Abstract: Embodiments of a secure logistics system are disclosed. In an embodiment, the secure logistics system includes a digital secure container configured to carry one or more objects with a remotely operable security component for locking and unlocking. The secure logistic system also includes a remote monitoring subsystem configured to generate and communicate a first digital key to a sender and a second digital key to a receiver of the digital secure container. The first digital key and the second digital key are generated based at least in part on unique identifiers associated with the sender and the receiver respectively. The secure logistic system further includes an input device configured to communicate with the digital secure container (102) to lock the remotely operable security component based on the first digital key and unlock the remotely operable security component based on the first digital key and the second digital key. FIG.1
Field of the Invention;
The present invention in general, relates to secure logistic solutions. In particular, embodiments of the present invention relate to a remotely operable locking system in secure logistic solutions.
Background of the invention;
Modern day solutions for sending a courier or a parcel to an intended recipient includes packaging the contents to be sent in an enclosure (e.g. envelope, cover, soft board) and sealing the enclosure by means of adhesives, tapes, or strings. The package may be subjected to rough handling, wear and tear etc. during the transit phase which may result in damages to the content within, by the time the package reaches the intended recipient. Such a scenario is very common in the context of transportation system in developing countries.
Existing systems and methods for packaging and sending a valuable object do not provide any "self generating, automated and instant notification" when the enclosure is sealed for dispatch at a source or unsealed at a destination. Further, there is no way to ensure that only the intended recipient receives and opens the enclosure. Existing systems and methods that employ signature-based delivery have no mechanism to digitally cross verify if the signature was actually that of the intended recipient and serves more as a limited record of delivery.
In view of the above, there is a well-felt need for a secure system that ensures secure dispatch and delivery of valuable goods sent via. a courier or parcel delivery systems.
The subject matter disclosed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practiced.
Summary
It is an object of the invention to provide for secure logistic solutions for transshipment of one or more goods from a sender to a receiver.
Yet another object of the present invention is to provide a remotely operable secure logistic solution.
Embodiments of a secure logistics system are disclosed. In an embodiment, the secure logistics system includes a digital secure container configured to carry one or more objects with a remotely operable security component for locking and unlocking. The secure logistic system also includes a remote monitoring subsystem configured to generate and communicate a first digital key to a sender and a second digital key to a receiver of the digital secure container. The first digital key and the second digital key are generated based at least in part on unique identifiers associated with the sender and the receiver respectively. The secure logistic system further includes an input device configured to communicate with the digital secure container (102) to lock the remotely operable security component based on the first digital key and unlock the remotely operable security component based on the first digital key and the second digital key.
Embodiments of method of securely locking and unlocking a digital secure container carrying one or more objects are disclosed. The digital secure container is being transshipped from a sender to a receiver. In an embodiment, the method includes generating a first digital key and a second digital key based at least in part on unique identifiers associated with the sender and the receiver respectively. The method also includes communicating the first digital key and the second digital key to the sender and the receiver respectively. Subsequently, the method includes locking the digital secure container by the sender based on the first digital key and unlocking the digital secure container by the receiver based on the first digital key and the second digital key. The first digital key is communicated to the receiver by the sender.
These other advantages and features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
Brief description of drawings
To further clarify the above and other advantages and features of the present invention, a more particular description of the invention will be rendered by references to specific embodiments thereof, which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings in which:
Fig. 1 illustrates an exemplary implementation of a secure logistics system;
Fig. 2 illustrates a digital secure container in accordance with an embodiment of invention;
Fig. 3 shows an input device according to an embodiment of the invention;
Fig. 4 depicts an exemplary remote monitoring system for secure logistic systems; and
Fig. 5 illustrates an exemplary method for securely locking and unlocking a digital secure container.
Detailed description:
Embodiments of the invention relate to systems and methods for remotely operable secure logistic solutions. For example, one or more operations such as locking and unlocking, of a digital secure container containing an object, may be performed by using digital keys transmitted via a wireless network. The digital keys can be generated based on unique identifiers of a sender and a receiver of the digital secure container.
Figure 1 illustrates an exemplary implementation of a secure logistics system 100.
Accordingly, the secure logistics system 100 includes a digital secure container 102 configured to carry one or more objects to be sent from a sender to a receiver.
The secure logistics system 100 includes an input device 104 in communication with the digital secure container 102. The input device 104 may correspond to a complementing hardware device configured to operate the digital secure container 102. In particular, the input device 104 enables a user (e.g. sender or a receiver) to enter data to lock or unlock a security component of the digital secure container 102. The communication medium between the digital secure container 102 and the input device 104 may include, for example, a wireless medium, a wired medium, or a combination thereof.
In an exemplary embodiment, the input device 104 communicates with the digital secure container 102 via. a cable.
The system 100 further includes a remote monitoring subsystem 106 in communication with the input device 104 via. a communication network 108. The remote monitoring subsystem 106 may be any combination of hardware or software designed to provide general or specific delivery and logistic services. The remote monitoring subsystem 106 may also refer to a computing device which may be running a server operating system. The remote monitoring subsystem 106 can be configured to centrally manage the remote locking and unlocking operation of the digital secure container 102. The remote monitoring subsystem 106 also monitors the complete transshipment based on location-based identifiers and unique identifiers.
The communication network 108 may include one or more of wireless network, wired network, Wide Area Network (WAN), Metropolitan Area Network (MAN), Local Area Network (LAN), and Personal Area Network (PAN). In an exemplary implementation, the communication network 108 may include a mobile/cellular network. Such mobile networks may be networks employed for Global System for Mobile communications or a Code Division Multiple Access (CDMA) based communications. It may be appreciated that other mobile device networks, such as, personal communications service (PCS) may also be employed without departing from the scope of the ongoing description.
The secure logistics system 100 may further include one or more user devices (for e.g. 110a, 110b as shown in the figure) that enable a user to send/receive data associated with the locking and unlocking of the digital secure container 102 through a secure communication channel. The user can correspond to a sender 112a who dispatches the digital secure container 102 or a receiver 112b of the digital secure container 102.
In one of the embodiments, the secure logistics system 100 employs unique identifier based locking and unlocking operation of the digital secure container 102. For example, it would be appreciated by those skilled in the art that a mobile or cellular phone has a high level of diffusion and can be considered as a personal identifier of the subscriber/user of the mobile phone. Further, each of the mobile phones has a unique subscriber identity module (SIM) that is not shared or parted with/without consent of the user/subscriber of the mobile phone. Further, SIM providers typically required by regulation to verify, record and hold the paper identity of the subscriber in "exchange" for a digital identity (SIM) that is used for unique subscriber identifications on the mobile network. Hence, for the purposes of the ongoing description, mobile phone number i.e. SIM Number can be used as a distinct and personal identity of the user (pseudo identity). Moreover, a message sent to a user of the mobile device can be considered private and confidential under normal circumstances.
In operation, the courier/parcel delivery company presents the digital secure container 102 and the associated input device 104 to a sender. Goods or objects to be dispatched are loaded into the digital secure container 102 by the sender (e.g. 112a). The objects may correspond to articles, documents, bullions, clothing fabrics, gifts, packages and the like.
In an embodiment, the digital secure container 102 and the input device 104 communicate via a cable wire to enable the input device 104 to power and operate the security component in the digital secure container 102. Subsequent to filling in the contents into the digital secure container 102, the sender 112a presses a button on the input device 104 to initiate a locking operation of the digital secure container 102. The input device 104 prompts the sender 112a to feed transaction details and user details. The transaction and user details may include name, contact details, mobile number or SIM number, Postal Index Number (PIN), e-mail ID, etc. of the sender 112a and the receiver 112b.
The sender 112a feeds/inputs one or more of the details, such as, sender's cell number (mobile number corresponding to the mobile device 110a used by the sender 112a), receiver's cell number (mobile number corresponding to the mobile device 110b used by the receiver 112b), email details, sender's postal PIN, and receiver's postal PIN code. The sender 112a then presses a button provided on the input device 104 to request a locking operation of the digital secure container 102 based on the inputs. The locking operation triggers a communication of the details entered by the sender 112a from the input device 104 to the remote monitoring subsystem 106. In an embodiment, the communication between the input device 104 and the remote monitoring subsystem 106 happens via. a general packet radio service (GPRS) or a short message service (SMS).
In an exemplary embodiment, upon receipt of the details from the input device 104, the remote monitoring subsystem 106 generates a random "two-part" digital key for the sender 112a and for the receiver 112b respectively. The two-part digital key corresponds to a first digital key for the sender 112a and a second digital key for the receiver 112b. The remote monitoring subsystem 106 communicates the first digital key and the second digital key separately to the respective mobile devices 110a and 110b of the sender 112a and the receiver 112b respectively. In yet another embodiment, the remote monitoring subsystem 106 can communicate the digital keys via. an e-mail. It may be appreciated that any other alternative modes of communication may be used to communicate the digital keys to the sender 112a and the receiver 112b.
In an alternative embodiment, the remote monitoring subsystem 106 may verify the user credentials prior to sending the generated digital keys. The verification may be performed by sending a random code to the sender 112a and the receiver 112b. The sender and the receiver may also be requested to reply with one or more of the user details fed by the sender 112a. The sender and receiver may then send the requested details which the remote monitoring subsystem 106 verifies against the user details received from the input device 104. Upon verification, the remote monitoring subsystem 106 sends the respective ones of the digital keys to the sender and the receiver. Alternate methods of verification may be applied without departing from the scope of the ongoing description. A successful delivery of the digital keys to the sender and the receiver validates the cell number/mobile number of the sender 112a (and of the receiver 112b later).
In a successive progression, the sender 112a enters into the input device 104, the first digital key communicated by the remote monitoring subsystem 106. The input device 104 communicates the first digital key to the remote monitoring subsystem 106. The remote monitoring subsystem 106 matches the received first digital key with the one it transmitted. Upon a positive match, the remote monitoring subsystem 106 communicates a positive match message to the input device 104. The input device 104 further sends a lock signal to the security component of the digital secure container 102 that automatically locks itself. The courier company or the logistics services company dispatches the digital secure container 102 to the receiver 112b. The input device 104 sends an update message communicating the locking of the digital secure container 102 to the remote monitoring subsystem 106.
In an exemplary embodiment, the unlocking of the digital secure container 102 requires the first digital key and the second digital key. The sender 112a communicates the first digital key through any personal channel to the receiver 112b. In an embodiment, the sender 112a communicates the first digital key using mobile device 110a via. a short service message (SMS). Meanwhile, the digital secure container 102 is transshipped to the receiver 112b. Upon delivery, the digital secure container 102 and the input device 104 are presented to the receiver 112b by the courier or the logistic services company. The receiver 112b presses a button on the input device 104 to initiate an unlocking operation of the digital secure container 102.
The input device 104 prompts the receiver 112b to enter the "two part" digital key (i.e. the first digital key and the second digital key). The receiver 112b feeds the digital keys into the input device 104 which then sends an unlock request along with the digital keys to the remote monitoring subsystem 106. The remote monitoring subsystem 106 then validates the digital key combination and transmits a positive match message to the input device 104. The input device 104 unlocks the security component of the digital secure container 102.
In an alternative implementation, the remote monitoring subsystem 106 validates the password and the location from where the unlock request is communicated. For such a validation, the remote monitoring subsystem 106 utilizes a mobile telephony location identification features (location based services) and compares the communicated receiver location with the destination postal PIN location (provided by the sender 112a during the locking operation of the digital secure container 102). In addition, the input device 104 has a Global Positioning System (GPS) receiver 307 that provides location information from where the unlock request is communicated. Such location information is then transmitted to the remote monitoring subsystem 106 which then compares the location co-ordinates of designated destination postal PIN from a position database to get a match/no match result. Depending upon the availability and quality of the signals and data, either or both of the information coming from the mobile telephony location identification feature or GPS data will be compared by the remote monitoring subsystem 106 to validate genuineness of the delivery destination location. The remote monitoring subsystem 106 can either allow/disallow or caution/intimate sender and receiver on validity or discrepancy if any of the destination location.
In the event of the digital secure container 102 being successfully unlocked, the remote monitoring subsystem 106 sends a notification message or an email to the sender 112a notifying the unlock operation. Such a notification may be considered as a delivery receipt for the purposes of the logistics transaction. In an alternate embodiment, the sender 112a may set an unlocking password that is stored only at the remote monitoring subsystem 106. The unlocking of the digital secure container 102 is allowed after the remote monitoring subsystem 106 validates the password entered by the receiver.
In yet another embodiment, the receiver 112b uses the input device 104 to enter the password and the remote monitoring subsystem 106 generates and communicates a random code to the mobile phone 110b used by the receiver 112b. The receiver 112b enters the received random code onto the input device 104 to gain access to the digital secure container 102. Such an embodiment ensures that the receiver 112b was near the digital secure container 102 at the time of delivery and initiated action to "personally" collect the digital secure container 102. The receiver 112b removes the goods from the digital secure container 102 and returns the digital secure container 102 to the courier service provider.
The digital secure container 102 and the handheld 104 are carried back by courier service provider for the next customer (sender) for the next dispatch of goods. It may be noted that the digital keys generated by the remote monitoring subsystem 106 in a single dispatch and delivery operation expires with the unlock operation.
Fig. 2 illustrates a digital secure container in accordance with an embodiment of invention. The digital secure container 102 may be a lightweight reusable box for sending the object using a courier service or other similar services that undertake delivery or packages or parcels. In an embodiment, the digital secure container 102 may be made of a plurality of durable plastic & aluminum sandwich material. It may be appreciated that other materials may be used for the construction of the digital secure container 102 without deviating from the scope of the ongoing description. Further, the digital secure container 102 can be constructed in such a manner that reduces the overall weight of the box and disallows any opening during the transit of the digital secure container 102 unless unlocked using the process prescribed in the ongoing description. It may be appreciated that the digital secure container 102 may be a courier box or a parcel box used for sending articles, objects, documents, or other items using a courier service or a parcel delivery service.
As shown, the digital secure container 102 includes a chamber 202 for placing one or more objects to be transshipped. The chamber 202 can be an enclosure with appropriate cladding of soft material or fabric to ensure safety of the objects. It may be appreciated that the walls and the floor of the enclosure may be covered with suitable material according to the objects intended to be transported using the digital secure container 102. Choice of such suitable material can be made considering the transient conditions of the transshipment. For example, a moisture proof, absorbent material can be used in places with an above average rainfall or humidity. In yet another example, a shock absorbing material can be used where the transshipment involves travelling by roads that are poorly maintained etc.
The digital secure container 102 further includes a closing lid 204 made up of the same material as that of the rest of the body. The closing lid 204 and the chamber 202 are conjoined at 205 in such a manner that the closing lid 204 can rotatably move about the axis 205 to arrive at a closed position.
In addition, the digital secure container 102 includes a remotely operable security component 206 that acts as a locking mechanism (mechanical or electronic or a combination thereof) to lock and unlock the digital secure container 102 from inside. In an embodiment, remotely operable security component 206 includes a motorized lock or an electromagnetic latch sitting functioning as a slave device driven by a controller in the input device 104. It may be noted that a lock operation of the security component 104 may be implemented by a combined functioning of both the security component and the controller.
The digital secure container 102 may also include one or more security sensors 208 that can sense movement of latch in a given direction and to a given position. The security sensors 208 may also correspond to contact sensors to ensure that the closing lid 204 is properly aligned with the chamber. The security sensors 208 further ensures that the security component 206 has actually moved in response to a signal from the controller in the input device 104.
The digital secure container 102 further includes an identification module 210 for a unique identification of the digital secure container 102 for purposes of logistics and warehousing. The identification module 210 may include one or more of a passive Radio Frequency identification (RFID) tag, a magnetic tagging microchip, a permanent bar code, or magnetic strip on the outer surface of the digital secure container 102. The identification module helps in automating transit warehouse sorting and location updates of the digital secure container 102. The digital secure container 102 may be uniquely identified through the microchip embedded in the digital secure container 102 using appropriate magnetic code readers or RFID sensors.
The digital secure container 102 further includes a communication interface 212 that allows the communication between the security component 206 and the controller in the input device 104. In one of the embodiments, the digital secure container 102 and the input device 104 communicate via. a cable. The communication interface 212, in such an embodiment, corresponds to RS232 interface or the like. In another embodiment, the communication interface 212 may correspond to a universal serial bus (USB) interface.
Figure 3 illustrates an input device according to an embodiment of the invention. As shown, the input device 104 includes a processor 302 coupled to a memory 304 and configured to access and execute one or more instructions stored in the memory 304. The memory 304 may be combination of volatile and non-volatile storage mediums storing one or more instructions in the form of one or more program modules.
For instance, the memory 304 includes a communication module 306 that facilitates communication between the input device 104 and the remote monitoring subsystem 106. The communications module 306 may include various communication interfaces required for transmission and reception of data via the communication network 108. In addition, the communications module 306 enables communication of control signals from the input device 104 to the security component 206. The communication module 306 also facilitates the communication of sensor signals from the security sensors 208 and the input device 104.
The input device 104 includes a GPS receiver 307 for obtaining location coordinates of the destination from where the unlock request is received. An extension of the communications module 306 includes a GSM/GPRS modem 308 for enabling data communication between the input device 104 and the remote monitoring subsystem 106. The GSM/GPRS modem 308 further facilitates location based updates of the digital secure container 102 by enabling location data transmission between the input device 104 and the remote monitoring subsystem 106.
The memory 304 further includes a voice guidance module 310 configured to voice guide the locking and unlocking operation in one or more languages. This helps easy handling of the digital secure container and the input device 104. The memory 304 further includes a user input module 312 that prompts the sender/receiver for information associated with the locking/unlocking of the digital secure container 102. For example, upon initiation of the locking operation, the user input module 312 prompts the sender for one or more user details or transaction details. Likewise, upon initiation of the unlocking operation, the user input module 312 prompts the receiver for digital keys to unlock the digital secure container 102.
The input device 104 further includes a data-reading module 314 that couples with a data reading hardware for tag based user inputs. For example, the sender may want to swipe an ID card that can serve as user ID of the sender 112a. Similarly, the receiver 112b may also be prompted to swipe his ID card for confirming the receiver ID. In other cases, the data-reading module 314 may prompt swiping of warehouse personnel's ID to earmark the location update during transit of the digital secure container 102.
Various modules in the input device 104 generate one or more static and dynamic variables that can be stored in the program data 316. The program data 316 may temporarily store the first digital key and the second digital key before communicating to the remote monitoring subsystem 106. The program data 316 allows temporary or optionally a permanent storage of transaction details and other usage details associated with a single transaction. The state logic for driving the security component 206 may also be stored in the program data 316.
The input device 104 includes a power module 318 configured to optimally use power form a power source. It may be understood that the input device 104 can be used anywhere during transit or at delivery or at the sender's end. Therefore, the input device 104 can include provisions for auxiliary power source, such as, battery or the like. The power module 318 also provides power to the security component 206 of the digital secure container 102. It might be pointed out here that the security component 206 corresponds to a mechanism to lock/unlock the digital secure container 102. During the locking and the unlocking operation, the security component 206 derives power from the power source in the input device 104. Furthermore, the security sensor 208 may also require power for their operation. The power module 318 can regulate such power consumption from the power source (main or auxiliary as the case be).
The input device 104 also includes a display unit 320 for displaying messages to a user. For example, the sender and the receiver can be prompted for user details or the digital keys. The prompt can be in the form of messages displayed on the display device unit 320. In an embodiment, the display unit 320 can correspond to a mini-LCD screen driven by a driver module (not shown in the figure).
The input device 104 may also include a speaker 322 and a microphone 324. The speaker 322 enables the voice guidance module 310 to voice guide a user. The speaker 322 may also be used to emit alarm sounds in the event of a malfunctioning of one or more components of the input device 104 and/or the digital secure container 102. The microphone 324 enables a user (sender/receiver) to provide a voice input to the input device 104. Such voice inputs may be needed for voice enabled security features.
Although, only a few modules have been shown in the figure, it may be understood that many other modules may be implemented in the input device without departing from the scope of the ongoing disclosure. Further, various functionalities of the input device 104 may be achieved using a combination of hardware and software components and such components although not shown here are incorporated herein as reference. For example, the input device may include communication antennas to receive and transmit data to remote monitoring subsystem 106 via the communication network 108.
Fig. 4 illustrates a remote monitoring subsystem 106 according to an embodiment of the invention. Accordingly, the remote monitoring subsystem 106 includes a processor 402 coupled to a memory 404 to access and execute one or more instructions stored in the form of one or more program modules 406. The execution of program modules 406 results in one or more data variables stored in program data 408. The program modules 406 include an identification module 410, a digital key module 412, an operations module 414, a communication module 416, a monitoring module 418, and application software 420. The program data 408 includes a user database 422, a digital key database 424, a position database 426, and a transaction database 428.
The identification module 410 is configured to verify the identification of the sender 112a and the receiver 112b prior to locking and unlocking of the digital secure container 102. As described earlier, the secure logistics system 100 implements a unique identifier based locking and unlocking of the digital secure container 102. To this end, the identification module 410 stores the user details (unique identifiers) in user database 422 for a future reference. The user details may include, name, contact details, mobile number or SIM number, Postal Index Number (PIN), e-mail ID, etc. of the sender 112a and the receiver 112b. The identification module 410 verifies the user credentials prior to sending generated digital keys. The verification may be performed by sending a random code to the sender 112a and the receiver 112b.
Based on the unique identifier, the digital key module 412 generates a random two-part digital key. The digital key module 412 generates the first digital key and the second digital key based on an alphanumeric random number generation algorithm. The random generation algorithm can generate dynamic and random digital keys of different total lengths and sub lengths. In an example embodiment, first, a random alphanumeric key of a total size between 6 to 10 characters is created. For example, "AB12CD4568" or "B18E69" may correspond to alphanumeric keys. The length of the keys may be between 6 to 10 characters and can be randomly chosen each time a fresh alphanumeric key is generated. Next, the algorithm splits the alphanumeric key into first digital key and second digital key. The alphanumeric key can be split at a random length to obtain the first and the second digital key that may or may not have the same length. In the above example, the 10-bit long alphanumeric key "AB12CD4568" can be split into "AB12CD" and "4568". "AB12CD" can be further split at random to generate "AB" and "12CD". "12CD" can be assigned as the first digital key. Likewise, rest of the alphanumeric characters may be split or combined to generate the second digital key. It is to be noted that total length of the combined key generation is random and splitting into 2 part keys (first digital key and second digital) can be random. Such a random generation of digital keys ensures safety and secure access to the contents. The digital key module 412 stores all the generated digital keys in the digital key database 424.
The remote monitoring subsystem 106 includes operations module 414 configured to manage the complete secure logistics system 100. The operations module 414 co-ordinates various components of the remote monitoring subsystem 106 and the input device 104 for implementation of unique identifier based remote locking and un-locking of digital secure container. The operation module 414 manages the complete transaction from locking to unlocking of the digital secure container 102 and populates the transaction database 428 with requisite details of dispatch and delivery with appropriate time stamping. The operations module 414 communicates the sender and the receiver about a dispatch and delivery via. various modes of communication.
The communication module 416 enables data communication between the input device 104 and the remote monitoring subsystem 106 via. the communication network 108. The communication module 416 further enables communication between the remote monitoring subsystem 106 and the mobile devices 110a and 110b.
The monitoring module 418 is configured to collect location based updates from the input device 104. As described earlier, the input device 104 includes a GSM/GPRS modem 308 that communicates with local mobile networks. A location update may be transmitted from the input device 104 to the remote monitoring subsystem 106. The GPS receiver 307 captures the location information on the input device 104 and transmits the data to the remote monitoring subsystem 106. The monitoring module 418 can store such data in the position database 426. Such data may be used to prepare an MIS report for addressing delays and pain points in the system. The monitoring module 418 can populate the transaction database 428 with relevant details of location and time during one or more checkpoints during transit.
The remote monitoring subsystem 106 includes application software 420 that may be required for performing various functions of the secure logistics system 100. Application software may further include operating system that run on the remote monitoring subsystem 106.
The remote monitoring subsystem 106 also includes a display unit 430 configured to display or present information, reports, details, etc. associated with transactions, users, etc. The display unit 430 enables an operator at the remote monitoring subsystem 106 to manually operate the system in case of any exigencies.
Figure 5 illustrates an exemplary method for securely locking and unlocking a digital secure container 102. The digital secure container 102 includes one or more objects to be transshipped from the sender 112a to the receiver 112b.
At block 502, a first digital key and a second digital key are generated based at least in part on unique identifiers associated with the sender and the receiver respectively. The remote monitoring subsystem 106 (digital key module 412) generates a random alphanumeric number based digital keys for the sender 112a and the receiver 112b. The digital key module 412 stores the digital keys in digital key database 424. The unique identifier (ID) can comprise of a subscriber identity module (SIM) number, postal address, email ID, telephone number, and postal PIN code, etc. The digital key generation may be performed post verification of individual identities of the sender and the receiver. The generation, in an embodiment, can be based on alpha-numeric random number generation algorithm.
At block 504, the first digital key and the second digital key are communicated to the sender and the receiver respectively. The communication module 416 communicates the generated first and the second digital keys to the sender's mobile device 110a and the receiver's mobile device 110b. The communications module 416 obtains the sender's mobile number and the receiver's mobile number from the user database 422. In an embodiment, the communicating comprises transmitting and receiving data over wireless, wired, Wide Area Network (WAN), Metropolitan Area Network (MAN), Local Area Network (LAN), Personal Area Network (PAN), GSM and CDMA network.
At block 506, the digital secure container is locked by the sender based on the first digital key. The sender 112a feeds the first digital key (received from the remote monitoring subsystem 106) into the input device 104. The controller in the input device 104 sends a locking signal post verification of the first digital key. After the locking operation, the digital secure container 102 is dispatched along with the input device 104 to the destination address.
At 508, the digital secure container is unlocked by the receiver based on the first digital key and the second digital key. The sender 112a communicates the first digital key to the receiver 112b. Once the digital secure container is delivered to the receiver, the receiver is prompted to feed in the first and the second digital keys. Upon successful verification of the digital keys at the remote monitoring subsystem 106, the input device 104 issues an unlock signal to the security component 206 that unlocks the digital secure container 102.
In comparison to the conventional methods of courier or parcel delivery, the digital secure container 102 provides ease of use (just load and lock). The various embodiments described here provides for reduced packing volume and offers better protection to the goods inside the digital secure container 102.
For instance, while using conventional packaging material, such as, cardboards, the walls are weak and hence the contents within have to be packed with bulky cushioning material to absorb shock/impact. In an embodiment, the digital secure container 102 may be constructed using durable plastic & aluminum sandwich material resulting in strong outer walls. Such a box can take the bulk of the load and the packing material for the contents within is minimal. This has an advantage that more stuff per box can be packed or alternatively the box dimension can be smaller than the conventional courier box or parcel box. In another implementation, the digital secure container 102 may be engineered by design in such a manner to transfer and distribute the impact load and shock to the walls of the digital secure container 102 and minimize transfer of the load to the contents inside. This has an advantage of providing better protection to the contents within especially when the contents are fragile.
As described earlier, the digital secure container 102 may include one or more contact sensors to ensure proper closure of the closing lid 204. The digital secure container 102 may also include one or more sensors that also detect that the locking head has actually moved thereby enhancing the security of the digital secure container 102. In an implementation, the digital secure container 102 includes passive suitable radio frequency (RF) tags which in conjunction with RF readers help in automating transit warehouse sorting, location updates, and getting digital identity of the digital secure container 102 for the input device 104. In an alternate embodiment, the digital secure container 102 may be identified based on a permanent bar code or a magnetic strip included in the digital secure container 102.
The system 100 enables a designated person-to-person delivery transaction that employs personal identification through mobile phone numbers. The sender 112a designates the receiver 112b by using his mobile phone number (corresponding to 110b) as identity and a secure operating channel. The system 100 uses a mobile device to communicate the passwords ensuring that the password is delivered in private and considered personally secure. It is an advantage of the system 100 that the digital secure container 102 cannot be opened/unlocked without valid mobile numbers and without the receiver 112b being in close proximity to the digital secure container 102. In addition, the sender 112a and the receiver 112b have no control on the generation of the digital keys. The remote monitoring subsystem 106 acts as a mediator and randomly generates the digital keys for every new trip or dispatch delivery cycle.
The "two part" digital key is split and sent separately to both parties (the sender 112a and the receive 112b). The sender 112a relays or exchanges through private means (mobile device/ Phone/ email etc) the first digital key to the receiver 112b so that the receiver 112b has both the first and second digital keys using which the digital secure container 102 can be unlocked. In case the sender 112a sets the postal PIN code, the lock will open only in corresponding zone/area. The password and the location of the unlock operation is validated by the remote monitoring subsystem 106 and in most of the embodiments, are not carried in the digital secure container 102. Since the remote monitoring subsystem 106 manages the generation and relaying of passwords, the overall security of the digital secure container 102 (and the contents therein) is enhanced.
The system 100 has an instant and automated notification feature through SMS and email (personal delivery channels) upon any locking or unlocking event thereby enhancing the efficiency (or reducing the burden ) and transparency of action of the courier service provider. The instant and automated notification also serves as a proof of delivery (POD).
The lock in the digital secure container 102 is remotely secured and operated upon and is accessible to two contracting individuals only through private channels (mobile phones).
In an embodiment, there may be a case when the receiver 112b cannot trace the passwords or loses it due to deletion of the SMS. There may also be a technical glitch or fault in the operation. In such a scenario, the remote monitoring subsystem 106 can remotely open/unlock the digital secure container 102. The receiver 112b has to dial the remote monitoring subsystem 106 from his mobile device 110b. The receiver's caller ID is compared with the caller ID (for the receiver 112b) as provide by the sender 112a during locking operation. In yet another embodiment, the system 100 can be configured to allow a brief dialogue between an operator on the remote monitoring subsystem 106 and the receiver 112b that is recorded as evidence of exception request and action.
The remote monitoring subsystem 106 can provide information on a plurality of digital secure containers (in use and not in use) and location details about the start and end of service, besides other data. In a further implementation, the input device 104 and an operator on the remote monitoring subsystem 106 can establish a voice communication. The input device 104 has a voice guidance feature that voice guides the users (sender/receiver) on the steps of operation required for operating the digital secure container 102.
The system 100 can be implemented in any country, as the digital secure container 102 has no network circuitry except a lock. The input device 104 has the network feature that can work on GSM or CDMA network. The input device 104 can be tuned for any specific country's cellular network specifications thereby enabling cross border shipments. The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive.
We Claim:
1. A secure logistics system (100) comprising:
a digital secure container (102) configured to carry one or more objects with a remotely operable security component for locking and unlocking;
a remote monitoring subsystem (108) configured to generate and communicate a first digital key to a sender (112a) and a second digital key to a receiver (112b) of the digital secure container (102), the first digital key and the second digital key being generated based at least in part on unique identifiers associated with the sender (112a) and the receiver (112b) respectively; and
an input device (104) configured to communicate with the digital secure container (102)to:
lock the remotely operable security component based on the first digital key; and
unlock the remotely operable security component based on the first digital key and the second digital key.
2. The secure logistics system according to claim 1, wherein the digital secure container (102) comprises lightweight reusable box with a closing lid.
3. The secure logistics system according to claim 1, wherein the digital secure container (102) is further configured to notify the remote monitoring subsystem about a locking and an unlocking operation.
4. The secure logistics system according to claim 1, wherein the digital secure container (102) comprises radio frequency (RF) tags for identification of the digital secure container.
5. The secure logistics system according to claim 1, wherein the digital secure container (102) comprises a permanent bar code or a magnetic strip for identification of the digital secure container (102).
6. The secure logistics system according to claim 1, wherein the one or more objects comprise articles, contents, objects, documents, bullions, currency, goods, and liquids.
7. The secure logistics system according to claim 1, wherein the remote monitoring subsystem (108) is further configured to receive unique identifiers from the sender.
8. The secure logistics system according to claim 1, wherein the unique identifier (ID) comprises a subscriber identity module (SIM), postal address, email ID, telephone number and pin code.
9. The secure logistics system according to claim 1, wherein the input device integrates with the digital secure container to form a single sub-system.
10. The secure logistics system according to claim 1, wherein the input device correspond to a handheld device, a microphone, button, joy stick, wheel, keypad, keyboard, a resistive strip, touch pad or touch screen, and/or a motion sensor.
11. The secure logistics system according to claim 1, wherein the input device comprises a voice guidance subsystem configured to voice guide the sender and the receiver in relation to operating the digital secure container.
12. A method of securely locking and unlocking a digital secure container carrying one or more objects, the digital secure container being transshipped from a sender to a receiver, the method comprising:
generating a first digital key and a second digital key based at least in part on unique identifiers associated with the sender and the receiver respectively;
communicating the first digital key and the second digital key to the sender and the receiver respectively;
locking the digital secure container by the sender based on the first digital key; and
unlocking the digital secure container by the receiver based on the first digital key and the second digital key, wherein the first digital key is communicated to the receiver by the sender.
13. A method of claim 12 further comprising generating the first digital key and the second digital key based on alphanumeric random number generation algorithm.
14. A method of claim 12 further comprises verifying the identity of the sender and the receiver.
15. A method of claim 12, wherein the communicating comprises transmitting and receiving data over wireless, wired, Wide Area Network (WAN), Metropolitan Area Network (MAN), Local Area Network (LAN), Personal Area Network (PAN), GSM and CDMA network.
16. A method of claim 12 further comprising validating the first digital key and the second digital key during the locking and the unlocking.
| # | Name | Date |
|---|---|---|
| 1 | 3250-che-2009 request for postdating 21-12-2009.pdf | 2009-12-21 |
| 1 | 3250-CHE-2009-Correspondence-FORM-6-051015.pdf | 2016-04-19 |
| 2 | 3250-che-2009 form-5 31-12-2009.pdf | 2009-12-31 |
| 2 | 3250-CHE-2009-Form 6-051015.pdf | 2016-04-19 |
| 3 | 3250-CHE-2009-OTHERS-051015.pdf | 2016-04-19 |
| 3 | 3250-che-2009 form-3 31-12-2009.pdf | 2009-12-31 |
| 4 | 3250-CHE-2009-Correspondence-191015.pdf | 2016-03-22 |
| 4 | 3250-che-2009 form-2 31-12-2009.pdf | 2009-12-31 |
| 5 | 3250-CHE-2009-Power of Attorney-191015.pdf | 2016-03-22 |
| 5 | 3250-che-2009 form-1 31-12-2009.pdf | 2009-12-31 |
| 6 | abstract3250-CHE-2009.jpg | 2012-04-23 |
| 6 | 3250-che-2009 drawings 31-12-2009.pdf | 2009-12-31 |
| 7 | 3250-che-2009 description(provisional) 31-12-2009.pdf | 2009-12-31 |
| 7 | 3250-CHE-2009 CLAIMS 17-06-2011.pdf | 2011-06-17 |
| 8 | 3250-che-2009 correspondence others 31-12-2009.pdf | 2009-12-31 |
| 8 | 3250-CHE-2009 CORRESPONDENCE OTHERS 17-06-2011.pdf | 2011-06-17 |
| 9 | 3250-CHE-2009 OTHER DOCUMENT 17-06-2011.pdf | 2011-06-17 |
| 9 | 3250-che-2009 form-1 17-06-2010.pdf | 2010-06-17 |
| 10 | 3250-CHE-2009 POWER OF ATTORNEY 07-07-2010.pdf | 2010-07-07 |
| 10 | 3250-CHE-2009 ABSTRACT 02-05-2011..pdf | 2011-05-02 |
| 11 | 3250-che-2009 request for postdating 15-12-2010.pdf | 2010-12-15 |
| 11 | 3250-CHE-2009 CLAIMS 02-05-2011..pdf | 2011-05-02 |
| 12 | 3250-CHE-2009 CORRESPONDENCE OTHERS 02-05-2011..pdf | 2011-05-02 |
| 12 | 3250-CHE-2009 FORM -5 02-05-2011.pdf | 2011-05-02 |
| 13 | 3250-CHE-2009 DESCRIPTION (COMPLETE) 02-05-2011..pdf | 2011-05-02 |
| 13 | 3250-CHE-2009 FORM -3 02-05-2011.pdf | 2011-05-02 |
| 14 | 3250-CHE-2009 DRAWINGS 02-05-2011.pdf | 2011-05-02 |
| 14 | 3250-CHE-2009 FORM -2 02-05-2011.pdf | 2011-05-02 |
| 15 | 3250-CHE-2009 FORM -1 02-05-2011.pdf | 2011-05-02 |
| 16 | 3250-CHE-2009 DRAWINGS 02-05-2011.pdf | 2011-05-02 |
| 16 | 3250-CHE-2009 FORM -2 02-05-2011.pdf | 2011-05-02 |
| 17 | 3250-CHE-2009 FORM -3 02-05-2011.pdf | 2011-05-02 |
| 17 | 3250-CHE-2009 DESCRIPTION (COMPLETE) 02-05-2011..pdf | 2011-05-02 |
| 18 | 3250-CHE-2009 FORM -5 02-05-2011.pdf | 2011-05-02 |
| 18 | 3250-CHE-2009 CORRESPONDENCE OTHERS 02-05-2011..pdf | 2011-05-02 |
| 19 | 3250-che-2009 request for postdating 15-12-2010.pdf | 2010-12-15 |
| 19 | 3250-CHE-2009 CLAIMS 02-05-2011..pdf | 2011-05-02 |
| 20 | 3250-CHE-2009 POWER OF ATTORNEY 07-07-2010.pdf | 2010-07-07 |
| 20 | 3250-CHE-2009 ABSTRACT 02-05-2011..pdf | 2011-05-02 |
| 21 | 3250-CHE-2009 OTHER DOCUMENT 17-06-2011.pdf | 2011-06-17 |
| 21 | 3250-che-2009 form-1 17-06-2010.pdf | 2010-06-17 |
| 22 | 3250-CHE-2009 CORRESPONDENCE OTHERS 17-06-2011.pdf | 2011-06-17 |
| 22 | 3250-che-2009 correspondence others 31-12-2009.pdf | 2009-12-31 |
| 23 | 3250-CHE-2009 CLAIMS 17-06-2011.pdf | 2011-06-17 |
| 23 | 3250-che-2009 description(provisional) 31-12-2009.pdf | 2009-12-31 |
| 24 | 3250-che-2009 drawings 31-12-2009.pdf | 2009-12-31 |
| 24 | abstract3250-CHE-2009.jpg | 2012-04-23 |
| 25 | 3250-CHE-2009-Power of Attorney-191015.pdf | 2016-03-22 |
| 25 | 3250-che-2009 form-1 31-12-2009.pdf | 2009-12-31 |
| 26 | 3250-CHE-2009-Correspondence-191015.pdf | 2016-03-22 |
| 26 | 3250-che-2009 form-2 31-12-2009.pdf | 2009-12-31 |
| 27 | 3250-CHE-2009-OTHERS-051015.pdf | 2016-04-19 |
| 27 | 3250-che-2009 form-3 31-12-2009.pdf | 2009-12-31 |
| 28 | 3250-CHE-2009-Form 6-051015.pdf | 2016-04-19 |
| 28 | 3250-che-2009 form-5 31-12-2009.pdf | 2009-12-31 |
| 29 | 3250-CHE-2009-Correspondence-FORM-6-051015.pdf | 2016-04-19 |
| 29 | 3250-che-2009 request for postdating 21-12-2009.pdf | 2009-12-21 |