The present invention is related generally to secured storage of physical items and, more specifically, remote retrieval and insertion/deposit of physical items from and to a user-specific secured container.
Secure storage of items is typically provided by secured containers, such as safe deposit boxes located within a secure area, such as a vaulted area of a financial institution. Such safety deposit boxes provide challenges from both the user (i.e., safety deposit box holder) and the provider (i.e., financial institution or the like) perspective. From the user perspective, since access to the safe deposit requires entry into a vaulted area, in most instances the user is required to make an appointment in order to access their safety deposit box. However, appointment requirements may not be advantageous to the user's time constraints, if they desire to immediately retrieve items from or add items to the safe deposit box. From the provider perspective, undesirable overhead costs are associated with maintaining safety deposit boxes in vaulted areas, such as manpower requires to check-in the user prior to vault entry as well as manpower to open the vault and, in some instances, accompany or assist the user inside the vaulted area with safe deposit box entry. Moreover, in certain instances the space within a vaulted area allocated to safety deposit boxes must be maintained to allow for user access.
Therefore, a need exists to allow for users to remotely access secure containers, such as safe deposit boxes or the like. In desired instances the remote access should self-service remote access, which allows for the user to retrieve items from the secure container/safe deposit box or place items into the secure container/safe deposit absent assistance by the secure container provider or other entity providing the secure area at which the secure container/safe deposit box is located. Moreover, the desired remote access should provide a certain level of privacy such that the user can retrieve items from the secure container/safe deposit box or place items into the secure container/safe deposit without other individuals being aware of the items being retrieved from or placed into the secured container/safe deposit box.
The following presents a simplified summary of one or more embodiments of the invention in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments and is intended to neither identify key or critical elements of all embodiments, nor delineate the scope of any or all embodiments. Its sole purpose is to present some concepts of one or more embodiments in a simplified form as a prelude to the more detailed description that is presented later.
Embodiments of the present invention provide for systems, methods, computer program products and the like provide for remote access to secured containers, such as safe deposit boxes or the like. Remote access is made possible by a user interface apparatus, such as an Automated Teller Machine (ATM) or dedicated kiosk device which has an associated receptacle for receiving physical items delivered from and to the remote secured container, such as a safety deposit box.
The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier (i.e., safety deposit box number) and access credentials for gaining access to the secured area (e.g., vaulted area, warehouse or the like) and/or the secured container.
According to specific embodiments of the present invention, delivery of the physical items to and from the user interface device's receptacle and the secure container is accomplished by a robotic mechanism, which may be guided on a rail system or otherwise an autonomous robotic mechanism that can navigate between the receptacle and the secured container. The robotics mechanism includes an image-capturing device which is used to capture images of physical items as they are delivered to the secure container, to allow for cataloging the physical items according to their images and user assigned identifier/name. In this regard, when a user desires to retrieve a specific item from the secure container, the image capturing device scans the contents of the secure container and image recognition techniques are used to identify the physical item whose image matches the identifier/name of the item as provided by the user.
In specific embodiments of the invention, privacy is provided to the user at the user interface device is provided by a display utilizing privacy glass. Specifically, in response to the user selecting delivery of items to or from the secured container, the privacy glass is invoked to change the transparency or opacity of the display, thereby creating a secure/private region proximate to the user interface apparatus.
A system for remote retrieval and insertion of contents from/within user-specific secured containers defines first embodiments of the invention. The system includes a user interface apparatus, which in specific embodiments of the system, may comprise an Automated Teller Machine (ATM), a stand-alone kiosk or another such apparatus. The user interface apparatus includes a receptacle configured to (i) receive first physical items from a user for storage in a user-specific secured container, and (ii) deliver second physical items to the user that have been retrieved from the user-specific secured container. The user-specific secured container is located in a secured area that is co-located with the user interface apparatus. In specific embodiments of the system, the user-specific secured container is a safe/safety deposit box and the secured area is a vaulted area, such as a financial institution vault. In other embodiments of the system, the secured area is a secured warehouse and the secured container is a bin or some other conventional container. In such embodiments of the system, the user interface apparatus, which may comprise an ATM or kiosk is co-located at the vaulted area, such as at the financial institution or at the secure warehouse or the like.
The user interface apparatus includes a first computing platform having a first memory, one or more first computing device processors in communication with the first memory and a display in communication with at least one of the one or more computing processor devices. The memory of first computing platform stores a user interface application that is configured to receive, from a user, user credentials (e.g., passcode, personal data or the like) that are associated with (i) an identifier (e.g., a number or the like) of the user-specific secured container, and (ii) security credentials (e.g., passcode or other means for “unlocking”) for accessing at least one of (a) the secured area and (b) the user-specific secured container. In response to receiving the user credentials, user interface application validates the user credentials to authenticate the user and verify that the user is associated with a user-specific secured container.
In response to validating the user credentials, the user interface application is configured to provide, via the display, user interfaces configured to allow the user to perform at least one (i) add one or more first physical items to the user-specific secured container by placing the one or more first physical items in the receptacle, and (ii) receive, via the receptacle, delivery of one or more second physical items from the user-specific secured container. In this regard, the user interfaces provide the user options for adding physical items (e.g., valuables, documents or the like) to the to the user-specific secured container by placing the one or more first physical items in the receptacle through placement of the physical items in the receptacle and receiving delivery, via the receptacle, of physical items currently stored user-specific secured container
In specific embodiments the system further comprises a robotic mechanism including a second computing platform having a second memory and one or more second computing device processors in communication with the second memory. The second memory of second computing platform stores physical item retrieval and delivery engine that is configured to receive (i) the identifier of the user-specific secured container, and (ii) the security credentials, and (1) based on the security credentials, provide access to at least one of (a) the secured area, and (b) the user-specific secured container, and (2) based on the identifier of the user-specific secured container, implement the robotics mechanism to remove from the receptacle one or more first physical items and deliver the one or more first physical items to the user-specific secured container.
In further related embodiments of the system, the user interface application is further configured to receive a first user input that comprises a first identifier (e.g., a name or the like) for each of the one or more first physical items being added to the user-specific secure container and the item retrieval and delivery engine is further configured to receive the first identifiers for each of the one or more first physical items. In such embodiments of the system, the robotics mechanism includes an image capturing device that is configured to capture one or more images of each of the one or more first physical items and store the one or more images in a database that catalogs the one or more images according to the first identifier of a corresponding first physical item.
In other related embodiments of the system, the physical item retrieval and delivery engine is further configured to receive (iii) via the user interface application user instructions to configured to retrieve (a) at least a portion of the user-specific secured container (e.g., entire container or a specific section/compartment of the container) or (b) one or more specified second physical items from the user-specific secured container. Based on the identifier of the user-specific secured container, the implement the robotics mechanism to retrieve (a) the at least a portion of the user-specific secured container or (b) the one or more specified second physical items from the user-specific secured container and deliver (a) or (b) to the receptacle.
In further related embodiments of the system, user interface application is further configured to receive a second user input that comprises a second identifier (e.g., name or the like) for each of the one or more second physical items being retrieved from the user-specific secure container. In such embodiments of the system, the item retrieval and delivery engine is further configured to access the database to determine whether at least one of the second identifiers matches one of the first identifiers, and, in response to determining that at least one of the second identifiers matches one of the first identifiers, instruct the image capturing device to scan the contents of the user-specific secure container and implement image recognition techniques on the scanned contents to identify at least one second physical item based on the scanned contents including the cataloged image associated with the matching first identifier. In such embodiments of the system, the robotics mechanism is further configured to retrieve the identified at least one second physical item from the user-specific secure container and deliver the identified at least one second physical item to the receptacle.
In further related embodiments of the system, in which the item retrieval and delivery engine does not determine a match between the second identifier(s) and the first identifier(s), the item retrieval and delivery engine is configured to compile the captured images of the first physical items stored in the user-specific secure container (i.e., images of all the items currently stored in the container) and communicate the captured images to the user interface application. In such embodiments of the system, the user interface application is configured to provide, via the display, one or more user interfaces configured to display the captured images and allow the user to select one or more captured images to initiate the retrieval from the user-specific secure container of the physically items depicted in the selected one or more captured images. In other related embodiments of the system, in which the item retrieval and delivery engine does not determine a match between the second identifier(s) and the first identifier(s), the item retrieval and delivery engine is configured to implement Artificial Intelligence (AI) (e.g., Machine Learning (ML) techniques or the like) to determine first identifiers (e.g., names ort the like) that are similar to the second identifier (e.g., name or the like), compile the captured images associated with such first identifiers and communicate the captured images to the user interface application. In such embodiments of the system, the user interface application is configured to provide, via the display, one or more user interfaces configured to display the captured images and allow the user to select one or more captured images to initiate the retrieval from the user-specific secure container of the physically items depicted in the selected one or more captured images.
In other specific embodiments of the system, the display of the user interface apparatus comprises privacy glass. In such embodiments of the system, the user interface application is further configured to receive a user input that indicates a user selection of (i) adding the one or more first physical items to the user-specific secured container, or (ii) receiving delivery of the one or more second physical items from the user-specific secured container. In response to receiving the user input, the user interface application is configured to implement the privacy glass to change at least one of a transparency or opacity of the display to generate a security region proximate the user interface apparatus.
A computer-implemented method for retrieval and insertion of contents from/within user-specific secured containers defines second embodiments of the invention. The method being executable by one or more computing processor devices. The method includes receiving from a user at a user interface apparatus, user credentials that are associated with (i) an identifier of a user-specific secured container, and (ii) security credentials for accessing at least one of (a) a secured area in which the user-specific secured container is located, and (b) the user-specific secured container. In response to receiving the user credentials, the method includes validating the user credentials to authenticate the user and verify that the user is associated with a user-specific secured container. In response to validating the user credentials, the method further includes providing, via the display, user interfaces configured to allow the user to perform at least one of (i) adding one or more first physical items to the user-specific secured container through placement of the one or more first physical items in a receptacle included in the user interface apparatus, and (ii) receiving, via the receptacle, delivery of one or more second physical items from the user-specific secured container.
In specific embodiments the computer-implemented method further includes based on the security credentials, providing access to at least one of (a) the secured area, and (b) the user-specific secured container, and based on the identifier of the user-specific secured container, implementing a robotics mechanism to remove from the receptacle one or more first physical items and deliver the one or more first physical items to the user-specific secured container. In related embodiments the computer-implemented method further includes receiving, at the user interface apparatus, a first user input that comprises a first identifier for each of the one or more first physical items being added to the user-specific secure container, capturing, via an image-capturing device in communication with the robotics mechanism, one or more images of each of the one or more first physical items to be added to the user-specific secure container; and storing the one or more images in a database according to the first identifier of a corresponding first physical item.
In further specific embodiments the computer-implemented method includes receiving, at the user interface apparatus, user instructions to retrieve (a) at least a portion of the user-specific secured container or (b) one or more specified second physical items from the user-specific secured container, and based on the security credentials, providing access to at least one of (a) the secured area, and (b) the user-specific secured container, and based on the identifier, implementing a robotics mechanism to retrieve (a) the at least a portion of the user-specific secured container or (b) the one or more specified second physical items from the user-specific secured container and deliver (a) or (b) to the receptacle. In related embodiments the computer-implemented method includes receiving, at the user interface apparatus, a second user input that comprises a second identifier for each of the one or more second physical items being retrieved from the user-specific secure container, accessing the database to determine whether at least one of the second identifiers matches one of the first identifiers. In response to determining that at least one of the second identifiers matches one of the first identifiers, the method further includes instructing the image capturing device to scan the contents of the user-specific secure container and implementing image recognition techniques on the scanned contents to identify at least one second physical item based on the scanned contents including the cataloged image associated with the matching first identifier. Further, the method includes retrieving, via the robotics mechanism, the identified at least one second physical item from the user-specific secure container and delivering, via the robotics mechanism, the identified at least one second physical item to the receptacle.
A computer program product including a non-transitory computer-readable medium defines third embodiments of the invention. The computer-readable medium includes sets of codes for causing one or more computing devices to receive, from a user at a user interface apparatus, user credentials that are associated with (i) an identifier of a user-specific secured container, and (ii) security credentials for accessing at least one of (a) a secured area in which the user-specific secured container is located, and (b) the user-specific secured container. Further, the sets of codes sets of codes cause one or more computing devices to validate the user credentials to authenticate the user, and in response to validating the user credentials, provide, via the display, user interfaces configured to allow the user to perform at least one of (i) adding one or more first physical items to the user-specific secured container through placement of the one or more first physical items in a receptacle included in the user interface apparatus, and (ii) receiving, via the receptacle, delivery of one or more second physical items from the user-specific secured container.
In specific embodiments of the computer program products, the sets of codes further cause the one or more computing devices to, based on the security credentials, provide access to at least one of (a) the secured area, and (b) the user-specific secured container, and based on the identifier of the user-specific secured container, implement a robotics mechanism to remove from the receptacle one or more first physical items and deliver the one or more first physical items to the user-specific secured container. In related embodiments of the computer program product, the sets of codes further cause the one or more computing devices to receive, at the user interface apparatus, a first user input that comprises a first identifier for each of the one or more first physical items being added to the user-specific secure container, capture, via an image-capturing device in communication with the robotics mechanism, one or more images of each of the one or more first physical items to be added to the user-specific secure container, and store the one or more images in a database according to the first identifier of a corresponding first physical item.
In other specific embodiments of the computer program products, the sets of codes further cause the one or more computing devices to receive, at the user interface apparatus, user instructions to retrieve (a) at least a portion of the user-specific secured container or (b) one or more specified second physical items from the user-specific secured container. Further, the sets of codes cause the one or more computing devices to, based on the security credentials, provide access to at least one of (a) the secured area, and (b) the user-specific secured container; and based on the identifier, implement a robotics mechanism to retrieve (a) the at least a portion of the user-specific secured container or (b) the one or more specified second physical items from the user-specific secured container and deliver (a) or (b) to the receptacle. In related embodiments of the computer program product, the sets of codes further cause the one or more computing devices to receive, at the user interface apparatus, a second user input that comprises a second identifier for each of the one or more second physical items being retrieved from the user-specific secure container and access the database to determine whether at least one of the second identifiers matches one of the first identifiers. In response to determining that at least one of the second identifiers matches one of the first identifiers, the sets of codes further cause the computing device(s) to instruct the image capturing device to scan the contents of the user-specific secure container, implement image recognition techniques on the scanned contents to identify at least one second physical item based on the scanned contents including the cataloged image associated with the matching first identifier and retrieve, via the robotics mechanism, the identified at least one second physical item from the user-specific secure container and delivering, via the robotics mechanism, the identified at least one second physical item to the receptacle.
Thus, according to embodiments of the invention, which will be discussed in greater detail below, the present invention provides for remote access to secured containers, such as safe deposit boxes or the like. Remote access is made possible by a user interface apparatus, such as an Automated Teller Machine (ATM) or dedicated kiosk device which has an associated receptacle for receiving physical items delivered from and to the remote secured container, such as a safety deposit box. In specific embodiments of the invention, delivery of the physical items to and from the user interface device's receptacle and the secure container is accomplished by a robotic mechanism, which may be guided on a rail system or otherwise an autonomous robotic mechanism that can navigate between the receptacle and the secured container. The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier (i.e., safety deposit box number) and access credentials for gaining access to the secured area (e.g., vaulted area, warehouse or the like) and/or the secured container. Thus, presentation of the user credentials provides for identification of the secured container and access to the secured area and/or secured container.
The features, functions, and advantages that have been discussed may be achieved independently in various embodiments of the present invention or may be combined with yet other embodiments, further details of which can be seen with reference to the following description and drawings.
Having thus described embodiments of the disclosure in general terms, reference will now be made to the accompanying drawings, wherein:
Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
As will be appreciated by one of skill in the art in view of this disclosure, the present invention may be embodied as a system, a method, a computer program product or a combination of the foregoing. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.” Furthermore, embodiments of the present invention may take the form of a computer program product comprising a computer-usable storage medium having computer-usable program code/computer-readable instructions embodied in the medium.
Any suitable computer-usable or computer-readable medium may be utilized. The computer usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (e.g., a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires; a tangible medium such as a portable computer diskette, a hard disk, a time-dependent access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other tangible optical or magnetic storage device.
Computer program code/computer-readable instructions for carrying out operations of embodiments of the present invention may be written in an object oriented, scripted or unscripted programming language such as JAVA, PERL, SMALLTALK, C++, PYTHON or the like. However, the computer program code/computer-readable instructions for carrying out operations of the invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages.
Embodiments of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods or systems. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a particular machine, such that the instructions, which execute by the processor of the computer or other programmable data processing apparatus, create mechanisms for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instructions, which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational events to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions, which execute on the computer or other programmable apparatus, provide events for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. Alternatively, computer program implemented events or acts may be combined with operator or human implemented events or acts in order to carry out an embodiment of the invention.
As the phrase is used herein, a processor may be “configured to” perform or “configured for” performing a certain function in a variety of ways, including, for example, by having one or more general-purpose circuits perform the function by executing particular computer-executable program code embodied in computer-readable medium, and/or by having one or more application-specific circuits perform the function.
Thus, according to embodiments of the invention, which will be described in more detail below, systems, methods and computer program products are disclosed that provide for remote access to secured containers, such as safe deposit boxes or the like. Remote access is made possible by a user interface apparatus, such as an Automated Teller Machine (ATM) or dedicated kiosk device which has an associated receptacle for receiving physical items delivered from and to the remote secured container, such as a safety deposit box.
The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier (i.e., safety deposit box number) and access credentials for gaining access to the secured area (e.g., vaulted area, warehouse or the like) and/or the secured container.
According to specific embodiments of the present invention, delivery of the physical items to and from the user interface device's receptacle and the secure container is accomplished by a robotic mechanism, which may be guided on a rail system or otherwise an autonomous robotic mechanism that can navigate between the receptacle and the secured container. The robotics mechanism includes an image-capturing device which is used to capture images of physical items as they are delivered to the secure container, to allow for cataloging the physical items according to their images and user assigned identifier/name. In this regard, when a user desires to retrieve a specific item from the secure container, the image capturing device scans the contents of the secure container and image recognition techniques are used to identify the physical item whose image matches the identifier/name of the item as provided by the user.
In specific embodiments of the invention, privacy is provided to the user at the user interface device is provided by a display utilizing privacy glass. Specifically, in response to the user selecting delivery of items to or from the secured container, the privacy glass is invoked to change the transparency or opacity of the display, thereby creating a secure/private region proximate to the user interface apparatus.
Referring to
System 100-1 additionally includes a user interface apparatus 300, which may comprise one or more devices. In this regard, user-interface apparatus 300 includes a receptacle 302 configured to (i) receive first physical items 400-1 from a user 110 for delivery to and storage within the user-specific secured container 200 and (ii) deliver second physical items 400-2 to the user 110 that have been retrieved from the user-specific secured container 200. As used herein the term first physical items 400-1 refers to physical items being delivered to the secured-specific secured container 200, while the term second physical items 400-2 refers to physical items being retrieved from the user-specific secured container 200. Thus, once a first physical item 400-1 is delivered to and stored within the user-specific secured container 200, for purposes of the invention as described herein, the physical item becomes a second physical item 400-2.
In addition, for purposes of ensuring timing delivery and retrieval of physical items 400 from the user-specific container 200, user interface apparatus 300 is physically co-located with the user-specific secured container and, thus, co-located with the secured area 210. For example, the user interface apparatus 300, which in specific embodiments of the invention may comprise an Automated Teller Machine (ATM) or a kiosk specifically designed for physical item retrieval and delivery may be located within the interior or exterior of a financial institution that houses the secured containers 200 (e.g., safe deposit boxes) within a secured area (e.g., financial institution vault or the like). In those embodiments of the invention, in which the user interface apparatus 300 comprises an ATM, the ATM may be retrofitted to include receptacle 302 or specifically designed to include receptacle 302.
Further, user-interface device 300 includes a first computing platform 304 having a first memory 306, one or more first computing processor devices 308 in communication with first memory 306 and a display 308 in communication with at least one of the first computing processor device(s) 308. First memory 306 may comprise volatile and/or non-volatile memory, such as read-only memory (ROM) and/or random-access memory (RAM), EPROM, EEPROM, flash cards, or any memory common to computing platforms. Moreover, first memory 306 may comprise cloud storage, such as provided by a cloud storage service and/or a cloud connection service. First computing processing device(s) 308 may include an application-specific integrated circuit (“ASIC”), or other chipset, logic circuit, or other data processing device. First computing processing device(s) 308 may execute one or more application programming interface (APIs) (not shown in
User interface application 312 is configured to receive, user credentials 314 (e.g., passcode/personal identification number (PIN), personal data or the like) from a user 110. Since, according to the present invention, the user 110 will have pre-registered for remote delivery/retrieval of physical items 400 from their corresponding user-specific secured container 200, the user credentials 314 are associated with (i) an identifier 201 of the user-specific secured container 200 (e.g., a safe deposit box number or the like) and (ii) security credentials 212, 202 for accessing at least one of (a) the secured area 210 or (b) the user-specific secured container 200. In response to receiving the user credentials 314, user interface application 312 is configured to validate the user credentials 314 to authenticate the user 110 (i.e., ensure that the user is, in fact, who they purport to be).
In response to validating the user credentials 314, user interface application 312 is configured to provide/present, via display 310, user interfaces 318 that are configured to allow the user 110 (i) add 320 one or more first physical items 400-1 to the user-specific secured container 200 by placing the one or more first physical items 400-1 in the receptacle 302, and (ii) receive 322, via the receptacle 302, delivery of one or more second physical items 400-2 from the user-specific secured container 200.
Referring to
System 100-2 additionally includes robotics sub-system 500 which includes a robotics mechanism 501 configured to retrieve physical items 400-1 from the receptacle 302 and deliver the physical items 400-1 to the user-specific secured container 200 and/or retrieve physical items 400-2 from the specific secured container 200 and deliver the physical items 400-2 to the receptacle 302. The robotics mechanism 501 may be implemented in conjunction with a rail infrastructure (not shown in
Robotics sub-system 500 includes a second computing platform 502 which is in network communication 120 with the first computing platform 304. Second computing platform 502 includes second memory 504 and one or more second computing processor devices 506 in communication with second memory 504. Second memory 506 stores physical item retrieval and delivery engine 508 that is configured to receive from the first computing platform 304, the identifier 201 of the user-specific secured container 200 and at least one of (a) security credentials 212 of the secured area 210 and/or (b) security credentials 202 of the user-specific secured container 200. Based on the security credentials 212, 202 and the identifier 201, the physical item retrieval and delivery engine 508 is configured, access 510 the secured area 210, and/or access 512 the user-specific secured container 200. In response to accessing the user-specific secured container 200, robotics mechanism 501 is configured to (i) remove from the receptacle 302 one or more first physical items 400-1 and deliver the one or more first physical items 400-1 to the user-specific secured container 200 and (ii) retrieve from the user-specific container 200 one or more second physical items 400-2 and deliver the one or more second physical items 400-2 to the receptacle 302.
In further specific embodiments of the invention, display 310 includes privacy glass 310-1. In such embodiments of the invention, in response to user 110 providing an input at the user interfaces 318 that to perform either (i) adding first physical items 400-1 to the user-specific secured container 200 or (ii) receiving one or more second physical items 400-2 from the user-specific secured container 200, user interface application is configured to change invoke the privacy glass 310-1 to change at least one of the transparency or opacity of the display 310 to generate a security region proximate the user interface apparatus. The security region allows the user 110 to privately perform the necessary remote physical item retrieval and/or delivery actions on the user interfaces 318 displayed on the display 310 without other individuals proximate the display 310 being able to comprehend the actions.
Referring to
In response to user 110 selecting, via user interface(s) (318) to (i) add 320 a first physical item 400-1 to their respective user-specific secured container 200, user interface application 312 is further configured to receive a first user input that defines a first identifier 322 for the first physical item 400-1. First identifier 322 will typically be a name or the description of the first physical item 400-1 that the user can conceivably remember when subsequently retrieving the item from the user-specific secured container 200.
Further, robotics sub-system 500 includes image capturing device 520 that is configured to capture one or more images 522 of the first physical items 400-1 prior to or after placing the item(s) 400-1 in the user-specific secured container 200.
Additionally, system 100-3 includes database 600 that stored the captured images 522 and associates the captured images 522 with the user-assigned first identifier 322 of the corresponding first physical item 400-1 and the corresponding identifier 201 of the user's secured container 200. As discussed in relation to
Referring to
In response to user 110 selecting, via user interface(s) (318) to (i) receive 322/retrieve a second physical item 400-2 from their respective user-specific secured container 200, user interface application 312 is further configured to receive a second user input that defines a second identifier 332 for the second physical item 400-2 that the user 110 desires to retrieve. Second identifier 322 will typically be a name or the description of the second physical item 400-2 that the user 110 previously may have used as the first identifier 322 to identify the physical item 400-1 at the time the physical item 400-1 was originally placed into the secured container 200.
In such embodiments of the invention, item retrieval and delivery engine 508 is further configured to receive the second identifier 322 and access the database 600 to determine whether the second identifier matches any of the first identifiers 322 associated with the secure container 200 (i.e., associated with the identifier 201/number of the user's secured container 200). If a determination is made of an identifier match 530, the image 522-1 in database 600 corresponding to the first identifier 322 is retrieved. Subsequently, the image capturing device 520 is used to scan the contents of the secured container and image recognition techniques are implemented to identify the physical item in the secured container that matches the retrieved image 522-1. Robotics mechanism 501 is used to remove the second physical item 400-2 that matches the retrieved image 522-1 from the user-specific secured container 200 and transport/deliver the second physical item 400-2 to the receptacle 200.
If a determination is made of no identifier match 540, artificial intelligence 544 may be implemented to determine if the second identifier 332 is similar to any of the first identifiers 322. For example, if the second identifier 332 is “diamond ring” or “ring” and the first identifiers 322 include “grandma's diamond ring” and “user's diamond ring” or, “grandma's ring” and “user's ring”, the system does not know which ring the user intends to retrieve. If a determination is made of that the second identifier 332 is similar 546 to one or more of the first identifiers 322, the image(s) 522-2 in database 600 corresponding to the similar first identifier 322 are retrieved. Subsequently, a similar first identifier list 350 is compiled that includes the images 522-2 and is communicated to the user interface application 312 for presentation as a user interface 318. In this regard, the user 110 is able to select which item having a similar identifier/name to the identifier/name they inputted they intend to retrieve from the secure container 200.
In other embodiments of the invention, if a determination is made of no identifier match 540 or when no similar identifiers can be determined, the image(s) 522-3 and, in some instances first identifiers 322 in database 600 corresponding to all the items currently stored in the secure container 200 are retrieved and a list is compiled 542 that includes images and, in some embodiments, the corresponding first identifier 322 of all items 400-2 currently stored in the secured container. Subsequently, the compiled list 340 is communicated to the user interface application 312 for presentation as a user interface 318. In this regard, the user 110 is able to select which item 400 from amongst all of the items 400 currently stored in the secure container they intend to retrieve from the secure container 200.
Referring to
As depicted in
Referring to
Referring to
Referring to
Referring to
Referring to
In response to validating the user credentials, user interfaces are presented on a display of the user interface apparatus that are configured to allow the user to perform (i) adding a physical item to the user-specific container through placement of the object in a receptacle of the user interface apparatus, or (ii) receiving, via the receptacle, delivery of a physical item currently stored in the secured container.
In response to presentation of the user interface, at optional Event 740, a first user input is received at a user interface that selects one of adding a physical item to the user-specific container or receiving delivery of item(s) from the secure container. In response, to the first user input, at optional Event 750, the security credentials are used to provide access to the secured area and/or the user-specific secured container. Further, at optional Event 760, the identifier of the user-specific secured container is used to identify the container and a robotics mechanism is implemented to remove the physical item from the receptacle and deliver the physical item to the remote secured container, or remove the physical item form the remote secured container and deliver the physical item to the receptacle.
Thus, present embodiments of the invention discussed in detail above, provide for remote access to secured containers, such as safe deposit boxes or the like. Remote access is made possible by a user interface apparatus, such as an Automated Teller Machine (ATM) or dedicated kiosk device which has an associated receptacle for receiving physical items delivered from and to the remote secured container, such as a safety deposit box. In specific embodiments of the invention, delivery of the physical items to and from the user interface device's receptacle and the secure container is accomplished by a robotic mechanism, which may be guided on a rail system or otherwise an autonomous robotic mechanism that can navigate between the receptacle and the secured container. The user of the remote secured container access system pre-registers, such that presentation of the user credentials at the user interface apparatus provides the user options for receiving items for the secured container and delivering items. Moreover, the user credentials are associated with a secure container identifier (i.e., safety deposit box number) and access credentials for gaining access to the secured area (e.g., vaulted area, warehouse or the like) and/or the secured container. Thus, presentation of the user credentials provides for identification of the secured container and access to the secured area and/or secured container.
Those skilled in the art may appreciate that various adaptations and modifications of the just described embodiments can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.