Method and system for autonomous authentication
20230004933 · 2023-01-05
Assignee
Inventors
Cpc classification
International classification
Abstract
A method and a system for secure and convenient delivery of item is disclosed. The method comprises loading a mobile robot with an item to be delivered. An item ID is generated, based on the ID of the item a security score is associated with the item. Further, a convenience score is associated with the item based on the ID. The present invention further discloses associating at least one or a plurality of authenticating techniques with the item, preferably based on the security score and/or the convenience score. The mobile robot is further configured to sense a user terminal via an authenticating sensor and facilitate the user to access an item space once the user is verified by the associated authenticating technique/s.
Claims
1. A method for secure and convenient delivering of items, the method comprising: loading an item space of a mobile robot with at least one item to be delivered; s locking an enclosing structure of the mobile robot so as to prevent access to the item space; and associating one or more authenticating techniques with at least one of the items to be delivered and the mobile robot.
2. The method according to claim 1 wherein the method comprises the step of generating an identification (ID) associated with the at least one item, wherein the ID comprises at least one of at least one type of the item and parameter of the item and sender data and receiver data and a user preferred security level and a user preferred convenience level.
3. The method according to claim 2 wherein the method further comprises inputting the ID in at least one of at least one processing unit of the mobile robot and at least one server, wherein the at least one or the plurality of authenticating techniques are associated with the item using the ID.
4. The method according to claim 2 wherein the method comprises associating the at least one or a plurality of one or more authenticating techniques with the item based on an automatically generated security score of the item, wherein the security s score is generated based on the ID of the item.
5. The method according to claim 3 wherein the security score is generated by at least one of the server and the processing unit, further, generating at least one technique security score associated with each authenticating technique.
6. The method according to claim 2 wherein the method comprises associating the one or more authenticating techniques with the item based on an automatically generated convenience score of the item, wherein the convenience score is generated based on the ID of the item.
7. The method according to claim 6 wherein the convenience score is generated by at least one of the server and the processing unit, further, generating at least one technique convenience score associated with each authentication technique.
8. The method according to claim 6 wherein the method further comprising the step of grouping the authenticating techniques in at least one first group and/or at least one second group, wherein the technique security score and the technique convenience score is within a pre-determined value respectively.
9. The method according to claim 8 wherein the method comprises associating at least one of the at least one first group and at least one second group to the item to be delivered, further, loading the item space of the mobile robot based on at s least one of the first group and the second group and the authenticating technique.
10. The method according to claim 6 wherein the method comprises generating the technique convenience score based on at least one of a type of communication protocol required to activate an authenticating sensor of the mobile robot and a type of a user input required to activate the authenticating sensor.
11. The method according claim 10 wherein the method further comprises sensing at least one user terminal at a delivery location using the authenticating sensor.
12. The method according to claim 11 wherein the method comprises the further step of automatically activating the authenticating sensor when the mobile robot is within a pre-determined distance of the user terminal.
13. The method according to claim 11 wherein the method further comprises authenticating at least one user at the delivery location to access the item space of the mobile robot once the user is authenticated via the authenticating sensor.
14. The method according to claim 1 wherein the method comprises the step of automatically at least one of unlocking and opening the enclosing structure of the robot to provide access to the item space.
15. A system configured to securely and conveniently deliver item/s to users, the system comprising: at least one server adapted for receiving, storing, and sending item data; a mobile robot comprising a processing unit configured to communicate with the server and one or more authenticating sensors, configured to sense at least one user terminal at a delivery location; the one or more authentication sensor further configured to authenticate the at least one user to access the item space; wherein the system is further configured to provide access to the item to the user; and wherein the system is furthermore configured to carry out the method according to claim 1.
16. The system according to claim 15 wherein the processing unit is further configured to generate at least one of a security score and a convenience score based on item data.
17. The system according to claim 15 wherein the system further comprises the mobile robot traveling to a delivery location and facilitating the user to access an item space based on the authentication by the authenticating sensor.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0205]
[0206]
[0207]
[0208]
[0209]
DETAILED DESCRIPTION
[0210] In the following, exemplary embodiments of the invention will be described, referring to the figures. These examples are provided to provide further understanding of the invention, without limiting its scope.
[0211] In the following description, a series of features and/or steps are described. The skilled person will appreciate that unless required by the context, the order of features and steps are not critical for the resulting configuration and its effect. Further, it will be apparent to the skilled person that irrespective of the order of features and steps, time delays between steps can be present between some or all of the described steps.
[0212] The description of the figures first provides a general overview of embodiments of the present invention, before providing further details of more specific embodiments, features and steps of the exemplary embodiments of the present invention.
[0213] Embodiments of the present invention relates to methods and systems comprising a mobile robot 100 that may travel autonomously (without a human operator controlling it) or semi-autonomously (with a human operator only controlling it at some times during its operation). Such a robot 100 can be used for transporting different types of item/s and/or services. It may sometimes be required for the mobile robot 100 to have at least some level of security while delivering an item.
[0214] The following distinction of different ways how the mobile robot can have at least one level of security and thus authenticate at least one recipient to access an enclosed item space 101 of the mobile robot 100.
[0215]
[0216] When the item is placed or installed in the item space, the method can comprise detecting a type of the item S2. The type of item can comprise a weight and/or size of the item. The type can also comprise a quality of an item, such as fragility, shelf life of an item, etc. Further, a server 500 can be configured with a list of items being categorised on the basis of type. The sever 500 can be trained with labelled and/or unlabelled content data to predict a type of the item. A sender can be configured to enter the content of the item in the sever. The content can comprise the content of the item to be transported, for example, documents, coffee, pizza, etc.
[0217] The type can further comprise a monetary value, importance value, etc. The item in one embodiment can comprise an ID, comprising a machine-readable code, RFID chip, NFC tag, etc. The ID can be configured to contain the at least type of the item, sender data, receiver data of the item. In one embodiment the ID can comprise the sender and/or receiver address. The server 500 can comprise a reader, scanner to at least read the ID of the item.
[0218] The mobile robot 100 can comprise a processing unit. The processing unit may contain memory, a peripheral interface, at least one microcontroller. The mobile robot 100 can further be configured with scanner to read/scan the ID of the item being installed in the mobile robot 100. Further, the server 500 may be communicating the item type and/or ID to the mobile robot.
[0219] When the at least one item is loaded in the robot 100, the server 500 can further communicate to the robot 100 if the item needs a security level S3. The security level can be the security score. The container and/or the enclosed space 101 can be configured with at least one load cell sensor. The load cell sensor can be installed at base where item is supported. The base can be the surface on which the item is installed.
[0220] The security level/security score can also be determined by at least one user recipient preference. The method can further be comprising step S5 which can be configured to locking at least one lid (enclosing structure) of the container and/or the mobile robot. The lid 103 can also be automated or semi-automated. The lid 103 can be equipped with a capacitive proximity sensor. The lid 103 can be configured to detect a presence of a user and sending a signal to a kinetic component to cause the lid to move from a closed position to an open position. And the kinetic component moving the lid 103 from an open position to a closed position automatically after a pre-determined time interval. The kinetic component can be configured with an electric motor combined with a shaft to control the kinetics of the lid 103.
[0221] The motor can have the shaft connected to the lid 103 such that the rotation of the shaft in one direction can cause the lid to move from the open position to the closed position. And the rotation in an opposite direction can cause the lid 103 to move from the closed position to the open position. The electric motor can also be configured to connect with the processing unit of the mobile robot 100. And the processing unit can be configured to send at least one instruction to open and/or close the lid 103. The processing unit can further comprise a robot communication component. The robot communication component can be configured to communicate with the server 500 and/or the user U1, U2. The capacitive proximity sensor can also be a unidirectional sensor which can be activating the kinetic component when a stimulus approaches from at least one pre-determined direction.
[0222] The lid 103 can further comprise a locking component which can be further controlled by the processing unit. For example, the locking component can be a solenoid lock receiving electrical locking and/or unlocking signals from the processing unit.
[0223] The processing unit can be further equipped with sending a signal to the locking component only when the item is installed in the robot 100. The processing unit can also send a signal to the locking component after a pre-determined time has passed.
[0224] The step 6 can be to transport the item once it is loaded and locked to the mobile robot 100. The processing unit can comprise sending at least one command to a locomotive component comprising wheel 105 once the lid 103 is locked.
[0225]
[0226] In some embodiments, the mobile robot 100 can be a delivery robot 100. It can, for example, be configured to carry out last-mile delivery. That is, the robot 100 can be configured to receive at least one delivery item in the enclosed space 101. The robot 100 can receive an item at a sender location (e.g. a parcel shop, shop, bar, restaurant, storage location, a user's home, etc.) and can be configured to transport the item to a recipient location. The robot 100 may be configured to travel autonomously or semi-autonomously at least from the sender location to the recipient location. Preferably the robot 100 can be configured to travel (e.g. by default) in an autonomous mode (i.e. without a human operator assistance). In some embodiments, the robot 100 traveling in autonomous mode may be assisted by an external server. For example, the external server may carry out tasks requiring extensive computational resources and/or memory capacity. Additionally, the robot 100 may be configured to request a human operator assistance in some scenarios or instances, such as, more than usual dangerous scenarios, e.g. low uncertainty during a problem solving or decision taking, sensing unauthenticated trial in lock opening, etc. The robot 100 can be configured (or optimized) to maximize the autonomous driving time and minimize the number of requests and time for human operator assistance.
[0227] In other words, the mobile robot 100 can operate autonomously or partially autonomously. For example, the autonomy level of the mobile robot 100 can be between the levels 1 to 5, as defined by the Society of Automotive Engineers (SAE) in J3016-Autonomy Levels. In some embodiments the mobile robot 100 can be controlled (e.g. steered) by a human operator through a user terminal (i.e. the user terminal can exchange data with the mobile robot). In some other embodiments, the robot 100 is assisted by the human operator only in some instances, e.g. in particular situations imposing more risk, such as, unauthenticated lid opening. In other embodiments, the robot 20 can be fully autonomous—that is, can authenticate the at least one user U1, U2 to access the enclosed space 101 and carry out an assigned task without human intervention.
[0228]
[0229] The authenticating technique 300 can further comprise enabling the access of the user via the user terminal U1, U2 using a user interface (308). The user interface (308) may be configured with an app on a smartphone or a user device. The user interface (308) may be configured to receive the OTP and further authenticate the user to access the item space.
[0230] The ultrasonic communication 302 can be used as an authenticating technique 200. The processing unit can be further configured with an ultrasonic component. The user U1, U2 can also be configured with a user ultrasonic component. The user U1, U2 can be configured with an ultrasonic transmitter configured to transmit ultrasonic waves within a pre-determined frequency range. The processing unit can be configured with an ultrasonic receiver. Once, the communication is set the processing unit can be configured to send encrypted data to the user. The user can further be configured to decrypt the data and access the enclosed space of the mobile robot.
[0231] The processing unit can be configured to change an observed frequency if the ultrasonic receiver and/or the ultrasonic transmitter are not stationary relative to each other. This change in observed frequency can result in doppler shift, which can further comprise of determining the direction of motion of the ultrasonic transmitter and/or the ultrasonic receiver.
[0232] In some embodiments the authenticating technique 300 used can be inputting a one-time password (OTP) 303. The user U1, U2 can be configured with an identification code such as a bar code, a QR code, a RFID tags, etc. The processing unit can be configured with an active reader passive tag which can be configured to transmit interrogator signal and further can receive an authentication reply from the user. The processing unit can be further configured with an optical component configured to decode the identification code. Further, the identification code of the user can be configured to be the one-time password and/or a long-time password. The inputting an OTP 303 can further comprise the lid configured with a graphic display further configured with a capacitive touch. The user can further input a one-time identification code, a pattern, tap code, etc.
[0233] In some embodiments, when the mobile robot 100 arrives at the user location the user U1, U2 can authenticate by using biometric identification 305. The biometric identification 305 can comprise uniquely identifying the at least one user by evaluating at least one distinguishing biological trait. For example, the server 500 and/or the processing unit can comprise a database to store at least one user's biometric marker. The biometric markers can comprise, fingerprints, iris scans, DNA, facial features, etc. The mobile robot can comprise using the optical system to take an input biometric marker from the user and verify it with the stored database to provide an access to the user.
[0234] Another authenticating technique 300 used can be visual recognition, this can comprise the processing unit sending a visual recognition code to the user. The visual recognition code can be a one-time code or a long-term code. The visual recognition code can comprise a bodily motion. The bodily motion can originate from the face or hand. For example, the processing unit can send the visual recognition code for a particular user to be waving left hand left to right three times. The optical component can comprise sending an input recognition code to the processing unit and authorizing the user to access the enclosed space 101.
[0235] Authenticating technique 300 using a transducer of the mobile robot 100 can facilitate voice recognition 306. The transducer can be configured to convert sound into an electrical signal. The transducer can be installed to the processing unit of the mobile robot. The server 500 and/or the processing unit can comprise the database storing at least one voice sample from the at least one user. The processing unit can further be configured to identify the speaker by verifying at least one speech of the user. Authenticating technique 300 can also be configured with a piezoelectric or similar knocking sensor. The user terminal may be sent a one time or a long-term knock code and by inputting the knock code (309) the user may be authorised to access the item.
[0236] The user can also be authenticated using a near field communication protocol (NFC) (307). The authentication of the user can comprise using a contactless smart card. The authenticating sensor may further be configured with an NFC chip for example. And the authenticating sensor may only provide an access to the user when a specific credit card, smart card is used.
[0237]
[0238] The server 500 can be configured to create at least one first group of the authenticating technique with security score value lying within a pre-determined range. For example, the security score can be a value between 0 and 1 so all the authenticating techniques 300 with security score between 0-0.5 can be configured to participate in the first group. The server 500 can further comprise classifying the authenticating techniques 300 with a convenience score value between a pre-determined range in at least one second group. The server 500 can further be configured to assign the at least one of authenticating techniques from the at least one of the first group and the second group to the item. For example, a sender is sending important documents with an item ranking such that the item requires higher security level, the server 500 can be configured to match the item rank to at least one authenticating technique from the first group with a high security score. It can also assign a second authenticating technique from a second group. In some other examples, the server 500 can also assign a plurality of authenticating techniques from a plurality of first groups to match the rank of the item.
[0239]
[0240] There can be a further communication between the mobile robot 100 and the server 500. The user U1, U2 can be communicating to the mobile robot 100 via the server 500. The U1, U2 can be enquiring the server 500 about the whereabouts of the robot 100. The server 500 can further be communicating to the mobile robot 100 which authenticating technique 300 to use. The robot 100 can be using the communication to notify the user U1, U2 of its location.
[0241] Both the user U1, U2 and the robot 100 can be configured to enable a two-way communication with the server 500.
[0242] The term “at least one of a first option and a second option” is intended to mean the first option or the second option or the first option and the second option.
[0243] Whenever a relative term, such as “about”, “substantially” or “approximately” is used in this specification, such a term should also be construed to also include the exact term. That is, e.g., “substantially straight” should be construed to also include “(exactly) straight”.
[0244] Whenever steps were recited in the above or also in the appended claims, it should be noted that the order in which the steps are recited in this text may be accidental. That is, unless otherwise specified or unless clear to the skilled person, the order in which steps are recited may be accidental. That is, when the present document states, e.g., that a method comprises steps (A) and (B), this does not necessarily mean that step (A) precedes step (B), but it is also possible that step (A) is performed (at least partly) simultaneously with step (B) or that step (B) precedes step (A). Furthermore, when a step (X) is said to precede another step (Z), this does not imply that there is no step between steps (X) and (Z). That is, step (X) preceding step (Z) encompasses the situation that step (X) is performed directly before step (Z), but also the situation that (X) is performed before one or more steps (Y1), . . . , followed by step (Z). Corresponding considerations apply when terms like “after” or “before” are used.