Security entry and delivery system and method of using same

ABSTRACT

An artificial intelligence entry management device for an entry and delivery system includes a camera, a microphone, a motion detector, a speaker, and a housing. The housing has an oval shape with a substantially open middle. The substantially open middle has a housing protrusion portion configured to house the camera, the microphone, the motion detector, and the speaker. The entry and delivery system may also include one or more robots that interface with the entry management device to monitor an area around an access point and to alert the user of activity. A robot may be an aerial robot that has a camera, a robot light, a speaker, a microphone and an actuator to enable picking and moving a package. Aerial robots may be configured around a perimeter of a building to monitor the building and may turn on a robot light when motion is detected.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation in part of PCT application No.US2021/039812, filed on Jun. 30, 2021, which claims priority to U.S.patent application Ser. No. 17/070,739, filed on Oct. 14, 2020 andcurrently pending, and to U.S. application No. 17,363,363 filed on Jun.30, 2021, which is a continuation in part of 17/070,739 and currentlypending, this application also claims the benefit of priority to U.S.provisional patent application No. 63/228,433, filed on Aug. 2, 2021,the entirety of all applications are hereby incorporated by referenceherein.

FIELD OF THE INVENTION

The present disclosure relates to security systems and delivery methods.More specifically, the present disclosure relates to an artificialintelligence (“AI”) entry management device, system, and method of usingthe same.

BACKGROUND

Many consumers today purchase goods on the Internet from onlineretailers, and this form of shopping is expected to increase in theyears to come. This form of shopping, which has become commonplace,requires the purchased goods to be shipped to the purchaser. Often, thegoods are packaged and delivered to the residence of the purchaser whilethe purchaser is not home, and the packaged goods are merely leftunsecured by the door of the purchaser's residence. Of course, suchpackages are prone to being stolen, resulting in significant financialloss to someone in the online retailer chain.

Therefore, a need exists for improved entry management systems andmethods of use thereof.

SUMMARY

Therefore, one object of the present disclosure may be to provide anartificial intelligence entry management device for an entry managementsystem. The artificial intelligence entry management device may includea camera, a microphone, a motion detector, a speaker, and a housing. Thehousing may have an oval shape with a substantially open middle. Thesubstantially open middle may have a housing protrusion portionconfigured to house the camera, the microphone, the motion detector, andthe speaker.

In select embodiments of the disclosed artificial intelligence entrymanagement device, a plurality of lights may be included. The pluralityof lights may be positioned around a periphery of the oval shape of thehousing. In select embodiments, each of the plurality of lights may be alight emitting diode. One feature may be that each of the light emittingdiodes of the plurality of lights may be configured to light up based onsounds emitted from the speaker, whereby the plurality of lights may beconfigured to mimic the artificial intelligence entry management deviceas if it were talking. Another feature may be that the plurality oflights can be configured to indicate an alarm has been triggered byflashing. Another feature may be that the plurality of lights can beconfigured to indicate a status of the artificial intelligence entrymanagement device.

In select embodiments of the disclosed artificial intelligence entrymanagement device, an LED lens may be included. The LED lens may beconfigured to cover and protect the plurality of lights. The LED lensmay have the oval shape of the housing.

In select embodiments of the disclosed artificial intelligence entrymanagement device, a mounting bracket may be included. The mountingbracket may be configured for mounting the housing of the artificialintelligence entry management device to a surface. The mounting bracketmay have the oval shape of the housing.

In select embodiments of the disclosed artificial intelligence entrymanagement device, a power source may be included. The power source maybe a hardwired power source, a battery powered power source, the like,or combinations thereof.

In select embodiments of the disclosed artificial intelligence entrymanagement device, a wireless communication device may be included. Thewireless communication device may be housed inside of the housingprotrusion portion of the housing of the artificial intelligence entrymanagement device. The wireless communication device may be configuredto communicate with the entry management system or other artificialintelligence entry management devices via a wireless communication. Thewireless communication of the wireless communication device may beselected from a group consisting of: Wi-Fi; UHF radio waves in theindustrial, scientific and medical radio bands, from 2.402 GHz to 2.480GHz, and building personal area networks (PANs), also known asBluetooth® (Bluetooth trademark owned by Bluetooth SIG, Inc. ofKirkland, Wash.); the like; or combinations thereof.

One feature of the disclosed artificial intelligence entry managementdevice may be that the speaker can be positioned in the housingprotrusion portion and oriented toward the substantially open middle.This orientation of the speaker may be for projecting sound from thespeaker out of the artificial intelligence entry management device.

Another feature of the disclosed artificial intelligence entrymanagement device may be the inclusion of a processor. The processor mayhave a non-transitory computer readable storage medium includingsoftware. The software of the processor may have program instructionsconfigured for providing artificial intelligence to the artificialintelligence entry management device. In select embodiments, thesoftware may be configured for development of intelligence within theartificial intelligence entry management device, including, speechrecognition, problem-solving, learning, planning, the like, combinationsthereof, etc. In select embodiments of the disclosed artificialintelligence entry management device, the processor may be a networkedprocessor. The networked processor may be connected to the artificialintelligence entry management device via a wireless communication to thewireless communication device on the artificial intelligence entrymanagement device. In other select embodiments, the processor may be achipped processor. The chipped processor may be housed inside of thehousing protrusion portion of the housing of the artificial intelligenceentry management device.

An exemplary artificial intelligence entry management system may employan AI system similar to or including features of the Watson AI system.Watson is a supercomputer that combines artificial intelligence (AI) andsophisticated analytical software for optimal performance as a “questionanswering” machine. The supercomputer is named for IBM's founder, ThomasJ. Watson. The Watson supercomputer processes at a rate of 80 teraflops(trillion floating-point operations per second). To replicate (orsurpass) a high-functioning human's ability to answer questions, Watsonaccesses 90 servers with a combined data store of over 200 million pagesof information, which it processes against six million logic rules. Itis a platform for exploring, visualizing and presenting data thatutilizes Watson's cognitive capabilities to automatically surfacedata-driven insights and recommend ways of presenting the data.

In another aspect, the instant disclosure embraces an artificialintelligence entry management system. The disclosed artificialintelligence entry management system may generally include utilizing thedisclosed artificial intelligence entry management device in any of thevarious embodiments and/or combination of embodiments shown and/ordescribed herein. As such, in general, the disclosed artificialintelligence entry management system may include the disclosed entrymanagement device with a camera, a microphone, a motion detector, aspeaker, a wireless communication device, the like, and/or combinationsthereof. In addition, the disclosed artificial intelligence entrymanagement system may include an artificial intelligence device. Theartificial intelligence device may be in communication with the entrymanagement device. The artificial intelligence device may include aprocessor with a non-transitory computer readable storage medium havingsoftware with program instructions configured for providing artificialintelligence to the artificial intelligence entry management device.

One feature of the disclosed artificial intelligence entry managementsystem may be that the software may have programming instructions that,when executed, cause the entry management device to execute entrymanagement and ecommerce support functions including the delivery ofmessages, directives, instructions, greetings, recordings, andfacilitating the connection of a third party for two-way audio/videocommunication.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the motion detector of the entrymanagement device may be configured to activate upon motion and providea greeting, command, or instructions, whereby the system activates uponrecognition of a paired mobile device. The paired mobile device may be astored identification paired via the approval of an owner/administrator.The owner/administrator may be individuals assigned programming rightsconfigured to allow the owner/administrator to make selections remotelyvia the artificial intelligence entry management system.

Another feature of the disclosed artificial intelligence entrymanagement system may be that, when activation occurs, the artificialintelligence entry management system may be configured to provide aspontaneous response, or a pre-programmed response in accordance withthe device it detects.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence entrymanagement system may be configured to provide a spontaneous response,or a pre-programed response in accordance with the image read by itscamera.

Another feature of the disclosed artificial intelligence entrymanagement system may be that, when activated, simultaneously, anotification is sent to the owner/administrator with an option to engageremotely in two-way communication, activate a preprogrammed or custommessage, provide a virtual key or activate the recording for a message,detect a person or a device via the camera, the microphone, the motiondetector, or the wireless communication device and provide anintelligent response to the person or device via the speaker or thewireless communication device.

The artificial intelligence entry management system may ask if a thirdparty would like to leave a message and an audio message may be recordedvia the microphone of the artificial intelligence entry managementdevice and this message may be relayed to an administrator immediately,or upon their request to play the message, which may be one a pluralityof recorded messages. The artificial intelligence entry managementsystem may ask a third party if they would like to interface with anadministrator and if and when the administrator confirms the request, aaudio interface or call may be initiated between the administrator andthe third party and or a video call, wherein the administrator is shownon the display screen of the artificial intelligence entry managementdevice and the third party is shown on a display screen of theelectronic device used by the administrator. An exemplary artificialintelligence entry management system may be configured to recordmessages for a number of administrators and a message may be indicatedfor only one or more than one recipient. Only the messages directed bythe messenger would have access to these messages, thereby making itpossible to leave a private message for a single recipient.

Another feature of the disclosed artificial intelligence entrymanagement system may be that when a package is scanned by the camera ofthe entry management device, the artificial intelligence entrymanagement system may be configured to initiate a geo-fence around anarea of the entry management device, or any area that that a camera ofthe system can detect, like a monitored designated area (MDA) ormultiple monitored designated areas (MDAs) created by the artificialentry management system in the view of the camera, or in view ofmultiple cameras of the artificial intelligence entry management system.Wherein, when the geo-fence or MDA is initiated, the entry managementdevice may be configured to utilize the motion detector, camera,microphone, or combinations thereof for creating the geo-fence or MDAmonitored area, having a proximity distance from the AI entry managementdevice, for detecting a breach of the geo-fence area or MDA. In selectembodiments, when a breach of the geo-fence area or MDA is detected, theartificial intelligence entry management system may be configured to:alert the owner via a wireless notification; trigger the entrymanagement device to set off an alarm of the entry management device;trigger an external alarm; the like; and/or or combinations thereof. Inselect embodiments, when the package is placed in the geo-fencemonitored area or MDA the entry management device, the carrier of thepackage can activate the entry management device to monitor thegeo-fence area or MDA via the motion detector, camera, microphone, orcombinations thereof. In other select embodiments, a carrier of thepackage can deactivate the geo-fence or MDA by scanning of the packageor a virtual key, whereby the package may be retrieved, whereby thenotification, alarms, or combinations thereof are deactivated by thescanning of the package or the virtual key, and a subsequent scan canreactivate the geo-fence monitored area or MDA.

An exemplary artificial intelligence entry management system may be usedto collect audio-visual information that may be recorded in the event ofa breach of an access point. Sensors on an access point may be coupledwith the artificial intelligence entry management system and when anaccess point is opened without authorization from the artificialintelligence entry management system, an alarm may sound and the cameraand microphone may record information for later evaluation to determinethe source of the breach. For example, a video may be recorded that islater watched to identify a thief breaking into a home. Note that amotion sensor may be coupled with the artificial intelligence entrymanagement system and video and audio may be recorded when the motiondetector is activated.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence device can beconfigured to learn various inputs. An artificial intelligence devicemay learn from past events and can learn to recognize or predict when aparticular person may be arriving or departing from a dwelling and mayproduce messages or questions that correspond with a recognized personor event. The artificial intelligence entry management system may learnto associate features of a person or vehicle that can be used to verifya person or a company. For example, the artificial intelligence entrymanagement system may use the camera to take pictures when a deliveryperson arrives and these pictures may be analyzed for logos, or emblemsthat can be used to identify a person approaching the artificialintelligence entry management device. The camera may be used to detectemblems, logos, color or uniforms, hat shapes, etc. Likewise, anexemplary artificial intelligence entry management system may beconfigured to detect threats including masks or a weapon, such as a gunor knife. In the event that a threat is detected, a robot, land oraerial, may be configured to record images and/or video of the threatand may be configured to follow said threat as they leave the area. Arobot may be able to communicate, such as by transmitting data, videoand/or audio data, position data, such as through a global positioningsystem (GPS) to an administrator and/or emergency authorities to aid intracking and locating said threat, such as said third party. Theartificial intelligence entry management system may control the robotwithout input from the administrator to record images and/or follow athreat. The robot may also have artificial intelligence embedded in therobot and act independently to recognize threats, record threat data,images and video, and/or follow a threat. A robot may also be configuredto receive packages from a delivery person and they may transport thepackage to a secondary location, such as within a dwelling or anotherbuilding, or to a storage container. The access point may be unlocked bythe system for the robot deliver a package. Likewise, a robot may beconfigured to retrieve a package through an access point and deliver thepackage to a person or other robot at the location.

A robot may be a land or aerial robot, wherein the land robot moves overland and wherein the aerial robot is configured to fly. An aerial robotmay have one or more propellers and a land robot may have a wheel orwheels, actuating legs or treads for movement over land. A robot may beconfigured with a camera to monitor an area around a dwelling orbuilding, such as a place of business and may be instrumental increating the geofence area. A robot may be configured to dock with adocking station wherein the robot is charged, or exchanges batteries.The docking station may be hard wired to receive electricity from thedwelling or place of business to charge the robot or the batteries forthe robot, and/or the docking station may be coupled with a renewablepower supply, such as a wind generator (wind turbine), or a solargenerator, such as a photovoltaic cell (solar panel). The dockingstations may be configured in strategic positions about the dwelling orplace of business to provide effective monitoring. For example, fourrobots may be configured with one at each corner of the home. The robotsand/or the docking stations may be configured to provide a substantiallycomplete perimeter monitoring of the building, dwelling or place ofbusiness, wherein are least 80% or more of the perimeter is captured bya camera of the plurality of robots, or preferably 90% or more of theperimeter and even more preferably 95% or more of the perimeter. Theremay be cases where 100% of the perimeter is monitored and there may beoverlap in the monitored area from one robot to another robot.

The robots, such as aerial robots may be configured to monitor orconduct surveillance using a camera and/or a microphone. The robot maybe programmed to focus in on any movement detected above some thresholdof movement, and/or follow a person entering a geofence region or areaaround a dwelling or access point. The robots may take images,photographs or video, of a person entering such an area In addition, therobots may be configured with lights and these lights may be programmedto activate when motion is detected or a sound in detected. The lightsmay be bright lights, such as flood light, producing about 500 lumens ormore, or about 500 lumens or more, about 1,000 lumens or more, about2,500 lumens or more, about 5,000 lumens or more and any range betweenand including the lumens provided. In addition, the robots may beconfigured with a speaker that is configured to produce an alarm when anintruder is detected, such as motion above a threshold motion beingdetected or sound above a threshold sound being detected. The lights maybe any suitable color and may flash in an alarm mode while an alarmsound is emitted from the speaker. An administrator may be able toactivate the surveillance mode of the robots through a user interface ofthe Artificial Intelligence entry management system, such as a computeor mobile device, such as a mobile phone. Also, a user may be able toactivate an alarm mode to cause the robot(s) to produce flashing lightsand/or an alarm sound from their speakers. An administrator may also beable to activate a light mode, wherein the lights on the robot areturned on. The robots may be aerial robots that are configured aroundthe home and the lights on the robots may provide better visibilityaround the home, for example.

An exemplary artificial intelligence entry management system may includea robot, such as a land or aerial robot, that may be configured to movepackages from a first location to second location, monitor a deliverylocation and/or communicate with people such as a delivery person. Arobot may have a speaker, such as a directional speaker, to enablecommunication with a third party to provide a greeting and/or logisticinformation to a said third party. The robot may even lead the deliveryperson to an access point for delivering the package. An exemplary robotmay be configured to take a package from a deliver person and deliverthe package to an access point, such as inside a building or into astorage container. A directional speaker may enable communication with athird party with some level of privacy, wherein only the person thespeaker is directed at can effectively hear the communication. Also, adirectional speaker may enable effective communication from an aerialrobot wherein the communication, such as logistic instructions, can beeffective heard by a third party over noise made by the aerial robotfrom the propellers, for example. An administrator or authorities may beable to communicate through a speaker on the robot. A robot may beconfigured to pick up a delivery package using a package manipulator anddeliver the package to a deliver location, which may be a storagecontainer or a secondary location such as to a back porch or fenced inarea for added security. In an exemplary embodiment, an aerial robot mayguide or direct a delivery person to a delivery location. An aerialrobot may be used for monitoring a delivery location and may provideinput to a geofence or MDA and may provide input to the exemplaryartificial intelligence entry management system if someone intrudes intoa geofence location. An exemplary artificial intelligence entrymanagement system may be configured to direct and control a robot toinvestigate abnormalities in a geofenced area, MDA, or surrounding area,such as when a noise is detected. Likewise, an exemplary robot may beconfigured to follow and record a delivery to an access point, to ensurethe delivery is made.

A drone swarm may be utilized to follow track and deter threats. A droneswarm is defined as two or more robots, such as aerial robots, alsoreferred to as drones, that follow an individual, such as a threat. Adrone swarm may follow a person that has stolen a package delivered toan access point, or a storage container or that has breached a geofencearea or a monitored designated are or areas (MDA) created by theartificial intelligence entrance management device in the view of thecamera.

An exemplary artificial intelligence entry management device isconfigured to work on a networkable platform with networked softwareaccessible and interactive with said entry management device and memberdevices running the networked software and participating on thenetworkable platform, wherein the networkable platform is configured forcommunication between said member devices including member devices ofowners, service personnel, property management, real estateprofessionals, short term rentals, hotels, and employees, wherein thenetworkable platform is configured to provide access and logistics toaccess points.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the software of the artificialintelligence device can be configured to relate to the occupants of thebuilding for enabling name recognition by the entry management device.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the software of the artificialintelligence device can be configured to enable the entry managementdevice to establish contact, record messages, or deliver a message fromthe person or persons named.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence device can beconfigured to interface with other artificial intelligence devices.

Another feature of the disclosed artificial intelligence entrymanagement system may be that when the entry management device isactivated by motion, the detection of a paired mobile device, thepresentation of a virtual key, or the owner/administrator, the entrymanagement device may be configured to cause the programminginstructions of the software to activate or turn on the artificialintelligence entry management system.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence device may beconfigured to cause the entry management device to detect the person andinterpret voice detected by the microphone from the person.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the intelligent response provided by theartificial intelligence device may be selected from a group consistingof: logistics, a greeting, a command, directions, a message, an inquire,a recording request, an alarm to the speaker, the like, and/orcombinations thereof.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the wireless communication device may beconfigured to establish the identity of the person or the device oncepaired. Wherein, after pairing, the artificial intelligence device maybe configured to recognize the device and provide a customized greeting,specific instructions, access, or actions for the associated device.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence device may beconfigured to require authentication of an image or mobile device thatis active and unlocked, the device must be active, or combinationsthereof, prior to providing the customized greeting, the specificinstructions, access, or the actions for the associated device.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence device may beconfigured to recognize the previously paired mobile device and avirtual key or an identification sequence. Wherein, if there is not aconfirmed identification, a third-party authentication is sought whichis an embedded code within the virtual key, or an audible or verbalresponse code including a word or words, a sentence, a number ornumbers, sounds, or letters.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the virtual key utilized may be a humanlycreated mark, drawing, written sequence of numbers, letters, abstractsketch, or picture. A virtual key may be a digital photograph that anadministrator sends to a third party for entry. The digital photographmay be from the administrator's library of photographs, for example. Avirtual key may include words, letters, and the like. A virtual key mayinclude a particular motion across a touchscreen, such as the displayscreen of the artificial intelligence entry management device. A virtualkey that is from an administrator's personal photo library or stored ontheir electronic device in their photo gallery is a personalized virtualkey. Also, a virtual key created by an administrator, such as by using atouch screen to draw a virtual key, such as a specific zig-zag pattern,is also a personalized virtual key. An application software may be partof the artificial intelligence entry management system and may be openedfor an administrator to create a unique personalized virtual key throughtaking a photograph, or using the touchscreen to draw out a virtual key.This App or subroutine may be opened when a new authorization for entryin entered into the system. The system may ask for the person's name,their contact information, time or entry, or span of time, access pointto be unlocked and for any messages to be delivered to theperson/entrant upon presenting the virtual key to the artificialintelligence entry management device. A personalized virtual key is adigital file sent by an administrator that is created on or stored ontheir electronic device and therefore may be more secure than a virtualkey that is generic.

A virtual key can be used as an electronic device or file virtual key,wherein the virtual key is used to unlock an electronic device or a filein an electronic device. A computer may require a person to show avirtual key to a camera, such as a camera coupled to the computer beforethe computer will unlock for use. The virtual key may take the place ofa password that is typed into the computer. Passwords can be hacked andstolen but a virtual key may be much more difficult to obtain as it isconfigured on a separate electronic device or a separate physical item.Likewise, a virtual key may be used to unlock a file on an electronicdevice. The computer may request that a virtual key be verified byshowing the virtual key to the camera of the computer before a file canbe opened. Again, this may be very difficult for a hacker to obtain.

An exemplary artificial intelligence entry management system may requirea plurality of virtual key to be shown or displayed prior toverification and unlocking of a locked access point. A user may have toshow two or more digital images that may have been sent to them by theartificial intelligence entry management system. In addition, the usermay have to show these digital images, such as digital photographs, in aspecific sequence to produce the virtual key. The artificialintelligence entry management system may send the digital photographs ina single file or may send them as separate files for security purposes.A virtual key may require a user to select digital images displayed on adisplay screen of the artificial intelligence entry management device.The artificial intelligence entry management device may display aplurality of images, such as four or more and the user may have toselect one or more to produce the virtual key. Again, the artificialintelligence entry management system may send the images to the user andthe user may then know which images to select on the display screen ofthe artificial intelligence entry management device. Furthermore, theartificial intelligence entry management system may require the user toselect the digital images, or image virtual keys in a speci screen 17that enables a user to select one or more digital images for entry. Theuser may have to select a plurality of digital images to produce avirtual key and the image virtual key may require each image virtual key50, 50′, 50″ to be selected in a specific sequence, such as balloon,dog, cat, for example. A plurality of other digital images 66 orphotographs may also be displayed on the display screen during theselection or entry of the virtual key.

A system administrator, or the artificial intelligence entry managementsystem may automatically, send an image virtual key to a user, such asto their mobile electronic device, such as a mobile phone. The user mayview the virtual key on their electronic device and then use the touchscreen to select these images. The user may have to be within a certainrange of the artificial intelligence entry management device to enableentry of the image virtual key by the selection of the correct images.Again, the images may have to be selected in a specific order. Theartificial intelligence entry management system may send image virtualkeys to a user when they are expected to arrive, such as to a cleaningprofessional prior to their weekly scheduled arrival. Then, when theyarrive the artificial intelligence entry management device maycommunicate with the mobile electronic device to send the image virtualkey for selection by the user. A plurality of digital images may bedisplayed on the user's mobile electronic device and they may then usethe touch screen on their mobile electronic device to select the imagevirtual key.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the wireless communication device of theentry management device may be configured for exchanging data betweenthe entry management device and fixed and mobile devices over shortdistances using Wi-Fi or UHF radio waves in the industrial, scientificand medical radio bands, from 2.402 GHz to 2.480 GHz, and buildingpersonal area networks (PANs), also known as Bluetooth® (Bluetoothtrademark owned by Bluetooth SIG, Inc. of Kirkland, Wash.).

Another feature of the disclosed artificial intelligence entrymanagement system may be that the artificial intelligence entrymanagement system may be configured to notify designated securitypersonnel.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the entry management device may beconfigured to work on a networkable platform with networked softwareaccessible and interactive with any other devices running the networkedsoftware and participating on the networkable platform. Wherein thenetworkable platform is configured for use by a variety of membersincluding owners, service personnel, property management, real estateprofessionals, short term rentals, hotels, employees, the like, etc.,wherein the networkable platform may be configured to provide access andlogistics to additional industries and uses.

In select embodiments of the disclosed artificial intelligence entrymanagement system, a transponder device may be included. The transponderdevice may be configured to utilize a global positioning system or awireless communication to identify a mobile device and begin to transmita signal for easy identification and detection. In select embodiments,the transponder may be configured to be attached to a stationary object,a door, a room, a building box or a storage container. Wherein, upon theentry management device detecting the device, the programminginstructions of the software may also be configured to: send out anaudible noise, illuminate, provide mapping instructions or directions tothe mobile device to provide guidance in locating a specific location ofthe stationary object, door, room, building box, or the storagecontainer via the speaker; illuminate lights on the entry managementdevice; provide a mapping direction on the device including: an exactlocation; a location inside a building, a building without a geoaddress, a container, a storage unit; the like; and/or combinationsthereof. As such, another feature of the disclosed artificialintelligence entry management system may be that the transponder devicecan be configured to take over where a global positioning system ends toguide the person or the device to a specific location inside a geo-fenceor outside a geo-fence. Another feature of the disclosed artificialintelligence entry management system may be that the entry managementdevice may be configured to utilize the global positioning system,Wi-Fi, rf, or a wireless communication to identify a mobile devicepreviously paired and initiate actions including messages, access,logistics to guide the person or the device to the specific locationsuch that the geo position of the entry management device may activatevarious actions. Another feature of the disclosed artificialintelligence entry management system may be that when the transponder isactivated and detects the person or the device within a set range, thetransponder device may be configured to emit a signal, a sound, a light,or input to the device configured to guide and direct the person or thedevice to the specific location.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the camera can be adapted to read avirtual key from the person or the device, and upon reading the virtualkey, the entry management device may be configured to unlock an accesspoint, provide a greeting, instructions or logistics, record a message,or establish contact with the individual requested. In selectembodiments, the virtual key may be a humanly created image selectedfrom a group consisting of: a humanly created photo; a humanly createdpicture; a humanly created drawing; a humanly created mark; a humanlycreated number or numbers; a humanly created letter or letters; ahumanly created word or words; the like; and/or combinations thereof.

In select embodiments of the disclosed artificial intelligence entrymanagement system, the access point may be a delivery storage containeror mailbox. In these embodiments, the entry management device may beconfigured to lock and unlock the delivery storage container or mailbox.In select embodiments, the delivery storage container or mailbox mayinclude a refrigerated compartment on an inside of the delivery storagecontainer or mailbox. The refrigerated compartment may be configured forfood or other refrigerated items. In select embodiments, therefrigerated compartment may be a first portion of the inside of thedelivery storage container, and a second portion of the inside of thedelivery storage container is configured for parcels. In other selectembodiments, the refrigerated compartment may be the entire inside ofthe delivery storage container. Yet in other select embodiments, therefrigerated compartment may be the entire inside of a first deliverystorage container and a second delivery storage container may beconfigured for parcels. In other select embodiments, the deliverystorage container or mailbox may include a warmer on the inside of thedelivery storage container or mailbox. The warmer may be configured towarm the inside of the delivery storage container or mailbox. Theartificial intelligence entry management system may be configured tocontrol the delivery storage container or mailbox with the ability toselect warmer, refrigerated, parcel, or a combination thereof persection of the delivery storage container or mailbox.

In select embodiments, the delivery storage container or mailbox may bepositioned just inside a door of a home and the entry management systemmay be configured to unlock and lock the door of the home for deliveriesto the delivery storage container or mailbox. Wherein the position ofthe delivery storage container or mailbox may be configured to preventthe need for deliveries to be walked through the house to the kitchen. Afeature of the delivery storage container or mailbox may be theinclusion of an ultraviolet light on an inside. The ultraviolet lightmay be configured for sanitizing the inside of the delivery storagecontainer or mailbox including sanitizing any parcels placed in theinside of the delivery storage container or mailbox.

In select embodiments, the delivery storage container or mailbox mayinclude the entry management device on an outside of the deliverystorage container or mailbox. The entry management device may beconfigured in a separate location from the storage container however.

The artificial intelligence entry management system may be configured toproduce an alarm including an alarm noise and/or light. The alarm mayutilize a light and/or speaker that is part of the entry managementdevice and/or the storage container. In select embodiments, the deliverystorage container and/or the entry management device produces an alarmwhen the storage container is jostled or opened without authorization. Aclosure sensor may be configured to detect the position of the closureto the storage container and when the closure is opened withoutauthorization, an alarm may be initiated. The storage container may alsocomprise a global positioning device, that is used by the artificialintelligence entry management system to monitor the location of thestorage container. If the storage container is moved beyond a thresholddistance from a set location, such as beyond the perimeter of anadministrator's property, an alarm may be initiated. In this situation,the alarm may be initiated on the storage container, in an effort toprevent the storage container from being stolen and an alertnotification may be sent to an administrator and/or authorities, such asthe police. An exemplary storage container may also contain anaccelerometer that detects if motion of the storage container. Again, ifthe storage container is jostled, such as when trying to be openedwithout authorization, an alarm may be initiated to deter the thief.Again, an alarm may be a light and/or sound emitted from the storagecontainer and/or entry management device and an alert may be sent to anadministrator when an alarm is activated.

A light on a delivery storage container may be configured forilluminating the delivery storage container and area around the deliverystorage container or mailbox. A speaker on a delivery storage containermay be configured to communicate with a delivery person and providelogistic instructions regarding a deliver, such as which compartment todeliver a package into. In other select embodiments, the deliverystorage container or mailbox may include a power source being selectedfrom a group consisting of: a wired power source; a battery operatedpower source; a solar power source; the like; and/or a combinationthereof. In other select embodiments, the delivery storage container ormailbox may include a warmer configured to heat the inside of thedelivery storage container or mailbox. In other select embodiments, thedelivery storage container or mailbox may include a wireless connectionconfigured to control the delivery storage device or mailbox via amobile device or a personal computer, including being configured tocontrol the locking and unlocking of the delivery storage container ormailbox, controlling the temperature inside of the delivery storagecontainer or mailbox via the warmer or the refrigerated compartment, theultraviolet light inside of the delivery storage container or mailbox,or combinations thereof.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the camera may be adapted to read avirtual key from the person or the device, and upon reading the virtualkey, the entry management device may be configured to activate a droneto retrieve deliveries from a specific location.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the entry management device may beconfigured as a receptionist device for corporate, commercial,institutional or industrial applications. The receptionist device may beconfigured to provide custom messages for each occupant and forreceiving and recording custom messages for each user. One feature ofthe receptionist device may be that information may be forwardedwirelessly to each occupant, or information is retrieved from the entrymanagement device by displaying a virtual key assigned to each occupant.Another feature of the receptionist device may be that the entrymanagement system may include a plurality the entry management devicesconfigured as the receptionist device for corporate, commercial,institutional or industrial applications. Wherein each of the pluralityof entry management devices may interact and communicate with eachother, whereby the plurality of entry management devices are configuredto relay messages to the occupant.

Another feature of the disclosed artificial intelligence entrymanagement system may be that the microphone may be adapted to identifyan audible key from the person or the device. Upon identifying theaudible key via the microphone, the entry management device may beconfigured to unlock an access point or provide a greeting, informationor logistics. In select embodiments, the audible key may be a word,words, a sentence, a number, a sound or sounds, wherein the microphoneis configured to match the audible key with the person or device. Inselect embodiments, the artificial intelligence device may be configuredto assign audible keys to a variety of users, whereby the artificialintelligence device may be configured to provide access or informationto each of the variety of users. In other select embodiments, theartificial intelligence device may be configured to maintain a record ofeach of the variety of users. Yet in other select embodiments, theartificial intelligence device may be configured to record audiblemessages.

Another feature of the disclosed artificial intelligence entrymanagement system is that the artificial intelligence entry managementsystem is configured to record data, such as interactions with thesystem including, but not limited to, audio recordings, videorecordings, dates, times, third person identification, such aselectronic address, dates and/or times of entry, what access point waslocked or unlocked, dates and times of system breaches, such as a lockbeing opened without access, or a storage container being moved. Asensor may be configured to monitor the lock status of a lock on anaccess point, including a lock on a storage container for delivery. Inaddition, a storage container may have a motion sensor or a GPS asdescribed herein and the system may record if the storage container istampered with or record a location if it is stolen and moved to a newlocation. The artificial intelligence entry management system may alsokeep records of the virtual keys used for entry. This recorded data maybe kept on a database or computer storage drive and may be secured,whereby only a system administrator can access this recorded data.

In another aspect, the instant disclosure embraces an artificialintelligence entry management system with a plurality of entrymanagement devices. Each of the plurality of entry management devicesmay be the disclosed artificial intelligence entry management device inany of the various embodiments and/or combination of embodiments shownand/or described herein. As such, in general, each of the entrymanagement devices may be configured for use with an artificialintelligence device in communication with the entry management deviceincluding a processor with a non-transitory computer readable storagemedium comprising software having program instructions configured forproviding artificial intelligence to the artificial intelligence entrymanagement device. A network platform in communication with each of theplurality of entry management devices may also be included. The networkplatform may be configured to allow each of the plurality of entrymanagement devices to communication with each other.

In select embodiments of the disclosed artificial intelligence entrymanagement system with a plurality of entry management devices, theplurality of entry management devices may be installed in aneighborhood. Wherein, each of the plurality of entry management devicesmay be configured with the ability to communicate if a burglary occursin any other house, or activate and pan the streets to record alltraffic activity.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to limiting of the disclosure. Asused herein, the term “and/or” includes any and all combinations of oneor more of the associated listed items. As used herein, the singularforms “a”, “an” and “the” are intended to include the plural forms aswell as the singular forms, unless the contest clearly indicatesotherwise. It will be further understood that the terms “compromises”and/or “comprising” when used in this specification, specify thepresence of stated features, steps, operations, elements and/orcomponents, but do not preclude the presence of addition of one or moreother features, steps, operations, elements, components and/or groupsthereof.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by onehaving ordinary skill in the art to which this disclosure belongs. Itwill be further understood that terms, such as those defined in commonlyused dictionaries, should be interpreted as having a meaning that isconsistent with their meaning in the context of the relevant art and thepresent disclosure and will not be interpreted in an idealized or overlyformal sense unless expressly so defined herein.

A storage container, as used herein, is a receptable configured forreceiving a package and may have a lock that is controlled by theartificial entry management system, and may be a portable storagecontainer that can be moved to a desired location or a storage containerthat is fixed in a location, such as a mailbox. A storage container maybe an example of an access point that is locked and unlocked by theartificial entry management system.

In describing the disclosure, it will be understood that a number ofthermal enhancements are disclosed. Each of these has individualbenefit, and each can also be used in conjunction with one or more, orin some cases all, of the other disclosed techniques. Accordingly, forthe sake of clarity, the description will refrain from repeating everypossible combination of the individual steps in an unnecessary fashion.Nevertheless, the specification and claims should be read with theunderstanding that such combinations are entirely within the scope ofthe intervention and the claims.

It will be evident, however, to one skilled in the art that the presentdisclosure may be practiced without specific details.

The present disclosure is to be considered as an exemplification of thedisclosure, and is not intended to limit the disclosure to the specificembodiments illustrated by the figures or description below.

The present disclosure will not be described by referencing the appendedfigures representing preferred embodiments.

Although the present disclosure has been illustrated and describedherein with reference to preferred embodiments and specific examplesthereof, it will be readily apparent to those of ordinary skill in theart that other embodiments and examples may perform similar functionsand/or achieve like results. All such equivalent embodiments andexamples are with the spirit and scope of the present disclosure, arecontemplated thereby, and are intended to be covered by the followinggeneral description.

The foregoing illustrative summary, as well as other exemplaryobjectives and/or advantages of the disclosure, and the manner in whichthe same are accomplished, are further explained within the followingdetailed description and its accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure will be better understood by reading the DetailedDescription with reference to the accompanying drawings, which are notnecessarily drawn to scale, and in which like reference numerals denotesimilar structure and refer to like elements throughout, and in which:

FIG. 1 shows a perspective environmental view of an artificialintelligence entry management device and system according to selectembodiment of the disclosure;

FIG. 2 shows a front left perspective view of an artificial intelligenceentry management device according to select embodiment of thedisclosure;

FIG. 3 shows a back left perspective view of the artificial intelligenceentry management device according to FIG. 2 ;

FIG. 4 shows a front view of the artificial intelligence entrymanagement device according to FIG. 2 ;

FIG. 5 shows a back view of the artificial intelligence entry managementdevice according to FIG. 2 ;

FIG. 6 shows a front right perspective partially disassembled view ofthe artificial intelligence entry management device according to FIG. 2;

FIG. 7 shows a back left perspective partially disassembled view of theartificial intelligence entry management device according to FIG. 2 ;

FIG. 8 shows a front view of a mobile electronic device with a digitalphotograph that is an image virtual key configured to be identified bythe camera of the artificial intelligence entry management device andverified for access to an access point;

FIG. 9 shows a display screen showing the artificial intelligence entrymanagement system tracking a mobile electronic device, such as a mobilephone, of a third party to enable a contextual greeting and to providelogistic instructions to said third party when their mobile device moveswithin a threshold distance of the artificial intelligence entrymanagement device;

FIG. 10 is a top view of an exemplary storage container having twocompartments therein;

FIG. 11 shows a front view of a mobile electronic device that displays aplurality of digital photographs that in series are an image virtual keyconfigured to be identified by the camera of the artificial intelligenceentry management device and verified for access to an access point;

FIG. 12 shows a front view of an exemplary artificial intelligence entrymanagement device having a display screen that displays images forselection as a selected virtual key;

FIG. 13 shows a front view of an exemplary artificial intelligence entrymanagement device communicating with a mobile electronic device topresent a plurality of images for selection to produce an image virtualkey for access to an access point;

FIG. 14 shows a top view of a building, a dwelling, having robot dockingstations configured on each corner of the building to providesubstantially complete monitoring of the perimeter of the building; and

FIG. 15 shows an exemplary docking station having a plurality ofbatteries and a charging interface for charging a robot docked thereon.

It is to be noted that the drawings presented are intended solely forthe purpose of illustration and that they are, therefore, neitherdesired nor intended to limit the disclosure to any or all of the exactdetails of construction shown, except insofar as they may be deemedessential to the claimed disclosure.

DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS

Referring now to FIGS. 1-7 , in describing the exemplary embodiments ofthe present disclosure, specific terminology is employed for the sake ofclarity. The present disclosure, however, is not intended to be limitedto the specific terminology so selected, and it is to be understood thateach specific element includes all technical equivalents that operate ina similar manner to accomplish similar functions. Embodiments of theclaims may, however, be embodied in many different forms and should notbe construed to be limited to the embodiments set forth herein. Theexamples set forth herein are non-limiting examples and are merelyexamples among other possible examples.

Referring now to FIGS. 1-7 , in a possibly preferred embodiment, thepresent disclosure overcomes the above-mentioned disadvantages and meetsthe recognized need for such an apparatus or method by providing ofartificial intelligence entry management device 10 for entry managementsystem 100. Artificial intelligence entry management device 10 maygenerally include camera 22, microphone 24, motion detector 14, speaker18, and housing 12. Housing 12 may have oval shape 16 with substantiallyopen middle 20. Substantially open middle 20 may have housing protrusionportion 26 configured to house camera 22, microphone 24, motion detector14, and speaker 18.

Plurality of lights 28 may be included with artificial intelligenceentry management device 10. Plurality of lights 28 may be positionedaround periphery 30 of oval shape 16 of housing 12. In selectembodiments, each of the plurality of lights 28 may be light emittingdiode 32, also known as LEDs. One feature may be that each of the lightemitting diodes 32 of the plurality of lights 28 may be configured tolight up based on sounds emitted from speaker 18, With thisconfiguration, one feature of the disclosure may be that plurality oflights 28 may be configured to mimic artificial intelligence entrymanagement device 10 as if it were talking. Another feature may be thatplurality of lights 28 can be configured to indicate an alarm has beentriggered by flashing. Another feature may be that plurality of lights28 can be configured to indicate a status of the artificial intelligenceentry management device 10. As shown in the Figures, and best shown inFIGS. 6 and 7 , in select embodiments of the disclosed artificialintelligence entry management device 10, LED lens 34 may be included.LED lens 34 may be configured to cover and protect the plurality oflights 28, like light emitting diodes 32. LED lens 34 may have ovalshape 16 of housing 12.

Mounting bracket 36 may be included with artificial intelligence entrymanagement device 10. Mounting bracket 36 may be configured for mountinghousing 12 of artificial intelligence entry management device 10 tosurface 38, as shown in FIG. 1 . Mounting bracket 36 may have oval shape16 of housing 12.

Power source 40 may be included with artificial intelligence entrymanagement device 10. Power source 40 may be a hardwired power source(as shown in the Figures), a battery powered power source, the like, orcombinations thereof.

Wireless communication device 42 may also be included with artificialintelligence entry management device 10. Wireless communication device42 may be housed inside of housing protrusion portion 26 of housing 12of artificial intelligence entry management device 10. Wirelesscommunication device 42 may be configured to communicate with entrymanagement system 100, like a networked software platform, or the like,or other artificial intelligence entry management devices 10 via awireless communication. The wireless communication of wirelesscommunication device 42 may be, but is not limited to, Wi-Fi; UHF radiowaves in the industrial, scientific and medical radio bands, from 2.402GHz to 2.480 GHz, and building personal area networks (PANs), also knownas Bluetooth® (Bluetooth trademark owned by Bluetooth SIG, Inc. ofKirkland, Wash.); the like; or combinations thereof.

One feature of the disclosed artificial intelligence entry managementdevice 10 may be that speaker 18 can be positioned in housing protrusionportion 26 and oriented toward substantially open middle 20. Thisorientation of speaker 18 may be for projecting sound from speaker 18out of artificial intelligence entry management device 10.

Another feature of the disclosed artificial intelligence entrymanagement device 10 may be the inclusion of a processor. The processormay have a non-transitory computer readable storage medium includingsoftware. The software of the processor may have program instructionsconfigured for providing artificial intelligence to artificialintelligence entry management device 10. In select embodiments, thesoftware may be configured for development of intelligence withinartificial intelligence entry management device 10, including, but notlimited to, speech recognition, problem-solving, learning, planning, thelike, combinations thereof, etc. In select embodiments of artificialintelligence entry management device 10, the processor may be anetworked processor. The networked processor may be connected toartificial intelligence entry management device 10 via a wirelesscommunication to wireless communication device 42 on artificialintelligence entry management device 10. In other select embodiments,the processor may be a chipped processor. The chipped processor may behoused inside of artificial intelligence entry management device 10,including, but not limited to, inside of housing protrusion portion 26of housing 12 of artificial intelligence entry management device 10.

In another aspect, the instant disclosure embraces artificialintelligence entry management system 100. Artificial intelligence entrymanagement system 100 may generally include utilizing the disclosedartificial intelligence entry management device 10 in any of the variousembodiments and/or combination of embodiments shown and/or describedherein. As such, in general, the disclosed artificial intelligence entrymanagement system 100 may include the disclosed AI entry managementdevice 10 with camera 22, microphone 24, motion detector 14, speaker 18,wireless communication device 42, the like, and/or combinations thereof.In addition, artificial intelligence entry management system 100 mayinclude an artificial intelligence device. The artificial intelligencedevice may be in communication with AI entry management device 10. Theartificial intelligence device may include a processor with anon-transitory computer readable storage medium having software withprogram instructions configured for providing artificial intelligence tothe artificial intelligence entry management device 10.

The AI entry management device system 100 and AI entry management device10 may be configured to unlock an access point including, but notlimited to a door or gate or a storage container. As shown in FIG. 1 ,the AI entry management device 10 is configured on a dwelling 91, anexemplary access point 90, and is configured to unlock the door-lock 94on the door 92 of the dwelling. Also, the AI entry management device 10may be configured to unlock the lock 72 on the storage container 70,another access point 90′, to enable retrieval of items therein ordelivery of item into the storage container, or a compartment thereof.

As shown in FIG. 1 , an exemplary artificial intelligence entrymanagement system may include a robot 110, such as an aerial robot 111,that may use a package manipulator 114 to pick up and release packagesfor movement of a package from a first location to a secondary location.The aerial robot is configured to fly and is commonly referred to as adrone. The aerial robot may also have a camera 112 for taking digitalphotographs or video that may be transferred to the exemplary artificialintelligence entry management system. The aerial robot may be used formonitoring and surveillance of a delivery area and may be used forcreating and monitoring a geofence and/or MDA after a package has beendelivered. After a package has been delivered, the aerial robot maymonitor an area and take images that can be delivered to anadministrator of someone entering a geofence area and/or an MDA. A robotspeaker 116 may be used to communicate with a third party, such as adelivery person, to provide logistic instructions for package delivery.A speaker may also be used as an audible alarm. A microphone 117 may beused for receiving communication from a third party that is provided toan administrator of the artificial intelligence entry management system,for example. An exemplary robot has a wireless signal transceiver 118for communication with the artificial intelligence entry managementsystem 100 such as the artificial intelligence entry management device10. The robot may send photographs, video, audio recordings and the liketo the artificial intelligence entry management system which may be thentransferred to an administrator or a third party. A robot may alsocommunicate directly with an administrator or authority using thewireless signal transceiver 118. A robot may have controller 113 thatincorporates artificial intelligence to control functions of the robot.The artificial intelligence of the robot may interface with theartificial intelligence of the artificial intelligence entry managementdevice, for example. Robot 110, like a drone or a land robot, may beconfigured to be activated by AI entry management system to investigateany suspicious activity, or threats, determined by the AI device. Onceactivated, robot 110, like a drone may be configured to leave itsdocking station and investigate such suspicious activities and/orthreats. Whereby, robot 110 or drone can relay information, like images,back to the system, issue a command to the suspicious activity orthreat, and follow or track the individuals or vehicles, like bytransmitting images of the vehicle, license plate, color, make, etc., aswell as providing locational information or direction information ofsuch suspicions activities and/or threats. As such, robot 110, such as adrone, may be configured as a deterrent for suspicious activities orthreats. A robot may have a light 119 that is activated when a motion orsound above a threshold value is detected. The robot speaker 116 mayemit an alarm and the robot light 119 may flash a color when a threat isdetected, such as a person that is not identified by the artificialintelligence entry management system or someone carrying a weapon, suchas a gun or knife.

An exemplary robot 110, such as the aerial robot 111 may be configuredto return to a docking station 140 wherein the robot can monitor an areawith the camera 112 and microphone 117 and recharge. As shown, aerialrobot 111′ is docked to the docking station 140 and is being charged,wherein a rechargeable battery 115 is receiving electrical power. Thischarging electrical power may come from the dwelling, or from arenewable power source 150, such as a solar panel 152 as shown.

An artificial intelligence entry management system 100 may include orinterface with a storage container 70 to lock and unlock said storagecontainer for deliver and safe storage of items therein. A storagecontainer 70, including a mailbox 71, collectively referred to herein asa storage container, may comprise a lock 72 and a wireless signaltransceiver 78 for receiving a wireless signal from the wirelesscommunication device 42 of the AI entry management device 10. Anexemplary storage container may have a plurality of compartments thatmay have separate locks 72, 72′ for separate closures 79, 79′ andfeatures for retaining items therein, such as a heating device 80 orrefrigeration device 86. As shown, a first compartment 74 includes aheating device 80 and a second compartment 76, separated from the firstcompartment by a divider 75, has a refrigeration device 86. Groceryitems that need to be refrigerated may be delivered into therefrigerated compartment and in cold climates, medications and otheritems may be stored in the heated compartment to prevent freezing.

An artificial intelligence entry management system 100 may be configuredto unlock the lock 72 of the storage container 70, or a compartmentthereof, when a virtual key is verified by the AI entry managementdevice 10. As described herein, a virtual key may be an image that isread by camera 22 of the AI entry management device 10, or an audiblevirtual key that is received by the microphone 24 of the AI entrymanagement device 10. An image virtual key 50, may be a digital imagethat is sent by an AI entry management system administrator, such asthrough an APP or as an attachment in a text message to a third party'smobile electronic device. As shown in FIG. 8 , an administrator hasprovided a digital photograph of their puppy to a second parties mobileelectronic device 60 which was received by a wireless communicationdevice 62, such as a wireless signal transceiver. The third party maythen show this image on the display screen 65 to the camera 22 of the AIentry management device 10 to gain access to an access point, whereinthe door-lock 94 of the door to the dwelling is unlocked, or the lock 72on the storage container 70 is unlocked, for example. In addition, thevirtual key may include an audible key that is played by the mobiledevice through the speaker 68. The microphone on the AI entry managementdevice may receive the audible key in order to verify it. In anexemplary embodiment, both an image virtual key and an audible key arerequired for verification before an access point is unlocked. The mobileelectronic device 60 may also have a microphone 64 for providing verbalinput that is delivered to the artificial intelligence entry managementsystem.

One feature of artificial intelligence entry management system 100 maybe that the software may have programming instructions that, whenexecuted, cause AI entry management device 10 to execute entrymanagement and ecommerce support functions including the delivery ofmessages, directives, instructions, greetings, recordings, andfacilitating the connection of a third party for two-way audio/videocommunication.

A greeting may be a contextual greeting that includes some context tothe third party, such as their name, or the name of an organization theyare associated with. For example, a friend Jan, may come over to waterthe plants while an owner is away and the AI entry management devicesystem may provide a greeting to Jan that includes her name. In anotherexample, a UPS delivery driver may be tracked by the AI entry managementdevice system and a greeting that includes the “UPS” name may be providewhen the delivery person moves within a threshold range or distance ofthe AI entry management device or when they provide their virtual key.The artificial intelligence entry management system may track anelectronic device having a global positioning system by receiving alocation from the mobile electronic device or by interfacing with aprogram, such as an Application software, or App, to receive locationinformation regarding the electronic device. A package delivery personmay carry a transponder or other device that is used to track theirlocation or the location of their vehicle and the artificialintelligence entry management system may interface with a program ordatabase to determine this location.

A greeting may be contextual for a particular occasion, such as forholidays or special occasions including birthdays, anniversaries and thelike. An exemplary AI entry management device system may offer occasiongreeting packages that include a song or other occasion specificmessages for an additional fee to the administrator.

Another feature of artificial intelligence entry management system 100may be that motion detector 14 of AI entry management device 10 may beconfigured to activate upon motion and provide a greeting, command, orinstructions, whereby system 100 may activate upon recognition of apaired mobile device. The paired mobile device may be a storedidentification paired via the approval of an owner/administrator. Theowner/administrator may be individuals assigned programming rightsconfigured to allow the owner/administrator to make selections remotelyvia the artificial intelligence entry management system.

Another feature of artificial intelligence entry management system 100may be that, when activation occurs, artificial intelligence entrymanagement device 10 may be configured to provide a spontaneousresponse, or a pre-programmed response in accordance with the device itdetects.

Another feature of artificial intelligence entry management system 100may be that artificial intelligence entry management device 10 may beconfigured to provide a spontaneous response, or a pre-programedresponse in accordance with the image read by camera 22.

Another feature of artificial intelligence entry management system 100may be that, when activated, simultaneously, a notification may be sentto the owner/administrator with an option to engage remotely in two-waycommunication, activate a preprogrammed or custom message, provide avirtual key or activate the recording for a message, detect a person ora device via camera 22, microphone 24, motion detector 14, or wirelesscommunication device 42 and provide an intelligent response to theperson or device via speaker 18 or wireless communication device 42.

Another feature of artificial intelligence entry management system 100may be that when a package is scanned by camera 22 of AI entrymanagement device 10, artificial intelligence entry management system100 may be configured to initiate a geo-fence and/or MDA around an areaof AI entry management device 10. A geo-fence is a monitored area withinproximity of an access point and/or the AI entry management device. AnMDA, or monitored designated area, is an area created by AI entrymanagement device within the field of view of camera 22. A geo-fenceand/or MDA proximity distance from an access point and/or the AI entrymanagement device may be about 1 m or more, about 5 m or more, about 10m or more, about 20 m or more, about 50 m or more and may be dynamic asa mobile robot may interface with the AI entry management device.Wherein, when the geo-fence and/or MDA of AI entry management device 10is initiated, AI entry management device 10 may be configured to utilizemotion detector 14, camera 22, microphone 24, or combinations thereof,for detecting a breach of the geo-fence area and/or MDA around AI entrymanagement device 10. In select embodiments, when a breach of thegeo-fence area and/or MDA around AI entry management device 10 isdetected, artificial intelligence entry management system 100 may be,but is not limited to, being configured to: alert the owner via awireless notification; trigger the entry management device to set off analarm of the entry management device; trigger an external alarm; thelike; and/or or combinations thereof. In select embodiments, when thepackage is placed in the geo-fence area and/or MDA around AI entrymanagement device 10, the carrier of the package can activate AI entrymanagement device 10 to monitor the geo-fence area and/or MDA via motiondetector 14, camera 22, microphone 24, or combinations thereof. In otherselect embodiments, a carrier of the package can deactivate thegeo-fence area and/or MDA around AI entry management device 10 byscanning of the package or a virtual key, whereby the package may beretrieved. Once scanned, the notification, alarms, or combinationsthereof are deactivated by the scanning of the package or the virtualkey, and a subsequent scan can reactivate the geo-fence area and/or MDAaround AI entry management device 10.

Another feature of artificial intelligence entry management system 100may be that AI artificial intelligence device 10 can be configured tolearn various inputs.

Another feature of artificial intelligence entry management system 100may be that the software of the artificial intelligence device can beconfigured to relate to the occupants of the building for enabling namerecognition by AI entry management device 10.

Another feature of artificial intelligence entry management system 100may be that the software of the artificial intelligence device can beconfigured to enable AI entry management device 10 to establish contact,record messages, or deliver a message from the person or persons named.

Another feature of artificial intelligence entry management system 100may be that the artificial intelligence device can be configured tointerface with other artificial intelligence devices, like other AIentry management devices 10 configured as a part of artificialintelligence entry management system 100.

Another feature of artificial intelligence entry management system 100may be that when AI entry management device 10 is activated by motion,the detection of a paired mobile device, the presentation of a virtualkey, or the owner/administrator, AI entry management device 10 may beconfigured to cause the programming instructions of the software toactivate or turn on artificial intelligence entry management system 100.

Another feature of artificial intelligence entry management system 100may be that AI artificial intelligence device 10 may be configured tocause AI entry management device 10 to detect the person and interpretvoice detected by microphone 24 from the person.

Another feature of artificial intelligence entry management system 100may be that the intelligent response provided by the artificialintelligence device may include, but is not limited to: logistics, agreeting, a command, directions, a message, an inquire, a recordingrequest, an alarm to speaker 18, the like, and/or combinations thereof.

Another feature of artificial intelligence entry management system 100may be that wireless communication device 42 may be configured toestablish the identity of the person or the device once paired. Wherein,after pairing, the artificial intelligence device may be configured torecognize the device and provide a customized greeting, specificinstructions, access, or actions for the associated AI device 10.

Another feature of artificial intelligence entry management system 100may be that the artificial intelligence device may be configured torequire authentication of an image or mobile device that is active andunlocked, AI device 10 must be active, or combinations thereof, prior toproviding the customized greeting, the specific instructions, access, orthe actions for the associated device 10.

Another feature of artificial intelligence entry management system 100may be that the artificial intelligence device may be configured torecognize the previously paired mobile device and a virtual key or anidentification sequence. Wherein, if there is not a confirmedidentification, a third party authentication is sought which is anembedded code within the virtual key, or an audible or verbal responsecode including, but not limited to, a word or words, a sentence, anumber or numbers, sounds, or letters.

Another feature of artificial intelligence entry management system 100may be that the virtual key utilized may be a humanly created mark,drawing, written sequence of numbers, letters, abstract sketch, orpicture.

Another feature of artificial intelligence entry management system 100may be that wireless communication device 42 of AI entry managementdevice 10 may be configured for exchanging data between AI entrymanagement device 10 and fixed and mobile devices over short distancesusing wireless communications, including, but not limited to, Wi-Fi orUHF radio waves in the industrial, scientific and medical radio bands,from 2.402 GHz to 2.480 GHz, and building personal area networks (PANs),also known as Bluetooth® (Bluetooth trademark owned by Bluetooth SIG,Inc. of Kirkland, Wash.).

Another feature of artificial intelligence entry management system 100may be that artificial intelligence entry management system 100 may beconfigured to notify designated security personnel.

Another feature of artificial intelligence entry management system 100may be that AI entry management device 10 may be configured to work on anetworkable platform with networked software accessible and interactivewith any other devices running the networked software and participatingon the networkable platform. Wherein the networkable platform isconfigured for use by a variety of members including owners, servicepersonnel, property management, real estate professionals, short termrentals, hotels, employees, the like, etc. Wherein the networkableplatform may be configured to provide access and logistics to additionalindustries and uses.

In select embodiments of artificial intelligence entry management system100, a transponder device may be included. The transponder device may beconfigured to utilize a global positioning system or a wirelesscommunication to identify a mobile device and begin to transmit a signalfor easy identification and detection. In select embodiments, thetransponder device may be configured to be attached to a stationaryobject, a door, a room, a building box or a storage container. Wherein,upon AI entry management device 10 detecting the transponder device, theprogramming instructions of the software may also be configured to: sendout an audible noise, illuminate, provide mapping instructions ordirections to the mobile device to provide guidance in locating aspecific location of the stationary object, door, room, building box, orthe storage container via the speaker; illuminate lights on the entrymanagement device; provide a mapping direction on the device including:an exact location; a location inside a building, a building without ageo address, a container, a storage unit; the like; and/or combinationsthereof. As such, another feature of artificial intelligence entrymanagement system 100 may be that the transponder device can beconfigured to take over where a global positioning system ends to guidethe person or the device to a specific location inside a geo-fence oroutside a geo-fence. Another feature of artificial intelligence entrymanagement system 100 may be that AI entry management device 10 may beconfigured to utilize the global positioning system, Wi-Fi, rf,Bluetooth®, or another wireless communication to identify a mobiledevice previously paired and initiate actions including messages,access, logistics to guide the person or the device to the specificlocation such that the geo position of AI entry management device 10 mayactivate various actions. Another feature of artificial intelligenceentry management system 100 may be that when the transponder device isactivated and detects the person or the device within a set range, thetransponder device may be configured to emit a signal, a sound, a light,or input to AI entry management device 10 configured to guide and directthe person or the device to the specific location.

Another feature of artificial intelligence entry management system 100may be that camera 22 can be adapted to read a virtual key from theperson or the device, and upon reading the virtual key, AI entrymanagement device 10 may be configured to unlock an access point,provide a greeting, instructions or logistics, record a message, orestablish contact with the individual requested. In select embodiments,the virtual key may be a humanly created image including, but notlimited to: a humanly created photo; a humanly created picture; ahumanly created drawing; a humanly created mark; a humanly creatednumber or numbers; a humanly created letter or letters; a humanlycreated word or words; the like; and/or combinations thereof.

In select embodiments of artificial intelligence entry management system100, the access point may be a delivery storage container or mailbox. Inthese embodiments, AI entry management device 10 may be configured tolock and unlock the delivery storage container or mailbox. In selectembodiments, the delivery storage container or mailbox may include arefrigerated compartment on an inside of the delivery storage containeror mailbox. The refrigerated compartment may be configured for food orother refrigerated items. In select embodiments, the refrigeratedcompartment may be a first portion of the inside of the delivery storagecontainer, and a second portion of the inside of the delivery storagecontainer is configured for parcels. In other select embodiments, therefrigerated compartment may be the entire inside of the deliverystorage container. Yet in other select embodiments, the refrigeratedcompartment may be the entire inside of a first delivery storagecontainer and a second delivery storage container may be configured forparcels. In other select embodiments, the delivery storage container ormailbox may include a warmer on the inside of the delivery storagecontainer or mailbox. The warmer may be configured to warm the inside ofthe delivery storage container or mailbox. Wherein, a feature ofartificial intelligence entry management system 100 may be that system100 may be configured to control delivery storage container or mailboxthe ability to select warmer, refrigerated, parcel, or a combinationthereof per section of the delivery storage container or mailbox. Inselect embodiments, the delivery storage container or mailbox may bepositioned just inside a door of a home and AI entry management system100 may be configured to unlock and lock the door of the home fordeliveries to the delivery storage container or mailbox. Wherein theposition of the delivery storage container or mailbox may be configuredto prevent the need for deliveries to be walked through the house to thekitchen. A feature of the delivery storage container or mailbox may bethe inclusion of an ultraviolet light on an inside. The ultravioletlight may be configured for sanitizing the inside of the deliverystorage container or mailbox including sanitizing any parcels placed inthe inside of the delivery storage container or mailbox. In selectembodiments, the delivery storage container or mailbox may include AIentry management device 10 on an outside of the delivery storagecontainer or mailbox. In other select embodiments, the delivery storagecontainer or mailbox may include an alarm attached to the deliverystorage container or mailbox configured for security. In other selectembodiments, the delivery storage container or mailbox may includelighting attached to the delivery storage container or mailboxconfigured for illuminating the delivery storage container or mailboxand area around the delivery storage container or mailbox. In otherselect embodiments, the delivery storage container or mailbox mayinclude a power source which may be, but is not limited to: a wiredpower source; a battery operated power source; a solar power source; thelike; and/or a combination thereof. In other select embodiments, thedelivery storage container or mailbox may include a warmer configured toheat the inside of the delivery storage container or mailbox. In otherselect embodiments, the delivery storage container or mailbox mayinclude a wireless connection configured to control the delivery storagedevice or mailbox via a mobile device or a personal computer, includingbeing configured to control the locking and unlocking of the deliverystorage container or mailbox, controlling the temperature inside of thedelivery storage container or mailbox via the warmer or the refrigeratedcompartment, the ultraviolet light inside of the delivery storagecontainer or mailbox, or combinations thereof.

Another feature of artificial intelligence entry management system 100may be that camera 22 may be adapted to read a virtual key from theperson or the device, and upon reading the virtual key, AI entrymanagement device 10 may be configured to activate a drone to retrievedeliveries from a specific location.

Another feature of artificial intelligence entry management system 100may be that AI entry management device 10 can be configured as areceptionist device for corporate, commercial, institutional orindustrial applications. The receptionist device may be configured toprovide custom messages for each occupant and for receiving andrecording custom messages for each user. One feature of the receptionistdevice may be that information may be forwarded wirelessly to eachoccupant, or information is retrieved from AI entry management device 10by displaying a virtual key assigned to each occupant. Another featureof the receptionist device may be that AI entry management system 100may include a plurality of AI entry management devices 10 configured asthe receptionist device for corporate, commercial, institutional orindustrial applications. Wherein each of the plurality of AI entrymanagement devices 10 may interact and communicate with each other,whereby the plurality of AI entry management devices 10 may beconfigured to relay messages to the occupant.

Another feature of artificial intelligence entry management system 100may be that microphone 24 may be adapted to identify an audible key fromthe person or the device. Upon identifying the audible key viamicrophone 24, AI entry management device 10 may be configured to unlockan access point or provide a greeting, information or logistics. Inselect embodiments, the audible key may be a word, words, a sentence, anumber, a sound or sounds, wherein microphone 24 is configured to matchthe audible key with the person or device. In select embodiments, theartificial intelligence device may be configured to assign audible keysto a variety of users, whereby the artificial intelligence device may beconfigured to provide access or information to each of the variety ofusers. In other select embodiments, the artificial intelligence devicemay be configured to maintain a record of each of the variety of users.Yet in other select embodiments, the artificial intelligence device maybe configured to record audible messages.

In another aspect, the instant disclosure embraces artificialintelligence entry management system 100 with a plurality of AI entrymanagement devices 10. Each of the plurality of AI entry managementdevices 10 may be the disclosed artificial intelligence entry managementdevice 10 in any of the various embodiments and/or combination ofembodiments shown and/or described herein. As such, in general, each ofthe AI entry management devices 10 may be configured for use with anartificial intelligence device in communication with the entrymanagement device 10 including a processor with a non-transitorycomputer readable storage medium comprising software having programinstructions configured for providing artificial intelligence to theartificial intelligence entry management device 10. A network platformin communication with each of the plurality of AI entry managementdevices 10 may also be included. The network platform may be configuredto allow each of the plurality of AI entry management devices 10 tocommunication with each other.

In select embodiments of artificial intelligence entry management system100 with a plurality of AI entry management devices 10, the plurality ofAI entry management devices 10 may be installed in a neighborhood.Wherein, each of the plurality of AI entry management devices 10 may beconfigured with the ability to communicate if a burglary occurs in anyother house, or activate and pan the streets to record all trafficactivity.

As shown in FIG. 1 , AI entry management device 10 of AI entrymanagement system 100 may be configured as a doorbell device 10. Thedoorbell device 10 can be positioned on or proximate to a door, and thesystem can include a lock on the door. The doorbell device 10 caninclude a computing device comprising a computer processor, such as amicrocontroller. The microcontroller is operatively connected to camera22 and the lock on the door via a Wi-Fi or Bluetooth® (Bluetoothtrademark owned by Bluetooth SIG, Inc. of Kirkland, Wash.) signal. Whencamera 22 scans and processes a preprogrammed bar code, image, numbersor pictures, the microcontroller of the doorbell device 10 sends asignal unlocking the door lock. Also, camera 22 processes apreprogrammed bar code, image, numbers or pictures, a signal is receivedfrom the cloud server or computer processor after authentication causinga locking device to open or access to be gained. The doorbell device 10can optionally include a card reader adapted for electronically readingidentification cards, credit cards, and the like. The microcontrollercan comprise a computer processor and a non-transitory computer readablestorage medium comprising software having programming instructions that,when executed, cause the microcontroller to carry out the abovedescribed steps. According to an embodiment of the disclosure, thesoftware can be adapted for use as an application on a mobile smartphone. The doorbell device 10 can include and interface with one or moreartificial intelligence devices.

According to another embodiment of the disclosure, the system comprisesthe AI entry management device 10 or doorbell device 10 or anindependent scanner located near or secured to a door, or in proximityto or secured to a lock box or other storage apparatus. The lock box orother storage apparatus can be adapted to contain letters, packages, orother deliveries. The lock box can be located near an entry point, builtinto a residential or commercial structure, located in a free-standingstructure such as a mailbox or decorative column, in the ground or otherplaces within the range of a Wi-Fi/Bluetooth® (trademark owned byBluetooth SIG, Inc. of Kirkland, Wash.) signal. The independent scannercan have wireless or wired capabilities. The entire system can be wired,wireless or battery operated. A warning signal is delivered to anadministrator(s) when any battery in the system becomes weak.

The independent scanner is capable of reading bar codes, images,numbers, and pictures. Upon reading and processing a preprogrammed barcode, image(s), numbers or pictures, a lock on the door, lock box orother storage apparatus is unlocked. Also, upon reading and processingof preprogrammed bar code, image(s), numbers or pictures, an appointedmessage or a general message can be delivered audibly or via a text to amobile phone or an e-mail.

The independent scanner is capable of voice recognition. The independentscanner can comprise numbered buttons for additional authentication orto route information or notification to the appropriateuser/client/owner. The independent scanner can be located at an entrypoint or in proximity of a lock box, storage facility or compartment.The scanner can comprise a storage or lockbox container with a built-inscanner either wired, wireless or battery operated.

According to an embodiment of the disclosure, the system can include acard reader capable of reading identification cards, credit cards, andthe like. The card reader can be incorporated in the AI entry managementdevice 10, or in the independent scanner.

According to an embodiment of the disclosure, the system can include ascanner/reader incorporated in another device connected to a storagecontainer, box, storage facility or the like.

According to an embodiment of the disclosure, the system can include asecure storage container located on a property for the purpose ofreceiving packages and deliveries. The container can have an automaticlocking and unlocking mechanism triggered directly by the scannerremotely via wireless technology or via a signal from a computer orcloud server. The storage container can be built into a structure, suchas a house, located inside a column or other decorative structure, orcan be free standing. The storage container or lock box can be equippedwith a scanner.

According to an embodiment of the disclosure, the system can include acomputer processor and a non-transitory computer readable storage mediumcomprising software having programming instructions that, when executed,cause a computer processor to carry out various steps described herein.According to an embodiment of the disclosure, the software can beadapted for use as an application on a mobile smart phone.

The software can enable a user to create a virtual key. The virtual keycan be a bar code, a graphic image such as a photograph, and/or analphanumeric code comprised of letters and/or numbers. In a preferredembodiment, the virtual key comprises a graphic image and an underlyingalphanumeric code, and the scanner is adapted to read graphic images andalphanumeric characters. If weather or other issues prevent the scannerfrom being able to read the graphic image, the scanner can read thealphanumeric code. In another embodiment, the virtual key comprises agraphic image and an underlying code that may be used for authenticationof the image, and the scanner is adapted to read graphic images and barcodes. If weather or other issues prevent the scanner from being able toread the graphic image, the scanner can read the alphanumeric code. Whenthe scanner reads the virtual key it initiates one or more actions, suchas unlocking an associated lock to allow access to a secured location orcontainer, or transfer data to a computer processor or a cloud server toauthenticate the key or perform the functions enabling access.

Notifications from the scanner can be sent wirelessly to the appropriaterespondent enabling a remote signature receipt. The software applicationis capable of voice recognition. The software can create bar codes,images, and pictures and can forward them, such as by text or e-mail, toallow access to authorized visitors, deliveries, service personnel, andthe like.

The software application can deliver a specific message for the specificbar code, image, picture and/or number(s) to input. The software enablesremote programming of the scanner, lockbox, storage etc.

The software application enables remote two-way communication viawireless mobile devices. The software application coordinates theactions of all features of the system. The software application canreceive data from a plurality of mobile devise or fixed devices viaInternet, Wi-Fi, or other wireless or wired means.

The software enables the programmer to create a virtual key, which canbe a unique barcode, character, picture, letter(s) and/or number(s). Acorresponding virtual key is sent to designated recipient(s), such asdelivery or service personnel. When scanned, access is gained, or amessage is delivered from the system. The software allows access andmessages to expire as programmed in accordance with each unique barcode,character, picture, letter(s) and/or number(s).

Each virtual key can be programmed to have a predetermined limited lifespan. Upon creating a virtual key, the user can select a predetermineddate and time at which the virtual key will expire and no longer provideaccess.

The software can require a driver's license scan or card reader for thepurposes of verifying entry. The software can time stamp everyactivation and document identity when desired. The software allowsnotifications to be sent to one or more mobile devices.

The software enables the person notified wirelessly to forward a uniquebarcode, character, picture, letter(s) and/or number(s) etc. to one ormore recipients to provide access or messages.

The software can send a delivery confirmation to the sender, thedelivery service and/or others involved. The software allows owners tochange access according to need for residents or guests, therebyeliminating the need to change locks.

The software enables preprogrammed messages, directives to differentindividuals in accordance with the corresponding scan. The softwareenables a remote signature, symbol, and/or image to be sent from ahandheld device to the system, enabling the delivery person to obtainsuch through the scanner or doorbell or other system apparatus.

The software can allow a mobile or stationary transmission of a barcode,image, etc. for the purposes of access, message and/or information. Thesoftware has voice recognition and artificial intelligence, enablingdissemination to appropriate users and interface with an authorizeddelivery person or guest. The artificial intelligence can provideinformation, directives, and/or greetings etc.

The software application enables all devices in the system to besynchronized in a secure manner by usernames and passwords or similaridentification protocol. The system can be referred to as “VirtualAccess Locator Technology” (VALT). The system comprises:

-   -   Scanner/Scanner/Doorbell/Light apparatus mounted in proximity to        a door, lockbox, storage, compartment or other secured location        or container.    -   Scanner can include illumination, camera, speaker, microphone,        alarm, and reader(s) for cards, mobile phones, and mobile        devices.    -   Controller comprised of a catalogue of keys for creation of a        variety of selected inputs to be sent or transmitted to the        scanner or to an individual(s) with a remote device or to an        email address, or other address. Each virtual key, bar code,        alphanumeric input has the capability of triggering a        corresponding message, directive, etc. from the system when a        scan is performed.    -   Controller(s) consisting of programmable devices (computer,        laptop, cell phone, tablet etc.) running a software application        controlling one or more systems of the disclosure.    -   Lock box(s), storage, compartments for storage of deliveries        that interface with the controller and the scanner.    -   Software with a menu of features to customize the VALT system        for uses such as managing construction sites and deliveries,        providing remote contact by real estate agents with prospective        buyers, forwarding an electronic code/virtual key for access        utilizing the scanners, and serving property owners with a        secure method of receiving deliveries.    -   A camera for monitoring package deliveries, recording access and        egress, and date stamping time of events.    -   Two-way communication for wireless communication between person        initiating scan and appropriate person(s).    -   Motion detection for activation of system or the pressing of a        button.    -   If a delivery package requires a signature and the occupant is        not home, the scan will enable the system to notify the occupant        and an electronic signature can be forwarded to the deliverer as        well as remote access triggered to a selected structure, such as        a lockbox, storage, compartment.    -   An app enabling networking of artificial intelligence devices        within or outside the Wi-Fi network.

An embodiment of the disclosure comprises a general-purpose computerthat has been programmed to perform particular functions as a specificpurpose computer pursuant to the instruction from program software, suchas the software described above.

According to an embodiment of the disclosure, when a package, letter orother delivery is anticipated, the source of the delivery, which can bean online retailer, identifies itself as a VALT application memberenabling the source to select delivery options which may include theprovision of a virtual key to the retailer or carrier for delivery. Theowner may designate specific delivery instructions, access, and/oraccess points for each delivery. The virtual key can be a predeterminedbar code(s), graphic image(s), and/or other access authorizing input.When the purchaser receives the access authorizing input, that input isentered into the VALT system. The delivery source can also provide theauthorizing delivery input (virtual key) to a delivery personresponsible for delivering the package, letter, or other delivery to thepurchaser. Alternatively, the purchaser can provide the virtual key tothe delivery person. The VALT system stores the authorizing input untilan anticipated match is received from a delivery person (bar code,image, numbers, etc.).

The VALT system scanner scans the input from the delivery person todetermine if it matches the authorizing input that had been entered bythe purchaser. When a match occurs, the VALT system is triggered toinitiate one or more of the following actions:

-   -   Provide access (such as by unlocking a door or container)    -   Deliver a preprogrammed message to the source of the delivery    -   Establish contact with appropriate individual(s)    -   Date stamp delivery    -   Notify appropriate individuals of delivery (such as the intended        recipient)    -   Initiate two-way communication    -   Activate camera    -   Activate motion detection    -   Activate the artificial intelligence device which will then        interface with the VALT system providing instructions,        directives, etc.

In an alternative embodiment of the disclosure, the intended recipientcan create the authorizing input, such as a bar code(s) or image(s), andthe intended recipient sends the authorizing input to the deliverysource. For example, an individual can create a personalized authorizinginput that the individual can provide to an online retailer at the timeof making a purchase from the online retailer.

According to an embodiment of the disclosure, a system administrator hasthe ability to create barcodes, images, etc. or other authorizing inputsthat can be sent for the purpose of access:

-   -   Deliveries    -   Guest    -   Family    -   Real Estate Sales    -   Service and repair personnel    -   Property management    -   Online real estate rental platforms, such as Airbnb

An administrator/owner can create label and provide the label to anumber of vendors. The label can be created by the sender usingidentified numbers or codes provided by the sender such as credit cardnumber, number provided by administrator/owner at the time of order,and/or image selected by the administrator/owner at the time of order.

According to an embodiment of the disclosure, the VALT system has thecapability of sending a signal to a variety of access points. One ofwhich can be mail compartments, storage compartments, entry, or other.Once access is provided, the access information becomes invalid, orprogrammed to expire at a designated time.

The VALT system can include the ability to deliver messages orinformation associated with each scan. The system can also include voicerecognition and AI (artificial intelligence), either built in ornetworked with other external AI devices, enabling it to conductinquiries, provide information, and respond to inquiries.

The VALT system can be connected to a data base for the purpose ofreading drivers' licenses or other Identification cards or badges. TheVALT system date stamps, stores and configures a report of all activity.The VALT system confirms deliveries, date stamping each, and providesaccess to package containers, storing them safely.

According to an embodiment of the disclosure, the two-way communicationenables remote communication with the owner/administrator and the persontriggering the scan.

Locking compartments or storage compartments for the VALT system can bebuilt in the structure or located in proximity to a structure in rangeof the VALT wireless input, the cloud server running the application, ora mobile device running the application.

In select embodiments, the VALT system comprises a scanner device, suchas the AI entry management device 10 described above. Upon the purchaseof an item from an online retail seller platform, a virtual key iscreated and transmitted to the AI entry management device 10 of the itempurchaser. The virtual key can include the specific IP address of thepurchaser. The virtual key is also sent to the designated retailer ordelivery service that is to deliver the item to the purchaser if a VALTmembership is confirmed. Upon delivering the item to the purchaser'slocation, the delivery service presents the virtual key, which can be abar code that is scanned by the doorbell device. Upon scanning thevirtual key, the VALT scanner AI entry management device 10 transmits asignal to the application server, computer processor or door lock thatunlocks the door 112. The VALT system can program the virtual key sothat it expires after a predetermined number of uses at the AI entrymanagement device 10. For example, the virtual key can expire after ithas been scanned one time by the AI entry management device 10. As such,the virtual key cannot be used again. Alternatively, the virtual key canbe programmed to activate at a predetermined time and expire at apredetermined time.

According to an embodiment of the disclosure, the VALT system can beused in the field of real estate sales. Real estate agents can sendaccess information wirelessly in the form of a bar code or image to apotential buyer visiting a home for sale. The potential buyer can inputthe access information into the system to unlock the door of the homeand gain entrance. The VALT system can also confirm the identity of thepotential buyer via driver's license scan. The system can monitor accessvia built in camera(s), conduct remote tour via interior cameras andmonitor exit. The VALT system can be used with online real estate rentalplatforms, such as Airbnb.

In another embodiment of the disclosure, the VALT system can be used toreceive service providers at a location, such as building contractors,sub-contractors, repair men, cleaning staff and other service personneldoing work at a residence. The homeowner can use the system to createaccess information and provide the information to the service providerswho input the information into the system to gain access to theresidence.

Another embodiment of the disclosure comprises a mobile app that allowsfor the creation of a virtual key to enable the transfer of keys foraccessing a structure.

According to an embodiment of the disclosure, the VALT system comprisesan artificial intelligence (AI) device and AI entry management device 10having camera 22 that can be used as a scanner and a mobile app that canbe utilized by merchants. The mobile app allows the transfer of specificbarcode or other information. Also, included in the app is the abilityto create virtual keys which may be sent to delivery personnel orservice people. An unlocking component is associated with the creationof the virtual keys.

According to an embodiment of the disclosure, the virtual key expires ata predetermined time selected by the creator of the virtual key. Thevirtual key can be securely sent to a cell phone for access by variouspersonnel.

In another embodiment of the disclosure, multiple artificialintelligence (AI) devices communicate with one another in an establishednetwork. This allows messages to be shared, transmitted, and stored inother AI devices for both security and information purposes. If adelivery occurs and the recipient or occupant is not available, the VALTsystem communicates with the AI device with a notification that may bestored or sent to another AI device. According to an embodiment of thedisclosure, membership in the network can be accepted via programming ofa code, IP address, or some other identifier that can be accepted byanother device or devices for shared communication. The information mayextend to the merchant who has the ability to send a message to an AIdevice regarding delivery, shipping, or order information. The AI devicemay also communicate instructions to the delivery person via the VALTscanner or independently, in addition to storing important informationfrom a delivery or service person.

Another embodiment of the disclosure comprises a system for deliveringmerchandise comprising an online membership platform on which a user, atthe time of creating a membership, enters personal data, such as name,address, and credit card information. The user can create a virtual key,and enter special instructions for delivery personnel, such as theuser's preferred location for leaving packages. The membership platformcan be accessed at the time of making an online purchase. For example,an online retailer can make customers aware of the membership platformand provide a link to the platform when customers are about to make apurchase from the online retailer. Returning customers who have alreadycreated a membership can enter a password to bring up their existingmembership. The system includes a scanner device that can read barcodes, images, and alphanumeric symbols. The scanner device can beencoded with the personal data of a particular user, including theuser's “virtual key.” The online retailer delivers the encoded scannerdevice to the particular user when the user creates a membership on themembership platform.

The user positions the scanner device proximate an access door of theuser's home, business or other location to which the user has purchasedfrom the online retailer is to be delivered. The scanner device caninclude adhesive or other attachment means that allows the scannerdevice to be securely attached to the user's home, storage container orother secure location. The scanner device can include a speaker,microphone, a display screen and a camera. Preferably, the displayscreen is a touch screen. When a delivery is scanned, confirmation ofreceipt of the package is transmitted to the online retailer and theuser. Upon scanning of the package, the scanner device reads the virtualkey.

If the user entered special delivery instructions on the membershipplatform, the instructions (such as “place the package on the backporch”) can be broadcast audibly via the speaker and/or presentedvisually as text on the touch screen. If the delivery service personnelhave an issue and wishes to communicate with the user, he can do sousing the microphone. The online retailer can offer an “upgraded”scanner device that includes means for installing an electronic lock onthe user's access door that is operatively connected to the scannerdevice. Upon scanning of the package by the scanner device, the scannerdevice reads the virtual key, which triggers the electronic lock on theaccess door to unlock for a predetermined amount of time to allow thedelivery service personnel to place the package inside the user's home.

According to another embodiment of the disclosure, the VALT applicationcan maintain a record of every activation and access key. A record ismaintained of each activation that includes the virtual key utilized forthe activation, the IP address and authorized user of the mobile deviceof the individual and/or entity utilizing the virtual key for access,the duration of stay, and the date/time of departure and/or terminationof the virtual key.

According to another embodiment of the disclosure, the VALT applicationcan include voice recognition technology and the virtual key comprisesan audible recording of a series of numbers, words and/or sounds, whichcan be created by the administrator. The voice recognition technologycan be operatively connected to the scanner device whereby the scannerdevice is adapted to receive and process voice data. When the scannerdevice receives and processes the audible sound of the virtual key oneor more actions can be initiated, such as unlocking a door to astructure and/or providing a greeting and/or logistics information.

According to another embodiment of the disclosure, access to the VALTapplication can be protected by biometric recognition of the user.Access to the VALT application is granted when certain biometric data ofthe user is authenticated. Authentication can be achieved by scanningfingerprints and/or other physical features of the user.

According to another embodiment of the disclosure, the VALT system caninclude a secondary power source that enables the system to continueworking in the event of a power outage. The secondary power source can(a) serve as a backup power source, (b) charge a battery capable ofpowering the system when electricity is not available, and/or (c)contain a backup energy/power device capable of powering the system. Thesecondary power source can comprise one or more solar (photovoltaic)panels.

According to another embodiment of the disclosure, the virtual key cantrigger a drone device that retrieves a package and takes it to adesignated storage area. Rather than the virtual key being used toaccess a structure, the key activates a drone device that flies to thedelivery area and retrieves the package when the key is scanned.

Another embodiment of the disclosure comprises a system that can bereferred to herein as “Mapping and Locator Technology” (MALT). The MALTsystem can be an optional or additional feature of the VALT system. Inaccordance with the MALT system, a global navigation satellite system,such as The Global Positioning System (GPS), is used to interface withmultiple devices to initiate access and/or activate messages orlogistics when devices are within a particular range of distance betweeneach other. The particular range of distance necessary to initiateaccess and/or messages or logistics can be entered into the MALT system.The range of distance can be for example five feet, or it can be greateror less. The GPS detects the geo-location of each device, and when it isdetermined that the multiple devices are within the particular range ofdistance of each other a number of different actions can be initiated,such as granting access to a structure and/or activate messages andlogistics.

The MALT system, utilizing a standard GPS service, can establish arelationship between a host device and one or more mobile devicesrunning the VALT application. The mobile devices can be mobilesmartphones. The host device comprises a computer processor and islinked to each mobile device using the IP address of each mobile device.The host device can be an artificial intelligence device. When themobile device comes within proximity of the host device, the host deviceinitiates one or more actions, such as providing access to a structureand/or providing a greeting and/or logistics information. This featureeliminates the need for optics and/or near-field communications (NFC).When utilized in delivery services it enables the carrier to simplyarrive and come within proximity of the host device.

In another embodiment, the MALT system, utilizing a standard GPSservice, can establish a relationship between a mobile device and aspecific landmark or address. When the mobile device is within proximityof the specific landmark or address, access or logistics are activatedutilizing. The mobile devices can be mobile smartphones or a carrier'sdiad (mobile device) which can be utilized for access and logistics.This feature eliminates the need for optics and/or near-fieldcommunications (NFC). When utilized in delivery services it enables thecarrier to simply arrive and come within proximity of the landmark oraddress.

The MALT system can interface with devices of VALT members. Informationand logistics can be programmed into each carrier's mobile device andwhen the carrier's mobile device is within proximity of a landmark oraddress, access and directives are initiated.

According to a preferred embodiment, the MALT system can utilize avirtual key for added security. The host device can be the AI entrymanagement device 10 described above. The AI entry management device 10is linked to a mobile device using the IP address of the mobile device.In addition, a virtual key can be created and transmitted to the linkedmobile device. When the mobile device comes within proximity of the AIentry management device 10 and the virtual key is read by the AI entrymanagement device 10, the host device initiates one or more actions,such as unlocking the door to the structure operatively connected to theAI entry management device 10 and/or providing a greeting and/orlogistics information. In order to initiate the action, the linkedmobile device must be within the particular predetermined range ofdistance of the AI entry management device 10 and the AI entrymanagement device 10 must read the virtual key from the mobile device.This provides an added layer of security. The virtual key can be a barcode, a graphic image, such as a photograph, and/or an alphanumeric codecomprised of letters and/or numbers. Preferably, the virtual keycomprises a graphic image and an alphanumeric code. If weather or otherissues prevent the AI entry management device 10 from being able to readthe graphic image, the AI entry management device 10 can read thealphanumeric code.

In a method according to a preferred embodiment of the disclosure, theMALT system can be used in a delivery process. When delivery of an item,such as package or letter, is anticipated, a virtual key is created andtransmitted, such as by e-mail or text, to the delivery serviceresponsible for delivering the item. The virtual key preferablycomprises a graphic image and an underlying alphanumeric code. Thevirtual key can be created by the recipient of the item by taking andselecting a photograph and entering a series of alphanumeric characters.Alternatively, the virtual key can be created by the seller of the itemto be delivered, and the seller transmits the virtual key to therecipient and the delivery service responsible for delivering the item.The delivery service transmits the virtual key to the mobile device ofthe delivery person delivering the item. In addition, the deliveryperson's mobile device is linked to the recipient's AI entry managementdevice 10 via the IP address of the mobile device. The AI entrymanagement device 10 is provided at the home of the recipient. The AIentry management device 10 can be operatively connected to an accesspoint of a structure, such as the front door of the recipient's homewhereby the AI entry management device 10 can lock and unlock the frontdoor. When the delivery person arrives at the recipient's home, thedelivery person presents the virtual key on his mobile device to the AIentry management device 10. When the AI entry management device 10detects that the delivery person's linked mobile device is within therequired range of distance and reads the virtual key on the mobiledevice, the VALT system initiates one or more actions, such as provideaccess (such as by unlocking the front door), provide a preprogrammedmessage to the delivery person, contact the recipient or otherappropriate individual(s), date stamp delivery, notify appropriateindividuals of delivery (such as the intended recipient), initiatetwo-way communication between the recipient and the delivery person,activate the camera, activate motion detection, and activate anartificial intelligence device which interfaces with the VALT systemproviding instructions, directives, etc.

The MALT feature can be activated or canceled via the VAL T application.VALT offers at least two levels of authentication and convenience: (1)image identification with a code to prevent the forwarding or transferof the image, and (2) code detection via NFC for the purposes ofverifying the image code. The use of GPS makes deliveries interactionaland intuitive by providing immediate access and/or information ordirectives.

Mobile electronic devices and GPS provide advantages over GPS andvehicle location. The VALT application can use GPS to provide deliveryconfirmation when the mobile device of the carrier and the VALT host arein proximity. As shown in FIG. 9 , a mobile electronic device 60 may betracked by the AI entry management device system, wherein a location ofa mobile electronic device 102 of a third party 102, such as a mobilephone or beacon with respect to an access point 90, as represented bydisplay 15 of the AI entry management device system, as an example. Itis to be understood that the tracking may be accomplished without anydisplay output, however the display 15 may be provided on the AI entrymanagement device 10, and/or on the third party's mobile electronicdevice and/or an administrator's mobile electronic device. The AI entrymanagement device system 100 may provide a contextual greeting when thethird party's mobile electronic device moves within a threshold distancefrom the AI entry management device 10, such as within about 20 m orless, about 10 m or less, about 5 m or less and any range between andincluding the threshold ranges provided. The contextual greeting mayinclude the name of the person associated with the third party mobileelectronic device or the name of a company that they are associatedwith. The artificial intelligence entry management system may provide agreeting a logistic instructions for delivery of a package, such as “HiUPS driver, please place the package in the storage container on theporch.” It is to understood that this tracking and display feature maybe provided and/or accessed by an administrator on an electronic deviceincluding a mobile electronic device. Furthermore, the display on the AIentry management device may also show the location of a tracked deliveryperson, as shown. A person may pull up the location of a deliver personbefore leaving or entering their home to know when to expect a delivery.

As shown in FIG. 10 , an exemplary storage container 70 has a firstcompartment 74 and a second department 76 formed by a divider 75. Thefirst compartment has a heating device 80 and the second compartment hasa refrigeration device 86. Also, the UV lights 73, 73′ are configured toproduce a disinfecting UV light used to disinfect packages and contentswithin the storage container. The storage container 70 is alsoconfigured with a lock, which is an electronic lock that is unlocked andlocked by the AI entry management device system when a virtual key isverified. The storage container also has a light 84 and a speaker 82.The light may be used to aid in finding and opening the storagecontainer, when used after dark and the speaker may be used to emitaudible phrase from the AI entry management device system, such aslogistic information. It may direct the delivery person to place apackage in a specific compartment of the storage container, for example.Also, the speaker and light may be used as an alarm in the event thestorage container is jostled or moved or in the event that the storagecontainer is opened without authorized access.

As shown in FIG. 11 , a mobile electronic device 60 is configured todisplay a plurality of digital images 66, which may be digitalphotographs that, in series, are an image virtual key 50, 50′, 50″configured to be identified by the camera of the artificial intelligenceentry management device and verified for access to an access point. Auser may receive a plurality of digital images or photographs from anadministrator of the entry management system, which may all be in asingle file or separate files, and the user may then display the virtualkey images to the camera of the entry management device in sequence,dog, balloons, cat, for example. The artificial intelligence entrymanagement system may be configured to unlock a lock when a virtual keyis verified by the AI entry management device.

As shown in FIG. 12 , an exemplary artificial intelligence entrymanagement system 100 may require a virtual key to be selected on adisplay screen 15, from a plurality of digital images 66, before a lockis unlocked. The artificial intelligence entry management device 10 mayhave a display screen 15 that may also be a touch screen 17 that enablesa user to select one or more digital images for entry. The user may haveto select a plurality of digital images to produce a virtual key and theimage virtual key may require each image virtual key 50, 50′. 50″ to beselected in a specific sequence, such as balloon, dog, cat, for example.A plurality of other digital images 66 or photographs may also bedisplayed on the display screen during the selection or entry of thevirtual key. Again, a system administrator, or the artificialintelligence entry management system may automatically, send an imagevirtual key. The user may view the virtual key on their electronicdevice and then use the touch screen to select these images. Theartificial intelligence entry management system may send image virtualkeys to a user when they are expected to arrive, such as to a cleaningprofessional prior to their weekly scheduled arrival.

As shown in FIG. 13 , an exemplary artificial intelligence entrymanagement system 100 may require a virtual key to be selected on adisplay screen 65, of a mobile electronic device 60, from a plurality ofdigital images 66, before an access point is unlocked. The artificialintelligence entry management device 10 may communicate with the mobileelectronic device through a wireless signal 25, such as a Bluetoothsignal and send a plurality of digital images for the person to selecton their own mobile device to enable entry to an access point. Theplurality of digital images may be configured in a grid and may includeone or more images that were sent previously to said person via theartificial intelligence entry management system. The person may thenselect the images when they approach the artificial intelligence entrymanagement device 10. The user may have to select a plurality of digitalimages to produce a virtual key and the image virtual key may requireeach image virtual key 50, 50′, 50″ to be selected in a specificsequence, such as balloon, dog, cat, for example. A plurality of otherdigital images 66 or photographs may also be displayed on the displayscreen 65 during the selection or entry of the virtual key. Again, asystem administrator, or the artificial intelligence entry managementsystem may automatically, send an image virtual key. The user may viewthe virtual key on their electronic device and then use the touch screento select these images. The artificial intelligence entry managementsystem may send image virtual keys to a user when they are expected toarrive, such as to a cleaning professional prior to their weeklyscheduled arrival.

The artificial intelligence entry management device 10 may be configuredon the storage container and may have a speaker and camera configured tointerface with the person to scan a virtual key and provide access tothe storage container and/or another access point. An exemplary storagecontainer 70 may comprise a closure sensor 87 that detects the positionof a storage container closure, such as a lid or door. In the event theclosure is opened without authorization, the light 84 and/or speaker 82may be activated to produce an alarm. Also, an exemplary storagecontainer may have an accelerometer 88 that detects motion and when themotion above a motion threshold is detected, an alarm may be activatedon the storage container and/or entry management device. An exemplarystorage container may have a global positioning system (GPS) locationdevice 89 that is used to monitor a location of the storage containerand when the storage container is moved beyond a perimeter limit or athreshold distance from a location, an alarm may be activated on thestorage container and/or entry management device. These theft preventionmeasures may help to ensure that packages delivered into a storagecontainer and the storage container are not stolen.

Referring now to FIGS. 14 and 15 , an exemplary artificial intelligenceentry management system 100, comprises an artificial intelligence entrymanagement device 10 an access point 90, the front door to the home and90′ a storage container 70, as well as a plurality of robots 110, aerialrobots 111, 111′, 111″ and 111′″ that are configured to dock oncorresponding docking stations 140, 140′, 140″ and 140′″. The dockingstations are configured to provide power to the robot via a chargingport 142 and/or interchangeable batteries 115, 115′, 115″. A battery onthe robot 115 may be charged by the charging port 142 when the robot isdocked on the docking station 140, and/or the battery on the robot maybe interchanged with a battery of the docking station. The power for thecharging of the batteries may be from a power source of the building,such as from a power line 144 that is plugged into or otherwise coupledwith the building electrical power system. The power may also come froma renewable power source, such as a solar panel 152. The power generatedfrom the solar panel may be coupled directly with the docking station(s)and may be configured on or near the docking stations.

The docking stations are configured proximal to the corners of thebuilding to provide substantially complete perimeter monitoring via thecamera 112 and/or microphone 117. In the event that the camera detectsmotion for example, the areal robots may be deployed from the dockingstation to investigate more closely by flying to be in closer proximityto the source of the motion and/or sound. An alert may be provided tothe intelligence entry management system 100 and images and audioreceived by the microphone may be transferred in real time to theintelligence entry management system 100 for an administrator to review.Also, the access points may be locked in the event that any motion orsound above a threshold amount is detected. The robot may actautonomously when monitoring the perimeter of the building and mayinterface with the intelligence entry management system 100 only whenthe detected sound or movement is determined to be threat. A robot maybe configured for surveillance or a property or an area around abuilding or access point and may use a camera to detect motion and amicrophone to detect sound. The robot may act independently to monitor,record events detected and/or follow a threat or person that isdetected. A robot may be active to begin surveillance by the system, orby a separate mobile device. A person may activate the robot(s) tomonitor an area around their home when they leave, for example.

A robot may be configured within a building, such as within a home andmay be configured to open an access point, such as the door for greetinga person or visitor or delivery person. The robot may produce an audiblegreeting to the person and this audible greeting may be a customizedgreeting as the artificial intelligence entry management system openanother access point for delivery of a package or give logisticinstruction to the person. The robot may take a package from the personand deliver the package to an access point such as to a storagecontainer or inside of the home, behind a door which may be an accesspoint. The robot may be configured with a camera to scan a packageincluding an address, or code, such as a bar or QR code to determinewhat the appropriate action should be with respect to the package. Theartificial intelligence entry management system in combination with therobot(s) may act as a security system around an access point, such asaround a home or storage container.

The GPS application can comprise a device capable of being tracked byGPS. The device can be a mobile device or other device capable of beingtracked by GPS. When the GPS device and the host device are inproximity, access and/or messaging and logistics can be triggered. Thehost device can be an artificial intelligence device.

According to another embodiment of the disclosure, access and/ormessaging is triggered when a linked mobile device is within apredetermined distance of a particular address. In such embodiment, ahost device is not needed.

According to another embodiment of the disclosure, the MALT systemcomprises a transponder device that can be positioned at a specificlocation, such as a location where a delivery is to be made. Thetransponder device can be used to identify the location of an object orlocation not associated with an address or landmark. This isparticularly useful for rural delivery locations that do not have avalid or determinable address. For example, the transponder device canbe positioned on a mailbox or house where a delivery is to be made.

The transponder device can be a GPS transponder that transmits a signalto a receiver device. The transponder device can be positioned at aparticular location, such as a storage facility, building or house, oron a particular object, such as a box or container. The receiver devicecan be a GPS-integrated smartphone with GPS tracking software. Thetransponder can be positioned at a location where an item is to bedelivered. The receiver smartphone can be provided to a delivery personresponsible for delivering the item. The transponder transmits a signalto the smartphone guiding the delivery person to the transponder.

The transponder can have an identifier number or signal that can beprogrammed into a device or a master server, or other designatedapplication. The designated controller device or application programsthe transponder to transmit a signal to one or more receiving devicessuch as a mobile phone or other device utilizing GPS capabilities.

The GPS transponder can serve as a guide to a specific box, package,location or object that may not have an association with a GPS addressin a mapping application. The transponder can confirm the correct andappropriate match with a receiver device when identified. Thetransponder serves as a beacon/locator device for deliveries or pickup.

The system can be used by delivery personnel to facilitate delivery ofan item. The system can be used by first responders, such as lawenforcement officers, fire fighters and emergency medical personnel, tohelp them find a particular location. The system can be used in anycircumstance to help locate a stationary structure or moveable object.

The GPS transponder can be physically attached to or built into devices,boxes, or objects. The transponder can be reusable, and added andremoved for similar uses. The transponder can be disposable.

The transponder can be utilized to assist a delivery person locate aspecific package or mailbox within a high-rise building or apartment.The transponder can be utilized to identify or locate a package, mailboxor location when weather or other conditions may interfere with GPSmapping satellites.

Once the transponder and the receiver establish a match, the transpondercan be reprogrammed to match with other receivers. The transponder canbe programmed to signal one or more receivers. The transponder utilizesGPS technology to assist in establishing a relationship with one or morereceivers. The GPS transponder can be battery powered or hardwired if ata fixed location.

According to an embodiment of the disclosure, the system can be used totrack the location of a package. The GPS transponder is fixed to thepackage, and transmits a signal to the receiver indicating the locationof the package.

According to an embodiment of the disclosure, the system can include acontainer that is adapted to automatically open when the receivingdevice is within a specific range or proximity of the transponder.

According to an embodiment of the disclosure, an action is triggeredwhen the receiver device (smartphone) comes within a certain range orproximity of the transponder. The action can be a text message providedto the smartphone, or the event can be access granted to the buildingwhere the transponder is located. Access can be granted by unlocking anelectronic lock on door of the building.

In an alternative embodiment, the transponder may function outside of aGPS network and may be independent of GPS. The transponder utilizes aunique identifier network.

A secured delivery system and methods of using same are described above.Various changes can be made to the disclosure without departing from itsscope. The above description of preferred embodiments of the disclosureis provided for the purpose of illustration only and not limitation.

The foregoing description comprises illustrative embodiments. Havingthus described example embodiments, it should be noted by those skilledin the art that the within disclosures are example only, and thatvarious other alternatives, adaptations, and modifications may be madewithin the scope of the present disclosure. Merely listing or numberingthe steps of a method in a certain order does not constitute anylimitation on the order of the steps of that method. Many modificationsand other embodiments will come to mind to one skilled in the art towhich this disclosure pertains having the benefit of the teachingspresented in the foregoing descriptions and the associated drawings.Although specific terms may be employed herein, they are used in ageneric and descriptive sense only and not for purposes of limitation.Accordingly, the present disclosure is not limited to the specificembodiments illustrated herein, but is limited only by the followingclaims.

The invention claimed is:
 1. An artificial intelligence entry managementsystem comprising: an artificial intelligence entry management devicecomprising: a housing comprising: camera; a microphone; a motiondetector; a speaker; a controller; a wireless communication device; anaccess point including a storage container comprising an electronic lockthat is controlled by the controller to lock and unlock a storagecontainer closure; an artificial intelligence device in communicationwith the entry management device including a processor with anon-transitory computer readable storage medium comprising softwarehaving program instructions configured for providing artificialintelligence to the artificial intelligence entry management device; arobot having a wireless signal transceiver that communicates with thecontroller of the artificial intelligence entry management device;wherein the camera is adapted to read a virtual key, and upon verifyingthe virtual key, the software of the artificial intelligence device isconfigured to unlock said electronic lock to said storage container; andwherein the software of the artificial intelligence device is configuredto provide a logistic message via the speaker including directions tothe access point; wherein, the entry management device is configured towork on a networkable platform with networked software accessible andinteractive with said entry management device and member devices runningthe networked software and participating on the networkable platform,wherein the networkable platform is configured for communication betweensaid member devices including member devices of owners, servicepersonnel, property management, real estate professionals, short termrentals, hotels, and employees, wherein the networkable platform isconfigured to provide access and logistics to access points.
 2. Theartificial intelligence entry management system of claim 1, wherein therobot comprises a robot speaker and wherein said logistic message isemitted by said robot speaker.
 3. The artificial intelligence entrymanagement system of claim 1, wherein the robot comprises a robotspeaker and wherein said robots emits a contextual greeting from saidrobot speaker.
 4. The artificial intelligence entry management system ofclaim 1, wherein the robot is configured to open an access point.
 5. Theartificial intelligence entry management system of claim 1, wherein therobot comprises a package manipulator configured to retain and release apackage, wherein the robot is configured to move a package from a firstlocation to a second location.
 6. The artificial intelligence entrymanagement system of claim 1, wherein the robot comprises a robot cameraconfigured to take images.
 7. The artificial intelligence entrymanagement system of claim 6, wherein the robot comprises an artificialintelligence device that is configured to identify a package or a threatfrom an image taken by said robot camera wherein the threat is a person.8. The artificial intelligence entry management system of claim 7,wherein the robot is configured to take images of said threat andtransmit said image of said threat to said artificial intelligence entrymanagement system or an authority.
 9. The artificial intelligence entrymanagement system of claim 7, wherein the robot is configured to trackthe threat and transmit a location of said threat to said artificialintelligence entry management system or an authority.
 10. The artificialintelligence entry management system of claim 7, wherein the robot isconfigured to take an image of a vehicle said threat enters.
 11. Theartificial intelligence entry management system of claim 10, wherein therobot is configured to transmit said image of said vehicle to saidartificial intelligence entry management system or an authority.
 12. Theartificial intelligence entry management system of claim 1, furthercomprising a docking station for said robot.
 13. The artificialintelligence entry management system of claim 12, wherein the dockingstation comprises a charging port to charge a battery on the robot whensaid robot is docked on the docking station.
 14. The artificialintelligence entry management system of claim 13, wherein the dockingstation comprises an interchangeable battery configured to be exchangedwith a battery on the robot when said robot is docked on the dockingstation.
 15. The artificial intelligence entry management system ofclaim 13, wherein the docking station receives power from a renewablepower source.
 16. The artificial intelligence entry management system ofclaim 1, comprising a plurality of robots and a plurality of dockingstations, wherein the plurality of robots are configured to dock on saiddocking stations, wherein the docking stations are configured around abuilding configured on a property and wherein the property comprisessaid access point and wherein the plurality of robots each comprise arobot camera that is configured to take images, wherein the plurality ofrobots are configured to monitor a substantial portion of a perimeter ofthe building, wherein at least 80% of the perimeter is monitored by saidcameras on said plurality of robots.
 17. The artificial intelligenceentry management system of claim 16, each of the plurality of comprise amicrophone that is configured to record sounds, wherein the plurality ofrobots are configured to monitor a substantial portion of a perimeter ofthe building, wherein at least 80% of the perimeter is monitored bymicrophones on said plurality of robots.
 18. The artificial intelligenceentry management system of claim 16, wherein the robot comprising acontroller and wherein the robot acts autonomously from the artificialintelligence entry management device to monitor a perimeter around abuilding.
 19. The artificial intelligence entry management system ofclaim 16, wherein each of the plurality robots comprise a microphonethat is configured to speaker that is configured to emit an alarm when athreat is detected.
 20. The artificial intelligence entry managementsystem of claim 16, wherein each of the plurality robots comprise alight that is configured to turn on when a threat is detected.
 21. Theartificial intelligence entry management system of claim 16, furthercomprising a mobile device that interfaces with the artificialintelligence entry management system, and wherein the mobile device isconfigured to activate the robot to monitor a substantial portion of aperimeter.