IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0466750
(2017-03-22)
|
등록번호 |
US-10147249
(2018-12-04)
|
발명자
/ 주소 |
- Brady, Tye Michael
- Mishra, Pragyana K.
|
출원인 / 주소 |
- Amazon Technologies, Inc.
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
65 |
초록
▼
An intermediary device may be configured to allow an authorized visitor to access a secure facility (such as a home) on behalf of an owner. The intermediary device may generate an authenticator and provide the authenticator to a service provider, who may then present the authenticator to the interme
An intermediary device may be configured to allow an authorized visitor to access a secure facility (such as a home) on behalf of an owner. The intermediary device may generate an authenticator and provide the authenticator to a service provider, who may then present the authenticator to the intermediary device upon arriving at the facility. The intermediary device may unlock or open, or lock and close, any doors within the facility as necessary in order to grant access to a specific portion of the facility and restrict access to other portions of the facility. The intermediary device may also capture, or cause the capture of, images or other data regarding actions taken by the service provider, and establish a communications channel with the owner for the exchange of information or data regarding such actions, or any events or conditions of the facility.
대표청구항
▼
1. A home comprising: a structure defining an interior comprising a plurality of rooms;a door between the interior of the structure and an exterior of the structure, wherein the door comprises an electromechanical lock that may be configured in at least one of a locked state or an unlocked state; an
1. A home comprising: a structure defining an interior comprising a plurality of rooms;a door between the interior of the structure and an exterior of the structure, wherein the door comprises an electromechanical lock that may be configured in at least one of a locked state or an unlocked state; andan intermediary device having at least one computer processor, at least one memory component, at least one transceiver and at least one power source,wherein the at least one computer processor of the intermediary device is in communication with at least the electromechanical lock, andwherein the at least one computer processor is configured to at least: determine that services are to be performed within the home on at least one of a first day or a first time;generate an authenticator associated with the services;transmit at least a first electronic message comprising the authenticator to at least one server associated with a provider of the services;receive at least a second electronic message from a mobile device of a worker associated with the provider;determine that the second electronic message comprises the authenticator;in response to determining that the second electronic message comprises the authenticator, configure the electromechanical lock in the unlocked state;receive a third electronic message from the mobile device of the worker, wherein the third electronic message comprises information regarding the services; andtransmit a fourth electronic message to a mobile device of an owner of the home, wherein the fourth electronic message comprises at least some of the information regarding the services. 2. The home according to claim 1, wherein the at least one transceiver comprises an RFID reader, a Bluetooth receiver and a Wireless Fidelity transmitter, wherein the second electronic message is an RFID signal comprising the authenticator,wherein the third electronic message is transmitted according to a Bluetooth protocol, andwherein the fourth electronic message is transmitted over a network via the Wireless Fidelity transmitter. 3. The home according to claim 1, wherein the services comprise delivering at least one item to a predetermined location within the home, and wherein the at least one computer processor is configured to at least:receive a fifth electronic message from the mobile device of the owner, wherein the fifth electronic message identifies the at least one item and the predetermined location. 4. A computer-implemented method comprising: receiving, by an intermediary device, a first electronic message comprising at least one of a date of performance of a predetermined task, a time of the performance of the predetermined task, an identity of a service provider or an identity of a worker associated with the service provider;generating, by the intermediary device, an authenticator associated with the access to the secure facility to the worker for the performance of the predetermined task;transmitting, by the intermediary device, a second electronic message to at least one server associated with the service provider, wherein the second electronic message comprises the authenticator;receiving, by the intermediary device, a third electronic message from a mobile device of the worker; anddetermining that the third electronic message includes the authenticator,in response to determining that the third electronic message includes the authenticator, authenticating the worker by the intermediary device; andgranting, by the intermediary device, access to the secure facility to the worker for the performance of the predetermined task, wherein the access is granted by causing at least one portal between an exterior of the secure facility and an interior of the secure facility to be unlocked or opened;receiving, by the intermediary device, information regarding the performance of the predetermined task from the worker, wherein the information regarding the performance of the task includes at least one of an audio signal comprising at least one spoken word regarding the performance of the predetermined task or a fourth electronic message comprising at least a set of text regarding the performance of the predetermined task;generating, by the intermediary device, at least a fifth electronic message comprising at least some of the information regarding the performance of the predetermined task; andtransmitting, by the intermediary device, at least the fifth electronic message to a computer device of an occupant of the secure facility. 5. The computer-implemented method of claim 4, wherein generating the fifth electronic message comprises: initiating an audio connection or a video connection with the computer device of the occupant of the secure facility via at least one of a telephone number or an Internet Protocol address associated with the computer device of the occupant of the secure facility,wherein the fifth electronic message comprises at least a portion of the audio signal. 6. The computer-implemented method of claim 4, wherein generating the fifth electronic message comprises: initiating a video connection with the computer device of the occupant of the secure facility via at least one of a telephone number or an Internet Protocol address associated with the computer device of the occupant of the secure facility,wherein the fifth electronic message comprises at least a portion of the audio signal. 7. The computer-implemented method of claim 4, wherein authenticating the worker further comprises: capturing imaging data by at least one imaging device associated with the intermediary device;determining, by the intermediary device, that the imaging data includes at least one face; andrecognizing, by the intermediary device, the at least one face as corresponding to the worker according by at least one recognition technique,wherein the access to the secure facility is granted in response to recognizing the at least one face as corresponding to the worker. 8. The computer-implemented method of claim 4, wherein authenticating the worker further comprises: receiving acoustic data by at least one microphone associated with the intermediary device; anddetermining, by the intermediary device, that the acoustic data comprises vocal signals corresponding to the worker by at least one recognition technique,wherein the access to the secure facility is granted in response to determining that the acoustic data comprises vocal signals corresponding to the worker. 9. The computer-implemented method of claim 4, wherein the fourth electronic message is received according to a first communications protocol, and wherein the first communications protocol is a first one of: radiofrequency identification;Bluetooth;near field communication;wireless fidelity; oran SMS or MMS text message. 10. The computer-implemented method of claim 9, wherein the fifth electronic message is transmitted according to a second communications protocol, and wherein the second communications protocol is not the first communications protocol. 11. The computer-implemented method of claim 4, wherein the fifth electronic message comprises a request for an authorization associated with the predetermined task, and wherein the computer-implemented method further comprises:receiving, by the intermediary device, a sixth electronic message from the mobile device of the occupant,wherein the sixth electronic message comprises the authorization. 12. The computer-implemented method of claim 11, wherein the authorization is for at least one of labor or materials associated with the predetermined task. 13. The computer-implemented method of claim 4, wherein the predetermined task is a delivery of at least one item to the secure facility. 14. The computer-implemented method of claim 4, further comprising: determining, by the intermediary device, that the predetermined task is complete;determining, by the intermediary device, that the worker has departed the secure facility;causing, by the intermediary device, the at least one portal to be locked or closed; andgenerating, by the intermediary device, information regarding the completion of the predetermined task,wherein the fifth electronic message further comprises at least some of the information regarding the completion of the predetermined task. 15. The computer-implemented method of claim 14, further comprising: receiving, by the intermediary device, imaging data captured by at least one imaging device associated with at least one of the worker or the intermediary device during the performance of the predetermined task,wherein the fifth electronic message further comprises at least one of: at least some of the imaging data; ora link to at least some of the imaging data. 16. The computer-implemented method of claim 4, wherein the intermediary device comprises a housing having at least one processor, at least one memory component, at least one transceiver and at least one power source disposed within a cavity defined by the housing. 17. The computer-implemented method of claim 16, wherein the housing is mounted to at least one wall separating the exterior of the secure facility and the interior of the secure facility. 18. An intermediary device comprising: a housing having at least one computer processor, at least one transceiver and at least one data store disposed therein,wherein the housing is mounted to an external surface of a facility, andwherein the at least one computer processor is configured to at least: receive, by the at least one transceiver, a first electronic message comprising a valid authenticator associated with access to the facility for performance of one or more services, wherein the valid authenticator is received from a server associated with a provider of the one or more services according to a first communications protocol;receive, by the at least one transceiver, a second electronic message comprising a request to access to the facility to perform the one or more services, wherein the first electronic message is received from a mobile device of a worker according to a second communications protocol;determine that the first electronic message comprises the valid authenticator;in response to determining that the second electronic message comprises the valid authenticator, granting the request; andcausing at least one door between an exterior of the facility and an interior of the facility to be unlocked or opened;capture, by at least one sensor within the facility, information regarding the performance of the one or more services by the worker; andtransmit, by the at least one transceiver, a third electronic message comprising at least some of the information regarding the performance of the one or more services by the worker to a mobile device of the owner, wherein the third electronic message is transmitted according to the first communications protocol, andwherein the second communications protocol is not the first communications protocol. 19. The intermediary device of claim 18, wherein the at least one sensor is associated with at least one of: the intermediary device;the mobile device of the worker; ora security system at the facility, wherein the security system is in communication with the intermediary device. 20. The intermediary device of claim 18, wherein the information regarding the performance of the one or more services by the worker comprises at least one of: an audio signal comprising at least one spoken word regarding the performance of the one or more services;a set of text regarding the performance of the one or more services; orimaging data regarding the performance of the one or more services, wherein the imaging data was captured by the at least one sensor within the facility. 21. The intermediary device of claim 18, wherein the at least one computer processor is further configured to at least: initiate an audio connection or a video connection with the mobile device of the owner via at least one of a telephone number associated with the mobile device of the owner or an Internet Protocol address associated with the mobile device of the owner.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.