Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM, LOCKING DEVICE, AND A METHOD FOR FACILITATING SECURE ACCESS OF GOODS AND FACILITIES BASED ON GEOLOCATION
Document Type and Number:
WIPO Patent Application WO/2019/150397
Kind Code:
A1
Abstract:
Present disclosure relates to techniques for configuring a locking device to be installed on a package to be delivered from a source location to a destination location. Said techniques discuss receiving 5 (302) first input data from a first authorized user of the locking device, storing (304) the location coordinates of the source and destination locations and the at least one unique identifier, and locking (306) the locking device based on the first input data. It further discusses tracking (308) location information traversed by the locking device from source location to the destination location, receiving (310) second input data from a second authorized user of the locking device at the 10 destination location, and unlocking (312) the locking device if at least: the tracked location information matches the location coordinates of the destination location; and the second input data matches the at least one identifier.

Inventors:
SRIDHAR RAJAGOPAL (IN)
RUPA SRIDHAR (IN)
Application Number:
PCT/IN2019/050081
Publication Date:
August 08, 2019
Filing Date:
February 04, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SRIDHAR RAJAGOPAL IYENGAR (IN)
RUPA SRIDHAR (IN)
International Classes:
G01C21/00; G06Q10/08; G01S19/00
Foreign References:
US20090135015A12009-05-28
US20040178880A12004-09-16
Attorney, Agent or Firm:
SRIHARI, Saragur, Kasturirangan et al. (IN)
Download PDF:
Claims:
The Claims:

1. A locking device configurable to be installed on a package to be delivered from a source location to a destination location, said locking device comprising: a user interface configured to receive first input data from a first authorized user of the locking device at the source location, wherein the first input data comprises location coordinates of the source and destination locations and at least one unique identifier; a memory configured to store the location coordinates of the source and destination locations and the at least one unique identifier; a processor in communication with the user interface and the memory, and configured to lock the locking device based on the first input data; and a GPS system in communication with the processor and configured to track location information traversed by the locking device from the source location to the destination location; wherein the user interface is further configured to receive second input data from a second authorized user of the locking device at the destination location; and wherein the processor is further configured to unlock the locking device if at least: the tracked location information matches the location coordinates of the destination location stored in the memory; and the second input data matches the at least one identifier stored in the memory.

2. The locking device of claim 1 , wherein the at least one unique identifier is selected from a group comprising: a phone number of the second authorized user; b employee code of the second authorized user; and c unique identification code associated with the second authorized user.

3. The locking device of claim 1, further comprising: a transceiver in communication with a remote server, the transceiver configured to transmit the first input data and the tracked location information to a remote server.

4. The locking device of claim 1 , wherein the transceiver is configured to receive the location coordinates of the source location and/or destination location from a mobile device of the first authorized user; and wherein the memory is configured to store the received location coordinates of the source location and/or destination location.

5. The locking device of claim 1, further comprising: a biometric unit configured to authenticate the second authorized user; and wherein the processor is further configured to unlock the locking device if the authentication of second authorized user is successful.

6. The locking device of claim 1, wherein the package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

7. A secure delivery system, comprising:

at least one locking device configurable to be installed on at least one package to be delivered from a source location to a destination location, each of the said at least one locking device comprising: a user interface configured to receive first input data from a first authorized user of the respective locking device at the source location, wherein the first input data comprises location coordinates of the source and destination locations and at least one unique identifier; a memory configured to store the location coordinates of the source and destination locations and the at least one unique identifier received from the first authorized user of the respective locking device; a processor in communication with the user interface and the memory and configured to lock the respective locking device based on the respective first input data; a GPS system in communication with the processor and configured to track location information traversed by the respective locking device from the source location to the destination location; and a transceiver in communication with the processor and the GPS system and configured to transmit the first input data and the tracked location information of the respective locking device; and a server in communication with the transceiver of each of the locking device and configured to receive the first input data and the tracked location information for each of the locking device; wherein the user interface of the respective locking device is further configured to receive second input data from a second authorized user of the respective locking device at the destination location; and wherein the processor of the respective locking device is further configured to unlock the respective locking device if at least: the tracked location information of the respective locking device matches the location coordinates of the destination location stored in the memory of the respective locking device; and the second input data matches the at least one identifier stored in the memory of the

respective locking device.

8. The secure delivery system of claim 7, wherein the at least one unique identifier is selected from a group comprising: a phone number of the second authorized user; b employee code of the second authorized user; and c unique identification associated with the second authorized user.

9. The secure delivery system of claim 7, wherein the transceiver of each of the locking device is configured to receive the location coordinates of the source location and/or destination location from a mobile device of the first authorized user of the respective locking device; and wherein the memory of each of the locking device is configured to store the location coordinates of the source location and/or destination location received from the first authorized user of the respective locking device.

10. The secure delivery system of claim 7, wherein the processor of the respective locking device is further configured to unlock the respective locking device based on authentication of the second authorized user.

11. The secure delivery system of claim 10, wherein: each of the locking device further comprises a biometric unit for authenticating the second authorized user; wherein each of the biometric unit is configured to: receive biometric data of the second authorized user from the respective locking device; and transmit the biometric data to the server; wherein the server is configured to: determine a match between the biometric data and the at least one unique identifier to authenticate the second authorized user.

12. The secure delivery system of claim 7, wherein the package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

13. A method for configuring a locking device to be installed on a package to be delivered from a source location to a destination location, said method comprising: receiving first input data from a first authorized user of the locking device at the source location, wherein the first input data comprises location coordinates of the source and destination locations and at least one unique identifier; storing the location coordinates of the source and destination locations and the at least one unique identifier; locking the locking device based on the first input data; tracking location information traversed by the locking device from the source location to the destination location; receiving second input data from a second authorized user of the locking device at the destination location; and unlocking the locking device if at least: the tracked location information matches the location coordinates of the destination location; and the second input data matches the at least one identifier.

14. The method of claim 13, wherein the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user; b) employee code of the second authorized user; and c) unique identification associated with the second authorized user.

15. The method of claim 13, further comprising: transmitting the first input data and the tracked location information to a remote server.

16. The method of claim 13, further comprising receiving the location coordinates of the source location and/or destination location from a mobile device of the first authorized user; and storing the received location coordinates of the source location and/or destination location.

17. The method of claim 13, further comprising: authenticating the second authorized user; and unlocking the locking device if the authentication of second authorized user is successful.

18. The method of claim 13, wherein the package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

19. A method for secure delivery, comprising:

installing at least one locking device on at least one package to be delivered from a source location to a destination location; receiving first input data from a first authorized user of a respective locking device at the source location, wherein the first input data comprises location coordinates of the source and destination locations and at least one unique identifier; storing the location coordinates of the source and destination locations and the at least one unique identifier received from the first authorized user of the respective locking device; locking the respective locking device based on the respective first input data; tracking location information traversed by the respective locking device from the source location to the destination location; transmitting the first input data and the tracked location information of the respective locking device; receiving the first input data and the tracked location information for each of the locking device; receiving second input data from a second authorized user of the respective locking device at the destination location; and unlocking the respective locking device if at least: the tracked location information of the respective locking device matches the stored location coordinates of the destination location of the respective locking device; and the second input data matches the stored at least one identifier of the respective locking device.

20. The method of claim 19, wherein the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user;

b) employee code of the second authorized user; and c) unique identification associated with the second authorized user.

21. The method of claim 19, further comprising: receiving the location coordinates of the source location and/or destination location from a mobile device of the first authorized user of the respective locking device; and storing the location coordinates of the source location and/or destination location received from the first authorized user of the respective locking device.

22. The method of claim 19, wherein unlocking the respective locking device further comprises: unlocking the respective locking device based on authentication of the second authorized user. 23. The method of claim 22, wherein: authenticating the second authorized user comprises: receiving biometric data of the second authorized user from the respective locking device; transmitting the biometric data; and determining a match between the biometric data and the at least one unique identifier to authenticate the second authorized user.

24. The method of claim 19, wherein the package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

25. The secure delivery system of claim 12, further comprising: at least one level sensor and at least one viscosity sensor mounted inside the container for measuring level and viscosity values of the petroleum products and alcohol products respectively; wherein the at least one level sensor and the at least one viscosity sensor communicate with the transceiver of the at least one locking device for sending the measured level and viscosity values; and wherein the processor of the at least one locking device compares the received level and viscosity values with a level threshold and a viscosity threshold respectively and generate an alert if there is a deviation from the thresholds.

26. The secure delivery system of claim 12, further comprising: at least one level sensor and at least one viscosity sensor mounted inside the container for measuring level and viscosity values of the petroleum products and alcohol products respectively; wherein the at least one level sensor and the at least one viscosity sensor communicate with the transceiver of the at least one locking device for sending the measured level and viscosity values to the server; and wherein the server compares the received level and viscosity values with a level threshold and a viscosity threshold respectively and generate an alert if there is a deviation from the thresholds.

Description:
“A SYSTEM, LOCKING DEVICE, AND A METHOD FOR FACILITATING SECURE ACCESS OF GOODS AND FACILITIES BASED ON GEOLOCATION”

FIELD OF INVENTION:

[0001] The present disclosure is related to security of goods, and more particularly, but not exclusively to a locking device, a secure delivery system and methods for facilitating physical security and access to goods.

BACKGROUND OF THE INVENTION:

[0002] Security of goods, be it a household goods or consumer goods, is an essential part of our day to day life. For example, in logistics or cargo transport environment, the primary issue faced by dealers or manufacturers is security of the goods which is to be delivered at a particular location. It becomes highly likely that the dealers or manufacturers may face pilferage issues while movement of the goods from source/origin location to target/destination location.

[0003] The goods may be an inventory material, a consumer package, or any liquid, for example gasoline, petrol or diesel or any other liquid. The goods are theft or stolen in such a small quantity that it becomes impossible to notice any difference between actual amount and delivered amount.

[0004] In the cargo transportation environment, a vehicle carrying the goods moves through several locations, that goods stolen even in small quantity results in a huge amount till the vehicle reaches to the destination. For example, when a driver of the vehicle starts the journey, he/she may take several halts for various reasons such as to take rest by parking the vehicle in garage. During such halt, there are chances that owner of that garage may try to steal the goods stored in the vehicle by unauthorized means. Such stealing may be done in absence or even in presence of the driver.

[0005] Presently, locks are generally used to minimize such stealing of the goods. These locks may be password enabled locks which allows authorized person to access the goods stored in the vehicle. However, these passwords enabled locks are also prone to be attacked by hackers/thieves who are expert in unlocking the passwords.

[0006] Thus, there exists a need in the art to provide a security mechanism which can protect the goods from being stolen in the cargo transportation environment or in last mile delivery. OBJECTS OF THE INVENTION:

[0007] An object of the present invention is to provide physical security to the goods by implementing location based locking mechanism.

[0008] Another object of the present invention is to improve dealer’s and customer’s experience by preventing the quantity and quality of the goods from being hampered.

SUMMARY OF THE INVENTION:

[0009] The present disclosure overcomes one or more shortcomings of the prior art and provides additional advantages discussed throughout the present disclosure. Additional features and advantages are realized through the techniques of the present disclosure. Other embodiments and aspects of the disclosure are described in detail herein and are considered a part of the claimed disclosure.

[0010] In one non- limiting embodiment of the present disclosure, a locking device is disclosed. The locking device is configurable to be installed on a package to be delivered from a source location to a destination location. The locking device comprising a user interface configured to receive first input data from a first authorized user of the locking device at the source location. The first input data comprises location coordinates of the source and destination locations and at least one unique identifier. The locking further comprising a memory configured to store the location coordinates of the source and destination locations and the at least one unique identifier, a processor in communication with the user interface and the memory, which is configured to lock the locking device based on the first input data, and a GPS system in communication with the processor, which is configured to track location information traversed by the locking device from the source location to the destination location. The user interface is further configured to receive second input data from a second authorized user of the locking device at the destination location. The processor is further configured to unlock the locking device if at least: the tracked location information matches the location coordinates of the destination location stored in the memory, and the second input data matches the at least one identifier stored in the memory.

[0011] In still non- limiting embodiment of the present disclosure, the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user, b) employee code of the second authorized user, and c) unique identification code associated with the second authorized user. The package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

[0012] In yet another non- limiting embodiment of the present disclosure, the locking device further comprising a transceiver in communication with a remote server, the transceiver configured to transmit the first input data and the tracked location information to a remote server. The transceiver is configured to receive the location coordinates of the source location and/or destination location from a mobile device of the first authorized user, and the memory is configured to store the received location coordinates of the source location and/or destination location.

[0013] In yet another non-limiting embodiment of the disclosure, the locking device further comprising a biometric unit configured to authenticate the second authorized user. The processor is configured to unlock the locking device if the authentication of second authorized user is successful.

[0014] In yet another non- limiting embodiment of the present disclosure, a secure delivery system is disclosed. The secure delivery system comprising at least one locking device configurable to be installed on at least one package to be delivered from a source location to a destination location. Each of the at least one locking device comprises a user interface configured to receive first input data from a first authorized user of the respective locking device at the source location, the first input data comprises location coordinates of the source and destination locations and at least one unique identifier. Each of the at least one locking device comprises a memory configured to store the location coordinates of the source and destination locations and the at least one unique identifier received from the first authorized user of the respective locking device, a processor in communication with the user interface and the memory and configured to lock the respective locking device based on the respective first input data, a GPS system in communication with the processor and configured to track location information traversed by the respective locking device from the source location to the destination location, and a transceiver in communication with the processor and the GPS system and configured to transmit the first input data and the tracked location information of the respective locking device. The secure delivery system further comprises a server in communication with the transceiver of each of the locking device and configured to receive the first input data and the tracked location information for each of the locking device. The user interface of the respective locking device is further configured to receive second input data from a second authorized user of the respective locking device at the destination location. The processor of the respective locking device is further configured to unlock the respective locking device if at least: the tracked location information of the respective locking device matches the location coordinates of the destination location stored in the memory of the respective locking device; and the second input data matches the at least one identifier stored in the memory of the respective locking device.

[0015] In yet another non-limiting embodiment of the present disclosure, the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user, b) employee code of the second authorized user, and c) unique identification code associated with the second authorized user. The package includes cost sensitive products, time sensitive products, a container carrying petroleum products and alcohol products, or a cargo that needs to be protected from tampering or pilferage.

[0016] In yet another non- limiting embodiment of the present disclosure, the transceiver of each of the locking device is configured to receive the location coordinates of the source location and/or destination location from a mobile device of the first authorized user of the respective locking device. The memory of each of the locking device is configured to store the location coordinates of the source location and/or destination location received from the first authorized user of the respective locking device.

[0017] In yet another non-limiting embodiment of the present disclosure, the processor of the respective locking device is further configured to unlock the respective locking device based on authentication of the second authorized user.

[0018] In yet another non- limiting embodiment of the present disclosure, each of the locking device further comprises a biometric unit for authenticating the second authorized user. Each of the biometric unit is configured to receive biometric data of the second authorized user from the respective locking device and transmit the biometric data to the server. The server is configured to determine a match between the biometric data and the at least one unique identifier to authenticate the second authorized user. In yet another non-limiting embodiment, the secure delivery system further comprises at least one level sensor and at least one viscosity sensor mounted inside the container for measuring level and viscosity values of the petroleum products and alcohol products respectively. The at least one level sensor and the at least one viscosity sensor communicate with the transceiver of the at least one locking device for sending the measured level and viscosity values. The processor of the at least one locking device compares the received level and viscosity values with a level threshold and a viscosity threshold respectively and generate an alert if there is a deviation from the thresholds. In yet another non-limiting embodiment, the at least one level sensor and the at least one viscosity sensor communicate with the transceiver of the at least one locking device for sending the measured level and viscosity values to the server, and the server compares the received level and viscosity values with a level threshold and a viscosity threshold respectively, and generate an alert if there is a deviation from the thresholds.

[0019] In yet another non- limiting embodiment of the present disclosure, a method for configuring a locking device is disclosed. The locking device is to be installed on a package to be delivered from a source location to a destination location. The method comprising receiving first input data from a first authorized user of the locking device at the source location, the first input data comprises location coordinates of the source and destination locations and at least one unique identifier, storing the location coordinates of the source and destination locations and the at least one unique identifier, locking the locking device based on the first input data, tracking location information traversed by the locking device from the source location to the destination location, receiving second input data from a second authorized user of the locking device at the destination location, and unlocking the locking device if at least: the tracked location information matches the location coordinates of the destination location, and the second input data matches the at least one identifier.

[0020] In yet another non-limiting embodiment of the present disclosure, the method further comprising transmitting the first input data and the tracked location information to a remote server, receiving the location coordinates of the source location and/or destination location from a mobile device of the first authorized user, and storing the received location coordinates of the source location and/or destination location.

[0021] In yet another non- limiting embodiment of the present disclosure, the method further comprising authenticating the second authorized user, and unlocking the locking device if the authentication of second authorized user is successful.

[0022] In yet another non-limiting embodiment of the present disclosure, a method for secure delivery is disclosed. The method comprises installing at least one locking device on at least one package to be delivered from a source location to a destination location, receiving first input data from a first authorized user of a respective locking device at the source location, wherein the first input data comprises location coordinates of the source and destination locations and at least one unique identifier, storing the location coordinates of the source and destination locations and the at least one unique identifier received from the first authorized user of the respective locking device, locking the respective locking device based on the respective first input data, tracking location information traversed by the respective locking device from the source location to the destination location, transmitting the first input data and the tracked location information of the respective locking device, receiving the first input data and the tracked location information for each of the locking device, receiving second input data from a second authorized user of the respective locking device at the destination location; and unlocking the respective locking device if at least: the tracked location information of the respective locking device matches the stored location coordinates of the destination location of the respective locking device; and the second input data matches the stored at least one identifier of the respective locking device.

[0023] In yet another non-limiting embodiment of the present disclosure, the method further comprising receiving the location coordinates of the source location and/or destination location from a mobile device of the first authorized user of the respective locking device and storing the location coordinates of the source location and/or destination location received from the first authorized user of the respective locking device.

[0024] In yet another non-limiting embodiment of the present disclosure, the unlocking the respective locking device further comprises unlocking the respective locking device based on authentication of the second authorized user. The authenticating the second authorized user comprises receiving biometric data of the second authorized user from the respective locking device, transmitting the biometric data, and determining a match between the biometric data and the at least one unique identifier to authenticate the second authorized user.

[0025] The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description.

BRIEF DESCRIPTION OF DRAWINGS:

[0026] The features, nature, and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken conjunction with the drawings in which like reference characters identify correspondingly throughout. Some embodiments of system and/or methods in accordance with embodiments of the present subject matter are now described, by way of example only, and with reference to the accompanying figures, in which: [0027] Fig. 1 shows a block diagram illustrating a locking device for facilitating the secure transport of packages or goods, in accordance with an embodiment of the present disclosure;

[0028] Fig. 2a illustrates a secure delivery system for facilitating the secure transport of packages or goods, in accordance with another embodiment of the present disclosure; and fig. 2b shows a block diagram illustrating a server for facilitating the secure transport of packages or goods, in accordance with another embodiment of the present disclosure;

[0029] Fig. 3 illustrate a flowchart of an exemplary method for configuring a locking device, according to an embodiment of the present invention;

[0030] Fig. 4 illustrates a flowchart of an exemplary method for secure delivery, according to an embodiment of the present invention;

[0031] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams and the like represent various processes which may be substantially represented in computer readable medium and executed by a computer or processor, whether or not such computer or processor is explicitly shown.

DETAILED DESCRIPTION OF DRAWINGS:

[0032] In the present document, the word“exemplary” is used herein to mean“serving as an example, instance, or illustration.” Any embodiment or implementation of the present subject matter described herein as“exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.

[0033] While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternative falling within the scope of the disclosure.

[0034] The terms“comprises”,“comprising”,“include(s)”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a setup, system or method that comprises a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup or system or method. In other words, one or more elements in a system or apparatus proceeded by“comprises... a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or apparatus.

[0035] In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.

[0033] Fig. 1 shows a block diagram illustrating a locking device 100 for facilitating the secure transport of packages or goods, in accordance with an embodiment of the present disclosure.

[0034] In one embodiment of the present invention, the locking device 100 comprises a user interface 102, a memory 104, a processor 106, a GPS system 108, a transceiver 110, and a biometric unit 112, in communication with each other. The locking device 100 is configurable to be installed on a package to be delivered from a source location to a destination location. The user interface 102 is configured to receive first input data from a first authorized user of the locking device 100 at the source location. The first input data comprises location coordinates of the source and destination locations and at least one unique identifier. In another embodiment of the present disclosure, the transceiver 110 is configured to receive the location coordinates of the source location and/or destination location from a mobile device of the first authorised user. In yet another embodiment of the present disclosure, the first authorized may specify the route to be followed between the source location and the destination location. The memory 104 is configured to store the location coordinates of the source and destination locations and the at least one unique identifier. The first authorized user of the locking device 100 is authenticated by the biometric unit 112 using biometric input data of the first authorized user.

[0035] The processor 106 is configured to lock the locking device 100 based at least on the first input data. The processor 106 is configured to lock the locking device 100 further in response to the first authorized user pressing the lock button displayed on the user interface 102 of the locking device 100 after the first input data is entered. The GPS system 108 is configured to continuously track location information traversed by the locking device 100 from the source location to the destination location. The GPS system 108 tracks the location information traversed by the locking device 100 based on the signals received from a plurality of satellites. The GPS system 108 tracks the location information traversed by the locking device 100 at each instance of time from source location to the destination location, by real-time monitoring. The GPS system 108 continuously monitors the movement of the locking device 100 from source location to the destination location. The processor 106 is further configured to send notification to the authorized users of the locking device 100, in response to change in the route mentioned or specified by the first authorized user in the first input data. The transceiver 110 is configured to transmit the first input data and the tracked location information of the locking device 100 to a remote server in communication with the locking device 100.

[0036] In the same embodiment of the present disclosure, the user interface 102 is configured to receive second input data from a second authorized user of the locking device at the destination location. The processor 106 is further configured to unlock the locking device if at least the following conditions are met: the tracked location information matches the location coordinates of the destination location stored in the memory 104, and the second input data matches the at least one identifier stored in the memory 104.

[0037] In another embodiment, the biometric unit 112 is configured to authenticate the second authorized user. In order to authenticate of the second authorized user, the biometric unit 112 is configured to receive a biometric data from the second authorized user. The received biometric data is transmitted to a remote server via the transceiver 110. The transceiver 110 is configured to receive a verification signal from the remote server which indicates that the second authorized user is an authenticated user of the locking device 100. The processor 106 is further configured to unlock the locking device 100 if the authentication of second authorized user is successful. The biometric data may comprise at least one of: fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent of the second authorized user.

[0038] In the same embodiment of the present disclosure, the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user, b) employee code of the second authorized user, and c) unique identification code associated with the second authorized user. The unique identification code may be any of, but not limited to, password, date of birth, email address, bank account number, vehicle registration number, house registration number, etc. [0039] In the same embodiment of the present disclosure, the package includes cost sensitive products, time sensitive products, petroleum products, alcohol products, or any cargo that needs to be protected from tampering or pilferage. The cost sensitive products include iPhones, gold, fuels, expensive automotive parts etc. The time sensitive products include medicinal products, food and beverages, exam question papers, moveable bank lockers with expensive products etc. The locking device 100 may be installed on the package of the each of the cost and time sensitive products or on a container containing a plurality of packages to be delivered to a same destination location or different destination locations. In another embodiment, the locking device may be installed on the inlet/outlet value of the tank or container carrying fluid.

[0040] In yet another embodiment of the present disclosure, the tank carrying the fluid may further include a level sensor and a viscosity sensor in communication with the locking device 100. The level sensor is configured to detect spillage of fluid from the tank or container. The viscosity sensor is configured to detect adulteration of the fluid, which was done to compensate for the stolen quantity of fluid. The processor 106 in communication with the level sensor and a viscosity sensor is configured to generate an alert for the authorized users to indicate the tampering of the fluid present in the tank.

[0041] In another embodiment of the present disclosure, the user interface 102 of the locking device 100 is configured to display the current location of the locking device 100 at all instance of time, based on the tracked location information. In yet another embodiment, the user interface 102 is configured to display the alert generated by the processor 106.

[0042] Fig. 2a illustrates a secure delivery system 200 for facilitating the secure transport of packages or goods, in accordance with another embodiment of the present disclosure.

[0043] In one embodiment of the present disclosure, the secure delivery system 200 comprises at least one locking device 202 and a server 204 in communication with each other. Each of the at least one locking device 202 comprises a user interface, a memory, a processor, a GPS system, a transceiver, and a biometric unit, in communication with each other. The at least one locking device 202 is configurable to be installed on at least one package to be delivered from a source location 210 to a destination location 214 or different destination locations 214. In other words, the destination location may be same or different for different packages or goods. [0044] In the same embodiment of the present disclosure, each user interface is configured to receive first input data from a first authorized user 208 of the respective locking device at the source location 210. The first input data comprises location coordinates of the source and destination locations and at least one unique identifier. The first input data comprising the location coordinates of the source location 210 and destination location 212, and the at least one unique identifier is stored the memory of the respective locking device 202. In another embodiment of the present invention, the transceiver of each of the locking device 202 is configured to receive the location coordinates of the source location and/or destinations location from a mobile device of the first authorised user of the respective locking device 202. In yet another embodiment of the present disclosure, the respective first authorized 208 may specify the route to be followed between the source location and the destination location. The memory of each of the locking device 202 is configured to store the location coordinates of the source location and/or destinations location that corresponds to the respective locking device 202. The first authorized user of the respective locking device is authenticated by the biometric unit using biometric input data of the first authorized user.

[0045] In the same embodiment of the present disclosure, the processor is configured to lock the respective locking device 202 based at least on the respective first input data. The processor is configured to lock the locking device further in response to the first authorized user pressing the lock button displayed on the user interface of the respective locking device after the first input data is entered. The GPS system is configured to track location information traversed by the respective locking device 202 from the source location 210 to the destination location 214. The GPS system tracks the location information traversed by the respective locking device 202 based on the signals received from a plurality of satellites 206. The GPS system tracks the location information traversed by the respective locking device 202 at each instance of time from source location to the destination location by real-time monitoring. The GPS system continuously monitors the movement of the respective locking device 220 from source location to the destination location. The transceiver is configured to transmit the respective first input data and the tracked location information of the respective locking device 202 to the server 204. The processor is further configured to send notification to the respective authorized users of the corresponding locking device 202, in response to change in the route mentioned or specified by the first authorized user in the first input data As shown in fig. 2b, the server 204 includes a transceiver 216 configured to receive the first input data and the tracked location information for each of the locking device 202. The server 204 also includes a database 218 for storing the first input data and location information for each of the locking device. Also, in an embodiment the processor of each of the locking device may forward the exact time of locking the device to the server 204. The database 218 of the server 204 is in communication with a processor 220 which resides at the server 204. The user interface of the respective locking device 202 is further configured to receive second input data from a second authorized user 209 of the respective locking device 202 at the destination location.

[0046] In the same embodiment of the present disclosure, the processor of the respective locking device 202 is further configured to unlock the respective locking device 202 if at least the following conditions are met: the tracked location information of the respective locking device 202 matches the location coordinates of the destination location stored in the memory of the respective locking device 202 and the second input data matches the at least one identifier stored in the memory of the respective locking device 202.

[0047] In another embodiment, the biometric unit is configured to authenticate the second authorized user 209 of the respective locking device 202. In order to authenticate of the second authorized user 209, the biometric unit is configured to receive biometric data from the second authorized user 209 of the respective locking device 202. The received biometric data is transmitted to the server 204 via the transceiver. The processor 220 of the server 204 is configured to determine a match between the biometric data and the at least one unique identifier to authenticate the second authorized user 209 of the respective locking device 202. The transceiver 216 of the server 204 is further configured to transmit a verification signal to the respective locking device 202. The transceiver of the respective locking device 202 is configured to receive the verification signal from the server 202 which indicates that the second authorized user 209 is an authenticated user of the respective locking device 202. The processor 106 is further configured to unlock the respective locking device 202 if the authentication of second authorized user 209 is successful. The biometric data may comprise at least one of: fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent of the second authorized user 209 of the respective locking device 202.

[0048] In another embodiment of the present disclosure, the at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user 209 of the respective locking device 202, b) employee code of the second authorized user 209 of the respective locking device 202, and c) unique identification code associated with the second authorized user 209 of the respective locking device 202. The unique identification code may be any of, but not limited to, password, date of birth, email address, bank account number, vehicle registration number, house registration number, etc. The package includes cost sensitive products, time sensitive products, petroleum products, alcohol products, or any cargo that needs to be protected from tampering or pilferage. The cost sensitive products include iPhones, gold, fuels, expensive automotive parts etc. The time sensitive products include medicinal products, food and beverages, exam question papers, moveable bank lockers with expensive products etc. The respective locking device 202 may be installed on the package of the each of the cost and time sensitive products or on a container containing a plurality of packages to be delivered to a same destination location. In another embodiment, the respective locking device 202 may be installed on the inlet/outlet value of the tank or container carrying fluid (petroleum products and alcohol products).

[0049] In yet another embodiment of the present disclosure, the first authorized user may input a level threshold and a viscosity threshold for the fluid present inside the tank via the user interface of the locking device. The locking device is configured to store the level threshold and the viscosity threshold for the fluid present inside the tank. In another embodiment the locking device may send the level threshold and the viscosity threshold for the fluid present inside the tank to the server for storing and the server is configured to store the level threshold and the viscosity threshold in the database local to the server. The tank carrying the fluid may further include a level sensor and a viscosity sensor mounted at appropriate location and in communication with the locking device. The level sensor is configured to detect spillage of fluid from the tank or container through a hole or opening made in the tank. The viscosity sensor is configured to detect adulteration of the fluid, which was done to compensate for the stolen quantity of fluid through a hole or opening made in the tank. The processor of the locking device is in communication with the level sensor and the viscosity sensor and is configured to receive measured level and viscosity values and compare the received level and viscosity values with a level threshold and a viscosity threshold respectively and generate an alert if there is a deviation from the thresholds. In another embodiment, the processor 220 of the server 220 compares the received level and viscosity values with a level threshold and a viscosity threshold respectively, generates an alert if there is a deviation from the thresholds, and sends an alert to the user interface of the locking device or to the authorized users to indicate the tampering of the fluid present in the tank.

[0050] In another embodiment of the present disclosure, the user interface of the respective locking device 202 is configured to display the current location of the locking device 100 at all instance of time, based on the tracked location information. In yet another embodiment, the user interface is configured to display the alert generated by the processor.

[0051] Fig. 3 illustrate a flowchart of an exemplary method for configuring a locking device, according to an embodiment of the present invention.

[0052] In one embodiment of the present disclosure, the method 300 for configuring a locking device to be installed on a package to be delivered from a source location to a destination location is disclosed. The destination location may be same or different for different packages or goods.

[0053] At block 302, first input data is received from a first authorized user of the locking device at the source location. The first input data comprises location coordinates of the source and destination locations and at least one unique identifier. The location coordinates of the source location and/or destination location may also be received from a mobile device of the first authorized user. The at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user, b) employee code of the second authorized user, and c) unique identification associated with the second authorized user. The unique identification code may be any of, but not limited to, password, date of birth, email address, bank account number, vehicle registration number, house registration number, etc. In another embodiment of the present disclosure, the route to be followed between the source location and the destination location is also defined in the first input data. The first authorized user of the locking device is authenticated by using biometric input data of the first authorized user.

[0054] At block 304, the location coordinates of the source and destination locations and the at least one unique identifier is stored in the memory. At block 306, the locking device is locked based at least on the first input data. The locking device is locked further in response to the first authorized user pressing the lock button displayed on the user interface of the locking device after the first input data is entered.

[0055] At block 308, location information traversed by the locking device from the source location to the destination location is tracked by the GPS system of the locking device. The tracked location information is simultaneously displayed on the user interface of the locking device. The tracked location information along with the first input data may also be transmitted to a remote server for docketing. In response to change in the route mentioned or specified by the first authorized user in the first input data, a notification is sent to the authorized users of the locking device. At block 310, second input data is received from a second authorized user of the locking device at the destination location. At block 312, the locking device is unlocked if at least: the tracked location information matches the location coordinates of the destination location, and the second input data matches the at least one identifier.

[0056] In another embodiment, the second authorized user is authenticated using a biometric unit. In order to authenticate of the second authorized user, the biometric unit receives a biometric data from the second authorized user. The biometric data is transmitted to a remote server via the transceiver. The locking device then receives a verification signal from the remote server which indicates that the second authorized user is an authenticated user of the locking device. The locking device is unlocked if the authentication of second authorized user is successful. The biometric data may comprise at least one of: fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent of the second authorized user. The steps of method 300 may be performed in an order different from the order described above.

[0057] Fig. 4 illustrates a flowchart of an exemplary method for secure delivery, according to an embodiment of the present invention.

[0058] In one embodiment of the present disclosure, the method 400 for secure delivery is disclosed.

[0059] At block 402, at least one locking device is installed on at least one package to be delivered from a source location to a destination location. The destination location may be same or different for different packages or goods. At block 404, first input data is received from a first authorized user of the respective locking device at the source location. The first input data comprises location coordinates of the source and destination locations and at least one unique identifier that corresponds to the respective locking device. The location coordinates of the source location and/or destination location may also be received from a mobile device of the first authorized user of the respective locking device. In another embodiment of the present disclosure, the route to be followed between the source location and the destination location is also defined in the first input data. The at least one unique identifier is selected from a group comprising: a) phone number of the second authorized user of the respective locking device, b) employee code of the second authorized user of the respective locking device, and c) unique identification associated with the second authorized user of the respective locking device. The unique identification code may be any of, but not limited to, password, date of birth, email address, bank account number, vehicle registration number, house registration number, etc. The first authorized user of the respective locking device is authenticated using biometric input data of the first authorized user.

[0060] At block 406, the location coordinates of the source and destination locations and the at least one unique identifier of the respective locking device is stored. At block 408, the locking device is locked based at least on the first input data of the respective locking device. The locking device is locked further in response to the first authorized user of the respective locking device pressing the lock button displayed on the user interface of the locking device after the first input data is entered.

[0061] At block 410, location information traversed by the respective locking device from the source location to the destination location is tracked by the GPS system of the respective locking device. The tracked location information is simultaneously displayed on the user interface of the respective locking device. At block 412, the tracked location information along with the first input data of the respective locking device is transmitted to a server. In response to change in the route mentioned or specified by the first authorized user in the first input data, a notification is sent to the authorized users of the respective locking device. At block 414, the first input data and the tracked location information for each of the locking device is received by the server and stored. At block 416, second input data is received from a second authorized user of the respective locking device at the destination location.

[0062] At block 418, the respective locking device is unlocked if at least: the tracked location information of the respective locking device matches the location coordinates of the destination location stored in the memory of the respective locking device and the second input data matches the at least one identifier stored in the memory of the respective locking device.

[0063] In another embodiment, the second authorized user of the respective locking device of the respective locking device is authenticated using a biometric unit. In order to authenticate of the second authorized user, biometric data is received from the second authorized user of the respective locking device. The received biometric data is transmitted to the server. The server determines a match between the biometric data and the at least one unique identifier to authenticate the second authorized user of the respective locking device. A verification signal is transmitted to the respective locking device. The respective locking device receives the verification signal indicates that the second authorized user is an authenticated user of the respective locking device. The respective locking device is unlocked if the authentication of second authorized user is successful. The biometric data may comprise at least one of: fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent of the second authorized user of the respective locking device. The steps of method 400 may be performed in an order different from the order described above.

[0064] The user interface 102 may include at least one of a key input means, such as a keyboard or keypad, a touch input means, such as a touch sensor or touchpad, a sound source input means, a camera, or various sensors, and the user interface 102 may include a gesture input means. Further, the user interface 102 may include all types of input means that are being currently in development or are to be developed in the future. The user interface 102 may receive information from the user through the touch panel of the display and transfer the inputted information to the processor 106.

[0065] The memory 104 may maintain software maintained and/or organized in loadable code segments, modules, applications, programs, etc., which may be referred to herein as software modules. Each of the software modules may include instructions and data that, when installed or loaded on the processor 106 and executed by the processor 106, contribute to a run-time image that controls the operation of the processors 106. When executed, certain instructions may cause the processor 106 to perform functions in accordance with certain methods, algorithms and processes described herein.

[0066] The illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments. Also, the words“comprising,”“having,” “containing,” and“including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms“a,”“an,” and “the” include plural references unless the context clearly dictates otherwise. [0067] Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term“computer- readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., are non- transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.

[0068] Suitable processors include, by way of example, a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) circuits, any other type of integrated circuit (IC), and/or a state machine.




 
Previous Patent: AUTOMOBILE HEADLIGHT ASSEMBLY

Next Patent: A WIRELESS ECG PATCH