System and method for managing transportation and storage of goods

ABSTRACT

A method, system and computer program product for managing transportation and storage of goods, including a personal computer device; and a package control device associated with a package. The personal computer device is configured to store transport and storage operations information regarding the package in the package control device. The package control device is configured for identifying an operator responsible for at least one of transport and storage of the package based on the transport and storage operations information. The package control device is configured to allow the operator to have access to the package for at least one of transport and storage of the package based on the transport and storage operations information.

BACKGROUND OF THE INVENTION

Field of the Invention

The present invention generally relates to the transportation andstorage of goods, and more particularly to a method and system formanaging the transportation and storage of goods, and the like, byindividual users, and the like.

Discussion of the Background

Systems have been developed for managing transportation and/or storageof goods. For example, various companies manage dedicated logisticsfacilities, vehicles and operators, and provide parcel delivery servicesto individuals. Similarly, retailers manage delivery of merchandisepurchased by consumers to homes of the consumers. However, such systemsand methods typically lack robustness with respect to managingtransportation and/or storage of goods by some managing services, retailinfrastructures, organizations lacking logistics, and the like. Inaddition, such systems and methods typically suffer from lack ofconvenience and ease of use, for example, by individuals for whom suchtransportation or storage of goods is just one activity among many dailyroutines.

SUMMARY OF THE INVENTION

Therefore, there is a need for a method and system that addresses theabove and other problems. The above and other problems are addressed bythe illustrative embodiments of the present invention, which provide asystem and method for managing the transportation and storage of goods,and the like, and that allows senders, transporters, recipients, and thelike, access via personal devices configured for arranging andcontrolling the quality of transportation services between each other.The system and method can include a package control device configured toauthorize and control access to a package and its contents, registerusers who are in custody of the package at different times, and/orcommunicates instructions with the users during the transportation andstorage process. The system and method also can include a storagefacility with which the users can improve the availability of thetransportation or storage service, or align interactions with their ownschedules, and the like.

Accordingly, in illustrative aspects of the present invention there isprovided a system, method, and computer program product for managingtransportation and storage of goods, including a personal computerdevice; and a package control device associated with a package. Thepersonal computer device is configured to store transport and storageoperations information regarding the package in the package controldevice. The package control device is configured for identifying anoperator responsible for at least one of transport and storage of thepackage based on the transport and storage operations information. Thepackage control device is configured to allow the operator to haveaccess to the package for at least one of transport and storage of thepackage based on the transport and storage operations information.

The personal computer device is at least one of a handheld device and awearable device and a read-only identification device, including a nearfield communications (NFC) device. The package control device isphysically attached to the package during at least one of transport andstorage. The operator is at least one of a transporter and a recipientof the package. The package control device is configured to allow theoperator to have access to the package based on comparing the transportand storage operations information with at least one of biometricidentification information of the operator communicated to the packagecontrol device and a personal computer device of the operatorcommunicating identification information to the package control device.

A security mechanism is provided in at least one of the package controldevice and the personal computer device and a package storage device.The package control device is configured to allow at least one of thetransport and storage operations including at least one of a pick-upoperation and a drop-off operation to be performed by the operator onthe package. The package control device is configured to authorize thesecurity mechanism to allow at least one of the transport and storageoperations based on at least one of a personal computer deviceidentifier and biometric identifier of the operator and input from amanual input device and a read-only identification device identifier,including a near field communications (NFC) device identifier.

A user interface device is provided in at least one of the packagecontrol device and the personal computer device and a package storagedevice. The package control device is configured to generate an outputsignal via the user interface device in response to identifying at leastone of a transport and storage operation by an operator. The userinterface device is configured to coordinate the output signal with atleast one of the package control device and the personal computer deviceand the package storage device.

A compliance evaluation device is provided in the package control deviceand a compliance enforcement device provided in an external device. Thecompliance evaluation device is configured to determine how measurementscorrespond to conditions in the at least one of transport and storageoperations information. The compliance evaluation device is configuredto change at least one of a measurement method used in complianceevaluation and compliance evaluation information when a measurementfulfills a condition. The package control device is configured toretrieve compliance evaluation information from the complianceevaluation device and communicate the compliance evaluation informationto the personal computer device. The personal computer device isconfigured to communicate compliance evaluation information to theexternal device. The external device is configured to determine anenforcement action in response to a compliance with the conditions. Theexternal device is configured to cause the enforcement action to beexecuted by the compliance enforcement device. The external device is atleast one of a second personal computer device and a server. Thecompliance enforcement device is configured to filter at least one oftransport requests and offers by a personal computer device.

A first computer device configured to generate authorization informationassociated with planned transport and storage operations information isprovided in the package control device. The package control device isconfigured to communicate the authorization information and the plannedtransport and storage operations information to a second computer deviceincluding at least one of a package storage device and a personalcomputer device. The second computer device is configured to determinehow the authorization information corresponds to previously storedauthorization information. The second computer device is configured togenerate the planned transport and storage operations information.

Still other aspects, features, and advantages of the present inventionare readily apparent from the following detailed description, byillustrating a number of illustrative embodiments and implementations,including the best mode contemplated for carrying out the presentinvention. The present invention is also capable of other and differentembodiments, and its several details can be modified in variousrespects, all without departing from the spirit and scope of the presentinvention. Accordingly, the drawings and descriptions are to be regardedas illustrative in nature, and not as restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments of the present invention are illustrated by way ofexample, and not by way of limitation, in the figures of theaccompanying drawings and in which like reference numerals refer tosimilar elements and in which:

FIG. 1A shows an illustrative goods transport system and method, whereina package control device controls handover of a package betweenindividuals without a need for communication with a server during atransport session;

FIG. 1B shows an illustrative goods transport and storage system andmethod, wherein a package control device controls handover of a packagebetween individuals or a storage facility without a need forcommunication with a server during a transport and/or storage session;

FIG. 2 shows illustrative flowchart of processes performed by a goodstransport system and method in an exemplary goods transport procedure;

FIG. 3A shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary goodstransport procedure;

FIG. 3B shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary procedureof sending and receiving a package;

FIG. 3C shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary procedureof dropping off and picking up a package in storage;

FIG. 4 shows an illustrative package control device attached to apackage to transfer the package securely between participants of apackage transport and/or storage operation and to monitor compliancewith terms of service;

FIG. 5 shows an illustrative state machine in a package control devicethat controls access to a package and contents thereof;

FIG. 6 shows an illustrative example of a storage device that storespackages securely and in compliance with terms of service before orafter they are transported;

FIG. 7 shows an illustrative flowchart of processes performed by astorage device in an exemplary procedure of receiving, storing andreleasing a package;

FIG. 8 shows an illustrative example of a computer system that can beused to perform various processes in a goods transport and storagesystem and method; and

FIG. 9 shows an illustrative flowchart depicting processes performed bya management system in an exemplary procedure of determining packagesand transporters for transported goods.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

A system and method for managing the transport and storage of goods byindividual users are described. In the following description, forpurposes of explanation, numerous specific details are set forth inorder to provide a thorough understanding of the present invention. Itis apparent to one skilled in the art, however, that the presentinvention may be practiced without these specific details or with anequivalent arrangement. In some instances, well-known structures anddevices are shown in block diagram form in order to avoid unnecessarilyobscuring the present invention.

Generally, the system and method for managing the transportation andstorage of goods, and the like, allows senders, transporters,recipients, and the like, access via personal devices configured forarranging and controlling the quality of transportation services betweeneach other. The system and method can include a package control deviceconfigured to authorize and control access to a package and itscontents, register users who are in custody of the package at differenttimes, and/or communicates instructions with the users during thetransportation and storage process. The system and method also caninclude a storage facility with which the users can improve theavailability of the transportation or storage service, or aligninteractions with their own schedules, and the like.

The present invention includes recognition of the competitivedisadvantages of delivery services dependent on logistics networks,compared to the low marginal operating expenditures of private vehiclesdriven by the consumers themselves when transporting goods from retaildistribution points to the final places of consumption at private homes.The present invention provides a solution by allowing a delivery serviceto benefit from the same low marginal operating expenditures of privatevehicles driven by the consumers themselves.

The present invention also includes recognition of the structuraldependency in developed economies on the use of private vehicles invisiting car accessible businesses, such as hypermarkets, and the like,that have driven competition out of business and now represent 50% ofsales in many developed economies. With road transportation over 95%dependent on oil as its primary source of energy, and the price of oilrising faster than overall inflation, such structural dependency reducesthe purchasing power of consumers available for other consumption. Thepresent invention provides a solution by significantly increasing thefuel efficiency of private vehicles through the transport of goodsalongside the primary purpose of driving.

The present invention also includes recognition of the pooraccessibility of hypermarkets lacking vehicles for transportation ofgoods, and the time consumed at the expense of leisure and family forthose who drive cars in congested streets to shop in distant large scaleretail hubs. Whereas online orders and home deliveries allow users tospend time only to select goods, the users still have to pay for thecollection and delivery costs directly or as hidden costs. The presentinvention provides a solution by allowing another consumer to transportthe purchases at a lower cost or even free of charge.

The present invention also includes recognition of the need forexpensive storage space to store the often infrequently used consumergoods and appliances bought by consumers, and the time consumed tolocate such storage places. Storage outside a home is limited by costs,inconvenient storage unit sizes, and poor accessibility. Throwing awaygoods and buying replacements whenever a need arises is also expensive.Vacating storage space by recycling goods through online second-handmarkets involves delivery efforts and costs. The present inventionprovides a solution by allowing consumer to recycle goods with the helpof another consumer at an affordable cost relative to the price of thegoods.

The present invention also includes recognition that passengers whoshare a ride with someone can evaluate, judge and communicate how wellthe transportation service was provided, but a transported packagecannot. Still, the higher efficiency and shared costs of ride sharingcan be valuable for the transportation of goods. The present inventionprovides a solution by allowing users or package control devices to acton and perform similar management roles as the ride sharing passenger.

The adoption of ride sharing has shown that individuals are willing toprovide personal transportation services to each other. The adoption ofhome delivery services has shown that individuals are willing to offloadtransportation of everyday goods to others. The adoption of second-handgoods recycling has shown that individuals are willing to offloadstorage of everyday goods outside of their homes. However, the presentinvention also includes recognition that the transportation and storageof goods by individuals requires a significant effort to manage theassociated logistics, costs and uncertainties. The present inventionprovides a solution to reduce such efforts, and provide convenience tothe users.

Referring now to the drawings, wherein like reference numerals designateidentical or corresponding parts throughout the several views, and moreparticularly to FIG. 1A thereof, there is illustrated a goods transportsystem and method 100, wherein a package control device controlshandover of a package between individuals without a need forcommunication with a server during a transport session. In FIG. 1A,generally, the goods transport system and method provide for manageddelivery of packages by or between users of the system. The system andmethod can include, for example, a server 180, a database 185, personaldevices 110 shown in FIG. 1B of the users of the system and method(e.g., personal device 117 of a sender, personal device 118 of atransporter, personal device 119 of a recipient, etc.) communicatingwith the server 180 over communications network 175 (e.g., a wiredand/or wireless communications network), and a package control device(PCD) 150 attached to a package 140.

FIG. 1B shows an illustrative goods transport and storage system andmethod 101, wherein a package control device controls handover of apackage between individuals or a storage facility without a need forcommunication with a server during a transport and/or storage session.In FIG. 1B, generally, the goods transport and storage system and methodprovides for managed delivery or storage of packages 140 by or betweenusers of the system and method. The system and method can include, forexample, the personal devices 110 of the users of the system and method,a vehicle 120, the package control device (PCD) 150, a packageattachment device (PAD) 133, a storage device 130, a transportmanagement system (TMS) 170, and external systems 190.

The TMS 170 manages transport and/or storage related operations andtransactions by or between the users of the system and method. The TMS170 can include, for example, the server 180, the database 185 forstoring users and operations data, a log processing system, atransaction management system, an auction system, a payment system, areputation system, a routing system, a scheduling system, a virtualrepresentation system and/or a quality assessment system, and the like.Such functions also can be operated in and accessed from the externalsystems 190 over a suitable interface 172. The TMS 170 can communicatewith other devices in the system over communication interface 171 viathe communications network 175.

The personal devices 110 can be configured to provide access to thesystem and method by individual users and allow the users toconveniently and securely perform operations with the packages 140. Thepersonal devices 110 can include, for example, a processor, a datastorage device, a user interface, and/or a security mechanisms, and thelike. The personal devices 110 can access the TMS 170 over interface 115via the communications network 175, can access a storage device 130 overinterface 136 via a storage communications network 135 andcommunications link 131, and can access the PCD 150 over interface 156via a package communications network 155.

The personal devices 110 can be operated by a sender 111, a transporter112, a recipient 113 over user interface 116, and/or other individualsinteracting with the system and method. The sender 112 and/or recipient113 can alternatively be a company or other suitable entity, in whichcase the personal devices 110 can represent a system operated by a userbelonging to such an entity. The transporter 112 can carry the package140 on their person or employ the vehicle 120 and a vehicle userinterface 125 to transport the package 140. Users of the systems andmethods of FIGS. 1A-1B who interact with the package 140, such as thesender 111, the transporter 112 and/or the recipient 113, can becommonly referred to as operators of the package 140.

The storage device 130 provides a convenient and secure facility forstoring the package 140 between the scheduled drop-off of its previouscustodian (e.g., the transporter 112), and the scheduled pick-up of itsnext custodian (e.g., another transporter 112 or the recipient 113). Thestorage device 130 can include, for example, security mechanisms, suchas wires, doors and/or locks and/or cameras, identification mechanisms,such as labels and/or colors, package handling mechanisms, such asshelves and/or rails, user interfaces, and/or storage capacity measuringmechanisms, and the like.

The storage device 130 can be configured to be at a fixed location, orcan be mobile on a vehicle (e.g., in the vehicle 120) or on atransportable platform, such as a sea, air, train, and the like,container, and the like. The storage device 130 can further beconfigured to be publicly accessible to a wide group of users, or to beprivately accessible to only a set of designated users over userinterface 132. The storage device 130 can be operated by the users ofthe system and method, and/or can be operated by a designated storageoperator, and the like. For example, a mobile storage also can beconfigured as a driverless vehicle, wherein the sender 111 can drop offthe package 140, which can then be picked up directly by the recipient113 without the participation of the transporter 112.

The package attachment device (PAD) 133 can be configured to secure thepackage 140 to a suitable location while the package 140 is in thestorage device 130 or in the vehicle 120. The PAD 133 can be connectedto the storage device 130 with an interface 134. The PAD 133 caninclude, for example, a controlled attachment and detachment mechanism,a user interface, and/or be a part of the PCD 150 access interface 156.

The package control device (PCD) 150 can control access to the package140 and its contents by users of the system and method, and can storedata regarding the status of the package 140 and/or the operationsperformed with the package 140. The PCD 150 can include, for example, aprocessor, a data storage device, a security mechanism, sensor devices,and/or identification mechanisms, and the like. The PCD 150 can beconnected to the package 140 with the PCD package interface 154, and tothe package attachment device 133 with the PCD attachment deviceinterface 153. The package communications network 155 provides access tothe PCD communication interface 151 of the PCD 150 from devices in thesystem and method. Users of the system and method also can access thePCD 150 directly over the user interface 152.

Accordingly, the devices and subsystems of the goods transport systemsystems and methods of the present invention can include, for example,any suitable servers, workstations, personal computers (PCs), laptopcomputers, PDAs, Internet appliances, modems, handheld devices,telephones, wireless devices, other devices, etc., capable of performingthe processes of the embodiments of the present invention. The devicesand subsystems can communicate with each other using any suitableprotocol and can be implemented using one or more devices or computersystems such as the computer system 800 of FIG. 8, for example. One ormore interface mechanisms can be used in the systems and methods of thepresent invention including, for example, Internet access,telecommunications in any form (e.g., voice, modem, etc.), wirelesscommunications media, a combination thereof, and the like.

Accordingly, the TMS 170 can be implemented, for example, as acentralized server, a set of distributed servers, a set of distributedpeer devices, such as personal devices of the users of systems andmethods of the present invention, a combination thereof, and the like.The personal devices 110 can be implemented, for example, as a mobilephone, a tablet, a PDA, a laptop, a personal computer, a pager, a mediaplayer, a watch, a user interface on a multi-user computing device, aBluetooth device, a near field communications (NFC) device, a magneticcard, such as a loyalty card, as a shared device that is temporarilyconfigured for the individual user, such as a mobile device operated byanother user, a PC where the user has logged in, a logistics managementsystem operated by a designated user, a package storage unit with whichthe user has authenticated themself, a combination thereof, such as amobile phone and an NFC device, and the like. The PCD 150 can beimplemented, for example, as a computing device, a sensor device, aBluetooth device, an NFC device, an RFID label, a barcode, a QR-code, aprinted or written label including alphanumeric characters and/orsymbols and/or colors, a combination thereof, and the like.

Accordingly, the storage device 130 can be implemented, for example, asa designated area, a set of shelves, a rack, a cabinet, a locker, avehicle trunk, a vehicle, a shed, a warehouse, a combination thereof,and the like. The PAD 133 can be implemented, for example, as acompartment with a door, a plug-in connector with a wire, a wire with apadlock, a strap, an antenna capable of detecting the PCD 150, a sensorcapable of detecting the PCD 150, and/or a communication interfacecapable of detecting the PCD 150. The vehicle 120 can be implemented,for example, as a truck, a van, a bus, a car, a motorcycle, a scooter, abicycle, a personal transporter, a transport animal, a boat, a sleigh, atrolley, and/or a carrying tool on a person, such as a backpack, and/ora bar across the shoulders with ropes to attach to packages on bothsides of the user, and the like. The vehicle 120 can include one or moreof the PADs 133 to attach the PCDs 150 to the vehicle 120.

Accordingly, the communications network 135 connecting the storagedevice 130 with the personal devices 110 and the PCDs 150, thecommunications network 155 connecting the PCDs 150 with the personaldevices 110, the communications network 175 connecting the TMS 170 withthe personal devices 110 and any other suitably employed communicationsnetworks and/or links can include, for example, one or more wirelesscommunications networks, cellular communications networks, 3G or 4Gcommunications networks, Public Switched Telephone Networks (PSTNs),Packet Data Networks (PDNs), the Internet, intranets, ad-hoc networks,short range connectivity networks, such as Bluetooth or ZigBee networks,proximity connections, such as NFC and/or RFID and/or infrared, acombination thereof, and the like. In addition, the communicationsnetworks 135, 155 and/or 175 can be the same and/or different networks,and can connect other elements of the systems and methods of the presentinvention, as will be appreciated by those skilled in the relevantart(s).

FIG. 2 shows illustrative flowchart 200 of processes performed by agoods transport system and method in an exemplary goods transportprocedure. For example, FIG. 2 depicts processes performed by the systemand method 100 of FIG. 1A in an exemplary goods transport procedure.Accordingly, in step 210, the server 180 stores into the database 185package transport requests, for example, including pick-up and drop-offinformation, and the like, the sender's and recipient's preferences, andthe like, package transport offers, for example, including plannedtransport information, and the like, and transporter's preferences, andthe like.

In step 220, the server 180 retrieves transport requests and transportoffers from the database 185, and identifies a match between a specifictransport request and transport offer. In step 230, the server 180communicates to the sender's device 117, to the transporter's device118, and the recipient's device 119, transport instructions, forexample, including responsibilities in the transport and/or storageprocess, transport conditions, and/or planned pick-up and drop-offinformation, and the like.

In step 240, the server 180 sends the transport instructions andsecurity information to the sender's device 117. In step 250, thesender's device 117 retrieves from the PCD 150 any suitable data storedin the PCD 150 related to previous transport operations. In step 260,the sender's device 117 sends to the PCD 150 the new transportinstructions. In step 270, the PCD 150 attached to the package 140authenticates and authorizes the transporter to pick up the package 140by communicating security information with the transporter's device 118,and stores pick-up event data for uploading to the server 180. In step280, the PCD 150 attached to the package 140 authenticates andauthorizes the recipient to pick up the package 140 by communicatingsecurity information with the recipient's device 118, and stores pick-upevent data for uploading to the server 180.

Accordingly, in FIG. 2, steps 260, 270 and 280 can include the personaldevice 110 causing planned transport and/or storage operations data tobe stored in the PCD 150 associated with the package 140; the PCD 150identifying the operator of the package 140 by biometric identificationdata, and the like, and/or the personal device 110 of the operator ofthe package 140 communicating identification data to the PCD 150; thePCD 150 determining how the identification data compares to theconfigured transport and/or storage operations data; and the PCD 150causing the operator of the package 140 to have access to operate thepackage 140.

Such processing can be implemented, for example, by a smart phonewriting transport instructions to memory in the PCD over an NFCcommunication interface; a smart phone communicating an identifierassociated with the operator to the PCD over an NFC communicationinterface; the PCD identifying a match of the communicated identifierwith the identifier stored in the transport instructions in the memory;and the PCD deactivating its theft alarm. This can also be implemented,for example, by a first smart phone reading an NFC key attached to thepackage by a package control application that associates the NFC keycode with a planned package delivery; a second smart phone reading theNFC key attached to the package and sending the NFC key code and anidentifier of its user to the package control application in the firstsmart phone over the internet; the package control application in thefirst smart phone using the received NFC key code to associate thesecond user with the package delivery; and the package controlapplication in the first smart phone sending a response to the secondsmart phone to inform the second user that they are permitted to pick upthe package. This can also be implemented, for example, by a servicewhere a first user has logged in from a computer instructing the firstuser to write a label for the package; the computer from which a seconduser has logged in the service sending the user's NFC key information toan NFC access control device in a storage facility; the second userproviding his NFC key to be read by the NFC access control device; andthe NFC access control device opening the storage compartment that wasassigned to the package on which a camera accessed by the storagefacility detected the label written by the first user.

Accordingly, in FIG. 2, steps 270 and 280 can include a securityfunction in the PCD 150 or the personal device 110; the PCD 150determining the transport and/or storage operation performed by theoperator of the package 140; the PCD 150 determining the actions of thesecurity function in response to the attempted operation by the operatorof the package 140; and the PCD 150 causing the actions to be executedby the security function. This can be implemented, for example, by thePCD using an acceleration sensor to detect an attempt to move thepackage while in storage; the PCD being in an unauthorized state andstarting a timer permitting five seconds of movement during which thePCD can warn the operator; and the PCD activating an audio alarm if theoperator has not authenticated himself and the movement continues.

Accordingly, in FIG. 2, steps 270 and 280 can include a user interfacefunction in the PCD 150 or the personal device 110; the PCD 150 usinginput from the user interface function in determining the transportand/or storage operation performed by the operator of the package 140;the PCD 150 determining the output of the user interface function inresponse to the operation performed by the operator of the package 140;and the PCD 150 causing the output to be executed by the user interfacefunction. This can be implemented, for example, by the PCD detecting thepressing of an “Operation ready” button in the PCD; the PCD using itscurrent state to make a lookup that returns a function call thatactivates a green LED and a function call that sends over acommunication interface to the personal device the message “Operatorliability ended”; and the PCD executing both function calls.

Accordingly, in FIG. 2, steps 260, 270, 280 and 220 can include alogging function in the PCD 150 and a compliance enforcement function inthe server 180; the PCD 150 retrieving log data from the loggingfunction and communicating it to the personal device 110; the personaldevice 110 communicating the log data the server 180; the server 180determining how the log data corresponds to the conditions in thetransport and/or storage operations data; the server 180 determining theenforcement action in response to the compliance with the conditions;and the server 180 causing the enforcement action to be executed by thecompliance enforcement function. This can be implemented, for example,by the PCD storing time stamps of the performed operations in its memoryand allowing them to be read by the smart phone of the sender over anNFC interface; the server identifying a difference between theinstructed deadline of a drop-off by a transporter stored in thedatabase record for the transport and the timestamp communicated overthe internet by the smart phone of the sender on behalf of the PCD;adjusting the reliability score of the non-compliant transporter lower;and filtering out in its matching function subsequent transport requeststhat require a higher reliability score than the adjusted score.

Accordingly, in FIG. 2, steps 260, 270 and 280 can include a firstpersonal device 110 configuring authorization data associated with theplanned transport and/or storage operations data in the PCD 150; the PCD150 communicating the authorization data and the planned transportand/or storage operations data to a second personal device 110; thesecond personal device 110 determining how the authorization datacorresponds to previously stored authorization data; and the secondpersonal device 110 configuring the planned transport and/or storageoperations data. This can be implemented, for example, by the smartphone of the sender writing a message authentication code generated bythe server to memory in the PCD over an NFC interface; the smart phoneof the transporter reading an update to the drop-off point and themessage authentication code from the memory of the PCD over an NFCinterface; the smart phone of the transporter generating the samemessage authentication code from the update to the drop-off point usingthe server's key; and the smart phone of the transporter replacing thedrop-off point with the updated point.

Accordingly, in FIG. 2, at steps 210 and 220, the management oftransport requests and transport offers with users can include agraphical user interface in a personal device 110 or a serverdetermining user interface representations of a package 140 and usersinvolved in the transport of the package 140; a user creating atransport request or a transport offer by moving in the user interfacethe representation of the package 140 from a first location in a datastructure to a second location in a data structure; and a personaldevice 110 or a server communicating to the user the status of thetransport by causing a change in the representation of a package 140 ora user in the user interface. This can be implemented, for example, by aserver mapping goods, packages, storages and users into files andfolders in a file system, such as in the Dropbox or Google Drive filesharing service; a sender creating a transport request by moving filesrepresenting goods into a folder representing a package, and moving thepackage folder into a folder representing the destination storage of therecipient; a transporter creating a transport offer by moving a folderrepresenting an unknown package into a folder representing a drivingroute; the server showing a progress indicator icon on the packagefolder icon while the package is not in the destination location; andthe server showing a synchronization complete indicator icon on thepackage folder icon when the package has arrived at the destinationstorage of the recipient.

FIG. 3A shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary goodstransport procedure. For example, FIG. 3A is a flowchart depictingprocesses performed by the system and method 101 of FIG. 1B in anexemplary goods transport procedure. In step 310, after senders 111 havemade transport requests, and transporters 112 have made transport offersusing their personal devices 110, the TMS 170 determines transportand/or storage conditions on behalf of a specific sender 111, and thendetermines the transporters compliance with the conditions. Thetransport and/or storage conditions can include, for example, acondition on the timing of a transport operation, and/or a condition onan environmental variable, such as temperature of the package 140.

In step 320, after the sender 111 and a specific transporter 112 and/ortransporters 112 matched by the TMS 170 have accepted the transporttransaction, the TMS 170 determines the transport and/or storage routepoints, and time windows (e.g., wherein the package 140 needs to be andwhen), and communicates the transport instructions and transportconditions (e.g., which can include transport and/or storage conditionsand transport and/or storage route points and time windows) to thesender's personal device 117 and the transporter's personal device 118.

In step 330, after the sender 111 has attached the PCD 150 to thepackage 140, the sender's personal device 117 communicates transportinstructions to the PCD 150, which then locks itself. The PCD 150 thencommunicates its previously stored package operations and status data tothe sender's personal device 117, which communicates the operations andstatus data to the TMS 170.

In step 340, after the sender 111 has carried the package 140 and placedit in the instructed storage location of the storage device 130, thestorage device 130 and the PCD 150 activate their security mechanisms.One or more of the storage device 130, the PCD 150 and/or the sender'spersonal device 117 then communicate to the sender 111 (and e.g.,optionally to the TMS 170) that their custody of and liability for thepackage 140 has been released.

In step 350, after the transporter's personal device 118 hasauthenticated the transporter 112 with the storage device 130, and thePCD 150, their corresponding security mechanisms are deactivate. One ormore of the storage device 130, the PCD 150 and/or transporter'spersonal device 118 then communicate to the transporter 112 (and e.g.,optionally to the TMS 170) that they are now in custody of and haveliability for the package 140. The transporter 112 picks up the package140 and places it to their vehicle 120.

In step 360, while the transporter 112 transports the package 140, thePCD 150 determines the transporter's compliance with the transportinstructions, communicates to the transporter the level of compliance,and communicates to the transporter instructions that, when performed,adjust the level of compliance. In step 370, after the transporter 112has transported the package 140 and placed it in the instructed secondstorage device 130, the second storage device 130 and the PCD 150activate their security mechanisms. One or more of the second storagedevice 130, the PCD 150 or the transporter's personal device 118 thencommunicate to the transporter 112 (and e.g., optionally to the TMS 170)that their custody of and liability for the package 140 has beenreleased.

In step 380, after the recipient's personal device 119 has authenticatedthe recipient 113 with the storage device 130 and the PCD 150, thecorresponding security mechanisms are deactivate. One or more of thestorage device 130, the PCD 150 and/or the recipient's personal device119 then communicate to the recipient 113 (and e.g., optionally to theTMS 170) that they now are in custody of and have liability for thepackage 140. The recipient 113 picks up the package 140 and takes it tothe transport destination.

In step 390, after the recipient's personal device 119 has authenticatedthe recipient 113 with the PCD 150, and the PCD 150 has authorized therecipient 113, the PCD 150 unlocks its access control. The recipient 113detaches the PCD 150 from the package 140 to access the packagecontents, and the recipient's personal device 119 communicates to therecipient 113 the level of compliance of the completed transport withthe transport conditions.

Accordingly, in FIG. 3A, steps 310 and 320 can include the determinationof transport conditions and matching of transport offers and requests inone or more of the personal devices 110 of the sender 111, transporter112 or recipient 113 in addition to or instead of the TMS 170 and can beimplemented, for example, by the transporter's personal device 118sending a transport offer to a list of personal devices 110 known to beoperated by senders 111, and a sender's personal device 117 matching theoffer with its transport request and sending a response including thetransport transaction to the transporter's personal device 118. This canalso be implemented, for example, by the sender's personal device 117sending a transport request to a list of personal devices 110 known tobe operated by transporters 112, and a transporter's personal device 118matching the request with its transport offer and sending a responseincluding the transport transaction to the sender's personal device 117.

Accordingly, in FIG. 3A, at step 310, when determining transportconditions the determination can include modifications based on thecharacteristics of the package 140, transport route or storage facility130 and can be implemented, for example, by omitting temperatureconditions if the package includes refrigeration functionality and thestorage facility provides external electricity supply for the packages,or by more stringent acceleration conditions if log data from previoustransport operations along the transport route have identified the roadto be bumpy, or adding water resistance conditions if a weather forecastfor the area of the storage along the transport route indicates rain.The transport conditions can include conditions based on the contents,the transport requestor, and the package owner.

Accordingly, in FIG. 3A, at step 310, when determining transporters 112compliant with the conditions the determination can include an estimateof their probability to achieve compliance and can be implemented, forexample, as a ratio of their performance in past transport and/orstorage operations to the conditions for the same operations, or as asimilar ratio but only for past transport and/or storage operations thatare similar to the currently planned one.

Accordingly, in FIG. 3A, at step 310, when determining transporters 112compliant with the transport conditions the determination can also caninclude modifications of the conditions based on the availability ofcompliant transporters 112 and can be implemented, for example, with atimer that measures time until the scheduled start of the transport, andthe TMS relaxing on behalf of the sender conditions, such as therequired reputation when the timer exceeds a threshold.

Accordingly, in FIG. 3A, at step 310, the making of transport requestsor transport offers can include determination of potential transporters112 or recipients 113 from whom the requests or offers can be solicitedand can be implemented, for example, by a server of a parcel deliveryservice comparing routes from a parcel distribution point, such as apost office or an automated parcel storage to the addresses of differentparcel recipients with parcels in the same distribution point at thesame time, and sending with SMS solicitations of transport requests ortransport offers to users with sufficiently matching routes. The makingof transport requests or transport offers can include determination ofpotential time windows with minimal conflicts with the other scheduledactivities of the transport operations by senders 111, transporters 112or recipients 113 and can be implemented, for example, by importingcalendar availability data from the user's account in external calendarservices, such as Google Calendar or from the user's account in socialmedia services, such as Facebook. The making of transport requests ortransport offers by importing data from the user's account in externalservices can further can include determination of potential transporters112 contactable through the first user from whom the transport offerscan be solicited and can be implemented, for example, by sending to thefirst user solicitation of transport offers to be forwarded to theuser's contacts in the external service who are joining the user in thescheduled activity.

Accordingly, in FIG. 3A, at step 310, the making of transport requestsor transport offers can include determination of transport request ortransport offer conditions and data by importing them from a third partyand can be implemented, for example, by the user taking a picture of aQR-code that supplies some or all of the information required in atransport request for the associated goods or package.

Accordingly, in FIG. 3A, at step 310, the making of transport requestsor transport offers can include a determination of guarantee availablefrom the user making the transport request or transport offer and can beimplemented, for example, by calculating a certain percentage of themoney or loyalty points stored in the user's customer account to be usedas deposit and reserving that to the transport until the transport isconfirmed completed, and comparing the total sum of all depositsallocated by the user for different transports to the total money orloyalty points stored in the user's customer account to be used asdeposit, and blocking the transport request or transport offer by theuser if the total sum of deposits exceeds the total available fordeposits. The determination of deposit can further include thedetermination of guarantee available from other users who have madetheir guarantees available to the user. This can be implemented, forexample, by a group of users pooling their deposits by authorizing theallocation of their deposits by another user in the group, and blockingthe transport request or transport offer by the user if the total sum ofdeposits allocated by all users in the group exceeds the total availablefor deposits by all users in the group.

The determination of deposit can further include the determination ofoverlapping deposit allocations to prevent dual counting of depositsbetween a first group of users and a second group of users; a userallowing a guarantee provided by him to be used by other users in thefirst group and in the second group; the start of a service transactionby a second user in the first group causing the guarantee to beprevented from use by a third user in the second group; and the end ofthe service transaction by the second user in the first group causingthe guarantee to be allowed for use by a third user in the second group.This can be implemented, for example, by users A, B and C pooling 100dollars each to mutual guarantees and users C, D and E pooling 100dollars each to mutual guarantees; user A committing to a transportrequiring all 300 dollars of guarantees from users A, B and C andpreventing users D and E from use of user C's 100 dollars of guarantees;and user A completing the transport releasing user C's 100 dollars ofguarantees for use in guarantees by users D or E. The determination ofoverlapping deposit allocations can further include determination ofoverlaps for groups of users with partially overlapping membership andcan be implemented, for example, by calculating allocations and depositavailability for all group in which the user is a member, and selectingto allocate the deposit from the group with the most deposits availablefor allocation.

Accordingly, in FIG. 3A, at step 310, when determining transporterscompliant with the transport conditions the determination can includedetermination of the type of package 140 or the specific package 140used in the transport and can be implemented, for example, as a queryfrom a list of packages returning packages located in the proximity ofthe driver, the transport starting point or the first drop-off point, oras a query from a list of packages returning packages with arefrigeration functionality.

Accordingly, in FIG. 3A, at step 310, when determining transporterscompliant with the transport conditions the determination can includedetermination of available goods transport capacity in a transportvehicle, including reception of a signal in a sensor in the transportvehicle; and determination of the available goods transport capacity inthe transport vehicle based on the received signal. This can beimplemented, for example, by a radio or ultrasound or pressure sensor inthe trunk of the transporter's vehicle receiving a signal (e.g., sent bya radar or ultrasound signal source synchronized with the sensor), andan analysis functionality in the vehicle or the personal device or theserver comparing the received signal to signals associated withdifferent amounts of goods stored in the trunk as indicated by thetransport requests associated with the goods.

Accordingly, in FIG. 3A, at step 320, when determining transportinstructions, the determination can further include determination ofidentification data of a package 140, including determination ofidentifiers on packages present in the proximity of the same storagelocations or transport vehicles at the same time as the package;determination of an identifier different from those in other packages;and communication of the identifier to the user. This can beimplemented, for example, as a query from a database of identifiersprinted or written on the surfaces of other packages present in the samestorage locations or transport vehicles at the same time as the package,and determination of an identifier different from those; andcommunicating that to the sender to be written on the package. This canalso be implemented, for example, as a query from a database of PCDs thevisual appearance of the PCDs that are present in the sender's location,and instructing the sender to select for attachment to the package a PCDthat is visually different from the PCDs used in other transportprocedures that will be in the same storage locations or transportvehicles at the same time as the PCD.

Accordingly, in FIG. 3A, at step 320, when determining transportinstructions, the determination can further include determination of astorage location in the storage device 130 based on the scheduling ofdrop-off of the package compared to other packages, or the scheduling ofpick-up of the package compared to other packages, or the identifiers ofthe package compared to other packages and can be implemented, forexample, by calculating the total number of storage movements for allcombinations of package drop-offs and package pick-ups in storagelocations of a storage where storage locations are sequentially accessedand then selecting the storage location where the total number ofstorage movements is lowest, or as a query from a database ofidentifiers on other packages present in the same storage at the sametime as the package, and selecting a storage location where none of theidentifiers in the neighboring storage locations is the same as theidentifier of the package (in the PCD). This allows reduction ofcollisions when short and easy to remember package identifiers arereused even in the same storage or vehicle.

Accordingly, in FIG. 3A, at step 320, the determination of acceptance ofa transport transaction by a transporter 112 can include causing adifferent transaction or function to be activated. This method foractivation of a transaction between entities that are the end points ofa transport procedure includes determining the transport procedure thatis a condition for the transaction; determining the commitment oftransporters to execute the transport procedure; and causing thetransaction to be activated. This be implemented, for example, by asender putting goods on sale in an online auction or classifieds serviceand the recipient purchasing the goods on the condition that he canarrange a transport for them; the service linking a transport request tothe purchase; the recipient configuring the transport request; and thetransporter's acceptance of a transport request executing theconditional purchase agreement in the online auction or classifiedsservice.

Accordingly, in FIG. 3A, steps 320 and 350 can include an authorizedpersonal device 110 configuring transport instructions and authorizationdata associated with the transport instructions in the PCD 150 or thestorage device 130. This can be implemented, for example, by the smartphone of the transporter writing a new transport destination, atransporter authorization or a recipient authorization for a package anda message authentication code generated by the server to the memory inthe storage over an NFC interface; and the storage generating the samemessage authentication code from the updated transport instructionsusing the server's key to confirm the authorization of the changes; andthe storage configuring the new transport instructions to the PCD. Thisallows the use of the storage or the PCD to control the rental of goodsto users that were unknown at the time when the goods were placed in thestorage.

Accordingly, in FIG. 3A, at step 330, the transport instructions caninclude authorization data for each specific operation performed withthe package 140 or the PCD 150 and can be implemented, for example, withrole-based access control in the PCD, or with hash chains used in thePCD to derive multiple unique keys for the different operatorsperforming a specific operation. The authorized operations can furtherinclude authorization to change the transport instructions in the targetdevice such as a personal device 110 or a storage device 130 and can beimplemented, for example, as a message authentication code transmittedwith the new transport instructions from the PCD or the personal deviceof a previous operator to the personal device of a subsequent operator,or to the PCD.

Accordingly, in FIG. 3A, at step 330, the security mechanisms caninclude an alert feature or an alarm feature and can be implemented, forexample, as a visual or audio output in a user interface, or as datacommunication to a server or to the personal device of a transportstakeholder.

Accordingly, in FIG. 3A, at step 340, the communication of previouslystored package operations and status data from the PCD 150 to thesender's personal device 117 and then to the TMS 170 can include aselection of only part of the stored data or of calculations made withthe stored data by the PCD 150 or the sender's personal device 117 andcan be implemented, for example, by the PCD writing only every tenthmeasurement data point to the NFC buffer read by the sender's smartphone.

Accordingly, in FIG. 3A, at step 340, the communication of previouslystored package operations and status data from the PCD 150 to thesender's personal device 117 and then to the TMS 170 can include acomparison of stored data from a first PCD 150 with stored data ofsimilar type from a second PCD 150 or a personal device 110 or a vehicle120 if they were in the same vehicle 120 or storage device 130 at thesame time as the first PCD 150, and can be implemented, for example, bythe TMS making queries in its database of transport transactions todetermine devices in the same vehicle or storage, calculatingcorrelations between the measured package operations and status datastored in the database for those devices, and calculating variables thatwhen estimating one device's measurement from another device'smeasurement. This allows the calibration of sensor data provided by avehicle or a personal device using sensor data from a PCD, and thepossibility of performing measurements by proxy devices even when thePCD does not have a sensor of that type. This also allows thecalibration of sensor data in a PCD from higher precision sensor data inanother PCD, and the possibility of using lower accuracy components insome of the PCDs.

Accordingly, in FIG. 3A, at steps 350 and 380, the authentication of theoperator (e.g., sender 111 or transporter 112 or recipient 113) with thePCD 150 can include the PCD 150 determining a unique signal associatedwith the operator and can be implemented, for example, by detecting aBluetooth connection from a smart phone associated with the operator, orby the PCD detecting with a touch screen a movement that forms a uniquegesture. The authentication of the operator with the PCD 150 can includethe PCD 150 determining the operation occurring between the operator andthe package 140 and can be implemented, for example, with the PADinterface device detecting the attachment of a physical connector withthe PCD, or with an acceleration sensor detecting movement of the PCD,or with a radio interface such as a Bluetooth device detecting aproximity connection from a smart phone associated with the operator.The determination by the PCD 150 of the operation occurring between theoperator and the package 140 can further include determination of thechanges in the interfaces of the PCD 150, or determination of the accessor operator required for the operation and can be implemented, forexample, by changing the end point of a Bluetooth link by the PCD fromthe first authorized personal device to the second authorized personaldevice.

Accordingly, in FIG. 3A, the steps 350 and 380 can further include theserver 180, the personal device 110, the storage device 130 or the PCD150 determining the package 140 based on the planned operation oroperator of the package 140 and can be implemented, for example, bycommunicating only authentication data associated with the operation oroperator to all PCDs in the proximity; the PCDs validating theauthentication data with their transport instructions; and the PCDs ofthe relevant package or packages communicating the successfulidentification to the operator or his smart phone.

Accordingly, in FIG. 3A, steps 370 and 380 can include an authorizedpersonal device 110 configuring authorization data to another personaldevice 110. This can be implemented, for example, by the smart phone ofthe transporter first authenticating the recipient, for example, withthe recipient writing a password over a user interface of the smartphone and the smart phone comparing it against a message authenticationcode for the password provided by the server, and then writing anidentifier for the recipient to an NFC key over an NFC interface. Thisallows the use of the personal device of a user, such as a transporter,to distribute personal devices to new users, such as recipients.

Accordingly, in FIG. 3A, the steps 330, 340, 350, 360, 370, 380 or 390can further include the PCD 150 determining the signals that indicate tothe identified operator the package 140 or the occurring transportand/or storage operation and can be implemented, for example, with a LEDin the PCD activating in a pattern associated with the operation, orwith a LED or an audio device in the PCD activating in a synchronizedpattern with a corresponding visual or audio output in the userinterface of the operator's smart phone. The determination of thesignals can further include determination of a signal thatdifferentiates it from the signals communicated to other users in thesame space and can be implemented, for example, by the PCD or theoperator's smart phone communicating the selected signal to the storage,and the storage identifying conflicts of the signal with signalscommunicated previously and associated to other packages operated withinor in the proximity of the storage.

Accordingly, in FIG. 3A, the steps 330, 340, 350, 360, 370, 380 or 390can further include the PCD 150 determining the occurrence of thecontext in which an operation may take place and can be implemented, forexample, by detecting a radio signal such as a signal from an NFCdevice, or by detecting with sensors or physical interfaces a mechanicalinteraction with the package or the PCD such as a stationary packagebeing picked up, or by detecting with sensors in the PCD a change in theenvironment such as a light sensor detecting the opening of a storagedoor, or by detecting from another device communicating over acommunication interface a change in the environment such as a smartphone in the proximity detecting its location from a GPS receiver andcommunicating that to the PCD. The determination can further include thePCD 150 using the occurrence of the context as one condition in theauthorization of the operation. The detection of a mechanicalinteraction with the package 140 or the PCD 150 can further include auser interface input and can be implemented, for example, as a manualswitch or button that a user can operate to communicate a state changein the transport and/or storage process such as the completion of thedrop-off procedure, or to communicate his intent to communicate over aradio interface such as an NFC interface, thus allowing the PCD toconserve energy by keeping sensors or radio interfaces in a low-powerstate outside the time windows when operations take place.

Accordingly, in FIG. 3A, at steps 350, 380 and 390, the authorization ofthe operator with the PCD 150 can include the PCD 150 allowing theoperator to have access to the package 140, package contents, dataregarding the package 140, or data regarding the package transportand/or storage and can be implemented, for example, with separateauthorization data for each access operation type, or with a singleauthorization granting access to an associated list of operation types.

Accordingly, in FIG. 3A, at steps 340, 360 and 370, while the package140 is being transported or stored, the determination of compliance withthe transport conditions by the PCD 150 can further include the PCDcausing a change in the way that the determination is performed and canbe implemented, for example, with a state machine where proximity to apick-up event time window causes the PCD to switch to a state where itactivates a radio interface such as an NFC interface more frequently inorder to more quickly detect connection attempts from a smart phone ofthe operator, or with a state machine where a difference betweenmeasured performance and the conditions causes the PCD to switch to astate where it activates the performance monitoring sensors to operatewith a higher accuracy. Likewise, while the package 140 is beingtransported or stored, determination of compliance with the transportconditions by the PCD 150 can further include the PCD 150 causing achange in the transport conditions and can be implemented, for example,with a state machine where a difference between the temperature measuredby the PCD and the temperature conditions causes the PCD to switch to astate where the temperature or schedule conditions are relaxed for theremainder of the transport process. Likewise, while the package 140 isbeing transported or stored, determination of compliance with thetransport conditions by the PCD 150 can further include the PCD 150causing a change in the transport instructions and can be implemented,for example, with a state machine where determined non-compliance with adrop-off time window causes the PCD to switch to a state where itactivates the authorization of a different user to pick up and furthertransport the package in order to execute the further transport fasterthan by the previously authorized user.

Accordingly, in FIG. 3A, at steps 340, 360 and 370, while the package140 is being transported or stored, the determination of compliance withthe transport conditions by the PCD 150 can further include the PCD 150or personal device 110 determining the signals that indicate to theoperator the level of compliance with the transport conditions and canbe implemented, for example, as a green LED in the PCD for fullcompliance and a red LED for non-compliance, or as an indication of timeleft until the expiration of the drop-off time window communicated bythe PCD to the operator's smart phone over a communication interfacefollowed by the operator's smart phone displaying a countdown sequenceto the operator in its user interface. Likewise, the determination ofcompliance with the transport conditions by the PCD can further includethe PCD 150 or personal device 110 determining the signals that indicateto the operator actions that the operator can perform to improve thelevel of compliance with the transport conditions and can beimplemented, for example, as a blinking red LED in the PCD warning theoperator that he has to authenticate himself first before picking up thepackage in order not to activate the alarm function, or as an audiosignal in the smart phone instructing the driver to turn on airconditioning. Likewise, the determination of compliance with thetransport conditions by the PCD 150 can further include the PCD 150determining actions that the PCD 150 can perform to improve the level ofcompliance with the transport conditions and can be implemented, forexample, with a state machine where a difference between the temperaturemeasured by the PCD and the temperature conditions causes the PCD toswitch on a refrigeration function in the package. Likewise, thedetermination of compliance with the transport conditions by the PCD 150or the personal device 110 can further include the PCD 150 or thepersonal device 110 communicating the non-compliance to the TMS 170 andthe TMS 170 determining actions that the to improve the level ofcompliance with the transport conditions and can be implemented, forexample, by the TMS creating a new transport request from a drop-offpoint along the route of the current operator of the package to thedestination location of the package.

Accordingly, in FIG. 3A, at steps 340, 360 and 370, while the package140 is being transported or stored, the determination of compliance withthe transport conditions by the PCD 150 can further include the PCD 150or personal device 110 determining signals that indicate to the operatoran omission of a user input over a user interface and can beimplemented, for example, as an audio device in the PCD activatingwithin 30 seconds of a context where there is less than 10 minutes tothe scheduled drop-off time, and an acceleration sensor indicates thatthe package is completely stationary, and the user has not pressed abutton to indicate that he has dropped off the package.

Accordingly, in FIG. 3A, at steps 340, 350, 370 and 380, when thepackage 140 is being transferred between a user and the storage device130 or between two users, the PCD 150 or the storage device 130 or auser's personal device 110 can communicate to the users (and optionallyto the TMS 170) a change in the custody of and liability for the package140 based on the existence of a network link between the PCD 150 and theuser's personal device 110 and can be implemented, for example, by thePCD automatically establishing Bluetooth connections with the smartphones of its operators, and the PCD and the first smart phone detectingthe loss of a Bluetooth connection with the smart phone of the firstuser and the PCD and the second smart phone detecting the establishmentof a Bluetooth connection with the smart phone of the second user, andthe PCD and the smart phones using this information as a trigger forrelease of the liability of the first user and the start of theliability of the second user.

Accordingly, in FIG. 3A, step 390 can include a determination of theliability share of each user based on their level of compliance with thetransport conditions and can be implemented, for example, by assigningequal amount of liability to all users who were in non-compliance, or byassigning to each user a share of liability relative to their share ofthe non-compliance such as a 10% share of liability for missing adrop-off deadline by 10 minutes when the total delay for the transportwas measured as 100 minutes.

Accordingly, in FIG. 3A, step 390 can include a determination by the TMS170 of compensation for the transporter 112 from the sender 111, therecipient 113 or a third party and can be implemented, for example, by aserver moving money or customer loyalty points from the paying party'saccount to the transporter's account.

The determination of compensation can further include compensation thatis conditional on a match with an end point of the transporttransaction. The determination of compensation conditional on a matchwith an end point can further include the conservation of the conditionwhen the compensation is transferred to another user, wherein a firstuser making a transaction where a location was an end point causes thefirst user to receive a voucher for a service with that end point as acondition for the service; the first user transferring the voucher to asecond user; and preventing the second user from using the voucher for aservice unless the service is provided in the end point or involving endpoints including the end point indicated in the condition. This can beimplemented, for example, by payment of the transport with customerloyalty points that can only be used for paying for transport to or fromthe retail store from which the completed transport was made, or forpaying for purchases in the retail store from which the completedtransport was made. This allows the paying party to ensure that thecompensation it pays out to its customers is used for subsequentcustomer visits, even if the subsequently visiting customer is differentfrom the compensated customer.

Accordingly, in FIG. 3A, any of the steps 310 through 390 can furtherinclude the display of information to persons in the proximity of apackage 140 at various points and times along the route or storage bythe PCD 150 or by the PCD 150 further communicating the information toother devices in the system and method 101 or to external devicesoutside the system and method 101 for the purposes of display to users.This method includes determination of persons in the proximity of thepackage along the route or storage; determination of informationcommunicated to the persons; communication of the information to apacket control device; and communication of the information from thepacket control device to persons in the proximity of the package via auser interface device. This can be implemented by the TMS querying froma list of advertisements, a suitable advertisement associated with atarget gender and age group that correlates the most with the gendersand age groups of the users operating the package, and communicating inthe transport instructions to the PCD that advertisement to be displayedby a display device on the PCD. This can also be implemented, forexample, by instructing the selected advertisement to be displayed byany display device that the PCD can connect to during the transport,such as a public information screen.

FIG. 3B shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary procedureof sending and receiving a package. For example, FIG. 3B is a flowchartdepicting processes performed by the system and method 101 of FIG. 1B inan exemplary procedure of sending and receiving a package 140. In step331, the sender's personal device 117 communicates transportinstructions from the TMS 170 to the PCD 150. In step 332, the sender'spersonal device 117 communicates previously stored log data on thepackage operations and status from the PCD 150 to the TMS 170.

In step 333, the PCD 150 starts to store new log data on the packageoperations and status. In step 334, the sender 111 attaches the PCD 150to the package 140. In step 335, the PCD 150 locks attachment to thepackage 140. The package 140 is then dropped off, transported by anauthorized transporter 112, and picked up in the transport destinationby an authorized recipient 113. In step 391, the recipient's personaldevice 119 authorizes the recipient 113 with the PCD 150.

In step 392, the PCD 150 unlocks the attachment of the PCD 150 to thepackage 140. In step 393, the recipient 113 detaches the PCD 150 fromthe package 140. In step 394, the PCD 150 stops storing of log data onpackage operations and status. In step 395, the recipient's personaldevice 119 communicates to the recipient 113 the level of compliance ofthe completed transport with the transport conditions. In step 396, therecipient's personal device 119 checks if the transport was incompliance. In step 397, if the transport was not in compliance, therecipient's personal device 119 communicates to the TMS 170 informationon the noncompliance.

Accordingly, in FIG. 3B, at step 335, the attachment of the PCD 150 tothe package 140 can include a separate module and can be implemented,for example, as a pouch into which the PCD is inserted, or as a backcover that is attached to the PCD. The locking of the attachment of thePCD 150 to the package 140 can include a feature that mechanicallyhinders the opening of the package 150 and can be implemented, forexample, as a latch holding a strap that physically encircles thepackage in one or more directions, as a latch holding a strap or a wirethat loops through holes in zipper pulls on either side of an opening,as an adhesive pouch that spans across the lids of a cardboard box, oras a pair of U-shaped wings into which the lids of a cardboard boxslide. The activation of the locking of the attachment of the PCD 150 tothe package 140 can include a user input and can be implemented, forexample, as a button, or reading of an NFC device.

FIG. 3C shows an illustrative flowchart of processes performed by agoods transport and storage system and method in an exemplary procedureof dropping off and picking up a package in storage. For example, FIG.3C is a flowchart depicting processes performed by the system and method101 of FIG. 1B in an exemplary procedure of dropping off and picking upa package 140 in a storage device 130. In step 341, the first user'spersonal device 110 indicates the designated storage location in thestorage device 130.

In step 342, the first user places the package 140 in the instructedstorage location. In step 343, the first user attaches the storage PAD133 to the PCD 150. In step 344, the storage device 130 and the PCD 150activate their security mechanisms. In step 345, one or more of thestorage device 130, the PCD 150 or the first user's personal device 110inform the first user that his custody of and liability for the package140 has been released. The package 140 is then in storage device 130pending pick-up.

In step 351, one or more of the storage device 130, the second user'spersonal device 110 or the PCD 150 indicate which package 140 is to bepicked up. In step 352, the second user tries to pick up the package 140by detaching the storage PAD 133 from the PCD 150. In step 353, the PCD150 authenticates the second user's personal device 110. In step 354,the PCD 150 checks if the second user is authorized. In step 355, if thesecond user is not authorized, one or more of the storage device 130 andthe PCD 150 activate their alert mechanisms and prevent access to thepackage 140.

In step 356, if the second user is authorized, the storage device 130and the PCD 150 deactivate their security mechanisms. In step 357, thesecond user detaches the PCD 150 from the storage PAD 133. In step 358,one or more of the storage device 130, the PCD 150 or the second user'spersonal device 110 inform the second user that he is now in custody ofand has liability for the package 140. In step 359, the second userpicks up the package 140 from the storage device 130.

Accordingly, in FIG. 3C, at step 353, the authentication of the seconduser's personal device 110 by the storage device 130 can be implemented,for example, by the user sending an SMS from the smart phone to a numberassociated with the storage.

Accordingly, in FIG. 3C, at step 351, the indication of which package140 is to be picked up by one or more of the storage device 130, thesecond user's personal device 110 or the PCD 150 can further includedetection of the user's movement and a user interface direction topackage

Accordingly, in FIG. 3C, at step 343 and 352, the attachment of the PCD150 to the PAD 133 can include a physical interface and can beimplemented, for example, with an asymmetrical connector that allows thedirection of the PCD 150 and package to be easily detected orrestricted. The PAD 133 can include a single interface device thatincludes a physical interface and a communication interface, which canfurther include a function that retransmits data that it receives over adifferent communication interface, thus allowing the operator's personaldevice 110 to access the communication interface of the PCD 150 via thePAD 133 even if the PCD's 150 communication interface is otherwisephysically blocked by the PAD 133.

FIG. 4 shows an illustrative package control device 400 attached to apackage to transfer the package securely between participants of apackage transport and/or storage operation and to monitor compliancewith terms of service. For example, FIG. 4 is an illustrative embodimentof a package control device (PCD) 400 that describes additional detailsof the PCD 150 of FIG. 1A or FIG. 1B.

In FIG. 4, generally, the PCD 400 provides for controlled access to apackage 140 and its contents by users of the systems and methods of thepresent invention, and stores data on the status of or the operationsperformed with the package 140. The front cover 412 and back cover 414protect the components inside the PCD 400 and can be implemented, forexample, with a sealed water resistant or water-proof plastic casing.The bus 420 provides communication for the components inside the PCD400. The processing module 430 can include a processor 432 coupled tothe bus 420, a memory 434 coupled to the bus 420, a read-only memory 436coupled to the bus 420 or an application-specific processor (ASIC) 438that can be, for example, a processor providing cryptographic functions,coupled to the bus 420.

The communication interface 440 coupled to the bus 420 providesconnectivity to other devices of the systems and methods of the presentinvention over network link 445. The user interface module 450 caninclude a visual output device 452 coupled to the bus 420, an audiooutput device 454 coupled to the bus 420, or a touch input device 456coupled to the bus 420. The sensor module 460 coupled to the bus 420 caninclude an acceleration sensor 462 or a temperature sensor 464.

The interface sensor module 480 coupled to the bus 420 can include apackage lock sensor 482, a PAD lock sensor 484, a cover lock sensor 486,or an electricity supply sensor 488. The package lock 492 provides forattachment of the PCD to a package 140 with package connection 495. ThePAD lock 494 provides for attachment of the PCD to a PAD 133 with PADconnection 495. The cover lock 496 provides for attachment of the frontcover 412 to the back cover 414. The electricity supply 498 provideselectricity to the components inside the PCD 400 and can be implemented,for example, as a battery or a capacitor connected with an energyharvesting mechanism.

Accordingly, in FIG. 4, the bus 420 can include an interface to adetachable component module and can be implemented, for example, with anSD card interface to a processing module 430 implemented as an SD card.

Accordingly, in FIG. 4, the sensor module 460 can include other sensorsand can be implemented, for example, with a humidity sensor, a pressuresensor, or a radioactivity sensor. The sensor module 460 can furtherinclude a mechanical protrusion in the back cover 414 or a detachablemodule connecting to the back cover 414 and providing sensor input frominside the package 140, and can be implemented, for example, with a heatconducting metal wire leading from a temperature sensor inside the PCDto the tip of a short plastic pipe inserted just inside a cardboard boxbetween its lids when the PCD is placed on them.

Accordingly, in FIG. 4, the visual output device 452 and the touch inputdevice 456 can be implemented, for example, with a single LED that isalso used as a light sensor capable of detecting when the button wherethe LED is located is physically blocked by, for example, a finger.

Accordingly, in FIG. 4, the locks 492, 494 or 496 can include one ormore mechanical buttons and one or more actuators where the actuatorenables or disables the mechanical operation of the button whereas themechanical operation of the button causes the lock to change state. Thiscan be implemented, for example, with an actuator sliding a solid bar ordisc under cover lock opening button in the first position, under bothcover lock and package lock opening buttons in the second position, andunder all of the cover lock, package lock and PAD lock opening buttonsin the third position, thus preventing the forced opening of themechanical locks.

Accordingly, in FIG. 4, the package lock 492 connects to the PCD packageinterface 154 of the system and method 101. The PAD lock 494 connects tothe PCD attachment device interface 153 of system and method 101. Thenetwork link 445 connects to the PCD communication interface 151 ofsystem and method 101. The user interface module 460 provides userinterface 152 of system and method 101.

Accordingly, in FIG. 4, the electricity supply 498 can include aninterface that can be used to connect it to an external electricitysupply and can be implemented, for example, with a galvanic connectionto a PAD including an electric cable.

Accordingly, in FIG. 4, the PCD can include a method controlling accessto a package, including a device with a communication interface; adetachable module physically or mechanically connecting the packagecontrol device to the package; and a locking mechanism detecting openingof the package or the physical or mechanical disconnection of thepackage control device from the package. This can be implemented, forexample, with the locking mechanism in the back cover 414 or adetachable module connecting to the back cover 414. The lockingmechanism can be implemented, for example, with mechanical protrusionsthat can be used to attach the PCD to the package with one or morespikes that penetrate into a cardboard box and in combination with atightened strap prevent the movement of the PCD from its position on thepackage, or with a fork-shaped module with one or more spikes passingthrough holes in one or more zipper pulls being attached to a slot inthe back cover between the back cover and the package, or with a pair ofU-shaped metal plates or loops of rigid wire that are normally flatagainst the back cover but can be pulled outwards as springs and in thatposition slid under the lids of a cardboard box where they incombination with a tightened strap prevent the opening of the lids. Theopening of any of these locking mechanisms can be sensed with sensorssuch as an electric switch or a light sensor attached to the mechanicalconnectors, slots, hinges or strap locks.

Accordingly, the PCD 150 of system and method 100 of FIG. 1A, or the PCD150 of system and method 101 of FIG. 1B, or system 400 of FIG. 4, caninclude a package and can be implemented, for example, by attaching thePCD to the zippers of a bag to allow locking of the package opening andof the PCD to the package and to the handle of the bag to allow liftingof the PCD using the PAD interface. The combination of a package 140 anda PCD 150 can further include a slot in the package 140 where the PCD150 can be inserted and operated, or an environmental control modulesuch as a refrigeration module or an inflatable shock absorbing module,or one or more PADs and can be implemented, for example, with a rigidplastic container with an electricity supply and internal modules.

Accordingly, the PCD 150 of system and method 100 of FIG. 1A, or the PCD150 of system and method 101 of FIG. 1B, or system 400 of FIG. 4, caninclude a communication functionality where data communication from afirst device of the systems and methods of the present invention overnetwork link 445 and communication interface 440 is further communicatedto a second device connectivity to a second device of the systems andmethods of the present invention over the same or a differentcommunication interface 440 and network link 445 and can be implemented,for example, by the PCD copying the memory buffer of one NFC device tothe output memory buffer of another NFC device on a different side of apackage. This allows the connection of two or more packages 140 withPCDs 150 together and communication from a personal device 110 tomultiple PCDs over a connection with a single PCD interface.

FIG. 5 shows an illustrative state machine 500 in a package controldevice that controls access to a package and contents thereof. Forexample, FIG. 5 depicts the state machine 500 including states and statetransitions of the PCD 150 of FIG. 1A or FIG. 1B, or the PCD 400 of FIG.4 in an exemplary goods transport and/or storage procedure. In the“idle” state 510, the PCD 150 is not assigned to any transport and/orstorage operation and does not have any active or pending transportinstructions. The state transition 519 can be implemented, for example,by the sender writing of transport instructions and reading of log datastored in the PCD by a smart phone over an NFC interface.

The PCD 150 is then in the “configured” state 520, in which it haspending but not active transport instructions stored in its memory. Thestate transition 529 includes drop-off of the package 140 to a storagedevice 130 and can be implemented, for example, by a user pressing abutton on the PCD after he has attached the PCD to the package and to aPAD connector.

The PCD 150 is then in the “stored” state 530, in which it has activetransport instructions stored in its memory and is waiting for a user toaccess the package 140. The state transition 539 includes pick-up of thepackage 140 from the storage and can be implemented, for example, by asmart phone communicating to the PCD an authorized identifier over anNFC interface.

The PCD 150 is then in the “carried” state 540, in which it is beingtransported by the transporter 112. The state transition 541 includesdrop-off of the package 140 to a storage device 130 and can beimplemented, for example, by a user pressing a button on the PCD afterhe has attached the PCD to a PAD connector. The state transition 549includes deactivation of the security feature of the PCD 150 and can beimplemented, for example, by a smart phone communicating to the PCD anauthorized identifier over an NFC interface.

The PCD 150 is then in the “unlocked” state 550, in which the package140 can be accessed by the recipient 113. The state transition 559includes pick-up of the package 140 from the storage 230 by therecipient 113 and can be implemented, for example, by a user detachingthe PCD from the PAD connector.

The PCD 150 is then in the “detached” state 560, in which the packagecontents can be accessed by the recipient. The state transition 509includes returning the PCD 150 to wait for use in a subsequent transportand can be implemented, for example, by a user detaching the PCD fromthe package. The state transition 534 includes detection of reducedcompliance with the transport instructions and can be implemented, forexample, by detecting a sensor input such as the PCD temperature thatexceeds a threshold value.

The PCD 150 is then in the “storage warning” state 535, in which the PCD150 can communicate to a user the reduced compliance and storeassociated log data in the PCD memory 434. The state transition 536includes deactivation of the storage warning and can be implemented, forexample, by detecting that the sensor input has returned below thethreshold value, or by detecting the expiration of a timer started withstate transition 534 and lasting, for example, 30 seconds. The statetransition 544 includes detection of reduced compliance with thetransport conditions and can be implemented, for example, by detecting alack of state transition 541 by the time indicated in the transportconditions.

The PCD 150 is then in the “delivery warning” state 545, in which thePCD 150 can communicate to a user the reduced compliance. The statetransition 546 includes deactivation of the delivery warning and can beimplemented, for example, by detecting the state transition 541, or bydetecting the expiration of a timer started with state transition 544and lasting, for example, 30 seconds. The state transition 569 includesdetection of an unauthorized user accessing the package 140 and can beimplemented, for example, by detecting the unauthorized opening of themechanism with which the PCD 150 is attached to the package 140.

The PCD 150 is then in the “alarm” state 570, in which the PCD 150 cancommunicate the alarm to users or other devices in the systems andmethods of the present invention. The state transition 571 includesdeactivation of the alarm by a transporter 112 and can be implemented,for example, by a smart phone communicating to the PCD an identifierauthorized for pick-up of the package over an NFC interface. The statetransition 572 includes deactivation of the alarm by the recipient 113and can be implemented, for example, by a smart phone communicating tothe PCD an identifier authorized for receiving the package over an NFCinterface. The state transition 574 includes detection of unauthorizedopening of the mechanism with which the PCD 150 is attached to the PAD133 and can be implemented, for example, by detecting the disconnectionof the link to the PAD.

The PCD 150 is then in the “detach warning” state 575, in which the PCD150 can communicate to a user the need to reattach the PAD 133 or toauthenticate himself. The state transition 576 includes deactivation ofthe detach warning and can be implemented, for example, by detecting theconnection of the link to the PAD. The state transition 577 includesdetection of an unauthorized user accessing the package 140 and can beimplemented, for example, by detecting the lack of state transition 576within, for example, 10 seconds of the state transition 574. The statetransition 584 includes detection of unauthorized pick-up of the package140 and can be implemented, for example, by detecting an accelerometerinput that exceeds a threshold value.

The PCD 150 is then in the “motion warning” state 585, in which the PCD150 can communicate to a user the need to stop moving the package 140 orto authenticate himself. The state transition 586 includes deactivationof the motion warning and can be implemented, for example, by detectionthat the accelerometer input has returned below the threshold value. Thestate transition 587 includes detection of an unauthorized user movingthe package 140 and can be implemented, for example, by detecting thelack of state transition 586 within, for example, 5 seconds of the statetransition 584.

Accordingly, in FIG. 5, instead of or in addition to states or statetransitions executed in the PCD 150, the state machine 500 can includeone or more of the states or state transitions, and the functionality ofthe PCD 150 associated with them, being executed in a personal device110, in a storage device 130, in a server 180, or by a user withinstructions that describe the states and state transitions. Theexecution of states or state transitions without execution in the PCD150 can include a PCD 150 that is only a label and can be implemented,for example, the label being in the “configured” state 520 following thewriting of an identifier on it by the user, or the smart phone of thetransporter being in the “delivery warning” state 545 following thedetection of missed drop-off time window in the smart phone.

Accordingly, in FIG. 5, the states in the state machine 500 can includeone or more additional states and associated state transitions such as apreceding state including more advanced detection of the conditionscausing the state transition to the main state, or a subsequent stateincluding detection that the main state is sufficiently persistent anddoes not need to be reversed. The preceding state can be implemented,for example, before state 530 by activating the button on the PCD in theproximity of the time window for drop-off but prior to detection of thebutton being pressed, or the PCD activating its power consumingcommunication interface more frequently in order to detect faster when auser's smart phone attempts to communicate the drop-off event to thePCD. The subsequent state can be implemented, for example, after state530 by detecting that the PCD is not properly attached to a PADfollowing state transition 529, and reverting to the state 520.

FIG. 6 shows an illustrative example of a storage system 600 that storespackages securely and in compliance with terms of service before orafter they are transported. In FIG. 6, generally, the storage system 600provides for controlled access to the package 140 and its contents byusers of the systems and methods of the present invention, and storesdata on the status and operations performed with the package 140. Themain storage unit 610 provides control and wide-area connectivity forthe storage 600 and the extension unit 670 provides additional orspecialized storage capacity.

The main storage unit 610 and one or more extension units 670 can beconnected with extension unit interface 602 that includes electricitycable and bus connectivity between the units 610 and 670 or two a firstunit 670 and a second unit 670. The bus 612 provides communication forthe components inside the storage units. The electricity supply 614provides electricity for the components inside the main storage unit 610and can be connected to an external electricity supply via electriccable 615.

The main storage unit 610 can include PADs 620 (e.g., which are PADs 133of FIG. 1B) coupled to the bus 612. The processing module 630 caninclude a processor 632 coupled to the bus 612, a memory 634 coupled tothe bus 612, a read-only memory 636 coupled to the bus 612 or anapplication-specific processor (ASIC) 638 that can be, for example, aprocessor providing cryptographic functions, coupled to the bus 612. Thecommunication interface 640 coupled to the bus 612 provides connectivityto other devices or the internet over network link 645. The userinterface module 650 can include a visual output device 652 coupled tothe bus 612, an audio output device 654 coupled to the bus 612, or atouch input device 656 coupled to the bus 612.

The lock module 660 coupled to the bus 612 can include a lock actuator662 or a lock sensor 664 to control access to storage locations or tothe storage components, such as, for example, a door to the electricitysupply 674 allowing change of the battery by an authorized transporter112. The extension unit 670 includes a bus 672 that providescommunication for the components inside storage units. The electricitysupply 674 provides electricity for the components inside the extensionstorage unit 670 and can be connected to main storage unit's electricitysupply 614 with extension unit interface 602.

The communication interface 676 coupled to the bus 672 providesconnectivity to other devices in the systems and methods of the presentinvention and can be implemented, for example, as an NFC interface. Theenvironmental control module 678 coupled to the bus 672 provides storageconditions that allow the storage 600 to be in compliance with thetransport conditions and can be implemented, for example, with arefrigeration mechanism. The extension storage unit 670 can include PADs680 (e.g., which are PADs 133 of FIG. 1B) coupled to the bus 672. Thelock module 690 coupled to the bus 672 can include a lock actuator 692or a lock sensor 694.

Accordingly, in FIG. 6, the main storage unit 610 or the extensionstorage unit storage 670 can further include a sensor module that sensesconditions inside or outside the storage 600 and can be implemented, forexample, with a temperature sensor providing temperature information,with an acceleration sensor providing movement information of a storagelocated in a vehicle, or with a camera sensor providing visual input, oran infrared sensor or a radio sensor providing location information ofusers or packages.

Accordingly, in FIG. 6, the communication interface 640 can includeinterfaces to different networks and can be implemented, for example,with a cellular interface to the internet and an NFC interface to an NFCdevice.

Accordingly, in FIG. 6, the lock module 660 can include a lock of theextension unit interface 602 connector and can be implemented, forexample, as a physically secured separate door controlled by the lockactuator or the lock sensor.

Accordingly, in FIG. 6, the PAD 620 or PAD 680 can include a lock moduleand can be implemented, for example, with a mechanical bar extended fromthe PAD connector into the interface in the PCD when a user pulls atrigger, wherein a lock actuator can block the pulling of the trigger ora lock sensor can detect the pulling of the trigger.

Accordingly, in FIG. 6, the storage extension unit 670 can furtherinclude cryptographic protection of the data communicated over theextension unit interface 602 and can be implemented, for example, byincorporating an additional processing module to the storage extensionunit.

Accordingly, in FIG. 6, the storage system 600 can further includemanagement of available capacity in the storage system, includingdetermination of the storage priority order of packages 140; and causingtransactions that remove packages from the storage or return packages tothe storage. The factors used in the determination can include atargeted occupancy rate, the remaining space in the storage device 130,the expected packages transported to and from the storage device 130,the quotas of users of the packages 140, the price paid for the storageof packages 140 or the transport and/or storage conditions of packages140. This can be implemented, for example, by the storage making a queryin a database of the packages that it contains when 90% of the storagelocations are allocated to identify a package that has exceeded itspick-up time window with the longest amount of time, and creating atransport request to transport that package to a second, longer-termstorage. And when less than 50% of the storage locations are allocated,creating a transport request to transport that package back from thesecond, longer-term storage. This allows the initiation of transactionsthat temporarily remove or return packages 140 or rearrange packages 140in the storage. The determination of the storage priority can furtherinclude mediation of compensation between users of packages 140 in thestorage device 130 based on their excess or deficit of used storagespace relative to their quotas with the storage device 130, or based onmarket pricing of storage space in the storage device 130.

FIG. 7 shows an illustrative flowchart of processes performed by astorage device in an exemplary procedure of receiving, storing andreleasing a package. For example, FIG. 7 is a flowchart depictingprocesses performed by the storage device 130 of FIG. 1B or the system600 of FIG. 6 in an exemplary procedure of receiving, storing andreleasing a package 140. In step 710, a server 180, a personal device110, or a PCD 150 communicates transport instructions (e.g., which caninclude storage instructions) to the storage device 130 and the storagedevice 130 configures, for example, its access control function based onthe authorization information in the instructions.

In step 720, the storage device 130 determines the storage location forthe package 140 so that the storage device 130 is in compliance with thetransport conditions. In step 730, the storage device 130 detects andauthorizes the reception of a package 140, which can be implemented, forexample, by using an NFC interface or a camera sensor to detect thepackage or the user dropping off the package.

In step 740, the storage device 130 unlocks access to the storagelocation determined for the package 140 and communicates the storagelocation to the user, which can be implemented, for example, by storagesending an event to a user interface output device in the storage, thestorage location, the smart phone of the user, or the PCD attached tothe package. In step 750, the user places the package 140 in the storagelocation and the PAD 133 is linked to the PCD 150, which can beimplemented, for example, by the user attaching the PAD connector to thePCD. In step 755, the user confirms the completion of the drop-off,which can be implemented, for example, by the user pressing a button inthe PCD or user interface of a smart phone, the user operating a door inthe storage location, or the storage detecting with a sensor or a datalink that the user leaves the proximity of the storage location, and thestorage locks access to the storage location and activates the securityfeature.

In step 760, the storage device 130 determines the compliance of thepackage with transport conditions, which can be implemented, forexample, by detecting whether a temperature sensor input in the storagelocation exceeds a threshold value. In step 770, the storage device 130detects and authorizes the release of a package 140, which can beimplemented, for example, by using an NFC interface or sensors to detectthe user picking up the package, and the storage device 130 unlocksaccess to the storage location determined for the package 140 andcommunicates the storage location to the user.

In step 780, the PAD 133 is unlinked from the PCD 150, which can beimplemented, for example, by the user detaching the PAD connector fromthe PCD, and the user removes the package 140 from the storage location.In step 785, the user confirms the completion of the pick-up, and thestorage device 130 locks access to the storage location and activatesthe security feature.

Accordingly, in FIG. 7, steps 710, 720, 740 and 770 can include a server180 or a personal device 110 configuring planned storage operations datain the storage device 130; a personal device 110 of the operator of thepackage 140 communicating identification data to the storage device 130;the storage device 130 determining how the identification datacorresponds to the configured storage operations data; and the storagedevice 130 causing the operator of the package 140 to have access to thestorage location of the package 140 indicated in the storage operationsdata. This can be implemented, for example, by a smart phone writingtransport operations data to memory in the storage over an NFCcommunication interface; the smart phone communicating an identifierassociated with the operator to the storage over an NFC communicationinterface; the storage identifying a match of the communicatedidentifier with the identifier stored in the transport operations datain the memory; and the storage deactivating the security functioncontrolling access to the package associated with the operator.

Accordingly, in FIG. 7, the storage device 130 can include functionssuch as a user interface and server connectivity that emulate a personaldevice 110 and can be implemented, for example, with the storageauthenticating the user by the user inputting a password on the storagetouch screen and the storage communicating the authenticationinformation to the PCD, followed by the PCD authorizing the user toaccess the package and deactivating its security features.

Accordingly, in FIG. 7, the storage device 130 can include functionssuch as a user interface that emulate a PCD 150 and can be implemented,for example, with the storage authenticating the user by detection overNFC interface of his smart phone and identifying the package withpattern recognition from a camera input, followed by the storageauthorizing the user to access the package and deactivating its securityfeatures.

Accordingly, in FIG. 7, step 720, the determination of a storagelocation can include determination of the accessibility of the package140 in a storage by other users than the one authorized to access thepackage 140 and can be implemented, for example, with a flag in thestorage conditions allowing storage in a storage locker that is used tostore one or more packages.

Accordingly, in FIG. 7, step 720, the determination of a storagelocation can include determination of the capacity of a storage locationand can be implemented, for example, by a radio sensor or ultrasoundsensor or pressure sensor or light sensor in the storage locationreceiving a signal, and an analysis functionality in the processingmodule comparing the received signal to signals associated withdifferent amounts of goods stored in the storage location.

Accordingly, in FIG. 7, step 785, the activation of the security featurecan include determination of the condition of other packages in the samestorage location from which the package war removed and can beimplemented, for example, by comparing pictures taken by a surveillancecamera before and after the removal to determine that other packagesremain in the storage location.

It is to be understood that the systems and methods of the presentinvention are for exemplary purposes, as many variations of the specifichardware used to implement the embodiments of the present invention arepossible, as will be appreciated by those skilled in the relevantart(s). For example, the functionality of the devices and the subsystemsof the illustrative systems and methods can be implemented via one ormore programmed computer systems and/or devices, and the like.

To implement such variations as well as other variations, a singlecomputer system (e.g., the computer system 800 of FIG. 8) can beprogrammed to perform the special purpose functions of one or more ofthe devices and subsystems of the systems and methods of the presentinvention, or a single mechanical system can be implemented to performthe special purpose functions of one or more of the mechanical devicesand subsystems of the systems and methods of the present invention. Onthe other hand, two or more systems or devices can be substituted forone of the devices and subsystems of the systems and methods of thepresent invention. Accordingly, principles and advantages of distributedprocessing, such as redundancy, replication, etc., also can beimplemented, as desired, to increase the robustness and performance ofthe systems and methods of the present invention, for example.

FIG. 8 illustrates a computer system 800 upon which embodiments of thepresent invention (e.g., devices and subsystems of the systems andmethods of the present invention) can be implemented. The embodiments ofthe present invention can be implemented on a single such computersystem, or a collection of multiple such computer systems. The computersystem 800 can include a bus 820 or other communication mechanism forcommunicating information, and a processor 832 coupled to the bus 820for processing the information. The computer system 800 can also includea memory 834, such as a random access memory (RAM), other dynamicstorage device (e.g., dynamic RAM (DRAM), static RAM (SRAM), synchronousDRAM (SDRAM), flash memory), etc., coupled to the bus 820 for storinginformation and instructions to be executed by the processor 832.

In addition, the memory 834 can also be used for storing temporaryvariables or other intermediate information during the execution ofinstructions by the processor 832. The computer system 800 can furtherinclude a read only memory 836 or other static storage device (e.g.,programmable ROM (PROM), erasable PROM (EPROM), electrically erasablePROM (EEPROM), etc.) coupled to the bus 820 for storing staticinformation and instructions.

The computer system 800 can also include a disk controller 862 coupledto the bus 820 to control one or more storage devices for storinginformation and instructions, such as a magnetic hard disk 866, and aremovable media drive 864 (e.g., USB memory card drive, SD card drive,floppy disk drive, read-only compact disc drive, read/write compact discdrive, tape drive, and removable magneto-optical drive). The storagedevices can be added to the computer system 800 using an appropriatedevice interface (e.g., small computer system interface (SCSI),integrated device electronics (IDE), enhanced-IDE (EIDE), direct memoryaccess (DMA), ultra-DMA), universal serial bus (USB), Firewire (IEEE1394), or Bluetooth (IEEE 802.15.1).

The computer system 800 can also include special purpose logic devices838, such as application specific integrated circuits (ASICs), fullcustom chips, configurable logic devices (e.g., simple programmablelogic devices (SPLDs), complex programmable logic devices (CPLDs), fieldprogrammable gate arrays (FPGAs), etc.), etc., for performing specialprocessing functions, such as signal processing, image processing,speech processing, voice recognition, communications functions, etc.

The computer system 800 also can include a display controller 852coupled to the bus 820 to control a display 854, such as a cathode raytube (CRT), liquid crystal display (LCD), active matrix display, plasmadisplay, touch display, etc., for displaying or conveying information toa computer user. The computer system can include input devices, such asa keyboard 856 including alphanumeric and other keys and a pointingdevice 858, for interacting with a computer user and providinginformation to the processor 832. The pointing device 858 can include,for example, a mouse, a trackball, a pointing stick, etc., or voicerecognition processor, etc., for communicating direction information andcommand selections to the processor 832 and for controlling cursormovement on the display 854. In addition, a printer can provide printedlistings of the data structures/information of the systems and methodsof the present invention or any other data stored and/or generated bythe computer system 800.

The computer system 800 can perform one or more processing steps of theinvention in response to the processor 832 executing one or moresequences of one or more instructions contained in a memory, such as thememory 834. Such instructions can be read into the memory 834 fromanother computer readable medium, such as the hard disk 866 or theremovable media drive 864. Execution of the arrangement of instructionscontained in the memory 834 causes the processor 832 to perform theprocess steps described herein. One or more processors in amultiprocessing arrangement also can be employed to execute thesequences of instructions contained in the main memory 834. Inalternative embodiments, hard-wired circuitry can be used in place of orin combination with software instructions. Thus, embodiments are notlimited to any specific combination of hardware circuitry and/orsoftware.

Stored on any one or on a combination of computer readable media, theembodiments of the present invention can include software forcontrolling the computer system 800, for driving a device or devices forimplementing the invention, and for enabling the computer system 800 tointeract with a human user (e.g., users of the systems and methods ofthe present invention, etc.). Such software can include, but is notlimited to, device drivers, firmware, operating systems, developmenttools, applications software, etc. Such computer readable media canfurther include the computer program product of an embodiment of thepresent invention for performing all or a portion (if processing isdistributed) of the processing performed in implementing the invention.Computer code devices of the embodiments of the present invention caninclude any interpretable or executable code mechanism, including butnot limited to scripts, interpretable programs, dynamic link libraries(DLLs), Java classes and applets, complete executable programs, CommonObject Request Broker Architecture (CORBA) objects, etc. Moreover, partsof the processing of the embodiments of the present invention can bedistributed for better performance, reliability, and/or cost.

The computer system 800 also can include a communication interface 870coupled to the bus 820. The communication interface 870 can provide atwo-way data communication coupling to a network link 875 that isconnected to a communications network such as, for example, a local areanetwork (LAN), a wide area network (WAN), a global packet datacommunications network, such as the Internet, etc. For example, thecommunication interface 870 can include a digital subscriber line (DSL)card or modem, a cable modem, a telephone modem, etc., to provide a datacommunication connection to a corresponding type of telephone line. Asanother example, the communication interface 870 can include a localarea network (LAN) card (e.g., for Ethernet, etc.), etc., to provide adata communication connection to a compatible LAN. Wireless links canalso be implemented. In any such implementation, the communicationinterface 870 can send and receive electrical, electromagnetic, oroptical signals that carry digital data streams representing varioustypes of information. Further, the communication interface 870 caninclude peripheral interface devices, such as a Universal Serial Bus(USB) interface, a PCMCIA (Personal Computer Memory Card InternationalAssociation) interface, etc.

The network link 875 typically can provide data communication throughone or more networks to other data devices. For example, the networklink 875 can provide a connection through the communications network 880to a server 890. The communications network 880 can employ electrical,electromagnetic, or optical signals to convey information andinstructions. The signals through the various networks and the signalson the network link 875 and through the communication interface 870,which communicate digital data with computer system 800, are exemplaryforms of carrier waves bearing the information and instructions.

The computer system 800 can send messages and receive data, includingprogram code, through the communications network 880, the network link875, and the communication interface 870. In the Internet example, aserver can transmit requested code belonging to an application programfor implementing an embodiment of the present invention throughcommunications network 880 and the communication interface 870. Theprocessor 832 can execute the transmitted code while being receivedand/or store the code in the storage devices 864 or 866, or othernon-volatile storage for later execution. In this manner, computersystem 800 can obtain application code in the form of a carrier wave.With the system of FIG. 8, the embodiments of the present invention canbe implemented on the Internet as a Web Server 800 performing one ormore of the processes according to the embodiments of the presentinvention for one or more computers coupled to the web server 800through the network 880 coupled to the network link 870.

The term “computer readable medium” as used herein can refer to anymedium that participates in providing instructions to the processor 832for execution. Such a medium can take many forms, including but notlimited to, non-volatile media, volatile media, transmission media, etc.Non-volatile media can include, for example, optical or magnetic disks,magneto-optical disks, etc., such as the hard disk 866 or the removablemedia drive 864. Volatile media can include dynamic memory, etc., suchas the memory 836. Transmission media can include coaxial cables, copperwire and fiber optics, including the wires that make up the bus 820.Transmission media can also take the form of acoustic, optical, orelectromagnetic waves, such as those generated during radio frequency(RF) and infrared (IR) data communications.

As stated above, the computer system 800 can include at least onecomputer readable medium or memory for holding instructions programmedaccording to the teachings of the invention and for containing datastructures, tables, records, or other data described herein. Commonforms of computer-readable media can include, for example, a floppydisk, a flexible disk, hard disk, magnetic tape, any other magneticmedium, a CD-ROM, CDRW, DVD, any other optical medium, punch cards,paper tape, optical mark sheets, any other physical medium with patternsof holes or other optically recognizable indicia, a RAM, a PROM, andEPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrierwave, or any other medium from which a computer can read.

Various forms of computer-readable media can be involved in providinginstructions to a processor for execution. For example, the instructionsfor carrying out at least part of the embodiments of the presentinvention can initially be borne on a magnetic disk of a remote computerconnected to communications network 880. In such a scenario, the remotecomputer can load the instructions into memory and send theinstructions, for example, over a telephone line using a modem. A modemof a local computer system can receive the data on the telephone lineand use an infrared transmitter to convert the data to an infraredsignal and transmit the infrared signal to a portable computing device,such as a personal digital assistant (PDA), a laptop, an Internetappliance, etc. An infrared detector on the portable computing devicecan receive the information and instructions borne by the infraredsignal and place the data on a bus. The bus can convey the data to mainmemory, from which a processor retrieves and executes the instructions.The instructions received by main memory can optionally be stored onstorage device either before or after execution by processor.

FIG. 9 is a flowchart depicting processes performed by, for example, theTMS 170 of FIG. 1B in an exemplary procedure of determining packages andtransporters for the transported goods, for example in response to atransport request. In step 905 the TMS 170 or the sender's personaldevice 117 creates a tentative route and schedule from the startingpoint to the destination point of the transport request. In step 910 theTMS 170 or the sender's personal device 117 determines packages 140whose locations before the starting time of the transport are accessibleto the sender and queries their capabilities, such as heat insulationcapability.

In step 915 the TMS 170 aborts the transport matching if no suitablepackages 140 were found (and e.g., the transport request mandated theTMS 170 to identify a package 140). In step 920 the TMS 170 determinestransporters 112 whose transport offers have end points that are withinsame general area as the transport request end points, such as in thesame city. In step 925 the TMS 170 aborts the transport matching if nosuitable transporters 112 were found (e.g., the TMS 170 can restart thedetermination procedure at a later point in time when new transportoffers may have been created by transporters 112 in the area).

In step 929 the TMS 170 determines transport conditions based, forexample, on the sender 111 preferences or criteria specified in thetransport request. In step 930 the TMS 170 determines packages 140 fromthe list of packages 140 of step 910 that are in compliance with thetransport conditions of step 929, such as packages 140 with arefrigeration functionality. In step 935 the TMS 170 aborts thetransport matching if no suitable packages 140 were found (and thetransport request mandated the TMS 170 to strictly comply with thesender 111 preferences or criteria). In step 940 the TMS 170 determinestransporters 112 from the list of transporters 112 of step 920 that arein compliance with the transport conditions of step 929 if using one ofthe packages 140 determined in step 930. The determination of step 940can include multiple transporters 112 and storages 130 where acombination of the transport end points of one transporter 112 are thesame as the transport end points of another transporter 112, and wheresuch an end point may be the same as the location of a storage device130.

In step 945 the TMS 170 aborts the transport matching if no suitabletransporters 112 were found (and e.g., the transport request mandatedthe TMS 170 to strictly comply with the sender 111 preferences orcriteria). In step 950 the TMS 170 repeats the procedure of step 940 forall alternative combinations that comply with the transport conditions.In step 955 the TMS 170 confirms the first determined transporter orcombination of transporters if no alternatives were found and proceedsto step 990. In step 960 the TMS 170 or the sender's personal device 117ranks the alternative transport procedures of step 950 based on criteriasuch as the combined price of transport offers and storage offers, orthe lowest reputation of transporters participating in the combinedtransport.

In step 960 the TMS 170 or the sender's personal device 117 determines aset of the alternatives to be presented to the user, such as thecheapest alternative and the alternative with the highest minimumreputation of transporters and the alternative at a midpoint of pricesand minimum reputations of the alternatives. In step 970 the sender 111confirms the selection of one of the alternatives and the sender'spersonal device 117 authorizes the TMS 170 to send transport requestconfirmations to the transporters 112 in that alternative. In step 980the TMS 170 receives confirmations to the specific transport requestwith exact transport conditions (including end points, schedules andother conditions) from the transporters 112. In step 985 the TMS 170 maysend transport request confirmations to the transporters 112 in asecondary alternative if the transporters 112 of the first alternativedid not confirm by a deadline. In step 990 the TMS 170 and the sender'spersonal device 117 indicate to the senders 111 the confirmed transport,and TMS 170 and the transporter's personal devices 118 indicate to thetransporters 112 their part in the combined transport procedure.

It is to be understood that the devices and subsystems of theillustrative embodiments are for illustrative purposes, as manyvariations of the specific hardware used to implement the illustrativeembodiments are possible, as will be appreciated by those skilled in therelevant art(s). For example, the functionality of one or more of thedevices and subsystems of the illustrative embodiments can beimplemented via one or more programmed computer systems or devices.

To implement such variations as well as other variations, a singlecomputer system can be programmed to perform the special purposefunctions of one or more of the devices and subsystems of theillustrative embodiments. On the other hand, two or more programmedcomputer systems or devices can be substituted for any one of thedevices and subsystems of the illustrative embodiments. Accordingly,principles and advantages of distributed processing, such as redundancy,replication, and the like, also can be implemented, as desired, toincrease the robustness and performance of the devices and subsystems ofthe illustrative embodiments.

The devices and subsystems of the illustrative embodiments can storeinformation relating to various processes described herein. Thisinformation can be stored in one or more memories, such as a hard disk,optical disk, magneto-optical disk, RAM, and the like, of the devicesand subsystems of the illustrative embodiments. One or more databases ofthe devices and subsystems of the illustrative embodiments can store theinformation used to implement the illustrative embodiments of thepresent inventions. The databases can be organized using data structures(e.g., records, tables, arrays, fields, graphs, trees, lists, and thelike) included in one or more memories or storage devices listed herein.The processes described with respect to the illustrative embodiments caninclude appropriate data structures for storing data collected and/orgenerated by the processes of the devices and subsystems of theillustrative embodiments in one or more databases thereof.

All or a portion of the devices and subsystems of the illustrativeembodiments can be conveniently implemented using one or more generalpurpose computer systems, microprocessors, digital signal processors,micro-controllers, and the like, programmed according to the teachingsof the illustrative embodiments of the present inventions, as will beappreciated by those skilled in the computer and software arts.Appropriate software can be readily prepared by programmers of ordinaryskill based on the teachings of the illustrative embodiments, as will beappreciated by those skilled in the software art. Further, the devicesand subsystems of the illustrative embodiments capable of performing theprocesses of the illustrative embodiments of the present invention canbe implemented on the World Wide Web. In addition, the devices andsubsystems of the illustrative embodiments can be implemented by thepreparation of application-specific integrated circuits or byinterconnecting an appropriate network of conventional componentcircuits, as will be appreciated by those skilled in the electricalart(s). Thus, the illustrative embodiments are not limited to anyspecific combination of hardware circuitry and/or software.

Stored on any one or on a combination of computer readable media, theillustrative embodiments of the present inventions can include softwarefor controlling the devices and subsystems of the illustrativeembodiments, for driving the devices and subsystems of the illustrativeembodiments, for enabling the devices and subsystems of the illustrativeembodiments to interact with a human user, and the like. Such softwarecan include, but is not limited to, device drivers, firmware, operatingsystems, development tools, applications software, and the like. Suchcomputer readable media further can include the computer program productof an embodiment of the present inventions for performing all or aportion (if processing is distributed) of the processing performed inimplementing the inventions. Computer code devices of the illustrativeembodiments of the present inventions can include any suitableinterpretable or executable code mechanism, including but not limited toscripts, interpretable programs, dynamic link libraries (DLLs), Javaclasses and applets, complete executable programs, Common Object RequestBroker Architecture (CORBA) objects, and the like. Moreover, parts ofthe processing of the illustrative embodiments of the present inventionscan be distributed for better performance, reliability, cost, and thelike.

As stated above, the devices and subsystems of the illustrativeembodiments can include computer readable medium or memories for holdinginstructions programmed according to the teachings of the presentinventions and for holding data structures, tables, records, and/orother data described herein. Computer readable medium can include anysuitable medium that participates in providing instructions to aprocessor for execution. Such a medium can take many forms, includingbut not limited to, non-volatile media, volatile media, transmissionmedia, and the like. Non-volatile media can include, for example,optical or magnetic disks, magneto-optical disks, and the like. Volatilemedia can include dynamic memories, and the like. Transmission media caninclude coaxial cables, copper wire, fiber optics, and the like.Transmission media also can take the form of acoustic, optical,electromagnetic waves, and the like, such as those generated duringradio frequency (RF) communications, infrared (IR) data communications,and the like. Common forms of computer-readable media can include, forexample, a floppy disk, a flexible disk, hard disk, magnetic tape, anyother suitable magnetic medium, a CD-ROM, CDRW, DVD, any other suitableoptical medium, punch cards, paper tape, optical mark sheets, any othersuitable physical medium with patterns of holes or other opticallyrecognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, any othersuitable memory chip or cartridge, a carrier wave or any other suitablemedium from which a computer can read.

While the present inventions have been described in connection with anumber of illustrative embodiments, and implementations, the presentinventions are not so limited, but rather cover various modifications,and equivalent arrangements, which fall within the purview of theappended claims.

What is claimed is:
 1. A computer implemented system for managingtransportation and storage of packages by crowdsourcing to privateindividuals using private vehicles, the system comprising: a server; apersonal mobile device of a sender; a personal mobile device of atransporter; a personal mobile device of a recipient; a package controldevice; and a package; the server having a processor, a memory and acommunication network interface; the personal mobile devices of thesender, the transporter and the recipient having a processor, a memory,a communication network interface and a short range wireless interface;the package control device having circuitry, a memory, and a short rangewireless interface; the processor and memory on the server beingconfigured to run a database process and a transportation and storagemanagement process communicating transport and storage information overthe communication network interface; the processor and memory on thepersonal mobile devices of the sender, the transporter and the recipientbeing configured to run a transportation and storage managementapplication communicating transport and storage information over thecommunication network interface and the short range wireless interface;and the circuitry and memory on the package control device beingconfigured to execute instructions based on transportation and storagemanagement information and communicate transport and storage informationover the short range wireless interface, wherein the transporter is acrowdsourced private individual using a private vehicle, thetransportation and storage management process in the server stores andretrieves transport and storage information by accessing the databaseprocess in the server, the transportation and storage managementapplications in the personal mobile devices of the sender, thetransporter and the recipient establish access to the transportation andstorage management process in the server by logging in the sender, thetransporter and the recipient, the transportation and storage managementapplications in the personal mobile devices of the sender, thetransporter and the recipient communicate transport and storageinformation with the transportation and storage management process inthe server, the transportation and storage management applications inthe personal mobile devices of the sender, the transporter and therecipient communicate transport and storage information with the packagecontrol device, the transport and storage information comprises packagepick-up and drop-off and authentication and authorization information,the authorization information comprises authentication informationrequired to authorize a package pick-up or drop-off, the package controldevice is attached to the package, the package control device isconfigured to use a server key to authenticate the authorizationinformation communicated by the personal mobile device of the sender,the transporter or the recipient, the package control device isconfigured to determine an authorized or unauthorized pick-up ordrop-off of the package by comparing the authorization information andthe authentication information communicated by the personal mobiledevice of the sender, the transporter or the recipient, theauthorization of a pick-up or drop-off of the package by the packagecontrol device comprises the storage of information of the authorized orunauthorized pick-up or drop-off in the package control device and thecommunication of information of the authorized or unauthorized pick-upor drop-off to the personal mobile device of the sender, the transporteror the recipient, the package control device is configured to authorizethe drop-off of the package based on the authentication informationcommunicated by the personal mobile device of the sender, the packagecontrol device is configured to authorize the pick-up and drop-off ofthe package based on authentication information communicated by thepersonal mobile device of the transporter, and the package controldevice is configured to authorize the pick-up of the package based onthe authentication information communicated by the personal mobiledevice of the recipient.
 2. The system of claim 1, wherein the packagecontrol device is one of an NFC device, an RFID device, and a Bluetoothdevice, the package control device comprises a movement detectionsensor, and the package control device is configured to detect thepick-up or drop-off of the package based on information generated by themovement detection sensor.
 3. The system of claim 1, further comprising:a package attachment device; the package attachment device comprising aphysical connection to the package; the package attachment devicesecuring the package to the location of the package attachment device;and the package control device comprising a sensor detecting thephysical connection with the package attachment device, wherein thephysical connection to the package is a wire, a strap or a lock, and thepackage control device is configured to detect the pick-up or drop-offof the package based on information generated by the sensor detectingthe physical connection with the package attachment device.
 4. Thesystem of claim 1, further comprising: a package storage device; thepackage storage device having a processor, a memory, a communicationnetwork interface and a short range wireless interface; the packagestorage device being stationary or mobile; the package storage devicesecuring the package to the package storage device; and the processorand memory on the package storage device being configured to run atransportation and storage management process communicating transportand storage information over the communication network interface and theshort range wireless interface, wherein the transportation and storagemanagement process in the package storage device communicates transportand storage information with the transportation and storage managementprocess in the server, the transportation and storage management processin the package storage device communicates transport and storageinformation with the personal mobile device, the package storage deviceis configured to use a server key to authenticate the authorizationinformation communicated by the personal mobile device, the packagestorage device is configured to determine an authorized or unauthorizedpick-up or drop-off of the package by comparing the authorizationinformation and the authentication information communicated by thepersonal mobile device, the authorization of a pick-up or drop-off ofthe package by the package storage device comprises the storage ofinformation of the authorized or unauthorized pick-up or drop-off in thepackage storage device and the communication of information of theauthorized or unauthorized pick-up or drop-off to the personal mobiledevice or the server, the package storage device is configured toauthorize the pick-up or drop-off of the package based on theauthentication information communicated by the personal mobile device,and the package is stored with the package storage device after anauthorized drop-off or before an authorized pick-up.
 5. The system ofclaim 1, further comprising: the processor and memory on the serverbeing configured to run a compliance enforcement process; and thecircuitry and memory on the package control device being configured toexecute instructions based on compliance measurement and evaluationinformation, wherein the transport and storage information comprisescompliance information, the compliance information comprises timing ofauthorized or unauthorized pick-ups and drop-offs, the complianceenforcement process in the server is configured to generate requiredcompliance information for the transport and storage of the package, thetransportation and storage management application in the personal mobiledevice of the sender, the transporter or the recipient communicatescompliance information with the compliance enforcement process in theserver, the transportation and storage management application in thepersonal mobile device of the sender, the transporter or the recipientcommunicates compliance information with the package control device, thepackage control device is configured to evaluate the compliance of thetransport and storage of the package by comparing compliancemeasurements and the required compliance information, and the complianceenforcement process in the server is configured to adjust thereliability information of a sender, a transporter or a recipient basedon the evaluated compliance information.
 6. The system of claim 1,wherein the transport and storage information comprises authenticationinformation of the package control device, the transportation andstorage management application in the personal mobile device of thesender is configured to authenticate the package control device, thetransportation and storage management application in the personal mobiledevice of the sender is configured to include the authenticationinformation of the package control device in the authorizationinformation, the transportation and storage management application inthe personal mobile device of the sender is configured to communicatethe authorization information to the server or the personal mobiledevice of the transporter or the recipient, the transportation andstorage management application in the personal mobile device of thetransporter or the recipient is configured to authenticate the packagecontrol device, the transportation and storage management application inthe personal mobile device of the transporter or the recipient isconfigured to determine an authorized or unauthorized pick-up ordrop-off of the package by comparing the authorization information andthe authentication information communicated by the package controldevice, and the transportation and storage management application in thepersonal mobile device of the transporter or the recipient is configuredto authorize the pick-up and drop-off of the package based onauthentication information communicated by the package control device.7. A computer implemented method for managing transportation and storageof packages by crowdsourcing to private individuals using privatevehicles, the method comprising: providing a server; providing apersonal mobile device of a sender; providing a personal mobile deviceof a transporter; providing a personal mobile device of a recipient;providing a package control device; and providing a package; providingin the server a processor, a memory and a communication networkinterface; providing in the personal mobile devices of the sender, thetransporter and the recipient a processor, a memory, a communicationnetwork interface and a short range wireless interface; providing in thepackage control device circuitry, a memory, and a short range wirelessinterface; running with the processor and memory on the server adatabase process and a transportation and storage management processcommunicating transport and storage information over the communicationnetwork interface; running with the processor and memory on the personalmobile devices of the sender, the transporter and the recipient atransportation and storage management application communicatingtransport and storage information over the communication networkinterface and the short range wireless interface; executing on thecircuitry and memory on the package control device instructions based ontransportation and storage management information and communicatetransport and storage information over the short range wirelessinterface, wherein the transporter is a crowdsourced private individualusing a private vehicle; storing and retrieving with the transportationand storage management process in the server transport and storageinformation by accessing the database process in the server;establishing access with the transportation and storage managementapplications in the personal mobile devices of the sender, thetransporter and the recipient to the transportation and storagemanagement process in the server by logging in the sender, thetransporter and the recipient; communicating with the transportation andstorage management applications in the personal mobile devices of thesender, the transporter and the recipient transport and storageinformation with the transportation and storage management process inthe server; communicating with the transportation and storage managementapplications in the personal mobile devices of the sender, thetransporter and the recipient transport and storage information with thepackage control device, wherein the transport and storage informationcomprises package pick-up and drop-off and authentication andauthorization information, and the authorization information comprisesauthentication information required to authorize a package pick-up ordrop-off; attaching the package control device to the package; usingwith the package control device a server key to authenticate theauthorization information communicated by the personal mobile device ofthe sender, the transporter or the recipient; determining with thepackage control device an authorized or unauthorized pick-up or drop-offof the package by comparing the authorization information and theauthentication information communicated by the personal mobile device ofthe sender, the transporter or the recipient; wherein the authorizationof a pick-up or drop-off of the package by the package control devicecomprises the storage of information of the authorized or unauthorizedpick-up or drop-off in the package control device and the communicationof information of the authorized or unauthorized pick-up or drop-off tothe personal mobile device of the sender, the transporter or therecipient; authorizing with the package control device the drop-off ofthe package based on the authentication information communicated by thepersonal mobile device of the sender; authorizing with the packagecontrol device the pick-up and drop-off of the package based onauthentication information communicated by the personal mobile device ofthe transporter; and authorizing with the package control device thepick-up of the package based on the authentication informationcommunicated by the personal mobile device of the recipient.
 8. Themethod of claim 7, wherein the package control device is an NFC device,and RFID device or a Bluetooth device, the package control devicecomprises a movement detection sensor, and further comprising detectingwith the package control device the pick-up or drop-off of the packagebased on information generated by the movement detection sensor.
 9. Themethod of claim 7, further comprising: providing a package attachmentdevice; wherein the package attachment device comprises a physicalconnection to the package; securing with the package attachment devicethe package to the location of the package attachment device; anddetecting with a sensor in the package control device the physicalconnection with the package attachment device; wherein the physicalconnection to the package is a wire, a strap or a lock, and detectingwith the package control device the pick-up or drop-off of the packagebased on information generated by the sensor detecting the physicalconnection with the package attachment device.
 10. The method of claim7, further comprising: providing a package storage device; providing inthe package storage device a processor, a memory, a communicationnetwork interface and a short range wireless interface; wherein thepackage storage device is stationary or mobile; securing with thepackage storage device the package to the package storage device; andrunning with the processor and memory on the package storage device atransportation and storage management process communicating transportand storage information over the communication network interface and theshort range wireless interface; communicating with the transportationand storage management process in the package storage device transportand storage information with the transportation and storage managementprocess in the server; communicating with the transportation and storagemanagement process in the package storage device transport and storageinformation with the personal mobile device; using with the packagestorage device a server key to authenticate the authorizationinformation communicated by the personal mobile device; determining withthe package storage device an authorized or unauthorized pick-up ordrop-off of the package by comparing the authorization information andthe authentication information communicated by the personal mobiledevice; wherein the authorization of a pick-up or drop-off of thepackage by the package storage device comprises the storage ofinformation of the authorized or unauthorized pick-up or drop-off in thepackage storage device and the communication of information of theauthorized or unauthorized pick-up or drop-off to the personal mobiledevice or the server; authoring with the package storage device thepick-up or drop-off of the package based on the authenticationinformation communicated by the personal mobile device; and storing thepackage with the package storage device after an authorized drop-off orbefore an authorized pick-up.
 11. The method of claim 7, furthercomprising: the processor and memory on the server being configured torun a compliance enforcement process; and the circuitry and memory onthe package control device being configured to execute instructionsbased on compliance measurement and evaluation information, wherein thetransport and storage information comprises compliance information, thecompliance information comprises timing of authorized or unauthorizedpick-ups and drop-offs, the compliance enforcement process in the serveris configured to generate required compliance information for thetransport and storage of the package, the transportation and storagemanagement application in the personal mobile device of the sender, thetransporter or the recipient communicates compliance information withthe compliance enforcement process in the server, the transportation andstorage management application in the personal mobile device of thesender, the transporter or the recipient communicates complianceinformation with the package control device, the package control deviceis configured to evaluate the compliance of the transport and storage ofthe package by comparing compliance measurements and the requiredcompliance information, and the compliance enforcement process in theserver is configured to adjust the reliability information of a sender,a transporter or a recipient based on the evaluated complianceinformation.
 12. The method of claim 7, wherein the transport andstorage information comprises authentication information of the packagecontrol device; and further comprising authenticating with thetransportation and storage management application in the personal mobiledevice of the sender the package control device; including with thetransportation and storage management application in the personal mobiledevice of the sender the authentication information of the packagecontrol device in the authorization information; communicating with thetransportation and storage management application in the personal mobiledevice of the sender the authorization information to the server or thepersonal mobile device of the transporter or the recipient;authenticating with the transportation and storage managementapplication in the personal mobile device of the transporter or therecipient the package control device; determining with thetransportation and storage management application in the personal mobiledevice of the transporter or the recipient an authorized or unauthorizedpick-up or drop-off of the package by comparing the authorizationinformation and the authentication information communicated by thepackage control device; and authorizing with the transportation andstorage management application in the personal mobile device of thetransporter or the recipient the pick-up and drop-off of the packagebased on authentication information communicated by the package controldevice.