WO2015174829A1 - Storage container, computer system and method for delivering and returning a tangible item - Google Patents

Storage container, computer system and method for delivering and returning a tangible item Download PDF

Info

Publication number
WO2015174829A1
WO2015174829A1 PCT/NL2015/050293 NL2015050293W WO2015174829A1 WO 2015174829 A1 WO2015174829 A1 WO 2015174829A1 NL 2015050293 W NL2015050293 W NL 2015050293W WO 2015174829 A1 WO2015174829 A1 WO 2015174829A1
Authority
WO
WIPO (PCT)
Prior art keywords
storage container
item
computer system
access key
storage
Prior art date
Application number
PCT/NL2015/050293
Other languages
French (fr)
Inventor
Nikolaï CARELS
Andreas Johannes Hubertus SANDERS
Rudolf Martinus Leonardus DITERWICH
Original Assignee
Sesam Solutions B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sesam Solutions B.V. filed Critical Sesam Solutions B.V.
Publication of WO2015174829A1 publication Critical patent/WO2015174829A1/en

Links

Classifications

    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/145Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle comprising means for identifying a deposit; Deposits carrying identification means, e.g. a bar code
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/149Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means with central server link

Definitions

  • Storage container computer system and method for delivering and returning a tangible item
  • the invention relates to a storage container, a computer system for use with at least one storage container and to a method for delivering and/or returning tangible items (goods, parcels, letters, etc.) to resp. from such a storage container.
  • Online shopping is rapidly becoming the most preferred manner of shopping. As a consequence thereof, delivery of the online bought items by delivery service providers to the premises of consumers is increasing. In addition, most online shops allow returning of the bought items by the consumer, again requiring a service to pick up the item or require the consumer to visit a postal office.
  • a growing frustration with both consumers and the services delivering or picking up the items is that the consumers need to be present at the address they have indicated for delivery of the item. Often, items are not delivered or are handed over to neighbours or a nearby deposit where consumers may pick up the item. Returning items require a consumer to go to a post office to hand over the item. Such practice is not efficient and is disadvantageous for the online ordering of items.
  • a storage container for storing at least one tangible item is presented.
  • the tangi- ble item is associated with a first access key and the storage container is associated with a second access key.
  • the storage container comprises a container component, e.g. a door, a lid, a mailbox slot or other access means, to provide access to a storage portion of the storage container.
  • the storage container also comprises a reader configured for reading the first access key associated with the tangible item.
  • the reader may e.g. comprise a radio frequency identification (RFID) reader or a near field communication (NFC) reader. Access using other identifiers, such as alphanumerical identifiers or PIN codes have also been envisaged.
  • the first access key may be provided to or allocated to an item as a label, ticket, tag or any other suitable means for associating a first access key with a tangible item.
  • the first access key may be programmed in the RFID.
  • One example includes an RFID tag attached to the item.
  • the first access key is not necessarily attached to the item, but may also be offered separately from the item, e.g. from a display of e.g. a handheld device of an employee of the delivery services provider or via a Bluetooth connection.
  • the storage container also comprises a control system configured for controlling the container component to provide access to the storage portion. Access is provided when the first access key corresponds to the second access key associated with the storage container.
  • a computer system configured for use with at least one storage container.
  • the computer system comprises a generator for
  • a method for at least one of delivery to and returning from a storage container for a tangible item is presented.
  • the storage container is associated with a second access key.
  • the first access key associated with the tangible item is obtained.
  • the first access key may be obtained by the party generating the first access key or may be received by a delivery service provider from a party generating the first access key.
  • the first access key is exposed to the reader of the storage container, e.g. by exposing the item to which the first access key is attached. Access is obtained to the storage portion of the storage container when the first access key corresponds to the second access key. The tangible item may then be put in the storage portion and/or be taken from the storage portion.
  • the disclosure presents a method for dynamically providing access to the storage container or other specific resource without requiring communication between the storage container and the computer system generating a code.
  • the computer system generates a code that is (a) only valid for a specific storage container, (b) during a specific time window and (c) can only be used once.
  • the code is generated using a hash algorithm that uses a shared secret key of the storage container, the time window during which the code should be valid and a sequence number for that storage container.
  • the storage container uses the same hash algorithm to calculate a code on the basis of the current time and a series of sequence numbers known to the storage container. Access is granted if the code calculated by the storage container and the code generated by the computer system match.
  • the storage container will accept the code only once by maintaining a list of codes used during the time window.
  • the computer system uses sequence numbers and will, hence, not generate an identical code for the storage container during the same time window. Therefore, access to the storage container (or other resource) may be granted several times during a time window .
  • Example of hash algorithms are MD5 and SHA. Several representations of the time window and the secret keys are al- lowed.
  • the control system may be configured to control the container component in any manner to provide access to the storage portion of the storage container.
  • control is performed by controlling a servomotor and/or a locking struc- ture affecting a state (e.g. open or close) of the container component .
  • the storage container may comprise multiple storage portions. Each of the storage portions may have an associated container component providing access to the storage portion.
  • the storage container has a dedicated storage por- tion for registered items, e.g. registered mail or registered parcels, typically requiring signature of the recipient.
  • the storage container can be placed at the home of the consumer and enables safe delivery and returning of tangible items without requiring the consumer to be present.
  • the con- sumer only has to access the storage container in a way very similar to how letters and other mail are commonly received.
  • the consumer may access the storage container using a common (hardware) key or using an electronic key (e.g. a tag containing an identifier corresponding to a pre-programmed key in the stor- age container) .
  • a common (hardware) key e.g. a tag containing an identifier corresponding to a pre-programmed key in the stor- age container
  • Any other party can only access the storage container if in the possession of the first access key (such as the employee of the delivery service provider delivering the item to which the first access key is attached) as generated in the computer system. Verification of the key correspondence is applied locally and may not need communication with an external computer system.
  • the storage container may also be stored at another location, e.g. a third party location, e.g. a public location such as a shop or a gas station.
  • a third party location e.g. a public location such as a shop or a gas station.
  • first access key and the second access key are electronic keys.
  • the first and second access keys may be generated by, respectively, the computer system and the storage container using a private key associated with the storage container.
  • the first access key may be associated with the item.
  • Further information may also be associated with the item, including at least one of an identifier of the item, a time window indicating validity of the access key and on or more properties of the item (e.g. dimensions, weight, etc.) .
  • This further in- formation, or parts thereof may be used in generating the first access code using an encryption algorithm.
  • the first access code may comprise a hash of this information and the private key of the storage container.
  • the encryption algorithm is an irreversible algorithm as known to a skilled person to avoid
  • the access key and the other information may be associ- ated with the first item as fields of a single code.
  • the code may be programmed on a label attached to the tangible item in a form readable by the reader of the storage container.
  • the storage container further comprises a generator for generating the second access key using a private key of the storage container.
  • the generator uses a corresponding encryption algorithm as for generating the first access key.
  • the control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box.
  • the first access key is tied to a particular storage container.
  • the storage container further receives from the tangible item at least one of an item
  • control system applies at least one of the item identifier, the validity time window and the item property to generate the second access key.
  • the validity time window enables tying the first access key to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated. To that end, the storage container consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key .
  • An access key may be valid for a only single item.
  • the item identifier may be a unique identifier for the item .
  • a modification of any of the data of used for generating the access key render the unusable.
  • a security token may be applied as a checksum for the other data.
  • item keys can only be used once for security reasons. Even if the algorithm gets compromised, the first and second access codes may not be generated as these access codes may be generated using the private key associated with the storage container.
  • the private key is securely stored in the storage container and/or in the computer system in a manner known as such.
  • each of the items may be stored in a box, wherein each of the items contains a first access key (and the box does not) .
  • Each of the items may also contain an individual item identifier, enabling return of individual items as will be explain in further detail below.
  • only the box contains a first access key and not the individual items in the box do not .
  • the disclosed storage container, the computer system and the delivery and return method may not only be employed for consumers but also for busi- ness related purposes.
  • the storage container comprises a communication module configured for communicating with a computer system over a network.
  • the control system is configured for generating status information to be transmitted with the communication module to the external computer system.
  • Status information may be related to at least one of a status of the storage container and a delivery/return status of the tangible item.
  • This embodiment facilitates the computer system to be aware of the status of the storage container (e.g. operational status, filling status, power status, safety status, temperature etc.) and the delivery/return status (e.g. delivery completed, delivery failed, return pending, return failed, etc.) and appropriate actions to be taken.
  • One action relates to generating or providing a first access key to be associated with a tangible item. For example, if it is determined that the storage container cannot accommodate a further item (based on filling status) the first access key may not be generated or released until the filling status indicates that sufficient storage space is available.
  • Filling status may e.g. be obtained from reading an item identifier and associating the item identifier with dimensions of the item.
  • the dimensions may also be pre-stored at or retrieved or received by the computer system.
  • the dimensions may also be read from the same label or tag as the first access key (the dimensions may be included in the first access key) or may be determined by the storage container.
  • An alternative action relates to message transmission to at least one of the consumer and the delivery service provider in dependence on the status of the storage container and/or the status of the delivery/return.
  • a delivery completed status obtained from the storage container may trigger the computer system to initiate transmission of an SMS message to the consumer.
  • the delivery service provider may also be notified, e.g. using system integration.
  • a similar message that may be transmitted from the computer system is that return of the item has been successful.
  • a message may also be gener- ated if delivery is temporarily not possible because of lack of storage space in the storage container.
  • a message or notification may also be transmitted if an item has not been delivered or picked up for some time, e.g. if the status indicates that a first access key associated with a particular item has not been read by the reader in the storage box .
  • Yet another message that may be generated relates to a sensor detecting an event at the storage container, e.g. a vibration sensor or a temperature sensor.
  • control system is configured for establishing a return status of the tangible item.
  • the return status indicates that the item is put back into the storage container to be returned. Return status may be established based on detecting conditions of the storage container and/or detect- ing readings of the first access key. In one embodiment, at least one of the following events is used to establish a return status for the item:
  • Conditions for the storage container may also assist in establishing the return status of the item.
  • the embodiment facilitates easy return of items (e.g. without having to access the computer sys- tern and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome) .
  • the storage container comprises a power source and an activator configured for activating at least one of the reader and the control system.
  • the activator may comprise a button, a proximity sensor or any other means for activating part of the storage container to consume power of the power source.
  • the power source may comprise a battery. Providing the storage container with a power source simplifies
  • the activator prolongs the duration of the power source .
  • the computer system is configured for monitoring and, optionally, updating at least one of a sta- tus of the storage container and a delivery/return status of the tangible item.
  • the status information enables the computer system to take appropriate actions dependent on the status, e.g. to generate and/or release the first access key.
  • the monitoring process keeps track of the contents of the storage container and/or the operation status of the storage container and takes appropriate measures if differences from an expected state are detected, e.g. transmitting a message to a user and/or system operator .
  • the computer system may log events and status data (e.g. temperature) to generate reports.
  • status data e.g. temperature
  • the computer system is configured for receiving at least one characteristic of the tangible item, e.g. one or more dimensions (size) and/or weight of the tangible item, from the storage container.
  • Characteristics of the item e.g. size information
  • Other characteristics include temperature and/or any other data that may be sensed by the storage container.
  • the characteristic (s) enables the computer system to take appropriate actions dependent on the characteristic ( s ) , e.g. to transmit a message to the consumer and/or the delivery services provider.
  • the computer system further comprises a memory for storing a storage status of the storage container based on at least one characteristic of the tangible item.
  • the computer system may determine the status of the storage container from the received characteristics. It should be noted that this embodiment may be applied independent on how access to the storage container is arranged as disclosed herein.
  • the computer system is configured for communicative connection with a web shop or a facilitator.
  • the web site of the web shop may provide an option for the con- sumer to indicate the availability of the storage container for the consumer.
  • the web shop may also have integrated the computer system into its operation and is aware of the availability of a storage container for a particular user of the web shop.
  • the generated first access key is obtained by at least one of the web shop and the facilitator (a party manufacturing labels containing the first access key and, optionally, other information; a delivery service or any other party in the delivery chain) to associate (e.g. attach) the first access key to the tangible item .
  • the computer system stores a user account of a user of the storage container.
  • the computer system may have a web site where consumers can set up a user account enabling consumers to indicate the availability of a storage container when online shopping.
  • the user may indicate trusted storage containers (e.g. of neighbours) that may be used e.g. when his own storage container has not sufficient storage capacity.
  • trusted storage containers e.g. of neighbours
  • guest use of a storage container may require approval of the owner of the storage container.
  • a user may also grant access to a storage container associated with his user account to other user.
  • the user account enables a social delivery network .
  • the computer system comprises a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or returning of the tangible item. This embodiment facilitates payment of the item after delivery of the item instead of pre-payment.
  • aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware em- bodiment, a software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module” or “system”. Functions described in this disclosure may be implemented as an algorithm executed by a microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable me- dium(s) having computer readable program code embodied, e.g., stored, thereon.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electro- magnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer read- able storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless (using electromagnetic and/or optical radiation), wired, optical fibre, cable, etc., or any suitable combination of the foregoing.
  • Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as
  • the program code may execute entirely on a user's computer (e.g. a user device) or on a
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider) .
  • LAN local area network
  • WAN wide area network
  • These computer program instructions may be provided to a processor, in particular a
  • microprocessor or central processing unit (CPU) of a general purpose computer, special purpose computer, or other programma- ble data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions /acts specified in the flowchart and/or block diagram block or blocks.
  • CPU central processing unit
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which com- prises one or more executable instructions for implementing the specified logical function (s) .
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the functions noted in the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • the disclosure also relates to a storage container comprising a tamper detection sensor, e.g. a vibration sensor, for detecting tampering of the storage container and a communication module for communicating with an external computer system, wherein the communication module is configured for transmitting a notification message to an external computer sys- tern upon detecting tampering the tamper detection sensor.
  • a tamper detection sensor e.g. a vibration sensor
  • the storage container may comprise an on-board power source and the communication module is powered by the power source, optionally upon reading by the tamper vibration sensor.
  • a storage container comprising an action detector detecting distinguishable actions at the storage container and a communication module for communicating detected actions to an external computer system.
  • the actions include one or more of:
  • the storage container may be configured to distinguish actions based on at least one of a key used to get access to the storage container and the state of a component (e.g. a door) of the storage container.
  • actions are communicated to a computer system configured to distinguish between the actions .
  • the disclosure also relates to a computer system configured for receiving communication from the communications module of the storage container.
  • the communication may relate to status information, including information from sensors and information from actions as described in the previous paragraphs.
  • FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system
  • FIGS. 2A and 2B are embodiments of a storage container and a functional module for the storage container
  • FIG. 2C provides a schematic illustration of generation of access keys for items and verification of access key correspondence at a storage container
  • FIGS. 3A-3D are flow charts illustrating steps of embodiments of delivery and return methods
  • FIG. 4 is a combined system and flow illustration of system for ordering and return of tangible items
  • Fig. 5 is a schematic block diagram of an embodiment of a general system or element of used in the system, e.g. in the storage container or in the computer system.
  • FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system 1.
  • a storage container 2 is provided to a consumer. Storage container 2 will be described in further detail with
  • FIGS. 2A and 2B It should be appreciated that a plurality of storage containers may be employed within the system 1.
  • a key 3 is provided for a consumer to open storage container 2.
  • Key 3 may comprise at least one of a conventional hardware key or an electronic key, as shown in FIG. 1.
  • Storage container 2 stores a pre-programmed key corresponding to the electronic key to enable unlocking of the storage container by the consumer.
  • the consumer has access to a computer (not shown) to visit a web site of a web shop 4 over the internet 5.
  • the web shop may offer goods, such as tangible item 6.
  • the consumer has also access to a computer system 7 that is associated with the storage container 2.
  • Computer system 7 may have a web site enabling subscription to services related to storage container 2. The subscription process to such services is known as such to a skilled person.
  • the consumer may set preferences in the computer system 7, such as a preferred manner of receiving messages of successful and failed delivery and return (e.g. telephone number and/or e-mail address) .
  • the consumer may also indicate time intervals during which no items can be delivered (e.g. during a holiday) .
  • the consumer may also indicate other storage containers, e.g.
  • the consumer may also allow other users to use his storage container 2 and establish a social delivery network. It should be noted that the order of the user does not have to be through a web shop. Item ordering may occur via other channels.
  • Computer system 7 monitors the status of the storage container 2 and/or the delivery/return of items to/from the storage container 2.
  • the monitoring process keeps track of the contents of the storage container 2 and/or the operation status of the storage container 2 and takes appropriate measures if differences from an expected state are detected, e.g. transmit- ting a message to a user and/or system operator.
  • the computer system 7 may log events and status data (e.g. temperature) to generate reports.
  • status data e.g. temperature
  • the system further comprises at least one delivery service provider 8 that provides delivery and return services for tangible item 6.
  • Storage container 2 may communicate with computer system 7 over a wireless data communication network 9 and,
  • wireless data communication network 9 provides machine-to-machine ser- vices in relation to storage container 2.
  • Storage container 2 may use a local wifi connection or use a telecommunications network .
  • item 6 is associated with a first access key AK1, e.g. by attaching a label to it.
  • the label may comprise a code containing the access key AK1 and further information, e.g. an item identifier and a validity time window.
  • a private key PK of the storage container is stored in the storage container 2 and is available to the computer system 7 as will be discussed in further detail with reference to FIG. 3A.
  • FIG. 2A is a schematic illustration of a storage container 2.
  • Storage container 2 may be a container for home use and may be installed e.g. near the entrance of the home of a con- sumer .
  • Storage container 2 may be placed on a pole, be attached to the house or be integrated in a wall or door of the house.
  • Storage container 2 typically has a volume less than 1 m 3 but may be larger (including a storage building that may be entered via a door to which access is provided as disclosed herein) .
  • Storage container 2 may also be used for business use.
  • the storage container may contain multiple storage portions, e.g. a parcel box 20 and a letter box 21.
  • Parcel box 20 has a door 22 hinged to the parcel box that provides access to the parcel box 20.
  • Letter box 21 has a mailbox slot 23 enabling access to the letter box 21.
  • storage container 2 may comprise more or less storage portions.
  • storage container 2 may be top loadable in which case door 22 may be replaced by a lid (not shown) .
  • the outer walls of storage container 2 are made of plastic, e.g. HDPE .
  • Some parts of the storage container 2 comprise metal, e.g. hinges, fasteners etc.
  • the storage container 2 may also be made mainly of metal material.
  • the front side of the storage container 2 e.g. door 22 and/or mailbox slot 23 may be customizable enabling consumers to give storage container 2 an individual appearance.
  • the walls of the storage container may provide for thermal isolation, e.g. to store hot or cold items 6 within the storage container 2.
  • Storage container 2 may be provided with heating and/or cooling facilities .
  • Storage container 2 contains a functional module 24 comprising electronic components.
  • Functional module 24 may be easily replaced, e.g. for repair purposes.
  • One or more of the electronic components may be activated using activator 25.
  • Activator 25 may comprise a button to be used when functions of functional module 24 are required.
  • Other types of activators 25 may be used, e.g. a proximity sensor.
  • Storage container 2 may comprise an indicator 26, e.g. one or more light emitting diodes, to indicate a status of the storage container 2 (e.g. door 22 open or closed) . This status may be translated to a delivery or return status of the item 6.
  • Indicator 2 may comprise noise generating means, e.g. a speaker, to generate an audible signal.
  • Storage container 2 also contains a battery 27.
  • Battery 27 omits the need to connect storage container 2 to the mains, providing more freedom in installing the storage container 2 at a desired location.
  • Activator 25 may interact with battery 27 to wake up one or more components of functional mod- ule 24. It should be appreciated, however, that storage container 2 may be connected to the mains. Such connection may be facilitated, for instance, when storage container 2 is integrated in a wall of a building.
  • FIG. 2B is a schematic illustration of a functional module 24 for a storage container 2.
  • the central component of functional module 24 is control system 30.
  • Other components include reader 31,
  • functional module 24 may comprise a memory 34 storing private key PK of the storage container 2.
  • Functional module 24 may comprise or be connected to one or more sensors 35, e.g. to provide safety and/or to report events.
  • a vibration sensor configured for sensing vibrations of the storage container 2 above a certain threshold being indicative of an attempt to compromise storage container 2. Such an event may be communicated to a user of the storage container 2, e.g. via computer system 7.
  • Another sensor includes a temperature sensor monitoring temperature inside the storage container.
  • control system 30 includes a key derivation function 36 to generate a second access key AK2 associated with the storage container 2.
  • Control system 30 may comprise a central processing unit (CPU) comprising circuitry and may be suitably programmed to perform one or more of the steps disclosed herein. Control system 30 also has access to a local clock. Control system 30 includes a key generator 36. Key generator 36 is configured to generate a second access key AK2 associated with the storage container 2. To that end, key generator may employ the private key PK of the storage container 2 from memory 34.
  • CPU central processing unit
  • the first access key AK1 may be associated with the item 6.
  • the item may be associated with further information as mentioned above.
  • This information may comprise at least one of an identifier ID of the item 6, a time window indicating valid- ity of the access key AK1 and on or more properties of the item 6 (e.g. dimensions, weight, etc.) .
  • This further information, or parts thereof may have been be used in generating the first access code using an encryption algorithm at the computer system 7.
  • the first access code may comprise a hash of this infor- mation and the private key PK of the storage container 2.
  • the encryption algorithm is an irreversible algorithm as known to a skilled person to avoid recalculation of the input data.
  • the access key and the other information may be associated with the item 6 as fields of a single code.
  • the code may be programmed on a label attached to the tangible item in a form readable by the reader 31 of the storage container 2.
  • the key derivation function 36 uses a corresponding encryption algorithm as for generating the first access key.
  • the control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box.
  • the reader 31 may read the further information from the item 6 (more particularly, from a label attached to the item 6), such as the item identifier ID, the validity time window and/or the item characteristics. If this information has been used in generating the first access key at the computer system, this information is also used in generating the second access key at the storage container 2.
  • the validity time window enables tying the first access key AK1 to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated. To that end, the storage container 2 consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key.
  • An access key AK1, AK2 may be valid for a only single item.
  • the item identifier ID may be a unique identifier for the item.
  • Reader 31 is configured to read an identifier, e.g. an identifier of an RFID tag or NFC information, associated with the tangible item 6.
  • Reader 31 may comprise an RFID reader and/or an NFC reader.
  • Communication module 32 is configured to enable communication from the storage container 2 to the computer system 7 via wireless data communication channel 9.
  • Communication module 32 may comprise a modem, e.g. a machine-to-machine modem.
  • the connection enables information, e.g. status information, to be transmitted from storage container 2 to computer system 7.
  • the connection also enables transmission of events detected by one or more sensors to the computer system 7.
  • Communication module 32 may enable two-way communication with computer system 7. Two-way communication facilitates control actions and/or other information (e.g. software updates, a new second access key AK2, etc.) to be received by storage container 2 from computer system 7.
  • control actions and/or other information e.g. software updates, a new second access key AK2, etc.
  • Electromechanical component 33 comprises a motor to be controlled from control system 30 in order to operate a container component of the storage container, e.g. door 22 and/or mailbox slot 23, to provide access to the corresponding storage portion if control system 30 detects that certain conditions are fulfilled.
  • FIG. 2C provides a schematic illustration of generation of access keys AK1, AK2 for delivery and return purposes of items 6 and verification of access key correspondence at a storage container 2.
  • Third party 8 provides computer system 7 with information regarding an intended delivery or return of an item 6. Said information may comprise a time window T J J for delivery and/or return and/or item characteristics CCCCCC .
  • Computer system 7 generates a first access key AK1 using this information and private key PK securely stored in the computer system 7 in association with the storage container 2 using a key derivation function KDF.
  • the first access key AK1 is provided to third party 8.
  • Third party 8 provides a label L using e.g. label printer LP.
  • Said label L contains the information concerning the time window, the item characteristics and the generated access key AK1. This information forms a code TTTTT-CCCCCC-AK1.
  • Label L may subsequently be scanned using reader 31 provided in storage container 2.
  • Control system 30 comprises a key derivation function KDF using the read information of the time window T J J and the item characteristics CCCCCC and private key PK from secure memory 34 to obtain a second access key AK2.
  • Control system 30 compares the read first access key AK1 from label L with the generated second access key AK2. If
  • FIGS. 3A and 3B are flow charts illustrating steps of performing a delivery method using storage container 2.
  • step SI a consumer orders a tangible item 6 at a web shop 4. It is assumed that the consumer has a storage container 2 and is registered as such with computer system 7.
  • the consumer may e.g. indicate availability of a storage container 2 for delivery of the item 6.
  • step S2 computer system 7 is informed of the order and generates a first access key AK1. Since the consumer has a subscription with computer system 7, computer system 7 has stored a private key PK of the storage container 2. The private key PK has been used in generating AK1.
  • step S3 computer system 7 sends the first access key AK1 to delivery service provider 8 (or any other party in the delivery chain) .
  • Delivery service provider 8 is responsible for delivery of item 6 ordered by the consumer via web shop 4 to the consumer.
  • Delivery service provider 8 may e.g. attach identifier AK1 to the tangible item 6, e.g. by attaching an RFID label containing AK1.
  • step S4 an employee of delivery service provider 8 exposes the first access key AK1 to reader 31.
  • the employee may first have activated storage container 2 using activator 25.
  • Control system 30 receives AK1 and determines whether access should be provided to storage container 2 on the basis of AK1 to allow the employee to store the item 6 in the storage container 2.
  • Step S5 involves the control system 30 comparing the received first access key AK1 with a second access key AK2 of the storage container 2.
  • Second access key AK2 is generated using private key PK stored locally in memory 34 and key
  • control system 30 controls electromechanical component 33 to provide access to e.g. storage portion 20, e.g. by operating a lock of the door 22. If the first access key AK1 is found not to be related to the second access key AK2, no access is provided to the storage container 2.
  • data communication network 9 may be employed to have online authorization, comparing AK2 generated at the storage container 2 with AK1 stored in the
  • this embodiment in fact does not require a first access key AK1 to be applied to the item 6; only the further information (e.g. an item identifier) would be sufficient for the computer system to derive the first access key AK1.
  • step S6 Once the employee has obtained access to the storage container 2, he puts the item into the storage portion and closes the storage container 2 again (step S6) .
  • This event may be detected by the control system 30 triggering the control system 30 to transmit a status update to the computer system 7 via communication module 32.
  • Computer system 7 may update the status of the storage container 2 stored therein, e.g. by
  • the status may also include a filling status indicating e.g. the re- maining volume of the storage container or storage portion.
  • Delivery of the item may be confirmed from the computer system 7, e.g. using SMS, to at least one of the consumer (who may have selected this option when registering with the system 7 in addition to providing e.g. a telephone number or e-mail address to deliver the confirmation message) and the delivery service provider 8.
  • the event of completion of delivery is only triggered if the storage container 2 is locked appropriately.
  • the appropriate delivery may be signalled by in- dicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate delivery may be signalled by red light.
  • Electronic key 3 may e.g. contain a key corresponding to a pre-programmed key stored memory 34 of the storage container 2.
  • Computer system 7 may be informed of the event of item 6 being retrieved from the storage container 2 and update the storage container status (e.g. the filling status is set to empty) contained therein accordingly.
  • This retrieval event may e.g. be detected from detecting use of the electronic key 3 of the user or from any other sensor, e.g. sensing opening of door 22 again after closing by the employee of the delivery service provider .
  • FIG. 3B illustrates a flow chart comprising similar steps as in FIG. 3A. Only, step 5 comprises a step S5a wherein time window information obtained from item 6 is checked against clock information available to control system 30 in order to determine whether or not the second access key AK2 may be
  • AK2 is generated in step S5B. If not (not shown) , then AK2 is not generated and access to the storage container will not be granted. Such failed delivery may be
  • FIG. 3C illustrates some steps for returning the item 6 using the storage container 2.
  • the consumer visits the web site of web shop 4 and indicates that he desires to return item 6 (S10) . Again, the consumer may indicate availability of storage container 2. The consumer may then put back item 6 in the storage container 2. Web shop 4 communicates this event to computer system 7.
  • the consumer opens the storage container using the key 3.
  • This event may be detected by computer system 7.
  • information associated with the item 6 may be read by reader 3.
  • the access key AK was a time-constrained access key
  • AK1 is of no use in opening storage container 2.
  • the further information e.g. an item identifier ID and/or item characteristics
  • the reading by reader 30 occurred some time after a previous reading and/or a previous opening of storage container 2.
  • the intended return may be established on the basis of the number of readings of the first access key AK and comparing this with a predetermined number by control system 30. For example, a first reading of AK1 is likely to be reading when item 6 was delivered. The second reading may have occurred when item 6 was taken out of the storage container 2 by the consumer. A third reading would indicate an intended return such that a return status may be established and registered in computer system 7.
  • Control system 30 may apply a time interval to avoid unintended reading of the first access key or unintended establishment of the return status.
  • this third reading occurs (very) shortly after the second reading, this third reading is less likely to indicated an intended return of the item, whereas a third reading after a certain amount of time (e.g. more than five minutes) may indicate an intention to return the item.
  • Other conditions for the storage container such as detecting opening of the storage container when reading the first access key, may also assist in establishing the return status of the item 6.
  • the embodiment facilitates easy return of items (e.g. without having to access the computer system and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome) .
  • tern 6 may contain another access key , e.g. a dedicated return key AKr, that should be used if the item 6 is to be returned.
  • the return key AKr may be obtained us- ing a time window different from the time window used in
  • Computer system 7 may store this code. If the return key AKr is received, the computer system 7 is informed that the item 6 is stored in the storage container 2 for return purposes. Computer system 7 may update the storage container status again, e.g. the filling status. Computer system 7 may generate and/or release a new first access key in response to detecting establishment of a return status for an item.
  • step Sll Detection of the event is performed in step Sll. In- formation on the event is transmitted to computer system 7 in step S12. It should be noted that the decision of establishing a return status for an item is preferably taken at the computer system 7.
  • a new first access key AK1 is generated (step S13), again possibly using a validity time window.
  • Computer system 7 transmits the new first access key AK1 and delivery service provider 8 obtains the identifier.
  • the employee exposes the new first access key AK to the reader 31. If the new first access key AK1 corresponds to the second access key AK2 generated in a manner similar as for delivery, storage container 2 opens and the employee gets access to the item 6 stored therein previously by the consumer.
  • the computer system 7 may be informed of the retrieval of the item 6 via communication module 32 and data network 9 and update the storage container status (e.g. the filling status) .
  • Computer system 7 may also inform at least one of the customer and the delivery services provider 8 of the successful return. Again, the event of successful return may be triggered only if the storage container 2 is locked appropriately.
  • the appropriate return may be signalled by indicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate return may be signalled by red light.
  • FIG. 3D is a flow chart depicting some steps at the storage container 2 and computer system 7 for an exemplary case wherein the customer orders three items 6A, 6B, 6C with one or several web shops 4 (step S20) . Items 6A, 6B, 6C may be delivered by one or more delivery service providers 8.
  • the combined volume of items 6A, 6B and 6C exceeds the storage capacity of storage container 2.
  • This information i.e. at least one of the dimensions of each of the items 6A, 6B, 6C and the total volume of the combination of these items is available to the computer system 7.
  • Other properties of the items e.g. weight and/or items that should not be stored with each other for other reasons, including safety reasons, food preservation reasons, etc.
  • web shop 4 informs computer system 7 of the dimensions of an item 6A, 6B, 6C once the customer orders the item (step S21) .
  • Computer system 7 may e.g. generate first access keys AK1A, AK1B for items 6A and 6B respectively in step S22, but not generate the identifier AK1C for item 6C, recognizing from the known dimensions of both the storage container 2 and the items 6A-6C that item 6C may not fit into the storage container 2 together with items 6A and 6B. It is noted that customers may prioritize delivery of certain items and that computer system 6 may take such priority settings into account when deciding which identifiers to generate (and, consequently which items will be
  • computer system 7 may still generate the identifiers, e.g. identifier AK1C, but not release the identi- bomb for delivery purposes.
  • an employee of delivery service provider 8 exposes access keys AK1A and AK1B (and possibly the further information) to reader 31. If at least one of these access keys AK1A, AK1B is found to correspond to corresponding second access keys AK2A, AK2B generated in the storage container 2, the employee gets access to storage container 2.
  • Computer system 7 will update the status of the storage container 2 accordingly. For example, the filling status may be updated to indicate the remaining storage capacity of storage container 2 now that both items 6A, 6B are stored therein.
  • step S24 the customer opens storage container 2 using one of the keys 3 and gets the items 6A and 6B from storage container 2.
  • the status of the storage container 2 is automatically updated in computer system 7 via communication module 32 controlled by control system 30. Now that items 6A and 6B have been retrieved from the storage container 2, computer system 7 may generate or release the identifier AK1C for item 6C since storage container 2 now has sufficient storage capacity to contain item 6C.
  • delivery service provider 8 attaches further information regarding item dimensions to the item 6, e.g. using a label (possibly the same label as for the first access key AK1C) that may be read by reader 31 of the storage container. This information may be obtained from web shop 4. Computer system 7 may already have generated first access keys AK1A, AK1B and AK1C for items 6A-6C respectively. The further information regarding dimensions of the item has not been used in deriving the first access keys AK1A, AK1B, AK1C.
  • An employee of delivery service provider 8 delivering item 6C may first arrive at the storage container 2.
  • Reader 31 reads first access key AK1C and information regarding the dimensions of the item 6C (step S25) . If the first access key AK1C corresponds to AK2C generated in the storage container 2, item 6C may be stored successfully in the storage container 2.
  • the information regarding the dimensions of item 6C is transmitted to the computer system 7, e.g. in response to finding successful delivery by control system 30.
  • Computer system 7 may update a filling status of storage container 2 in its records .
  • step S27 an employee of a different service provider arrives with item 6A.
  • Reader 31 reads AK1A and dimension information of item 6A. If item 6A is successfully
  • the dimension information of item 6A is transmitted to computer system 7 in step S28.
  • computer system 7 may update the storage container status, e.g. the filling status.
  • Computer system 7 may determine that insufficient storage space remains for a delivery service provider 8 delivering item 6B. This status remains until the customer has retrieved at least one of the items 6A, 6C and has not put in another item (e.g. an item to be returned) . Accordingly, computer system 7 may inform delivery service provider that item 6B cannot be delivered.
  • customer 7 may be informed of the event.
  • computer system 7 has access to information regarding dimensions of the items, e.g. in a memory (e.g. a database) or via a connection to a web shop 4. If an item is delivered to the storage container 2, the storage container 2 may forward an item identifier ID associated with the item in steps S26 and S29. Computer system 7 may find the corresponding dimension information using the received identifier and update the storage container status.
  • a memory e.g. a database
  • computer system 7 may find the corresponding dimension information using the received identifier and update the storage container status.
  • computer system 7 may comprise a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or re- turning of the tangible item.
  • This embodiment facilitates payment of the item after delivery of the item instead of prepayment or as soon as the item is registered as being returned.
  • events at the storage container 2 may be detected, either at the storage container 2 itself or at the computer system 7.
  • the storage container 2 is closed and item 6 is not in the storage container 2. If storage container 2 is closed and the user wants to put the item in the storage container, the label attached to the item 6 is read by the reader 31. Since the storage container was detected to be closed, item 6 could not have been within the storage container 6.
  • the storage container 2 is opened using user key 3 (which can be distinguished from reading the label on item 6) . The user may then put the item 6 in the key and close the storage container 2 (which can be detected) . A renewed scan of the label of item 6 after some time is with item 6 stored with the storage container 2.
  • an event of getting item 6 from the storage container 2 can be detected using the following steps:
  • an event of putting an item 6 in the storage container by another party than the user can be detected using the following steps:
  • an event of getting an item from the storage container 2 by another party than the user can be detected using the following steps: 1) read label with container closed; item 6 is in storage container 2 ;
  • FIG. 4 is a schematic illustration of another delivery and return system for an item 6.
  • Storage container 2 comprises a functional module 24 comprising communication and locking functions.
  • Functional module 24 may comprise the following components: a microprocessor, a power source (battery), light emitting diodes, a sound producing component, an RFID/NFC reader or scanner 31, a
  • a transmission/receiving component a servo component, a locking component, an on/off switch, a vibration sensor and a secure memory for storing the private key PK .
  • a power charger may be provided. All components are housed in a housing providing the functional module 24.
  • Storage container 2 comprises a lockable space of particular dimensions suitable for safe and dry storage of postal packages 6.
  • the storage container 2 may or may not comprise a separate lockable space for receiving mail, e.g. registered mail .
  • Computer system 7 comprises an online platform provided with a data processing system DAT.
  • Computer system 7 provides a user interface for users of the online platform. Users may manage a subscription (an account), manage access settings to the account, set user preferences and/or activate an electronic key 3.
  • the online platform 7 is configured to generate unique access keys, AKl, using key generator AK-GEN.
  • the generated keys AKl enable access to a particular storage container 2 at a particular day during a certain time interval.
  • the time inter- val may e.g. span a maximum of 4 hours, 2 hour, 1 hour.
  • the unique key AKl may be generated using time constrained key technology and may or may not be provided with a physical unclonable function.
  • AKl may be provided, e.g. programmed, on an RFID/NFC label 40.
  • RFID label 40 may be printed at a production site 41 comprising an RFID/NFC printer 42 and/or an RFID/NFC writer 43.
  • the production site 41 may also provide, e.g. program, elec- tronic key 3. Key 3 may or may not be provided with a physical unclonable function.
  • Production site 41 may also produce return RFID/NFC labels 44 programmed with a new first access key AKl to enable unlocking of a storage container 2 to pick up an item 6.
  • Online platform 7 may comprise a parcel management system PMS for managing delivery and return of items 6. Online platform 7 also comprises pay-after-delivery/pay-back-after-return module PAY.
  • Wireless data network 9 enables data transmission from storage container 2 to online platform 7. Further information and status information may be transmitted over the wireless data network 9. Wireless data network 9 may also be used to communicate with other parties, e.g. maintenance services providers. Wireless data network may allow two-way communication.
  • Online platform 7 has access to the internet 5 in order to enable communication with web shops 4, service providers 8 (see FIG. 1) and users of storage containers 2.
  • Service providers 8 and/or production site 41 may verify via the internet 5 whether or not the consumer has a subscription via an API/web service of online platform 7 and whether any restrictions apply (e.g. temporal unavailability due to lack of storage space or holiday period) . If the user has a subscription and no restrictions apply, the generated key AKl may be transmitted to a relevant party, e.g. production site 41.
  • Online platform 7 also comprises a message transmission module MSG to transmit messages or notifications, e.g. SMS messages or e-mail messages. Messages and notifications may be transmitted via a telecommunications network 45.
  • a message transmission module MSG to transmit messages or notifications, e.g. SMS messages or e-mail messages. Messages and notifications may be transmitted via a telecommunications network 45.
  • Fig. 5 is a block diagram illustrating an exemplary control system 30 or a data processing system DAT in computer system 7.
  • Data processing system 50 may include at least one processor 51 coupled to memory elements 52 through a system bus 53. As such, the data processing system 50 may store program code within memory elements 52. Further, processor 51 may exe- cute the program code accessed from memory elements 52 via system bus 53.
  • data processing system 50 may be implemented as a computer system that is suitable for storing and/or executing program code. It should be appreciated, however, that data processing system 50 may be implemented in the form of any system including a processor and memory that is capable of performing the functions or steps described within this specification .
  • Memory elements 52 may include one or more physical memory devices such as, for example, local memory 54 and one or more bulk storage devices 55.
  • Local memory may refer to random access memory or other non-persistent memory device (s) generally used during actual execution of the program code.
  • a bulk storage device 55 may be implemented as a hard drive or other persistent data storage device.
  • the data processing system 50 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from bulk storage device 55 during execution.
  • I/O devices depicted as input device 56 and output device 57 optionally can be coupled to the data processing system 50.
  • input devices may include, but are not limited to, for example, a keyboard, a pointing device such as a mouse, a touch screen, or the like.
  • output device may include, but are not limited to, for example, a monitor or display, speakers, or the like.
  • Input device 56 and/or output device 57 may be coupled to data processing system 50 either directly or through intervening I/O controllers.
  • a network adapter 58 may also be coupled to data processing system 50 to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks.
  • the network adapter 58 may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to said data processing system 50 and a data transmitter for transmitting data to said systems, devices and/or networks.
  • Modems, cable modems, and Ethernet cards are examples of different types of network adapters that may be used with data processing system 50.
  • memory elements 52 may store an application 59. It should be appreciated that data processing system 50 may further execute an operating system (not shown) that can facilitate execution of the application. Applications, being implemented in the form of executable program code, can be executed by data processing system 50, e.g., by processor 51. Responsive to executing the application 59, the data processing system 50 may be configured to perform one or more operation as disclosed in the present application in further detail.
  • data processing system 50 may represent a data processing system DAT of central computer 7 performing one or more of functions using one or more applications 59.
  • Various embodiments of the invention may be implemented as a program product for use with a computer system or a processor, where the program(s) of the program product define functions of the embodiments (including the methods described herein) .
  • the program(s) can be contained on a variety of non- transitory computer-readable storage media (generally referred to as "storage"), where, as used herein, the expression “non- transitory computer readable storage media” comprises all computer-readable media, with the sole exception being a
  • the program(s) can be contained on a variety of transitory computer-readable storage media.
  • Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
  • non-writable storage media e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory
  • writable storage media e.g., flash memory, floppy disks within a disk

Abstract

The disclosure relates to a storage container (2) for storing a tangible item, wherein the tangible item is associated with a first access key and the storage container (2) is associated with a second access key. The storage container (2) comprises a container component (24) providing access to a storage portion (20) of the storage container (2) and a reader (31) configured for reading the first access key of the tangible item. A control system (30) is configured for controlling the component (24) to provide access to the storage portion (20) when the first access key read by the reader of the storage container (2) corresponds to the second access key associated with the storage container (2).

Description

Storage container, computer system and method for delivering and returning a tangible item
FIELD OF THE INVENTION
The invention relates to a storage container, a computer system for use with at least one storage container and to a method for delivering and/or returning tangible items (goods, parcels, letters, etc.) to resp. from such a storage container.
BACKGROUND
Online shopping is rapidly becoming the most preferred manner of shopping. As a consequence thereof, delivery of the online bought items by delivery service providers to the premises of consumers is increasing. In addition, most online shops allow returning of the bought items by the consumer, again requiring a service to pick up the item or require the consumer to visit a postal office.
A growing frustration with both consumers and the services delivering or picking up the items is that the consumers need to be present at the address they have indicated for delivery of the item. Often, items are not delivered or are handed over to neighbours or a nearby deposit where consumers may pick up the item. Returning items require a consumer to go to a post office to hand over the item. Such practice is not efficient and is disadvantageous for the online ordering of items.
It is an aim of the present disclosure to provide a more efficient way for delivering and returning tangible items (e.g. parcels, letters, etc.).
SUMMARY
In one aspect of the disclosure, a storage container for storing at least one tangible item is presented. The tangi- ble item is associated with a first access key and the storage container is associated with a second access key.
The storage container comprises a container component, e.g. a door, a lid, a mailbox slot or other access means, to provide access to a storage portion of the storage container. The storage container also comprises a reader configured for reading the first access key associated with the tangible item. The reader may e.g. comprise a radio frequency identification (RFID) reader or a near field communication (NFC) reader. Access using other identifiers, such as alphanumerical identifiers or PIN codes have also been envisaged. As an example, the first access key may be provided to or allocated to an item as a label, ticket, tag or any other suitable means for associating a first access key with a tangible item. The first access key may be programmed in the RFID. One example includes an RFID tag attached to the item. It should be appreciated that the first access key is not necessarily attached to the item, but may also be offered separately from the item, e.g. from a display of e.g. a handheld device of an employee of the delivery services provider or via a Bluetooth connection.
The storage container also comprises a control system configured for controlling the container component to provide access to the storage portion. Access is provided when the first access key corresponds to the second access key associated with the storage container.
In another aspect of the disclosure, a computer system configured for use with at least one storage container is disclosed. The computer system comprises a generator for
generating the first access key for the tangible item enabling at least one of delivery of the tangible item to the storage portion and returning of the tangible item from the storage portion of the storage container in a manner as disclosed herein.
In a still further aspect of the disclosure, a method for at least one of delivery to and returning from a storage container for a tangible item is presented. The storage container is associated with a second access key. In a first step, the first access key associated with the tangible item is obtained. The first access key may be obtained by the party generating the first access key or may be received by a delivery service provider from a party generating the first access key.
Next, at delivery, the first access key is exposed to the reader of the storage container, e.g. by exposing the item to which the first access key is attached. Access is obtained to the storage portion of the storage container when the first access key corresponds to the second access key. The tangible item may then be put in the storage portion and/or be taken from the storage portion.
As will be described below in further detail, the disclosure presents a method for dynamically providing access to the storage container or other specific resource without requiring communication between the storage container and the computer system generating a code. The computer system generates a code that is (a) only valid for a specific storage container, (b) during a specific time window and (c) can only be used once. The code is generated using a hash algorithm that uses a shared secret key of the storage container, the time window during which the code should be valid and a sequence number for that storage container. Upon reading the code, the storage container uses the same hash algorithm to calculate a code on the basis of the current time and a series of sequence numbers known to the storage container. Access is granted if the code calculated by the storage container and the code generated by the computer system match. The storage container will accept the code only once by maintaining a list of codes used during the time window. The computer system uses sequence numbers and will, hence, not generate an identical code for the storage container during the same time window. Therefore, access to the storage container (or other resource) may be granted several times during a time window .
Example of hash algorithms are MD5 and SHA. Several representations of the time window and the secret keys are al- lowed.
The control system may be configured to control the container component in any manner to provide access to the storage portion of the storage container. In one example, control is performed by controlling a servomotor and/or a locking struc- ture affecting a state (e.g. open or close) of the container component . The storage container may comprise multiple storage portions. Each of the storage portions may have an associated container component providing access to the storage portion. In one example, the storage container has a dedicated storage por- tion for registered items, e.g. registered mail or registered parcels, typically requiring signature of the recipient.
The storage container can be placed at the home of the consumer and enables safe delivery and returning of tangible items without requiring the consumer to be present. The con- sumer only has to access the storage container in a way very similar to how letters and other mail are commonly received.
The consumer may access the storage container using a common (hardware) key or using an electronic key (e.g. a tag containing an identifier corresponding to a pre-programmed key in the stor- age container) . Any other party can only access the storage container if in the possession of the first access key (such as the employee of the delivery service provider delivering the item to which the first access key is attached) as generated in the computer system. Verification of the key correspondence is applied locally and may not need communication with an external computer system.
The storage container may also be stored at another location, e.g. a third party location, e.g. a public location such as a shop or a gas station.
It should be appreciated that the first access key and the second access key are electronic keys. The first and second access keys may be generated by, respectively, the computer system and the storage container using a private key associated with the storage container.
The first access key may be associated with the item.
Further information may also be associated with the item, including at least one of an identifier of the item, a time window indicating validity of the access key and on or more properties of the item (e.g. dimensions, weight, etc.) . This further in- formation, or parts thereof may be used in generating the first access code using an encryption algorithm. The first access code may comprise a hash of this information and the private key of the storage container. The encryption algorithm is an irreversible algorithm as known to a skilled person to avoid
recalculation of the input data.
The access key and the other information may be associ- ated with the first item as fields of a single code. The code may be programmed on a label attached to the tangible item in a form readable by the reader of the storage container.
In one embodiment, the storage container further comprises a generator for generating the second access key using a private key of the storage container. The generator uses a corresponding encryption algorithm as for generating the first access key. The control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box. In this embodiment, the first access key is tied to a particular storage container.
In one embodiment, the storage container further receives from the tangible item at least one of an item
identifier, a validity time window, and an item property and the control system applies at least one of the item identifier, the validity time window and the item property to generate the second access key.
The validity time window enables tying the first access key to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated. To that end, the storage container consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key .
An access key may be valid for a only single item.
The item identifier may be a unique identifier for the item .
A modification of any of the data of used for generating the access key render the unusable. A security token may be applied as a checksum for the other data. Preferably, item keys can only be used once for security reasons. Even if the algorithm gets compromised, the first and second access codes may not be generated as these access codes may be generated using the private key associated with the storage container. The private key is securely stored in the storage container and/or in the computer system in a manner known as such.
It should be noted that multiple items may be stored in a box, wherein each of the items contains a first access key (and the box does not) . Each of the items may also contain an individual item identifier, enabling return of individual items as will be explain in further detail below. Alternatively, only the box contains a first access key and not the individual items in the box do not .
It should be appreciated that the disclosed storage container, the computer system and the delivery and return method may not only be employed for consumers but also for busi- ness related purposes.
In one embodiment, the storage container comprises a communication module configured for communicating with a computer system over a network. The control system is configured for generating status information to be transmitted with the communication module to the external computer system. Status information may be related to at least one of a status of the storage container and a delivery/return status of the tangible item. This embodiment facilitates the computer system to be aware of the status of the storage container (e.g. operational status, filling status, power status, safety status, temperature etc.) and the delivery/return status (e.g. delivery completed, delivery failed, return pending, return failed, etc.) and appropriate actions to be taken.
One action relates to generating or providing a first access key to be associated with a tangible item. For example, if it is determined that the storage container cannot accommodate a further item (based on filling status) the first access key may not be generated or released until the filling status indicates that sufficient storage space is available.
Filling status may e.g. be obtained from reading an item identifier and associating the item identifier with dimensions of the item. The dimensions may also be pre-stored at or retrieved or received by the computer system. The dimensions may also be read from the same label or tag as the first access key (the dimensions may be included in the first access key) or may be determined by the storage container.
An alternative action relates to message transmission to at least one of the consumer and the delivery service provider in dependence on the status of the storage container and/or the status of the delivery/return. For example, a delivery completed status obtained from the storage container may trigger the computer system to initiate transmission of an SMS message to the consumer. The delivery service provider may also be notified, e.g. using system integration. A similar message that may be transmitted from the computer system is that return of the item has been successful. A message may also be gener- ated if delivery is temporarily not possible because of lack of storage space in the storage container.
A message or notification may also be transmitted if an item has not been delivered or picked up for some time, e.g. if the status indicates that a first access key associated with a particular item has not been read by the reader in the storage box .
Yet another message that may be generated relates to a sensor detecting an event at the storage container, e.g. a vibration sensor or a temperature sensor.
In one embodiment, the control system is configured for establishing a return status of the tangible item. The return status indicates that the item is put back into the storage container to be returned. Return status may be established based on detecting conditions of the storage container and/or detect- ing readings of the first access key. In one embodiment, at least one of the following events is used to establish a return status for the item:
- comparing the number of readings of the first access key with a predetermined number, wherein the number of readings is, optionally, the number of readings during a pre-set time interval; - determining a status of the component of the storage box;
- determining which key is used to provide access to the storage container.
Conditions for the storage container, such as detecting opening of the storage container when reading the first access key or an access key of a user, may also assist in establishing the return status of the item. The embodiment facilitates easy return of items (e.g. without having to access the computer sys- tern and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome) .
In one embodiment, the storage container comprises a power source and an activator configured for activating at least one of the reader and the control system. The activator may comprise a button, a proximity sensor or any other means for activating part of the storage container to consume power of the power source. The power source may comprise a battery. Providing the storage container with a power source simplifies
installation of the storage container and enables stand-alone operation. The activator prolongs the duration of the power source .
In one embodiment, the computer system is configured for monitoring and, optionally, updating at least one of a sta- tus of the storage container and a delivery/return status of the tangible item. The status information enables the computer system to take appropriate actions dependent on the status, e.g. to generate and/or release the first access key. The monitoring process keeps track of the contents of the storage container and/or the operation status of the storage container and takes appropriate measures if differences from an expected state are detected, e.g. transmitting a message to a user and/or system operator .
The computer system may log events and status data (e.g. temperature) to generate reports.
In one embodiment, the computer system is configured for receiving at least one characteristic of the tangible item, e.g. one or more dimensions (size) and/or weight of the tangible item, from the storage container. Characteristics of the item (e.g. size information) may be read by the reader from the label, e.g. if size information is contained in the first access key. Other characteristics include temperature and/or any other data that may be sensed by the storage container. The characteristic (s) enables the computer system to take appropriate actions dependent on the characteristic ( s ) , e.g. to transmit a message to the consumer and/or the delivery services provider.
In one embodiment, the computer system further comprises a memory for storing a storage status of the storage container based on at least one characteristic of the tangible item. The computer system may determine the status of the storage container from the received characteristics. It should be noted that this embodiment may be applied independent on how access to the storage container is arranged as disclosed herein.
In one embodiment, the computer system is configured for communicative connection with a web shop or a facilitator. The web site of the web shop may provide an option for the con- sumer to indicate the availability of the storage container for the consumer. The web shop may also have integrated the computer system into its operation and is aware of the availability of a storage container for a particular user of the web shop. The generated first access key is obtained by at least one of the web shop and the facilitator (a party manufacturing labels containing the first access key and, optionally, other information; a delivery service or any other party in the delivery chain) to associate (e.g. attach) the first access key to the tangible item .
In one embodiment, the computer system stores a user account of a user of the storage container. The computer system may have a web site where consumers can set up a user account enabling consumers to indicate the availability of a storage container when online shopping. The user may indicate trusted storage containers (e.g. of neighbours) that may be used e.g. when his own storage container has not sufficient storage capacity. Of course, guest use of a storage container may require approval of the owner of the storage container. A user may also grant access to a storage container associated with his user account to other user. The user account enables a social delivery network .
In one embodiment, the computer system comprises a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or returning of the tangible item. This embodiment facilitates payment of the item after delivery of the item instead of pre-payment.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware em- bodiment, a software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system". Functions described in this disclosure may be implemented as an algorithm executed by a microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable me- dium(s) having computer readable program code embodied, e.g., stored, thereon.
Any combination of one or more computer readable me- dium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electro- magnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a solid-state drive, a random access memory (RAM) , a non-volatile memory device, a read-only memory (ROM) , an erasable programmable read-only memory (EPROM or Flash memory) , an optical fibre, a portable compact disc read-only memory (CD- ROM) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer read- able storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless (using electromagnetic and/or optical radiation), wired, optical fibre, cable, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as
Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on a user's computer (e.g. a user device) or on a
computer facility in a network (e.g. a computer facility in the radio access network system and/or in the core network system), partly on the computer, as a stand-alone software package, partly on the user's computer and partly on a computer facility in the network, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider) .
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart il- lustrations and/or block diagrams, can be implemented by
computer program instructions. These computer program instructions may be provided to a processor, in particular a
microprocessor or central processing unit (CPU), of a general purpose computer, special purpose computer, or other programma- ble data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions /acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other
programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks .
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which com- prises one or more executable instructions for implementing the specified logical function (s) . It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the functions noted in the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware- based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions .
It is noted that the invention relates to all possible combinations of features recited in the claims.
It should be noted that each of the independent claims may be used separately from the access through the key correspondence as disclosed herein.
For example, the disclosure also relates to a storage container comprising a tamper detection sensor, e.g. a vibration sensor, for detecting tampering of the storage container and a communication module for communicating with an external computer system, wherein the communication module is configured for transmitting a notification message to an external computer sys- tern upon detecting tampering the tamper detection sensor.
In particular, the storage container may comprise an on-board power source and the communication module is powered by the power source, optionally upon reading by the tamper vibration sensor.
As another example, a storage container is disclosed comprising an action detector detecting distinguishable actions at the storage container and a communication module for communicating detected actions to an external computer system.
Preferably the actions include one or more of:
- putting an item in the storage container by the
user;
- getting an item from the storage container by the user ;
- putting an item in the storage container by a party other than the user;
- getting an item from the storage container by a
party other than the user.
The storage container may be configured to distinguish actions based on at least one of a key used to get access to the storage container and the state of a component (e.g. a door) of the storage container. Alternatively, actions are communicated to a computer system configured to distinguish between the actions .
As another example, the disclosure also relates to a computer system configured for receiving communication from the communications module of the storage container. The communication may relate to status information, including information from sensors and information from actions as described in the previous paragraphs. BRIEF DESCRIPTION OF THE DRAWINGS
Aspects of the invention will be explained in greater detail by reference to exemplary embodiments shown in the drawings, in which:
FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system;
FIGS. 2A and 2B are embodiments of a storage container and a functional module for the storage container
FIG. 2C provides a schematic illustration of generation of access keys for items and verification of access key correspondence at a storage container;
FIGS. 3A-3D are flow charts illustrating steps of embodiments of delivery and return methods; FIG. 4 is a combined system and flow illustration of system for ordering and return of tangible items; and
Fig. 5 is a schematic block diagram of an embodiment of a general system or element of used in the system, e.g. in the storage container or in the computer system.
DETAILED DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic illustration of an embodiment of an ordering and delivery system 1.
A storage container 2 is provided to a consumer. Storage container 2 will be described in further detail with
reference to FIGS. 2A and 2B. It should be appreciated that a plurality of storage containers may be employed within the system 1.
A key 3 is provided for a consumer to open storage container 2. Key 3 may comprise at least one of a conventional hardware key or an electronic key, as shown in FIG. 1. Storage container 2 stores a pre-programmed key corresponding to the electronic key to enable unlocking of the storage container by the consumer.
The consumer has access to a computer (not shown) to visit a web site of a web shop 4 over the internet 5. The web shop may offer goods, such as tangible item 6. The consumer has also access to a computer system 7 that is associated with the storage container 2. Computer system 7 may have a web site enabling subscription to services related to storage container 2. The subscription process to such services is known as such to a skilled person. The consumer may set preferences in the computer system 7, such as a preferred manner of receiving messages of successful and failed delivery and return (e.g. telephone number and/or e-mail address) . The consumer may also indicate time intervals during which no items can be delivered (e.g. during a holiday) . The consumer may also indicate other storage containers, e.g. in his neighbourhood or of family, that should be considered trusted containers to which delivery of the item is allowed. The consumer may also allow other users to use his storage container 2 and establish a social delivery network. It should be noted that the order of the user does not have to be through a web shop. Item ordering may occur via other channels.
Computer system 7 monitors the status of the storage container 2 and/or the delivery/return of items to/from the storage container 2. The monitoring process keeps track of the contents of the storage container 2 and/or the operation status of the storage container 2 and takes appropriate measures if differences from an expected state are detected, e.g. transmit- ting a message to a user and/or system operator.
The computer system 7 may log events and status data (e.g. temperature) to generate reports.
The system further comprises at least one delivery service provider 8 that provides delivery and return services for tangible item 6.
Storage container 2 may communicate with computer system 7 over a wireless data communication network 9 and,
possibly, internet 5. In one exemplary embodiment, wireless data communication network 9 provides machine-to-machine ser- vices in relation to storage container 2. Storage container 2 may use a local wifi connection or use a telecommunications network .
As shown in FIG. 1, item 6 is associated with a first access key AK1, e.g. by attaching a label to it. The label may comprise a code containing the access key AK1 and further information, e.g. an item identifier and a validity time window.
A private key PK of the storage container is stored in the storage container 2 and is available to the computer system 7 as will be discussed in further detail with reference to FIG. 3A.
FIG. 2A is a schematic illustration of a storage container 2.
Storage container 2 may be a container for home use and may be installed e.g. near the entrance of the home of a con- sumer . Storage container 2 may be placed on a pole, be attached to the house or be integrated in a wall or door of the house. Storage container 2 typically has a volume less than 1 m3 but may be larger (including a storage building that may be entered via a door to which access is provided as disclosed herein) . Storage container 2 may also be used for business use.
As illustrated in FIG. 2A, the storage container may contain multiple storage portions, e.g. a parcel box 20 and a letter box 21. Parcel box 20 has a door 22 hinged to the parcel box that provides access to the parcel box 20. Letter box 21 has a mailbox slot 23 enabling access to the letter box 21. It should be appreciated that storage container 2 may comprise more or less storage portions. Instead of a front-loadable storage container 2 as shown in FIG. 2A, storage container 2 may be top loadable in which case door 22 may be replaced by a lid (not shown) .
Considerations regarding selection of the material for the storage container 2 involve heat resistance, impact resistance, water proof characteristics, etc., dependent on e.g. where the storage box is placed in the home of the consumer and costs. In one embodiment, the outer walls of storage container 2 are made of plastic, e.g. HDPE . Some parts of the storage container 2 comprise metal, e.g. hinges, fasteners etc. The storage container 2 may also be made mainly of metal material.
The front side of the storage container 2, e.g. door 22 and/or mailbox slot 23 may be customizable enabling consumers to give storage container 2 an individual appearance. The walls of the storage container may provide for thermal isolation, e.g. to store hot or cold items 6 within the storage container 2. Storage container 2 may be provided with heating and/or cooling facilities .
Storage container 2 contains a functional module 24 comprising electronic components. Functional module 24 may be easily replaced, e.g. for repair purposes. One or more of the electronic components may be activated using activator 25. Activator 25 may comprise a button to be used when functions of functional module 24 are required. Other types of activators 25 may be used, e.g. a proximity sensor.
Storage container 2 may comprise an indicator 26, e.g. one or more light emitting diodes, to indicate a status of the storage container 2 (e.g. door 22 open or closed) . This status may be translated to a delivery or return status of the item 6. Indicator 2 may comprise noise generating means, e.g. a speaker, to generate an audible signal.
Storage container 2 also contains a battery 27. Battery 27 omits the need to connect storage container 2 to the mains, providing more freedom in installing the storage container 2 at a desired location. Activator 25 may interact with battery 27 to wake up one or more components of functional mod- ule 24. It should be appreciated, however, that storage container 2 may be connected to the mains. Such connection may be facilitated, for instance, when storage container 2 is integrated in a wall of a building.
FIG. 2B is a schematic illustration of a functional module 24 for a storage container 2.
The central component of functional module 24 is control system 30. Other components include reader 31,
communication module 32 and an electromechanical component 33 to provide access to a storage portion 20, 21 of the storage con- tainer, e.g. a servo. In addition, functional module 24 may comprise a memory 34 storing private key PK of the storage container 2. Functional module 24 may comprise or be connected to one or more sensors 35, e.g. to provide safety and/or to report events. One example includes a vibration sensor configured for sensing vibrations of the storage container 2 above a certain threshold being indicative of an attempt to compromise storage container 2. Such an event may be communicated to a user of the storage container 2, e.g. via computer system 7. Another sensor includes a temperature sensor monitoring temperature inside the storage container.
In one particular embodiment, control system 30 includes a key derivation function 36 to generate a second access key AK2 associated with the storage container 2.
Control system 30 may comprise a central processing unit (CPU) comprising circuitry and may be suitably programmed to perform one or more of the steps disclosed herein. Control system 30 also has access to a local clock. Control system 30 includes a key generator 36. Key generator 36 is configured to generate a second access key AK2 associated with the storage container 2. To that end, key generator may employ the private key PK of the storage container 2 from memory 34.
The first access key AK1 may be associated with the item 6. The item may be associated with further information as mentioned above. This information may comprise at least one of an identifier ID of the item 6, a time window indicating valid- ity of the access key AK1 and on or more properties of the item 6 (e.g. dimensions, weight, etc.) . This further information, or parts thereof may have been be used in generating the first access code using an encryption algorithm at the computer system 7. The first access code may comprise a hash of this infor- mation and the private key PK of the storage container 2. The encryption algorithm is an irreversible algorithm as known to a skilled person to avoid recalculation of the input data.
The access key and the other information may be associated with the item 6 as fields of a single code. The code may be programmed on a label attached to the tangible item in a form readable by the reader 31 of the storage container 2.
The key derivation function 36 uses a corresponding encryption algorithm as for generating the first access key. The control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key generated in the storage box.
The reader 31 may read the further information from the item 6 (more particularly, from a label attached to the item 6), such as the item identifier ID, the validity time window and/or the item characteristics. If this information has been used in generating the first access key at the computer system, this information is also used in generating the second access key at the storage container 2.
Furthermore, the validity time window enables tying the first access key AK1 to a particular delivery time interval. After the expiry of the time window, the second access code will not be generated. To that end, the storage container 2 consults its local clock and compares the local clock information with the time interval in order to determine whether or not to generate the second access key.
An access key AK1, AK2 may be valid for a only single item.
The item identifier ID may be a unique identifier for the item.
Reader 31 is configured to read an identifier, e.g. an identifier of an RFID tag or NFC information, associated with the tangible item 6. Reader 31 may comprise an RFID reader and/or an NFC reader.
Communication module 32 is configured to enable communication from the storage container 2 to the computer system 7 via wireless data communication channel 9. Communication module 32 may comprise a modem, e.g. a machine-to-machine modem. The connection enables information, e.g. status information, to be transmitted from storage container 2 to computer system 7. The connection also enables transmission of events detected by one or more sensors to the computer system 7.
Communication module 32 may enable two-way communication with computer system 7. Two-way communication facilitates control actions and/or other information (e.g. software updates, a new second access key AK2, etc.) to be received by storage container 2 from computer system 7.
Electromechanical component 33 comprises a motor to be controlled from control system 30 in order to operate a container component of the storage container, e.g. door 22 and/or mailbox slot 23, to provide access to the corresponding storage portion if control system 30 detects that certain conditions are fulfilled.
FIG. 2C provides a schematic illustration of generation of access keys AK1, AK2 for delivery and return purposes of items 6 and verification of access key correspondence at a storage container 2.
Third party 8 provides computer system 7 with information regarding an intended delivery or return of an item 6. Said information may comprise a time window T J J for delivery and/or return and/or item characteristics CCCCCC .
Computer system 7 generates a first access key AK1 using this information and private key PK securely stored in the computer system 7 in association with the storage container 2 using a key derivation function KDF. The first access key AK1 is provided to third party 8.
Third party 8 provides a label L using e.g. label printer LP. Said label L contains the information concerning the time window, the item characteristics and the generated access key AK1. This information forms a code TTTTT-CCCCCC-AK1.
Label L may subsequently be scanned using reader 31 provided in storage container 2. Control system 30 comprises a key derivation function KDF using the read information of the time window T J J and the item characteristics CCCCCC and private key PK from secure memory 34 to obtain a second access key AK2. Control system 30 compares the read first access key AK1 from label L with the generated second access key AK2. If
AK1=AK2, access is provided to storage container 2.
FIGS. 3A and 3B are flow charts illustrating steps of performing a delivery method using storage container 2.
In step SI, a consumer orders a tangible item 6 at a web shop 4. It is assumed that the consumer has a storage container 2 and is registered as such with computer system 7.
During ordering tangible item 6 at the web site of web shop 4, the consumer may e.g. indicate availability of a storage container 2 for delivery of the item 6.
In step S2, computer system 7 is informed of the order and generates a first access key AK1. Since the consumer has a subscription with computer system 7, computer system 7 has stored a private key PK of the storage container 2. The private key PK has been used in generating AK1.
In step S3, computer system 7 sends the first access key AK1 to delivery service provider 8 (or any other party in the delivery chain) . Delivery service provider 8 is responsible for delivery of item 6 ordered by the consumer via web shop 4 to the consumer. Delivery service provider 8 may e.g. attach identifier AK1 to the tangible item 6, e.g. by attaching an RFID label containing AK1.
In step S4, an employee of delivery service provider 8 exposes the first access key AK1 to reader 31. The employee may first have activated storage container 2 using activator 25. Control system 30 receives AK1 and determines whether access should be provided to storage container 2 on the basis of AK1 to allow the employee to store the item 6 in the storage container 2.
Step S5 involves the control system 30 comparing the received first access key AK1 with a second access key AK2 of the storage container 2. Second access key AK2 is generated using private key PK stored locally in memory 34 and key
generating function 36. If it is determined that the first access key AK1 corresponds to the second access key AK2, control system 30 controls electromechanical component 33 to provide access to e.g. storage portion 20, e.g. by operating a lock of the door 22. If the first access key AK1 is found not to be related to the second access key AK2, no access is provided to the storage container 2.
It should be noted that data communication network 9 may be employed to have online authorization, comparing AK2 generated at the storage container 2 with AK1 stored in the
computer system 7 and transmitting an approval signal to the storage container if AK2 received from the storage container 2 matches with AK1 stored at the computer system 7. It should be noted that this embodiment in fact does not require a first access key AK1 to be applied to the item 6; only the further information (e.g. an item identifier) would be sufficient for the computer system to derive the first access key AK1.
Once the employee has obtained access to the storage container 2, he puts the item into the storage portion and closes the storage container 2 again (step S6) . This event may be detected by the control system 30 triggering the control system 30 to transmit a status update to the computer system 7 via communication module 32. Computer system 7 may update the status of the storage container 2 stored therein, e.g. by
registering that the storage container contains item 6. The status may also include a filling status indicating e.g. the re- maining volume of the storage container or storage portion.
Delivery of the item may be confirmed from the computer system 7, e.g. using SMS, to at least one of the consumer (who may have selected this option when registering with the system 7 in addition to providing e.g. a telephone number or e-mail address to deliver the confirmation message) and the delivery service provider 8.
In one exemplary embodiment, the event of completion of delivery is only triggered if the storage container 2 is locked appropriately. The appropriate delivery may be signalled by in- dicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate delivery may be signalled by red light.
It should be clear from the above description, that the consumer does not need to be present or involved for delivery of the item 6 after ordering the item at the web shop 4. If the consumer arrives, he may simply operate any of the keys 3 to open the storage container and get the item 6. Electronic key 3 may e.g. contain a key corresponding to a pre-programmed key stored memory 34 of the storage container 2.
Computer system 7 may be informed of the event of item 6 being retrieved from the storage container 2 and update the storage container status (e.g. the filling status is set to empty) contained therein accordingly. This retrieval event may e.g. be detected from detecting use of the electronic key 3 of the user or from any other sensor, e.g. sensing opening of door 22 again after closing by the employee of the delivery service provider .
FIG. 3B illustrates a flow chart comprising similar steps as in FIG. 3A. Only, step 5 comprises a step S5a wherein time window information obtained from item 6 is checked against clock information available to control system 30 in order to determine whether or not the second access key AK2 may be
generated. If the current time falls within the time window, the access key AK2 is generated in step S5B. If not (not shown) , then AK2 is not generated and access to the storage container will not be granted. Such failed delivery may be
communicated to computer system 7 which may trigger one or more of the actions disclosed herein
It is now assumed that the consumer desires to return item 6. FIG. 3C illustrates some steps for returning the item 6 using the storage container 2.
Various methods have been envisaged for returning item 6. In one method, the consumer visits the web site of web shop 4 and indicates that he desires to return item 6 (S10) . Again, the consumer may indicate availability of storage container 2. The consumer may then put back item 6 in the storage container 2. Web shop 4 communicates this event to computer system 7.
Alternatively, the consumer opens the storage container using the key 3. This event may be detected by computer system 7. In addition, information associated with the item 6 may be read by reader 3. It should be appreciated that if the access key AK was a time-constrained access key, AK1 is of no use in opening storage container 2. However, the further information (e.g. an item identifier ID and/or item characteristics) may still be read. It may also be detected that the reading by reader 30 occurred some time after a previous reading and/or a previous opening of storage container 2.
In one embodiment the intended return may be established on the basis of the number of readings of the first access key AK and comparing this with a predetermined number by control system 30. For example, a first reading of AK1 is likely to be reading when item 6 was delivered. The second reading may have occurred when item 6 was taken out of the storage container 2 by the consumer. A third reading would indicate an intended return such that a return status may be established and registered in computer system 7.
Control system 30 may apply a time interval to avoid unintended reading of the first access key or unintended establishment of the return status. In the above mentioned example, if the third reading occurs (very) shortly after the second reading, this third reading is less likely to indicated an intended return of the item, whereas a third reading after a certain amount of time (e.g. more than five minutes) may indicate an intention to return the item. Other conditions for the storage container, such as detecting opening of the storage container when reading the first access key, may also assist in establishing the return status of the item 6. The embodiment facilitates easy return of items (e.g. without having to access the computer system and indicate that a certain item should be picked up from the storage container, which is also an option but more troublesome) .
As an alternative, tern 6 may contain another access key , e.g. a dedicated return key AKr, that should be used if the item 6 is to be returned. The return key AKr may be obtained us- ing a time window different from the time window used in
generating the delivery access key AK1 Computer system 7 may store this code. If the return key AKr is received, the computer system 7 is informed that the item 6 is stored in the storage container 2 for return purposes. Computer system 7 may update the storage container status again, e.g. the filling status. Computer system 7 may generate and/or release a new first access key in response to detecting establishment of a return status for an item.
Detection of the event is performed in step Sll. In- formation on the event is transmitted to computer system 7 in step S12. It should be noted that the decision of establishing a return status for an item is preferably taken at the computer system 7.
When computer system 7 is informed that item 6 is to be returned, a new first access key AK1 is generated (step S13), again possibly using a validity time window. Computer system 7 transmits the new first access key AK1 and delivery service provider 8 obtains the identifier. In step S14, the employee exposes the new first access key AK to the reader 31. If the new first access key AK1 corresponds to the second access key AK2 generated in a manner similar as for delivery, storage container 2 opens and the employee gets access to the item 6 stored therein previously by the consumer.
The computer system 7 may be informed of the retrieval of the item 6 via communication module 32 and data network 9 and update the storage container status (e.g. the filling status) . Computer system 7 may also inform at least one of the customer and the delivery services provider 8 of the successful return. Again, the event of successful return may be triggered only if the storage container 2 is locked appropriately. The appropriate return may be signalled by indicator 26, e.g. by green light emitted by light emitting diodes. Inappropriate return may be signalled by red light.
FIG. 3D is a flow chart depicting some steps at the storage container 2 and computer system 7 for an exemplary case wherein the customer orders three items 6A, 6B, 6C with one or several web shops 4 (step S20) . Items 6A, 6B, 6C may be delivered by one or more delivery service providers 8.
The combined volume of items 6A, 6B and 6C exceeds the storage capacity of storage container 2. This information, i.e. at least one of the dimensions of each of the items 6A, 6B, 6C and the total volume of the combination of these items is available to the computer system 7. A similar case may be envisaged for other properties of the items, e.g. weight and/or items that should not be stored with each other for other reasons, including safety reasons, food preservation reasons, etc.
In one variant, illustrated by the left branch of FIG. 3D, web shop 4 informs computer system 7 of the dimensions of an item 6A, 6B, 6C once the customer orders the item (step S21) . Computer system 7 may e.g. generate first access keys AK1A, AK1B for items 6A and 6B respectively in step S22, but not generate the identifier AK1C for item 6C, recognizing from the known dimensions of both the storage container 2 and the items 6A-6C that item 6C may not fit into the storage container 2 together with items 6A and 6B. It is noted that customers may prioritize delivery of certain items and that computer system 6 may take such priority settings into account when deciding which identifiers to generate (and, consequently which items will be
delivered) . Of course, computer system 7 may still generate the identifiers, e.g. identifier AK1C, but not release the identi- fier for delivery purposes.
In step S23, an employee of delivery service provider 8 exposes access keys AK1A and AK1B (and possibly the further information) to reader 31. If at least one of these access keys AK1A, AK1B is found to correspond to corresponding second access keys AK2A, AK2B generated in the storage container 2, the employee gets access to storage container 2. Computer system 7 will update the status of the storage container 2 accordingly. For example, the filling status may be updated to indicate the remaining storage capacity of storage container 2 now that both items 6A, 6B are stored therein.
In step S24, the customer opens storage container 2 using one of the keys 3 and gets the items 6A and 6B from storage container 2. The status of the storage container 2 is automatically updated in computer system 7 via communication module 32 controlled by control system 30. Now that items 6A and 6B have been retrieved from the storage container 2, computer system 7 may generate or release the identifier AK1C for item 6C since storage container 2 now has sufficient storage capacity to contain item 6C.
In another variant, illustrated by the right branch of
FIG. 3D, delivery service provider 8 attaches further information regarding item dimensions to the item 6, e.g. using a label (possibly the same label as for the first access key AK1C) that may be read by reader 31 of the storage container. This information may be obtained from web shop 4. Computer system 7 may already have generated first access keys AK1A, AK1B and AK1C for items 6A-6C respectively. The further information regarding dimensions of the item has not been used in deriving the first access keys AK1A, AK1B, AK1C.
An employee of delivery service provider 8 delivering item 6C may first arrive at the storage container 2. Reader 31 reads first access key AK1C and information regarding the dimensions of the item 6C (step S25) . If the first access key AK1C corresponds to AK2C generated in the storage container 2, item 6C may be stored successfully in the storage container 2. In step S26, the information regarding the dimensions of item 6C is transmitted to the computer system 7, e.g. in response to finding successful delivery by control system 30. Computer system 7 may update a filling status of storage container 2 in its records .
Next, in step S27, an employee of a different service provider arrives with item 6A. Reader 31 reads AK1A and dimension information of item 6A. If item 6A is successfully
delivered, the dimension information of item 6A is transmitted to computer system 7 in step S28. Again, computer system 7 may update the storage container status, e.g. the filling status.
Computer system 7 may determine that insufficient storage space remains for a delivery service provider 8 delivering item 6B. This status remains until the customer has retrieved at least one of the items 6A, 6C and has not put in another item (e.g. an item to be returned) . Accordingly, computer system 7 may inform delivery service provider that item 6B cannot be delivered.
Also, customer 7 may be informed of the event.
In yet another variant, computer system 7 has access to information regarding dimensions of the items, e.g. in a memory (e.g. a database) or via a connection to a web shop 4. If an item is delivered to the storage container 2, the storage container 2 may forward an item identifier ID associated with the item in steps S26 and S29. Computer system 7 may find the corresponding dimension information using the received identifier and update the storage container status.
In each of the above embodiments, computer system 7 may comprise a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or re- turning of the tangible item. This embodiment facilitates payment of the item after delivery of the item instead of prepayment or as soon as the item is registered as being returned. As mentioned previously, events at the storage container 2 may be detected, either at the storage container 2 itself or at the computer system 7.
If a user puts an item 6 in the storage container 2, originally, the storage container 2 is closed and item 6 is not in the storage container 2. If storage container 2 is closed and the user wants to put the item in the storage container, the label attached to the item 6 is read by the reader 31. Since the storage container was detected to be closed, item 6 could not have been within the storage container 6. In a next step, the storage container 2 is opened using user key 3 (which can be distinguished from reading the label on item 6) . The user may then put the item 6 in the key and close the storage container 2 (which can be detected) . A renewed scan of the label of item 6 after some time is with item 6 stored with the storage container 2.
Similary, an event of getting item 6 from the storage container 2 can be detected using the following steps:
1) read label of item 6 with storage container 2 closed : item 6 is in the storage container 2 ;
2) detect opening storage container 2 with user key 3 ;
3) detect closing of storage container 2 ;
4) if label of item 6 is read after some time, the item 6 is not in the storage container 2.
Similarly, an event of putting an item 6 in the storage container by another party than the user can be detected using the following steps:
1) read label of item 6 with container closed; item 6 is not in storage container 2 ;
2) detect opening storage container 2 with first access key AK1;
3) detect closing of storage container 2 ;
4) reading label of item 6 after some time: item 6 is in the storage container 2.
Similarly, an event of getting an item from the storage container 2 by another party than the user can be detected using the following steps: 1) read label with container closed; item 6 is in storage container 2 ;
2) detect opening storage container 2 with first access key AKl;
3) detect closing of storage container 2;
4) reading label after some time: item 6 is not in the storage container 2.
FIG. 4 is a schematic illustration of another delivery and return system for an item 6.
Storage container 2 comprises a functional module 24 comprising communication and locking functions. Functional module 24 may comprise the following components: a microprocessor, a power source (battery), light emitting diodes, a sound producing component, an RFID/NFC reader or scanner 31, a
transmission/receiving component, a servo component, a locking component, an on/off switch, a vibration sensor and a secure memory for storing the private key PK . In addition, a power charger may be provided. All components are housed in a housing providing the functional module 24.
Storage container 2 comprises a lockable space of particular dimensions suitable for safe and dry storage of postal packages 6. The storage container 2 may or may not comprise a separate lockable space for receiving mail, e.g. registered mail .
Computer system 7 comprises an online platform provided with a data processing system DAT. Computer system 7 provides a user interface for users of the online platform. Users may manage a subscription (an account), manage access settings to the account, set user preferences and/or activate an electronic key 3.
The online platform 7 is configured to generate unique access keys, AKl, using key generator AK-GEN. The generated keys AKl enable access to a particular storage container 2 at a particular day during a certain time interval. The time inter- val may e.g. span a maximum of 4 hours, 2 hour, 1 hour. The unique key AKl may be generated using time constrained key technology and may or may not be provided with a physical unclonable function. AKl may be provided, e.g. programmed, on an RFID/NFC label 40. RFID label 40 may be printed at a production site 41 comprising an RFID/NFC printer 42 and/or an RFID/NFC writer 43. The production site 41 may also provide, e.g. program, elec- tronic key 3. Key 3 may or may not be provided with a physical unclonable function.
Production site 41 may also produce return RFID/NFC labels 44 programmed with a new first access key AKl to enable unlocking of a storage container 2 to pick up an item 6.
Online platform 7 may comprise a parcel management system PMS for managing delivery and return of items 6. Online platform 7 also comprises pay-after-delivery/pay-back-after-return module PAY.
Wireless data network 9 enables data transmission from storage container 2 to online platform 7. Further information and status information may be transmitted over the wireless data network 9. Wireless data network 9 may also be used to communicate with other parties, e.g. maintenance services providers. Wireless data network may allow two-way communication.
Online platform 7 has access to the internet 5 in order to enable communication with web shops 4, service providers 8 (see FIG. 1) and users of storage containers 2. Service providers 8 and/or production site 41 may verify via the internet 5 whether or not the consumer has a subscription via an API/web service of online platform 7 and whether any restrictions apply (e.g. temporal unavailability due to lack of storage space or holiday period) . If the user has a subscription and no restrictions apply, the generated key AKl may be transmitted to a relevant party, e.g. production site 41.
Online platform 7 also comprises a message transmission module MSG to transmit messages or notifications, e.g. SMS messages or e-mail messages. Messages and notifications may be transmitted via a telecommunications network 45.
Fig. 5 is a block diagram illustrating an exemplary control system 30 or a data processing system DAT in computer system 7. Data processing system 50 may include at least one processor 51 coupled to memory elements 52 through a system bus 53. As such, the data processing system 50 may store program code within memory elements 52. Further, processor 51 may exe- cute the program code accessed from memory elements 52 via system bus 53. In one aspect, data processing system 50 may be implemented as a computer system that is suitable for storing and/or executing program code. It should be appreciated, however, that data processing system 50 may be implemented in the form of any system including a processor and memory that is capable of performing the functions or steps described within this specification .
Memory elements 52 may include one or more physical memory devices such as, for example, local memory 54 and one or more bulk storage devices 55. Local memory may refer to random access memory or other non-persistent memory device (s) generally used during actual execution of the program code. A bulk storage device 55 may be implemented as a hard drive or other persistent data storage device. The data processing system 50 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from bulk storage device 55 during execution.
Input/output (I/O) devices depicted as input device 56 and output device 57 optionally can be coupled to the data processing system 50. Examples of input devices may include, but are not limited to, for example, a keyboard, a pointing device such as a mouse, a touch screen, or the like. Examples of output device may include, but are not limited to, for example, a monitor or display, speakers, or the like. Input device 56 and/or output device 57 may be coupled to data processing system 50 either directly or through intervening I/O controllers. A network adapter 58 may also be coupled to data processing system 50 to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter 58 may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to said data processing system 50 and a data transmitter for transmitting data to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapters that may be used with data processing system 50.
As pictured in Fig. 5, memory elements 52 may store an application 59. It should be appreciated that data processing system 50 may further execute an operating system (not shown) that can facilitate execution of the application. Applications, being implemented in the form of executable program code, can be executed by data processing system 50, e.g., by processor 51. Responsive to executing the application 59, the data processing system 50 may be configured to perform one or more operation as disclosed in the present application in further detail.
In one aspect, for example, data processing system 50 may represent a data processing system DAT of central computer 7 performing one or more of functions using one or more applications 59.
It is noted that the method has been described in terms of steps to be performed, but it is not to be construed that the steps described must be performed in the exact order described and/or one after another. One skilled in the art may envision to change the order of the steps and/or to perform steps in parallel to achieve equivalent technical results.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, un- less the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising, " when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. Various embodiments of the invention may be implemented as a program product for use with a computer system or a processor, where the program(s) of the program product define functions of the embodiments (including the methods described herein) . In one embodiment, the program(s) can be contained on a variety of non- transitory computer-readable storage media (generally referred to as "storage"), where, as used herein, the expression "non- transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a
transitory, propagating signal.
In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.

Claims

1. A storage container for storing at least one tangible item, wherein the tangible item is associated with a first access key and the storage container is associated with a second access key, wherein the storage container comprises;
- a container component providing access to a storage portion of the storage container;
- a reader configured for reading the first access key of the tangible item;
- a control system configured for controlling the com- ponent to provide access to the storage portion when the first access key read by the reader of the storage container corresponds to the second access key associated with the storage container.
2. The storage container according to claim 1, wherein the storage container further comprises a generator for generating the second access key using a private key of the storage container and wherein the control system is configured for controlling the component when the first access key associated with the item corresponds to the second access key
generated in the storage box.
3. The storage container according to claim 1 or 2, wherein the reader further receives from the tangible item at least one of an item identifier, a validity time window, and an item property and the control system applies at least one of the item identifier, the validity time window and the item property to generate the second access key.
4. The storage container according to one or more of the preceding claims, wherein the storage container comprises a communication module configured for communicating with an external computer system, wherein the control system is configured for generating status information to be transmitted with the communication module to the external computer system and wherein, optionally, the status information is related to at least one of a status of the storage container and a delivery/return status of the tangible item.
5. The storage container according to one or more of the preceding claims, wherein the control system is configured for determining a return status of the tangible item, wherein determining a return status optionally comprises at least one of:
- comparing the number of readings of the first access key with a predetermined number, wherein the number of readings is, optionally, the number of reading during a pre-set time interval;
- determining a status of the component of the storage box;
- determining which key is used to provide access to the storage container.
6. The storage container according to one or more of the preceding claims, wherein the storage container comprises a power source and an activator configured for activating at least one of the reader and the control system.
7. The storage container according to one or more of the preceding claims, wherein the storage container comprises a tamper detection sensor, wherein the storage container is configured for notifying an external computer system of detecting tampering of the storage container.
8. The storage container according to one or more of the preceding claims, wherein the storage portion comprises a mailbox for registered items, e.g. registered mail or registered parcels .
9. A computer system configured for use with at least one storage container according to one or more of the preceding claims, further comprising a generator for generating the first access key for the tangible item enabling at least one of delivery of the tangible item to the storage portion and returning of the tangible item from the storage portion of the storage container .
10. The computer system according to claim 9, wherein the generated first access key is generated using a private key of the storage container and, optionally, at least one of an item identifier, a validity time window, and an item property of the item.
11. The computer system according to one or more of the claims 8-10, wherein the computer system is configured for monitoring the storage container and, optionally, updating at least one of a status of the storage container and a delivery/return status of the tangible item.
12. The computer system according to one or more of the claims 7-11, wherein the computer system is configured for receiving from the storage container at least one characteristic of the tangible item, e.g. one or more dimensions of the tangible item.
13. The computer system according to one or more of the claims 7-12, wherein the computer system further comprises a memory for storing a storage status of the storage container based on at least one characteristic of the tangible item.
14. The computer system according to one or more of the claims 7-13, wherein the computer system is configured for communicative connection with a web shop.
15. The computer system according to one or more of the claims 7-14, wherein the computer system stores a user ac- count of a user of the storage container, wherein, optionally:
- the user account can be associated by the user to a plurality of storage containers; and/or - the user account may indicate availability of the storage container for another user.
16. The computer system according to one or more of the claims 7-15, wherein the computer system comprises a payment module configured for generating a payment signal in response to receiving status information from the storage container indicating at least one of delivery of or returning of the tangible item .
17. A method for at least one of delivery to and returning from a storage container a tangible item, the storage container being associated with a second access key, the method comprising the steps of:
- obtaining a first access key associated with the tangible item;
- exposing the first access key to a reader of the storage container;
- obtaining access to a storage portion of the storage container when the first access key relates to the second access key;
- putting the tangible item in the storage portion and/or getting the tangible item from the storage portion .
18. The method according to claim 16, wherein the first access key is a time-restricted identifier, the method comprising the step of exposing the first access key to the reader while meeting time restrictions of the time restricted identifier.
19. A storage container comprising a tamper detection sensor, e.g. a vibration sensor, for detecting tampering of the storage container and a communication module for communicating with an external computer system, wherein the communication module is configured for transmitting a notification message to an external computer system upon detecting tampering the tamper detection sensor.
20. The storage container according to claim 19, wherein the storage container comprises an on-board power source and the communication module is powered by the power source, op- tionally upon reading by the tamper vibration sensor.
21. A storage container comprising an action detector detecting distinguishable actions at the storage container and a communication module for communicating actions to an external computer system, wherein actions include one or more of:
- putting an item in the storage container by the
user ;
- getting an item from the storage container by the user;
- putting an item in the storage container by a party other than the user;
- getting an item from the storage container by a
party other than the user.
22. The storage container according to claim 21, wherein the storage container distinguishes action based on at least one of a key used to get access to the storage container, the state of a component (e.g. a door) of the storage container.
23. A computer system according to one or more of the claims 19-22, wherein the computer system is configured for receiving communication from the communications module of the storage container.
PCT/NL2015/050293 2014-05-15 2015-04-30 Storage container, computer system and method for delivering and returning a tangible item WO2015174829A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL2012817A NL2012817B1 (en) 2014-05-15 2014-05-15 Storage container, computer system and method for delivering and returning a tangible item.
NL2012817 2014-05-15

Publications (1)

Publication Number Publication Date
WO2015174829A1 true WO2015174829A1 (en) 2015-11-19

Family

ID=51541247

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NL2015/050293 WO2015174829A1 (en) 2014-05-15 2015-04-30 Storage container, computer system and method for delivering and returning a tangible item

Country Status (2)

Country Link
NL (1) NL2012817B1 (en)
WO (1) WO2015174829A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017138825A1 (en) * 2016-02-08 2017-08-17 Юрий Иванович ДРОБОТЯ Individual foldable delivery container and home delivery system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015758A2 (en) * 2000-08-25 2002-02-28 Bearbox Ltd. Secure unattended delivery system
US20020147919A1 (en) * 2001-02-03 2002-10-10 Gentry Daniel W. Secured delivery system for unattended receiving and shipping of parcels and letters

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015758A2 (en) * 2000-08-25 2002-02-28 Bearbox Ltd. Secure unattended delivery system
US20020147919A1 (en) * 2001-02-03 2002-10-10 Gentry Daniel W. Secured delivery system for unattended receiving and shipping of parcels and letters

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017138825A1 (en) * 2016-02-08 2017-08-17 Юрий Иванович ДРОБОТЯ Individual foldable delivery container and home delivery system and method

Also Published As

Publication number Publication date
NL2012817B1 (en) 2016-03-02

Similar Documents

Publication Publication Date Title
US11144873B2 (en) Package management system with accelerated delivery
US10643415B2 (en) Package management system with accelerated delivery
US11695780B2 (en) Automated delivery security system
EP3433838B1 (en) Automated locker system and method for delivery and collection of packages
CA3002197C (en) Methods and systems for ensuring secure delivery of parcels using internet-enabled storage receptacle
CN108171896B (en) Compartment specific access authorization information
US11659145B2 (en) Event identification and notification via an automation hub
US10915856B2 (en) Package management system with accelerated delivery
US11270251B2 (en) Package management system with accelerated delivery
US20150371468A1 (en) Delivery and collection apparatus, method and system
CN106375091B (en) Establishing a communication link to a user equipment via an access control device
US20150235490A1 (en) Access Code Administration and Sharing
GB2522287A (en) Delivery and collection apparatus, method and system
CN106256115A (en) Express delivery safe deposit box and utilize its express delivery to get method and cipher authentication method
US20150235172A1 (en) System and Method for Detecting Potentially Unauthorized Access to an Enclosure
JP2021504617A (en) Systems, methods, and equipment to secure deliveries
KR20120086614A (en) Auto locker and control method of the same
KR20160049281A (en) Remote delivery control system using each household parcel locker
KR102149729B1 (en) A parcel service management system for occupants of buildings with smartphone parking location and one-pass system
NL2012817B1 (en) Storage container, computer system and method for delivering and returning a tangible item.
US11830331B2 (en) Secured container for storing a package
JP2014148850A (en) Delivery article reception box and delivery system
KR102211777B1 (en) A password reused iot-control system and method it
CA3167739A1 (en) Systems and methods for coordinating secure delivery of goods

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15728200

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15728200

Country of ref document: EP

Kind code of ref document: A1