Monitoring Duration of Stay and Region of Stay

20220122399 · 2022-04-21

Assignee

Inventors

Cpc classification

International classification

Abstract

Embodiments of a method are disclosed. In the method, it is checked whether a person stayed in a building or part of the building for less or no longer than a predefined duration to perform an action and/or only stayed in a predefined region of a building or part of the building. The building is accessible via an entrance securable with respect to unauthorised entry. Also, embodiments of a method are disclosed in which it is checked whether a person stayed in the building for less or no longer than a predefined duration to perform an action. Embodiments of a method are also disclosed in which information to unlock or indicative of a successful unlocking of an entrance securable with respect to unauthorised entry is received, and one or a plurality of signals which allow a position in the building to be deduced are provided.

Claims

1) A method performed by at least one apparatus, wherein the at least one apparatus is or comprises a server or a part thereof, the method comprising: providing access authorisation information to allow entry of a person in order to perform an action into a building or a part of the building via an entrance securable with respect to unauthorised entry, wherein the building or the part of the building is accessible via an entrance securable with respect to unauthorised entry, determining the beginning of a duration of stay of the person in the building or part of the building based at least on providing access authorisation information to allow entry of the person in order to perform the action into the building or the part of the building via the entrance securable with respect to unauthorised entry, checking whether the person, in order to perform the action, stayed in the building or part of the building for less or no longer than a predefined duration.

2) The method according to claim 1, the method further comprising: receiving a request for access authorisation information to allow entry of the person in order to perform the action into the building or the part of the building via the entrance securable with respect to unauthorised entry.

3) The method according to claim 1, the method further comprising: receiving position information representative of the position of the person; checking the plausibility of the received position information representative of the position of the person and the requested access authorisation information.

4) The method according to claim 1, wherein the method further comprises: receiving information indicative of a successful unlocking of the entrance securable with respect to unauthorised entry; determining the beginning of a duration of stay of the person in the building or part of the building based at least on receiving information indicative of a successful unlocking of the entrance securable with respect to unauthorised entry.

5) The method according to claim 1, wherein the method further comprises: providing information indicative of the beginning of the action to be performed when the access authorisation information to allow entry of the person in order to perform the action into the building or the part of the building via the entrance securable with respect to unauthorised entry was provided or when the information indicative of a successful unlocking of the entrance securable with respect to unauthorised entry was received.

6) The method according to claim 1, the method further comprising: checking whether the predefined duration has elapsed; and/or checking whether the action was performed successfully.

7) The method according to claim 1, the method further comprising: receiving a notification that the person stayed in the building or part of the building for not less or longer than a predefined duration and/or did not only stay in the predefined region of the building or part of the building.

8) The method according to claim 1, the method further comprising: receiving information representative of a reason why the predefined duration has elapsed and/or the predefined region was left.

9) The method according to claim 1, wherein the method further comprises: determining the predefined duration based on action-specific information in relation to the respective action to be performed and/or based on empirical values in relation to actions already performed.

10) The method according to claim 1, the method further comprising: providing information representative of a reason why the predefined duration has elapsed and/or the predefined region was left

11) The method according to claim 1, the method further comprising: receiving information concerning an entry of the person into the building or the part of the building from an intruder alarm system; and/or providing information concerning the authorisation of an entry of the person into the building or the part of the building to an intruder alarm system.

12) A method performed by at least one apparatus, wherein the at least one apparatus is or comprises an electronic lock, a beacon or a part thereof, the method comprising: receiving information to unlock or indicative of a successful unlocking of an entrance securable with respect to unauthorised entry, via which a building or part of the building is accessible; and providing one or a plurality of signals which allow a position in the building or part of the building to be deduced, wherein a predefined region of the building or part of the building, in which a person is or is not allowed to stay to perform an action, is at least partially defined by providing the one or the plurality of signals.

13) The method according to claim 12, the method further comprising: providing information indicative of a successful unlocking of the entrance securable with respect to unauthorised entry.

14) The method according to claim 12, the method further comprising: receiving information to secure or indicative of successful securing of the entrance securable with respect to unauthorised entry; providing information indicative of successful securing of the entrance securable with respect to unauthorised entry.

15) A method performed by at least one apparatus, wherein the at least one apparatus is or comprises an electronic lock, a beacon or a part thereof, the method comprising: receiving information to unlock an entrance securable with respect to unauthorised entry by a person, via which a building or a part of the building is accessible; providing an activation signal to an alarm unit dependent on the person, wherein the alarm unit checks whether the person is in a permitted or prohibited region; receiving information to secure the entrance by the person; providing a deactivation signal to the alarm unit.

16) The method according to claim 15, wherein an activation signal is provided dependent on whether the person belongs to a predefined group of persons.

17) An apparatus, configured to carry out or comprising means to carry out the method according to claim 1.

18) A system comprising: one or a plurality of apparatuses configured to carry out or comprising means to carry out the method according to claim 1.

19) A non-transitory, machine readable medium, comprising: program instructions to perform the method according to claim 1, when the program is executed on a processor.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0158] In the figures:

[0159] FIG. 1 shows a block diagram of an exemplary embodiment of apparatuses according to the invention;

[0160] FIGS. 2a-f show a flow diagram of a first exemplary embodiment of methods according to the invention;

[0161] FIGS. 3a-c show an exemplary schematic representation of different regions of a part of the building;

[0162] FIGS. 4a-c show an exemplary schematic representation of a position determination in a part of the building; and

[0163] FIGS. 5a, b show a flow diagram of a second exemplary embodiment of methods according to the invention.

DETAILED DESCRIPTION OF A NUMBER OF EXEMPLARY EMBODIMENTS OF THE INVENTION

[0164] FIG. 1 shows a block diagram of an exemplary embodiment of an apparatus 1 according to the invention. The apparatus 1 formed as a data processing system serves as an example for apparatuses according to the different aspects, in particular an apparatus according to the first, second or third aspect (for example apparatus 100, 200, 300 or 350) can be designed according to the apparatus 1.

[0165] The apparatus 1 can, in this respect, for example be a computer, a desktop computer, a server, a thinclient or a portable computer such as a laptop computer, a tablet computer, a personal digital assistant (PDA), a smartphone or a hand scanner. The apparatus can for example fulfil the function of a server or a client

[0166] Processor 10 of the apparatus 1 is in particular formed as a microprocessor, microcontrol unit, microcontroller, digital signal processor (DSP), application-specific integrated circuit (ASIC) or field programmable gate array (FPGA).

[0167] Processor 10 executes program instructions which are stored in the program memory 12 and stores, for example, intermediate results or similar in working or main memory 11. For example, program memory 120 is a non-volatile memory such as a flash memory, a magnetic memory, an EEPROM memory (electrically erasable programmable read-only memory) and/or an optical memory. Main memory 11 is, for example, a volatile or non-volatile memory, in particular a memory with random access memory (RAM) such as a static RAM memory (SRAM), a dynamic RAM memory (DRAM), a ferroelectric RAM memory (FeRAM) and/or a magnetic RAM memory (MRAM).

[0168] Program memory 12 is preferably a local data carrier permanently connected to the apparatus 1. Data carriers permanently connected to the data processing system 1 are for example hard discs that are installed in the apparatus 1. Alternatively, the data carrier can for example also be a data carrier that is detachably connectable to the apparatus 1 such as a memory stick, a removable data carrier, a portable hard disc, a CD, a DVD and/or a diskette.

[0169] Program memory 12 for example contains the operating system of the apparatus 1 which, on starting the apparatus 1, is, at least in some cases, loaded into the main memory 11 and executed by the processor 10. In particular, upon starting apparatus 1, at least one part of the core of the operating system is loaded in the main memory 11 and executed by the processor 10. The operating system of apparatus 1 is for example a Windows, UNIX, Linux, Android, Apple iOS and/or MAC operating system.

[0170] In particular, the operating system makes it possible to use the apparatus 1 for data processing. For example, it administers tools such as main storage device 11 and program storage device 12, network interface 13, input and output device 14, provides fundamental functions inter alia through programming interfaces with other programs and controls the execution of computer programs.

[0171] Processor 10 controls the communications interface 13 which can for example be a network interface and be formed as a network card, network module and/or modem. The communications interface 13 is, in particular, configured to establish a connection of the apparatus 1 with other apparatuses, in particular via a (wireless) communications system, for example a network and communicate therewith. The communications interface 13 can for example receive data (via the communications system) and provide it to processor 10 and/or receive data from processor 10 and send it (via the communications system). Examples of communications systems are a local area network (LAN), a wide area network (WAN), a wireless network (for example according to the IEEE-802.11 standard, the Bluetooth (LE) standard and/or the NFC standard), a wired network, a mobile phone network, a telephone network and/or the internet.

[0172] Furthermore, processor 10 can control at least one input/output device 14. An input/output device 14 is for example a keyboard, a mouse, a display unit, a microphone, a touch-sensitive display unit, a speaker, a reading apparatus, a disc drive and/or a camera. An input/output device 14 can, for example, receive inputs from a user and provide them to processor 10 and/or receive and send information for the user of processor 10.

[0173] FIGS. 2a to 2f show a flow diagram of a first exemplary embodiment of methods according to the invention according to the different aspects of the present invention. The interfaces between the figures are labelled with reference numerals in the flow diagram. The exemplary embodiment relates to the delivery of a parcel by a delivery agent 400. The example is, however, also transferable to other actions to be performed by other individuals.

[0174] The represented exemplary embodiment is implemented in this case with a mobile device 100 (for example a mobile telephone or a hand scanner) of the delivery agent 400 as an exemplary apparatus according to the first aspect to perform an exemplary method according to the first aspect, with a server 200 as an exemplary apparatus according to the second aspect to perform an exemplary method according to the second aspect and with an electronic door lock 300 and a beacon 350 respectively as exemplary apparatuses according to the third aspect to perform an exemplary method according to the third aspect. Actions are also performed by an administration application 500. Actions concerning the delivery agent 400 are also represented.

[0175] The exemplary embodiment is suitable in particular for a delivery in a private secure area, for example in an apartment behind an apartment door.

[0176] The delivery agent 400 with the mobile device 100 is initially located in front of a residence to which the parcel is supposed to be delivered (action 401). The mobile device 100 has access to the internet and can locate its position representative of the position of the delivery agent 400 for example by means of GPS.

[0177] The delivery agent 400 operates the mobile device and requests access to the apartment by means of an input device (action 402). The mobile device 100 then requests access authorisation information and also sends position data, for example based on GPS data or the signal strength of the mobile phone network (action 101). The server 200 receives the request and check the plausibility of the requested access in any case based on a position of the mobile device 100 representative of the position of the delivery agent 400 (action 201). The server 200 requests access authorisation information from an administration application 500. It can be operated for example by an employee of the delivery company or the resident of the apartment Access authorisations are assigned by means of the administration application 500. This can occur ad hoc, i.e. only when the delivery agent 400 is located in front of the residence (action 501). Alternatively, access authorisations can also be allocated in advance and stored on the server 200. The server 200 receives access authorisation information from the administration application 500 such that a personal and client-specific allocation of access authorisations by the server 200 can take place (action 202). In this case, a (first) predefined duration is determined for which the delivery agent is allowed to at most stay in the apartment for the delivery, in this example 15 seconds. The communication with the administration application 500 takes place for example by means of email, SMS and/or push notifications.

[0178] The server 200 allocates an access authorisation that is unique (i.e. to be used only once), immediate (i.e. usable only within a very limited duration) and time-limited (i.e. permitting only a determined stay) and sends access authorisation information to the mobile device 100 for this purpose (action 203). Sending the access authorisation information also includes sending the first predefined duration, for which the delivery agent 400 is allowed to at most stay in the apartment A timer with a (second) predefined duration is initialised and started on the server side triggered by the sending of the access authorisation information (action 204). The second predefined duration is for example 5 minutes. This second predefined duration serves as an additional verification on the server side of the stay of the delivery agent, for example in the event that the communication with the mobile device 100 terminates. After initialising the server-side timer with the second predefined duration, the server 200 sends information representative of the beginning of the house delivery to the administration application 500 (action 205) which displays it (action 502).

[0179] The information that the house delivery is beginning can also be provided to an intruder alarm system (IAS) of the house or the apartment in order to avoid a false alarm.

[0180] The access authorisation information is received by the mobile device 100 (action 102). A response including the first predefined duration takes place to the delivery agent 400, for example via an output device (for example the screen) of the mobile device 100 (action 403). The delivery agent 400 goes to the door (action 404) and opens the door with the mobile device 100 (action 405).

[0181] The mobile device 100 then sends access authorisation information (preferably including the first predefined duration) to the electronic door lock 300 (action 103) which is then unlocked (for example unlocked and opened) (action 301).

[0182] The electronic lock 300 then regularly sends signals for the received first predefined duration which allow the position in the apartment to be deduced, for example Bluetooth signals (action 302). The electronic lock can thus in particular check whether the first predefined duration is reached (action 303) and then adjust the sending of the signals. The information that the door is opened or is open can also be sent to the beacon 350 which then also regularly sends (Bluetooth) signals which allow the position in the apartment to be deduced (action 352). The (internet-capable) beacon 350 can optionally (or alternatively the mobile device 100 after obtaining a confirmation that the door is opened or is open) provide the information indicative of an unlocking of the door to the server 200 (action 351).

[0183] The delivery agent 400 can now place the parcel behind the door in the entrance region of the apartment (action 406). In this case, checking whether the delivery agent stayed in the apartment for less or no longer than the (first and/or second) predefined duration for the delivery and only stayed in a predefined region of the apartment takes place as is described in greater detail below.

[0184] After sending the access authorisation information (action 103) by the mobile device 100 (and preferably after obtaining a confirmation by the electronic lock 300 that the door is unlocked), it is verified whether the mobile device 100 has a connection to the internet (action 106) and if not, whether there is a connection to a mobile phone network (action 107). Information representative of the unlocking of the apartment door is sent to the server 200 dependent on the check and is received there via the internet (action 206) or by SMS or telephone call (action 207). The server 200 in turn sends information representative of the beginning of the apartment delivery to the administration application 500 (action 206 or 207) which displays it (action 503).

[0185] Furthermore, monitoring in relation to the signals sent by the electronic door lock 300 and the beacon 350 is started by the mobile device 100 (action 104) in order to verify the stay of the person in the predefined region. This can in particular be verified based on the receipt of the beacon and/or door lock signals and the signal strength. A timer with the first predefined duration is also initialised and started (action 105). Sensor monitoring (action 105) comprising the analysis of sensor data (action 108) is also started.

[0186] The sensor monitoring (actions 105, 108) represented in FIG. 2b is represented by way of example with additional details in FIG. 2f and is now described in more detail in connection with FIG. 2f The sensors used are preferably sensors of the mobile device 100 itself On the one hand, the movement width of the mobile device and therefore indirectly that of the delivery agent 400 is measured (action 150). For example, a conclusion is drawn concerning conspicuous behaviour of the delivery agent 400 and in the case of a movement above a threshold value (for example a movement of more than 2 m) an alarm signal is emitted (action 151).

[0187] Additionally, sensor data (for example of a motion sensor, of an acceleration sensor, of a magnetic field sensors, of a gyroscope, of a magnetometer and/or of an infrared sensor) are measured to determine for example an orientation, an acceleration, the earth's magnetic field and/or a rotation (action 152). The data are then in particular verified for patterns (action 153). This can for example be performed by a rule-based algorithm or an artificial neuronal network (ANN) (action 154). Examples of undesired conspicuous behaviour (and associated detectable patterns) are placing down the mobile device (no movement), running (very fast movement), swinging (excessively regular movement), shaking (excessively short, frequent impacts), throwing. In particular in the case of an artificial neuronal network, it can be trained by sensor data of different mobile devices (action 155). If a conclusion is drawn concerning conspicuous behaviour of the delivery agent 400, an alarm signal can in turn be emitted (action 156).

[0188] Furthermore, radio signals, in particular according to the IEEE-802.11 standard, the Bluetooth standard or the NFC standard can be received and used as sensor data. To this end, for example the strength and/or change of the signals is taken into account, which for example can be influenced and/or caused by shadowing, reflection and/or the Doppler effect This sensor data can also to this end be verified for (conspicuous) patterns (action 157). For example, to this end, one or a plurality of object density(ies) (in the vicinity) can be measured which are representative of one or a plurality of individuals. In particular, the extent and the direction of the change can be determined. If for example a plurality of (different) object densities are determined, it can be determined as an example of a conspicuous pattern that more than one person is present If a conclusion is drawn concerning conspicuous behaviour of the delivery agent 400 or more additional individuals, an alarm signal can in turn be emitted (action 158). For example, in the case of falling below and/or exceeding the object density below or above a threshold value (for example 30% object density drop within 5 seconds) may be a conspicuous pattern since this indicates removal of an additional person.

[0189] Additional sensors can also still be used in order to draw a conclusion concerning conspicuous behaviour of the delivery agent 400. For example, it can be (repeatedly) verified by means of a fingerprint sensor of the mobile device 100 whether the delivery agent 400 holds the mobile device 100 in their hand.

[0190] Returning to FIG. 2b, it is now checked whether the analysis emits an alarm signal and a conclusion can be drawn concerning conspicuous behaviour (action 109). As a consequence, an (acoustic and/or optical) alarm can for example be emitted from the mobile device 100 for the delivery agent (action 110). Alternatively or additionally, the predefined duration can be shortened, for example by running the timer faster (action 110).

[0191] The same consequence (i.e. action 110) can take place when the mobile device 100 determines that the delivery agent did not only stay in the predefined region, for example because the signals of the electronic lock 300 and/or the beacon 350 are too weak (action 111). Alternatively or additionally, the beacon 350 can determine that the delivery agent stayed outside of the predefined region (action 353) and/or is located within a prohibited area (action 354).

[0192] The check represented in FIG. 2b whether the delivery agent only stayed in the predefined region is now described in more detail using an example in connection with FIG. 3.

[0193] FIG. 3a-c show an exemplary schematic representation of different regions of a part of the building. The entrance in the form of the door 800 comprises an electronic lock, for example the electronic lock 300. The electronic lock 300 comprises both on its inside and on its outside a Bluetooth LE chip. The electronic lock 300 therefore provides a beacon 801 on its inside and a beacon 802 on its outside (see FIG. 3c). The beacons 801, 802 define in the region, in which the signals of the beacons 801, 802 can be received (or are above a threshold value), permitted regions 803, 804. The delivery agent is allowed to stay in this area during the delivery. If it is thus determined that the mobile device 100 is located in the region 803 or 804, it can be assumed that the delivery agent 400 stays in the predefined region. In the region 805, on the other hand, the signals of the beacons 801, 802 are not received or received only below a threshold value. This region 805 constitutes a prohibited region outside of the predefined region. If it is thus determined that the mobile device 100 is not located in the region 803 or 804, it can be assumed that the delivery agent 400 does not stay only in the predefined region. Furthermore, a separate Bluetooth beacon 350 is placed in the entrance region. The region 807, in which the signals of the beacon 350 are received or are above a threshold value, is in this case a prohibited region. If it is thus determined that the mobile device 100 is located in the region 807, it can be assumed that the delivery agent 400 stays outside of the predefined region and therefore does not stay only in the predefined region. It is for example also possible to define an additional permitted region, instead of a prohibited region, by way of the beacon 350.

[0194] Essentially, the presence of the mobile device 100 in the respective region can be performed by the mobile device 100. Alternatively or additionally, it is also, however, conceivable for the position of the mobile device 100 to be determined by the beacons 801, 802, 350. For this purpose, the mobile device 100 can for example regularly send (Bluetooth) signals which are received by the beacons. Based on for example the received signal strength of the signals sent by the mobile device 100, the position of the mobile device 100 can then be determined.

[0195] Using FIG. 4a-c, an additional example is shown regarding how alternatively or also in combination with the one previously described, checking whether the delivery agent only stayed in the predefined region can be performed.

[0196] The delivery agent 400 is located in front of the door 800 with the electronic lock 300. The electronic lock 300 comprises a Bluetooth LE chip such that the electronic lock also comprises a beacon 801. A additional separate beacon 350 was also placed in the building or part of the building. The signal strength (for example the received signal strength) of the signals of the beacon 801 can be measured by a mobile device (for example the mobile device 100, for example a smartphone) of the delivery agent 400 upon opening (for example shortly before, shortly after or during) the door 800. In this case, the mobile device has the distance 810 from beacon 801. The door 800 is then opened, which leads to an increased distance 811 from the beacon 801 and to a lower signal strength (FIG. 4b). The distance 811 will substantially correspond to the width of the door 800. Based on typical values or empirical values for the distance 810 and/or 811, a conversion factor can be determined by means of which the distance between mobile device 100 and corresponding beacon can be determined from the received signal strength. In the case of opened door 800, the signal strength of signals of the beacon 350 distanced a distance 812 can also be measured by the mobile device 100. If the delivery agent 400 enters the building or the part of the building to deliver a shipment (FIG. 3c), the signal strengths change according to the distances 813, 814 of the beacons 801, 350. In particular based on the conversion factor and with the aid of triangulation, the position of the mobile device 100 and therefore of the delivery agent 400 can be determined. If the delivery agent 400 proceeds too far into the building or the part of the building, i.e. if the delivery agent does not stay only in a predefined region, this can be determined by the mobile device.

[0197] In particular in this connection, it is advantage for the measured signal strengths and/or the determined conversion factors to for example be transferred to a server (for example server 200). This information can allow the subsequent determination of the conversion factor to be optimised by the underlying model being adapted based on the information.

[0198] The methods represented in FIG. 3, 4, however, constitute only one possible exemplary embodiment in order to determine whether the delivery agent 400 only stayed in the predefined region. Other, in particular described embodiments are also possible (for example based on positioning of the mobile device 100 based on WLAN signals or the earth's magnetic field). To name one additional example, alternatively or additionally, motion detectors (for example a PIR sensor) can be used to verify whether the delivery agent 400 only stayed in the predefined region.

[0199] Returning to FIG. 2b, in particular in the cases where the first predefined duration has elapsed (action 112), a signal is not received to deduce the position (action 113) and/or it is determined that the delivery agent is located outside of the predefined region, for example because the signal is too weak (action 111, action 353), it is checked whether the delivery agent has left the house or the apartment. In this case, this is enabled by checking whether the door is locked from the outside (action 114, 115). Essentially, however, it is also possible for checking the door status (in particular whether the door is locked from the outside) to take place triggered by other events or to check in another manner whether the house or the apartment was left.

[0200] For the case where the delivery agent 400 has placed down the parcel (action 406) and then closed the door and locked it from the outside (action 407), this is determined by the electronic door lock 300 (action 304) and information indicative of successful securing of the door is sent to the mobile device 100 and/or the beacon 350 (action 305). The regular sending of the signals to deduce the position can be stopped (action 306). In this case, a verification of the door status leads to a positive result (i.e. it is determined that the door is locked from the outside) such that it can be decided that a successful delivery has taken place (action 116). Information indicative of a successful delivery can also be sent to the server 200. Both the spatial monitoring, the sensor monitoring and the timer can then be stopped (action 117).

[0201] It can optionally be requested that the delivery agent 400 manually confirm the parcel delivery via an input device of the mobile device 100 (action 408). The delivery agent can close the program on the mobile device if required (action 409).

[0202] The server 200 verifies whether the delivery was successful (action 209), in particular if the second predefined duration has elapsed (action 208). If the server received the information indicative of a successful delivery from the mobile device 100, in particular information indicative of a successful delivery can be sent to the administration application 500 so that an administrator or the resident can be notified concerning the successful delivery (action 504). The server-side timer can then also be stopped (action 210).

[0203] If, on the other hand, after a elapsed second predefined duration in the case of action 209, it is determined that the delivery was not successful, information indicative of an unsuccessful delivery is sent to the administration application 500 such that the user can be notified concerning a delivery with a elapsing of time without a response from the delivery agent 400 (action 505).

[0204] Alternatively or additionally, information indicative of a successful securing of the door can also be sent by the beacon 350 to the server 200 (action 355). Based on this information, it can then be determined by the server 200 that the delivery was successful (action 209).

[0205] Now the case is considered where it is determined that the delivery agent 400 stayed for not less or longer than a predefined duration and/or stayed not only in the predefined region in the apartment. This is in particular the case when in the case of action 114 and/or action 115, it is not determined that the door was locked from the outside.

[0206] If it is determined that the delivery agent 400 stayed for not less or longer than a predefined duration in the apartment (for example after checking according to action 115), a preferably silent alarm is triggered (action 118). A silent alarm is in particular understood as the alarm not being discernible to the delivery agent 400 in order to reduce the danger of the mobile device 100 being deactivated or switched off. It is firstly verified which kind of communications connection to the mobile device 100 is available. In this example, it is firstly checked whether there is a connection to the internet (action 119). If this is the case, a notification indicative of a elapsing of time is sent to the server 200 (action 120). The sever 200 verifies (for example regularly, in particular as long as the second predefined duration has not yet elapsed (see action 208)) whether a timeout was reported (action 211). If this is the case, on the one hand, a notification is sent to the administration application 500 so that the user is notified concerning the timeout (optionally with the information to what extent the predefined duration was exceeded, action 506). On the other hand, a query of the reasons why the timeout took place is triggered by the server 200 (action 212). The mobile device 100 then queries the reasons for this with the delivery agent 400 (action 121, action 410). The delivery agent 400 can input the reasons on the mobile device 100 by means of an input device (action 411). The reasons are sent to the server 200 and stored by the server (action 213). A notification can also be sent to the administration application 500 so that the user is notified of the reasons (action 507).

[0207] If it is determined that the delivery agent 400 did not only stay in the predefined region in the apartment (for example after checking according to action 114), a preferably silent alarm is also triggered (action 122). It is firstly verified which kind of communications connection to the mobile device 100 is available. In this example, it is firstly checked whether there is a connection to the internet (action 123). If this is the case, a notification indicative of the region being left is sent to the server 200 (action 124). The sever 200 verifies (for example regularly, in particular as long as the second predefined duration has not yet elapsed (see action 208)) whether the region being left was reported (action 214). If this is the case, on the one hand, a notification is sent to the administration application 500 so that the user is notified concerning the region being left (action 508). On the other hand, a query of the reasons why the region was left is triggered by the server 200 (action 215). The mobile device 100 then queries the reasons for this with the delivery agent 400 (action 125, action 412). The delivery agent 400 can input the reasons on the mobile device 100 by means of an input device (action 413). The reasons are sent to the server 200 and stored by the server (action 216). A notification can also be sent to the administration application 500 so that the user is notified of the reasons (action 509).

[0208] Additionally or alternatively, the beacon 350 (for example when stay of the delivery agent 400 in a prohibited area is determined by the beacon 350 (action 354)) can trigger an alarm (action 356) and/or can send information indicative of the predefined region being left to the server 200 (action 357). Information indicative of an entry to the building, part of the building or a part thereof can also be sent by an intruder alarm system to the server 200. In this case, it can be taken into account on the server side whether the respective behaviour was previously authorised (action 217). Such an authorisation can be received by the intruder alarm system. This can avoid a false alarm by the intruder alarm system.

[0209] The server-side checking for an alarm in relation to a timeout (action 211) or in relation to the region being left (action 214) can be repeated (periodically) until the second predefined duration has elapsed (action 208).

[0210] If there is no internet connection (action 119 or 123), it is checked in this example whether there is a connection to a mobile phone network for the mobile device 100 (action 126 or 127). If this is the case, a notification indicative of a timeout or the region being left is sent to the server 200 (action 128 or 129). This can for example take place by means of SMS or by means of a telephone call. The server 200 sends a notification to the administration application 500 (action 217 or 218) so that the user can be notified concerning the timeout or concerning the region being left (without a response from the delivery agent 400) (action 510 or 511).

[0211] The FIGS. 5a, 513 show a flow diagram of a second exemplary embodiment of methods according to the invention according to the different aspects. The interfaces between the figures are labelled with reference numerals in the flow diagram. The exemplary embodiment relates to the delivery of a parcel by a delivery agent The example is, in turn, also transferable to other actions to be performed by other individuals.

[0212] Unlike the exemplary embodiment from FIG. 2, this exemplary embodiment is in particular suitable for a delivery in a partially public secure area, for example a stairwell. In this case, a separate beacon 350 is not used. It is also not checked in the exemplary embodiment of FIG. 5 whether the delivery agent only stayed in a predefined region. It is only checked whether the delivery agent stayed for less or no longer than a predefined duration in the house.

[0213] The represented exemplary embodiment is performed in this case with a mobile device 100′ (for example a mobile telephone or a hand scanner) of the delivery agent 400′ as an exemplary apparatus according to the first aspect to perform an exemplary method according to the first aspect, with a server 200′ as an exemplary apparatus according to the second aspect to perform an exemplary method according to the second aspect and with an electronic door lock 300. Actions are also performed by an administration application 500′. Actions concerning the delivery agent 400′ are also represented.

[0214] In this case, the delivery agent 400′ can administer access authorisations, in particular independently of their location and in advance of the delivery (action 420′). The mobile device 100′ then requests corresponding access authorisation information from the server 200′ (action 101′).

[0215] Access authorisations can be assigned or allocated in advance of the delivery for example by an employee of the delivery company or the resident of the apartment by means of the administration application 500′ (action 501′). For example, it is determined by means of the administration software 500′ that access authorisations can be allocated at certain times (for example such that an entrance is enabled on certain days and times, for example weekdays from 9 am to 5 pm). The server 200′ receives access authorisation information from the administration application 500′ such that a personal and client-specific allocation of access authorisations by the server 200′ can take place (action 202′). The server 200′ allocates an access authorisation that is permanent (i.e. to be used repeatedly), stored (i.e. usable at any time) and time-limited (i.e. permitting only a determined stay) and sends access authorisation information to the mobile device 100′ for this purpose (action 203′). In this case, a (first) predefined duration is determined for which the delivery agent 400′ is allowed to at most stay in the house for the delivery, in this example 60 seconds. Sending the access authorisation information can also include sending the first predefined duration, for which the delivery agent 400′ is allowed to at most stay in the house. The access authorisation information is received by the mobile device 100′ (action 102′). It is also possible for the access authorisation information to be pushed to the mobile device 100′ without a prior request

[0216] If the delivery agent 400′ with the mobile device 100′ is located in front of a residence to which the parcel is supposed to be delivered (action 401′), entry to the house can be manually requested by means of the mobile device by the delivery agent 400′ (or alternatively automatically by the mobile device, for example based on position data) (action 402′). Based on position data, for example based on GPS data or the signal strength of the mobile phone network, the mobile apparatus 100′ checks the plausibility of the requested entry at least based on a determined position of the mobile device 100′ (action 140′).

[0217] A response (preferably including the first predefined duration) takes place to the delivery agent 400′, for example via the screen of the mobile device 100′ (action 403′). The delivery agent 400′ opens the door with the mobile device 100′ (action 405′). For this purpose, the mobile device 100′ sends access authorisation information (preferably including the first predefined duration) to the electronic door lock 300′ (action 103′) which is then unlocked (for example opened) (action 301′).

[0218] After sending the access authorisation information (action 103′) by the mobile device 100′ (and preferably after obtaining a confirmation by the electronic lock 300′ that the door is opened), it is verified whether the mobile device 100′ has a connection to the internet (action 106′) and if not, whether there is a connection to a mobile phone network (action 107′). Information representative of the opening of the house door is sent to the server 200′ part of the building the check and is received there via the internet (action 206′) or by SMS or telephone call (action 207′). The server 200′ in turn sends information representative of the beginning of the house delivery to the administration application 500′ (action 206′ or 207′) which displays it (action 502′).

[0219] Since the access authorisation information can be sent by the server 200′ in this example in particular so as to be time-independent of the actual entry, a server-side timer cannot be triggered by the sending of the access authorisation information, as described in connection with the first exemplary embodiment. Instead of this, a timer with a (second) predefined duration is initialised and started on the server side triggered by the receipt of the information representative of the opening of the house door (action 204′). The second predefined duration is in this case 60 seconds. This second predefined duration serves as an additional verification on the server side of the stay of the delivery agent, for example in the event that the communication with the mobile device 100′ terminates.

[0220] The delivery agent 400′ can now place the parcel behind the door in the house or deliver letters (action 406′). In this case, checking whether the delivery agent stayed for less or no longer than the first and/or a second predefined duration in the house for the delivery takes place.

[0221] For this purpose, a timer with the first predefined duration is initialised and started by the mobile device 100′ (action 105′).

[0222] In particular in the case where the first predefined duration has elapsed (action 112′), it is checked whether the delivery agent has left the house. In the case of an apartment building, the delivery agent 400′ will not lock the house door from the outside, but rather only shut it (action 407′). The electronic lock can thus only determine closing of the door, but in particular no locking of the door lock (action 304′). In this respect, in this example, checking whether the delivery agent has left the house is implemented such that it is checked whether the position of the person is located outside of the house. This checking is based in this case on the fact that it is checked whether position information representative of the position of the person (for example based on GPS and/or GSM signals) is determined outside of the house (action 141′) and/or whether an unlocking of a door lock of another house is determined (action 142′).

[0223] In the case where the delivery agent 400 has placed down the parcel or delivered the letters (action 406′) and then left the house such that a verification leads to a positive result (i.e. it is determined that the delivery agent has left the house), it can be decided that a successful delivery has taken place (action 116′). Information indicative of a successful delivery can also be sent to the server 200′.

[0224] It can optionally be requested that the delivery agent 400′ confirms leaving the house (action 421′) and/or manually acknowledges the package delivery (action 408′) via an input device of the mobile device 100′. The delivery agent can close the program on the mobile device if required or leave it active in the background (action 409′).

[0225] The server 200′ verifies whether the delivery was successful (action 209′), in particular if the second predefined duration has elapsed (action 208′). If the server received the information indicative of a successful delivery from the mobile device 100′, in particular information indicative of a successful delivery can be sent to the administration application 500′ so that an administrator or the resident can be notified concerning the successful delivery (action 504′). The server-side timer can then also be stopped (action 210′).

[0226] For the case where it is determined that the delivery agent 400 stayed for not less or longer than a predefined duration and/or did not only stay in the predefined region in the apartment, i.e. in particular for the case where the server 200′ cannot determine a successful delivery (action 209′) or that in the case of action 141′ and/or action 142′ it is not determined that the delivery agent 400′ has left the house, the procedure is performed as already described in connection with the first exemplary embodiment, i.e. the described silent alarm is triggered. The actions 118, 119, 120, 121, 410, 411, 211, 212, 213, 505, 506, 507 of FIG. 2 can therefore in particular follow.

[0227] The exemplary embodiments of the present invention described in this specification and the features and properties indicated as being optional in this regard should also be understood to be disclosed in all combinations with one another. In particular, the description of a feature included by an exemplary embodiment, provided the opposite is not explicitly explained, should also not be understood in the present case as the feature being necessary or essential for the function of the exemplary embodiment. The sequence of the method steps shown in this specification in the individual flow diagrams is not authoritative and alternative sequences of the method steps are conceivable. The method steps can be implemented in a different manner, thus an implementation in software (by program instructions), hardware or a combination of the two in order to implement the method steps is conceivable. Terms used in the claims such as “comprise”, “have”, “contain”, “include” and the like do not exclude additional elements or steps. The wording “at least partially” includes both the case of “partially” and also the case of “fully”. The wording “and/or” should be understood as both the alternative and the combination being disclosed, i.e. “A and/or B” means “(A) or (B) or (A and B)”. The use of the indefinite article does not exclude a plurality. An individual apparatus can carry out the functions of a plurality of units or apparatuses mentioned in the claims. Reference numerals indicated in the claims should not be considered as limitations of the means and steps used.