Systems and methods for delivering items having encoded delivery points

ABSTRACT

Systems and methods for delivering items are disclosed. The systems and methods comprise assigning a unique internal control value to each profile having an identified physical address delivery point. They also receive a request for delivery point information for each of a plurality of items to be distributed and providing a response comprising a list of internal control values thereto. They further receive a plurality of items, each item having printed thereon one of the internal control values on the list. For each of the plurality of items, they scan, by item processing equipment, the item to read the internal control value printed thereon, identifying, in the profile database, the physical address delivery point corresponding to the assigned internal control value, routing, by the item processing equipment, the item according to the identified physical address delivery point, and delivering the item to the identified physical address delivery point.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority to U.S. Provisionalapplication No. 62/895,433 filed Sep. 3, 2019, the entire contents ofwhich are hereby incorporated by referenced herein for all purposes.This application is related to U.S. application Ser. No. 16/373,465,which claims the benefit of priority to U.S. Provisional application No.62/652,728 filed Apr. 4, 2018 and 62/732,894, filed Sep. 18, 2018, theentire contents of each of which are hereby incorporated by reference.Any and all applications for which a foreign or domestic priority claimis identified in the Application Data Sheet as filed with the presentapplication are hereby incorporated by reference under 37 CFR 1.57.

BACKGROUND

This disclosure relates to a system and method for coordinating deliveryof an item or a plurality of items using delivery point informationwhich had been anonymized, and/or encrypted.

The delivery of items by a distribution system or network involvesprocessing and handling each of the items being delivered. Generally, asender sends and item to a delivery point using an address or identifierrelated to the physical address. Without this information beingindicated on the item, the distribution system will be unable to deliverthe item to a recipient. However, the sender may not have access to, orthe recipient may desire that the sender not have access to therecipient's physical address or delivery point information, and thus,may be unable to send an item to the recipient through the distributionsystem. Thus, systems and methods configured to generate and process theanonymous and/or encrypted delivery point information are desired.

SUMMARY

Various implementations of methods and devices within the scope of theappended claims each have several aspects, no single one of which issolely responsible for the desirable attributes described herein.Without limiting the scope of the appended claims, some prominentfeatures are described herein.

Details of one or more implementations of the subject matter describedin this specification are set forth in the accompanying drawings and thedescription below. Other features, aspects, and advantages will becomeapparent from the description, the drawings, and the claims. Note thatthe relative dimensions of the following figures may not be drawn toscale.

One aspect of the invention described herein includes a method ofdelivering items to a delivery point. The method comprises assigning, ina profile database, a unique internal control value to each profilehaving an identified physical address delivery point, wherein eachunique internal control value has a character length equal to acharacter length of delivery point information printed on a physicaldistribution item, wherein each unique internal control value comprisesa prefix code shared by multiple internal control values and a uniqueportion unique to the unique internal control value. The method furthercomprises receiving, via a sender interface, a request for deliverypoint information for each of a plurality of items to be distributed,the request including recipient criteria and identifying, in the profiledatabase, profiles having an assigned unique internal control value. Themethod additionally comprises identifying, in the profile database,profiles meeting the received recipient criteria, generating a list ofthe assigned internal control values based on those profiles identifiedas meeting the received recipient criteria and having an assignedinternal control value, and providing via the sender interface, whereinthe assigned internal control values included in the list areanonymized. The method also comprises receiving the plurality of items,each item having printed thereon one of the assigned internal controlvalues on the list, wherein the assigned internal control value isprinted on the item in place of the physical address delivery point forthe item. For each of the plurality of items, the method also comprisesscanning, by item processing equipment, the item to read the internalcontrol value printed thereon, identifying, in the profile database, thephysical address delivery point corresponding to the assigned internalcontrol value, routing, by the item processing equipment, the itemaccording to the identified physical address delivery point, anddelivering the item to the identified physical address delivery point.

In some embodiments, the method further comprises identifying aconstraint associated with the received request, wherein the constraintlimits the assigned internal control values that can be included in thelist. In some embodiments, the method further comprises filtering thegenerated list based on the constraint and wherein the constraint limitsthe assigned internal control values based on one or more of ageographic area in which the item is to be delivered, a type of item onwhich the assigned internal control value can be applied, or a type ofdelivery point to which the item can be delivered. In some embodiments,the prefix code identifies to the item processing equipment how toidentify the physical address delivery point for the correspondingassigned internal control value in the profile database. In someembodiments, the method further comprises identifying, in the request, asubject of interest to be shared by each delivery point, wherein thesubject of interest relates to the plurality of items to be distributedand wherein identifying profiles in the profile database furthercomprises identifying profiles in the profile database that include thesubject of interest and have an assigned unique internal control value.In some embodiments, the method further comprises encrypting theassigned internal control values included in the list before providingthe list to the requesting entity. In some embodiment, the assignedinternal control value is printed on each item as a computer readablecode comprising one or more barcodes or barcode type images. In someembodiments, the method further comprises parsing the scanned computerreadable code into the corresponding assigned internal control value. Insome embodiments, providing the list to the requesting entity comprisesproviding instructions that cause the requesting entity to print each ofthe assigned internal control values on its own item.

Another aspect of the invention described herein includes a system fordelivering items to a delivery point. The system comprises a profiledatabase, a sender interface, at least one computer processor programmedbased on instructions stored in a memory, and item processing equipment.The profile database stores a plurality of profiles comprisingidentified physical address delivery points. The sender interfacereceives a request for delivery point information for each of aplurality of items to be distributed, the request including recipientcriteria. The at least one computer processor is programmed to assign,in the profile database, a unique internal control value to each profilehaving an identified physical address delivery point, wherein eachunique internal control value has a character length equal to acharacter length of delivery point information printed on a physicaldistribution item and wherein each unique internal control valuecomprises a prefix code shared by multiple internal control values and aunique portion unique to the unique internal control value. The at leastone computer processor is further programmed to identify, in the profiledatabase, profiles having an assigned unique internal control value,identify, in the profile database, profiles meeting the receivedrecipient criteria, generate a list of the assigned internal controlvalues based on those profiles identified as meeting the receivedrecipient criteria and having an assigned internal control value,provide, via the sender interface, wherein the assigned internal controlvalues included in the list are anonymized, and receive the plurality ofitems, each item having printed thereon one of the assigned internalcontrol values on the list, wherein the assigned internal control valueis printed on the item in place of the physical address delivery pointfor the item. The item processing equipment configured to scan each itemof the plurality of items. The at least one computer processor isfurther programmed to identify, in the profile database, the physicaladdress delivery point corresponding to the assigned internal controlvalue for each scanned item, route the item according to the identifiedphysical address delivery point, and deliver the item to the identifiedphysical address delivery point.

In some embodiments, the at least one computer processor is furtherprogrammed to identify a constraint associated with the receivedrequest, wherein the constraint limits the assigned internal controlvalues that can be included in the list. In some embodiments, the atleast one computer processor is further programmed to filter thegenerated list based on the constraint and wherein the constraint limitsthe assigned internal control values based on one or more of ageographic area in which the item is to be delivered, a type of item onwhich the assigned internal control value can be applied, or a type ofdelivery point to which the item can be delivered. In some embodiments,the prefix code identifies to the item processing equipment how toidentify the physical address delivery point for the correspondingassigned internal control value in the profile database. In someembodiments, the at least one computer processor is further programmedto identify, in the request, a subject of interest to be shared by eachdelivery point, wherein the subject of interest relates to the pluralityof items to be distributed and wherein identifying profiles in theprofile database further comprises identifying profiles in the profiledatabase that include the subject of interest and have an assignedunique internal control value. In some embodiments, the at least onecomputer processor is further programmed to encrypt the assignedinternal control values included in the list before providing the listto the requesting entity. In some embodiments, the assigned internalcontrol value is printed on each item as a computer readable codecomprising one or more barcodes or barcode type images. In someembodiments, the at least one computer processor is further programmedto parse the scanned computer readable code into the correspondingassigned internal control value. In some embodiments, the at least onecomputer processor programmed provide the list to the requesting entitycomprises the at least one computer processor programmed to provideinstructions that cause the requesting entity to print each of theassigned internal control values on its own item.

Another aspect of the invention described herein includes anon-transitory, computer readable medium comprising instructions that,when performed by a hardware controller, cause a system comprising thehardware controller to assign, in a profile database, a unique internalcontrol value to each profile having an identified physical addressdelivery point, wherein each unique internal control value has acharacter length equal to a character length of delivery pointinformation printed on a physical distribution item, wherein each uniqueinternal control value comprises a prefix code shared by multipleinternal control values and a unique portion unique to the uniqueinternal control value and receive, via a sender interface, a requestfor delivery point information for each of a plurality of items to bedistributed, the request including recipient criteria. The instructionsfurther cause the system to identify, in the profile database, profileshaving an assigned unique internal control value, identify, in theprofile database, profiles meeting the received recipient criteria, andgenerate a list of the assigned internal control values based on thoseprofiles identified as meeting the received recipient criteria andhaving an assigned internal control value. The instructions also causethe system to provide via the sender interface, the generated list ofassigned internal control values, wherein the assigned internal controlvalues included in the list are anonymized, receive the plurality ofitems, each item having printed thereon one of the assigned internalcontrol values on the list, wherein the assigned internal control valueis printed on the item in place of the physical address delivery pointfor the item, and for each of the plurality of items: scan, by itemprocessing equipment, the item to read the internal control valueprinted thereon, identify, in the profile database, the physical addressdelivery point corresponding to the assigned internal control value,route, by the item processing equipment, the item according to theidentified physical address delivery point, and deliver the item to theidentified physical address delivery point.

In some embodiments, the system comprising the hardware controller isfurther caused to identify, in the request, a subject of interest to beshared by each delivery point, wherein the subject of interest relatesto the plurality of items to be distributed and wherein identifyingprofiles in the profile database further comprises identifying profilesin the profile database that include the subject of interest and have anassigned unique internal control value.

BRIEF DESCRIPTION OF THE DRAWINGS

The above-mentioned aspects, as well as other features, aspects, andadvantages of the present technology will now be described in connectionwith various implementations, with reference to the accompanyingdrawings. The illustrated implementations, however, are merely examplesand are not intended to be limiting. Throughout the drawings, similarsymbols typically identify similar components, unless context dictatesotherwise. Note that the relative dimensions of the following figuresmay not be drawn to scale.

FIG. 1 is a diagram of an embodiment of a distribution system or networkused to distribute items between shippers and recipients.

FIG. 2 is a block diagram depicting one embodiment of an encrypteddelivery point information system for acquisition, control, analysis,and distribution of recipient delivery point information.

FIG. 3 is a graphical flow chart of the distribution system of FIG. 1 asintegrated with the encrypted delivery point information system of FIG.2 to create an anonymized shipping system for use by a subscriber.

FIG. 4A is a representation of an embodiment of a computer readable codethat may be applied to a distribution item.

FIG. 4B shows an exemplary encoding scheme for a computer readable codesuch as that in FIG. 4A.

FIG. 5 is a flow chart of a method for providing an encrypted deliverypoint to a user based on a user request.

FIG. 6 is a flow chart of a method for receiving, sorting, and routingan item comprising anonymous delivery point identifier to a recipient.

FIG. 7 is a process flow diagram of a method for requesting andproviding anonymous and/or encrypted delivery point information for anitem and of processing and delivering the item to a recipient.

FIG. 8 is a flow chart depicting an embodiment of a dynamic warehousingprocess.

FIG. 9 is a flow diagram depicting an example method of redirecting anitem having an anonymous delivery point identifier.

FIG. 10 is a pictorial diagram illustrating features of an environmentfor anonymized delivery point information.

FIG. 11 is a process flow diagram of a method for anonymous addressverification.

FIG. 12 is a flow diagram showing a process for processing an itemhaving an internal control value associated therewith.

FIG. 13 is an example of one embodiment of a flowchart for a method,process, or data flow diagram for processing items and requests forinformation for distribution of the items via the distribution system.

DETAILED DESCRIPTION

In the following detailed description, reference is made to theaccompanying drawings, which form a part thereof. In the drawings,similar symbols typically identify similar components, unless contextdictates otherwise. Thus, in some embodiments, part numbers may be usedfor similar components in multiple figures, or part numbers may varyfrom figure to figure. The illustrative embodiments described in thedetailed description, drawings, and claims are not meant to be limiting.Other embodiments may be utilized, and other changes may be made,without departing from the spirit or scope of the subject matterpresented here. It will be readily understood that the aspects of thepresent disclosure, as generally described herein, and illustrated inthe Figures, can be arranged, substituted, combined, and designed in awide variety of different configurations, all of which are explicitlycontemplated and made part of this disclosure.

As used herein, the term “item” may refer to discrete articles in thedistribution network, such as mail pieces, letters, flats, magazines,periodicals, packages, parcels, goods handled by a warehousedistribution system, baggage in a terminal, such as an airport, etc.,and the like. The term item can also refer to trays, containers,conveyances, crates, boxes, bags, and the like. As used herein, the term“carrier” may refer to an individual assigned to a route who deliversthe items to each destination. The term may also refer to other deliveryresources, such as trucks, trains, planes, automated handling and/ordelivery systems, and other components of the distribution network. Thepresent disclosure also relates to systems and methods to analyze itemssent from or received in a geographic area to identify potentialinformation regarding the item that may provide additional revenuestreams for the distribution network. The term “distribution system” maycorrespond to a collection of components that form a distributionnetwork, as operated by a distribution entity. Accordingly, the terms“distribution system,” “distribution network,” and “distribution entity”may be used interchangeably to refer to the same or similar componentsor entities.

Additionally, as used herein, the term “resident” may refer to anyindividual or entity that resides, works, visits, or is associated witha physical delivery point. For example, as used herein, a person at hisor her office is a resident, as is a student or teacher at a school. Asused herein, a resident can be an entity capable of sending items from adelivery point and receiving items at a delivery point. Additionally,the term “residence” may refer to any building having an assignedphysical delivery point, such as a house, an office building, anapartment, a factory, a school, etc. As used herein, a residence can beany location capable of being a destination for items within thedistribution network or it can be a return delivery point for items inthe distribution network.

For example, a distribution system, such as the United States PostalService (USPS), the United Parcel Service (UPS), Federal Express(FedEx), or other shipping or item delivery service, a warehouse,logistics company, item sorting systems, etc., may deliver items, suchas letters, flats, parcels, packages, and bulky items to a plurality ofdelivery points or destinations. The USPS will be used in the presentdisclosure to describe some exemplary embodiments, but the presentdisclosure is not limited thereto. When referencing generically to anyof the services listed above or any item distribution service inaddition to those listed above, the phrase “item distribution service,”“delivery service,” or “distribution system” will be used to indicatesuch generalities.

A distribution network may comprise multiple levels. For example, adistribution network may comprise regional distribution facilities,hubs, and unit delivery facilities, or any other desired level. Anationwide distribution network, for example, may comprise one or moreregional distribution facilities having a defined coverage area (such asa geographic area), designated to receive items from intake facilitieswithin the defined coverage area, or from other regional distributionfacilities. The regional distribution facility can sort items fordelivery to another regional distribution facility, or to a hub levelfacility within the regional distributional facility's coverage area. Aregional distribution facility can have one or more hub level facilitieswithin its defined coverage area. A hub level facility can be affiliatedwith a few or many unit delivery facilities, and can sort and deliveritems to the unit delivery facilities with which it is associated. Inthe case of the USPS, the unit delivery facility may be associated witha ZIP Code. The unit delivery facility receives items from localsenders, and from hub level facilities or regional distributionfacilities. The unit delivery facility also sorts and stages the itemsintended for delivery to destinations within the unit deliveryfacility's coverage area.

A recipient, such as a postal customer, may select or provide deliverypreferences to a distribution network, which include preferences fortypes of items to receive. These preferences can be stored in a customerprofile for each customer. The profile can store preferences fordelivery, customer interests or categories of interests, permissions forgathering information and data, In some embodiments, a recipient canopt-in to a system for gathering preference information based on itemsdelivered to the recipient. In some embodiments, the USPS can gatherinformation regarding items received at a residence or by a residentthrough its distribution network. The USPS may also identify that aresidence or more than one residence within a geographic area requestsor receives specific periodicals, advertisements, deliveries, or otheritems. Additionally, since most items likely include a resident to whichthey are destined, the USPS may correlate the residence receiving aspecific item with the resident that is identified as being therecipient of the item, when possible. Thus, the USPS may generateassociations between residents and the residences to which the USPSdelivers said items. The USPS wishes to protect the personal informationof individuals and other entities to which the USPS delivers items.Thus, the USPS may not wish to simply provide personally identifiableinformation (PII) to shippers or other entities. To protect the PII ofUSPS customers, or of any distribution system, delivery pointinformation can be anonymized and/or encrypted, as will be describedbelow. In some embodiments, the anonymized and/or encrypted deliverypoint information can be stored in the customer profile, where only theUSPS, or the distribution network systems, can access and read theanonymized and/or encrypted delivery point information. The anonymizedand/or encrypted delivery point information can be associated in theprofile with the actual delivery point, such as the address, of thecustomer.

In one aspect, the system and methods disclosed are configured togenerate the anonymous delivery point identifier for the item andprocess items comprising encrypted delivery point information (such asaddress information) so that a sending or shipping entity or user ableto have the item delivered to the recipient without the sending orshipping entity having actual knowledge of the delivery point associatedwith the recipient. In some embodiments, the recipient can establish,request, obtain, or be assigned delivery point information that does notdirectly indicate the physical address or actual geographic deliverylocation, such as a standard mailing address, but which is associated ina database or memory of the distribution network with the actualphysical address or geographic delivery location. The delivery pointinformation can be a permanent address, which the recipient does notneed to change when, for example, the recipient moves to a new location,changes a name, etc. The recipient can simply inform the distributionnetwork of the change in actual physical location, and the distributionnetwork can change the association with the recipient's delivery pointinformation.

The present disclosure relates to systems and methods for generating anddistributing anonymized and/or encrypted recipient information toshippers and receiving, processing, and coordinating delivery of an itemor a plurality of items to which encrypted recipient (address)information or delivery point information (e.g., a mailing address, GPScoordinates, grid coordinate, or any other location identifier) has beenapplied. The systems and methods disclosed herein are configured togenerate the encrypted delivery point information for distribution tothe shippers based on a request received from the shippers. The systemsand methods disclosed are further configured to distribute the encrypteddelivery point information to the shippers. The systems and methodsdisclosed are also configured to receive and distribute the item oritems to which the encrypted delivery point information is applied tothe proper recipient destinations as determined by the recipientinformation.

In some embodiments, a shipper may desire to send one or more items to anumber of “unknown” recipients, where the unknown recipients maycomprise potential customers, etc. with whom the shipper has had noprevious communication. Accordingly, the shipper may not have names ordelivery points of these potential customers, and may request that adistribution entity (e.g., an entity that operates a distribution systemas described herein) provide the shipper with a list of names andcorresponding delivery points to which the shipper will subsequentlysend one or more items. For example, the shipper may be a publisher ofan outdoors themed magazine. Accordingly, the shipper may request 10,000names and delivery points to which they intend to send offers, coupons,discount codes, marketing materials, etc.

In some embodiments, a shipper can select one or more categories and/orsubcategories from the hierarchy of preferences. The distributionnetwork can access the delivery points of customers who have selectedpreferences or categories similar to or the same as those requested bythe shipper. The distribution network can produce the anonymous and/orencrypted identifiers and provide those to the shipper, as describedherein.

In some embodiments, the shipper may request random names and deliverypoints. In some embodiments, the shipper can advantageously requestdelivery points of recipients the distribution system knows areinterested in associated subjects, e.g., outdoors activities.Accordingly, the distribution system may identify and provide encryptedand/or e.g., anonymized delivery point information for 10,000recipients, either at random or from a database of recipients andassociated delivery point information. In some embodiments, the namesmay be provided without any encryption or anonymization, but thedelivery point information may be encrypted and anonymized so that theshipper cannot easily identify physical delivery point informationassociated with each name, thus maintaining anonymity for the namedrecipients while allowing the shipper to communicate with them. In someembodiments, the distribution network supplies names, or does not supplynames associated with the delivery point information.

Anonymizing delivery point information to shippers, mailers, and thelike can prevent a shipper or mailer from determining the identity ofindividual recipients, but can provide the shippers or mailers moretargeted opportunities for sending materials to recipients. In someembodiments, a recipient's participation in the encrypted (e.g.,anonymized) program may utilize recipient opt-ins or may otherwiseobtain permission from recipients for collection and use of informationregarding mailing and receiving preferences. For example, the interestof the recipient may be gathered and analyzed by the distribution systemwithout specific input from the recipient. Some examples of informationcollected to determine interests of the recipient may include item orpackage information, such as images of items received, characteristicsof the items or packages received, such as size, weight, shape, etc.,and sender or recipient information of items sent or received by therecipient. The distribution network can also use an opt-in preferencecollection system, such as via a user interface on a computing device,where recipients can provide personal or specific preferences aboutwhich types of distribution items recipients would like to receive andfrom which senders recipients would like to receive items. The opt-insystem can also allow recipients to identify which types of itemsrecipients would not like to receive, and from which senders recipientswould not like to receive items. These preferences can be anonymized,aggregated, or otherwise combined within the distribution network andused with senders, vendors, or other entities who desire to send itemsto a targeted customer base or to customers who have selectedpreferences, which align with or are related to the business of thesender, vendor, etc.

In some embodiments, the customer can select from a supplied list ofpreferences for a category, such as sports, cars, outdoors, etc., or anyother high level category. The customer can select subcategories withineach category, such as golf, sports cars, fishing, etc. Further narroweror specific subcategories can be supplied to the subcategories in ahierarchical format. The customer can also apply or provide customizedcategories or preferences, which the distribution network can analyzeand incorporate into the preferences hierarchy. The preferenceshierarchy can also be provided to a sender, shipper, vendor, or entitythat desires to send an item or items to customers with specificpreferences.

Thus, in some embodiments, the distribution system described herein mayrequest and acquire a general information disclosure opt-in system bywhich a resident, customer, and/or entity served by the distributionsystem may generally opt-in/opt-out of any disclosure or approval toprovide and associate any information as discussed herein. In someembodiments, the opt-in system may request each resident or entity at aparticular physical address or in the database to opt-in to (or out of)each type of information or each type of association (e.g., eachassociation between a digital or electronic identifier and a physicaldelivery point) contained in a database maintained by the distributionsystem. Examples of opting-in may include residents or entities agreeingto allow the association of their e-mail address with their physicaldelivery point. In some embodiments, individual disclosure opt-inrequests may be utilized for each association discussed above. In someembodiments, the resident or entity may be provided with an option toinclude or exclude certain associations and/or information, such asinclude the disclosure of an association with a particular e-mailaddress with the physical delivery point while excluding the associationof the resident's or entity's Facebook® or Twitter®, or other socialmedia handle, user name, and the like. Accordingly, the opt-in orpermission system may offer a variety of customizable options for thecustomer or entity to selectively utilize.

Furthermore, the distribution system described herein as providing thedelivery point and association information may utilize a householddatabase that comprises the association information between residents orentities at a particular delivery point and any available digital orelectronic identifiers (e.g., e-mail address, IP address, Twitter®identifier, Facebook® identifier, social media handle, etc.). Thehousehold database may be generated and maintained by various systemsand methods. These systems and methods may generate and analyze adatabase comprising information regarding an item or plurality of itemssent from and received by a particular delivery point or entity. Thismay include identifying physical attributes of the item or plurality ofitems being delivered and storing these attributes in the householddatabase. In the household database, these physical attributes may beassociated with one or more delivery points or names from which the itemor plurality of items were sent and/or to which the item or plurality ofitems were or are being delivered.

Additionally, the household database may be used to store informationregarding how many items, such as packages and similar articles, weresent or received by an address or entity and associated dates for saidsending and receiving. For example, an address may receive four items ina span of three days, two of the items being packages and two of theitems being letter size. The system or method may identify the lettersize items as being cards based on identifying a card manufacturer logoon the envelope or based on the size of the letter size item. Thepackages may be identified by the system or method as being a gift basedon wrapping paper or other physical markings on the packages.

In some embodiments, the system can identify items, including thepackages and the letter size items using information encoded or embeddedwithin a computer readable code located on the item, which can uniquelyidentify the item, a sender, an item type, and the like. Thisinformation may be entered into the household database and compared withinformation from a previous time period, such as a previous month or aprevious holiday period. If a pattern of receiving increased amounts ofitems around a small range of dates is discovered, then the system ormethod may identify the range of dates as being a life event, such as abirthday or an anniversary. This identified life event may be used toidentify potential services associated with the life event or the date.In order to accomplish efficient, practical, and usable analysis ofentries in the database, the systems or methods may require real-timeattribute identification and acquisition for each item in thedistribution network, as well as immediate and real-time entry ofacquired information into the database and analysis of the databaseentries associated with either or both of the sending and deliveryaddresses or entities.

Once the associations between resident names, delivery points, physicaladdresses, and unique digital identifiers are created and stored in thehousehold database the household database may be configured toparticipate in an encrypted or anonymous delivery point informationsystem as described herein. The associations contained in the householddatabase may thus, as described herein, allow a shipper to send an itemto a known or unknown recipient without actual knowledge of a deliverypoint for the recipient, such as the recipient's physical deliverypoint. In some embodiments, the terms encrypted and anonymous can beused interchangeably, that is, by encrypting a delivery point, thedelivery point can be considered anonymous, since the delivery pointcannot be identified or interpreted by the sender, or by any entityother than the distribution network who encrypted and can decrypt theinformation. In some embodiments, the delivery point can be anonymizedand/or encrypted. For example, the delivery point can be given a randomidentifier, such as an alphanumeric identifier, computer readable code,or other identifier, which can be applied to the item. The deliverypoint would not be identifiable to any party by having the identifier,except the distribution network, which maintains a reference list ordatabase associating the assigned random identifiers with deliverypoints. In this case, no encryption key would be needed to determine theactual delivery point based on the association. In some embodiments,anonymizing delivery points can include assigning a random identifier,and then encrypting the random identifier. This can enhance security andprevent senders from reverse engineering recipients' identities anddelivery points.

In some embodiments, the delivery point information may be anonymizedand/or encrypted to minimize the ability for the shipper to determinethe recipient's actual physical delivery point information using theinformation that is the distribution system provides to the shipper. Insome embodiments, the encrypted delivery point information may not beprovided directly to the shipper but rather to a third party, thatapplies the encrypted delivery point information to the item destinedfor the recipient. In some embodiments, the encrypted delivery pointinformation may include all the information needed for the item to bedelivered to the appropriate recipient by the distribution system. Asused herein, in the context of a distribution system such as the USPS,delivery points may be referred to interchangeably as addresses. Aperson of skill in the art will understand that the present disclosureis not limited only to addresses as delivery points, but that addressesare exemplary delivery points.

Many recipients or entities may desire to establish a permanent address,which does not change when the recipient or entity changes physicallocation. For example, a small business owner runs a business out of hisor her home, but does not wish to give out his or her physical addressto business contacts. The small business owner can register for a PO Boxor can set up a virtual PO Box. The owner can provide the distributionnetwork with the actual physical address to which items should bedelivered, and the distribution network associates the actual physicaladdress with the PO Box. Where the PO Box corresponds to an actualphysical PO Box, the distribution network can also provide a userinterface, which allows the small business owner to route items intendedfor the PO Box to be sent to the actual physical address of the smallbusiness owner. If the small business owner changes locations or movesthe business, the small business owner does not need to update theaddress with multiple senders, e.g., banks, utilities, customers, andthe like. The small business owner updates the physical addressassociation with the PO Box, and the distribution network updates itssystems to cause its processing equipment to route items having the POBox address thereon for delivery to the actual physical address of thesmall business owner, based on the physical address provided by thesmall business owner. The term PO Box used here is exemplary only, anddoes not limit the disclosure. For example, instead of a virtual PO Box,a recipient could register an email address, a phone number, a socialmedia handle, or any other alphanumeric identifier.

In some embodiments, an actual physical address can be associated withan email address, a username, a social media handle, a vanity address,etc., via an algorithm, such as a hash or cryptographic hash. Forexample, one or more controllers of the distribution system may use ahash or other algorithm to generate an internal control value. Theinternal control value can be associated with and/or stored in anaccount, for example, in the account of the recipient having the emailaddress, a username, a social media handle, a vanity address, etc.

In some embodiments, the internal control value may have a length orinclude values that mimic one or more other codes or values used by thedistribution system. For example, the internal control value may beassigned an 11-digit length that mimics a delivery point code for thedelivery system, such as an 11 digit ZIP code, or a ZIP+4+2 code. Otherlengths of values may be used. By assigning the recipient to theinternal control value at the account level, the internal control valueis associated with any contact information, etc., that is associatedwith the recipient, and when the account holder changes physicaladdress, or changes the virtual address, the internal control value neednot be updated or changed. By enabling the internal control value tomimic length and features of other codes or values that are recognizedby the distribution system, the distribution system may recognize theinternal control value when placed on or associated with an item handledby the distribution system and maintain existing methods and systems forhandling the item. For example, when the internal control value mimicsthe 11-digit ZIP code, then the same equipment that is able to scan andparse the 11-digit ZIP code will instead and/or also be able to scan andparse the internal control value, thereby enabling the equipment toutilize the internal control value in place of the 11-digit ZIP code inthis example.

The internal control value can start with a prefix, which indicates toitem processing equipment that the code is an informed address orintelligent address item, and that the actual physical address may needto be identified from a database. In some embodiments, the prefix canbe, for example, 002 or 201. In some embodiments, the prefix can be usedto identify profiles in a profile database based on the internal controlvalue. For example, when the 002 prefix indicates that the internalcontrol value relates to an informed address item, then the distributionsystem 100 (for via the item processing equipment) may determine thatthe corresponding delivery point information is stored in an informedaddressing database or portion of the profile database. Thus, the prefixof the internal control value can be used to enable the distributionsystem 100 to more efficiently identify the corresponding physicaladdress for the internal control value by directing the distributionsystem 100 where to identify the internal control value in the profiledatabase, which can increase efficiencies and decrease computationrequirements. In some embodiments, the prefix can identify a constrainton the item to which the internal control value can be applied. Forexample, the prefix can identify that the internal control value isencrypted, or a type of item. In some embodiments, the internal controlvalue may only be placed on particular types of items (for example,envelopes, flyers, magazines, and so forth), on items destined for aparticular geographical area (for example, a state, a metro area, andthe like), and/or items destined for a particular type of delivery point(for example, apartment complexes, single family homes, commercialbuildings, and the like).

By using an 11-digit value as the internal control value, up to99,999,999 unique values can be assigned, for example, for or within the002 or any other three-digit prefix. With so many values available,accounts that are assigned one of the internal control values may notneed to have a new internal control value assigned to it, regardless ofother associated changes (for example, a change to the correspondingrecipient's address). However, new internal control values may beassigned or expire on a rotating basis to further discourage reverseengineering of the internal control values by third parties.Furthermore, the 11-digit internal control value may be used to enabledirect item correspondence between mailers and recipients via thedistribution system 100 without the distribution system 100 having toprovide PII regarding recipients to the mailers. Instead, thedistribution system 100 can provide the mailer with a number of randomlyassigned 11-digit internal control values that only the distributionsystem 100 knows how to decode to a particular physical delivery point.

In some embodiments, the distribution system may generate a hash tablethat validates that particular virtual address information (for example,the virtual PO box, email address, phone number, social media handle,and so forth) can be converted into a physical address enabling itemdelivery. In some embodiments, by maintaining an association between therecipient's account and the internal control value, an item for deliveryby the distribution system may be delivered to a particular destinationaddress when the item includes a barcode or other information in therecipient's account. In some embodiments, the distribution system mayapply the barcode or the internal control value to the item beingdelivered.

For example, if the distribution system receives an item including abarcode or other information corresponding to the internal controlvalue. In some embodiments, the barcode or other information may includea flag or other indicator that indicates to the distribution system thatthe barcode or other information is associated with a recipient'saccount. The distribution system may translate the barcode or otherinformation to identify a delivery point code associated with therecipient's physical address. In some embodiments, the distributionsystem adds the delivery point code to the item based on the translationof the barcode or other information, by, for example, spraying orprinting the actual address, or a code indicative (not encrypted) of thedelivery point on to the item.

In some embodiments, such a system may enable validation of virtual dataand/or addresses added to items for delivery that can be deliveredphysically without exposing the relationship between the virtual addressaccount information associated with the physical address for delivery.Additionally, the relationships in the recipient account can be easilychanged without reducing function within the distribution system. Insome embodiments, the internal control value may not be limited to an11-digit value, but instead could include any number or sequence ofalphanumeric values, for example, a seventeen character alphanumericvalue or code.

In some embodiments, the value or code may be processed (for example,for an item handled by the distribution system) to identify one or moredelivery points and/or cues to enable delivery of the item that does notinclude any identifying information. The distribution system may use thevalue or code to identify and apply a corresponding barcode or otherdelivery point information to the item.

As an example, a customer with an address of 512 Main Street address inCollierville Tenn., ZIP code 38017-1705, can register the address. Thesystem can assign an internal control value of 00299123412 based on theknown delivery point, using a hash or other function or algorithm toconvert from an 11-digit ZIP code to the internal control value. In someembodiments, the internal control value obtained from the 11-digit ZIPcode can be associated with email addresses, virtual addresses, handles,etc., registered by the user or recipient residing at 512 main street.In some embodiments, the internal control number can be obtained usingan algorithm or function to convert email addresses, virtual addresses,handles, etc., registered by the user or recipient residing at 512 mainstreet.

A hash table product or service is provided to item senders, such asmailers, or other parties. A sending party can query a database using anemail address, username, etc. for a recipient. The system can identifythe inputted email address etc., and can provide the internal controlvalue. The internal control value is hashed, or otherwise operated onsuch that it cannot be used to find the actual delivery point ordelivery point code for the recipient at 512 main street. Thus, thesender does not know the actual address of the recipient. When the itemprocessing equipment receives an item with 00299123412 thereon, thesystem identifies the 002 prefix and searches a database to find theactual delivery point code associated with the item control value, orcan run a decryption algorithm to identify the delivery point code whosehash resulted in the item control value. In this case, the system findsthat the delivery point code 38017170512 is associated with the itemcontrol value 00299123412. The item processing equipment can spray thedelivery point code or a new barcode to the item, such that the itemprocessing equipment need not perform the look up or decryptionalgorithm for each scan or event on item processing equipment in thedistribution network. Thus, by replacing delivery point information withthe internal control values for distribution to the mailers, itemsmailed by the mailers may be easily distributed by the distributionsystem 100. Furthermore, mailers can validate legitimate addressinformation (for example, email addresses, a username, a social mediahandle, a vanity address, and the like) on items that can be deliveredphysically, the distribution system 100 does not expose customer addressinformation, and the distribution system 100 can under normalprocedures, with an addition of a directory lookup step and printing ofnew barcodes on corresponding items.

In some embodiments, different stages or phases of encryption or hashingmay be applied to items with respect to identifying delivery points forthe items. In some embodiments, in a first stage, the encrypted orhashed code (which may also be or referred to as the internal controlvalue) identifying the delivery point for the item includes city, state,and/or ZIP code information for the delivery point but encrypts thestreet address information in an alphanumeric, graphic, or bar code. Forexample, the delivery point code 38017170512 introduced above may beencrypted or hashed to generate the internal control value.Alternatively, or additionally, the distribution system 100 may encryptor hash the internal control value 00299123412 introduced above. In someembodiments, the internal control value includes a value or indicatorindicating that the internal control value represents the street addressportion of the delivery point but not the city, state, and/or ZIP codeinformation for the delivery point. For example, in the first stage, anitem having a delivery point of 49 Main Street, Apartment 34 inArlington, Va. with ZIP 22005 may have printed thereon includes theinternal control value of 99*49 AQ2172400 34 (which may be optionallyencrypted). This code can be applied to the mail items destined for the701 Main Street, Apartment 34 delivery point, thereby replacing streetaddress based delivery point information with information onlyidentifiable or able to be parsed by the distribution system 100. Thusthe street address based delivery point information, even if notspecifically encrypted, may effectively become encrypted when replacedwith the internal control value specific to and associated with thecorresponding delivery point information. In some embodiments, the code99*49 AQ2172400 34 represents and/or replaces the 11-digit ZIP code forthe item introduced above.

The internal control value may include various parts or components. Forexample, the “99” in this internal control value may represent anidentifier to the distribution system 100 that indicates that any itemincluding a code that begins with this value (here, “99” or “99*”) is aspecial item and should be processed in a particular way. For example,the code 99 may indicate that the item should be processed by equipmentcapable of parsing the internal control value and accessing necessarydatabases and/or information to identify the corresponding deliverypoint code. The “49” value following the “*” may represent a housenumber, which may be a house number on a particular route (for example,this item would be delivered to the 49^(th) house on the particularroute) or may be a street address house number (for example,representing the “49” of the address 49 Main Street). In someembodiments, the “*’ merely represents a divider between informationfields or may be included as part of either the special piece code orthe house number code. These characters can be machine readable bysorting equipment, and using the house number in the code can be humanreadable to provide indications to a delivery resource, such as a mailcarrier, to which delivery point the item should be delivered.

The next nine characters (“AQZ172400”) may represent the delivery pointcode for the item. These nine characters may be any alphanumeric value,meaning that for each character, 36 possible values exist, for a total101,559,956,668,416 unique delivery point codes can be represented bythese characters. Alternatively, only the initial three characters “AQZ”can be alphanumeric values, meaning that the unique internal controlvalue can represent 46,656,000,000 unique delivery point codes. In someembodiments, with so many unique values represented by the internalcontrol value, each internal control value can be assigned to a singleindividual and not just an individual delivery point code. The final“34” of the internal control value may represent the apartment number,Apartment 34 in the example above. In some embodiments, this value canbe human readable and enables the carrier to easily identify whichparticular delivery point the internal control value applies to. Forexample, the 9-character value AQZ172400 may represent a delivery codefor an apartment building and the “34” may indicate to the carrier whichparticular unit in the apartment building receives the item.

Alternatively or additionally, the 99*49, may indicate that the internalcontrol value is encrypted and how the internal control value isencrypted (for example, in what particular way or with what particularencryption or hash key). One or more portions of the code may representthe ZIP code for the delivery point and/or unit information that is partof the delivery point. To enable successful delivery of an item havingthe code for its delivery point, the code may be linked to acorresponding recipient's profile and delivery point in an internaldatabase of the distribution system 100. The distribution system 100 isthen able to provide items with the corresponding codes for recipients,allowing mailers to mail items to the consumers without knowing theconsumers' physical address and allowing the distribution system 100 toprotect identities of its consumers. Once the item enters the itemstream of the distribution system 100, the code (which has been appliedto the items in place of the street address delivery point information)is processed using backend systems that resolve the code to the actualstreet address delivery point and enables delivery of the item.

In some embodiments, the internal control value is applied to items indifferent stages with different information. For example, in a firststage, the internal control value is placed on items along withcorresponding city, state, and ZIP code information of the deliverypoint. In a second stage, the internal control value can replace thecity, state, and ZIP code information along with the street addressdelivery point code information. In a third stage, the internal controlvalue can be applied as a printed barcode or similar computer readablecode to further obfuscate the delivery point information from themailers, thereby replacing the street address information and the city,state, and ZIP code information. In some instances, the internal controlvalue is also indicative of postage payment, as described below.Additionally, the internal control value can include informationregarding a barcode type for the item and a service type for the item.

In some embodiments, the internal control values described herein can beused in conjunction with informed delivery and offer based items. Asinformed delivery and offers can apply to any of mail items, flats,magazines, packages, and parcels. When the delivery item is a package orparcel, the sender can receive interaction information for the item andsupplemental content associated with the package or parcel. For example,the sender can include a return authorization in the supplementalcontent or other information relevant to sender transaction, such asfeedback or review content, order and/or invoicing information, and soforth. When a recipient of the physical item receives a notificationthat the package or parcel is to be delivered, the supplemental contentprovided with the notification can include a link to a returns,feedback, billing, and/or similar portal provided either by thedistribution network 110, by the sender, and/or by a third party. Insome embodiments, the notification can include a link to an onlinecatalog, a website for the sender, or any other desired content. In someembodiments, the notification can also include links to instructions,instructional videos, accessories, and so forth.

In some embodiments, the distribution network 100 can have an ArtificialIntelligence (AI) architecture to support capabilities within thedistribution network 100 relating to mining the extensive item trackingdata and identifying trends, anomalies, and other potential issues. TheAI architecture can support the following capabilities: to classifyrequests and predict outcomes, for example, to identify packages atrisk; to run multiple models to determine the best possible answer tocustomer and system queries such as combining outcomes from packagehistory, weather data, facility closures, etc.; to interface withback-end systems, for example to be able to open a ticket when the AIdetects an issue which requires or may require human intervention; andto augment human problem resolution, for example to identify changes inthe current state of a package's delivery such as identifying a relevantnew scan event from the data in the distribution network.

In some embodiments, a recipient or sender can request a one-time codeor one-time identifier for use with the distribution system. Forexample, if a recipient is ordering something online, or from a catalog,etc., the recipient can request that the distribution network provide asingle use delivery code, or a delivery code that is valid for a shortperiod of time. The single use delivery code can be anonymized to thesender, and will be associated with the recipient's actual deliverypoint or address. The recipient or sender will register the actualphysical address or delivery point with the single use or limited-timeuse code and the distribution network stores an association between thesingle use code and the actual physical address or delivery point. Therecipient or sender puts the single use or limited-time use code, forexample, as an alphanumeric code or a computer readable code, on theitem to be shipped. When the distribution network processing equipmentscans the item having the single use or limited-time code, theprocessing equipment queries the database based on the code and receivesinstructions for routing the item for delivery to the actual physicaladdress associated with the single use or limited-time code. Postagepayment and indications can also be stored in a database and beassociated with the single use or limited-time code, for example, wheneach character in the entire “AQZ172400” portion can be alphanumericvalues. Alternatively, a single character having a particular value inthis code can be indicative of the postage having been paid (forexample, any of the “99”, “*”, and “AQZ172400”). A sender or recipientwill not need to print out a label or put return or mailing addresses onitems, and the sender or recipient address can remain anonymous. In someembodiments, the processing equipment can decode the single use orlimited-time code, in the case where it is encrypted. In someembodiments, the processing equipment can spray, print, or label theitem with a human readable address, for example, one that isunderstandable to an item carrier or deliverer. In some embodiments, acarrier on a route to deliver an item can scan or enter the internalcontrol value indicated printed on the item into the carrier's mobiledelivery device, (for example, as a barcode or character code). Themobile delivery device can communicate with a server to receive thedelivery point information or address, in a standard address format orother human readable format, to allow the carrier to read the deliverypoint, address, or other information for the item having the codethereon.

In some embodiments, the distribution network can assign delivery pointinformation, delivery codes, such as single use or limited-time codesfor items in a dynamic warehousing scenario, which will be described ingreater detail below.

FIG. 1 depicts a diagram of one embodiment of a distribution system 100used to distribute items between shippers 102 and recipients 110. Thedistribution system 100 may be employed by an item delivery service todistribute items received and to be delivered across a geographic area.The distribution system 100 shows various distribution points orfacilities. In some embodiments, the distribution system 100 may includemore or fewer distribution points or facilities than shown indistribution system 100. For example, the distribution system 100includes unit delivery facilities 104 a and 104 b (e.g., post offices ordrop-off locations). The distribution system 100 may also includesemi-regional facilities 106 a and 106 b (e.g., sectional centerfacilities) and regional facilities 108 a and 108 b (e.g., networkdistribution centers or distribution hubs).

The unit delivery facilities 104 a and 104 b may correspond to afacility that receives, sorts, and delivers items destined to recipientswithin a given geographic area. In the case of the USPS, the unitdelivery facilities 104 a and 104 b may be associated with a regioncovered by a ZIP Code™ (a trademark of the USPS) or a regionalcollection of ZIP Codes™. In this role, the unit delivery facilities 104a and 104 b may receive items from the semi-regional facility 106 a thatserves it. These items received from the semi-regional facilities 106 aand 106 b may be delivered by the unit delivery facilities 104 a and 104b (e.g., via a mail carrier route, etc.) to the appropriate destinationwithin its covered geographic area. Accordingly, the unit deliveryfacilities 104 a and 104 b may also sort and stage the items intendedfor delivery to destinations/recipients within the delivery unit'scoverage area.

The unit delivery facilities 104 a and 104 b may also serve to inductitems into the distribution system 100. When serving as an intakefacility, items that are inducted at the unit delivery facilities 104 a,104 b into the distribution system 100 may be sent to the semi-regionalfacilities 106 a and 106 b. In some embodiments, the unit deliveryfacilities and 104 b may receive items from local shippers, fromsemi-regional facilities 106 a and 106 b, or regional facilities 108 aand 108 b. While the delivery unit 104 a is shown as the intakefacility, any of the semi-regional and regional facilities 106 a and 106b and 108 a and 108 b, respectively, or other facilities not shown, mayserve as the intake facility.

The semi-regional facilities 106 a and 106 b may receive and distributeitems between multiple unit delivery facilities and 104 b and theassociated regional facilities 108 a and 108 b. In the case of the USPS,the semi-regional facilities 106 a and 106 b may each be associated witha geographic region covered by the first three numbers of a ZIP code.The semi-regional facility 106 a may serve as a processing anddistribution center for the respective multiple unit delivery facilitiesand 104 b within its respective geographic areas. In some embodiments,the semi-regional facility 106 a may receive items from the regionalfacility 108 a for distribution to its respective delivery unit 104 a.In some embodiments, the semi-regional facility 106 a may receive itemsfrom its delivery unit 104 a, for distribution to other delivery units104 b or the regional facility 108 a.

The regional facilities 108 a and 108 b may receive and distribute itemsbetween multiple semi-regional facilities 106 a and 106 b and otherregional facilities. In the case of the USPS, the regional facility 108a may be associated with a region covered by a state or a group ofstates, etc. The regional facilities 108 a and 108 b may serve asprocessing and distribution centers for the respective multiplesemi-regional facilities 106 a and 106 b within their respectivegeographic areas. In some embodiments, the regional facility 108 a mayreceive items from the semi-regional facility 106 a for distributionanother semi-regional facility 106 b that the regional facility 108 aserves. In some embodiments, the regional facility 108 a may receiveitems from its semi-regional facilities 106 a and 106 b for distributionto other regional facilities, e.g., the regional facility 108 b.

When the item enters the distribution system 100 at the intake facility(e.g., regardless of delivery unit 104 a, semi-regional facility 106 a,and regional facility 108 a), the item may be tracked through allsortation and distribution steps through which the item may pass. Insome embodiments, such tracking may be individual to the item or beaggregate for volumes of items. The tracking may occur until the item isdelivered to its destined recipient or until the item leaves a deliveryunit 104 b for delivery to its destined recipient.

In some embodiments, the distribution system 100, as shown, may be anational distribution network that comprises multiple regionalfacilities 108 a and 108 b, multiple semi-regional facilities 106 a and106 b, and multiple unit delivery facilities 104 a and 104 b, eachhaving a defined coverage area, such as a geographic area and designatedto receive and/or delivery items to/from recipients and senders in thegeographic area. It will be understood that the distribution system 100depicted in FIG. 1 is exemplary only, and the present disclosure is notlimited to the particular distribution system 100, but can comprise moreor fewer components.

As described herein, the distribution system 100 employed may comprisenumerous pieces of mail processing equipment located in variousfacilities and at each level within the distribution system 100(described and undescribed) that may scan identifiers on the items, takeimages of the items, interpret delivery point information from the scansor images of the items, automatically sort and route items according tothe delivery point information indicated on the items, physicalcharacteristics of the items, and/or postage characteristics. Forexample, these pieces of equipment identify delivery point informationthat is located on the items being processed and reference storedinformation associated with the identified delivery point information toassist in the sorting and routing of the item.

Alternatively, or additionally, these pieces of equipment may identifyrecipient delivery point information and sort and route the item basedon the identified recipient delivery point information. In someembodiments, different items being routed between the same locations maybe routed differently based on a class of service, type of the item,postage of the item, size of the item, etc. For example, a first lettershipped from San Diego, Calif., to Washington, D.C., with first classpostage may be routed differently than a large package shipped betweenthe two locations. Similarly, a second letter shipped with next daypostage may be routed differently than the first letter shipped withfirst class postage. The variety of potential routes for different typesof items or different postage services indicates the benefit ofdistributing a system throughout the distribution network, for examplein multiple intake and unit delivery facilities, to maximize the amountof information gathered by the system to associate with residences anddelivery points.

FIG. 2 depicts a block diagram of one embodiment of a delivery pointinformation system 200 for acquisition, control, analysis, anddistribution of encrypted and/or anonymized recipient delivery pointinformation. The delivery point information system 200 comprises aprocessor 210, a memory 215, an encryption/decryption module 220, acommunication module 225, one or more commercial interfaces 230, itemprocessing equipment 235, a mobile computing device 240, and anauthentication module 245. In some embodiments, the delivery pointinformation system 200 may comprise more or fewer components than shownin FIG. 2 , or one or more of the components may be combined with one ormore other components.

In some embodiments, the delivery point information system 200 may be adistributed system. For example, the delivery point information system200 may comprise one or more components that are centralized (e.g., theprocessor 210, the memory 215, the communication module 225, theencryption decryption module 220, the authentication module 245, and thecommercial interfaces 230) with other components distributed in variouslocations, where all of the components are interconnected, for example,via the communication modules 225. In some embodiments, more or fewercomponents may be distributed and/or centralized. When in a distributedsystem with centralized components, the centralized components may beconfigured to interact and communicate with the distributed components.For example, a geographic region or distribution facility may comprise acollection of mobile computing devices 240 or item processing equipment235 that are each distributed and that each communicate with the centralcomponents (e.g., the processor 210, the memory 215, the communicationmodule 225, or encryption/decryption modules 220). Accordingly, whendecrypting encrypted delivery point information, the distributed system100 may funnel all decrypting functions to the centrally locatedencryption/decryption module 220.

In some embodiments, each piece of equipment that handles an item in thedistribution system 100 may comprise each of the components shown inFIG. 2 . Accordingly, when decrypting encrypted delivery pointinformation, the item processing equipment 235 may locally perform alldecrypting functions with a built-in encryption/decryption module 220 onthe local processing equipment, or within the facility housing the itemprocessing equipment 235.

For ease of discussion herein, the delivery point information system 200will be described as a centralized system with various componentintegrated with the delivery unit 104 as described herein. Accordingly,delivery facilities may have their own delivery point informationsystems 200, where the individual memory 215 and processor 210 for eachsystem corresponds to the specified geographic regions. In someembodiments, the multiple delivery point information systems 200 eachcomprising processors 210 may share a single memory 215. In someembodiments, the multiple delivery point information systems 200 eachhave individual memory 215 but all share a single processor 210. In someembodiments, the multiple delivery point information systems 200 eachhave individual memory 215 and individual processors but are stillinterconnected via one or more communications modules 225.

The processor 210 can be embodied on a computer or a server, whichcommunicates via wired or wireless link to the memory and modules of thedelivery point information system 200. In some embodiments, allprocessing for the various modules of the delivery point informationsystem 200 may be performed by the processor 210. In some embodiments,the processor 210 may comprise the processor of a piece of itemprocessing equipment 235 or a computing device. Accordingly, theprocessor 210 may be integrated within the equipment or device and maynot perform or control any distributed functions or processing.Accordingly, each individual piece of equipment or device may performany necessary decrypting or encrypting processes locally. In someembodiments, the processor 210 may be configured to process informationreceived from any of the components to which it is coupled. In someembodiments, the processor 210 may run software or programs stored inthe memory 215 or received from any of the components of the deliverypoint information system 200.

The memory 215 is in communication with the processor 210, and (via theprocessor 210) the communication module 225, the authentication module245, the commercial interfaces 230, the mobile computing device 240, andthe item processing equipment 235. The memory 215 can store data andinformation, such as in the household database, a relational database,or in any other information storage format, such as comma delimited,etc. In some embodiments, the memory 215 may include a database ofdelivery point information, such as address information, and a databaseof encryption and decryption protocols or standards. In someembodiments, the memory 215 may also include a database of relationshipsbetween encryption/decryption protocols and delivery points and/orcustomers. The memory 215 can also store the operating instructions forthe components of the delivery point information system 200. In someembodiments, the memory 215 may comprise an individual computing systemconfigured to store information, the computing system having its ownprocessor and communication modules. In some embodiments, the memory 215may be a local memory of the item processing equipment 235 or the mobilecomputing device 240. When the memory 215 is local to the itemprocessing equipment 235 or the mobile computing device 240, the memory215 may store operating instructions for the equipment or computingdevice and/or may store encryption and decryption information for use bythe encryption decryption module 220 and/or the processor 210 in alocalized manner.

The commercial interface 230 may comprise an interface through whichusers (e.g., customers, third party shippers, etc.) can requestanonymized delivery point information and/or encrypted delivery pointinformation for recipients, manage existing requests, receive computerreadable codes from the distribution system, and view results fromprevious requests. In some embodiments, the commercial interface 230 maycomprise a computer system, a processor, software running on theprocessor 210, a website or portal operated by an external system, anapplication, user interface, and the like. In some embodiments, thecommercial interface 230 may be integrated with one or more othermodules of the delivery point information system 200, such as theauthentication module 245 or the memory 215 or the processor 210. Insome embodiments, the commercial interface 230 may allow the user toview and manage various parameters for their request of encrypteddelivery point information. For example, the request may include anumber of requested names and delivery points, a duration for which theencrypted delivery points will be useable with the distribution network,and any additional information associated with the request (e.g.,corresponding interests of the recipients, etc.). In response to therequest for the encrypted delivery point information, the processor 210may access the memory 215 (e.g., the household database) to identify thenumber of requested recipient names and delivery points. In someembodiments, the identified recipient names and delivery points may bestored in a temporary database or storage file before they are madeavailable to the commercial interface 230 for management or viewing.

The encryption/decryption module 220 may comprise one or more encryptionmodules and decryption modules. In some embodiments, the encryptionmodule may encrypt the delivery points of the identified names so thatthe user or shipper requesting the names and delivery points is unableto identify an actual physical delivery point corresponding to arecipient's name from the information the distribution service suppliesin response to the user's or shipper's request. Thus, only the deliverypoint information system 200 is able to associate the encrypted deliverypoint information with the proper delivery point for delivery. Theencryption/decryption module 220 may utilize one or more algorithms,keys, etc. The encryption/decryption module 220 may change algorithms,keys, etc., randomly or on a periodic basis in order to obscure theuser's ability to reverse engineer delivery points corresponding tonames of recipients.

In some embodiments, the encryption/decryption module 220 may usedifferent algorithms or keys for different users in order to add anadditional layer of complexity to the encryption/decryption process.These encryption procedures may protect the privacy of the recipientswhose encrypted delivery point information the delivery pointinformation system 200 provides to the user. Accordingly, the user maynot repeatedly send mailings to the recipients on a list of encryptedrecipient information over an extended period of time without requestingupdated information from the delivery point information system 200.

The communication module 225 comprises a module that allows anycomponent of the delivery point information system 200 to communicatewith one or more devices and modules external to the delivery pointinformation system 200. For example, the communication module 225 mayprovide wireless or wired communication capabilities with acommunication module 225 of another delivery point information system200 or with the user described herein. The communications with the usermay be via the Internet or a similar network type connection. Thecommunication module 225 may receive communications from users, forexample, requests and queries for analysis of the anonymous deliverypoint identifier. The communication module 225 may also transmit theresults of the requests and queries for analysis to the requesting user.In some embodiments, for example when one or more of the components ofthe system are distributed, the communication module 225 may alsocommunicate with other components of the delivery point informationsystem 200. For example, when the encryption/decryptions functions ofthe delivery point information system 200 are centralized separate fromthe processor and/or memory, then communication modules 225 may allowfor communication between the remote components.

Similarly, communication modules 225 may provide for communicationbetween any other components that are remote from each other.Accordingly, the communication module 225 may be configured to providecommunications for each of the components of the delivery pointinformation system 200. The communication module 225 may also beconfigured to allow the modules of the delivery point information system200 to access external resources, such as the Internet or a localnetwork, etc.

The item processing equipment 235 may comprise equipment that thedelivery point information system 200 uses to scan, identify, sort,route, and otherwise distribute items from their respective sources totheir respective destinations or recipients. In some embodiments, theitem processing equipment 235 may comprise sensors, cameras, and acomputer or a processor or software running on the processor 210, or thelike. Using its various sensors, the item processing equipment 235 mayidentify encrypted delivery point information on an item being handledby the item processing equipment 235 and request that theencryption/decryption module 220 decrypt the encrypted delivery pointinformation so that the item processing equipment may properly sort orroute the item.

In some embodiments, the item processing equipment 235 may be integratedwith one or more other components of the delivery point informationsystem 200. The item processing equipment 235 may be configured toreceive one or more signals from one or more sensors, cameras,connections with sensors or connections with cameras or other inputdevices configured to identify and capture physical attributes of theitem. The signals received by the item processing equipment 235 mayinclude inputs or signals comprising, for example, scans and/or OCR ofwritten or printed delivery point information, scans of barcodes (e.g.,an Intelligent Mail Barcode® (IMb™, a trademark of the USPS)) that isprinted on the item, a mass or weight of the item, dimensions of theitem, shape of the item, or physical markings on the item (such as alogo or description of the contents or a decorative bow or wrappingpaper or infrared (or other non-visible) markings). In some embodiments,the item processing equipment 235 may be configured to communicate thereceived inputs or signals to any of the other components of thedelivery point information system 200.

The one or more mobile computing devices 240 may comprise a mobiledevice (for example, a cell phone or a PDA), a computer, a processor,software running on the processor 210, or the like. In some embodiments,the one or more mobile computing devices 240 may be integrated with oneor more other modules of the delivery point information system 200. Theone or more mobile computing devices 240 may represent input mechanismsor modules allowing the mail carrier handling the item to provide inputto the delivery point information system 200. In some embodiments, theone or more mobile computing devices 240 may include a camera or otherimage or multimedia capturing functionality (e.g., barcode capturecapability) such that a carrier manually handling the item comprisingthe encrypted delivery point information may be able to access theunencrypted delivery point information via the encryption/decryptionmodule 220. In some embodiments, the mobile computing devices 240 mayfurther include text input capabilities (such as a physical ortouchscreen keyboard), such that the carrier may input descriptions orvarious text phrases into the delivery point information system 200. Insome embodiments, the mobile computing device 240 may comprise multiplepieces of hardware (for example a camera and a PDA) or may be integratedinto a single piece of hardware (for example, a smartphone, a tablet, acomputer, a mobile delivery device (MDD) (for example, the mobilecomputing device 240) or a tablet computer, etc.).

The item processing equipment 235 and the mobile computing device 240can communicate with the processor 210 via the encryption/decryptionmodule 220 in the case of encrypted delivery codes, or whereencryption/decryption is not desired or required, the item processingequipment 235 and the mobile computing device 240 can communicate withthe processor 210 bypassing or not using the encryption/decryptionmodule 220.

The authentication module 245 may authenticate users who requestanonymous recipient delivery point information via the delivery pointinformation system 200. For example, the delivery point informationsystem 200 may only provide the anonymous delivery point identifier tousers who have registered and provided specified information to thedelivery point information system 200 (e.g., name, address, contactinformation, etc.). The authentication module 245 may authenticate usersvia any known means, for example, user names and passwords, randomizedunique identifiers, etc. Once the use is authenticated by theauthentication module 245 (for example, via the commercial interface230), the user may be allowed to request, manage, or view anonymousdelivery point identifier.

In some embodiments, the delivery point information system 200 may beimplemented or incorporated at one or more levels of the distributionsystem 100 described herein, such as in the delivery unit 104, thesemi-regional facility 106, or the regional facility 108. In someembodiments, various equipment from any of these facilities may comprisethe item processing equipment 235. In some embodiments, equipment fromthe facilities may be coupled to and/or integrated with the deliverypoint information system 200. For example, routing and sorting equipmentat any of the distribution points of the distribution system 100 maycommunicate or be integrated with the anonymized information system whenrouting or sorting items that include encrypted or anonymizedinformation. Alternatively, or additionally, the intake facilities maycommunicate or be integrated with the delivery point information system200 to route and sort items that they intake that may include encryptedor anonymized information. In some embodiments, one or more pieces ofthe sorting and routing equipment may comprise one or more components ofthe delivery point information system 200 (e.g., theencryption/decryption module 220, the memory 215, and the processor 210)so that encrypted delivery point information can be decrypted locallywithout any need for external communications.

FIG. 3 depicts a graphical flow chart of the distribution system 100integrated with the delivery point information system 200 of FIG. 2 tocreate an anonymous and/or encrypted shipping system 300 for use by aservice subscriber 302 to send items to recipients 110. As shown, theservice subscriber 302 (e.g., shipper, customer, recipient, user, etc.)communicates with the delivery point information system 200. Thesubscriber 302 communicates with the delivery point information system200 via a commercial interface 230, such as via a website, anapplication, an API, a portal, and the like. The subscriber 302 alsoprovides items having anonymous or encrypted delivery point informationapplied thereon to the distribution system 100 or is the intendedrecipient of items. The distribution system 100 communicates with thedelivery point information system 200 to identify physical deliverypoints associated with the anonymous or encrypted delivery pointinformation applied to received items, and routes the items to carriersthat distribute the items to the intended recipients.

In function, the subscriber 302 may submit a request to the deliverypoint information system 200 to obtain and/or request anonymous deliverypoint identifier. The subscriber 302 can be a shipper, a recipient whowishes to have an anonymous address, a single use or limited-time code.The request may be submitted after the subscriber 302 is authenticatedby the authentication system 308. In some embodiments, theauthentication system 308 may be integrated with the delivery pointinformation system 200. In some embodiments, the encrypted deliverypoint information may comprise recipient name and delivery pointinformation. For example, the subscriber 302 may request a list of aplurality of recipients at random or corresponding to a given geographicregion, subject of interest, social or financial class, etc. In someembodiments, the request may be via an application program interface(API) where the delivery point information system 200 comprises anaggregate data set or database. In response to the request, the deliverypoint information system 200 may provide the requested list. In someembodiments, the response may include a rejection to the request with areason for the rejection, such as an invalid request or a request thatexceeds the information to which the subscriber has access, or lack ofinformation in the delivery point information system 200 to provide therequested list, etc.

In some embodiments, the subscriber 302 can request an anonymous addressbe assigned to the subscriber's physical address. In some embodiments,the subscriber 302 can request a single use code or a limited-time code.The subscriber 302 provides subscriber information via the interface tothe delivery point information system 200. For example, the subscriber302 can request an anonymous address and provide subscriber information,such as physical address, contact information, payment information andthe like. If the subscriber's 302 actual physical address is 123 MainStreet, the subscriber 302 provides this information to the deliverypoint information system 200. The delivery point information system 200can then provide an anonymous address. The anonymous address can be analphanumeric code, a computer readable code, or both. The delivery pointinformation system 200 can also allow the subscriber 302 to provide theanonymous address, such as an email address, a unique alphanumericstring, and the like. As an example, the delivery point informationsystem 200 may assign the anonymous address “IA1234”. The delivery pointinformation system 200 stores the anonymous address in the memory 215and stores the association between IA1234 and 123 Main Street. Thesubscriber 302 can provide IA1234 as his or her address to banks,companies, utilities, or any desired party. The subscriber 302 can alsowrite this code on any item to be sent as a return address.

Where the request is for a list of names and corresponding deliverypoints or other identifying information (e.g., phone numbers, e-mailaddresses, etc.), the delivery point information system 200 may providethe list in an encrypted format. For example, as described herein, thedelivery point information system 200 may provide a list of names withcorresponding encrypted computer readable codes, such as barcodes, orencrypted delivery point information that the subscriber 302 uses toprint computer readable codes, such as barcodes, on the items. Theencrypted delivery point information or barcodes may correspond toaddress information that the distribution system 100 uses to properlyreceive, sort, and route items to which the encrypted delivery pointinformation or barcode is applied (once the distribution system 100decrypts the encrypted delivery point information or barcodes). Thisprocess is described in greater detail herein. In some embodiments, theentire delivery point information or barcode may not be encrypted and/orthe delivery point information system 200 may also provide additionalinformation that may assist in the routing of items to which theinformation is applied, such as a delivery code or similar information.

Once the encrypted delivery point information system 200 provides thesubscriber 302 with the requested information, the subscriber 302 mayapply the received information to an item to be shipped or mailed viathe distribution system 100. In some embodiments, when the subscriber302 receives each requested encrypted delivery point information fromthe delivery point information system 200 as encrypted computer readablecode, the subscriber 302 prints or otherwise applies each computerreadable code to individual items and introduces the items having theencrypted computer readable codes thereon into the distribution system100. In some embodiments, the computer readable code may be a barcode,such as an IMb™, an RFID tag, a QR code, an alphanumeric code, or anyother desired computer readable code, which uniquely identifies the itemand/or encodes information relating to the item.

When the subscriber 302 receives the requested information from thedelivery point information system 200 as encrypted delivery pointinformation (e.g., a string of numbers that may be converted to thecomputer readable code), the subscriber 302 may encode the receivedinformation to the computer readable code before applying the computerreadable code to the item. In some embodiments, the subscriber 302 mayprovide the items and the received encrypted computer readable code orencrypted delivery point information to a third party that convertsand/or prints the encrypted computer readable code onto the items. Asdescribed herein, since the computer readable code is encrypted, thesubscriber 302 may not continue to send items to the named recipientbeyond a specified duration, after which the encryption algorithm is bechanged, thus cancelling or invalidating encrypted computer readablecodes after a certain time or date. In some embodiments, the encryptedcomputer readable codes can be single-use codes, such that once anintake, routing, or delivery scan occurs on some item processingequipment within the distribution system 100, a subsequent intake ordelivery scan of the previously used encrypted computer readable codewill return an error, and the item processing equipment will not furtherprocess the item, and the shipper or sender may be notified.

FIG. 4A is a representation of a delivery point information block 400comprising a computer readable code 404 and corresponding deliveryinformation 402 and recipient name 406 that may be applied to items,where the computer readable code 404 and the delivery information 402may be based on encrypted delivery point information received by thesubscriber 302 of FIG. 3 from the encrypted delivery point informationdelivery point information system 200 for distribution by thedistribution system 100. FIG. 4B depicts an exemplary scheme for thecomputer readable code 404. Although the recipient name 406 is shown, aperson of skill in the art will understand that the name need not beincluded on an item, and that the recipient name or identifier can becontained within the computer readable code, or can be associated withthe computer readable code. Items that are distributed through thedistribution system may comprise a computer readable code as describedelsewhere herein. In some embodiments, the computer readable code mayallow a distribution entity, such as a commercial carrier, the UnitedStates Postal Service, or other distributor, to track, sort, and routeeach item throughout the distribution process. Thus, to allow forreal-time tracking, sorting, and routing of items in the distributionsystem, each item may comprise a unique computer readable code. Asdescribed herein, the computer readable code may be a barcode, such asan IMb (Intelligent Mail barcode), an RFID (radio frequencyidentification) tag, a QR (quick response) code, an alphanumeric code,or any other desirable computer readable code, which uniquely identifiesthe item and/or encodes information relating to the item. Eachcomputer-readable code may be scanned by processing equipment of thedistribution system, carriers of the distribution system having mobilescanners, personnel in the distribution system, transportationproviders, or by other entities within the distribution chain.

In some embodiments, the recipient name 406 of the delivery pointinformation block 400 may be replaced with a generic identifier thatassists the mail carrier in delivery of the item. For example, therecipient name 406 may be replaced with the term “resident” or any otheridentifier when printed on the item. In some embodiments, a social mediahandle, email address, or the like originally used as the uniqueidentifier as an input into the system 200 may be printed as part of thedelivery point information block 400 instead of the recipient name 406.As such, the unique identifiers may assist in delivery of the item. Insome embodiments, the mail processing equipment 235 can detect theunique identifiers during sorting and routing, for example during OCRscans of items and cross verify the printed encrypted information anddelivery codes with the corresponding information associated with theunique identifier in the system 200. In some embodiments, the recipientname 406 may also be left blank or replaced with a vanity term, forexample “potato chip lover,” “lucky winner,” “Mercedes driver,” or thelike.

In some embodiments, the system 200 may not return the recipient name406 when delivery point information is requested, but rather only returnthe computer readable code 404 (e.g., comprising the delivery point/11digit zip code) and/or the delivery information 402. In somecircumstances, the system 200 may return the original name or uniqueidentifier with its associated delivery information 402 and encryptedelements of the computer readable code 404 for relational purposes. Insome embodiments, the sender may be responsible forapplying/distributing the delivery point information bock 400 includingthe recipient name 406 field as well as creating the computer readablecode 404 with appropriate mailer ID and other information. In the casewhere a rotating encryption key(s) is(are) used (e.g., where each key isvalid for a defined period the system), an indication regarding whichencryption key was used to generate the encrypted elements of the IMbmay be included in the IMb to denote the encryption used or its validtime window. In some embodiments, the sender may incorporate thisindication into the service type ID of the IMb. This indicator mayindicate to the mail processing equipment 235 which encryption keyshould be used for decryption of the encrypted IMb. If the encryptionkey is a perpetual key and is valid for long periods or forever, then noindicator may be provided. In some embodiments, system 200 may alsoreturn the entire IMb and delivery information.

In some embodiments, the delivery information 402 of the delivery pointinformation block 400 may comprise 3 digits as described herein oranother combination of digits to assist the mail carrier in identifyingmisrouted or out of sequence items. In some embodiment, a route numbermay be added in carrier readable form to the beginning or end of the sixdigits of the delivery information 402 to assist the mail carrier. Insome embodiments, many different combinations for the deliveryinformation 402 may be used. In some embodiments, the sequence of thedigits of the delivery information 402 may also be changed to adjust thedelivery information indicated. For example, the delivery information402 may be the last 2 digits of an address, the last 2 digits of anapartment number, and the 2 digits of a carrier route (e.g., 13 00 52).Another example of the delivery information 402 may be the 3 digitvehicle/route number and the stop number for that vehicle/route (e.g.,R13 083). In some embodiments, the delivery information 402 and itsformat and/or contents can be selected to assist the mail carriers whiledisguising or anonymizing the address to the public or to thesubscriber. In some embodiments, where the anonymous delivery pointidentifier is a permanent anonymous address, the carrier's sortingequipment, such as the carrier's case can have the permanent anonymousdelivery point identifier thereon to help with sorting and tofamiliarize the carrier with the anonymous delivery point.

In some embodiments, the computer readable code 404 may correspond to anIMb™. As shown in FIG. 4B, the IMb™ may correspond to a four-statebarcode that encodes a string of 31-digits. In some embodiments, eachdigit may comprise a value of 0-9. In some embodiments, the IMb may bereplaced with any other barcode or similar computer readable codecomprising a plurality of characters. The 31-digit string of the IMb maycomprise a plurality of fields. For example, in some embodiments, theIMb™ can include at least five different fields. The size of the fieldsmay vary based on the information contained within each of the fields.The first field may comprise two digits and may correspond to a barcodeidentifier (BI). The BI may comprise a specific two-digit identifierassigned primarily to encode a presort identification that is printed inhuman readable form on an optional endorsement line (OEL) as well as asource channel identifier. The second field may comprise three digitsand may correspond to a service type identifier (STID). The STID maycorrespond to any services that are requested for or on the item. Thethird field may comprise either six or nine digits and may correspond toa mailer identifier (MID). The MID may identify a shipping entity orcustomer. In some embodiments, the BI, the STID, and/or the MID mayindicate that the item or the delivery point information on the item isassociated with an anonymous address. For example, the BI may have avalue encoded therein that signals that the item uses an anonymousaddress, such as a vanity address, and that the item processingequipment should query the memory 215 to identify the actual physicaldelivery point associated with the delivery point information on theitem. In some embodiments, the STID may include a code indicating thatthe item uses an anonymous address. In some embodiments, the MID mayinclude this information. In some embodiments, a mailer can be assigneda MID to be used when sending standard items, and another MID to be usedwhen the mailer is sending items having anonymous and/or encrypteddelivery point information.

The fourth field may comprise either six or nine digits and maycorrespond to a serial number. The serial number may aid in establishinguniqueness of the item to which it is applied. The fifth field maycomprise zero, five, nine, or eleven digits and may correspond to arouting code. The routing code may be used for routing the item to itsfinal delivery point. The first four fields may be describedcollectively as a tracking code and may be used for identification andtracking purposes of the item to which the IMb is applied. The trackingcode may always comprise twenty digits.

The routing code may comprise a delivery point ZIP Code™, correspondingto the delivery point of the item. Its length may be dependent on anamount of routing information available. For example, if only the ZIPcode of the recipient is known, then the routing code may comprise onlythe five digits of the known ZIP code, with no trailing digits (e.g.,zeroes) to be added. Thus, for example, if no ZIP code is known, therouting code may have a length of zero digits. As described herein, therouting code may be encrypted for anonymized delivery point information.As only the digits of the routing code determine the destination, onlythe routing code needs to be encrypted to prevent a sender fromdetermining a recipient's physical delivery point. In some embodiments,the entire IMb may be encrypted to prevent a shipper from associating aparticular item with a recipient's delivery point.

In some embodiments, a delivery information 402 may also be includedalong with the IMb. The delivery code may correspond to a six-charactercode divided into two three-character sequences. Each of the sixcharacters may correspond to a value of digits 0-9 or letters A-Z. Thefirst three-character sequence may correspond to the last threecharacters of the primary delivery point number in a first address lineof the address of the recipient of the item, such as the house number.The second three-character sequence may correspond to the last threecharacters of the secondary delivery point number in a second addressline of the address of the recipient of the item, such as the apartmentor unit number. The two three-character sequences may be separated by aspace. In some embodiments, the delivery code may not be encrypted oranonymized while the routing code of the IMb is encrypted. In someembodiments, both the delivery information 402 and the routing code maybe encrypted. In some embodiments, only the delivery information 402 maybe encrypted by the routing code is not encrypted. For simplicity, thediscussion herein will describe the routing code as being encrypted bythe delivery information 402 is not encrypted. The delivery information402 can be used by a carrier to identify the delivery point ordestination of an item during the carrier's delivery route.

FIG. 5 is a flow chart of a method 500 for providing an encrypteddelivery point to a user based on a user request. The method 500 may beperformed by the processor 210 of the delivery point information system200. The method 500 starts at block 502 and proceeds to block 504. Atblock 504, the commercial interface 230 and/or the communication module225 receives a user request for an anonymous delivery point. In someembodiments, the user may be an individual, business, a subscriber 302,a recipient, a mailer, an online auction platform, an online commercewebsite, or other entity that wishes to send items to one or morerecipients. For example, this user request may comprise a request toestablish an anonymous address, to receive a one-time use code, alimited-time code, etc. In some embodiments, the request is made by auser who wishes to update the actual physical location associated withthe user's anonymous delivery point identifier, for example, if the userhas moved.

For example, a user may request a number of anonymous delivery pointsaccording to a particular target audience, demographic, market, etc. Theuser may request anonymous delivery points for 10,000 items to bedelivered. The delivery point information system 200 can prepare 10,000anonymous delivery point identifiers corresponding to 10,000 actualdelivery points, as described herein.

The method 500 moves to block 506, wherein the system 200 receives userinformation and physical location information. The user information caninclude user identity, identification of items to be sent or received,user account information, such as login, password, or other credentials,and the like. The user information can also include a requestedanonymous delivery point identifier. The user can submit the anonymousdelivery point identifier the user would like associated with the usersactual physical delivery location. This anonymous delivery pointidentifier will be placed on items intended for delivery to the user, oras the user's return address on items the user is sending. In someembodiments, the system 200 asks the user to provide another proposedanonymous delivery point identifier or anonymous address if the initialproposed anonymous delivery point identifier is not unique or is used byanother entity in the system 200. In some embodiments, the system 200provides the anonymous delivery point identifier and assigns theanonymous delivery point identifier or anonymous address to the user. Inthe case where the user requests a one-time code or a limited-time code,the system 200 can provide the anonymous delivery point identifier.

The user also provides physical location information to via thecommercial interface 230. The physical location information can be aconventional delivery address or other indication of the actual physicallocation where the user resides, desires delivery, runs a business, andthe like. In some embodiments, the actual physical location can beobtained from GPS data on a mobile computing device if the user isaccessing the system via a mobile application.

The method 500 moves to block 508, wherein the system 200 stores thephysical location information and associates the actual physicallocation information with the anonymous delivery point identifierreceived from the user or provided by the system 200. The association isstored in the memory 215. The association and the physical locationinformation is available to item processing equipment 235 and to themobile computing device 240.

The process moves to block 510, wherein an optional encryption step canbe performed. The anonymous delivery point identifier can be encryptedin a computer readable code applied to the items if desired. Theencryption may be based on the user specifics (e.g., duration). If thedelivery point information for the temporary list or database generatedduring block 512. For example, the delivery point informationcorresponding to each name in the list or database may be individuallyencrypted to anonymize the information such that the user cannotdetermine the actual physical delivery point that corresponds with agiven recipient name. In some embodiments, as described herein, theentire delivery point information for each recipient name is encrypted.In some embodiments, only the routing code and the delivery code may beencrypted. In some embodiments, only one of the routing code and thedelivery code may be encrypted. The method 500 sends the encrypteddelivery point information to the user.

The method 500 moves to block 512, wherein the encrypted anonymousdelivery point identifier is sent to the user. In the case whereencryption is not requested by the user, block 512 is not performed. Forexample, the user receives the requested 10,000 anonymous delivery pointidentifiers, such as computer readable codes, alphanumeric strings, etc.The user can print one of the 10,000 anonymous delivery pointidentifiers on each of the 10,000 items. In some embodiments, the usercan print computer readable codes or alphanumeric strings on the itemsas the anonymous delivery point identifiers. Once the method 500 sendthe encrypted delivery point information to the user, the method 500ends at block 514.

FIG. 6 is a flow chart of a method 600 of receiving, sorting, androuting an item comprising having anonymous delivery point identifierthereon. In some embodiments, the method 600 may be performed by thedistribution system 100 comprising the delivery point information system200. In some embodiments, the method 600 may be performed by each pieceof item processing equipment 235 and/or mobile computing device 240 inthe anonymous information delivery point information system 200 thathandles the item. Accordingly, the method 600 may be performed locallyby each item processing equipment using components similar to thosedescribed in relation to FIG. 2 or may be performed locally andremotely, where some or all of the processing may be performed in acentral location. In some embodiments, the method 600 starts at block602 and proceeds to block 604.

At block 604, the item processing equipment 235 or the mobile computingdevice 240 receives an item to enter into the distribution system 100for delivery to a recipient. In some embodiments, the receiving of theitem may occur at an intake facility and may be performed by a firstitem processing equipment of the distribution system 100 that scans theitem. In some embodiments, the receiving of the item comprises scanningthe IMb™ or other computer readable code, imaging and/or OCRing a labelon the item to determine a delivery point identifier, as describedherein. The scanning may be performed by one or more components of theitem processing equipment 235 or the mobile computing device 240 as usedby a carrier. Once the item is received, the method 600 proceeds todecision state 606.

In decision state 606, the processor 210 determines whether the itemcontains an anonymized delivery point information, or an anonymousaddress. In some embodiments, this determination may be performed by theitem processing equipment 235 and/or the mobile computing device 240. Insome embodiments, this determination may comprise identifying ananonymization indicator located within the computer readable code. Insome embodiments, the item processing equipment 235 identifies portionsof the address, which indicate anonymous addresses. For example, if theaddress on the item includes an @, “.com”, etc., indicating an emailaddress; a single line of writing, which distinguishes it from astandard address, an alphanumeric indicator, such as a leading ortrailing character or characters, (e.g., the “IA” in “IA1234”), or anyother hallmark or character that is not part of a standard deliveryaddress.

In some embodiments, the indicator that the delivery point identifier isan anonymous delivery point identifier may be included in the routingcode section or other section of the IMb™. In some embodiments, thetracking code portion of the IMb may be used to determine whether theitem comprises an encrypted routing code. For example, as the trackingcode portion of the IMb can be a unique code specific to the item,information regarding the encrypted nature of the corresponding routingcode of the IMb may be determinable (e.g., based on the association ofthe item with its encryption key in the storage location, as describedherein).

In some embodiments, the delivery point identifier can flag the item ashaving an anonymous delivery point identifier by the MID, STID, or otherfield. In some embodiments, when the delivery point identifier is readon the item processing equipment, the delivery point identifier can becompared to a list of anonymous delivery point identifiers. If there isa match, then the item processing equipment identifies the item ashaving an anonymous delivery point and, if necessary, decrypts, orrequests decryption, and processes the item accordingly.

If the item is determined to have anonymous delivery point identifierthereon, the method 600 moves to block 608, wherein the processor 210queries the memory 215 to identify the actual physical delivery locationor destination associated with the anonymous delivery point identifier.The process moves to block 610, wherein the processor 210 and/or theitem processing equipment 235 determine how to sort and/or route theitem according to the actual delivery location. In some embodiments, theitem processing equipment can spray a computer readable code on theitem, if not already present, which includes standard deliveryinformation, e.g., ZIP+4 or ZIP+4+2 information for use later in thedistribution network delivery stream. In some embodiments, the itemprocessing equipment can apply a human readable indication of thedelivery destination so a carrier can understand the delivery point onvisual inspection of the item. In some embodiments, the code is sprayedon the item, or which is already on the item, can be scanned by themobile delivery device 240, and the mobile delivery device can displaythe physical delivery point information in a human readable format.

If the item is determined to not have anonymous delivery pointidentifier thereon, the method 600 proceeds to block 610. When thesorting and routing instructions or needs have been determined in block610, the method 600 moves to block 614, wherein the item is sorted androuted according to the actual physical delivery destination determinedfor the item. The method 600 then ends in block 616.

In some embodiments, the shipper described herein may be an individualthat wishes to send an item to a known recipient but where the shipperis not aware of the recipient's most recent physical delivery point.Accordingly, in order to prevent the shipper from having to delaysending the item in order to contact the recipient and obtain therecipient's current physical delivery point, the shipper may use therecipient's name and a digital identifier of the recipient that theshipper knows, which may be different from a delivery point or physicaladdress. The shipper can then request a delivery point or physicaladdress from the distribution system, which the distribution can encryptand associate with a computer readable code. The distribution networksends the computer readable code to the shipper. Thus, the distributionsystem may identify and provide anonymized information for a singlerecipient based on the shipper-provided recipient's name and uniquedigital identifier. In some embodiments, the memory 215 may be used tostore information regarding a type and/or quantity of items received byeach recipient to whom the distribution system delivers items.

FIG. 7 is a cross-functional flow diagram of a method 700 of requestingand providing encrypted delivery point information for an item and ofprocessing and delivering the item to a recipient. The method 700 maycomprise actions performed by various equipment parties, including auser that requests the encrypted delivery point information and adistribution system 100 comprising a delivery point information system200 (as seen in FIGS. 1 and 2 ). The method 700 starts at block 702.

At block 702, the user submits a request for encrypted delivery pointinformation from the delivery point information system 200, which thedelivery point information system 200 receives at block 704. In someembodiments, the user request may be received via the commercialinterface 230 and the communication module 225. In some embodiments, theuser request may comprise a name for which the corresponding encrypteddelivery point is requested. In some embodiments, the user request maycomprise a quantity of names and encrypted delivery points, which theuser is requesting. The request for encrypted delivery point informationcan be a request from a shipper or mailer desiring to send targeteditems to a specific audience. The request can include, for example,criteria for recipients and potential customers, which relates to thesubject matter of the item to be sent. For purposes of privacy andsecurity, the distribution network will not provide the names andaddresses, or any PII, of individuals who have not opted-in to aninformation-sharing program. Accordingly, the distribution network willprepare a list of individuals who meet the request from the shipper ormailer, according to the distribution network's information, and provideanonymous and/or encrypted delivery point information as describedelsewhere herein. Once the user request is sent/received at blocks 702and 704, the method 700 proceeds to block 706.

At block 706, the delivery point information system 200 identifies, in adatabase of the memory 215, the information requested in the userrequest. For example, when the user request comprises a name for whichthe corresponding encrypted delivery point is requested, the deliverypoint information system 200 determines if the database includes thename and the corresponding delivery point. If the database does includethat information, then at block 708, the processor 210 or the memory 215extracts that information from the database and temporarily stores it.If the user request comprises a quantity of names and encrypted deliverypoints being requested, then the processor 210 or the memory 215extracts from the database the requested number of names andcorresponding delivery points for temporary storage.

If the user request is for a number of recipients who meet certaincriteria, the distribution network will use its databased to compiledelivery points who meet the criteria provided by the requester. In someembodiments, the distribution network can compile data from onlineservices, such as websites, website agglomerators, search engines,social media companies, and others who record and identify the browsing,shopping, and other habits and activities of their customers. Thisinformation can be provided to the distribution network, and can be usedto categorize the recipients or users into various categories forpurposes of targeting or directed mailings. For example, if a uservisits a website, searches for a product online, talks about a product,hobby, or interest on social media, for example, using hashtags, onlinecompanies can understand and track this behavior. The behaviorinformation can be provided to the distribution network and userinformation can be cross-referenced with a physical delivery point orentity in the distribution network.

When a shipper or mailer requests anonymized delivery points, thedistribution network can use the behavior information to identify usersto whom the mailer would want to send information or items.

In some embodiments, a user can provide preferences to the distributionnetwork via an interface, such as the commercial interfaces 230. Forexample, a user may receive electronic information about items, whichare to be delivered to the user. The user can see images of the items tobe delivered, and can interact with the interface by following a link inan email send by the distribution network, or via an application, API,or website. The user can comment on the mailpiece, such as by clickingor tapping a radio button, a thumbs-up, a like, a thumbs-down, or othersimilar interactions.

When the user makes such a selection, the distribution entity candetermine that the “liked” item relates to one or more categories, orone or more subcategories. The user info can be stored or associatedwith the category for use on future mailpieces. This information canthen be associated with the user and the user's actual delivery pointand anonymous delivery point identifier. The information can then beused to provide customized, targeting mailings and items to the user whohas expressed certain interests. In some embodiments, the use can selectlevels of interest, such as a “like,” an indication that the user isinterested in these types of mailpieces, and a request to have moresimilar mailpieces sent.

In some embodiments, the distribution network will provide a singleanonymous delivery point identifier for a category of goods or items.When a user likes or selects a mailpiece, or when the user's preferencesare determined to include particular category, the user's information,or individual anonymous delivery point identifier is added to a list ordatabase within the memory 215. If a mailer requests 1000 deliverypoints interested in fishing, the distribution network returns thesingle anonymous delivery point identifier. As items are inducted intothe mailstream, the item processing equipment 235 identifies thefishing-related anonymous delivery point identifier, accesses the listin the memory 215 of recipients, and routes the first such piece to thefirst recipient on the list. When the next item is inducted or processedon the item processing equipment 235 having the fishing-relatedanonymous delivery point identifier thereon, the item processingequipment 235 access the list in the memory 215, and routes the item tothe second recipient on the list. The process can continue until an itemis routed to each recipient on the list of recipients interested infishing. The item processing equipment can spray unique identifiers,individual codes or information on the items at that time to aid infurther processing throughout the distribution network.

In some embodiments, a mailer may want to send a piece of every doordirect mail, which is to be delivered to every recipient within acertain geographic area. However, in a geographic area, there may be anevery door direct mail item that is inapplicable to a particulardelivery point. For example, if the every door direct mail item is anadvertisement for lawn care, it would be inefficient to deliver thatadvertisement to an apartment building where there are no lawns to carefor. The every door direct mail does not have individual delivery pointinformation on it, but is distributed to every door by the carrier. Whensorting and routing items of every door direct mail together with itemshaving anonymous delivery point identifier, the every door direct mailcannot be directly sorted based on delivery point, because it does nothave a specific delivery point on it, but when a piece of every doordirect mail is scanned in the item processing equipment 235, theprocessor 210 can identify the immediately preceding item to determinewhether that address is a good candidate to receive the piece of everydoor direct mail. If the preceding delivery point is a good fit for themailer, then the item processing equipment 235 can route the mailertogether with the preceding mailpiece. If the preceding delivery pointis not a good fit for the every door direct mail, then the itemprocessing equipment can either delay the piece of every door directmail, or route it to another location.

The user can also customize items received via the interface byselecting categories of interest, topics, hobbies, etc. The user canindicate a time frame for each interest. The time frame can be anindication of how long the user would like to receive itemscorresponding to the selected interest. For example, a user may wish tobuy lacrosse equipment as a gift for a birthday. The user can indicatein the customized preferences section of the application that he userwould like information related to lacrosse for 2 weeks, or 1 month, orany other desired timeframe. In this way, the user will not receiveadvertisements or mailings related to lacrosse for years, but only forthe timeframe around the birthday, or for any desired timeframe.

In some embodiments, the memory 215 can store the association of theanonymous delivery point identifier with the actual delivery point foronly the amount of time selected by a user. In the case of single usecode, the memory 215 can remove, clear, cancel, the association afterthe anonymous delivery point identifier is used once, or can indicatethe use has occurred. After the time frame has elapsed, the itemprocessing equipment 235 will not route an item with the anonymousdelivery point identifier thereon.

Once the delivery point information is identified and extracted, themethod 700 proceeds to block 708.

At block 708, the processor 210 or the memory 215 temporarily stores thedelivery point information identified and extracted from the databasebefore the method 700 proceeds to block 710. At block 710, theencryption/decryption module 220 or the processor 210 may encrypt thestored delivery point information. In some embodiments, as describedherein, a type or level of encryption may be selected based on one ormore of the user, the quantity of names and delivery points requested,or a preset encryption level or type, at this block. Once the method 700encrypts the delivery point information, the method 700 proceeds toblock 712.

At block 712, the encrypted delivery point information is provided orsent to the user. In some embodiments, the communication module 225 orthe commercial interface 230 performs the block 710. In someembodiments, the encrypted delivery point information may be conveyed toa third-party shipper instead of or in addition to the user. In someembodiments, the encrypted delivery point information comprisesencrypted routing codes corresponding to 31-digit strings that formIMbs. In some embodiments, the encrypted delivery point information thatis provided or sent also includes delivery codes as generated based onthe delivery point information. In some embodiments, the delivery codesthemselves may also be encrypted or only the delivery codes may beencrypted by the routing codes are not encrypted. In some embodiments,the encrypted delivery point information comprises the IMbs themselvesalong with the corresponding delivery codes for each name provided,where either one or both of a portion of the IMb and the delivery codeis encrypted. In some embodiments, sending the encrypted delivery pointinformation to the user may comprise sending the encrypted deliverypoint information to a third party. Once the encrypted delivery pointinformation is provided or sent to the user, the method 700 proceeds toblock 714.

At block 714, the user (or third party shipper) prints or applies theencrypted delivery point information on an item to be sent to therecipient. In some embodiments, the user may print or apply theencrypted delivery point information (for example, in IMb™ format) tothe item. In some embodiments, a third party may apply the encrypteddelivery point information to the item. Once the encrypted deliverypoint information is applied to the item, the method 700 proceeds toblock 716.

At block 716, the user enters the item(s) into the distribution system100. In some embodiments, this may comprise the user or third partydepositing the item with an intake facility (e.g., via a carrier ordrop-off at a delivery unit 104). This may also comprise thedistribution system 100 receiving the item at the intake facility andscanning the item for computer readable code (e.g. the IMb). Once theitem is entered into the distribution system 100, the method 700proceeds to block 718.

At block 718, the encryption/decryption module 220 or the processor 210decrypts the encrypted delivery point information. In some embodiments,this may comprise parsing a decrypted IMb. Block 718 of the method 700may also be performed by one or more of the memory 215, the itemprocessing equipment 235 and/or the mobile computing device 240. Oncethe encrypted delivery point information is decrypted, the method 700proceeds to block 720. At block 720, the item processing equipment 735and/or the mobile computing device 740 may be used to sort and route theitem. The sorting and routing results in the item being delivered to thedesired recipient without disclosing the recipient's physical,unencrypted delivery point to the user or to any party outside of thedistribution system 100. Accordingly, the method 700 ends at block 718once the item is delivered.

Anonymous delivery points, as described herein, can also be used tofacilitate dynamic warehousing schemes or operations. Dynamicwarehousing can refer to ways to store goods, or merchandise while it isen route to a destination. As the goods are in transit, the goods maynot have a specific delivery point assigned, but may be assigned to ageneral geographic area, and, thus, the items are warehoused in rollingstock or delivery equipment. As the items are in the vehicles, such asrolling stock, trucks, trailers, cars, trains, planes, ships, etc., theitems can be moved to general geographic areas or regions, without beingassigned to a specific delivery point. When an order comes in for suchgoods, the good or merchandise can be dynamically routed to the specificrecipient from the rolling stock.

As one example, a retailer may have a new product that is intended tolaunch on a Monday morning. The retailer and/or the distribution networkcan estimate how many of the new product will be needed or requested inone or more specific geographic areas. The retailer or distributionnetwork can use past shipment information, third-party information,and/or predictive analytics to predict how many of the new productshould be sent to each geographic area. The retailer can request aplurality of labels, identifiers, barcodes, computer readable codes,etc., from the distribution network, such as via an interface, API, andthe like. In some embodiments, the retailer can be an advertiser workingon behalf of the retailer or other company that distributes massmailings (for example, a print shop and the like), and the retailer canrequest address information in bulk for mailers prepared or beingprepared for distribution. The codes may be requested by receiving amanifest, such as an electronic manifest from the retailer, supplier,and/or shipper. The distribution network can generate a plurality ofanonymous delivery point identifiers or unique computer readable codes(these terms can be used interchangeably herein), which, for example,encode or have information associated with an identifier of the shipperand an identifier that the code is for use with a dynamic warehousingservice. The identifier indicating that the code is for use with adynamic warehousing service can indicate to item processing equipment,which scans the code, that different, additional, or other processing isneeded, required, or desired.

The distribution network can send the plurality of unique computerreadable identifiers to the shipper or sender, and the shipper or sendercan place the unique computer readable identifiers on the items to beshipped, by printing, using labels, etc. In some embodiments, thedistribution can place the computer readable identifiers on the items byprinting, spraying, labeling, etc. the items once they are received fromthe shipper.

The shipper or sender can drop the items at a distribution facility on aparticular date. That date may be earlier than the release date of theitem or product, in order to allow sufficient time for the items to betransported to the general geographic areas by the release date. Thedistribution network obtains the new product, and places the uniquecomputer readable identifier or anonymous delivery point identifier oneach product. The anonymous delivery point identifier is not assigned toor associated with a specific physical delivery point at this stage, butcan be associated with a general geographic area or region. The newproducts having anonymous delivery point identifier thereon can besorted or processed on item processing equipment or apparatuses at afacility. The anonymous delivery point identifiers are scanned or read,and the items are routed to the general geographic area associated withthe anonymous delivery point identifiers. The items are placed ontransportation vehicles, such as trucks, trains, or any other type oftransportation vehicle on Saturday or Sunday, depending on when thevehicle is anticipated to arrive in the general geographic area. As theproduct is “warehoused” on the trucks, the vehicles travel to key hubswithin the specific geographic areas from which the products will besorted and delivered to recipients.

On Monday morning, the product is launched and is available to order. Asone of the new products is ordered by a recipient within the specificgeographic area, the vendor, retailer, seller, etc., provides saleinformation and an actual physical delivery point, such as an address,to the distribution network. The distribution network selects one of theitems, which is en route to or has been delivered to the generalgeographic area, and assigns the anonymous delivery point identifier onthe product to the actual specific physical delivery point for therecipient who ordered the product. The distribution network uses theassociation with the actual physical delivery destination to deliver thenew product to the recipient. The sale information can come via athird-party application using an API, can be communicated directly tothe distribution network, and the like. In some embodiments, the produceseller communicates with the distribution network via the commercialinterfaces 230.

When the truck arrives at the delivery facility, the item processingequipment 235 scans or reads the anonymous delivery point identifier onthe new product. The processor 210 queries the memory 215 to identifythe specific actual physical delivery destination for the new product,and routes the new product accordingly, as described elsewhere herein.

The buyer of the new product receives the item from the carrier on theday of the launch, or within a shortened time period as compared toordering the new product and waiting for it to be shipped form originalwarehouse. The buyer also need not go to the store to pick up an ordereditem on launch day.

In another example, the dynamic warehousing concept can apply to itemsthat are frequently or repeatedly purchased in an area and delivered torecipients in that area. By using dynamic warehousing, retailers,sellers, and vendors do not need to keep as much inventory on hand tomeet demand. This can also eliminate delivery delay for products thatare routinely purchased and delivered to the geographic area.

FIG. 8 is a flow chart depicting an embodiment of a dynamic warehousingprocess. Process 800 starts in block 802. The process 800 moves to block804, wherein a distribution network, product seller, retailer, etc.prepares predictive demand analysis to determine how many of an itemwill be ordered, bought, demanded, or needed in a geographic area. Thisprediction can be performed using historical sales information in thecase of a new product launch. For example, the retailer can providesales numbers for geographic regions. The distribution network candetermine how many of a similar or the same item were shipped within thelast day, week, month, or other time period, or during the last similarproduct launch. The retailer can provide a number of items that will beshipped to the distribution network, such as on a manifest. In someembodiments, process 800 can omit block 804.

The process 800 moves to block 806, wherein the number of productsaccording to the predictive demand analysis, or the number of productsavailable to or provided by the seller, retailer, etc., are assigned ananonymous delivery point identifier. These can be computer readablecodes, such as the IMb™, which uniquely identify the item, or which areunique to each item. This anonymous delivery point identifier is storedin the memory 215 of the system 200.

The process 800 moves to block 808, wherein the items having theanonymous delivery point identifier thereon are loaded on to vehiclesfor transportation to specific geographic areas. At this stage, theanonymous delivery point identifier is not associated with an actualphysical delivery destination.

The process 800 moves to block 810, wherein the distribution networkreceives sale/delivery information for the one or more of the pluralityof items on the vehicles. The item seller or retailer receives a requestto purchase, payment, and delivery information for one or more of theitems on the vehicles. The delivery information includes an actualphysical delivery destination for the purchased item. The item seller orretailer provides the payment and delivery information to thedistribution network.

The process 800 moves to block 812, wherein the distribution networkassigns the actual physical delivery destination one or more of theitems and associates the actual physical delivery destination with theanonymous delivery point identifier on the one or more items. To dothis, the processor 210 identifies which vehicle is headed for thegeographic area in which the buyer is located, or in which the actualphysical delivery destination is located. The distribution network thenassociates the actual physical delivery destination to one of theanonymous delivery point identifier entries corresponding to an item onthe vehicle.

The process 800 moves to block 814, wherein the vehicles arrive at adistribution facility and unload the items for sorting and delivery. Theitems are scanned at the distribution facility, and the item processingequipment 235 reads the anonymous delivery point identifier on the itemsunloaded from the vehicle. The process 800 moves to decision state 816,wherein it is determined whether the scanned anonymous delivery pointidentifiers are associated with actual physical delivery destinations.If the anonymous delivery point identifier is associated with an actualphysical delivery destination, the process moves to block 818, and theitem processing equipment 235 sorts and/or routes the item to itsdestination, as described elsewhere herein. This can be repeated foreach item on the vehicle, after which the process ends in 822.

If the autonomous delivery point identifier is not associated with anactual delivery point, the process 800 moves to block 820, wherein theitem is stored awaiting the receipt of sale/delivery information for theitem, and the process returns to block 810.

FIG. 9 is a flow diagram depicting an example method of redirecting anitem having an anonymous delivery point identifier. The method 900 maybe implemented in whole or in part by a coordination device such as theprocessor 210 of the delivery point information system 200. The method900 illustrates how the physical address associated with an anonymousdelivery point identifier (ADPI) may change after an item is inductedinto the distribution network.

The method 900 begins at block 902. At block 904, the coordinationdevice may receive an item for delivery having an ADPI thereon.Receiving the item may include receiving the item in mail processingequipment having a scanner. In some embodiments, receiving the item mayinclude receiving information scanned from the item such as a barcode orother indicia of the ADPI. Receiving the item can occur at adistribution facility where the item is inducted into the distributionnetwork, and from there the item may be routed toward a recipient'sphysical address.

At block 906, the coordination device may determine a first physicaladdress for the ADPI. Determining the first physical address may includedecoding the information received at block 904. Determining the firstphysical address may include querying a data source including a mappingbetween the ADPI and a current address. In some implementations, theADPI may be encrypted. In such implementations, the determining at block904 may include decrypting the indicia such as shown in FIG. 7 .

At block 908, the coordination device may direct the item toward a firstfacility associated with the first physical address. For example, theinduction facility may be in Texas whereas the first physical address isin New Jersey. The coordination device may provide a control message todirect the item from the facility in Texas to a container or otherreceptacle heading to New Jersey. The control message may includeinformation to print upon the item to facilitate direction of the itemthrough the distribution facility. Processing equipment in a facility,such as mail processing equipment or sorting equipment can use a scanner(e.g., an optical or magnetic scanner) and may scan the printedinformation to identify the intended destination of the item. Once theintended destination is identified, the mail processing equipment willdirect the item to a sorting destination in the distribution facility,according to the intended destination.

At block 910, the coordination device may receive a second address forthe ADPI. For example, a user or recipient may wish update the addressassociated with the ADPI while the item was en route, or after the itemhad an initial scan on induction into the distribution network. In someembodiments, the recipient may change, permanently or temporarily, thephysical address associated with the ADPI, for example, where the userwants a particular item delivered to a location other than a homeaddress, such as a PO Box, a parcel locker, a hotel, or any otherdesired location.

At block 912, the coordination device may receive a request for addressinformation associated with the ADPI from a distribution facility. Therequest for address information associated with the ADPI can come frommail processing equipment or other apparatus in the distributionnetwork, which is downstream of the induction point, where the firstphysical address was determined in block 906. For example, thecoordination device may receive the request from an intermediatefacility, a facility for a carrier responsible for delivering the itemto a specific physical address, a vehicle carrying the item for deliveryto a specific address, or a handheld device of a carrier delivering theitem to a specific address. The request may include information scannedfrom the item such as a barcode or other indicia of the ADPI orinformation printed on the item during processing in a distributionfacility.

At decision state 914, the coordination device may determine whether theaddress associated with the ADPI can be served from the distributionfacility where the item was processed in block 912. For example, thechange from the first physical address to the second physical addressmay not require handling the item by a different carrier. One example ischanging an apartment number on an item. Such a change does notgenerally require a reassessment of which carrier and route to send anitem for deliver. Other changes may require significant changes to thedistribution plan or path through the distribution network for the item.For example, if the first physical address was associated with Trenton,Tex. but the second physical address identified Trenton, N.J., the itemmay need to be rerouted to a different facility.

In the case where the item can be served from the current facility evenin view of the changed address, the determination at block 914 isaffirmative. The determination may compare information for the currentaddress associated with the ADPI to a service area defined for thefacility transmitting the request. If the current address (e.g., ZIPCode) is within the service area of a post office currently holding theitem, then the determination at block 914 may be affirmative.

In the affirmative case, the method 900 proceeds to block 916. At block916, the item is directed to the second physical address. This mayinclude delivery of the item to the second physical address or routingthe item to a subsequent distribution facility. The method 900 may endat block 990, however, if the item is not yet delivered, the method 900may return to block 912 as described to continue assessment of the ADPIas described.

Returning to block 914, if the facility cannot serve the second physicaladdress associated with the ADPI, the method 900 may proceed to block930. At block 930, the coordinating device may determine whether theitem is routable to another facility that can serve the physical addressassociated with the ADPI. The determination may include identifying aservice level for the item. For example, an item may be inducted with asufficient service level that allows dynamic re-routing of an item toany address. In some implementations, the re-routing may be limited suchas to any address within a radius of the initial address. This avoidsseveral problems faced in item delivery. For example, a user may requestdelivery of an item within their hometown and receive an estimate (e.g.,time, fee, etc.). Once inducted, the user may then update the addressassociated with their ADPI to an international address, far away fromthe original address. In such instances, the original estimate may nolonger apply.

The change of physical address associated with an ADPI may depend onwhether items are currently being processed with the ADPI. In suchinstances, a user requesting the change may need to confirm or provideadditional information to affect the change or at least affect thechange for the item being processed.

If the item is routable to another facility either because of additionalauthorization from the user or because sufficient service level isassociated with the item to authorize rerouting, the determination atblock 930 is affirmative. The method 900 may then proceed to block 932to direct the item toward a distribution facility associated with thesecond physical address. The coordination device may provide a controlmessage to direct the item from the current distribution facility toanother distribution facility associated with the second physicaladdress. The control message may include information to print upon theitem to facilitate direction of the item through the distributionfacility. Processing equipment in a facility (e.g., an optical ormagnetic scanner) may scan the printed information to identify thedestination of the item. Once identified, downstream processingequipment such as conveyors, sorters, etc. may be adjusted to direct theitem. The method 900 then continues to block 910 as described above.

Returning to block 930, if the determination at block 930 is negative,at block 940, the item may be directed for exception processing.Exception processing generally refers to handling of an item that cannotbe delivered or which cannot be delivered according to the service type.Exception processing may include identifying a return address androuting the item to the return address. Exception processing may includeholding an item and requesting additional information from either orboth of the sender and recipient of the item. For example, thecoordination device may transmit a message to the recipient indicatingthe need for rerouting and conditions to reroute the item. In someembodiments, the exception processing can route the item to the nextdistribution facility in order to deliver the item, and may also send amessage to the sender and/or the recipient indicating that a servicestandard cannot be met due to the change from the first physical addressto the second physical address.

In some embodiments, the message may cause a device receiving themessage to activate and/or initiate an application that is configured toobtain additional information for the item. In some implementations, theapplication may be initiated on the device and, upon receipt of themessage, the interface of an application included on the device may beadjusted using the received message.

The method 900 may end at block 990. However, during exceptionprocessing, such as returning the mail to a return address, or notifyingsender or recipient regarding a change or missed service standard, themethod 900 may be repeated to assess a return address for the item thatmay be specified using another ADPI.

FIG. 10 is a pictorial diagram illustrating features of an environmentfor anonymized delivery point information. The environment 1000 mayprovide processing of a physical item 1004 or conversion of a digitalitem 1020, such as a photograph or online social media post, to aphysical item for delivery to a recipient 1054. The recipient 1054 maybe associated with an institution 1050 that has multiple locations 1052.The recipient 1054 may move between the multiple locations 1052 withinthe institution 1050. Examples of such institutions include hospitals,universities or colleges, prison systems, military bases and camps,multi-campus corporations, and the like. At any point in time, thecurrent address of the recipient 1054 within the institution 1050 may beunknown to a sender 1002 of an item.

In such instances, the sender 1002 may identify the address of therecipient 1054 using an ADPI. To send the physical item 1004, the sender1002 may include the ADPI on the physical item 1004. The deliveryrequesting service 1030 may associate the ADPI with an institutionaladdress of the recipient 1054. In this way, the sender 1002 need notknow the exact location of the recipient 1054 to send the physical item1004 to the recipient 1054.

The ADPI may be generated as described and stored in an ADPI data store1032. The ADPI may be associated with an identifier for the recipient1054. This identifier may be used to request a current location of therecipient 1054 from an institutional address data store 1056. In thisway, the institution 1050 maintains control and confidentiality of theaddress of the recipient 1054 but provides a mechanism to provideaddressing information that can be used to direct an item to therecipient 1054.

In some instances, the sender 1002 may identify the digital item 1020for delivery to the recipient 1054. For example, many prisons do notallow inmates access to the Internet. As another example, forwarddeployed service members or hospitalized individuals may have limitedInternet access. The sender 1002 may desire to send a family picturefrom an internet site, social media, a user's digital photographyequipment, or the like to the recipient 1054. The sender 1002 maytransmit a request identifying the digital item 1020, or, in someembodiments, the digital item or a copy of the digital item, and theADPI for the recipient 1054. The delivery requesting service 1030 mayobtain the digital item 1020 from a digital content service 1024. Thedelivery requesting service 1030 may generate a physical copy of thedigital item 1020 (e.g., print a photograph or document). The physicalcopy may then be prepared for induction into a distribution network todeliver the item based on the ADPI of the recipient 1054 rather than aspecific physical address.

In some instances, the sender 1002 may not know the ADPI for therecipient. To facilitate identifying the recipient's ADPI, features forverifying a recipient and generating a code for the recipient may beincluded.

FIG. 11 is a process flow diagram of a method for anonymous addressverification. The method 1100 may be performed in whole or in part by acoordination device such as the processor 210 of the delivery pointinformation system 200. The method 1100 illustrates how informationabout a recipient such as name or email address can be used to verifythe recipient and generate a one-time code or a limited-time code foranonymous addressing.

At block 1102, a user, such as the sender 1002, may provide informationabout a recipient such as name and email address. The deliveryrequesting service may determine that it has no address record for thename and email address provided. At block 1104, the delivery requestingservice may transmit the information about the recipient to theinformation system. At block 1106, the information system may itself orvia a third party verification service, generate verificationinformation for the recipient. The verification information may includea name associated with the email address received. If a name receivedfrom the verification service (or internal records) corresponds to thename provided by the user, at block 1108, the information system maydeem the recipient verified. At block 1120, the information system maygenerate an ADPI for the recipient as described. Generating the code mayinclude creating a one-time code for delivery of a specific item. Insome implementations, the code may be a pre-generated ADPI codeassociated with the recipient.

At block 1122, the delivery requesting service may apply the ADPI to thedelivery item (e.g., physical item presented for delivery or a generatedphysical copy of digital content for delivery). At block 1124, itemprocessing (e.g., induction facility or other distribution facility) mayscan the ADPI from delivery item and at block 1126 route the deliveryitem as described.

Returning to block 1108, if the information system does not verify therecipient's information, the method 1100 may continue to block 1110. Atblock 1110, the user may be prompted to provide a physical addressand/or updated recipient information for additional verification. Thisupdated information may be then used to continue the verification methodshown in FIG. 11 .

The embodiments describe aspects of requesting a one-time code or alimited-time code. A sender of an item may request a code on behalf of arecipient of the item. In some implementations, the sender of an itemmay request a code for its use as a return address (e.g., for returningitems to the sender). This return address information may be included onthe physical item to be delivered to a recipient. The return addressinformation may be included on a pre-paid postage label included withthe physical item to facilitate a return of the item to a coded address.In some implementations, the sender may be a third party (e.g., anauction or catalog merchant). In such implementations, the sender mayrequest a code on behalf of either or both of the party providing theitem and the party receiving the item. The request may be submitted uponsatisfaction of a predetermined criterion such as providing verificationof identity of either party or confirming a destination address includesprocessing equipment capable of handling a physical item including aone-time code or a limited-time code.

FIG. 12 is a flow diagram showing how the distribution system 100 ofFIG. 1 handles an item comprising an internal control value. At 1202,the distribution system 100 may generate the internal control value(also referred to herein as the code) for an item to supplement thedelivery point information or to replace all or part of the deliverypoint information normally placed on the item. In some embodiments, thecode may be generated in response to a request from a mailer fordelivery point information for a number of entities or potentialcustomers, for example delivery point information for 1000 customersthat show interest in a particular subject and so forth. The mailer maywish to send direct mail (for example, coupons or advertisements) tothese customers. Instead of providing street addresses or delivery pointcodes to the mailer, the distribution system 100 may provide the mailerwith the internal control value for each delivery point associated withan identified potential customer. The mailer can then apply the codes tothe items and place them in the mail, ensured that the items will bedelivered to the appropriate customers (i.e., delivery points) withoutlearning the delivery point information for the respective customers. Inthis way, the distribution system 100 can provide such a service tomailers while maintaining confidentiality regarding PII of distributionsystem 100 customers. The distribution system 100 may identify and parsethe codes when the items are handled by the distribution system 100 todistribute the items to the appropriate recipients, as discussed furtherbelow.

At 1204, the distribution system provides the generated codes to themailer to apply to the items and place in the mail stream. By onlyhaving access to the generated codes, the mailer is unable to identifythe address information for the customers to which the mail items aresent. In some embodiments, the distribution system 100 may rotate codesat various intervals (for example, monthly, quarterly, annually, and soforth) to maintain codes for which the mailer cannot reverse engineerthe delivery point information corresponding to the codes.

At 1206, the items with the codes enter the mail stream and areprocessed by the distribution system 100. The distribution system 100,and more particularly the processing equipment for the distributionsystem 100, may receive the codes from the items (for example, byscanning the items with OCR or similar systems and software) and accessprofiles where the codes are related to corresponding delivery pointinformation. In some embodiments, the processing equipment may receivenecessary information to generate the delivery point information fromthe code for each item processed by the processing equipment (forexample, determining if the code is encrypted with an encryption key orhash value) and where in a profile database or similar databasecorresponding delivery point information can be found for the scanned oridentified code. The distribution system 100 may then route the item tothe recipient 110 directly or via a carrier using an MDD 240. Thecarrier can scan or image the item with the MDD 240 and the MDD candisplay the delivery point in a human readable format. The MDD 240 mayaccess the code and delivery point information association via the userprofiles or by receiving corresponding information from the distributionsystem 100 to convert the codes to the delivery point information.

FIG. 13 is a flowchart for an exemplary method, process, or data flowdiagram 1300 for processing items and requests for information fordistribution of the items via the distribution system 100. The method1300 includes various blocks used to process requests for informationand generate responses to the requests before receiving items anddistributing the items to corresponding destinations. The method 1300may be run simultaneously, in an overlapping manner, or sequentially inmultiple instances based on requests from multiple mailers or otherentities that are each requesting information for mailing items via thedistribution system 100. The various blocks of the method 1300 may beperformed by one or more components of the distribution system 100 orthe delivery point information system 200 as described in relation toFIGS. 2 and 3 , respectively. For example, one or more blocks of themethod 1300 may be performed by the processor 210. In some embodiments,one or more of the blocks of the method 1300 are implemented by one ormore of the other components of the distribution system 100 or thedelivery point information system 200. In some embodiments, the blocksof the method 1300 are performed in a sequential manner, while in otherembodiments, the blocks of the method 1300 may be performed in anon-sequential manner, regardless of the terminology used to describethe method 1300 herein. A person having ordinary skill in the art willappreciate that the method 1300 may be implemented by other suitabledevices and systems. Although the method 1300 is described herein withreference to a particular order, in various aspects, blocks herein maybe performed in a different order, or omitted, and additional blocks maybe added.

At block 1304, the method 1300 comprises assigning, in a profiledatabase, a unique internal control value to each profile having anidentified physical address delivery point. In some embodiments, eachunique internal control value or code may have a character length equalto a character length of delivery point information otherwise printed onitems to be distributed by the distribution system 100. In someembodiments, the delivery point information enables distribution of theitems to their corresponding physical address delivery points. In someembodiments, the unique internal control value or code may have acharacter length that is different from the character length of thedelivery point information otherwise printed on the physicaldistribution items. In some embodiments, each unique internal controlvalue or code comprises a prefix code or portion shared by multipleinternal control values and a unique portion unique to the uniqueinternal control value or code. In some embodiments, the prefix codeidentifies the type of unique internal control value or code (forexample, an internal address code or an internal control value). In someembodiments, one or more portions of the prefix code or portionidentifies the house number (for example, address on the delivery routeor the house number from the street address), unit information,information regarding whether postage was paid for the item, and soforth.

At block 1306, the method 1300 comprises receiving, via a senderinterface, a request for delivery point information for each of aplurality of items to be distributed, the request including recipientcriteria. In some embodiments, the requesting entity is a mailer. Insome instances, the request may be for a specified number of deliverypoints.

At block 1308, the method 1300 comprises identifying, in the profiledatabase, profiles having an assigned unique internal control value orcode. In some embodiments, the profile database comprises a plurality ofuser or consumer profiles that include delivery point information forthe respective consumer (for example, an address for the consumer). Insome embodiments, identifying the profiles having assigned uniqueinternal control values or codes comprises identifying profiles forconsumers that have, in their profiles, delivery point information. Asdescribed herein, the internal control value comprises values that canreplace delivery point code information on items. This allows the method1300 to identify profiles for which information is provided to therequesting entity or mailer.

At block 1310, the method 1300 comprises identifying, in the profiledatabase, profiles meeting the received recipient criteria.

At block 1312, the method 1300 comprises generating a list of theassigned internal control values based on those profiles identifiedmeeting the received recipient criteria and having an assigned internalcontrol value. The list may comprise all of the identified profiles thatwere identified as having delivery point information in the profile ofthe profile database.

At block 1314, the method 1300 comprises providing, via the senderinterface, the generated list. The assigned internal control valuesincluded in the list can anonymized to prevent the mailer from receivingthe identity of recipients or delivery points associated with theinternal control values. Anonymizing can be done as described elsewhereherein through encryption, hashing, etc. Because the internal controlvalue represents “encrypted” or “hashed” delivery code information, theinternal control values may be safe to share with the mailers becausethe mailers cannot identify PII or delivery point information for thecorresponding consumers.

At block 1316, the method 1300 comprises receiving the plurality ofitems. In some embodiments, each item has printed thereon a computerreadable code corresponding to one of the assigned internal controlvalues on the list. The computer readable code may represent thealphanumeric code introduced above or a barcode (or similar) computerreadable code. For example, the assigned internal control value isprinted on the item in place of the physical address delivery point forthe item.

The method 1300 may further comprise multiple steps, performed for eachof the plurality of items received. For example, the method 1300comprises, at block 1318, scanning, by item processing equipment, theitem for the internal control value (in some examples, a computerreadable code) printed thereon. Thus, in block 1318, the system may scanitems distributed or entered into the distribution system 100 andidentify the assigned internal control value printed thereon. At block1320, the system parses the scanned computer readable code into thecorresponding assigned internal control value. At block 1322, the system1300 comprises identifying, in the profile database, the physicaladdress delivery point corresponding to the assigned internal controlvalue. Thus, the system may access the profile database to identify theassigned delivery point code information for each profile that has oneof the assigned internal control values printed on the item. At block1324, the method 1300 comprises routing, by the item processingequipment, the item according to the identified physical addressdelivery point associated with the internal control value, and, at block1326, the item is delivered to the identified physical address deliverypoint. In some embodiments, the method 1300 enables a carrier to user anMDD 204 to scan the item and deliver the item to the recipient.

In some embodiments, the method 1300 further comprises identifying aconstraint associated with the received request, wherein the constraintslimits the assigned internal control values that can be included in thelist. Alternatively, or additionally, the method 1300 further filtersthe generated list based on the constraint and wherein the constraintlimits the assigned internal control values based on one or more of ageographic area in which the item is to be delivered, a type of item onwhich the assigned internal control value can be applied, or a type ofdelivery point to which the item can be delivered. In some embodiments,the prefix code identifies to the item processing equipment how toidentify the physical address delivery point for the correspondingassigned internal control value in the profile database. In someembodiments, the method 1300 comprises identifying, in the request, asubject of interest to be shared by each delivery point, wherein thesubject of interest relates to the plurality of items to be distributedand wherein identifying profiles in the profile database furthercomprises identifying profiles in the profile database that include thesubject of interest and have an assigned unique internal control value.In some embodiments, the method 1300 further comprises encrypting theassigned internal control values included in the list before providingthe list to the requesting entity. In addition, the method 1300 providesinstructions that cause the requesting entity to print each of theassigned internal control values on its own item as providing the listto the requesting entity.

The foregoing description details certain embodiments of the systems,devices, and methods disclosed herein. It will be appreciated, however,that no matter how detailed the foregoing appears in text, the systems,devices, and methods can be practiced in many ways. As is also statedabove, it should be noted that the use of particular terminology whendescribing certain features or aspects of the development should not betaken to imply that the terminology is being re-defined herein to berestricted to including any specific characteristics of the features oraspects of the technology with which that terminology is associated.

The technology is operational with numerous other general purpose orspecial purpose computing system environments or configurations.Examples of well-known computing systems, environments, and/orconfigurations that may be suitable for use with the developmentinclude, but are not limited to, personal computers, server computers,hand-held or laptop devices, multiprocessor systems,microprocessor-based systems, programmable consumer electronics, networkPCs, minicomputers, mainframe computers, distributed computingenvironments that include any of the above systems or devices, and thelike.

As used herein, instructions refer to computer-implemented steps forprocessing information in the system. Instructions can be implemented insoftware, firmware or hardware and include any type of programmed stepundertaken by components of the system.

A microprocessor may be any conventional general-purpose single- ormulti-chip microprocessor. In addition, the microprocessor may be anyconventional special purpose microprocessor such as a digital signalprocessor or a graphics processor. The microprocessor typically hasconventional address lines, conventional data lines, and one or moreconventional control lines.

The system may be used in connection with various operating systems suchas Linux®, UNIX® or Microsoft Windows®.

The system control may be written in any conventional programminglanguage such as and ran under a conventional operating system. Forexample, any industry standard programming languages for which manycommercial compilers can be used to create executable code may be used.The system control may also be written using interpreted languages.

Those of skill will further recognize that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the embodiments disclosed herein may be implemented aselectronic hardware, software stored on a computer readable medium andexecutable by a processor, or combinations of both. To clearlyillustrate this interchangeability of hardware and software, variousillustrative components, blocks, modules, circuits, and steps have beendescribed above generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. Skilled artisans may implement the described functionality invarying ways for each particular application, but such embodimentdecisions should not be interpreted as causing a departure from thescope of the present development.

The various illustrative logical blocks, modules, and circuits describedin connection with the embodiments disclosed herein may be implementedor performed with a general purpose processor, a digital signalprocessor (DSP), an application specific integrated circuit (ASIC), afield programmable gate array (FPGA) or other programmable logic device,discrete gate or transistor logic, discrete hardware components, or anycombination thereof designed to perform the functions described herein.A general-purpose processor may be a microprocessor, but in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

If implemented in software, the functions may be stored on ortransmitted over as one or more instructions or code on acomputer-readable medium. The steps of a method or algorithm disclosedherein may be implemented in a processor-executable software module,which may reside on a computer-readable medium. Computer-readable mediaincludes both computer storage media and communication media includingany medium that can be enabled to transfer a computer program from oneplace to another. A storage media may be any available media that may beaccessed by a computer. By way of example, and not limitation, suchcomputer-readable media may include RAM, ROM, EEPROM, CD-ROM or otheroptical disk storage, magnetic disk storage or other magnetic storagedevices, or any other medium that may be used to store desired programcode in the form of instructions or data structures and that may beaccessed by a computer. Also, any connection can be properly termed acomputer-readable medium. Disk and disc, as used herein, includescompact disc (CD), laser disc, optical disc, digital versatile disc(DVD), floppy disk, and Blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media. Additionally, the operations of a method oralgorithm may reside as one or any combination or set of codes andinstructions on a machine-readable medium and computer-readable medium,which may be incorporated into a computer program product.

The foregoing description details certain embodiments of the systems,devices, and methods disclosed herein. It will be appreciated, however,that no matter how detailed the foregoing appears in text, the systems,devices, and methods can be practiced in many ways. As is also statedabove, it should be noted that the use of particular terminology whendescribing certain features or aspects of the development should not betaken to imply that the terminology is being re-defined herein to berestricted to including any specific characteristics of the features oraspects of the technology with which that terminology is associated.

It will be appreciated by those skilled in the art that variousmodifications and changes may be made without departing from the scopeof the described technology. Such modifications and changes are intendedto fall within the scope of the embodiments. It will also be appreciatedby those of skill in the art that parts included in one embodiment areinterchangeable with other embodiments; one or more parts from adepicted embodiment can be included with other depicted embodiments inany combination. For example, any of the various components describedherein and/or depicted in the Figures may be combined, interchanged orexcluded from other embodiments.

With respect to the use of substantially any plural and/or singularterms herein, those having skill in the art can translate from theplural to the singular and/or from the singular to the plural as isappropriate to the context and/or application. The varioussingular/plural permutations may be expressly set forth herein for sakeof clarity.

It will be understood by those within the art that, in general, termsused herein are generally intended as “open” terms (e.g., the term“including” should be interpreted as “including but not limited to,” theterm “having” should be interpreted as “having at least,” the term“includes” should be interpreted as “includes but is not limited to,”etc.). It will be further understood by those within the art that if aspecific number of an introduced claim recitation is intended, such anintent will be explicitly recited in the claim, and in the absence ofsuch recitation no such intent is present. For example, as an aid tounderstanding, the following appended claims may contain usage of theintroductory phrases “at least one” and “one or more” to introduce claimrecitations. However, the use of such phrases should not be construed toimply that the introduction of a claim recitation by the indefinitearticles “a” or “an” limits any particular claim containing suchintroduced claim recitation to embodiments containing only one suchrecitation, even when the same claim includes the introductory phrases“one or more” or “at least one” and indefinite articles such as “a” or“an” (e.g., “a” and/or “an” should typically be interpreted to mean “atleast one” or “one or more”); the same holds true for the use ofdefinite articles used to introduce claim recitations. In addition, evenif a specific number of an introduced claim recitation is explicitlyrecited, those skilled in the art will recognize that such recitationshould typically be interpreted to mean at least the recited number(e.g., the bare recitation of “two recitations,” without othermodifiers, typically means at least two recitations, or two or morerecitations). Furthermore, in those instances where a conventionanalogous to “at least one of A, B, and C, etc.” is used, in generalsuch a construction is intended in the sense one having skill in the artwould understand the convention (e.g., “a system having at least one ofA, B, and C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). In those instances where aconvention analogous to “at least one of A, B, or C, etc.” is used, ingeneral such a construction is intended in the sense one having skill inthe art would understand the convention (e.g., “a system having at leastone of A, B, or C” would include but not be limited to systems that haveA alone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.). It will be furtherunderstood by those within the art that virtually any disjunctive wordand/or phrase presenting two or more alternative terms, whether in thedescription, claims, or drawings, should be understood to contemplatethe possibilities of including one of the terms, either of the terms, orboth terms. For example, the phrase “A or B” will be understood toinclude the possibilities of “A” or “B” or “A and B.”

All references cited herein are incorporated herein by reference intheir entirety. To the extent, publications and patents or patentapplications incorporated by reference contradict the disclosurecontained in the specification, the specification is intended tosupersede and/or take precedence over any such contradictory material.

The term “comprising” as used herein is synonymous with “including,”“containing,” or “characterized by,” and is inclusive or open-ended anddoes not exclude additional, unrecited elements or method steps.

All numbers expressing quantities of ingredients, reaction conditions,and so forth used in the specification and claims are to be understoodas being modified in all instances by the term “about.” Accordingly,unless indicated to the contrary, the numerical parameters set forth inthe specification and attached claims are approximations that may varydepending upon the desired properties sought to be obtained by thepresent development. At the very least, and not as an attempt to limitthe application of the doctrine of equivalents to the scope of theclaims, each numerical parameter should be construed in light of thenumber of significant digits and ordinary rounding approaches.

The above description discloses several methods and materials of thepresent development. This development is susceptible to modifications inthe methods and materials, as well as alterations in the fabricationmethods and equipment. Such modifications will become apparent to thoseskilled in the art from a consideration of this disclosure or practiceof the development disclosed herein. Consequently, it is not intendedthat this development be limited to the specific embodiments disclosedherein, but that it cover all modifications and alternatives comingwithin the true scope and spirit of the development as embodied in theattached claims.

What is claimed is:
 1. A method of delivering items to a delivery point,the method comprising: assigning, in a profile database, a uniqueinternal control value to each profile of a plurality of profiles havingidentified physical address delivery points, wherein each uniqueinternal control value has a character length equal to a characterlength of delivery point information printed on a physical distributionitem, wherein each unique internal control value comprises a prefix codeshared by multiple internal control values and a unique portion uniqueto the unique internal control value; receiving, via a sender interface,a request for internal control values for anonymously addressing each ofa plurality of items to be distributed to a plurality of unspecifiedrecipients, the request including recipient criteria, wherein therequest does not specify individual recipients or delivery points;identifying, in the profile database, profiles having assigned uniqueinternal control values; identifying, in the profile database, profilesmeeting the received recipient criteria; generating a list of theassigned internal control values corresponding to the profilesidentified as meeting the received recipient criteria and havingassigned internal control values; providing via the sender interface,the generated list of assigned internal control values, wherein theassigned internal control values included in the list are anonymized;receiving the plurality of items, each item having printed thereon oneof the assigned internal control values of the generated list, whereinthe assigned internal control value is printed on the item in place of aphysical address delivery point for the item; and for each of theplurality of items: scanning, by item processing equipment, the item toread the internal control value printed on the item; identifying, in theprofile database, the physical address delivery point corresponding tothe internal control value printed on the item; routing, by the itemprocessing equipment, the item according to the identified physicaladdress delivery point; and delivering the item to the identifiedphysical address delivery point.
 2. The method of claim 1, furthercomprising identifying a constraint associated with the receivedrequest, wherein the constraint limits the assigned internal controlvalues that can be included in the list.
 3. The method of claim 2,further comprising filtering the generated list based on the constraintand wherein the constraint limits the assigned internal control valuesbased on one or more of a geographic area in which the item is to bedelivered, a type of item on which the assigned internal control valuecan be applied, or a type of delivery point to which the item can bedelivered.
 4. The method of claim 1, wherein the prefix code identifiesto the item processing equipment how to identify the physical addressdelivery point for the corresponding assigned internal control value inthe profile database.
 5. The method of claim 1, further comprisingidentifying, in the request, a subject of interest to be shared by eachdelivery point, wherein the subject of interest relates to the pluralityof items to be distributed and wherein identifying profiles in theprofile database further comprises identifying profiles in the profiledatabase that include the subject of interest and have an assignedunique internal control value.
 6. The method of claim 1, furthercomprising encrypting the assigned internal control values included inthe list before providing the list.
 7. The method of claim 1, whereinthe assigned internal control value is printed on each item as acomputer readable code comprising one or more barcodes or barcode typeimages.
 8. The method of claim 7, further comprising parsing the scannedcomputer readable code into the corresponding assigned internal controlvalue.
 9. The method of claim 1, wherein providing the list comprisesproviding instructions that cause a requesting entity to print each ofthe assigned internal control values on its own item.
 10. A system fordelivering items to a delivery point, the system comprising: a profiledatabase storing a plurality of profiles comprising identified physicaladdress delivery points; a sender interface configured to receive arequest for internal control values for anonymously addressing each of aplurality of items to be distributed to a plurality of unspecifiedrecipients, the request including recipient criteria, wherein therequest does not specify individual recipients or delivery points; andat least one computer processor programmed, based on instructions storedin a memory, to: assign, in the profile database, a unique internalcontrol value to each profile of the plurality of profiles havingidentified physical address delivery points, wherein each uniqueinternal control value has a character length equal to a characterlength of delivery point information printed on a physical distributionitem and wherein each unique internal control value comprises a prefixcode shared by multiple internal control values and a unique portionunique to the unique internal control value; identify, in the profiledatabase, profiles having assigned unique internal control values;identify, in the profile database, profiles meeting the receivedrecipient criteria; generate a list of the assigned internal controlvalues corresponding to the profiles identified as meeting the receivedrecipient criteria and having assigned internal control values; provide,via the sender interface, wherein the assigned internal control valuesincluded in the list are anonymized; and receive the plurality of items,each item having printed thereon one of the assigned internal controlvalues of the generated list, wherein the assigned internal controlvalue is printed on the item in place of a physical address deliverypoint for the item; and item processing equipment configured to scaneach item of the plurality of items, wherein the at least one computerprocessor is further programmed to: identify, in the profile database,the physical address delivery point corresponding to the internalcontrol value printed on each scanned item; route the item according tothe identified physical address delivery point; and deliver the item tothe identified physical address delivery point.
 11. The system of claim10, wherein the at least one computer processor is further programmed toidentify a constraint associated with the received request, wherein theconstraint limits the assigned internal control values that can beincluded in the list.
 12. The system of claim 11, wherein the at leastone computer processor is further programmed to filter the generatedlist based on the constraint and wherein the constraint limits theassigned internal control values based on one or more of a geographicarea in which the item is to be delivered, a type of item on which theassigned internal control value can be applied, or a type of deliverypoint to which the item can be delivered.
 13. The system of claim 10,wherein the prefix code identifies to the item processing equipment howto identify the physical address delivery point for the correspondingassigned internal control value in the profile database.
 14. The systemof claim 10, wherein the at least one computer processor is furtherprogrammed to identify, in the request, a subject of interest to beshared by each delivery point, wherein the subject of interest relatesto the plurality of items to be distributed and wherein identifyingprofiles in the profile database further comprises identifying profilesin the profile database that include the subject of interest and have anassigned unique internal control value.
 15. The system of claim 10,wherein the at least one computer processor is further programmed toencrypt the assigned internal control values included in the list beforeproviding the list.
 16. The system of claim 10, wherein the assignedinternal control value is printed on each item as a computer readablecode comprising one or more barcodes or barcode type images.
 17. Thesystem of claim 16, wherein the at least one computer processor isfurther programmed to parse the scanned computer readable code into thecorresponding assigned internal control value.
 18. The system of claim10, wherein the at least one computer processor programmed to providethe list comprises the at least one computer processor programmed toprovide instructions that cause a requesting entity to print each of theassigned internal control values on its own item.
 19. A non-transitory,computer readable medium comprising instructions that, when performed bya hardware controller, cause a system comprising the hardware controllerto: assign, in a profile database, a unique internal control value toeach profile of a plurality of profiles having identified physicaladdress delivery points, wherein each unique internal control value hasa character length equal to a character length of delivery pointinformation printed on a physical distribution item, wherein each uniqueinternal control value comprises a prefix code shared by multipleinternal control values and a unique portion unique to the uniqueinternal control value; receive, via a sender interface, a request forinternal control values for anonymously addressing each of a pluralityof items to be distributed to a plurality of unspecified recipients, therequest including recipient criteria, wherein the request does notspecify individual recipients or delivery points; identify, in theprofile database, profiles having assigned unique internal controlvalues; identify, in the profile database, profiles meeting the receivedrecipient criteria; generating a list of the assigned internal controlvalues corresponding to the profiles identified as meeting the receivedrecipient criteria and having assigned internal control values; providevia the sender interface, the generated list of assigned internalcontrol values, wherein the assigned internal control values included inthe list are anonymized; receive the plurality of items, each itemhaving printed thereon one of the assigned internal control values ofthe generated list, wherein the assigned internal control value isprinted on the item in place of a physical address delivery point forthe item; and for each of the plurality of items: scan, by itemprocessing equipment, the item to read the internal control valueprinted on the item; identify, in the profile database, the physicaladdress delivery point corresponding to the internal control valueprinted on the item; route, by the item processing equipment, the itemaccording to the identified physical address delivery point; and deliverthe item to the identified physical address delivery point.
 20. Thenon-transitory, computer readable medium of claim 19, wherein the systemcomprising the hardware controller is further caused to identify, in therequest, a subject of interest to be shared by each delivery point,wherein the subject of interest relates to the plurality of items to bedistributed and wherein identifying profiles in the profile databasefurther comprises identifying profiles in the profile database thatinclude the subject of interest and have an assigned unique internalcontrol value.