This invention relates generally to package delivery and, more specifically, to crowdsourced package delivery.
As an increasing number of customers shop remotely (e.g., online or over the phone), the number of packages delivered by retailers increases. Package delivery is not an insignificant cost to retailers. While retailers might prefer to pass these delivery costs on to the customers, customers often expect free or low-cost shipping options. Consequently, to remain competitive and encourage customers to shop more frequently, whether in a brick-and-mortar facility or remotely, retailers are seeking new low-cost shipping options. One such option is crowdsourced delivery. Crowdsourced delivery however poses problems that shipping with established carriers does not. For example, while it may be safe to assume that all employees of established carriers have proper certifications to deliver packages containing regulated or controlled items, such an assumption may not be as well-founded with crowdsourced delivery agents. Consequently, a need exists for a system that can create delivery plans with crowdsourced delivery agents which ensures that the crowdsourced delivery agents have the proper certifications.
Disclosed herein are embodiments of systems, apparatuses and methods pertaining to creating a crowdsourced delivery plan. This description includes drawings, wherein:
Elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. Certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. The terms and expressions used herein have the ordinary technical meaning as is accorded to such terms and expressions by persons skilled in the technical field as set forth above except where different specific meanings have otherwise been set forth herein.
Generally speaking, pursuant to various embodiments, systems, apparatuses, and methods are provided herein useful to creating a crowdsourced delivery plan. In some embodiments, a system for creating a crowdsourced delivery plan for a package comprises a certification system, the certification system configured to receive, from a retailer, an indication of items included in the package, determine, based on the indication of items included in the package, a set of requirements, and transmit, to a plurality of portable devices, information regarding the delivery, each of the plurality of portable devices configured to receive, from the certification system, the information regarding the delivery, transmit, to the certification system, an acceptance of the delivery, wherein only ones of the plurality of portable devices associated with delivery agents meeting the set of requirements is capable of acceptance of the delivery, receive, in response to the transmission of the acceptance of the delivery, an authorization, and present, at a pickup point, the authorization.
As previously discussed, the frequency with which customers shop remotely is increasing. Accordingly, shipping costs for retailers are increasing with the increased number of packages that must be delivered to the customers shopping remotely. While crowdsourced delivery may decrease some of these costs, it also poses new problems. For example, state or federal law may require that a delivery agent have certain certifications to deliver regulated items, such as alcohol, pharmaceuticals, firearms, etc. While established carriers (e.g., USPS, UPS, FedEx, etc.) may have plans and contingencies in place for delivery of such items, crowdsourced systems and methods lack many of these controls. Accordingly, embodiments described herein seek to minimize or eliminate these issues via a system that determines a set of requirements for delivery and ensures that only those crowdsourced delivery agents meeting those requirements are able to deliver the packages. The discussion of
Introduction:
Before the system presents delivery opportunities to delivery agents, the retailer transmits a notification informing the system of the delivery. The notification includes information regarding the package (i.e., the package to be delivered). The information can include an indication of items included in the package, as well as other delivery instructions, such as an address, timing requirements, etc. The items in the package may have restrictions on delivery agents that can deliver the package. The restrictions can be set by retailer policy, law, or any other suitable source. For example, if one of the items in the package is a firearm, the retailer, or law, may require that the person delivering the package have certain certifications, such as not being a convicted felon or having a special license (e.g., a license to carry a firearm or a license to deliver a firearm). The certifications can be of any suitable type or quality, such as age (i.e., age of the delivery agent), ratings (e.g., ratings received by previous customers, retailers, or certification systems), ability to use the item (e.g., a certification that the delivery agent is capable of demonstrating use of the item), ability to install the item (e.g., a certification that the delivery agent is capable of installing the item), criminal history, medical history, education, type of vehicle used for delivery, length of delivery experience, etc. As discussed in more detail with regard to
After receiving the indication of the items included in the package, the system determines a set of requirements for the delivery agent. As discussed in more detail below, dependent upon the embodiment, the certification system or the portable device 102 determines the set of requirements. The set of requirements is dependent upon the items in the package and specifies the type(s), if any, of certification required of the delivery agent. In either embodiment, the delivery agent associated with the portable device 102 is only capable of accepting the delivery if the delivery agent associated with the portable device 102 meets the set of requirements. For example, the certification may only transmit potential deliveries to portable devices associated with delivery agents that meet the set of requirements, or the portable device 102 may only present potential deliveries for which the delivery agent associated with the portable device 102 meets the set of requirements. The delivery agent can view and select deliveries via the portable device 102.
The user interface presented by the portable device 102 depicted in
While the discussion of
Blockchain Technology:
Distributed database and shared ledger database generally refer to methods of peer-to-peer record keeping and authentication in which records are kept at multiple nodes in the peer-to-peer network instead of kept at a trusted party. A blockchain may generally refer to a distributed database that maintains a growing list of records in which each block contains a hash of some or all previous records in the chain to secure the record from tampering and unauthorized revision. A hash generally refers to a derivation of original data. In some embodiments, the hash in a block of a blockchain may comprise a cryptographic hash that is difficult to reverse and/or a hash table. Blocks in a blockchain may further be secured by a system involving one or more of a distributed timestamp server, cryptography, public/private key authentication and encryption, proof standard (e.g. proof-of-work, proof-of-stake, proof-of-space), and/or other security, consensus, and incentive features. In some embodiments, a block in a blockchain may comprise one or more of a data hash of the previous block, a timestamp, a cryptographic nonce, a proof standard, and a data descriptor to support the security and/or incentive features of the system.
In some embodiments, a blockchain system comprises a distributed timestamp server comprising a plurality of nodes configured to generate computational proof of record integrity and the chronological order of its use for content, trade, and/or as a currency of exchange through a peer-to-peer network. In some embodiments, when a blockchain is updated, a node in the distributed timestamp server system takes a hash of a block of items to be timestamped and broadcasts the hash to other nodes on the peer-to-peer network. The timestamp in the block serves to prove that the data existed at the time in order to get into the hash. In some embodiments, each block includes the previous timestamp in its hash, forming a chain, with each additional block reinforcing the ones before it. In some embodiments, the network of timestamp server nodes performs the following steps to add a block to a chain: 1) new activities are broadcasted to all nodes, 2) each node collects new activities into a block, 3) each node works on finding a difficult proof-of-work for its block, 4) when a node finds a proof-of-work, it broadcasts the block to all nodes, 5) nodes accept the block only if activities are authorized, and 6) nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash. In some embodiments, nodes may be configured to consider the longest chain to be the correct one and work on extending it. A digital currency implemented on a blockchain system is described by Satoshi Nakamoto in “Bitcoin: A Peer-to-Peer Electronic Cash System” (http://bitcoin.org/bitcoin.pdf), the entirety of which is incorporated herein by reference.
Now referring to
In some embodiments, blocks may contain rules and data for authorizing different types of actions and/or parties who can take action. In some embodiments, transaction and block forming rules may be part of the software algorithm on each node. When a new block is being formed, any node on the system can use the prior records in the blockchain to verify whether the requested action is authorized. For example, a block may contain a public key of an owner of an asset that allows the owner to show possession and/or transfer the asset using a private key. Nodes may verify that the owner is in possession of the asset and/or is authorized to transfer the asset based on prior transaction records when a block containing the transaction is being formed and/or verified. In some embodiments, rules themselves may be stored in the blockchain such that the rules are also resistant to tampering once created and hashed into a block. In some embodiments, the blockchain system may further include incentive features for nodes that provide resources to form blocks for the chain. For example, in the Bitcoin system, “miners” are nodes that compete to provide proof-of-work to form a new block, and the first successful miner of a new block earns Bitcoin currency in return.
Now referring to
Now referring to
In step 401, a node receives a new activity. The new activity may comprise an update to the record being kept in the form of a blockchain. In some embodiments, for blockchain supported digital or physical asset record keeping, the new activity may comprise a asset transaction. In some embodiments, the new activity may be broadcasted to a plurality of nodes on the network prior to step 401. In step 402, the node works to form a block to update the blockchain. In some embodiments, a block may comprise a plurality of activities or updates and a hash of one or more previous block in the blockchain. In some embodiments, the system may comprise consensus rules for individual transactions and/or blocks and the node may work to form a block that conforms to the consensus rules of the system. In some embodiments, the consensus rules may be specified in the software program running on the node. For example, a node may be required to provide a proof standard (e.g. proof of work, proof of stake, etc.) which requires the node to solve a difficult mathematical problem for form a nonce in order to form a block. In some embodiments, the node may be configured to verify that the activity is authorized prior to working to form the block. In some embodiments, whether the activity is authorized may be determined based on records in the earlier blocks of the blockchain itself.
After step 402, if the node successfully forms a block in step 405 prior to receiving a block from another node, the node broadcasts the block to other nodes over the network in step 406. In some embodiments, in a system with incentive features, the first node to form a block may be permitted to add incentive payment to itself in the newly formed block. In step 420, the node then adds the block to its copy of the blockchain. In the event that the node receives a block formed by another node in step 403 prior to being able to form the block, the node works to verify that the activity recorded in the received block is authorized in step 404. In some embodiments, the node may further check the new block against system consensus rules for blocks and activities to verify whether the block is properly formed. If the new block is not authorized, the node may reject the block update and return to step 402 to continue to work to form the block. If the new block is verified by the node, the node may express its approval by adding the received block to its copy of the blockchain in step 420. After a block is added, the node then returns to step 401 to form the next block using the newly extended blockchain for the hash in the new block.
In some embodiments, in the event one or more blocks having the same block number is received after step 420, the node may verify the later arriving blocks and temporarily store these block if they pass verification. When a subsequent block is received from another node, the node may then use the subsequent block to determine which of the plurality of received blocks is the correct/consensus block for the blockchain system on the distributed database and update its copy of the blockchain accordingly. In some embodiments, if a node goes offline for a time period, the node may retrieve the longest chain in the distributed system, verify each new block added since it has been offline, and update its local copy of the blockchain prior to proceeding to step 401.
Now referring to
Now referring to
With the scheme shown in
Now referring to
The control circuit 712 may comprise a processor, a microprocessor, and the like and may be configured to execute computer readable instructions stored on a computer readable storage memory 713. The computer readable storage memory may comprise volatile and/or non-volatile memory and have stored upon it a set of computer readable instructions which, when executed by the control circuit 712, causes the node 710710 update the blockchain 714 stored in the memory 713 based on communications with other nodes 710710 over the network 720. In some embodiments, the control circuit 712 may further be configured to extend the blockchain 714 by processing updates to form new blocks for the blockchain 714. Generally, each node may store a version of the blockchain 714, and together, may form a distributed database. In some embodiments, each node 710710 may be configured to perform one or more steps described with reference to
The network interface 711 may comprise one or more network devices configured to allow the control circuit to receive and transmit information via the network 720. In some embodiments, the network interface 711 may comprise one or more of a network adapter, a modem, a router, a data port, a transceiver, and the like. The network 720 may comprise a communication network configured to allow one or more nodes 710710 to exchange data. In some embodiments, the network 720 may comprise one or more of the Internet, a local area network, a private network, a virtual private network, a home network, a wired network, a wireless network, and the like. In some embodiments, the system does not include a central server and/or a trusted third party system. Each node in the system may enter and leave the network at any time.
With the system and processes shown in, once a block is formed, the block cannot be changed without redoing the work to satisfy census rules thereby securing the block from tampering. A malicious attacker would need to provide proof standard for each block subsequent to the one he/she seeks to modify, race all other nodes, and overtake the majority of the system to affect change to an earlier record in the blockchain.
In some embodiments, blockchain may be used to support a payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Bitcoin is an example of a blockchain backed currency. A blockchain system uses a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions. Generally, a blockchain system is secure as long as honest nodes collectively control more processing power than any cooperating group of attacker nodes. With a blockchain, the transaction records are computationally impractical to reverse. As such, sellers are protected from fraud and buyers are protected by the routine escrow mechanism.
In some embodiments, a blockchain may use to secure digital documents such as digital cash, intellectual property, private financial data, chain of title to one or more rights, real property, digital wallet, digital representation of rights including, for example, a license to intellectual property, digital representation of a contractual relationship, medical records, security clearance rights, background check information, passwords, access control information for physical and/or virtual space, and combinations of one of more of the foregoing that allows online interactions directly between two parties without going through an intermediary. With a blockchain, a trusted third party is not required to prevent fraud. In some embodiments, a blockchain may include peer-to-peer network timestamped records of actions such as accessing documents, changing documents, copying documents, saving documents, moving documents, or other activities through which the digital content is used for its content, as an item for trade, or as an item for remuneration by hashing them into an ongoing chain of hash-based proof-of-work to form a record that cannot be changed in accord with that timestamp without redoing the proof-of-work.
In some embodiments, in the peer-to-peer network, the longest chain proves the sequence of events witnessed, proves that it came from the largest pool of processing power, and that the integrity of the document has been maintained. In some embodiments, the network for supporting blockchain based record keeping requires minimal structure. In some embodiments, messages for updating the record are broadcast on a best-effort basis. Nodes can leave and rejoin the network at will and may be configured to accept the longest proof-of-work chain as proof of what happened while they were away.
In some embodiments, a blockchain based system allows content use, content exchange, and the use of content for remuneration based on cryptographic proof instead of trust, allowing any two willing parties to employ the content without the need to trust each other and without the need for a trusted third party. In some embodiments, a blockchain may be used to ensure that a digital document was not altered after a given timestamp, that alterations made can be followed to a traceable point of origin, that only people with authorized keys can access the document, that the document itself is the original and cannot be duplicated, that where duplication is allowed and the integrity of the copy is maintained along with the original, that the document creator was authorized to create the document, and/or that the document holder was authorized to transfer, alter, or otherwise act on the document.
As used herein, in some embodiments, the term blockchain may refer to one or more of a hash chain, a hash tree, a distributed database, and a distributed ledger. In some embodiments, blockchain may further refer to systems that uses one or more of cryptography, private/public key encryption, proof standard, distributed timestamp server, and inventive schemes to regulate how new blocks may be added to the chain. In some embodiments, blockchain may refer to the technology that underlies the Bitcoin system, a “sidechain” that uses the Bitcoin system for authentication and/or verification, or an alternative blockchain (“altchain”) that is based on bitcoin concept and/or code but are generally independent of the Bitcoin system.
Descriptions of embodiments of blockchain technology are provided herein as illustrations and examples only. The concepts of the blockchain system may be variously modified and adapted for different applications.
While the discussion of
Additional Details Regarding a System for Creating Crowdsourced Delivery Plans:
By one optional approach the control circuit 808 operably couples to a memory. The memory may be integral to the control circuit 808 or can be physically discrete (in whole or in part) from the control circuit 808 as desired. This memory can also be local with respect to the control circuit 808 (where, for example, both share a common circuit board, chassis, power supply, and/or housing) or can be partially or wholly remote with respect to the control circuit 808 (where, for example, the memory is physically located in another facility, metropolitan area, or even country as compared to the control circuit 808).
This memory can serve, for example, to non-transitorily store the computer instructions that, when executed by the control circuit 808, cause the control circuit 808 to behave as described herein. As used herein, this reference to “non-transitorily” will be understood to refer to a non-ephemeral state for the stored contents (and hence excludes when the stored contents merely constitute signals or waves) rather than volatility of the storage media itself and hence includes both non-volatile memory (such as read-only memory (ROM) as well as volatile memory (such as an erasable programmable read-only memory (EPROM).
When the retailer 802 wishes to ship a package via crowdsourced delivery agent, the retailer 802 transmits a notification to the certification system 804. The notification contains an indication of items included in the package. Additionally, the notification can include other delivery information, such as delivery addresses, delivery instructions, timing requirements, retailer and/or customer preferences, etc. The certification system 804 transmits this information, as information regarding the delivery, to the portable devices 806.
In a first embodiment, the certification system 804 ensures that only delivery agents capable of delivering the package (i.e., those that meet the set of requirements for the package) can accept the delivery. In such embodiments, the certification system 804 determines a set of requirements. The set of requirements is based on the items included in the package and indicate the certifications required of the delivery agent. After determining the set of requirements, the certification system 804 transmits the information regarding the delivery only to ones of the portable devices 806 that are associated with delivery agents meeting the set of requirements. Accordingly, only the ones of the portable devices 806 that are associated with delivery agents that meet the set of requirements will receive the information. Because only the ones of the portable devices 806 that are associated with delivery agents that meet the set of requirements will receive the information, only delivery agents that meet the set of requirements can accept the delivery. The certification system 804 determines which delivery agents (and associated portable devices 806) are capable of delivering the package by referencing a list, or in some embodiments, a blockchain, or both. For example, the list can include indications of delivery agents and associated portable devices 806 and the blockchain can include certifications for each of the delivery agents.
In a second embodiment, the certification system transmits the information regarding the delivery to all of the portable devices 806. In such embodiments, the portable devices 806 ensure that only delivery agents meeting the set of requirements can accept the delivery. That is, an application running on the portable devices 806 ensures that only delivery agents meeting the set of requirements can accept the delivery. The portable devices 806, after receiving the information regarding the delivery, determine whether the delivery agent associated with the portable device 806 is capable of delivering the package. For example, the portable devices 806 can reference a list or blockchain to determine if the delivery agent associated with the portable device 806 meets the set of requirements. The portable devices 806 can prevent delivery agents that are not capable of delivering the package from accepting the delivery in any suitable manner. For example, the portable devices 806 may only present the delivery to the delivery agents that are capable of delivering the package (i.e., if a delivery agent does not meet the set of requirements, the portable device 806 associated with the delivery agent will not present the potential delivery), can make deliveries for which delivery agents are not capable unselectable, etc.
After receiving the information regarding the delivery, the portable devices 806 presents the potential deliveries to the delivery agents. As one example, the portable devices 806 can present the potential deliveries to the delivery agents via a user interface, such as a touchscreen graphical user interface (GUI). An application running on the portable devices 806 can generate the user interface. From the user interface, the delivery agents can view different potential deliveries, view information about the potential deliveries, and accept potential deliveries. When a delivery agent selects a potential delivery, the portable device 806 transmits an acceptance of the delivery. The portable device 806 can transmit the acceptance of the delivery to the certification system 804 and/or the retailer 802.
After transmitting the acceptance, the portable device 806 receives an authorization. The portable device 806 receives the authorization from the certification system 804 and/or the retailer 802, dependent upon where the acceptance was sent. The authorization is a code or identifier that allows the delivery agent to retrieve the package. For example, the authorization can be a code (an alphabetic code, a numeric code, an alphanumeric code, a two- or three-dimensional barcode (i.e., a quick response (“QR”) code), an auditory code, or a transmittable code (e.g., a radiofrequency (“RF”) code). The authorization can include information identifying the delivery agent, the retailer, certifications required to deliver the package, delivery information for the package, etc. Additionally, the authorization can be unique to the delivery agent and/or the portable device 806 so that only a portable device 806 containing the correct authorization can retrieve the package. In some embodiments, the authorizations can also be tracked in a blockchain.
While the discussion of
At block 902, an indication of items in a package is received. For example, a system comprising a certification system and portable devices can receive the indication of the items. Specifically, the certification system can receive the indication of the items from a retailer seeking a crowdsourced delivery agent. The indication of the items can be included in a notification of a delivery request. In addition to the indication of the items, the certification system can receive delivery information, such as addresses, timing requirements, delivery instructions, etc. The flow continues at block 904.
At block 904, a set of requirements is determined. For example, the certification system and/or portable devices can determine the set of requirements. The system determines the set of requirements based on the items included in the package. The set of requirements is based on certifications required to deliver the items in the package. The certifications can be of any suitable type or quality, such as age (i.e., age of the delivery agent), ratings (e.g., ratings received by previous customers, retailers, or certification systems), ability to use the item (e.g., a certification that the delivery agent is capable of demonstrating use of the item), ability to install the item (e.g., a certification that the delivery agent is capable of installing the item), criminal history, medical history, education, etc. The flow continues at block 906.
At block 906, information regarding the delivery is transmitted. For example, the certification system transmits the information regarding the delivery to the portable devices. The information regarding the delivery includes the set of restrictions (if determined by the certification system) as well as information relevant to delivery of the package (e.g., addresses, timing requirements, preferences, etc.). The flow continues at block 908.
At block 908, information regarding the delivery is received. For example, the portable devices can receive the information regarding the delivery. The flow continues at block 910.
At block 910, acceptance of the delivery is transmitted. For example, one, or more, of the portable devices transmits the acceptance of the delivery. The acceptance can be delivered to the certification system, the retailer, or both. After receiving the information regarding the delivery, the portable device presents the delivery agent with information about the delivery. The delivery agent reviews the information about the delivery and can choose whether to accept the delivery. In some embodiments, the delivery agent can only accept the delivery if he or she meets the set of requirements (i.e., has the requisite certifications to deliver the package). The flow continues at block 912.
At block 912, an authorization is received. For example, the portable device receives the authorization. The portable device receives the authorization from the certification system and/or the retailer. The authorization is a code or identifier that allows the delivery agent to retrieve the package. For example, the authorization can be a code (an alphabetic code, a numeric code, an alphanumeric code, a two- or three-dimensional barcode (i.e., a quick response (“QR”) code), an auditory code, or a transmittable code (e.g., a radiofrequency (“RF”) code). The authorization can include information identifying the delivery agent, the retailer, certifications required to deliver the package, delivery information for the package, etc. In some embodiments, the authorization is based on a cryptographic hash. Additionally, the authorization can be unique to the delivery agent and/or the portable device so that only a portable device containing the correct authorization can retrieve the package. The flow continues at block 914.
At block 914, the authorization is presented at a pickup point. For example, the delivery agent can present, via the portable device, the authorization. In some embodiments, the pickup is automated and presentation of the authorization causes delivery of the package to the delivery agent.
At block 1002, a presentation of an authorization is received. For example, a delivery agent can present, via his or her mobile device, the authorization. Because the authorization allows the delivery agent to retrieve the item, it is important to ensure that the person presenting the authorization is indeed the delivery agent. While the authorization provides a certain level of security (i.e., the authorization is only provided to a delivery agent capable of delivering the items), it may be susceptible to imitation. For example, an unauthorized person may steal or otherwise acquire the authorization. The flow continues at block 1004.
At block 1004, the location of the delivery agent to whom the authorization was transmitted is determined. For example, if Delivery Agent A accepted the delivery and in turn received the authorization, the system determines the location of Delivery Agent A. The flow continues at decision diamond 1006.
At decision diamond 1006, the location of the delivery agent to whom the authorization was transmitted is determined. If the location of the delivery agent to whom the authorization was transmitted is confirmed (i.e., the delivery agent is in the proper location to retrieve the item), the flow continues at block 1008. However, if at decision diamond 1006, the location of the delivery agent to whom the authorization was transmitted is not confirmed, the flow continues at block 1010.
At block 1008, retrieval of the item is allowed. Because the location of the delivery agent to whom the authorization was transmitted was confirmed, the delivery agent will be permitted to retrieve the item.
As previously discussed, if at decision diamond 1006, the location of the delivery agent to whom the authorization was transmitted is not confirmed, the flow continues at block 1010. At block 1010, retrieval of the item is not allowed. For example, when the authorization is presented at the pharmacy, Delivery Agent A (from the example above) is not at the pharmacy. Because Delivery Agent A is not at the pharmacy, it is assumed that whoever is presenting the authorization is doing so fraudulently. Consequently, this person will not be permitted to retrieve the item.
At block 1102, a request to deliver an item is received. For example, a delivery agent can transmit the request to deliver the item via a mobile device. The request can be explicit or implicit (e.g., the request is triggered when an item is scanned for delivery). The flow continues at block 1104.
At block 1104, a location of a recipient is determined. For example, the system determines the location of the person to whom the item is to be delivered. The system can make this determination based, for example, on a location of the recipient's mobile device. The flow continues at decision diamond 1106.
At decision diamond 1106, it is determined whether the recipient is in the delivery location. That is, it is determined whether the recipient's location can be confirmed. The recipient's location is confirmed if the recipient is in the correct location for the delivery (e.g., at his or her home or office, at the delivery location, etc.). If the recipient's location is confirmed, the flow continues at block 1108. However, if the recipient's location is not confirmed, the flow continues at block 1110.
At block 1108, a confirmation is transmitted to the delivery agent. For example, the system can transmit the confirmation to the delivery agent's mobile device. The confirmation indicates that the recipient's location has been confirmed and that the delivery agent can deliver the item.
As previously discussed, if the recipient's location is not confirmed, the flow continues at block 1110. At block 1110, an instruction to refuse delivery is transmitted to the delivery agent. For example, the system can transmit the instruction to refuse delivery to the delivery agent's mobile device. Because the recipient's location has not been confirmed, the delivery agent should not deliver the item.
While the discussion thus far describes retailers delivering to customers, in some embodiments, the system described herein can be used to facilitate deliveries from the customers to the retailer. In other words, the customer takes the role of the retailer in that the customer, for example, via a computer transmits a notification to the system indicating that the customer would like a package to be delivered to the retailer. Such embodiments are useful for returning purchased items, disposing of materials (e.g., hazardous materials), etc.
Those skilled in the art will recognize that a wide variety of other modifications, alterations, and combinations can also be made with respect to the above described embodiments without departing from the scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
In some embodiments, a system for creating a crowdsourced delivery plan for a package comprises a certification system, the certification system configured to receive, from a retailer, an indication of items included in the package, determine, based on the indication of items included in the package, a set of requirements, and transmit, to a plurality of portable devices, information regarding the delivery, each of the plurality of portable devices configured to receive, from the certification system, the information regarding the delivery, transmit, to the certification system, an acceptance of the delivery, wherein only ones of the plurality of portable devices associated with delivery agents meeting the set of requirements is capable of acceptance of the delivery, receive, in response to the transmission of the acceptance of the delivery, an authorization, and present, at a pickup point, the authorization.
In some embodiments, a system and a corresponding method performed by the system comprises receiving, at a certification system from a retailer, an indication of items included in a package, determining, based on the indication of the items included in the package, a set of requirements, transmitting, to a plurality of portable devices, information regarding a delivery, receiving, from the certification system, the information regarding the delivery, transmitting, to the certification system, an acceptance of the delivery, wherein only ones of the plurality of portable devices associated with delivery agents meeting the set of requirements is capable of acceptance of the delivery, receiving, in response to the transmission of the acceptance of the delivery, an authorization, and presenting, at a pickup point, the authorization.
This application claims the benefit of U.S. Provisional Application No. 62/439,329, filed Dec. 27, 2016, which is incorporated by reference in its entirety herein.
Number | Name | Date | Kind |
---|---|---|---|
6195005 | Maloney | Feb 2001 | B1 |
6240362 | Gaspard, II | May 2001 | B1 |
6253129 | Jenkins | Jun 2001 | B1 |
6385537 | Gaspard, II | May 2002 | B2 |
6411897 | Gaspard, II | Jun 2002 | B1 |
6806807 | Cayne | Oct 2004 | B2 |
7113071 | Cayne | Sep 2006 | B2 |
7257552 | Franco | Aug 2007 | B1 |
7339469 | Braun | Mar 2008 | B2 |
7840427 | O'Sullivan | Nov 2010 | B2 |
7945469 | Cohen | May 2011 | B2 |
7945470 | Cohen | May 2011 | B1 |
8160972 | Tannenbaum | Apr 2012 | B1 |
8195496 | Gottlieb | Jun 2012 | B2 |
8554694 | Ward | Oct 2013 | B1 |
8560461 | Tian | Oct 2013 | B1 |
8626540 | Peterkofsky | Jan 2014 | B2 |
9066206 | Lin | Jun 2015 | B2 |
9202191 | Bowen | Dec 2015 | B2 |
9230292 | Amin | Jan 2016 | B2 |
9230372 | Kadaba | Jan 2016 | B2 |
9242810 | Lossov | Jan 2016 | B2 |
9269103 | Kumar | Feb 2016 | B1 |
9305310 | Radhakrishnan | Apr 2016 | B2 |
9378479 | Seifen | Jun 2016 | B2 |
9459622 | Abhyanker | Oct 2016 | B2 |
9460524 | Curlander | Oct 2016 | B1 |
9639908 | Reiss | May 2017 | B1 |
9718397 | Kalanick | Aug 2017 | B2 |
9721224 | Waris | Aug 2017 | B2 |
9778057 | O'Mahony | Oct 2017 | B2 |
9792574 | Lord | Oct 2017 | B2 |
9805536 | Lutnick | Oct 2017 | B2 |
9811838 | Daire | Nov 2017 | B1 |
9852551 | Brinig | Dec 2017 | B2 |
9902310 | Fournier | Feb 2018 | B2 |
9904900 | Cao | Feb 2018 | B2 |
9928540 | Gerard | Mar 2018 | B1 |
9934530 | Iacono | Apr 2018 | B1 |
20020019759 | Arunapuram | Feb 2002 | A1 |
20030040944 | Hileman | Feb 2003 | A1 |
20030046173 | Benjier | Mar 2003 | A1 |
20040015393 | Fong | Jan 2004 | A1 |
20040069850 | De Wilde | Apr 2004 | A1 |
20040075557 | Selwyn | Apr 2004 | A1 |
20040236635 | Publicover | Nov 2004 | A1 |
20060026030 | Jacobs | Feb 2006 | A1 |
20060232412 | Tabacman | Oct 2006 | A1 |
20070112647 | Borders | May 2007 | A1 |
20070185598 | Ortega | Aug 2007 | A1 |
20070192111 | Chasen | Aug 2007 | A1 |
20080183526 | Hancock | Jul 2008 | A1 |
20080189146 | Salloum | Aug 2008 | A1 |
20090326808 | Blanton | Dec 2009 | A1 |
20110059693 | O'Sullivan | Mar 2011 | A1 |
20120030133 | Rademaker | Feb 2012 | A1 |
20130144428 | Irwin | Jun 2013 | A1 |
20140025524 | Sims | Jan 2014 | A1 |
20140058902 | Taylor | Feb 2014 | A1 |
20140164126 | Nicholas | Jun 2014 | A1 |
20140229258 | Seriani | Aug 2014 | A1 |
20140236856 | Baykhurazov | Aug 2014 | A1 |
20140278634 | Horvitz | Sep 2014 | A1 |
20140278851 | Kopanati | Sep 2014 | A1 |
20140278875 | Ganesh | Sep 2014 | A1 |
20140330428 | Wolfe | Nov 2014 | A1 |
20150046298 | Zwakhals | Feb 2015 | A1 |
20150081360 | Sun | Mar 2015 | A1 |
20150081581 | Gishen | Mar 2015 | A1 |
20150094876 | Baldwin | Apr 2015 | A1 |
20150106292 | Robinson | Apr 2015 | A1 |
20150161563 | Mehrabi | Jun 2015 | A1 |
20150199632 | Chander | Jul 2015 | A1 |
20150206093 | Trew | Jul 2015 | A1 |
20150227890 | Bednarek | Aug 2015 | A1 |
20150242829 | Bhaskaran | Aug 2015 | A1 |
20150310388 | Jamthe | Oct 2015 | A1 |
20150339625 | Agasti | Nov 2015 | A1 |
20150347961 | Gillen | Dec 2015 | A1 |
20150348173 | Gillen | Dec 2015 | A1 |
20150363843 | Loppatto | Dec 2015 | A1 |
20160012391 | Burnett | Jan 2016 | A1 |
20160019669 | Gopalakrishnan | Jan 2016 | A1 |
20160048804 | Paul | Feb 2016 | A1 |
20160071056 | Ellison | Mar 2016 | A1 |
20160078394 | Fuldner | Mar 2016 | A1 |
20160086128 | Geiger | Mar 2016 | A1 |
20160096508 | Oz | Apr 2016 | A1 |
20160104112 | Gorlin | Apr 2016 | A1 |
20160104113 | Gorlin | Apr 2016 | A1 |
20160155072 | Prodromidis | Jun 2016 | A1 |
20160180274 | Zwakhals | Jun 2016 | A1 |
20160189098 | Beaurepaire | Jun 2016 | A1 |
20160195404 | Prasad | Jul 2016 | A1 |
20160210591 | Lafrance | Jul 2016 | A1 |
20160225115 | Levy | Aug 2016 | A1 |
20160282466 | Epler | Sep 2016 | A1 |
20160328678 | Gillen | Nov 2016 | A1 |
20160350701 | Brehm | Dec 2016 | A1 |
20160364678 | Cao | Dec 2016 | A1 |
20160364679 | Cao | Dec 2016 | A1 |
20160364812 | Cao | Dec 2016 | A1 |
20160364823 | Cao | Dec 2016 | A1 |
20160379167 | Raman | Dec 2016 | A1 |
20170032341 | Johnsrud | Feb 2017 | A1 |
20170083862 | Loubriel | Mar 2017 | A1 |
20170089710 | Slusar | Mar 2017 | A1 |
20170091891 | Van Der Berg | Mar 2017 | A1 |
20170124510 | Catering | May 2017 | A1 |
20170140326 | Rhyu | May 2017 | A1 |
20170220966 | Wang | Aug 2017 | A1 |
20170236088 | Rao | Aug 2017 | A1 |
20170310770 | Samaan | Oct 2017 | A1 |
20170351994 | Waris | Dec 2017 | A1 |
20180096414 | Iacono | Apr 2018 | A1 |
20180174087 | Wilkinson | Jun 2018 | A1 |
20180174262 | Wilkinson | Jun 2018 | A1 |
20180365638 | Chen | Dec 2018 | A1 |
20190066251 | Samocha | Feb 2019 | A1 |
Number | Date | Country |
---|---|---|
10331356 | Feb 2005 | DE |
2004307210 | Nov 2004 | JP |
2000008287 | Feb 2000 | WO |
2001075746 | Oct 2001 | WO |
2015084688 | Jun 2015 | WO |
Entry |
---|
Gross, June. “Air2Web Delivers Solution to UPS—Customers Wanted UPS to Go Wireless-Now Tracking Packages Is Its Killer App.” VARbusiness 17.8 (2001): 34-PG34. Print. (Year: 2001). |
PCT; App. No. PCT /US2017/068400; International Search Report and Written Opinion dated Mar. 29, 2018. |
U.S. Appl. No. 15/843,817, filed Dec. 15, 2017, Bruce W. Wilkinson. |
U.S. Appl. No. 15/843,857, filed Dec. 15, 2017, Bruce W. Wilkinson. |
PCT; App. No. PCT/US2017/066589; International Search Report and Written Opinion dated Mar. 7, 2018. |
PCT; App. No. PCT/US2017/066593; International Search Report and Written Opinion dated Mar. 8, 2018. |
USPTO; U.S. Appl. No. 15/843,857; Office Action dated Jun. 23, 2021; (pp. 1-35). |
USPTO; U.S. Appl. No. 15/843,817; Office Action dated May 19, 2020, (pp. 1-33). |
USPTO; U.S. Appl. No. 15/843,817; Office Action dated Dec. 20, 2019; (pp. 1-25). |
USPTO; U.S. Appl. No. 15/843,857; Office Action dated Jan. 14, 2021; (pp. 1-39). |
USPTO; U.S. Appl. No. 15/843,857; Office Action dated Mar. 17, 2020; (pp. 1-6). |
USPTO; U.S. Appl. No. 15/843,857; Office Action dated Sep. 25, 2020; (pp. 1-32). |
USPTO; U.S. Appl. No. 15/843,857; Final Rejection dated Mar. 1, 2022; (pp. 1-38). |
Number | Date | Country | |
---|---|---|---|
20180181904 A1 | Jun 2018 | US |
Number | Date | Country | |
---|---|---|---|
62439329 | Dec 2016 | US |