专利摘要:
The invention relates to a method for managing the logistics routing of objects to multiple users, for distribution and / or collection by a logistics operator, in particular an operator independent of said users. It includes transfer operations, deposit 131 and withdrawal 231, in a container BAC controlled by an electronic lock, which can be installed without electronic connection with the management server SI. A package to be delivered is deposited 131 in this container. The recipient user UTI receives on his computerized phone TPU an availability code D21 valid sometime pT1, indicating where to withdraw his package. When he reaches the container, he enters the container code D22 in the application. This then provides 216 a D23 opening code valid for a few minutes pT2, and 217 automatically prepares a D25 report message. The container checks the opening code 223 and opens its locker. As soon as the TPU phone is connected to the network, it 233 automatically sends its report D25 to the management server SI. The invention also relates to a container arranged for such a method.
公开号:FR3048093A1
申请号:FR1651478
申请日:2016-02-23
公开日:2017-08-25
发明作者:Mathieu Talayssat;Pierre Laurent Borja;Patrick Duriez
申请人:Manufacture dAppareillage Electrique de Cahors SA;
IPC主号:
专利说明:

The invention relates to a method for managing the logistics routing of objects to multiple users, for distribution and / or collection by a logistic operator. , in particular an independent operator of said users.
It includes transfer operations, deposit and withdrawal in a container controlled by an electronic lock, which can be installed without electronic connection with the management server.
A package to be delivered is deposited in this container. The recipient user receives on his computer phone an availability code valid a few days, indicating where to withdraw his package. When he reaches the container, he enters the container code in the application. This then provides an opening code valid for a few minutes, and automatically prepares a report message. The container checks the opening code and opens its locker. As soon as the phone is connected to the network, it automatically sends its report to the management server. The invention also relates to a container arranged for such a method.
According to one feature, the container code includes a status code calculated by the container.
According to another feature, the container electronically communicates locally with the mobile application of the user, and sends him a confirmation of opening or effective withdrawal, that the application transmits to the server in its report.
State of the art
In the field of mail and parcel delivery, the volume of parcels distributed has greatly increased since the development of Internet-based distance trading, also called "e-commerce", that is for about ten years. Indeed, the goods and material goods are ordered on the Internet, but represent physical objects that must be forwarded and delivered to customers. But customers are usually not present at the place of delivery, which may be different from their home. And even for home delivery, these packages are often too large to be placed in the personal mailbox of the recipient client as it exists most often. There are thus problems of availability in time combined with problems of size and cost.
To overcome some of these problems, solutions exist that consist for example in organizing "withdrawal points" in shops that are accessible to customers during their opening hours. Other solutions also consist for example in installing automated instructions forming withdrawal terminals, located for example in places of passage such as railway stations or shopping centers. Such a device generally comprises one or more rigid metal lockers which are lockable by electronic control. These bins are connected electronically to a communication network and are remotely managed by a computer system as and when needed, which allows a "shared" use. That is to say that each can be used successively for several different deliveries intended for different recipients.
Such terminals are generally installed in a building that supplies them with energy, and communicate for example by the wired telephone network or by carrier waves in the power supply network, or cellular radio networks. In this case, it is generally connected to a system for sending data from machine to machine or "M2M" (for "Machine To Machine") which allows communication by radiofrequency link, for example cellular thanks to a telephone SIM card according to a telephone standard such as GSM, or 3G or 4G, or by "low-speed" link over a specialized radiofrequency network such as Sigfox.
These solutions, however, have technical and cost constraints and do not meet all needs. In particular, they represent a significant cost and complexity, and need to be in electronic communication with the management information system.
An object of the invention is to provide a solution allowing distribution or collection closer to customers, reliable and fast, including in low density areas such as peri-urban or rural. This goal is sought by limiting the costs and constraints of installation, operation and maintenance.
DISCLOSURE OF THE INVENTION The invention proposes a method of managing the logistic routing of one or more objects, typically by distribution or collection, by at least one logistic operator. This method comprises one or more object transfer operations, by depositing and then removing said object in a deposit container whose access to the contents is controlled by an electronic controller controlled lock; at least one of said transfer operations of a specific object being performed by a specific user, recipient or sender, which can be an individual user or a group of users.
According to the invention, this method comprises the following steps: sending, by a management computer system, an electronic availability message to a computerized portable terminal equipping said user and able to receive said message, of a communicating type or capable of communicating with a wireless communication network and executing or being able to execute at least one mobile user application, said message comprising an availability code calculated to represent at least one identification of a determined container for said transfer operation; receiving said electronic availability message by said computerized portable terminal, and displaying or transmitting to the user information representing at least one identification of said container; after moving said user to reach of said container, reception by the user application of a container code representing said container, by manual entry by the user or electronic reading of a code appearing on the container concerned by the transfer operation, or by local electronic communication of the terminal with said container, thus creating for the user the need to be present or in range of said container; - optional verification that said container code corresponds to the container concerned by the transfer operation, compared with the availability code, allowing the continuation of the operation in case of correspondence; - supply (purely local: calculation or reading in memory), performed by the user application without requiring communication with the network, an opening code calculated at least from the availability code and representing at least: o a identification of said container, and o an opening time range, determined to be posterior to the present moment and to give the user sufficient time to carry out his transfer operation (deposit or withdrawal), in particular under normal conditions, and optionally a time range in which this possibility is evaluated as feasible (possibly as a function of a probability threshold) as a function of the position of the container relative to the location of the user at his request; preparing, by the user application, an operation report message including at least one requested opening data, which represents the completion of the step of providing the opening code; after detection of a connectivity of the portable user terminal with the wireless communication network, possibly after the user has been moved, automatic sending of said operation report message from the user portable terminal to the management information system, without requiring user intervention; and storage by said management computer system of at least one data representing the completion of the transfer operation by the user, and preferably a change of state of the container between busy and free or vice versa;
According to the invention, the method further comprises the following steps: receipt of the opening code by the container from the user by manual entry or from the application; determination by the container of an opening time range, by the electronic lock from the opening code, by extracting a time data from the opening code or by calculating from the instant of receiving said opening code; and - verification by the container of the validity of said opening code, comprising at least: o a verification that the present moment is included in the said opening time range, and o if this has not been done previously by the user application, a check that said opening code corresponds to the container concerned by the transfer operation, by comparison with an identification stored in said container; if said verification indicates that said opening code is valid, command for opening or unlocking said container so as to give access to said object.
Depending on the embodiments, or according to the system settings, the opening time range included in the opening code provided by the user application can be determined in different ways. Typically, it is determined by the user application, timestamp or even duration. Its value or its expiration time is for example included in the report message sent by the application to the management system. This can then take into account that the user has had enough time to perform his transfer, and that the container is available for further operations immediately after expiration. Indeed, because of the necessary presence of the user in front of the container or at least within reach of it, the probability is very low that he did not complete the operation he had come to do .
In certain embodiments, or in certain phases of use of a container, the transfer operation comprises a withdrawal by the user of an object, in particular a package, previously deposited in the container by a delivery agent for the logistics operator's account, during a deposit transfer transaction from a logistics distribution center.
In particular, said deposit transfer operation comprises the following steps: sending, by the management computer system, an electronic message to a computerized portable terminal equipping the logistics operator's agent, communicating or able to communicate with a wireless communication network and which executes at least one logistics mobile application capable of receiving said message, said message comprising data representing a transfer order, calculated to represent at least one identification of the deposit operation to be performed, for example a identification of the package and / or container, preferably both; at the end of a movement of said logistic agent to reach of said container, carrying out the following phases, in this order or in another: reception by the logistic application, in particular by electronic reading and / or manual entry and / or electronic communication with the object, a parcel code identifying the object and / or the filing operation, o reception by the logistics application, in particular by electronic reading and / or manual entry and / or electronic communication with the object, a container code identifying the container, o depositing the object in a deposit volume of said container, o preparing, locally by the logistics application, an operation report message comprising at least one deposit data item, which represents the completion of the deposit transfer transaction; - After detecting a connectivity of the portable logistic terminal with the wireless communication network, possibly after moving the logistics agent, sending said operation log message from said portable logistic terminal to the management computer system, ; and - storage by said management computer system of at least one data representing the completion of the deposit transfer operation.
In other embodiments, or in other phases of use of a container, the transfer operation comprises a deposit by the user of an object in the container, in particular a package.
Typically, the method further comprises a collection of said object by a collection agent on behalf of the logistics operator.
By combining different phases of the process for the same container and the same object, such a depositing operation by a user can also be followed by a retrieval transfer operation performed by another user, without the intervention of a logistic agent acting on behalf of the user. account of the operator.
In some embodiments, the method employs only one time range relating to the user's activity: the opening range.
According to one feature, the opening range is determined by calculation from the moment of receipt of the container code, or from a request subsequently received from the user, for example to provide a few minutes or tens of minutes.
According to another particularity, the opening range is determined by calculation from a time stamp of said availability message, for example to provide a range of a few days, starting immediately or possibly after a specified period.
In certain embodiments, these features may be combined with one another, for example by taking the intersection or the meeting of the time ranges thus calculated. These time ranges are for example determined for example at different times.
In other embodiments, the method combines several time ranges determined for example at different times.
According to a particularity, the method according to the invention further comprises the following steps, performed by the user application without requiring communication with the network: determining a time range of availability, from the availability message, from the availability code by extracting a range data item calculated by the management system, or by calculating from a time stamp of said availability message; and checking the validity of the availability code, comprising at least one verification that the present moment is included in said range of availability time.
Said validity check then conditions the provision of the opening code. This opening code is then calculated by the user application and itself contains data representing the opening time range, or data referring to a range value stored in the controller of the container.
Preferably, the validity check of the availability code or the opening code or both is arranged to allow a single use of said code. For example, by a storage of the use within the user application, and an availability validation including a verification of this memory. For example also by a storage in the memory of the container, and a validation of the opening code including a validation of this memory.
For example, the opening time range ends after a period of between 1 minute and 30 minutes after the supply of the opening code, and in particular between 5 minutes and 20 minutes, and for example about 15 minutes. ; while the availability time range, when it exists, ends after a period of between 1 day and 10 days after sending the availability code the supply (202) of the availability code (D21), and especially between 2 days and 6 days, and for example about 3 days.
According to a particularity of the method: the container calculates and displays, permanently or in response to an action by the user or the user application of its terminal, at least one status code representing one or more states of said container at the present moment, among the following states: a unique identification of one or more deposit volumes ordered within said container, a level of operating capacity of one or more of its components, a state of occupation of one or more deposit volumes ordered within said container, and o a state or a value of a clock that it uses to check the validity of the opening codes it receives; the step of receiving the container code by the user application includes using said status code as all or part of the container code; the container identification verification step is performed by the user application, and further includes checking that the received status code corresponds to an acceptable state for the continuation of the transfer operation; the operation report prepared by the user application further comprises at least one possible opening data, which represents a satisfactory check of the status code provided by the container. The use of these two different ranges allows for example to specify and optimize the use of the container. The range of availability can thus be determined sufficiently wide to allow the user to organize himself at his ease to go to the container, for example a few days. The opening range can in turn be determined shorter, since the user is necessarily present in front of the container when he requests the supply of the opening code and triggers the calculation of this opening range. Once the management system knows the position of the opening range by means of the report message, by the timestamp of its preparation or by the value of the opening range, it can thus consider that the operation was done without waiting for the end of the availability range. The remaining duration of this range of availability can thus be used for a next operation with the same container.
Preferably, the validity verification of the availability code or the opening code or both comprises a verification of the identity of an issuer of said code, by decryption and / or comparison of an electronic signature data, for example using a public key to decrypt data that has been encrypted with a private key corresponding to said public key.
According to other aspects, the invention proposes: a digital data processing method, implemented by a portable computerized telephony terminal, comprising an execution of program instructions carrying out the operations of the mobile application within a a routing management method as set forth herein; a method for processing digital data managing a network of containers, in particular non-communicating or even autonomous, comprising: on the one hand an execution, by a or more computers communicating with a wireless telephony network (eg cellular or satellite), program instructions performing the operations of the management information system in a method as set forth herein; and o on the other hand an execution, by an electronic lock controlling access to the contents of one or more containers (each mono or multi-bin), program instructions (software and / or wired) performing the operations of the deposit container in a method as set forth herein. a computer system programmed to perform the operations of the computer system for managing a method as set forth herein. - A deposit container comprising one or more deposit volumes whose access to the contents is controlled by an electronic controller controlled lock, which is programmed to perform the operations of the container of a method as set forth herein.
As can be understood, even if the container is located in a shadow zone, the mobile application of the user automatically sends the report message to the management system, as soon as the user comes back within range of the communication network .
The system is therefore kept informed of the initiation of the transfer operation much faster than if it had to wait for the end of the total time range allocated to the user. For example, this information is transmitted as soon as the user crosses a connected zone away from the container, usually within minutes or hours, while it is typically necessary to allocate several days to the user. so that it can move to the container. The invention thus provides information in near real time recovery or deposit of the package by the customer, and thus the progress of the process and the state of availability of the box. This information allows accurate and reliable circuit monitoring, and makes possible a better optimization of the use of the facilities.
This information is obtained via the telephone of the user-client, but without any operation on his part that is subsequent to the completion of his transfer operation being the subject of his attention. With the invention, the operations he must perform are necessary to achieve his personal goal: the operation of transfer, withdrawal or deposit of the package. On the other hand, if the method were to rely on the user to send a message of his own accord after the operation, and in particular in the case of a withdrawal, this report would often be omitted since this user is a customer with few obligations to the container network operator. The invention thus makes it possible to install functional containers or "package boxes" and of optimized operation without requiring a long distance connection with the management information system, or even without the need for a connection to an energy network. .
The operation of the lock can thus use a simple electronics, low energy consumption and inexpensive. The reliability is improved, the costs are reduced. It becomes more interesting to make terminals with few lockers for the same lock, even with a single locker, which also allows a better coverage of the territory.
It is possible to install such containers without connection to a wired communication network, but also in areas with little or no coverage of radio communication services, here called "gray areas". It is even possible to provide them with an independent power supply, for example a long battery and / or recharged by a local generator such as a photovoltaic panel.
Various embodiments of the invention are provided which incorporate, according to all of their possible combinations, the various optional features disclosed herein.
List of Figures Other features and advantages of the invention will become apparent from the detailed description of a non-limiting embodiment, and the accompanying drawings in which: - FIGURE 1 is a diagram which illustrates according to the invention the deposit operation of a package by a logistics agent in the container, when used in distribution; FIG. 2 is a diagram illustrating according to the invention the operation of removing a package from the container by a destination customer, following FIG. 1; - FIGURE 3 is a diagram which illustrates according to the invention the operation of depositing a package by a customer in the container, during a collection use; FIGURE 4 is a flowchart illustrating the flow of the deposition operation of FIGURE 1; FIGURE 5 is a flowchart illustrating the flow of the removal operation of FIGURE 2; FIGURE 6 is a flowchart illustrating the flow of the deposition operation of FIGURE 3; FIG. 7 is a flow chart which illustrates part of the progress of a withdrawal operation similar to that of FIG. 2, according to a variant of the invention with the input of a status code calculated and displayed by the container; - FIGURE 8 is a flowchart that illustrates the progress of a withdrawal operation similar to that of FIGURE 2, according to a variant of the invention with electronic confirmation communication between the container and the user's terminal.
Description of an exemplary embodiment
FIGURE 1 to FIGURE 3 illustrate different phases of use of a container, within a logistics system performing a distribution or collection of packages as needed.
The container COL is here represented in the form of a single rack B1, closed by a door B2 controlled by an electromechanical lock comprising a closure system, a keyboard B3 code and an electronic controller B4, for example a programmable microcontroller . This controller runs software running autonomously, and without long distance communication. This software is programmed to validate or generate a single-use and time-stamped access code, that is to say that it will be valid only for a determined period of time pT2. It uses for example this code to compare it with the opening code D23 or D33 which is provided to it by the user UTI, to determine if this opening code is valid or not at a given moment.
Such timestamped code locks exist in the prior art, as for example in document FR 3,009,113.
In the present example, the normal use of the lock is done by typing a code on a keyboard, for example a simple keypad.
Although the invention can be implemented without this, the container is further provided with a short-distance wireless communication equipment, not shown, for example near-field type NFC (for "Near Field Communication"), or of short-range radiofrequency type such as according to the Wifi or Bluetooth standard, for example in version 4.0.
In a presently preferred embodiment, this communication equipment is mainly or even exclusively used by one or more operating or maintenance agents, equipped with a compatible terminal and managing a plurality of such containers, forming a "network" at the same time. meaning of a geographical network but not necessarily in the sense of a communication network. This communication equipment allows the operator access to various technical or statistical functions of the container, more effectively than with the keypad, eg information or history of the lock, battery monitoring, or maintenance.
Such operating agents may be logistic LOG agents that perform depot 119 or collection operations, but not necessarily. Such a network can also be managed and / or maintained by a network operator, which delegates or leases to one or more logistic operators the use of its containers, for example on demand according to the needs of these logistic operators.
An IS management computer system is used to manage and plan the use of the network bins.
For bins that are installed in areas covered by a communication network, for example an M2M type cellular network, there is provided an electronic communication of the management system SI with all or part of its bins in the covered area, which are then equipped with suitable communication equipment. This may be the case, for example, of lockers located in areas of intensive passage, or difficult environment. The use of this remote communication may also be limited to certain functions, for example to certain services or maintenance and operation monitoring.
In the present example, the illustrated rack is located in a shadow zone ZO and is for example not equipped with remote communication means, in particular not with the management system SI.
The IS management system communicates with the users, for example any individuals who are occasionally customers as recipients or senders of parcels, here also called "customers". This communication is done with an AP embedded application installed on the TPU phone of such a user UTI.
Delivery to the container
As illustrated in FIG. 1 and FIG. 4, in the case of a COL package to be delivered to this ITU receiver, the logistics operator creates a delivery request on his computer, specifying the recipient's address and, if necessary, the constraints. related to the package to be delivered.
It sends 102 then an electronic message to the management system SI, in the form of a transfer operation request. From the information of its database 103 containing the state, the location and the capacity of the different containers of the network that it manages, the SI system chooses 104 a BAC container which is free and compatible near the address. of the recipient user. He then creates an OT transfer order which he sends 105 in the form of an electronic message DU containing the identifier ID BAC and / or the location of the selected container. It sends this message DU to the logistic operator, for example directly on the TPL terminal of a LOG driver among its logistics agents. The system SI will then store 106 in the database 103 the fact that this specific BAC container is reserved for this operation.
When it receives the transfer order DU on the application of its terminal, for example a TPL smart phone, the delivery driver LOG moves 113 to the container concerned. Its transfer operation comprises the following operations: - register the package in its application, for example by optical reading 116 of a graphic code, for example by "flashing" a "QR-code"; - Register the identifier by reading 114 of a graphic code displayed on the container (for example a permanent inscription or a code displayed on a screen and can represent the present moment), whose application will check 115 validity with the transfer order of the receipt and with the geographical location recorded by the GPS of the terminal; - Command 117 the opening of the container, for example by a key, or by wireless local communication, or by an agent code (which can be permanent or valid time slots). Optionally, the transfer order may also include a time or time range that will be checked by the lock of the container, the same or similar verification performed for a client user;
Once the container is open 124, the delivery driver LOG puts the package 118 in the bin.
In the case of a wireless communication, the lock information 126 or locker is transmitted to the application of the deliveryman. From these different pieces of information, this application prepares 120 a report message D15 and orders its sending 133 to the management system SI. If the transfer operation is performed in a shadow zone, this sending is programmed to be done automatically 133 as the movement 132 of the deliveryman brings it into a connected zone. On receipt 134 of this report D15, the system SI records 135 the completion of the transfer operation. It then memorizes the change of state of the container, and controls the following operation.
In the case of a delivery (FIGURE 1), it memorizes that the container is occupied, and then initiates a withdrawal type transfer operation as illustrated in FIGURE 2 and FIGURE 5.
Withdrawal by the user
For a package to be delivered to its recipient, for example after a deposit operation as written above, the SI system delivers to the recipient an access authorization to the container box, provided in two steps in one embodiment. preferred: 1st step: the recipient receives a message from the operator indicating the delivery of his package and the possibility of removing it within a period of a number of days, and an "invisible" code also valid this same number of days, kept by the client application (availability code). Step 2: At the moment when the recipient goes to the parcel box, he must use his application to identify the box (for example by flashing the QR code of the box or manual entry of the ID code of the box or any other means of identification).
In response, the application then validates the authorization granted by verifying the consistency "Identity of the box / availability code" and makes visible to the customer the one-time opening code.
The generation of the access code by the application entails, by automatic action, a feedback to the operator, attesting to the withdrawal of the package and the new availability of the box.
Thus, access to the box is possible even in the case of non-coverage of the box by a mobile network: indeed, once received the availability code, the generation of the opening code operates independently of any connectivity. The feedback to the operator is done when the smartphone finds a connection, for example during a subsequent move of the customer.
In FIGURE 2 and FIGURE 5 is illustrated in more detail the process of COL package removal by the client / UTI user.
In 201, the management system SI creates a "availability code" D21, valid for this delivery and for a time range of availability pTl, typically the next 6 days. This code D21 thus comprises a datum D211 identification ID BAC container BAC, and a datum D212 representing the time range of availability pTl. The mobile application of the terminal TPU of the user receives 211 and stores the "availability code", and displays 212 the location of the instruction to the user. The customer can thus move 213 to the container BAC.
Once the customer is near the container: - the customer reads the ID BAC ID code displayed on the container and enters 214 in the application, either by reading a barcode automatically, or by manual entry at keyboard. the application verifies the operation: by comparing the entered container identification code D22 with the container identification code D211 included in the availability code D21, and verifying that the present moment is included in the time range of availability pTl. If everything is compliant, the mobile application then performs the following operations, preferably in an atomic manner: preparation and display 217 an opening code D23, comprising a time range data D232 arranged to be valid for a time range d aperture pT2, typically in the time range of availability pTl and less than at least a factor of 10 or 20, for example the next 15 minutes. Preferably, the opening code D23 also comprises a container identification data D231; o preparation and startup D217 of sending a D25 report message to the SI management system. If the terminal TPU is not connected, this message is put on hold so as to be automatically sent 233 as soon as the terminal is connected again, for example as soon as a displacement 232 of the user has made it possible to restore the connectivity . Preferably, the message is stored by the application within the operating system, so that it is sent even if the application has been closed meanwhile. the customer enters the opening code D232 in the lock of the container 218, for example by manual entry on the lock keypad, the lock of the container verifies the validity of the opening code D23 which it has received 221: o comparing the received identification data D231 with data from its memory, to verify that the D23 code corresponds to the container and that it has not already been used. It then memorizes the use of this code so that it is not reusable; o comparing the received time range data D232 with the present moment or with a datum calculated from the present moment, typically by reading an internal clock. - if the verification 223 indicates a validity of the opening code D23, the lock releases access to the contents of the locker concerned by the opening code, for example by opening or unlocking the door, the lock then keeps the container open and / or unlocked the time required for the user to remove the package it contains, for example until detection of the opening of the door, or until detection of removal of the package for example by a sensor of proximity or a balance, or for a determined duration that may or may not equal the duration of the opening time range pT2 or the remaining time range.
In this embodiment, it will be noted that the openings and / or closures of the container do not trigger the sending of information.
Once the report message D25 has been prepared 217 and the user application detects the presence of a possible connection to the network, the user terminal TPU 233 transmits this message D25 to the management system SI. On receipt 234, the latter IS can take into account the fact that the opening code D23 has indeed been requested 214 to the user and has been provided 216, and considers that these operations mean that the entire operation withdrawal was completed completely.
It stores 235 then this withdrawal as effective, and the fact that the container BAC is now empty and available for a new operation.
New withdrawal for the same package:
In the case where the user has not removed the package from the container, despite the provision of the opening code D23, it is optionally provided a possibility of new withdrawal, for example according to the following steps (not shown specifically in the figures) .
Back in the covered area, the user requests the SI management system to restart its withdrawal, through its user application.
The SI management system verifies whether the bin of the container has been refurbished for another transfer operation, for example the delivery of another package. - If the locker has not been reserved: it sends the user application an authorization to issue a new opening code, for example in the form of a new availability code. - If the locker has been reserved: o the management system checks whether it is physically possible for the delivery person to have already opened the box, for example by checking whether a new delivery person has already requested an opening code for the deposit, or what time or time slot this delivery person has obtained a deposit code, or in what time range the deliverer has planned to deposit the new package if the information is provided by the mobile logistics application; o if this check indicates that the trap has not yet been opened by the new delivery person, and will not be opened until a sufficient time has elapsed to allow the previous UTI user to return to the BAC container and retry its withdrawal 231, then the management system SI sends the user application authorization to issue a new opening code in a new availability range pTl ending before the scheduled time for the new deposit by the new deliveryman.
Typically, in the case where the package COL is still in the bin of the container BAC when a logistics agent arrives to deposit a new one, then this logistics agent retrieves the package and treats it as not delivered to the recipient, for example according to procedures known.
Cnyoi by the user
As illustrated in FIGURE 3 and FIGURE 6, the system and the containers are also arranged to be able to use the containers to collect a package from a client / user UTI, possibly unprofessional too, equipped with a terminal executing an application. user who can be your same as for the withdrawal. The process is similar to the withdrawal described above, and will be described in its differences.
If the customer is subscribed to a parcel return service offered by the operator, or has received an agreement for a return by a logistic operator, he creates 301 and sends 302 a sending request specifying a specific address, and optionally specifying constraints related to the package to be sent.
If the IS management system accepts this request, it chooses 303, 304 a BAC container available and adapted close to the specified address, and sends the user a deposit code D31 including the identification of the selected container and a range of availability pTl, for example a day, possibly with a return label. On receipt 311, the user application displays 312 the location of the container and its pTl availability range, which allows the user to get there 313.
In a similar manner to the withdrawal, the user UTI enters 314 the container code D22, which triggers its verification 315 vis-à-vis the deposit code D31 and the present moment. If valid, the application provides 316 an opening code D33 with identification ID BAC and opening range pT2, and prepares 317 its report message D35. The user enters 318 the opening code D33 in the lock of the container, which verifies it 323 and authorizes the access 323.
Once the user has deposited 331 his package in the bin of the container, for example on an action or seizure on his part or after detecting that the door has been closed, the lock locks 326 I access the contents of the locker. Upon detection of a connectivity, for example after a new move 332 of the user, its terminal TPU 333 sends the report message D35 to the management system SI, which stores it as meaning that the deposit 331 has been made.
The SI system stores 335 while the container is busy, and starts a collection process for this package, for example by a delivery driver LOG. This collection is done for example according to the same process as the delivery illustrated in FIGURE 1 and FIGURE 3, making a transfer 118 by removing the package instead of a deposit. At the end of the collection, the SI system then memorizes that the container is empty and available for a new operation.
Second exemplary embodiment
FIGURE 7 illustrates a second exemplary embodiment of the invention, which will only be described in its differences.
In this embodiment, the BAC container comprises a display controlled by the controller of the lock, for example a display screen, for example a graphic display that can display an automatic reading code such as a bar code or a QR code, or simply an alphanumeric code. Permanently, or triggered by an external action such as an activation button or detection of a local communication for example wireless, the controller calculates and displays a status code D42, which represents one or more parameters or states of the container.
This status code includes for example a data item indicating whether the container is working correctly, for example concerning the controller, the lock and / or the door of one or more lockers, where a data item if it contains an object in the case where it is equipped with means for detecting the contents of the bin, or a datum representing the current timestamp status of a clock of its controller, a datum identifying this container or one of its bins, or a combination of these elements.
In a withdrawal procedure by a user UTI, at the end of his movement 213 to the container BAC, the user UTI enters 414 this status code D42 in the user application of his portable terminal TPU, for example by manual input or by automatic reading using camera from his terminal. The step 414 receiving the container code by the user application thus comprises a use of said status code D42 as all or part of the container code; The user application then uses the contents of this status code D42 to check the validity of the availability code D21 with respect to this container, but also to check whether the withdrawal can be carried out correctly, typically to verify that the container is the good one and that it is functional. This additional check allows for example to memorize the fact that the container is down, or that its clock is incorrectly set and may therefore not recognize the validity of the opening code D23 that will be provided.
If this check 415 is satisfactory, the user application calculates and provides 216 an opening code D23 and prepares the sending 233 of a report message D25 in the same manner as previously described.
In this embodiment, the report message D25 further comprises information from the status code D42 provided by the container, and represents possible opening information which represents a satisfactory verification (415) of the status code (D42 ) provided by the container. For the management system SI, the reception 234 of this report message D25 is then analyzed and stored according to this additional information.
If its contents indicate that the opening code D23 has indeed been provided to the user, this provides additional certainty that the opening was physically possible from the point of view of the container. In the opposite case, a maintenance operation is for example programmed or triggered according to these data D42.
Optionally, for example during a re-withdrawal operation for the same package if the container has not opened during a first test, the user application calculates and integrates into its opening code D23 an additional data item of resynchronization containing the timestamp of the user terminal TPU, disposable or permanently, for example authenticated by an authentication code provided by the management system SI when requesting a new withdrawal. The container then interprets this data as a forcing command, and uses for example the value of the clock this resynchronization data to reset its own clock before checking the validity of the opening code D23 received for the moment.
This resynchronization procedure is implemented for example if the status code D42 of the container indicates to the user application that the clock of the container is out of order, but possibly also as a blind attempt, in other embodiments for a container that does not issue a status code.
Third exemplary embodiment
FIGURE 8 illustrates a third exemplary embodiment of the invention, which will only be described in its differences.
In this embodiment, the BAC container comprises a local electronic communication equipment, for example wireless, allowing the controller of the lock of the container to communicate with the user mobile application AP of the portable terminal TPU of the user UTI, for example according to a standard Wifi or Bluetooth, or by near field (NFC), or by optical communication (IR) or by electrical contact as a USB standard.
In this embodiment, when the user arrives at the container at the end of its movement 213, its opening code request 514 comprises an establishment of such a local electronic communication 520, at least unidirectional but possibly bidirectional.
In a similar manner to the second embodiment, the container sends the user application a status code D42, the user application checks the availability code according to it. If the verification is satisfactory, it provides 216 an opening code D23 and prepares 217 the sending 533 of the report message D55.
Preferably, the application sends the opening code D23 directly to the container 518; The opening control step 224 by the container is followed by a sending step 525, through said electronic communication from the container to the user application, of a message D54 containing at least one open container data. which represents an open container state. The preparation step 517 of an operation report message D55, by the user application, then comprises an inclusion in said message D55 of a realized opening data D553 which represents the fulfillment of the step 224 for unlocking or opening the container. Upon receipt 535 of the report message D55 by the management system SI, if its contents indicate that the open container message D54 has actually been received by the user application, this provides additional certainty that the user has could actually remove 231 the package from the container.
Optionally, for the third embodiment but possibly also for the other embodiments, the container comprises one or more presence detectors arranged to detect the presence of an object in the volume of the controlled crate, or a change of state between an empty state and a state containing an object (COL).
The detection of such a change of state then triggers a sending, from the container to the user application, of a transferred data item representing the completion by the user of an object transfer from or to the user. container. This transfer data item is included in the operation report message (D55), and provides additional certainty to the IS management system.
Of course, the invention is not limited to the examples that have just been described and many adjustments can be made to these examples without departing from the scope of the invention.
权利要求:
Claims (15)
[1" id="c-fr-0001]
A method for managing the logistic routing of one or more objects, in particular for distribution or collection, by at least one logistic operator to a plurality of users (UTI), comprising at least one transfer operation of a object (COL) by deposit and withdrawal of said object in a deposit container (BAC) whose access to the content is controlled by a lock controlled by an electronic controller, said transfer operation of a specific object being performed by a user ( UTI), characterized in that it comprises the following steps: - sending (202), by a management information system (SI), an electronic message of availability to a portable computerized terminal (TPU) equipping said user, communicating or able to communicate with a wireless communication network (RC) and executing at least one mobile user application adapted to receive said message, said message comprising a dispo code nibility (D21) calculated to represent at least one identification of a particular container for said transfer operation; - reception (211) of said availability electronic message by said portable computerized terminal (TPU), and display or transmission to the user of information representing at least one identification of said container; at the end of a movement (213) of said user to reach of said container, reception (214, 414) by the user application of a container code (D22) representing said container, by manual input by the user; user or electronic reading of a code (ID BAC) on the container concerned by the transfer operation, or by local electronic communication of the terminal with said container, thus creating for the user the need to be present or to immediate reach of said container; - check (215) optional that said container code (D22) corresponds to the container concerned by the transfer operation, compared with the availability code (D21), allowing the continuation of the operation in case of correspondence; - supply (216), performed by the user application without requiring communication with the network, an opening code (D23) calculated at least from the availability code (D21) and representing at least: o an identification said container (BAC), and o a time window of opening (pT2), determined to be later than the present moment and to give the user sufficient time to perform his operation, especially under normal conditions; - Preparation (217), by the user application, of an operation count message (D25) comprising at least one requested opening data, which represents the completion of the code provisioning step (216) opening; - after detection of a connectivity of the portable user terminal (TPI) with the wireless communication network, possibly after displacement (232) of the user, sending (233) automatically said operation report message (D25) from the user portable terminal (TPU) to the management information system (SI), without the need for user intervention; and storing (235) by said management information system (SI) at least one piece of data representing the completion of the transfer operation by the user; and in that it further comprises the following steps: - reception (221) of the opening code (D23) by the container (BAC) from the user by manual entry or from the application; determination by the container of an opening time range (pT2), by the electronic lock from the opening code, by extraction (D212) of a time data item (D232) from the opening code ( D23) or by calculation from the moment of reception of said opening code; and - checking (223) by the container of the validity of said opening code (D23), comprising at least: o a verification that the present moment is included in the said opening time range, and o if it does not has not been previously done (215) by the user application, a check that said opening code (D23) corresponds to the container concerned by the transfer operation, compared with an identification stored in said container; if said verification indicates that said opening code is valid, command (224) for opening or unlocking said container so as to give access to said object (COL).
[2" id="c-fr-0002]
2. Method according to the preceding claim, characterized in that it further comprises the following steps, performed by the user application without the need to communicate with the network: - determination of a time range of availability (pTl), from the availability message, by extraction (D212) from the availability code (D21) or by calculation from a time stamp of said availability message; and - checking (215) the validity of the availability code, comprising at least one verification that the present moment is included in said time range of availability; and in that said validity check (215) conditions the provision (216) of the opening code (D23).
[3" id="c-fr-0003]
3. Method according to any one of the preceding claims, characterized in that the validity check (215, 223) of the availability code (D21) or the opening code (D23) or both comprises a verification of the identity of an issuer of said code, by decryption and / or comparison of an electronic signature data.
[4" id="c-fr-0004]
4. Method according to any one of the preceding claims, characterized in that the validity check (215, 223) of the availability code (D21) or the opening code (D23) or both is arranged to allow a unique use of said code.
[5" id="c-fr-0005]
5. Method according to any one of the preceding claims, characterized in that: the opening time range (pT2) ends after a period of between 1 min and 30 min after the supply (216) of the code d opening (D23), and in particular between 5 minutes and 20 minutes; and the time range of availability, when it exists, ends after a period of between 1 day and 10 days after the sending of the availability code the supply (202) of the availability code (D21), and especially between 2 days and 6 days.
[6" id="c-fr-0006]
6. Method (4) according to any one of the preceding claims, characterized in that - the container (BAC) calculates and displays (420), permanently or in response to a user action (UTI) or the user application of its terminal (TPU), at least one status code (D42) representing one or more states of said container at the present time, among the following states: a unique identification of one or more ordered deposit volumes within said container, o an operating capacity level of one or more of its components, o a state of occupation of one or more deposition volumes controlled within said container, and o a state or a value of a clock that it uses to check the validity of the opening codes (D23) that it receives; the step of receiving (414) the container code by the user application comprises using said status code (D42) as all or part of the container code; the container identification verification step is performed (415) by the user application, and further includes verifying that the received status code (D42) corresponds to an acceptable state for the continuation of the transfer operation ; the operation report (D25) prepared (217) by the user application further comprises at least one possible opening datum, which represents a satisfactory verification (415) of the status code (D42) provided by the user application; container.
[7" id="c-fr-0007]
7. Method (5) according to any one of the preceding claims, characterized in that: the step of receiving (514) the container code (D42) by the user application comprises an establishment of an electronic communication (520 ) at least from the container to said user application; the opening control step (224) by the container is followed by a sending step (525), through said electronic communication from the container to the user application, of at least one container datum open (D54) representing an open container state; the step of preparing (517) an operation report message (D55), by the user application, then comprising an inclusion in said message of a realized opening data item (D553) which represents accomplishing the step (224) of unlocking or opening the container.
[8" id="c-fr-0008]
8. Method according to the preceding claim, characterized in that it further comprises a step of detection, by the container, of a change of state of at least one deposition volume between an empty state and a state containing a object (COL); which triggers a sending, from the container to the user application, of a transferred data item representing the completion by the user of an object transfer from or to the container; which transfer data item is included in the operation report message (D55).
[9" id="c-fr-0009]
9. Method according to any one of the preceding claims, characterized in that it comprises: - a transfer operation (1) according to any one of the preceding claims, comprising a deposit (118) in the container (BAC), by a delivery agent (LOG) for the logistics operator, an object (COL) from a logistics distribution center, including a package; and - subsequently, a transfer operation (2, 4, 5) according to any one of the preceding claims, comprising a withdrawal (231) of said object (COL) by the user (UTI).
[10" id="c-fr-0010]
10. Method according to the preceding claim, characterized in that the operation (1) of transfer by deposit comprises the following steps: - sending (105), by the computer system management (SI) of an electronic message (DU) to a portable computerized terminal (TPL) equipping the agent of the logistics operator, communicating or able to communicate with a wireless communication network and executing at least one mobile logistics application capable of receiving said message, said message comprising a data item representing a transfer order (ΘΤ), calculated to represent at least one identification of the deposit operation to be performed; at the end of a movement (113) of said logistics agent to reach of said container, carrying out the following phases, in this order or in another: reception (116) by the logistic application, in particular by electronic reading and / or manual entry and / or electronic communication with the object, a parcel code identifying the object (COL) and / or the deposition operation, or receiving (114) by the logistic application, in particular by electronic reading and / or manual entry and / or electronic communication with the object, a container code identifying the container (BAC), o deposit (118) of the object (COL) in a deposit volume of said container, o preparation (120), by the logistic application, of an operation report message (D15) comprising at least one deposit data item, which represents the completion of the deposit transfer operation ; - after detection of connectivity of the portable logistical terminal (TPL) with the wireless communication network, possibly after displacement (132) of the logistic agent, sending (133) of said operation log message (D15) from said portable logistic terminal to the management information system (SI),; and - storing (135) by said management information system (SI) at least one data representing an achievement of the deposit transfer operation.
[11" id="c-fr-0011]
11. Method according to any one of claims 1 to 8, characterized in that the transfer operation (3) comprises a deposit (331) by the user (UTI) of an object (COL) in the container ( BAC), in particular a package, and in that it further comprises a collection of said object by a collection agent (LOG) on behalf of the logistics operator.
[12" id="c-fr-0012]
12. A digital data processing method, implemented by a portable computerized telephone terminal (TPU), comprising executing program instructions carrying out the mobile application (AP) operations within a method (1). , 2, 3, 4, 5) according to one of the preceding claims.
[13" id="c-fr-0013]
13. A method of digital data processing, comprising - on the one hand an execution, by one or more computers communicating with a wireless telephone network (RC), of program instructions carrying out the operations of the management information system (SI ) in a process (1, 2, 3, 4, 5) according to any one of claims 1 to 11; and on the other hand an execution, by an electronic lock controlling the access to the contents of one or more containers, of program instructions carrying out the operations of the deposit container (BAC) in a method according to the any of claims 1 to 11.
[14" id="c-fr-0014]
Computer system (SI) programmed to perform the operations of a method according to claim 13.
[15" id="c-fr-0015]
Deposit container (BAC) comprising one or more deposit volumes (B1) whose access to the contents is controlled by an electronically controlled control lock (B4), which is programmed to perform the operations of the container of a process according to claim 13.
类似技术:
公开号 | 公开日 | 专利标题
EP3211575B1|2018-09-19|Process for managing parcel delivery and associated computer system and containers
EP3243178B1|2021-04-28|Method for processing a transaction from a communication terminal
US9452884B2|2016-09-27|Secure repair kiosk system and method
FR3038429A1|2017-01-06|PAYMENT CONTAINER, CREATION METHOD, PROCESSING METHOD, DEVICES AND PROGRAMS THEREOF
US9959521B2|2018-05-01|System and method for control of bailment inventory
US11005854B2|2021-05-11|Delivery security system
FR2940567A1|2010-06-25|TRANSACTION SECURING METHOD, TRANSACTION DEVICE, BANK SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAM PRODUCTS
EP1771827A1|2007-04-11|Multipurpose electronic payment method and system
CA3067220A1|2018-12-20|Systems and methods for facilitating parcel pickup
US20180315012A1|2018-11-01|Access authentication and/or item process management using identification codes
EP3168769B1|2021-01-06|Method for assisting with the authentication of a user, corresponding server and computer program
FR2915606A1|2008-10-31|Service or event e.g. sports event, access controlling method, involves validating access in case of success of interrogation, and updating, in real time, interrogated database to indicate that access authorization is validated
WO2016083101A1|2016-06-02|Method and system for managing delivery lockers, and delivery facility using such a method and/or such a system
US20200074400A1|2020-03-05|Facilitating delivery of a product
FR3095867A1|2020-11-13|MANAGEMENT OF A LOCAL TRANSFER OF RESPONSIBILITY BETWEEN FORWARDERS FOR THE DELIVERY OF A PARCEL
WO2016083161A1|2016-06-02|Method and system for managing delivery lockers, and delivery facility using such a method and/or such a system
FR3078192A1|2019-08-23|DEVICE FOR STORING OBJECTS, AND METHOD USING SUCH A DEVICE
EP3752990A1|2020-12-23|Device for storing objects and method using such a device
FR3090959A1|2020-06-26|Processing an electronic ticket service
FR3104304A1|2021-06-11|Fraud detection system and method
FR3081305A1|2019-11-29|MUTUALIZED PACKAGE BOX FOR COLLECTIVE MAIL DISTRIBUTION SYSTEM AND SYSTEM INTEGRATING SUCH BOX
BE1019350A3|2012-06-05|USE OF AN ELECTRONIC IDENTITY CARD AS AN AFFILIATION CARD.
FR3026879A1|2016-04-08|PAYMENT SYSTEM, DOOR MONNAIE DEMATERIALIZED OR ACCESS CONTROL OPERATING BY SECURITY CODE RECALCULATED CYCLICALLY
FR3089670A1|2020-06-12|Object storage device, and method using such a device
FR2985347A1|2013-07-05|Method for check in of luggage of user for air trip at airport, involves modifying data associated with trip from movable terminal, and determining authorization/non-check in of data of luggage according to modified data
同族专利:
公开号 | 公开日
EP3211575A1|2017-08-30|
EP3211575B1|2018-09-19|
FR3048093B1|2018-03-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
WO2015100390A1|2013-12-23|2015-07-02|Parcel Pending|Smart locker system and method of parcel delivery|CN110782193A|2018-12-04|2020-02-11|北京嘀嘀无限科技发展有限公司|Method, apparatus and computer readable medium for managing object distribution|
FR3099276A1|2019-07-26|2021-01-29|Promus|LOGISTICS SYSTEM AND PROCESS FOR FRESH FOOD PRODUCTS|FR3009113B1|2013-07-23|2016-12-09|Dubois Ind|HORODATE ACCESS CONTROL DEVICE WITH CODES AND MANUAL PROGRAMMING|WO2019161873A1|2018-02-23|2019-08-29|Swipbox A/S|Computer-implemented method for operating a distributed service point network, a server and a user application therefore|
CA3092671A1|2018-02-23|2019-08-29|aCon A/S|Method for allocating parcels and a system therefore|
CN109191054A|2018-11-02|2019-01-11|比比物流有限公司|Shared box for material circulation and its weighing charging method, system with weighing sensor|
法律状态:
2017-02-27| PLFP| Fee payment|Year of fee payment: 2 |
2017-08-25| PLSC| Publication of the preliminary search report|Effective date: 20170825 |
2018-02-22| PLFP| Fee payment|Year of fee payment: 3 |
2019-02-22| PLFP| Fee payment|Year of fee payment: 4 |
2020-11-06| ST| Notification of lapse|Effective date: 20201006 |
优先权:
申请号 | 申请日 | 专利标题
FR1651478A|FR3048093B1|2016-02-23|2016-02-23|PACKAGE DELIVERY MANAGEMENT METHOD, AND COMPUTER MANAGEMENT SYSTEM AND ASSOCIATED CONTAINERS|FR1651478A| FR3048093B1|2016-02-23|2016-02-23|PACKAGE DELIVERY MANAGEMENT METHOD, AND COMPUTER MANAGEMENT SYSTEM AND ASSOCIATED CONTAINERS|
EP17157681.2A| EP3211575B1|2016-02-23|2017-02-23|Process for managing parcel delivery and associated computer system and containers|
[返回顶部]