80 (e.g., to set the tracking state of the object at one or more defined points in the delivery chain). - In implementations, after the
merchant system 60 creates the entry for theobject 80 in thesecure database 50, the one or more trusted entities identified in the initial entry may write new data to the entry associated with theobject 80. The data may include: a current location of theobject 80, a tracking state of the object, and a timestamp. The current location of the object may be obtained from conventional inventory and shipping management systems that are utilized by the merchant (associated with the merchant system 60) and/or the shipping entity (associated with the shipping entity system 65). In embodiments, the tracking state of the object is a data field that can be set by the trusted entity to one of: a first state to turn ON altitude-based tracking of theobject 80, and a second state to turn OFF altitude-based tracking of theobject 80. The timestamp may be used to arrange plural data entries associated with asingle object 80, such that a latest (e.g., most recent) data entry for theobject 80 may be identified. - In embodiments, when the
object 80 is delivered to the delivery address and left unattended, a trusted entity (e.g., themerchant system 60 or the shipping entity system 65) updates thesecure database 50 to set the tracking state of theobject 80 to ON. Based on the tracking state being set to ON in thesecure database 50, the trackingserver 70 continuously tracks altitude data received from theIoT device 85 associated with theobject 80 and generates an alert when the altitude data satisfies a preset criteria, such as a change in altitude exceeding a threshold value as would be expected when the object is lifted away by a drone. In accordance with aspects of the invention, the intended recipient of the object may provide input to one of the trusted entities (e.g., via the user device 75 communicating with themerchant system 60 or the shipping entity system 65) indicating that theobject 80 has been received, at which point the trusted entity updates the state of the object in thesecure database 50 to turn off the tracking. - Still referring to
FIG. 2 , in accordance with aspects of the invention, the trackingserver 70 accesses thesecure database 50, via thenetwork 55, to determine the tracking state of theobject 80. The trackingserver 70 may comprise atracking module 72, which may be one ormore program modules 42 as described with respect toFIG. 1 and that is configured to perform one or more of the functions described herein. In embodiments, thetracking module 72 periodically reads the latest data entry in thesecure database 50 associated with theobject 80 to determine the current tracking state of theobject 80 as defined in thesecure database 50. One the one hand, when thetracking module 72 determines the tracking state for theobject 80 is OFF, thetracking module 72 takes no action regarding tracking the altitude of theobject 80 and waits a predefined amount of time until again reading the latest data entry in thesecure database 50 associated with theobject 80 to determine the current tracking state of theobject 80. On the other hand, when thetracking module 72 determines the tracking state for theobject 80 is ON, thetracking module 72 continuously obtains altitude data from theIoT device 85 associated with theobject 80 and compares the altitude data to one or more predefined criteria. - In embodiments, the
tracking module 72 obtains the altitude data from theIoT device 85 via communication through thenetwork 55. For example, thetracking module 72 may pull the altitude data from theIoT device 85 at repeated time intervals that are sufficiently small as to be considered continuous. In another example, theIoT device 85 may be configured to continuously push its altitude data to the trackingserver 70, and thetracking module 72 may disregard the pushed altitude data when the tracking state for theobject 80 is OFF and utilize the pushed altitude data when the tracking state for theobject 80 is ON. - In aspects, the one or more predefined criteria comprise a threshold value representing a change in altitude. In this manner, the
tracking module 72 continuously analyzes values of the altitude data from theIoT device 85, and determines whether the altitude data changes by more than the threshold value. In the event thetracking module 72 determines the altitude data does not change by more than the threshold value, thetracking module 72 continues the tracking without generating an alert. In the event thetracking module 72 determines the altitude data does change by more than the threshold value, thetracking module 72 generates an alert. The threshold value may be initially set to a default value, and may be adjusted as a configuration setting in the system. For example, the trackingserver 70 may receive input defining the threshold value from one or more of themerchant system 60, theshipping entity system 65, and the user device 75, and the trackingserver 70 may store and subsequently utilize a new threshold value based on the input. - According to aspects of the invention, the
tracking module 72 sends the generated alert to at least one designated alert recipient, which may include at least one of: one of the trusted entities (e.g., themerchant system 60 or the shipping entity system 65), the user device 75 of the intended recipient of the object, law enforcement, and other designated people. The alert may be a message (e.g., text message, email, smartphone notification, etc.) that is communicated by the trackingserver 70 via thenetwork 55. The alert may include a designation of theobject 80 and last known location of theobject 80, which may be determined by the trackingserver 70 from accessing data stored in thesecure database 50. The alert can also include an altitude of the object as determined from the altitude data obtained from theIoT device 85. In embodiments, the trackingserver 70 may continue to obtain altitude data from theIoT device 85 and periodically send (to the at least one designated alert recipient) an updated alert that includes updated altitude data for theobject 80. In this manner, the trackingserver 70 may provide real-time updates of the altitude of the object after the alert is initially generated. - In embodiments, the designated alert recipient(s) may be defined as a configuration option in the system by storing data defining their contact information. For example, the tracking
server 70 may receive input defining the designated alert recipient(s) from one or more of themerchant system 60, theshipping entity system 65, and the user device 75, and the trackingserver 70 may store and subsequently utilize the designated alert recipient(s) when an alert is generated and sent. For example, an intended recipient of theobject 80 may designate their neighbor as a designated alert recipient so that the neighbor can visually look at the intended recipient's delivery location (e.g., front porch) when an alert is received. - In embodiments, the
IoT device 85 includes a sensor configured to determine a location of the object, such as aGPS sensor 91. In this manner, when thetracking module 72 generates the alert in response to the altitude data satisfying the preset criteria, theIoT device 85 may transmit location data to thetracking module 72 so that theobject 80 can be tracked using the location data. Thetracking module 72 may transmit the location data to the designated alert recipients. In this manner, GPS-based tracking of theobject 80 may be initiated based on the altitude-based tracking triggering the alert. - In embodiments, the tracking
server 70 may continue to obtain altitude data and GPS data from theIoT device 85 and periodically send (to the at least one designated alert recipient) an updated alert that includes the updated altitude data and GPS data for theobject 80. In this manner, the trackingserver 70 may provide real-time updates of the altitude and GPS location of theobject 80 after the alert is initially generated. -
FIG. 3 depicts an exemplary shipping scenario of theobject 80 from a merchant to the delivery location. In the exemplary shipping scenario, theobject 80 is initially atmerchant facility 150. Upon receiving the order from the user device 75, theobject 80 is packaged with theIoT device 85 and moved (e.g., by ground transportation) from themerchant facility 150 to a firstshipping entity facility 151. Theobject 80 packaged with theIoT device 85 is then moved (e.g., by air transportation) from the firstshipping entity facility 151 to a secondshipping entity facility 152. Theobject 80 packaged with theIoT device 85 is then moved (e.g., by ground transportation or drone delivery) from the secondshipping entity facility 152 to thedelivery location 153 and left unattended at thedelivery location 153. In accordance with aspects of the invention described thus far, themerchant system 60 or theshipping entity system 65 updates thesecure database 50 to set the tracking state to ON when theobject 80 is left unattended at thedelivery location 153. As described herein, the trackingserver 70 then continuously tracks the altitude data of theIoT device 85 packaged with theobject 80 and generates an alert if the altitude data changes by more than a predefined amount. In the event the intended recipient of theobject 80 indicates receipt of the object 80 (e.g., via the user device 75), then themerchant system 60 or theshipping entity system 65 updates thesecure database 50 to set the tracking state to OFF, and the trackingserver 70 stops tracking the altitude data of theIoT device 85 packaged with theobject 80. - Implementations of the invention are useful for tracking delivered objects, i.e., after the shipping process is complete. However, aspects of the invention may also be used to selectively turn the tracking state of the
object 80 on and off during shipping, i.e., while theobject 80 is under the control of the merchant and/or one or more shipping entities. In an exemplary use case, theshipping entity system 65 may update thesecure database 50 to set the tracking state to ON when theobject 80 is expected to sit idle, e.g., at a warehouse or intermediate facility. For example, theshipping entity system 65 may update thesecure database 50 to turn on tracking at a first time when theobject 80 is expected to sit idle, e.g., atfacility 151. Theshipping entity system 65 may subsequently update thesecure database 50 to turn off tracking at a second time when theobject 80 is in transit, e.g., carried by an airplane fromfacility 151 tofacility 152. Theshipping entity system 65 may subsequently update thesecure database 50 to turn on tracking again when theobject 80 is delivered to an unattended location defined by the intended recipient, e.g., atdelivery location 153. In this manner, aspects of the invention may be used to track objects both during shipment (i.e., prior to delivery) and after delivery. - In another exemplary use case, the
shipping entity system 65 may update thesecure database 50 to turn on tracking of theobject 80 when theobject 80 is carried by anairborne shipping vehicle 95 comprising analtimeter 97. In this use case, thetracking module 72 may compare altitude data of the airborne shipping vehicle 95 (obtained from altimeter 97) to the altitude data of the IoT device 85 (obtained from altitude sensor 90), and thetracking module 72 may generate an alert when the altitude data of theairborne shipping vehicle 95 and the altitude data of theIoT device 85 deviate from one another by more than a predefined amount. In this manner, aspects of the invention may be used to track theobject 80 based on comparing a detected altitude to an expected altitude. - For example, in the event the
object 80 is scheduled to be shipped in an airplane flying fromfacility 151 tofacility 152, and the altitude of theIoT device 85 of theobject 80 does not match the altitude of the airplane (within a predefined tolerance), this determination can be used to infer that theobject 80 is not in the airplane and thus is misplaced. In another example, in the event theobject 80 is scheduled to be carried by a delivery drone for scheduled delivery (e.g., fromfacility 152 to delivery location 153), and the altitude of theIoT device 85 of theobject 80 unexpectedly experiences a large delta compared to the altitude of the delivery drone, this determination can be used to infer that the object unintentionally disengaged from the delivery drone (e.g., was unintentionally dropped by the delivery drone). In this manner, aspects of the invention may be used to track theobject 80 during shipment and prior to delivery, and are not limited to tracking the object after the object has been delivered and left unattended. - Implementations of the invention are useful for tracking delivered objects. However, aspects of the invention may also be used with other objects, such as personal property that is kept outside a residence or place of business. As but one example, a user may wish to attach an
IoT device 85 as described herein to their cooking grill that is kept in their yard. In this implementation, the trusted entity may comprise a service provider that accesses thesecure database 50 on behalf of the user, e.g., as part of a subscription. The user may communicate with the service provider through a website and/or mobile application to instruct the service provider to selectively turn on and off the altitude based tracking for an identifiedIoT device 85. In this manner, the user may attach theIoT device 85 to their grill that is stored outside, instruct the service provider to turn on tracking of theIoT device 85, and receive an alert from the service provider in the event that the service provider detects that the altitude of theIoT device 85 changes by more than a predefined threshold amount. - In embodiments, the
merchant system 60, theshipping entity system 65, and the trackingserver 70 are each controlled by separate entities. In another embodiment, themerchant system 60 and theshipping entity system 65 may be combined into a single system in situations where a single entity performs the functions of both. In another embodiment, themerchant system 60 and the trackingserver 70 may be controlled by a same entity. -
FIG. 4 depicts a flowchart of an exemplary method in accordance with aspects of the invention. The steps of the method may be performed in the environment ofFIG. 2 and are described with reference to the elements and steps described with respect toFIGS. 2 and 3 . - At
step 405, a merchant receives an order for an object. In embodiments, as described with respect toFIG. 2 ,step 405 comprises themerchant system 60 receiving the order for theobject 80 from the user device 75 via thenetwork 55. - At
step 410, the merchant attaches an IoT device to the object. In embodiments, as described with respect toFIG. 2 , theIoT device 85 may be placed inside, or otherwise attached to, a cardboard box or an envelope that contains theobject 80 being shipped. - At
step 415, the merchant creates a new entry for the object in the secure database. In embodiments, as described with respect toFIG. 2 ,step 415 comprises themerchant system 60 accessing thesecure database 50 and creating a new entry for theobject 80. The new entry may contain: an identifier of theobject 80, an identifier of theIoT device 85 associated with theobject 80, and credentials defining one or more trusted entities that are authorized to set the tracking state of the object at one or more defined points in the delivery chain. The new entry may also set the tracking state of theobject 80 to OFF. - At
step 420, the merchant and/or one or more shipping entities ships the object. The physical acts involved in shipping theobject 80 may be performed using conventional techniques including but not limited to: humans and/or automated systems moving theobject 80 within various facilities; vehicles such as aircraft, trains, and/or automobiles moving theobject 80 between various locations during legs of the shipping; and human or drone delivery of theobject 80 in the last leg of the shipping (e.g., delivery to the delivery location). In embodiments, as described with respect toFIGS. 2 and 3 , the tracking state of theobject 80, as defined in thesecure database 50, may be set as OFF during shipping such that altitude-based tracking of theobject 80 is not performed during shipping. Alternatively, one or more trusted entities may write data to thesecure database 50 to selectively set the tracking state to ON or OFF at different locations throughout the shipping (e.g., to provide tracking while the object is sitting idle at a facility, to compare the altitude data of the IoT device to altitude data of a shipping vehicle, etc.). In this manner, the trackingserver 70 may perform altitude-based tracking during selected legs of the shipping, as described with respect toFIG. 3 . - At
step 425, the shipping entity leaves the object unattended. In embodiments, as described with respect toFIG. 2 , the shipping entity delivers theobject 80 to the delivery location and leaves theobject 80 unattended at the delivery location. For example, the shipping entity may leave theobject 80 unattended on the front porch of the residence of the intended recipient. - At
step 430, the shipping entity sets the tracking state of the object to ON. In embodiments, based on leaving the object unattended, theshipping entity system 65 accesses thesecure database 50 and sets the tracking state of theobject 80 to ON, as described with respect toFIG. 2 . - At
step 435, the tracking server tracks the altitude of the object. In embodiments, as described with respect toFIG. 2 , thetracking module 72 of the trackingserver 70 continuously obtains altitude data from theIoT device 85 associated with theobject 80 and compares the altitude data to one or more predefined criteria. Step 435 may also include the trackingserver 70 periodically checking thesecure database 50 to determine whether the tracking state is set to ON or OFF, as described with respect toFIG. 2 , and the tracking may be performed based on determining the tracking state is ON. - At
step 440, the tracking server determines whether a change in the altitude of the object exceeds a predefined threshold value. In embodiments, as described with respect toFIG. 2 , thetracking module 72 analyzes the continuously obtained altitude data from theIoT device 85 and determines whether the altitude data changes by more than the predefined threshold value. - In the event the altitude data does not change by more than the predefined threshold value, then at
step 445 the tracking server determines whether the recipient has indicated receipt of the object. In embodiments, as described with respect toFIG. 2 , the intended recipient of theobject 80 may provide input to user device 75 indicating that they received theobject 80. In the event that the recipient has not indicated receipt of the object, then the process returns to step 435 at which the trackingserver 70 continues to track the altitude of the object. In the event that the recipient has indicated receipt of the object, then atstep 450 the system causes the tracking state to be set to OFF. For example, in response to receiving the recipient indication that the object has been received, themerchant system 60 or theshipping entity 65 updates thesecure database 50 to set the tracking state to OFF. - Alternatively, when the tracking
server 70 determines atstep 440 that the altitude data exceeds the threshold amount, then atstep 455 the trackingserver 70 generates and sends an alert. In embodiments, as described with respect toFIG. 2 , the trackingserver 70 stores data that defines contact information for at least one designated alert recipient, and step 455 comprises the trackingserver 70 sending a message to the at least one designated alert recipient via thenetwork 55. The alert may include a designation of theobject 80 and last known location of theobject 80. The alert can also include an altitude of the object as determined from the altitude data obtained from theIoT device 85. Step 455 may comprise the trackingserver 70 continuing to obtain altitude data from theIoT device 85 and periodically sending an updated alert that includes updated altitude data for theobject 80. - Optionally, at
step 460 the trackingserver 70 tracks theobject 80 using location data obtained from theIoT device 85. In embodiments, as described with respect toFIG. 2 , the trackingserver 70 may obtain GPS data from theIoT device 85 to determine a GPS location of the object after the alert has been triggered. Thetracking module 72 may transmit the location data to the designated alert recipients and may continue to obtain one or both of altitude data and location data from theIoT device 85 and provide real time updates to the at least one designated alert recipient. - From the description of the exemplary environment depicted in
FIG. 2 and the exemplary method depicted inFIG. 4 , it will be apparent that the trackingserver 70 may be configured to: access thesecure database 50 that stores data about theobject 80; determine, from the data about theobject 80, that a tracking state of theobject 80 is set to ON; obtain, in response to the determining that the tracking state is set to ON, altitude data from thealtitude sensor 90 of theIoT device 85 associated with theobject 80; compare the altitude data to a predefined criteria; and repeat the obtaining and the comparing until one of: the altitude data satisfies the predefined criteria, or the tracking state of theobject 80 is set to OFF. - Advantageously, embodiments of the present invention provide technical solutions to the problem of anonymous theft of unattended property by drones, by providing a system that can selectively apply altitude-based tracking of an IoT device associated with the property. In implementations, the system performs an unconventional ordered arrangement of steps that includes accessing a secure database (such as a blockchain) to determine whether altitude based tracking is set, and obtaining altitude data from an altitude sensor-equipped IoT device based on the determining.
- In embodiments, a service provider could offer to perform the processes described herein. In this case, the service provider can create, maintain, deploy, support, etc., the computer infrastructure that performs the process steps of the invention for one or more customers. These customers may be, for example, any business that uses cloud computing technology. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
- In still additional embodiments, the invention provides a computer-implemented method, via a network. In this case, a computer infrastructure, such as computer system/server 12 (
FIG. 1 ), can be provided and one or more systems for performing the processes of the invention can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer infrastructure. To this extent, the deployment of a system can comprise one or more of: (1) installing program code on a computing device, such as computer system/server 12 (as shown inFIG. 1 ), from a computer-readable medium; (2) adding one or more computing devices to the computer infrastructure; and (3) incorporating and/or modifying one or more existing systems of the computer infrastructure to enable the computer infrastructure to perform the processes of the invention. - In additional embodiments, the GPS data of the IoT device can be further combined with latitude and longitude geo-fencing techniques to provide more stringent tracking.
- The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Claims (11)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/960,933 US10475306B1 (en) | 2018-04-24 | 2018-04-24 | Preventing anonymous theft by drones |
US16/546,669 US10672241B2 (en) | 2018-04-24 | 2019-08-21 | Preventing anonymous theft by drones |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/960,933 US10475306B1 (en) | 2018-04-24 | 2018-04-24 | Preventing anonymous theft by drones |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/546,669 Continuation US10672241B2 (en) | 2018-04-24 | 2019-08-21 | Preventing anonymous theft by drones |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190325719A1 true US20190325719A1 (en) | 2019-10-24 |
US10475306B1 US10475306B1 (en) | 2019-11-12 |
Family
ID=68237008
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/960,933 Expired - Fee Related US10475306B1 (en) | 2018-04-24 | 2018-04-24 | Preventing anonymous theft by drones |
US16/546,669 Active US10672241B2 (en) | 2018-04-24 | 2019-08-21 | Preventing anonymous theft by drones |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/546,669 Active US10672241B2 (en) | 2018-04-24 | 2019-08-21 | Preventing anonymous theft by drones |
Country Status (1)
Country | Link |
---|---|
US (2) | US10475306B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11713116B1 (en) * | 2020-03-02 | 2023-08-01 | Walgreen Co. | Reusable container with locking features and tracking capabilities for autonomous delivery of goods |
US20230326312A1 (en) * | 2022-04-07 | 2023-10-12 | Qualcomm Incorporated | Remote activation or deactivation of a device for theft deterrence |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2586125B (en) * | 2019-08-01 | 2023-01-25 | Animal Dynamics Ltd | A flight control system |
Family Cites Families (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4190828A (en) | 1978-06-19 | 1980-02-26 | Wolf Daniel H | Movement sensitive anti-theft alarm |
US5317304A (en) | 1991-01-17 | 1994-05-31 | Sonicpro International, Inc. | Programmable microprocessor based motion-sensitive alarm |
US5519618A (en) * | 1993-08-02 | 1996-05-21 | Massachusetts Institute Of Technology | Airport surface safety logic |
US5374932A (en) * | 1993-08-02 | 1994-12-20 | Massachusetts Institute Of Technology | Airport surface surveillance system |
US5434559A (en) | 1994-07-11 | 1995-07-18 | Smiley; Al W. | Anti-theft alarm and method for protecting movable articles |
US5963131A (en) | 1998-06-19 | 1999-10-05 | Lexent Technologies, Inc. | Anti-theft device with alarm screening |
US6356196B1 (en) | 2000-09-29 | 2002-03-12 | Jaesent Inc. | Verified receipt, notification, and theft deterrence of courier-delivered parcels |
US7218226B2 (en) | 2004-03-01 | 2007-05-15 | Apple Inc. | Acceleration-based theft detection system for portable electronic devices |
US9799185B2 (en) * | 2012-04-13 | 2017-10-24 | Gordon Jessop | Method, device, and computer program for mobile asset tracking |
US11066186B2 (en) * | 2014-01-02 | 2021-07-20 | Valqari Holdings, Llc | Receiving appliance for automated deliveries |
US9643722B1 (en) * | 2014-02-28 | 2017-05-09 | Lucas J. Myslinski | Drone device security system |
US9646283B2 (en) | 2014-05-20 | 2017-05-09 | Verizon Patent And Licensing Inc. | Secure payload deliveries via unmanned aerial vehicles |
US10163177B2 (en) | 2014-07-31 | 2018-12-25 | Emmett Farris | System and method for controlling drone delivery or pick up during a delivery or pick up phase of drone operation |
FR3025114A1 (en) * | 2014-08-26 | 2016-03-04 | Parrot | DYNAMIC START CONTROL METHOD LAUNCHING ROTARY SAIL DRONE |
US9359074B2 (en) * | 2014-09-08 | 2016-06-07 | Qualcomm Incorporated | Methods, systems and devices for delivery drone security |
US10093432B2 (en) * | 2014-10-09 | 2018-10-09 | James McKinnon | Drone receiving systems and methods |
US10417883B2 (en) | 2014-12-18 | 2019-09-17 | Vivint, Inc. | Doorbell camera package detection |
US10286330B2 (en) * | 2015-02-27 | 2019-05-14 | Joseph S. Yatsko | Apparatus and method for arial game playing |
US10696414B2 (en) * | 2015-04-21 | 2020-06-30 | Gopro, Inc. | Aerial capture platform |
CN107531322B (en) * | 2015-04-21 | 2021-02-05 | 高途乐公司 | Aerial capture platform |
US20160327389A1 (en) * | 2015-05-06 | 2016-11-10 | Gopro, Inc. | Calibration Transfer Between Two Devices |
US9786141B2 (en) * | 2015-05-20 | 2017-10-10 | Package Guard, Inc | Package delivery notification and protection device, system and method |
US10582259B2 (en) * | 2015-06-30 | 2020-03-03 | Gopro, Inc. | Pipelined video interface for remote controlled aerial vehicle with camera |
CA2898304C (en) * | 2015-07-23 | 2020-01-07 | Simon Tremblay | Multifunctional motorized box and landing pad for automatic drone package delivery |
KR20170023423A (en) * | 2015-08-23 | 2017-03-06 | 박정철 | Drone Delivery System |
US20170091710A1 (en) | 2015-09-28 | 2017-03-30 | Jesse Van Dyke | Unattended Delivery Drop Box |
US10618655B2 (en) * | 2015-10-14 | 2020-04-14 | Flirtey Holdings, Inc. | Package delivery mechanism in an unmanned aerial vehicle |
US20170249581A1 (en) | 2016-02-29 | 2017-08-31 | Buurb | System, method and process for delivery of a package using a trusted alternate recipient network |
US10417603B2 (en) * | 2016-03-09 | 2019-09-17 | At&T Mobility Ii Llc | Secure package delivery |
KR20170115350A (en) * | 2016-04-07 | 2017-10-17 | 삼성전자주식회사 | Electronic apparatus and operating method thereof |
US10643406B2 (en) * | 2016-04-20 | 2020-05-05 | Gopro, Inc. | Data logging in aerial platform |
US10191485B2 (en) * | 2016-04-24 | 2019-01-29 | Flytrex Aviation Ltd. | Apparatus and method for centralized control of vehicles |
KR20170136750A (en) * | 2016-06-02 | 2017-12-12 | 삼성전자주식회사 | Electronic apparatus and operating method thereof |
US10079898B2 (en) * | 2016-06-20 | 2018-09-18 | General Electric Company | Software-defined sensors |
US11169516B2 (en) * | 2016-09-16 | 2021-11-09 | Gopro, Inc. | Adaptive rate gain controller |
KR102622032B1 (en) * | 2016-10-21 | 2024-01-10 | 삼성전자주식회사 | Unmanned flying vehicle and flying control method thereof |
US10175042B2 (en) * | 2016-10-22 | 2019-01-08 | Gopro, Inc. | Adaptive compass calibration based on local field conditions |
KR101765235B1 (en) * | 2016-11-28 | 2017-08-04 | 한국건설기술연구원 | FACILITY MAINTENANCE SYSTEM USING INTERNET OF THINGS (IoT) BASED SENSOR AND UNMANNED AIR VEHICLE (UAV), AND METHOD FOR THE SAME |
US10198841B2 (en) * | 2016-11-30 | 2019-02-05 | Gopro, Inc. | Map view |
KR20180064253A (en) * | 2016-12-05 | 2018-06-14 | 삼성전자주식회사 | Flight controlling method and electronic device supporting the same |
KR102624054B1 (en) * | 2016-12-20 | 2024-01-12 | 삼성전자주식회사 | Unmanned aerial vehicle |
KR20180075191A (en) * | 2016-12-26 | 2018-07-04 | 삼성전자주식회사 | Method and electronic device for controlling unmanned aerial vehicle |
KR20180080892A (en) * | 2017-01-05 | 2018-07-13 | 삼성전자주식회사 | Electronic device and controlling method thereof |
KR20180107642A (en) * | 2017-03-22 | 2018-10-02 | 삼성전자주식회사 | Method for determining movement location based on movement of external object and electronic device for the same |
US11186365B2 (en) * | 2017-05-01 | 2021-11-30 | Bentel Security S.R.L. | Flying service equipment |
US11496884B2 (en) * | 2017-05-03 | 2022-11-08 | Qualcomm Incorporated | Exchanging a message including drone-coupled capability information between a drone-coupled user equipment and a component of a terrestrial wireless communication subscriber network |
US10028606B1 (en) * | 2017-05-04 | 2018-07-24 | John K. Ritchie | Protected unmanned vehicle delivery receptacle |
US10775792B2 (en) * | 2017-06-13 | 2020-09-15 | United Parcel Service Of America, Inc. | Autonomously delivering items to corresponding delivery locations proximate a delivery route |
-
2018
- 2018-04-24 US US15/960,933 patent/US10475306B1/en not_active Expired - Fee Related
-
2019
- 2019-08-21 US US16/546,669 patent/US10672241B2/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11713116B1 (en) * | 2020-03-02 | 2023-08-01 | Walgreen Co. | Reusable container with locking features and tracking capabilities for autonomous delivery of goods |
US20230326312A1 (en) * | 2022-04-07 | 2023-10-12 | Qualcomm Incorporated | Remote activation or deactivation of a device for theft deterrence |
WO2023196699A1 (en) * | 2022-04-07 | 2023-10-12 | Qualcomm Incorporated | Remote activation or deactivation of a device for theft deterrence |
Also Published As
Publication number | Publication date |
---|---|
US10475306B1 (en) | 2019-11-12 |
US20190378386A1 (en) | 2019-12-12 |
US10672241B2 (en) | 2020-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10822083B2 (en) | Alert system for an unmanned aerial vehicle | |
US11037092B2 (en) | Actively managed food delivery | |
US10672241B2 (en) | Preventing anonymous theft by drones | |
US10547454B2 (en) | Managing in-flight transfer of parcels using blockchain authentication | |
US10460280B2 (en) | Methods and systems for multiple drone delivery system | |
US11322031B2 (en) | Method of optimized path planning for UAVs for the purpose of ground coverage | |
US10043398B2 (en) | Drone coordination | |
US9469476B1 (en) | Smart mat for package deliveries | |
JP2019530038A (en) | Delivery confirmation using duplicate geofence | |
US11232394B1 (en) | Just-in-time package routing and delivery | |
US10935291B2 (en) | Internal climate control system | |
US20190147401A1 (en) | System and method for automated package delivery to dynamic locations | |
US9820097B1 (en) | Geofence location detection | |
US20190342322A1 (en) | Providing secure sensor data to automated machines | |
US20130218922A1 (en) | Locating previously communicated electronic messages | |
US10046858B2 (en) | Delivery of payloads using aircraft | |
US9830465B2 (en) | Stateful data geofencing | |
US20170255902A1 (en) | Vehicle identification and interception | |
US20220398929A1 (en) | Systems, methods, and apparatus for collaborative aircraft checklists | |
Kay | EMC considerations for unmanned aerial vehicles | |
Tu et al. | Security and privacy risks in drone-based last mile delivery | |
US20170053232A1 (en) | System for automatic signature for receipt verification | |
US20240056477A1 (en) | Methods and systems for detecting malicious messages | |
US11790761B1 (en) | Geofencing with satellite systems | |
Davey et al. | Factual Description of Accident and Available Information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENDER, MICHAEL;FOX, JEREMY R.;PALMER, TODD R.;AND OTHERS;SIGNING DATES FROM 20180420 TO 20180423;REEL/FRAME:045624/0568 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20231112 |