Ad-hoc parcel delivery drop zone and hotspot

ABSTRACT

Aspects of the present invention provide an approach for delivering an item to a target recipient. A mobile guardian device at a first location comprises a wireless communication system. The guardian device is further protected against unauthorized removal from the first location. An item that is delivered to a second location within a communication reach of the guardian device is detected the item by the guardian device. The item is registered with the guardian device, activating an item protection status in which an unauthorized removal of the item from the second location is detected. An authorized removal of the item from the second location is enabled in response to a communication between the guardian device and a removal authentication device.

TECHNICAL FIELD

The subject matter of the invention relates generally to delivering anitem, like a parcel, to a target recipient. The invention relatesfurther to a system for delivering an item to a target recipient, and arelated computer program product.

BACKGROUND

When delivering mail—like letters or parcels—the last mile is often themost expensive, most time-consuming and most troublesome, both, for adelivery service, as well as for the recipient. The delivery servicepersonnel may not reach the recipient because the recipient is notpresent at the recipient's address or there may be a long distancebetween a place for leaving the delivery vehicle and the finaldestination address.

Series of ideas have been envisioned to improve the situation, e.g., bydelivering via a robot or a drone which make the delivery or by usingstationary storage boxes from which the recipient may pick up his parcelor letter at any convenient time. However, all of the solutions requirecomplex technical and mechanical equipment in order to safeguard parcelswhich have not yet been delivered to the final destination, i.e., therecipient.

There are several disclosures related to a method for delivering an itemto a target recipient.

Document US 2015/0186840 A1 discloses an electronic smart lockercompartment used for convenient and secure delivery and retrieval ofparcels. Each locker station may include a set of individual lockers ofvarious sizes, each with an electronically controlled door latch.

Document US 201510120601 A1 discloses a parcel delivery system includinga parcel block system for receiving and storing parcels and a portableelectronic device used by a person who delivers parcels to the parcellocker. A portable electronic device operated by an intended recipientof the parcel is also used. Encoded tags may be affixed to parcels, andthe parcel locker system may comprise a number of individual parcellockers and the controller device for controlling access to the lockers.

One of the disadvantages of these known solutions may be in therequirement to have lockers to store and protect individual parcels.Such locker systems are heavy and not easy to transport from one placeto another. Typically, these locker systems must be located at a fixedplace.

Accordingly, there may be a need to simplify the method for deliveringparcels to recipients. Such a method and system may be usable by a humanbased delivery process, as well as an automated delivery process. And itmay be highly flexible in space and time.

SUMMARY

According to one aspect of the present invention, a method fordelivering an item to a target recipient may be provided. The method maycomprise detecting, by a mobile guardian device positioned at a firstlocation, an item delivered to a second location that is within acommunication reach of the guardian device. The method may also compriseregistering the item on the guardian device via a communication betweenan identifier on the item and the guardian device. The method may alsocomprise activating an item protection status in which an unauthorizedremoval of the item from the second location is detected by the guardiandevice. The method may also comprise enabling, in response to receipt ofa removal authentication signal from the target recipient by theguardian device, an authorized removal of the item from the secondlocation by the guardian device. This method offers several advantages,such as, but not limited to, a secure, automated way to deliver items tomany different locations.

The method may optionally further comprising sending, by the guardiandevice, a set of global positioning system coordinates corresponding tothe first location to a delivery service management system. Thesetechniques enable, for example, the ability to establish a new locationfor the global positioning system.

The method may optionally further comprise detecting, by the guardiandevice, whether an unauthorized removal of the guardian device from thefirst location has occurred; detecting, by the guardian device, whethera number of recognized removal authentication devices exceeds apredetermined threshold number in an area of the communication reach;and triggering an alarm in response to any of: an unauthorized removalof the item from the second location, an unauthorized removal of theguardian device from the first location has occurred, or that a numberof recognized removal authentication devices exceeds a predeterminedthreshold number in an area of the communication reach. These techniquesenable, for example, the ability to secure both the item and theguardian device in several different ways.

The method may optionally further comprise embodiments in which thedetection of whether an unauthorized removal of the guardian device fromthe first location has occurred further comprises: monitoring the globalpositioning coordinates of the guardian device; monitoring a motionsensor; and activating the alarm upon unauthorized removal. Thesetechniques enable, for example, the ability to secure the mobileguardian using multiple sensing solutions.

The method may optionally further comprise receiving the removalauthentication signal from a removal authentication device associatedwith the target recipient, wherein the removal authentication signalcontains a removal code. These techniques enable, for example, theability to validate a target recipient removing an item.

The method may optionally further comprise forwarding to the removalauthentication device directions to the guardian device. Thesetechniques enable, for example, the ability to change a location of theguardian device and to provide current directions to the targetrecipient.

The method may optionally further comprise detecting a new identifier bythe guardian device; sending from the guardian device a drop activationrequest to the removal authentication device; and confirming a droppingof a new item with the new identifier in the communication reach of theguardian device. These techniques enable, for example, the ability tomanage multiple items by the guardian device.

The method may optionally further comprise embodiments in which theguardian device comprises a camera adapted for monitoring thecommunication reach of the guardian device, and the enabling of theauthorized removal is activated by a face recognition system. Thesetechniques enable, for example, the ability to identify targetrecipients using facial recognition.

According to another aspect of the present invention, a mobile guardiandevice for delivering an item to a target recipient may be provided. Theguardian device may comprise a wireless communication system, configuredto: detect an item delivered to a second location that is within acommunication reach of the guardian device; and register the item on theguardian device via a communication between an identifier on the itemand the guardian device; and an item protection system configured to:activate an item protection status in which an unauthorized removal ofthe item from the second location is detected; and enabling, in responseto receipt of a removal authentication signal from the target recipient,an authorized removal of the item from the second location.

Furthermore, embodiments may take the form of a computer program productfor controlling delivery of an item to a target recipient, the computerprogram product comprising a computer readable storage medium, havingprogram instructions embodied therewith, the program instructions beingexecutable by one or more computing systems associated with a mobileguardian device to cause the one or more computing systems to: detect,at a first location occupied by the guardian device, an item deliveredto a second location that is within a communication reach of theguardian device; register the item via a communication between anidentifier on the item and the guardian device; activate an itemprotection status in which an unauthorized removal of the item from thesecond location is detected; and enable, in response to receipt of aremoval authentication signal from the target recipient, an authorizedremoval of the item from the second location by the guardian device.

BRIEF DESCRIPTION OF THE DRAWINGS

It should be noted that embodiments of the invention are described withreference to different subject-matters. In particular, some embodimentsare described with reference to method type claims whereas otherembodiments have been described with reference to apparatus type claims.However, a person skilled in the art will gather from the above and thefollowing description that, unless otherwise notified, in addition toany combination of features belonging to one type of subject-matter,also any combination between features relating to differentsubject-matters, in particular, between features of the method typeclaims, and features of the apparatus type claims, is considered as tobe disclosed within this document.

The aspects defined above and further aspects of the present inventionare apparent from the examples of embodiments to be describedhereinafter and are explained with reference to the examples ofembodiments, but to which the invention is not limited.

Preferred embodiments of the invention will be described, by way ofexample only, and with reference to the following drawings:

FIG. 1 shows a flow diagram of an embodiment of the inventive method fordelivering an item to a target recipient.

FIG. 2 shows a block diagram of a graphical representation of the dropzone, the guardian device and a plurality of parcels with identifiers.

FIG. 3 shows a block diagram of a top few of the drop zone.

FIG. 4 shows a block diagram of an embodiment of several components ofthe system for delivering an item to a target recipient.

FIG. 5 shows a block diagram of an embodiment of the guardian device.

FIG. 6 shows a block diagram of an embodiment of a computer systemsuitable for controlling delivery of an item to a target recipient.

DETAILED DESCRIPTION

In the context of this description, the following conventions, termsand/or expressions may be used:

The term ‘item’ may denote something a recipient should receive by wayof a delivery service, such as a physical mail service, a parceldelivery service or the like. In this sense, the item may include aparcel, a letter or any other physical item. It may be noted that in thecontext of this document the terms item and parcel may be used assynonyms.

The term ‘target recipient’ may denote the intended receiving person ororganization of the parcel to be delivered. The organization may berepresented by a receiving person.

The term ‘guardian device’ may denote a physical device equipped with atleast one wireless communication interface. The guardian device may alsobe denoted as mobile guardian device because of its character to beplaced anywhere. The primary wireless communication capabilities mayhave the reach of several meters around the guardian device. It maydetect an identifier via, e.g., the Bluetooth communication standard(e.g., Bluetooth 4.0 or higher), a Wi-Fi communication connection, or bynear future communication (NFC, e.g., RFID-based). Alternativecommunication methods between the guardian device and the identifier maybe used, e.g., optical, infrared and so on (using, e.g., a barcode or aQR code). Additionally, the guardian device may be equipped optionallywith a secondary communication interface for a long-range mobilecommunication. Furthermore, the guardian device may have regularcomputing capabilities including a central processing unit (CPU), randomaccess memory (RAM) and a long-term storage. The guardian device may beadapted to execute software programs and it may have a power supply.

The protection zone, or drop zone, may denote the area of or an areawithin the primary wireless communication capabilities. By default, thecommunication reach may—in this document—relate to the primary wirelesscommunication capabilities.

The term ‘second location’ may denote—in contrast to the first locationwhere the mobile guardian device is positioned—a position of the item.The second location may lie in the protection zone of the guardiandevice, in the communication reach of the primary wireless communicationcapabilities.

The term ‘item protection status’ may denote a mode of operation of theguardian device in which the guardian device may supervise that theitems equipped with an identifier remain within the communication reach(e.g., primary wireless communication capabilities) of the guardiandevice.

The term ‘authorized removal’ may denote that a recipient may be allowedto remove an item from the protection zone—e.g., the primarycommunication reach—of the guardian device. The recipient may identifyhimself/herself using a removal authorization device such as, a mobiledevice, e.g., a smart phone, a smart card or the like. In this sense,the term ‘removal authentication device’ may denote a physical devicetogether with a code which may be identified by the guardian device. Asa consequence, the guardian device may disable the item protectionstatus for the item in question identified by the identifier.

The term ‘delivery service management system’ may denote a central (oralso decentralized) system, having information about positions ofguardian devices, delivery statuses of items, recipients, distributedcodes for an allowed removal of an item being a part within thecommunication reach of a guardian device and other information requiredto manage an item delivery process to a plurality of recipients.

The proposed method for delivering an item to a target recipient offersmultiple advantages and technical effects:

The herewith proposed technical concept can be used with an automaticmachine-based distribution of parcels, as well as, to a classical, humanbased distribution and delivery of parcels. However, the parcels are notdelivered to the recipient directly, but to a variable location definedby the position or location of the guardian device.

The items can be protected by the guardian device by way of wirelesscommunication between the guardian device and an identifier stuck to theitem. The items may, or may not, also be protected by physical methodsand devices, like mailboxes or other closed containers.

The parcel delivery service can drop a group of parcels potentiallyaddressed to a plurality of recipients at any convenient location for anestablishment of a mobile pickup system and can include a theftprotection for the parcels at that particular delivery location. Theguardian device can be positioned at random places based on optimizationcriteria chosen by the delivery service, e.g., the delivery servicemanagement system. Such criteria may be, e.g., based on a route of adelivery vehicle and, e.g., be based on an accumulation of recipients ina certain neighborhood. The ad-hoc position of the guardian device canbe chosen and changed day by day, based on the daily actual parceldelivery requirements. The ad-hoc position can be chosen to be at aneasily accessible place (e.g., without stairs, gates or otherobstacles). This way, delivery robots—like drones or wheel-basedrobots—may also be able to reach the second position around the guardiandevice easily. In this sense, the protection zone around the guardiandevice can be used as a drop zone for those autonomic parcel deliveryvehicles.

Furthermore, the ad-hoc position can also be used as a targetdestination for an automatic, semi-automatic or manual collection ofparcels to be delivered to other recipients. Also in this case—e.g., thecollection mode—the parcels can be protected by the guardian device.

The drop zone—i.e., the location around the guardian device—can be apublic place where it may be accessed easily by end-users as well asmembers of the delivery service. The drop zone may be either static orset up on demand in an appropriate area. Because of the protection modefor parcels placed in the drop zone, there may be no need for mechanicalor structural precautions to safeguard the parcels. Thus, the electronicprotection by the guardian device may significantly reduce costs for theprotection of items to be delivered. In order to move a drop zone fromone location to another, only the position of the guardian device has tobe changed.

In the following additional embodiments of the method and the system fordelivering an item to a target recipient will be described:

According to an embodiment of the method, the guardian device can beenabled to send its global positioning system (GPS) coordinates to adelivery service management system. This can be performed by a mobilecommunication network or also by Wi-Fi assuming that a Wi-Fi net signalis receivable from the neighborhood of the position of the guardiandevice. A nearby public or private Wi-Fi hotspot may be instrumental forachieving this. In comparison to classical mobile long rangecommunication, this may reduce communication cost. This way, a centraldelivery service management can be informed about the location of theguardian device. This information can be used to direct a parceldelivery vehicle (manned or unmanned) to the guardian device.Additionally, the delivery service management system can activate analarm in response to an unauthorized removal of the guardian device.

According to an additional embodiment of the method, an alarm can betriggered in case of an unauthorized removal of an item from theprotection zone (e.g., (primary) communication reach). The alarm signalcan be an acoustical and/or an optical local signal directly from theguardian device. Additionally or in the alternative, a message can besent to the delivery service management system and/or a mobile device ofnearby service personnel. Further, the guardian device can activate astill or video camera to capture the scene of the unauthorized removalof the item. This may help to protect the items against theft.

According to a further embodiment of the method, the alarm can also betriggered if a number of recognized removal authentication devicesexceed a predetermined threshold number in the area of the communicationreach. This can be achieved by counting the number of MAC addresses inthe communication reach of the guardian device. A high number ofpotential recognized removal authentication devices or simply mobiledevices, not enabled for an authorized removal of an item, may be anindicator for a planned theft of items, i.e., parcels.

According to an embodiment of the method, a removal authenticationdevice receives a removal code. The removal authentication device canreceive the removal code from the delivery service management, and itcan use it for an authorized removal of the item from the protectionzone (e.g., the communication reach) of the guardian device forprotecting the parcels. The removal authentication device maycommunicate—e.g., wirelessly—the received removal code to the guardiandevice. The guardian device may also have received a matching removalcode from the delivery service management system. On a match of the twocodes, no alarm will be turned on in case the item in question isremoved.

According to another useful embodiment of the method, the removalauthentication device can receive directions to the guardian device.This can enable the user of the removal authentication device to easilyfind the—potentially varying over time—locations of the guardian deviceand thus the drop zone of the parcels. This may enhance theuser-friendliness of the proposed concept.

According to a further embodiment, the method can also comprisedetecting a new identifier by the guardian device, sending from theguardian device a drop activation request to the removal authenticationdevice, and confirming a dropping of a new item with the new identifierwithin the communication reach—in particular the drop zone—of theguardian device. This way, the drop zone around the guardian device canbe used, not only by the parcel delivery service for deliveringitems/parcels to recipients, but also as a pick-up point for a receptionof parcels and later delivery to other recipients. Thus, the guardiandevice including the surrounding drop zone can be used as a place forincoming and outgoing parcels to the parcel delivery service.

In case of an authentication by an ID card or smartcard, the guardiandevice can be equipped with an optical scanner for the ID card and/or asmartcard reader. Thus, the technical concept proves to be highlyflexible and adaptable to various local situations.

According to an embodiment of the method, the communication between theguardian device, the identifier and/or the removal authentication devicecan be performed in a secure manner. Such an encrypted communicationmethod may enhance the security of the overall system and parceldelivery process.

According to various embodiments of the method, the wirelesscommunication device can be enabled for a wireless communication basedon at least one selected out of the group comprising Wi-Ficommunication, an RFID-based communication, Bluetooth communication,optical communication (using barcodes or QR codes as identifiers),infrared-based communication, and mobile telephone communication. Inorder to achieve the protective character of the guardian device, alimited defined space around the guardian device—e.g., several meters orseveral centimeters—is reachable by the primary wireless communication.This area can be named and used as drop zone; or protected zone.

According to a further preferred embodiment of the method, theprotection against unauthorized removal—e.g., theft—of the guardiandevice from the first location can be performed by monitoring the globalpositioning coordinates of the guardian device or by monitoring a motionsensor—e.g., in form of a gyroscope, accelerometer, and/or other motionsensors inside the guardian device—and activating an alarm uponunauthorized removal. Hence, the guardian device can protect itself.This self-monitoring can be deactivated if the guardian device may needsto be moved to a different position by service personnel—or an automatedrelocator—of the delivery management system. The self-monitoring statuscan be activated again after the guardian device has reached its newposition.

According to an additional embodiment of the method, the guardian devicecan comprise a camera—video or still—adapted for monitoring the area ofthe primary communication reach of the guardian device. In case of anassumed unauthorized removal of an item from the drop zone the cameracan capture the removal process. This can be used as deterrence againstunauthorized removal and/or as a basis to identify parcel thieves.

According to a further embodiment of the method, enabling the authorizedremoval can be activated by a face recognition system. In order to doso, the guardian device can receive an image of the face of the personthat is authorized to remove a specific item. The guardian device canreceive such an image by the delivery management system. Users of thisway of delivery of parcels may have registered with the deliverymanagement system beforehand and may have delivered the required imageand a mobile phone number or email address for the removalauthentication device (in case no face recognition can be used).

In the following, a detailed description of the figures will be given.All instructions in the figures are schematic. First, a block diagram ofan embodiment of the inventive computer-implemented method fordelivering an item to a target recipient is given. Afterwards, furtherembodiments, as well as embodiments of the system for delivering an itemto a target recipient, will be described.

FIG. 1 shows a block diagram of an embodiment of the method 100 fordelivering an item to a target recipient. The recipient may be a naturalperson or an organization represented by a natural person. The personmay carry a smart phone device or another dedicated device as a removalauthentication device. The method 100 comprises selecting, 102, a firstlocation that is accessible by the target recipient. Any place may beselected as first location including, but not limited to: a public placelike a bus station, an entryway of an apartment or public building, atrain station, or any other easy accessible location. No specialrequirement has to be met. A new first location can be chosen each timethe first location is selected. This may be, e.g., on a daily basisdepending on optimization rules depending on parcels to be delivered totarget persons.

The method 100 comprises also positioning, 104, a guardian device—inparticular, a mobile guardian device—at the first location. The guardiandevice includes a (primary) wireless communication system that cancommunicate within a range, which can be anywhere from a couple ofcentimeters to a couple of meters. Additionally, the guardian device cancomprise a second transceiver that can perform a long range mobilecommunication such as a mobile phone module. The guardian device is alsoprotected against an unauthorized removal from the first location. Thismay be performed in a number of different ways. The guardian device canbe physically locked to a solid element like a house, a wall, a post,etc. Alternatively, or in addition, the guardian device can determineits own movement by means of GPS data or acceleration sensors. In caseof an unauthorized movement of the guardian device an alarm can beenabled. In case the guardian device has to be moved to a differentlocation, the just described self-protection mechanism can be disabled.

The method 100 comprises further delivering, 106, the item to a secondlocation. This second location can also be referred to as the drop zone.The item can be a parcel, a letter, a box or any other physical elementadapted to carry the identifier outside or inside the element. Inparticular, the item is delivered to a location within a communicationreach of the guardian device, having a near range communication device.The identifier may be enabled for a near range communication, using anyof the following: RFID-based communication, Wi-Fi-based communication,Bluetooth communication, NFC based communication (Near FieldCommunication), a light based communication (optical), an infrared basedcommunication system, and/or the like. This allows the guardian deviceto detect a presence of the item within its communication reach, e.g.,in the drop zone.

The method 100 also comprises registering, 108, the item, using theidentifier that has been associated with the item. This registering canbe performed via a communication, using the wireless communicationdevice within the guardian device. For example, prior to a delivery ofthe item in the drop zone, a communication that contains informationthat the item is expected to be dropped in the drop zone can be sent tothe guardian device.

Furthermore, the method 100 comprises activating, 110, an itemprotection status in which an unauthorized removal of the item from thesecond location is detected by the guardian device and is prevented. Forexample, in case an unauthorized removal happens, an alarm is triggered.

Thus, the method 100 comprises enabling, 112, an authorized removal ofthe item from the second location, using a secure communication thatreceives a removal authentication signal at the guardian device. Theremoval authentication signal can be received from a removalauthentication device. This can be a smartphone with an appropriateapplication—and potentially a removal code—installed. However, a smartcard or another identifier card can also be used for an authenticationof a recipient.

FIG. 2 shows a block diagram 200 of a graphical representation of thedrop zone 204, the guardian device 202 and a plurality of parcels 206with identifiers 208. The guardian device 202 may include a transceiverwith a certain reach, symbolized by half circle 204 which alsorepresents the drop zone 204. This diagram may represent a situation inwhich the guardian device 202 may just have been positioned at anysurface. It may be noted that the parcels 206 can be placed at anylocation within the communication reach 204 of the guardian device 202.No special requirements have to be reflected, in particular, no lockersare required.

FIG. 3 shows a block diagram 300 of a top view onto the drop zone 204.Again, the guardian device is positioned in the middle of the circle 204that represents the communication reach of the guardian device 202 forcommunicating with the identifiers 208 of the parcels 206. However, anyother spherical configuration is possible.

FIG. 4 shows a block diagram 400 of an embodiment of several componentsof the system for delivering an item to a target recipient. The guardiandevice 202 can comprise at least control logic 402 and an inventorymanagement unit 404. Not shown here are the transceivers required withinthe guardian device 202. The inventory management unit 404 can beadapted to receive the identification numbers of the identifiers 208 ofthe parcels 206. This way, the guardian device 202 can keep track ofparcels 206 within the guardian device's 202 drop zone 204.

The guardian device 202 can also be connected to a series of sensors,like a camera (still of video) 406, a GPS receiver 408 and/or an alarmsystem 410. Additionally, the guardian device 202 can also comprisemovement sensors such that a movement of the guardian device 202 can bedetected without using the GPS receiver 408.

If a package has to be delivered to a target recipient, the deliveryservice management system first determines which of a plurality ofguardian devices 202 is proximate to the potential recipient of theparcel. Once the guardian device has been selected, the delivery servicemanagement system 412 can trigger the delivery of the parcel 206 with aunique identifier 208 into the protection zone—e.g., the communicationreach of the guardian device 202—by service personnel or an automaticparcel delivery system, such as a drone or a robot. These activedata—including the identifier code—can be communicated to the guardiandevice 202. Once the parcel 206 reaches the drop zone of the guardiandevice 202, the parcel 206 can be checked-in into the inventorymanagement unit 404 of the guardian device 202. At the same time, arecipient can be informed via, e.g., his smart phone that a parcel 206is ready for a pickup at a certain location of the guardian device 202.The smart phone can also receive directions how to reach the guardiandevice 202, and thus, the parcel 206 in the easiest way. Additionally,the user device/smart phone can also receive the code relating to theidentifier 208.

If the user with his user device 414 reaches the drop zone of theguardian device 202, the user device 414 can be identified by means of awireless communication from the guardian device 202 to the user device414. The two devices can exchange data about the code for the parcel 206to be picked up. In case of a match, the inventory management unit 404can check out the parcel 204 in question with the related identifier208. Now the user can pick up the parcel 206—which may also have avisually recognizable identifier like the name and the address of therecipient or another suitable code—and leave the drop zone of theguardian device 202 without activating the camera, the alarm or anyother theft protection device of the guardian device 202. In oneembodiment, the same transceiver used for a communication with theidentifiers 208, can also be used as for a communication with the userdevice 414.

In case a user without the appropriate code in his/her user device/smartphone 414 tries to remove the parcel 206 from the drop zone/protectionzone of the guardian device 202, an alarm 410 can be activated, thecamera 406 can be activated to capture the theft scene, and/or thedelivery service management system 412 can also be informed. Thus,status data of the guardian device 202 can be communicated, e.g., by amobile communication transceiver (alternatively, by a Wi-Fi signal usinga public Wi-Fi hotspot) to the delivery service management system 412.In addition, the delivery service management system 412 delivers activedata about parcels 206 with an identifier 208 data to be delivered.

In an embodiment, a user—in this case a sender of a parcel—can positionthe parcel 206 to be picked up into the drop zone of the guardian device202. Using his user device 414, information about the parcel 206 can betransmitted via the guardian device 202 to the delivery servicemanagement system 412 or directly from the user device 414 to thedelivery service management system 412. Once the check-in process intothe drop zone of the guardian device 202 is finalized, the itemprotection status will be enabled for this newly received parcel 204.The sender of the parcel 206 can place the identifier 208 (e.g., in theform of a sticker), comprising the required electronic components, ontothe parcel or inside the parcel.

Because of the item protection status for parcels placed in the dropzone, there may be no need for any additional mechanical or structuralprecautions to safeguard the parcels 204. To move the drop zone, theguardian device 202 only needs to be moved to another place.

It may be noted that in the above-described scenario, the user device414 can also be seen as the removal authentication device. Theidentification of the user device 414 can, e.g., be accomplished by anapplication, being executed on the user device and a related code or bymaking the MAC (media access control) address of the user device 414 beknown to the guardian device 202. The guardian device 202 can receivethe MAC address from the delivery service management system 412 in whichthe user device 414 has been registered as a device belonging to therecipient.

FIG. 5 shows a block diagram of an embodiment of the guardian device202. The guardian device 202 can include a power supply 502—like abattery—in order to make the guardian device 202 independent fromexternal power sockets. The GPS receiver 408 may be instrumental indetecting an un-allowed movement of the guardian device 202. The camera406 can be used in case of an un-allowed movement of the guardian device202 or an unauthorized removal of a parcel from within the drop zone ofthe guardian device 202. The alarm 410 (optical and/or acoustical) canbe activated in case of any unauthorized activities—e.g., anon-authorized removal of a package or other allowed movement of theguardian device—around the guardian device 202. A transceiver 508 canalso be included for communicating with the identifiers of the parcels.The reach of such communication technology may be in the range of acouple of centimeters to several meters. The already above-mentionedtechnologies may be used.

Additionally, a communication system 512 for a communication with thedelivery service management system can also be included. This can bebased on a mobile communication. In case of a Wi-Fi hotspot, thistechnology can also be used alternatively. Thirdly, communicationcapabilities 510 can also be included within the guardian device 202 tocommunicate with the user device. Some of the required transceivers forthe different communication targets can be used for two or morepurposes. Thus, if the drop zone may be protected by a Wi-Fi signal,this Wi-Fi signal can also be used for a communication to the userdevice. On top of this, the same Wi-Fi transceiver can also be used tocommunicate to the service delivery management system if a Wi-Fi hotspotis within the drop zone.

The guardian device 202 can also include a recognition unit 514 that canrecognize an item positioned in the second position within thecommunication reach of the guardian device 202. A registration unit 516can be part of the inventory management unit 404 (compare FIG. 4).Furthermore, the guardian device 202 comprises an activation unit 518which is adapted for activating an item protection status in which anunauthorized removal of the item from the second location is detectableby the guardian device 202. Finally, the guardian device 202 comprises aremoval authorization unit 520 that allows for a removal of the parcelfrom within the communication reach (reference numeral 204 of FIGS. 2,3) of the guardian device 202 for the item from the second location.

Embodiments of the invention can be implemented together with virtuallyany type of computer, regardless of the platform being suitable forstoring and/or executing program code. FIG. 6 shows, as an example, acomputing system 600 suitable for executing program code related to theproposed method. In particular, the guardian device 202 can represent anextended version of the computing system 600.

The computing system 600 is only one example of a suitable computersystem and is not intended to suggest any limitation as to the scope ofuse or functionality of embodiments of the invention described herein.Regardless, computer system 600 is capable of being implemented and/orperforming any of the functionality set forth hereinabove. In thecomputer system 600, there are components, which are operational withnumerous other general purpose or special purpose computing systemenvironments or configurations. Examples of well-known computingsystems, environments, and/or configurations that may be suitable foruse with computer system/server 600 include, but are not limited to,personal computer systems, server computer systems, thin clients, thickclients, hand-held or laptop devices, multiprocessor systems,microprocessor-based systems, set top boxes, programmable consumerelectronics, network PCs, minicomputer systems, mainframe computersystems, and distributed cloud computing environments that include anyof the above systems or devices, and the like. Computer system/server600 may be described in the general context of computersystem-executable instructions, such as program modules, being executedby a computer system 600. Generally, program modules can includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes. Computer system/server 600 can be practiced in distributed cloudcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed cloud computing environment, program modules may be locatedin both local and remote computer system storage media including memorystorage devices.

As shown in the figure, computer system/server 600 is shown in the formof a general-purpose computing device. The components of computersystem/server 600 can include, but are not limited to, one or moreprocessors or processing units 602, a system memory 604, and a bus 606that couples various system components including system memory 604 tothe processor 602. Bus 606 represents one or more of any of severaltypes of bus structures, including a memory bus or memory controller, aperipheral bus, an accelerated graphics port, and a processor or localbus using any of a variety of bus architectures. By way of example, andnot limitation, such architectures include Industry StandardArchitecture (ISA) bus, Micro Channel Architecture (MCA) bus, EnhancedISA (EISA) bus, Video Electronics Standards Association (VESA) localbus, and Peripheral Component Interconnects (PCI) bus. Computersystem/server 600 typically includes a variety of computer systemreadable media. Such media may be any available media that is accessibleby computer system/server 600, and it includes both, volatile andnon-volatile media, removable and non-removable media.

The system memory 604 can include computer system readable media in theform of volatile memory, such as random access memory (RAM) 608 and/orcache memory 610. Computer system/server 600 can further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 612 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a ‘hard drive’). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a ‘floppy disk’), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM or other optical media may be provided.In such instances, each can be connected to bus 606 by one or more datamedia interfaces. As will be further depicted and described below,memory 604 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the invention.

A program/utility, having a set (at least one) of program modules 616,can be stored in memory 604 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, can include an implementation of a networkingenvironment. Program modules 616 generally carry out the functionsand/or methodologies of embodiments of the invention as describedherein.

The computer system/server 600 can also communicate with one or moreexternal devices 618 such as a keyboard, a pointing device, a display620, etc.; one or more devices that enable a user to interact withcomputer system/server 600; and/or any devices (e.g., network card,modem, etc.) that enable computer system/server 600 to communicate withone or more other computing devices. Such communication can occur viainput/output (I/O) interfaces 614. Still yet, computer system/server 600may communicate with one or more networks such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 622. As depicted, network adapter 622can communicate with the other components of computer system/server 600via bus 606. It should be understood that although not shown, otherhardware and/or software components could be used in conjunction withcomputer system/server 600. Examples, include, but are not limited to:microcode, device drivers, redundant processing units, external diskdrive arrays, RAID systems, tape drives, and data archival storagesystems, etc.

Additionally, the guardian device 202 can be attached to the bus system606.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinaryskills in the art without departing from the scope and spirit of thedescribed embodiments. The terminology used herein was chosen to bestexplain the principles of the embodiments, the practical application ortechnical improvement over technologies found in the marketplace, or toenable others of ordinary skills in the art to understand theembodiments disclosed herein.

The present invention may be embodied as a system, a method, and/or acomputer program product. The computer program product may include acomputer readable storage medium (or media) having computer readableprogram instructions thereon for causing a processor to carry outaspects of the present invention.

The medium may be an electronic, magnetic, optical, electromagnetic,infrared or a semi-conductor system for a propagation medium. Examplesof a computer-readable medium may include a semi-conductor or solidstate memory, magnetic tape, a removable computer diskette, a randomaccess memory (RAM), a read-only memory (ROM), a rigid magnetic disk andan optical disk. Current examples of optical disks include compactdisk-read only memory (CD-ROM), compact disk-read/write (CD-R/W), DVDand Blu-Ray-Disk.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including anobject-oriented programming language such as Smalltalk, C++ or the like,and conventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus', and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus', or anotherdevice to cause a series of operational steps to be performed on thecomputer, other programmable apparatus or other device to produce acomputer implemented process, such that the instructions which executeon the computer, other programmable apparatus', or another deviceimplement the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowcharts and/or block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or act or carry out combinations of special purpose hardwareand computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to limit the invention. As usedherein, the singular forms “a”, “an” and “the” are intended to includethe plural forms as well, unless the context clearly indicatesotherwise. It will further be understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or steps plus function elements in the claims below are intendedto include any structure, material, or act for performing the functionin combination with other claimed elements, as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skills in the artwithout departing from the scope and spirit of the invention. Theembodiments are chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skills in the art to understand the invention forvarious embodiments with various modifications, as are suited to theparticular use contemplated.

What is claimed is:
 1. A method for delivering an item to a targetrecipient, the method comprising: relocating a mobile guardian devicefrom a previous first location to a first location, wherein the previousfirst location is a location at which the mobile guardian device hasbeen accepting deliveries; sending, by the mobile guardian device, a setof global positioning system coordinates corresponding to the firstlocation to a delivery service management system in response to a newarrival of the guardian device at the first location as a result of therelocating; detecting, by the mobile guardian device positioned at thefirst location, an item delivered to a second location that is anon-enclosed area that is external to the mobile guardian device and iswithin a communication reach of the guardian device; registering theitem on the guardian device via a communication between an identifier onthe item and the guardian device; activating an item protection statusin which an unauthorized removal of the item from the second location isdetected by the guardian device; and enabling, in response to receipt ofa removal authentication signal from the target recipient by theguardian device, an authorized removal of the item from the secondlocation by the guardian device.
 2. The method according to claim 1,further comprising: detecting, by the guardian device, whether anunauthorized removal of the guardian device from the first location hasoccurred; detecting, by the guardian device, whether a number ofrecognized removal authentication devices exceeds a predeterminedthreshold number in an area of the communication reach; and triggeringan alarm in response to any of: an unauthorized removal of the item fromthe second location, an unauthorized removal of the guardian device fromthe first location has occurred, or that a number of recognized removalauthentication devices exceeds a predetermined threshold number in anarea of the communication reach.
 3. The method according to claim 2,wherein the detection of whether an unauthorized removal of the guardiandevice from the first location has occurred further comprises:monitoring the global positioning coordinates of the guardian device;monitoring a motion sensor; and activating the alarm upon unauthorizedremoval.
 4. The method according to claim 1, further comprisingreceiving the removal authentication signal from a removalauthentication device associated with the target recipient, wherein theremoval authentication signal contains a removal code.
 5. The methodaccording to claim 1, further comprising forwarding to the removalauthentication device directions to the guardian device.
 6. The methodaccording to claim 1, further comprising detecting a new identifier bythe guardian device; sending from the guardian device a drop activationrequest to the removal authentication device; and confirming a droppingof a new item with the new identifier in the communication reach of theguardian device.
 7. The method according to claim 1, wherein theguardian device comprises a camera adapted for monitoring thecommunication reach of the guardian device, and wherein the enabling ofthe authorized removal is activated by a face recognition system.
 8. Amobile guardian device for delivering an item to a target recipient,comprising: a wireless communication system, configured to: send, inresponse to an arrival of the mobile guardian device at a first locationpursuant to a relocating of the mobile guardian device from a previousfirst location to the first location, a set of global positioning systemcoordinates corresponding to the first location to a delivery servicemanagement system, wherein the previous first location is a location atwhich the mobile guardian device has been accepting deliveries; detectan item delivered to a second location that is a non-enclosed area thatis external to the mobile guardian device and is within a communicationreach of the guardian device; and register the item on the guardiandevice via a communication between an identifier on the item and theguardian device; and an item protection system configured to: activatean item protection status in which an unauthorized removal of the itemfrom the second location is detected; and enable, in response to receiptof a removal authentication signal from the target recipient, anauthorized removal of the item from the second location.
 9. The guardiandevice according to claim 8, the item protection system furthercomprising: a set of sensors configured to: detect whether anunauthorized removal of the guardian device from the first location hasoccurred; and detect whether a number of recognized removalauthentication devices exceeds a predetermined threshold number in anarea of the communication reach; and an alarm system configured totriggering an alarm in response to any of: an unauthorized removal ofthe item from the second location, an unauthorized removal of theguardian device from the first location has occurred, or that a numberof recognized removal authentication devices exceeds a predeterminedthreshold number in an area of the communication reach.
 10. The guardiandevice according to claim 9, wherein the set of sensors furthercomprises a global positioning sensor and a movement sensor, and whereinthe alarm system is further configured to trigger an alarm if theguardian device is moved away from the first position.
 11. The guardiandevice according to claim 8, wherein the wireless communication systemis further configured to receive the authentication signal from aremoval authentication device associated with the target recipient,wherein the removal authentication signal contains a removal code. 12.The guardian device according to claim 8, wherein the wirelesscommunication system is further configured to forward to removalauthentication device directions to the second area.
 13. The guardiandevice according to claim 8, further comprising: a camera adapted formonitoring the communication reach of the guardian device; and a facerecognition system that enables the authorized removal in response to arecognition of a face associated with the target recipient.
 14. Acomputer program product for controlling delivery of an item to a targetrecipient, the computer program product comprising a computer readablestorage medium, having program instructions embodied therewith, theprogram instructions being executable by one or more computing systemsassociated with a mobile guardian device to cause the one or morecomputing systems to: send, in response to an arrival of the mobileguardian device at a first location pursuant to a relocating of themobile guardian device from a previous first location to the firstlocation, a set of global positioning system coordinates correspondingto the first location to a delivery service management system, whereinthe previous first location is a location at which the mobile guardiandevice has been accepting deliveries; detect, at the first locationoccupied by the guardian device, an item delivered to a second locationthat is a non-enclosed area that is external to the mobile guardiandevice and is within a communication reach of the guardian device;register the item via a communication between an identifier on the itemand the guardian device; activate an item protection status in which anunauthorized removal of the item from the second location is detected;and enable, in response to receipt of a removal authentication signalfrom the target recipient, an authorized removal of the item from thesecond location by the guardian device.
 15. The program productaccording to claim 14, the program instructions further causing the oneor more computing systems to: detect whether an unauthorized removal ofthe guardian device from the first location has occurred; detect whethera number of recognized removal authentication devices exceeds apredetermined threshold number in an area of the communication reach;and trigger an alarm in response to any of: an unauthorized removal ofthe item from the second location, an unauthorized removal of theguardian device from the first location has occurred, or that a numberof recognized removal authentication devices exceeds a predeterminedthreshold number in an area of the communication reach.
 16. The programproduct according to claim 15, wherein the detection of whether anunauthorized removal of the guardian device from the first location hasoccurred further comprises: monitoring the global positioningcoordinates of the guardian device; and monitoring a motion sensor. 17.The program product according to claim 14, the program instructionsfurther causing the one or more computing systems to: detect a newidentifier by the guardian device; send from the guardian device a dropactivation request to the removal authentication device; and confirm adropping of a new item with the new identifier in the communicationreach of the guardian device.
 18. The method according to claim 14,wherein the guardian device comprises a camera adapted for monitoringthe communication reach of the guardian device, and wherein the enablingof the authorized removal is activated by a face recognition system.