Systems and methods for safely storing an object

ABSTRACT

A system for storing an object includes a card reader, a keypad, and a secure storage area. The card reader is configured to receive a card from a user. The keypad is configured to receive authentication information from the user. The secure storage area is configured to store a plurality of boxes including a first box that is assigned to the user. The first box is configured to be dispensed from the secure storage area to the user in response to the user requesting to physically receive the first box. The first box defines an internal volume that is configured to store one or more objects belonging to the user. The first box is configured to be returned to the secure storage area after the user adds the one or more objects to, or removes the one or more objects from, the internal volume of the first box.

BACKGROUND

Several options exist for a user to store an object outside of theuser's premises. For example, the user may want to store a spare keyoutside of the user's premises in the event that the user loses his/herprimary key. In another example, the user may want to store a spare keyoutside of the user's premises in the event that the user wants to granta third party access to the spare key, but the user is not available togive the spare key to the third party in person.

One option is to store the object under a rock, plant, rug, etc.However, as will be appreciated, this is not a secure option. Anotheroption is to store the object with a friend/neighbor. However, thefriend/neighbor may not be available when the user needs the objectback. Another option is to store the object in a safety deposit box.However, accessing an object in a safety deposit box may take aninordinate amount of time and be restricted to the business hours of abank, among other drawbacks. Therefore, what is needed is an improvedsystem and method for safely storing an object.

SUMMARY

A system for storing an object is disclosed. The system includes a cardreader configured to receive a card from a user. The system isconfigured to determine an identity of the user based on information onthe card. The system also includes a keypad configured to receiveauthentication information from the user after the card is received. Thesystem is configured to authenticate the identity of the user based onthe authentication information. The system also includes a securestorage area configured to store a plurality of boxes including a firstbox that is assigned to the user. The first box is configured to bedispensed from the secure storage area to the user in response to theuser requesting to physically receive the first box. The first boxdefines an internal volume that is configured to store one or moreobjects belonging to the user. The first box is configured to bereturned to the secure storage area after the user adds the one or moreobjects to, or removes the one or more objects from, the internal volumeof the first box.

A method for storing an object is also disclosed. The method includesreceiving authentication information from a user. The method alsoincludes determining that the user is linked to a user account based onthe authentication information. The method also includes receiving arequest from the user to have a box assigned to the user. The methodalso includes assigning the box to the user in response to the requestto have the box assigned to the user. The method also includes receivinga request from the user to physically receive the box. The method alsoincludes automatically dispensing the box to the user in response to therequest to physically receive the box. The box defines an internalvolume that is configured to store one or more objects belonging to theuser. The method also includes receiving the box from the user after theuser adds the one or more objects to, or removes the one or more objectsfrom, the internal volume of the box.

Another method for storing an object is disclosed. The method includesreceiving a request from a first user to authorize a second user toaccess a box. The method also includes receiving second user informationfrom the first user after receiving the request to authorize the seconduser to access the box. The method also includes transmitting seconduser authentication information to the second user. The method alsoincludes receiving the second user authentication information from thesecond user. The method also includes determining that the second useris authorized to access the box based on the second user authenticationinformation. The method also includes receiving a request from thesecond user to physically receive the box. The method also includesautomatically dispensing the box to the second user in response to therequest to physically receive the box. The box defines an internalvolume that is configured to store one or more objects belonging to thefirst user, the second user, or both. The method also includes receivingthe box from the second user after the second user adds the one or moreobjects to, or removes the one or more objects from, the internal volumeof the box.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate various embodiments of thepresent disclosure and together, with the description, serve to explainthe principles of the present disclosure. In the drawings:

FIG. 1 is a diagram illustrating an example of a system for storing anobject, consistent with certain disclosed embodiments;

FIG. 2 is a diagram illustrating an example of a flowchart of a methodfor storing an object;

FIG. 3 is a diagram illustrating an example of a flowchart of anothermethod for storing an object; and

FIG. 4 is a diagram illustrating an example of a hardware system forperforming at least a portion of the method(s) disclosed herein,consistent with certain disclosed embodiments.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawings.Wherever convenient, the same reference numbers are used in the drawingsand the following description to refer to the same or similar parts.While several examples of embodiments and features of the presentdisclosure are described herein, modifications, adaptations, and otherimplementations are possible, without departing from the spirit andscope of the present disclosure. Accordingly, the following detaileddescription does not limit the present disclosure. Instead, the properscope of the disclosure is defined by the appended claims.

FIG. 1 is a diagram illustrating an example of a system 100 for storingan object, consistent with certain disclosed embodiments. The system 100may be or include an automated teller machine (ATM) or a modifiedversion thereof. Thus, the system 100 may include a body 110 thatdefines an internal volume. In various implementations, the body 110 maybe made of a strong material, such as steel or the like. The internalvolume may be a secure storage area that may only be accessed byauthorized personnel.

A plurality of boxes 120 may be stored in the internal volume of thebody 110. As shown, a wall of the body has been removed (or is shown asbeing transparent) so that the ends of the boxes 120 in the internalvolume may be seen. The boxes 120 may each have a length from about 6 cmto about 10 cm, a width from about 9 cm to about 22 cm, and a heightfrom about 2 cm to about 5 cm. The boxes 120 may each define an internalvolume that is configured to store one or more objects. The object(s)may belong to the user or to another person that has been granted accessto the user's box by the user. Thus, the object(s) may not belong to orbe a part of the system 100. The object(s) may be or include a key,paper (e.g., a contract), jewelry, a data storage device (e.g., a flashdrive), or the like. As will be appreciated, this list is merelyexemplary and is not intended to be limiting.

Each of the boxes 120 may have an identifier (e.g., on an outer surfacethereof). The identifier may be or include a barcode, a radio frequencyidentification (RFID) tag, a text label, or the like that may be read(e.g., scanned) and used to identify the particular box.

The boxes 120 may be detachably coupled to a belt 122 within theinternal volume of the body 110. The belt 122 may move along apredetermined path (e.g., in a loop), and may thus move the attachedboxes 120, to facilitate dispensing, receiving, and/or storing the boxes120.

The body 110 may also include a card reader 130 configured to receiveand read a card (e.g., a credit card, a debit card, a driver's licensecard, an ATM card, etc.) belonging to the user. The information on thecard may be used identify the user and/or to identify a user accountthat is linked to the user.

The body 110 may also include a keypad 140 configured to receive manualinput from the user. The manual input may be or include authenticationinformation (e.g., a password or key code). The authenticationinformation may be used to authenticate the identity of the user and/orto confirm that the user is linked to the user account.

The body 110 may also or instead include a camera 150 configured tocapture a picture or image of the user. The picture may also or insteadbe used to authenticate the identity of the user and/or to confirm thatthe user is linked to the user account.

The body 110 may also include a display screen 160 configured to displayinformation to the user. The body 110 may also include an actuator 170configured to automatically dispense or move the user's box 120 from theinternal volume to the user, and to subsequently receive the user's box120A from the user. In at least one embodiment, the user's box 120A maybe detachable from the belt 122 when it is dispensed such that the usermay walk away with the box 120A. In another embodiment, the user's box120A may remain attached to the belt 122 when dispensed such that theuser may not walk away with the box 120A.

FIG. 2 is a diagram illustrating an example of a flowchart of a method200 for storing an object. The method 200 is from the perspective of thesystem 100, such as an ATM, as opposed to the perspective of the user.The steps of the method 200 are provided in an exemplary order below;however, the steps may be performed in a different order as well. Themethod 200 may include receiving first user authentication informationfrom a first user, as at 202. The first user may submit the first userauthentication information remotely or in person.

To submit the first user authentication information remotely, the firstuser may use a personal device, such as personal computer, a smartphone, a tablet, etc. that is in (e.g., wireless) communication with thesystem 100. When submitting the first user authentication informationremotely, the first user authentication information may be or include ausername, an account number, and/or a password.

To submit the first user authentication information in person, the firstuser may interact directly (e.g., manually) with the system 100, similarto using a conventional ATM. When submitting the first userauthentication information in person, the first user may enter a cardinto the card reader 130. The card may be or include an ATM card, acredit card, a debit card, a driver's license card, etc. belonging tothe first user. In at least one embodiment, the first user may alsoenter a password (e.g., a personal identification number (PIN number))into the keypad 140. In another embodiment, the camera 150 may capture apicture of the first user to use as authentication information.

The method 200 may also include determining that the first user islinked to a user account, (such as a bank account, a credit cardaccount, a box usage account, or the like), based on the first userauthentication information, as at 204. This may include comparing thefirst user authentication information to corresponding authenticationinformation associated with the user account. For example, the username,account number, and/or PIN or password submitted by the first user maybe compared to a corresponding username, account number, and/or PIN orpassword associated with the user account, and if they match, the system100 decides or determines that the first user is linked to the useraccount. In another example, the information on the card, the password(e.g., PIN number), and/or the picture may be compared to correspondingcard information, a password, and/or a picture associated with the useraccount, and if they match, the first user is determined to be linked tothe user account. If the user does not have a user account, the user maybe presented with the option to create a new account with which thefirst user is linked.

After the first user is determined to be linked to the user account, themethod 200 may also include receiving a request from the first user tohave a box 120A assigned to the first user, as at 206. In variousimplementations, the request at 206 may come before or after thereceiving at 202 and/or the determining at 204. The first user maysubmit the request remotely or in person. If the request is submittedremotely, the user may submit the request for a particular system 100 ata particular geographic location (e.g., an ATM close to the user's homeor office). The method 200 may also include determining whether the box120A is available in the system 100 to be assigned to the first user, asat 208. This may include determining that at least one of the boxes 120is currently unassigned. For example, the system 100 may keep anelectronic record locally of which boxes 120 are free/assigned. Inanother example, the electronic record may be kept at a central server.In another example, something may physically change in the boxes 120when used (e.g., a mechanical or electrical switch or indicator), sothat the system 100 can tell from the boxes 120 whether or not they areassigned.

If the box 120A is available to be assigned, the method 200 may alsoinclude assigning the box 120A to the first user, as at 210. This mayinclude linking the identifier on the box 120A to the user account. Onceassigned, the user may pay for the rental of the box 120A (e.g., by thehour or by the day). In some embodiments, the rental fee may be paidfrom the user account that the first user is linked to, such as frombank account or a credit card account. If no boxes 120 are available tobe assigned at the particular system 100, the user may be prompted toselect a different system 100 at a different geographic location. In atleast one embodiment, the user may be able to view a map of all systems100 at various geographic locations (e.g., on the display screen 160 oron the user's remote device), and the map may show which systems haveavailable boxes and which do not.

After the box 120A is assigned to the first user, the method 200 mayalso include receiving a request from the first user to physicallyreceive the box 120A, as at 212. In various implementations, the firstuser may only submit this request in person (i.e., not remotely). If thefirst user authentication information was submitted remotely at 202,then the first user may have to resubmit the authentication informationin person (e.g., at the system 100) in order to request to physicallyreceive the box 120A. In response to the request, the method 200 mayalso include automatically dispensing the box 120A (from the system 100)to the first user, as at 214. Automatically dispensing the box 120A maybe in contrast to a person (e.g., the first user or a bank teller)manually retrieving the box (e.g., like a safe deposit box). To dispensethe box 120A, the belt 122 may move along the predetermined path,carrying the box 120A with it. When the box 120A is aligned with theactuator 170, the actuator 170 may engage the box 120A and subsequentlydispense the box 120A to the first user. As described above, in oneexample, the box 120A may remain coupled to the belt 122 when dispensed.In another example, the box 120A may be decoupled form the belt 122 whendispensed.

After the box 120A is dispensed to the first user, the first user mayopen the box 120A and add one or more objects to the box 120A (e.g., theuser may place an object into the box 120A) and/or remove one or moreobjects from the box 120A. The objects may belong to or be in thepossession of the first user, (i.e., the objects do not belong to, orare not a part of, the system 100). The method 200 may also includereceiving the box 120A from the first user after the first user addsand/or removes the one or more objects to/from the internal volume ofthe box 120A, as at 216. More particularly, the first user may returnthe box 120A to the actuator 170, which may engage the box 120A andsubsequently transfer the box 120A to its spot on the belt 122. In atleast one embodiment, when the box 120A is detachable from the belt 122,the first user may keep the box 120A, or take the box 120A with him/her,for a predetermined amount of time prior to returning the box 120A.However, the user may then need to re-authenticate himself/herself whenthe user returns.

In at least one embodiment, after the box 120A is received, the method200 may include determining whether the box 120A is empty, as at 218.This may include weighing the box 120A and comparing the weight to theknown weight of an empty box. If the box 120A is determined to be empty,the first user may be asked (e.g., via a message on a user interfaceshown the display screen 160) if he/she wants to continue renting thebox 120A or to stop renting the box 120A. Thus, if the box 120A isdetermined to be empty, the method 200 may also include receiving arequest from the first user to unassign the box 120A from the firstuser, as at 220. This may include changing the electronic record thatassociates the box 120A with the user account.

FIG. 3 is a diagram illustrating an example of a flowchart of anothermethod 300 for storing an object. The method 300 may be similar to themethod 200. For example, the method 300 may include steps 202, 204, 206,208, and/or 210. However, rather than proceeding to step 212, the method300 may instead include receiving a request from the first user toauthorize a second user to access the box 120A, as at 312. In oneexample, the first user may be leaving town and want the second user tocheck on the first user's house (e.g., to water the plants, feed a pet,etc.). In this example, the first user may leave an object (e.g., a key)to the first user's house in the box 120A and authorize the second userto access or get the key from the box 120A.

After the request to authorize the second user to access the box 120A,the method 300 may also include receiving second user information, as at314, where the second user information identifies the person that isbeing given access to the box 120A and/or identifies a communicationchannel (e.g., an email address or cell phone number) to the person thatis being given access. The first user and/or the second user may submitthe second user information remotely (e.g., via a user device such as apersonal computer, smart phone, or tablet) or in person (e.g., manuallyinto the system 100 using the card reader 130 and/or the keypad 140).The second user information may include the second user's name, address,phone number, email address, social security number, credit card number,debit card number, driver's license number, picture, or the like, or acombination thereof. The second user information may be stored by thesystem 100 and/or transmitted to the second user, as described below.

After the second user information is received, the method 300 may alsoinclude transmitting second user authentication information to thesecond user, as at 316. In some embodiments, step 316 may be omitted.The second user authentication information may be transmitted via textmessage, email, etc., or the second user authentication information maybe transmitted by displaying it on the display screen 160 if the seconduser is present in person. The second user authentication informationtransmitted to the second user may include the second user informationand/or include an access code (e.g., a password, QR code, PIN number, orthe like). In some implementations, the second user authenticationinformation may include an application for the second user to generate aQR code using a web/mobile interface on a device such as a smart phone.In another example, a QR code may be provided to the second user by thefirst user, e.g., printed on a piece of paper. In implementations thatuse a QR code, the system 100 or the first user may determine how longthe QR code is valid. After the QR code expires, the system 100 will notprovide access based on the QR code as the second user may no longer beauthorized to access the box 120A.

The method 300 may also include receiving the second user authenticationinformation from the second user, as at 318. In various implementations,the second user authentication information may be required to besubmitted in person (i.e., not remotely). For example, the second usermay insert a card belonging to the second user (e.g., a credit card orthe like) into the card reader 130 and/or display the QR code to thecamera 150 so that the system 100 can read the code and/or manuallyenter a name, address, password or other second user authenticationinformation into the system 100 using the keypad 140 and/or the displayscreen 160. The method 300 may also include determining that the seconduser is authorized by the first user to access the box 120A based atleast partially upon the second user authentication information, as at320. This may include comparing the data from steps 312, 314, and/or 318to determine if a match occurs (i.e., the second user is authorizedand/or the authentication information submitted by the second user isvalid and corresponds to authentication information stored in the useraccount). After the second user is determined to be authorized, themethod 300 may also include receiving a request from the second user tophysically receive or access the box 120A, as at 322.

In response to the request, the method 300 may also includeautomatically dispensing the box 120A (from the system 100) to thesecond user, as at 324. The box 120A may be dispensed as described abovewith respect to FIG. 2. After the box 120A is dispensed to the seconduser, the second user may open the box 120A and add one or more objectsto the box 120A and/or remove one or more objects from the box 120A. Theobjects may belong to the first user and/or to the second user (i.e.,not to the system 100). The method 300 may also include receiving thebox 120A from the second user after the second user adds and/or removesthe one or more objects to/from the internal volume of the box 120A, asat 326. The box 120A may be received as described above with respect toFIG. 2.

In at least one embodiment, after the box 120A is received, the method300 may include determining whether the box 120A is empty, as at 328.This may include weighing the box 120A and comparing the weight to theknown weight of an empty box. If the box 120A is determined to be empty,the first user and/or second user may be asked if he/she wants tocontinue renting the box 120A or to stop renting the box 120A. Thus, ifthe box 120A is determined to be empty, the method 300 may also includereceiving a request from the first user and/or the second user tounauthorize the second user to access the box or to unassign the firstuser from the box 120A, as at 330.

FIG. 4 is a diagram illustrating an example of a hardware system 400 forperforming at least a portion of one or more of the methods 200, 300,consistent with certain disclosed embodiments. The example of a hardwaresystem 400 includes examples of system components that may be used. Thecomponents and arrangement, however, may be varied.

As the example of FIG. 4 shows, the hardware system 400 may include acomputer 401. The computer 401 may include a processor 410, a memory420, a storage 430, and input/output (I/O) devices (not pictured). Thecomputer 401 may be implemented in various ways and can be configured toperform any of the embodiments described above. In some embodiments, thecomputer 401 can be a general-purpose computer such as, for example, adesktop computer, a laptop, a tablet device, a mobile device (e.g., asmartphone), etc. In other embodiments, the computer 401 can be a morecapable computing device such as, for example, a data base server, a webserver, a mainframe computer, etc. The computer 401 may be standalone ormay be part of a subsystem, which may, in turn, be part of a largersystem. For example, the computer 401 can be in communication with orotherwise positioned within the system 100.

The processor 410 may include one or more known processing devices, suchas a microprocessor from the Intel Core™ family manufactured by Intel™,the Phenom™ family manufactured by AMD™, or the like. The memory 420 mayinclude one or more storage devices configured to store informationand/or instructions used or executed by the processor 410 to performcertain functions and operations related to the disclosed embodiments.The storage 430 may include a volatile or non-volatile, magnetic,semiconductor, tape, optical, removable, non-removable, or other type ofcomputer-readable medium used as a storage device. In some embodiments,the storage 430 can include or contain, for example, the informationassociated with the existing user accounts.

In an embodiment, the memory 420 may include one or more programs orsubprograms including instructions that may be loaded from the storage430 or elsewhere that, when executed by the processor 410 of thecomputer 401, perform various procedures, operations, stages, orprocesses consistent with disclosed embodiments. For example, the memory420 may include an object storage program 425 for performing at least aportion of the methods 200, 300. The memory 420 may also include otherprograms that perform other functions, operations, and processes, suchas programs that provide communication support, Internet access, etc.The object storage program 425 may be embodied as a single program, oralternatively, may include multiple sub-programs that, when executed,operate together to perform the function of the object storage program425 according to disclosed embodiments.

The computer 401 may communicate over a link with a network 440 to, forexample, a remote user device (e.g., a computer, a smart phone, atablet, etc.) 450. For example, the link may be a direct communicationlink, a local area network (LAN), a wide area network (WAN), or othersuitable connection. The network 440 may include the internet, as wellas other networks, which may be connected to various systems anddevices.

The computer 401 may include one or more input/output (I/O) devices (notpictured) that allow data (information) to be received and/ortransmitted by the computer 401. The I/O devices may also include one ormore digital and/or analog communication I/O devices that allow thecomputer 401 to communicate with other machines and devices. The I/Odevices may also include input devices such as a keyboard or a mouse,and may include output devices such as a display or a printer. Thecomputer 401 may receive data (e.g., user name, account number,password, QR code, etc.) and then output data (e.g., on the displayscreen 160). The configuration and number of input and/or output devicesincorporated in I/O devices may vary as appropriate for variousembodiments. Example uses of the hardware system 400 can be described byway of example with reference to the embodiments described above.

While the teachings have been described with reference to the exampleembodiments, those skilled in the art will be able to make variousmodifications to the described embodiments without departing from thetrue spirit and scope. The terms and descriptions used herein are setforth by way of illustration only and are not meant as limitations. Inparticular, although the method has been described by examples, thesteps of the method may be performed in a different order thanillustrated or simultaneously. Furthermore, to the extent that the terms“including”, “includes”, “having”, “has”, “with”, or variants thereofare used in either the detailed description and the claims, such termsare intended to be inclusive in a manner similar to the term“comprising.” As used herein, the term “one or more of” with respect toa listing of items such as, for example, A and B, means A alone, Balone, or A and B. Those skilled in the art will recognize that theseand other variations are possible within the spirit and scope as definedin the following claims and their equivalents.

What is claimed is:
 1. A system for storing an object, comprising: acard reader configured to receive a card from a user, wherein the systemis configured to determine an identity of the user based on informationon the card; a keypad configured to receive authentication informationfrom the user after the card is received, wherein the system isconfigured to authenticate the identity of the user based on theauthentication information; a secure storage area configured to store aplurality of physical boxes, wherein the plurality of physical boxescomprises a first physical box that is assigned to the user; and a beltpositioned within the secure storage area, wherein the first physicalbox is configured to be dispensed from the secure storage area to theuser outside of the secure storage area in response to the userrequesting to physically receive the first physical box, whereindispensing the first physical box comprises moving the first physicalbox along a predetermined path using the belt and detaching the firstphysical box from the belt, wherein the first physical box defines aninternal volume that is configured to store one or more physical objectsbelonging to the user, and wherein the first physical box is configuredto be returned to the secure storage area after the user adds the one ormore physical objects to, or removes the one or more physical objectsfrom, the internal volume of the first physical box.
 2. The system ofclaim 1, wherein the system comprises an automated teller machine. 3.The system of claim 1, wherein the system is configured to assign thefirst physical box to the user when the user is remote from the system,prior to the user submitting the card to the card reader.
 4. The systemof claim 1, wherein the system is configured to determine whether thefirst physical box is empty by weighing the first physical box after theuser returns the first physical box.
 5. A method for storing an object,comprising: receiving authentication information from a user;determining that the user is linked to a user account based on theauthentication information; providing a map to the user showing aplurality of secure storage areas at various geographic locations,wherein the map indicates which of the secure storage areas haveavailable physical boxes and which of the secure storage areas do nothave available physical boxes; receiving a request from the user to havea physical box assigned to the user, wherein the physical box is one ofthe available physical boxes at one of the secure storage areas selectedby the user; assigning the physical box to the user in response to therequest to have the physical box assigned to the user; receiving arequest from the user to physically receive the physical box;automatically dispensing the physical box to the user outside of thesecure storage area in response to the request to physically receive thephysical box, wherein dispensing the physical box comprises moving thephysical box along a predetermined path using a belt and detaching thephysical box from the belt, and wherein the physical box defines aninternal volume that is configured to store one or more physical objectsbelonging to the user; and receiving the physical box from the userafter the user adds the one or more physical objects to, or removes theone or more physical objects from, the internal volume of the physicalbox, wherein receiving the physical box comprises reattaching thephysical box to the belt.
 6. The method of claim 5, wherein theauthentication information and the request to have the physical boxassigned to the user are submitted in person by the user to a machine,and wherein the machine automatically dispenses the physical box.
 7. Themethod of claim 5, wherein the authentication information and therequest to have the physical box assigned to the user are submittedremotely by the user.
 8. The method of claim 7, wherein the request tophysically receive the physical box is submitted in person by the userto a machine.
 9. The method of claim 8, further comprising receiving theauthentication information a second time from the user in person afterthe physical box is assigned to the user and prior to receiving therequest to physically receive the physical box.
 10. The method of claim5, further comprising determining, by a machine, whether the physicalbox is empty after the physical box is received from the user.
 11. Themethod of claim 10, wherein determining whether the physical box isempty comprises weighing the physical box.
 12. The method of claim 10,further comprising receiving a request from the user to unassign thephysical box from the user after the physical box is determined to beempty.
 13. A method for storing an object, comprising: receiving arequest from a first user to authorize a second user to access aphysical box, wherein the physical box is one of a plurality of physicalboxes that are located in a secure storage area; receiving second userinformation from the first user after receiving the request to authorizethe second user to access the physical box; transmitting second userauthentication information to the second user; receiving the second userauthentication information from the second user; determining that thesecond user is authorized to access the physical box based on the seconduser authentication information; receiving a request from the seconduser to physically receive the physical box; automatically dispensingthe physical box to the second user in response to the request tophysically receive the physical box, wherein dispensing the physical boxcomprises moving the physical box along a predetermined path using abelt and detaching the physical box from the belt, and wherein the boxdefines an internal volume that is configured to store one or morephysical objects belonging to the first user, the second user, or both;and receiving the physical box from the second user after the seconduser adds the one or more physical objects to, or removes the one ormore physical objects from, the internal volume of the physical box. 14.The method of claim 13, further comprising: receiving first userauthentication information from the first user; determining that thefirst user is linked to a user account based on the first userauthentication information; receiving a request from the first user tohave the physical box assigned to the first user; assigning the physicalbox to the first user in response to the request to have the physicalbox assigned to the first user, wherein the physical box is assigned tothe first user prior to receiving the request to authorize the seconduser to access the physical box.
 15. The method of claim 13, wherein thesecond user information comprises a name, an address, a phone number, anemail address, a picture, or a combination thereof, and wherein thesecond user authentication information comprises a password.
 16. Themethod of claim 15, wherein the second user information is submittedremotely by the first user, and wherein the second user authenticationinformation is submitted in person by the second user to a machine. 17.The method of claim 15, wherein the first user is configured todetermine a predetermined period of time for the password to be valid,and wherein the second user is only authorized to access the physicalbox when the password is valid.
 18. The method of claim 15, wherein thepassword comprises a QR code.
 19. The method of claim 13, furthercomprising: determining, by a machine, whether the physical box is emptyafter the physical box is received from the second user; and receiving arequest from the second user to unassign the physical box from the firstuser after the physical box is determined to be empty.
 20. The method ofclaim 13, further comprising receiving a request from the first user tounauthorize the second user from accessing the physical box.
 21. Themethod of claim 20, wherein the request from the first user tounauthorize the second user from accessing the physical box is receivedafter the physical box is received from the second user.