Object delivery authentication
First Claim
Patent Images
1. An object delivery authentication method comprising:
- receiving by an object receiver comprising a hardware processor an object delivery information package from an object deliverer comprising a hardware processor over a call network during a communication between the object receiver and the object deliverer, wherein the object delivery information package comprises object information and object deliverer identity information associated with an object to be received by the object receiver;
later, receiving by the object receiver, the object from the object deliverer;
sending an authentication request of the object and/or the received object delivery information package from the object receiver to an authentication module, comprising a hardware processor, over at least one of the call network and an additional network; and
authenticating, by the hardware processor of the authentication module, the object and/or the received object delivery information package received by the object receiver using the object information and object deliverer identity information, wherein the authentication comprises;
comparing one or more entries in an authentication datastore in communication with the authentication module with at least one of (i) the object deliverer identity information and (ii) the object information;
associating a secret with the object delivery information by the authentication module, the secret comprising a plurality of secret questions and a corresponding plurality of secret answers;
sending the secret questions to the object deliverer by the authentication module;
receiving answers to the secret questions by the authentication module from the object deliverer;
determining whether the object and/or the object delivery information package is or is not authentic, based on whether the answers from the object deliverer match the secret answers and whether the number of matching secret answers provided are equal to or greater than a pre-selected minimum number, andwherein the authentication module provides an object key associated with the object and/or the object delivery information package to the object receiver after determining that the object is delivered by an authentic object deliverer.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method and system for authenticating object delivery including the steps of receiving by an object receiver an object delivery information package from an object deliverer over a call network during a communication between the object receiver and the object deliverer, wherein the object delivery information package comprises object information and object deliverer identity information, receiving by the object receiver an object from the object deliverer, and authenticating the receipt of the object by the object receiver using the object information and object deliverer identity information.
9 Citations
19 Claims
-
1. An object delivery authentication method comprising:
-
receiving by an object receiver comprising a hardware processor an object delivery information package from an object deliverer comprising a hardware processor over a call network during a communication between the object receiver and the object deliverer, wherein the object delivery information package comprises object information and object deliverer identity information associated with an object to be received by the object receiver; later, receiving by the object receiver, the object from the object deliverer; sending an authentication request of the object and/or the received object delivery information package from the object receiver to an authentication module, comprising a hardware processor, over at least one of the call network and an additional network; and authenticating, by the hardware processor of the authentication module, the object and/or the received object delivery information package received by the object receiver using the object information and object deliverer identity information, wherein the authentication comprises; comparing one or more entries in an authentication datastore in communication with the authentication module with at least one of (i) the object deliverer identity information and (ii) the object information; associating a secret with the object delivery information by the authentication module, the secret comprising a plurality of secret questions and a corresponding plurality of secret answers; sending the secret questions to the object deliverer by the authentication module; receiving answers to the secret questions by the authentication module from the object deliverer; determining whether the object and/or the object delivery information package is or is not authentic, based on whether the answers from the object deliverer match the secret answers and whether the number of matching secret answers provided are equal to or greater than a pre-selected minimum number, and wherein the authentication module provides an object key associated with the object and/or the object delivery information package to the object receiver after determining that the object is delivered by an authentic object deliverer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An object delivery authentication system, comprising:
-
an object delivery information package comprising object information and object deliverer identity information, wherein the object delivery information package is sent by an object deliverer to an object receiver over a call network, wherein the object delivery information package being associated with an object to be sent by the object deliverer to the object receiver; and an authentication module comprising a hardware processor in communication with the object receiver, the authentication module operating to (i) receive an authentication request for one or more of the object and the received object delivery information package from the object receiver over at least one of;
the call network and the additional network and (ii) authenticate the object and/or the received object delivery information package using the object information and the object deliverer identity information,wherein the authentication comprises; comparing one or more entries in an authentication datastore in communication with the authentication module with at least one of (i) the object deliverer identity information and (ii) the object information; associating a secret with the object delivery information, wherein the secret comprises a plurality of secret questions and a corresponding plurality of secret answers; sending the secret questions to the object deliverer; receiving answers to the secret questions from the object deliverer; and determining whether the object and/or the object delivery information package is or is not authentic, based on whether the answers from the object deliverer match the secret answers, and whether the number of correct secret answers provided are equal to or greater than a pre-selected minimum number; and the authentication module provides an object key associated with the object and/or the object delivery information package to the object receiver after determining that the object deliverer is authenticated to deliver the object. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification