BACKGROUNDIn the era of online purchasing sites such as eBay® and Craigslist®, the process of exchanging items such as packages and other transportable goods from one person to another has become a topic of significant attention. In particular, enhancing safety and security in the exchanging process is highly desirable.
Those involved in exchanging an item may commonly include senders, receivers, and delivery personnel such as for example the U.S. Postal Service®. Receivers are people who are intended to receive the item. Often times the receiver is a person who purchased the item. The sender may be a manufacturer, vendor, seller, or distributor of the item, for example. In response to the purchase of an item in, for example, Craigslist® the sender may enlist the services of delivery personnel (e.g., couriers, shippers, postal service) if the item is to be shipped to a relatively distant location. For more local transactions, however, senders or receivers may also function as the delivery personnel, delivering or picking up the item themselves for the other person's location or from a neutral site. This sometimes raises issues of safety and security.
Although unattended delivery and retrieval systems have been devised, safety and security in the exchanging process has been a challenge. Security personnel may help enhance security but may also increase the cost of the transactions. Curtailing time availability of delivery and retrieval systems to daylight hours may also help enhance security but may make it inconvenient for users. Locating delivery and retrieval systems within busy locations such as gas stations, bus stations, train stations, convenience stores, etc. may also enhance security but may limit access and availability.
Therefore, there is a need in the field for improvements to the item exchange process to make it more safe and secure while making it also convenient, widely available, and cost-effective.
SUMMARY OF THE INVENTIONThe present disclosure provides an item exchange locker station that provides safety and security during item exchanges while making it also convenient, widely available, and cost-effective.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various example systems, methods, and so on, that illustrate various example embodiments of aspects of the invention. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. One of ordinary skill in the art will appreciate that one element may be designed as multiple elements or that multiple elements may be designed as one element. An element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1A illustrates a perspective view of an exemplary item exchange locker station.
FIG. 1B illustrates a plan view of the exemplary item exchange locker station.
FIG. 1C illustrates a perspective view inside the exemplary item exchange locker station.
FIG. 2 illustrates a perspective view of an exemplary user interface for the item exchange locker station.
FIG. 3 illustrates a perspective view of an exemplary user interface kiosk for the item exchange locker station.
FIG. 4A-4C illustrate exemplary lockers for the item exchange locker station.
FIG. 5 illustrates a block diagram of an exemplary system for the operation of the item exchange locker station.
FIG. 6 illustrates a flow diagram for an exemplary method for operating the item exchange locker station, in particular for purchasing a locker and scheduling an exchange.
FIG. 7 illustrates a flow diagram for an exemplary method for operating the item exchange locker station, in particular for performance of an item exchange for the delivery of a given item.
FIG. 8 illustrates a flow diagram for an exemplary method for operating the item exchange locker station, in particular for performance of an item exchange for the retrieval of a given item.
FIG. 9 illustrates a block diagram of an exemplary machine for an item exchange locker station.
DETAILED DESCRIPTIONFIGS. 1A-1C illustrate various views of an exemplary itemexchange locker station1. Thestation1 includes astation enclosure10 including, for example,walls12,windows14, and astation entry door16. Thestation enclosure10 may also include anemergency exit18.
Thedoor16 alternatively opens and closes to permit and impede entry to thestation enclosure10. Thestation1 may also include a main lock or station locking mechanism to alternatively lock and unlock to impede and permit opening of thestation entry door16. Thestation1 may also include a station-level user interface20 accessible from outside thestation enclosure10. As described in detail below, the station-level user interface20 receives identifying information of a person (i.e., a deliverer or a retriever) seeking to enter thestation enclosure10 for the information to be transmitted to an off-site location to be validated. Upon validation of the identifying information, station unlocking instructions may be received from the off-site location for the station locking mechanism to unlock to permit opening of thestation entry door16 upon receipt of the station unlocking instructions.
Thestation1 may also includelockers30. Upon validation of the identifying information and receiving the station unlocking instructions, a lightedpath19 on the floor or (as shown in the illustrated embodiment ofFIGS. 1A and 1C) on the ceiling of thestation enclosure10 may be used to indicate to a user theparticular locker30 assigned to the user. Thelighted path19 may indicate the path from the station-level user interface20, a locker-level user interface120, or from thestation entry door16 to the assignedlocker30.
Thelockers30 may include alocker access door32 that alternatively opens and closes to permit and impede access to the locker's interior. Thelockers30 may also include a locker lock or locker locking mechanism to alternatively lock and unlock to impede and permit opening of thelocker access door32.
In one embodiment, alocker30 may include a locker-level user interface that receives identifying information of the deliverer or retriever seeking to access thelocker30. In the illustrated embodiment, thestation1 includes at least one locker-level user interface120 at a location other than at alocker30 such as, for example, awelcome kiosk40.
The locker-level user interface120 receives the identifying information of the deliverer or retriever seeking to access thelocker30 so that the information may be transmitted to an off-site location to be validated. Upon validation of the identifying information, locker unlocking instructions may be received from the off-site location for the locker locking mechanism to unlock to permit opening of thelocker access door32.
This way, the deliverer or retriever may gain access to thestation enclosure10 and alocker30.
FIG. 2 illustrates a perspective view of anexemplary user interface20. For brevity of explanation, a station-level user interface20 is used here to describe the features of a user interface. This description, however, is similarly applicable to a locker-level user interface120, which, although not necessarily identical, may share many features with the station-level user interface20.
The station-level user interface20 may include adisplay22 that may welcome the user and provide instructions. As described below, an off-site or system server may assign each user identifying information (i.e., credentials) such as, for example, a unique Swap ID, which may have a corresponding account QR code. The server may also store the relationships between users and their credentials for later used in approving or denying user's access to astation1 orlocker30. The server may further make the credentials available to the user for display on a screen of a mobile device MD (e.g., mobile phone) to use as a “key” to gain access to thestation1 or alocker30. The station-level user interface20 may also include adock24 into which a user may insert the mobile device MD. Thedock24 may include a scanner to scan the credentials (e.g., QR code) from the screen of the mobile device MD. In addition or alternatively, the station-level user interface20 may include a keypad by which the user may enter credentials such as a Swap ID, etc.
The station-level user interface20 receives the identifying information of the user (i.e., a deliverer or a retriever) seeking to enter thestation enclosure10 and the information is transmitted to an off-site location to be validated. Upon validation of the identifying information, station unlocking instructions are received from the off-site location for the station locking mechanism to unlock to permit opening of thestation entry door16. Similarly, the locker-level user interface receives the identifying information of the user (i.e., a deliverer or a retriever) seeking to access a correspondinglocker30 and the information is transmitted to an off-site location to be validated. Upon validation of the identifying information, locker unlocking instructions are received from the off-site location for the locker locking mechanism to unlock to permit access to thelocker30.
In one embodiment, theuser interface20 includesvertical rails26 and ahandle28 such that a height or vertical position of theuser interface20 including thedisplay22 and thedock24 may be adjusted for user's convenience.
FIG. 3 illustrates a perspective view of an exemplaryuser interface kiosk40. Thekiosk40 may include one ormore user interfaces20. Thekiosk40 may be used in at least two contexts.
First, thekiosk40 may be used to include one or more station-level user interfaces20. This may be desirable in, for example, astation1 with very high traffic volume. In such a high traffic station, multiple station-level user interfaces20 may be desirable and thekiosk40 may be a way to provide such multiple station-level user interfaces20 in a convenient and efficient package. Akiosk40 may also be desirable in astation1 located in very cold temperature areas where having a station-level user interface20 exposed to the elements may be uncomfortable for the user. In such cases, thestation1 may include a temperature-controlled lobby area outside thestation enclosure10 in which thekiosk40 including multiple station-level user interfaces20 may be located for the user to enter identifying information to gain access to themain station enclosure10.
Second, thekiosk40 may be used to include one or more locker-level user interfaces120. This may be desirable to provide users with a welcoming lobby area inside thestation enclosure10 in which thekiosk40 with multiple locker-level user interfaces120 may be located for the user to enter identifying information to gain access to aspecific locker30. This solution may be more cost-effective than providing adedicated user interface120 for eachlocker30.
FIG. 4A-4C illustrateexemplary lockers30. As described above, alocker30 may include alocker access door32 that alternatively opens and closes to permit and impede access to the locker's interior. Alocker30 may also include a locker lock or locker locking mechanism to alternatively lock and unlock to impede and permit opening of thelocker access door32. In some embodiments, at least some of thelockers30 may include a locker-level user interface that receives identifying information of the deliverer or retriever seeking to access thelocker30.
Alocker30 may also include alocal indicator36 such an LED light to, for example, indicate to a user a locker specifically assigned to that user. For example, upon validation of the identifying information at the station level and receiving the station unlocking instructions, theindicator36 may be made to blink to indicate to a user theparticular locker30 assigned to the user. Theindicator36 may instead or in addition be used to indicate whether a locker is locked (e.g., red) or unlocked (e.g., green). Theindicator36 light may be visible from an area inside thestation enclosure10 adjacent theentry door16 or thekiosk40 and the light36 lights up upon receipt of the station unlocking instructions so that the light36 identifies aspecific locker30 to which the deliverer is to deliver or from which the retriever is to retrieve. As shown inFIG. 4A, in one embodiment, a user may press on anunlocked locker door32 to open the door. The user may similarly press on thelocker door32 to close the door. As shown inFIGS. 4B and4C locker doors32 may be slide-out doors (4B) or hinged doors (4C).
FIG. 5 illustrates a block diagram of anexemplary system100 for the operation of thestation1. Thesystem100 may include at least two main portions: a local orstation portion110 and a remote orcloud portion210. This architecture is scalable and, therefore,many station portions110 may interface with acloud portion210 andmany cloud portions210 may coexist within asystem100.
Thecloud portion210 may include aweb interface212, a system or off-site server214, and asystem database216. Thestation portion110 may include two sub-systems: a station-level subsystem110aand a locker-level subsystem110b.The station-level subsystem110amay include the station-level user interface20, a station-level controller112, and the entrydoor locking mechanism114. The station-level subsystem110amay also includeadditional peripherals116 such as, for example, the path lights19. The locker-level subsystem110bmay include the locker-level user interface120, a locker-level controller122, and the lockerdoor locking mechanism124. The locker-level subsystem110bmay also includeadditional peripherals126 such as, for example, thelocal indicator36.
FIG. 6 illustrates a flow diagram for anexemplary method600 for operating the itemexchange locker station1, in particular for purchasing a locker and scheduling an exchange.
At605, users may interact with theweb interface212 to register (at610) or log in (at615) to place locker orders. A user, for example a user seeking to deliver an item sold on Craigslist® to another user may use theweb interface212 to open an account and order a locker to exchange the item safely. Users may, for example, use integrated single sign-on services (available from Facebook®, Google®, and other providers) for account registration and login validation for accessing users' accounts. During registration, thesystem server214 may assign each user a unique Swap ID, which may have a corresponding account QR code. Theserver214 may store the relationships between users, Swap ID, and QR codes in thesystem database216.
In one embodiment, both a Swap ID and the corresponding QR code may be permanently assigned to a single customer to act as identifier and validation key for that user in thesystem100. The QR code may serve as the primary, scannable user identifier while the Swap ID may be used as a redundancy in the unlikely event there is an error with scanning equipment on-site at thestation1 or in the event that a user (deliverer or retriever) is unable to present their QR code at the time they wish to access thestation1 or alocker30. Theserver214 may assign a user a Swap ID and QR code and send this information to the user via text message or email. The Swap ID and QR code may also be available to users by logging in to their accounts online. Swap ID and QR codes may be permanently associated with user's accounts and, thus, may be reused for transactions associated with those accounts, regardless of their role (deliverer or retriever) in any specific transaction.
Swap ID or QR codes may also serve as identifiers and be associated with flags for users to receive personalized conditions which will be applied to that customer's current or subsequent transactions. These flags may automatically adjust the user experience whenever the specific Swap ID or QR code is utilized. Examples include: customizing the user's experience to comply with ADA-Compliance requests, offering discounted rate structures for specified individuals, allowing remote suspension/reinstatement of services for a particular user's account, etc.
At620, once the deliverer logs in to theweb interface212, the deliverer may purchase alocker30 to exchange the item. In one embodiment, the web interface may present the deliverer the option to choose from a number of different locker sizes, dates available to deliver the item, specific time windows on the chosen delivery date, and a particular station1 (from perhaps many available station locations) the deliverer prefers to complete the item exchange.
At625, theweb interface212 may also ask the deliverer for valid contact information (e.g., email address, cell phone number, etc.) of the retriever (the user who would retrieve the item from the chosen locker30). At630, if the entered retriever contact information is already associated with a valid account, the retrieving portion of the locker purchase may be assigned to that account and the corresponding Swap ID. If the entered retriever contact information is not already associated with a valid account, at635, thesystem server214 may assign a Swap ID, which may have a corresponding account QR code, and, at640, communicate (e.g., email, text, voice message, etc.) with the retriever using the contact information requesting the retriever to complete creation of an account or log-in. At645, the retriever may log-in. As do the deliverers, the retrievers may, for example, use integrated single sign-on services (available from Facebook®, Google®, and other providers) for account registration and log-in. Theserver214 may store the relationships between users, Swap ID, and QR codes in thesystem database216.
At650, once the retriever has logged in, theweb interface216 may provide the retriever information such as dates available to retrieve the item, time windows available on the chosen retrieval date, and theparticular station1 from which to retrieve the item. The retriever may choose from the dates available to retrieve the item and the time windows available on the chosen retrieval date. At655, once the retriever has made selections, the exchange may be confirmed and confirmation communication (e.g., email, text message, voice message, etc.) may be sent out to deliverer and retriever confirming. The deliverer's communication may include the specific delivery details (date, time window, location, locker size, etc.) including, in one embodiment, identification of aspecific locker30 at thestation1 to be used for the exchange.
FIG. 7 illustrates a flow diagram for anexemplary method700 for operating the itemexchange locker station1, in particular for performance of an exchange: delivery.
Deliverers may access only the specificchosen station1 and only aspecific locker30. Thelocker30 may be assigned during the registration process or upon the deliverer arriving at thestation1. Moreover, access is only available during the exchange date(s) and time window specified during the purchasing process. Upon delivery or upon expiration of the time window, deliverer access is revoked. Astation1 may be generally available 24 hours a day 7 days a week but itsdoor16 remains locked and is only unlockable by presenting a valid Swap ID during a valid exchange time. When a deliverer's exchange time begins thesystem server214 may activate the deliverer's Swap ID and/or QR code to grant the deliverer access to thestation1 and/orlocker30. Theserver214 may also send the deliverer a communication (e.g., email, text message, voice message, etc.) that their exchange time has begun.
Once the exchange time has begun, at705, the deliverer may scan their QR code or input their Swap ID by scanning their mobile device's screen using thedock24 at the station-level user interface20. In one embodiment, scanning of the QR code or inputting of the Swap ID at the station-level user interface20 does not, by itself, unlock thedoor16. In fact, notice that in the exemplary system ofFIG. 5 there is no data connection between theuser interface20 and thecontroller112 that controls thelocking mechanism114. Theuser interface20 is effectively incapable of generating or pushing any unlock signals to any doors including thestation door16 orlocker doors32. Instead, scanning of the QR code or inputting of the Swap ID at the station-level user interface20, at710, transmits unlock requests including identifying information to the off-site system server214 for the identifying information to be remotely validated against thedatabase216. At715, validation includes, not only verifying the identity of the deliverer, but also verifying theappropriate station1, exchange time, etc.
In one embodiment, thesystem server214 logs received unlock requests together with the identifying information, mobile device id (e.g., UDID, IDFA, IDFV, WAID, AAID, etc.) date, time, station id, etc. indatabase216.
At720, in the case that validation fails, thesystem server214 transmits an unlock request denial to theuser interface20.
At725, upon validation of the identifying information, thesystem server214 transmits station unlocking instructions to the station-level controller112 and, in one embodiment, an unlock request approval message to theuser interface20 to be displayed to the user. Upon receipt of the station unlocking instructions, at730, the station-level controller112 may transmit an unlock signal to thestation locking mechanism114 to unlock to permit opening of thestation entry door16.
In one embodiment, scanning of the QR code or inputting of the Swap ID at the station-level user interface20 generates a “wake” signal that may be transmitted (e.g., to thesystem server214 to be transmitted to thecontroller112 or another appropriate control) for the interior lights at thestation1 to turn on, if necessary, as well for security features such as security camera recording, etc. to commence or at least time stamp.
In one embodiment, upon validation of the identifying information and receiving the station unlocking instructions, alighted path19 on the floor or (as shown in the illustrated embodiment ofFIGS. 1A and 1C) on the ceiling of thestation enclosure10 may be used to indicate to a user theparticular locker30 assigned to the user. The lightedpath19 may indicate the path from the station-level user interface20, a locker-level user interface120, or from thestation entry door16 to the assignedlocker30. Therefore, thestation1 may include one or morelight paths19 disposed on the floor or the ceiling of the station to light up upon receipt of station unlocking instructions for the light path to guide the deliverer or retriever from theentry door16 or from a welcomingkiosk40 to aspecific locker30 to which the deliverer is to deliver or from which the retriever is to retrieve.
Unlocking of thedoor16, however, does not unlock anylockers30 inside of thestation1. Once inside thestation enclosure10, at735, the deliverer may scan their QR code or input their Swap ID a second time by using thedock24 at the locker-level user interface120.
In one embodiment, scanning of the QR code or inputting of the Swap ID at the locker-level user interface120 does not, by itself, unlock thelocker door32. Theuser interface120 may be effectively incapable of generating or pushing any unlock signals to any doors including thestation door16 orlocker doors32. Instead, at740, scanning of the QR code or inputting of the Swap ID at the locker-level user interface120 causes it to transmit an unlock request including identifying information to the off-site system server214 for the identifying information to be validated against thedatabase216. At745, validation includes, not only verifying the identity of the deliverer, but also verifying theappropriate locker30, exchange time, etc.
At750, in the case that validation fails, thesystem server214 transmit a denial of access to the locker-level user interface120.
At755, upon validation of the identifying information, thesystem server214 transmits locker unlocking instructions to the locker-level controller122 and, in one embodiment, an unlocking verification message to theuser interface120 to be displayed to the user. Upon receipt of the station unlocking instructions, at760, the locker-level controller122 may transmit an unlock signal to thelocker locking mechanism124 to unlock to permit opening of thelocker door32. As described above, once thelocker door32 is unlocked the deliverer may open by pressing on it or other means. Once thedoor32 is open, the deliverer may leave the item inside thelocker30 and close the door.
Thelocker30 may also include a door sensor that senses whether thedoor32 is open or closed and transmit the information to the locker-level controller122 and, in one embodiment, to thesystem server214. Once the locker-level controller122 transmits the unlock signal and, subsequently, at765, detects via the sensor that thelocker door32 has been opened and then closed, the locker-level controller122, at770, may transmit a lock signal to thelocker locking mechanism124 to lock thelocker door32. The locker-level controller122, at775, may then transmit a locked signal to thesystem server214 indicating that thelocker door32 is now locked.
In one embodiment, upon issuance of the locked signal (verifying that thelocker door32 has been closed and locked), the locker-level controller122 or, in one embodiment, thesystem server214 commences a “deliverer's grace period” of, for example, 15 minutes. During this period, the deliverer may re-scan their QR code or input their Swap ID as described above to unlock thestation door16 or thelocker door32 to gain access to thestation enclosure10 as well as to thespecific locker30. The grace period may be provided in case the deliverer changes her mind or has any other issue that necessitates access to thelocker30 after the first attempt at delivery. Upon expiration of the grace period, the deliverer's access to both thelocker30 and to thestation1 is automatically revoked.
In one embodiment, thestation1 or the station-level locking mechanism114 may further include a sensor, camera, or other device that detects whether the deliverer has in fact exited thestation1 after the deliverer's last entry into thestation1 and transmits that deliverer exit information to the station-level controller122 or thesystem server214.
Once the deliverer grace period expires and/or thesystem server214 receives the deliverer exit information, at780, thesystem server214 commences a lag timer period of, for example, 25 minutes. During this lag timer, neither the deliverer nor the retriever may access thestation1. The lag timer may be provided to promote the safety and security of the deliverer and the retriever by preventing them from crossing paths inside thestation1 and allowing the deliverer adequate time to leave thestation1 before the retriever is to arrive.
At785, once the lag timer expires, the deliverer's exchange time ends and the retriever's exchange time begins; thesystem server214 may activate the retriever's Swap ID or QR code, granting them access to thestation1 and to thespecific locker30. At this time, only the retriever (and not the deliverer) may access thestation1 and thelocker30. Thesystem server214 may also notify the retriever via email, text message, voice message, etc. that the item is now available for pick-up at thespecific station1 and thespecific locker30. The retriever may then access thestation1 andlocker30 in a very similar manner as the deliverer did.
FIG. 8 illustrates a flow diagram for anexemplary method800 for operating the itemexchange locker station1, in particular for performance of an exchange: retrieval.
When a retriever's exchange time begins, at805, the retriever may scan their QR code or input their Swap ID by scanning their mobile device's screen using thedock24 at the station-level user interface20. In one embodiment, scanning of the QR code or inputting of the Swap ID at the station-level user interface20 does not, by itself, unlock thedoor16. In fact, notice that in the exemplary system ofFIG. 5 there is no data connection between theuser interface20 and thecontroller112 that controls thelocking mechanism114. Theuser interface20 is effectively incapable of generating or pushing any unlock signals to any doors including thestation door16 orlocker doors32. Instead, at810, scanning of the QR code or inputting of the Swap ID at the station-level user interface20 transmits an unlock request including identifying information to the off-site system server214 for the identifying information to be validated against thedatabase216. At815, validation includes, not only verifying the identity of the retriever, but also verifying theappropriate station1, exchange time, etc.
In one embodiment, thesystem server214 logs received unlock requests together with the identifying information, mobile device id (e.g., UDID, IDFA, IDFV, WAID, AAID, etc.) date, time, station id, etc. indatabase216.
In the case that validation fails, at820, thesystem server214 transmit an unlock request denial to theuser interface20. Upon validation of the identifying information, at825, thesystem server214 transmits station unlocking instructions to the station-level controller112 and, in one embodiment, an unlock request approval message to theuser interface20 to be displayed to the user. Upon receipt of the station unlocking instructions, at830, the station-level controller112 may transmit an unlock signal to thestation locking mechanism114 to unlock to permit opening of thestation entry door16.
In one embodiment, scanning of the QR code or inputting of the Swap ID at the station-level user interface20 generates a “wake” signal that may be transmitted (e.g., to thesystem server214 to be transmitted to thecontroller112 or another appropriate control) for the interior lights at thestation1 to turn on, if necessary, as well for security features such as security camera recording, etc. to commence or at least time stamp.
Unlocking of thedoor16, however, does not unlock anylockers30 inside of thestation1. Once inside thestation enclosure10, at835, the retriever may scan their QR code or input their Swap ID a second time by using thedock24 at the locker-level user interface120.
In one embodiment, scanning of the QR code or inputting of the Swap ID at the locker-level user interface120 does not, by itself, unlock thelocker door32. Theuser interface120 may be effectively incapable of generating or pushing any unlock signals to any doors including thestation door16 orlocker doors32. Instead, at840, scanning of the QR code or inputting of the Swap ID at the locker-level user interface120 causes it to transmit an unlock request including identifying information to the off-site system server214 for the identifying information to be validated against thedatabase216. At845, validation includes, not only verifying the identity of the retriever, but also verifying theappropriate locker30, exchange time, etc.
In the case that validation fails, at850, thesystem server214 transmits a denial of access to the locker-level user interface120. Upon validation of the identifying information, at855, thesystem server214 transmits locker unlocking instructions to the locker-level controller122 and, in one embodiment, an unlocking verification message to theuser interface120 to be displayed to the user. Upon receipt of the station unlocking instructions, at860, the locker-level controller122 may transmit an unlock signal to thelocker locking mechanism124 to unlock to permit opening of thelocker door32. As described above, once thelocker door32 is unlocked the retriever may open by pressing on it or other means. Once thedoor32 is open, the retriever may retrieve the item inside thelocker30 and close thedoor32.
Thelocker30 may also include a door sensor that senses whether thedoor32 is open or closed and transmit the information to the locker-level controller122 and, in one embodiment, to thesystem server214. Once the locker-level controller122 transmits the unlock signal and, at865, subsequently, detects via the sensor that thelocker door32 has been opened and then closed, at870, the locker-level controller122 may transmit a lock signal to thelocker locking mechanism124 to lock thelocker door32. At875, the locker-level controller122 may then transmit a locked signal to thesystem server214 indicating that thelocker door32 is now locked.
In one embodiment, upon issuance of the locked signal (verifying that thelocker door32 has been closed and locked), the locker-level controller122 or, in one embodiment, thesystem server214 commences a “retriever's grace period” of, for example, 15 minutes. During this period, the retriever may re-scan their QR code or input their Swap ID as described above to unlock thestation door16 or thelocker door32 to gain access to thestation enclosure10 as well as to thespecific locker30. The grace period may be provided in case the retriever changes her mind, forgets something, or has any other issue that necessitates access to thelocker30 after the first attempt at retrieval. Upon expiration of the grace period, the retriever's access to both thelocker30 and to thestation1 is automatically revoked.
In one embodiment, thestation1 or the station-level locking mechanism114 may further include a sensor, camera, or other device that detects whether the retriever has in fact exited thestation1 after the retriever's last entry into thestation1 and transmits that retriever exit information to the station-level controller122 or thesystem server214.
Once the retriever grace period expires and/or thesystem server214 receives the retriever exit information, at880, thesystem server214 closes the transaction, the exchange is complete! Thesystem server214 may also notify the deliverer and retriever that their transaction has been successfully completed and thelocker30 used for their exchange may be re-listed on theweb interface212 as available for rental.
As stated above, thesystem server214 keeps a log of unlock requests in thedatabase216. This information may be useful in many ways. For example, after a certain number of unlock requests from a givenstation1 or a givenlocker30, a maintenance request may automatically be pushed to a maintenance technician to inspect the station'sdoor locking mechanism114 or the locker'slocking mechanism124. In another example, after a certain number of unlock requests from a givenstation1, a cleaning request may be automatically pushed to a cleaning crew to attend to cleaning thestation1.
In one embodiment, at least somelockers30 may include a contraband sensor, which may automatically sense suspicious materials, send a contraband signal to thesystem server214, which may, in turn, set a contraband flag to prevent access to thelocker30 in question until the contraband flag has been cleared. The log information (as described above) regarding thespecific locker30 may be available to aid in any subsequent investigation regarding the detected contraband.
While the figures illustrate various actions occurring in serial, it is to be appreciated that various actions illustrated could occur substantially in parallel, and while actions may be shown occurring in parallel, it is to be appreciated that these actions could occur substantially in series. While a number of processes are described in relation to the illustrated methods, it is to be appreciated that a greater or lesser number of processes could be employed and that lightweight processes, regular processes, threads, and other approaches could be employed. It is to be appreciated that other exemplary methods may, in some cases, also include actions that occur substantially in parallel. The illustrated exemplary methods and other embodiments may operate in real-time, faster than real-time in a software or hardware or hybrid software/hardware implementation, or slower than real time in a software or hardware or hybrid software/hardware implementation.
FIG. 9 illustrates a block diagram of anexemplary machine900 for an itemexchange locker station1. InFIG. 9 themachine900 is disclosed in the context of the station-level subsystem110aand, more specifically, the station-level controller112. However, themachine900 may also be used to deploy the locker-level subsystem110band, more specifically, the locker-level controller122, the station-level user interface20, the locker-level user interface120 as well as theremote server214 and theweb interface212 of theremote portion210.
Themachine900 may include aprocessor902, amemory904,database216, and I/O Ports910 operably connected by abus908. In one example, themachine900 may receive or transmit input or output signals via, for example, I/O Ports910 or I/O Interfaces918 from or to, for example, the station entrydoor locking mechanism114, the lockerdoor locking mechanism124, theweb interface212, and theperipherals116 and126. Thus, the station-level controller112, the locker-level controller122, the station-level user interface20, the locker-level user interface120, theremote server214, and theweb interface212 may be implemented inmachine900 as hardware, firmware, software, or a combination thereof and, thus, themachine900 and its components may provide means for performing functions described herein as performed the station-level controller112, the locker-level controller122, the station-level user interface20, the locker-level user interface120, theremote server214, and theweb interface212.
Theprocessor902 can be a variety of various processors including dual microprocessor and other multi-processor architectures. Thememory904 can include volatile memory or non-volatile memory. The non-volatile memory can include, but is not limited to, ROM, PROM, EPROM, EEPROM, and the like. Volatile memory can include, for example, RAM, synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), and direct RAM bus RAM (DRRAM).
Adisk906 may be operably connected to themachine900 via, for example, an I/O Interfaces (e.g., card, device)918 and an I/O Ports910. Thedisk906 can include, but is not limited to, devices like a magnetic disk drive, a solid state disk drive, a floppy disk drive, a tape drive, a Zip drive, a flash memory card, or a memory stick. Furthermore, thedisk906 can include optical drives like a CD-ROM, a CD recordable drive (CD-R drive), a CD rewriteable drive (CD-RW drive), or a digital video ROM drive (DVD ROM). Thememory904 can storeprocesses914 ordata916, for example. Thedisk906 ormemory904 can store an operating system that controls and allocates resources of themachine900.
Thebus908 can be a single internal bus interconnect architecture or other bus or mesh architectures. While a single bus is illustrated, it is to be appreciated thatmachine900 may communicate with various devices, logics, and peripherals using other busses that are not illustrated (e.g., PCIE, SATA, Infiniband, 1394, USB, Ethernet). Thebus908 can be of a variety of types including, but not limited to, a memory bus or memory controller, a peripheral bus or external bus, a crossbar switch, or a local bus. The local bus can be of varieties including, but not limited to, an industrial standard architecture (ISA) bus, a microchannel architecture (MCA) bus, an extended ISA (EISA) bus, a peripheral component interconnect (PCI) bus, a universal serial (USB) bus, and a small computer systems interface (SCSI) bus.
Themachine900 may interact with input/output devices via I/O Interfaces918 and I/O Ports910. Input/output devices can include, but are not limited to, a keyboard, a microphone, a pointing and selection device, cameras, video cards, displays,disk906,network devices920, and the like. The I/O Ports910 can include but are not limited to, serial ports, parallel ports, and USB ports.
Themachine900 can operate in a network environment and thus may be connected to networkdevices920 via the I/O Interfaces918, or the I/O Ports910. Through thenetwork devices920, themachine900 may interact with a network. Through the network, themachine900 may be logically connected to remote computers. The networks with which themachine900 may interact include, but are not limited to, a local area network (LAN), a wide area network (WAN), and other networks. Thenetwork devices920 can connect to LAN technologies including, but not limited to, fiber distributed data interface (FDDI), copper distributed data interface (CDDI), Ethernet (IEEE 802.3), token ring (IEEE 802.5), wireless computer communication (IEEE 802.11), Bluetooth (IEEE 802.15.1), Zigbee (IEEE 802.15.4) and the like. Similarly, thenetwork devices920 can connect to WAN technologies including, but not limited to, point to point links, circuit switching networks like integrated services digital networks (ISDN), packet switching networks, and digital subscriber lines (DSL). While individual network types are described, it is to be appreciated that communications via, over, or through a network may include combinations and mixtures of communications.
Definitions
The following includes definitions of selected terms employed herein. The definitions include various examples or forms of components that fall within the scope of a term and that may be used for implementation. The examples are not intended to be limiting. Both singular and plural forms of terms may be within the definitions.
As used herein, an “operable connection” or “operable coupling,” or a connection by which entities are “operably connected” or “operably coupled” is one in which the entities are connected in such a way that the entities may perform as intended. An operable connection may be a direct connection or an indirect connection in which an intermediate entity or entities cooperate or otherwise are part of the connection or are in between the operably connected entities. In the context of signals, an “operable connection,” or a connection by which entities are “operably connected,” is one in which signals, physical communications, or logical communications may be sent or received. Typically, an operable connection includes a physical interface, an electrical interface, or a data interface, but it is to be noted that an operable connection may include differing combinations of these or other types of connections sufficient to allow operable control. For example, two entities can be operably connected by being able to communicate signals to each other directly or through one or more intermediate entities like a processor, operating system, a logic, software, or other entity. Logical or physical communication channels can be used to create an operable connection.
“Logic,” as used herein, includes but is not limited to hardware, firmware, software or combinations of each to perform a function(s) or an action(s), or to cause a function or action from another logic, method, or system. For example, based on a desired application or needs, logic may include a software controlled microprocessor, discrete logic like an application specific integrated circuit (ASIC), a programmed logic device, a memory device containing instructions, or the like. Logic may include one or more gates, combinations of gates, or other circuit components. Logic may also be fully embodied as software. Where multiple logical logics are described, it may be possible to incorporate the multiple logical logics into one physical logic. Similarly, where a single logical logic is described, it may be possible to distribute that single logical logic between multiple physical logics.
“Signal,” as used herein, includes but is not limited to one or more electrical or optical signals, analog or digital signals, data, one or more computer or processor instructions, messages, a bit or bit stream, or other means that can be received, transmitted, or detected.
“Software,” as used herein, includes but is not limited to, one or more computer or processor instructions that can be read, interpreted, compiled, or executed and that cause a computer, processor, or other electronic device to perform functions, actions or behave in a desired manner. The instructions may be embodied in various forms like routines, algorithms, modules, methods, threads, or programs including separate applications or code from dynamically or statically linked libraries. Software may also be implemented in a variety of executable or loadable forms including, but not limited to, a stand-alone program, a function call (local or remote), a servlet, an applet, instructions stored in a memory, part of an operating system or other types of executable instructions. It will be appreciated by one of ordinary skill in the art that the form of software may depend, for example, on requirements of a desired application, the environment in which it runs, or the desires of a designer/programmer or the like. It will also be appreciated that computer-readable or executable instructions can be located in one logic or distributed between two or more communicating, co-operating, or parallel processing logics and thus can be loaded or executed in serial, parallel, massively parallel and other manners.
Suitable software for implementing the various components of the example systems and methods described herein may be produced using programming languages and tools like Java, Pascal, C#, C++, C, CGI, Perl, SQL, APIs, SDKs, assembly, firmware, microcode, or other languages and tools. Software, whether an entire system or a component of a system, may be embodied as an article of manufacture and maintained or provided as part of a computer-readable medium as defined previously. Another form of the software may include signals that transmit program code of the software to a recipient over a network or other communication medium. Thus, in one example, a computer-readable medium has a form of signals that represent the software/firmware as it is downloaded from a web server to a user. In another example, the computer-readable medium has a form of the software/firmware as it is maintained on the web server. Other forms may also be used.
To the extent that the term “includes” or “including” is employed in the detailed description or the claims, it is intended to be inclusive in a manner similar to the term “comprising” as that term is interpreted when employed as a transitional word in a claim. Furthermore, to the extent that the term “or” is employed in the detailed description or claims (e.g., A or B) it is intended to mean “A or B or both”. When the applicants intend to indicate “only A or B but not both” then the term “only A or B but not both” will be employed. Thus, use of the term “or” herein is the inclusive, and not the exclusive use. See, Bryan A. Garner, A Dictionary of Modern Legal Usage 624 (2d. Ed. 1995).
While example systems, methods, and so on, have been illustrated by describing examples, and while the examples have been described in considerable detail, it is not the intention of the applicants to restrict or in any way limit scope to such detail. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the systems, methods, and so on, described herein. Additional advantages and modifications will readily appear to those skilled in the art. Therefore, the invention is not limited to the specific details, the representative apparatus, and illustrative examples shown and described. Thus, this application is intended to embrace alterations, modifications, and variations that fall within the scope of the appended claims. Furthermore, the preceding description is not meant to limit the scope of the invention. Rather, the scope of the invention is to be determined by the appended claims and their equivalents.