Kiosk for renting securable devices configured to operate as a point-of-sale

ABSTRACT

A system and method for assigning controlled access to a securable device may include (i) a kiosk configured to enable a user to rent a securable device from among multiple securable devices and (ii) a lock unit associated with the securable device and being in communication with the kiosk. The lock unit may further be configured to enable the user to access the securable device after being rented by the user via said kiosk. The kiosk may further be configured to enable the user to purchase goods or services in addition to rental of the securable device.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application for patent is a Continuation of co-pending U.S. patentapplication Ser. No. 12/269,704 filed Nov. 12, 2008, which claims thebenefit of U.S. Provisional Application No. 60/987,257, filed on Nov.12, 2007, the disclosure of which is hereby incorporated by referenceinto the present patent application in its entirety.

BACKGROUND OF THE INVENTION

1. Technical Field of the Invention

The invention relates to assigning controlled access to securabledevices such as lockers and other temporary storage enclosures,vehicles, vending machines, luggage carts and rental appliances.

2. Description of Related Art

Assigning controlled access to a securable device (for example a storagelocker or other rental device) in a cost effective, secure andcustomer-convenient manner is a continuing challenge in many businesscontexts.

For example, entertainment venues such as ski areas, amusement parks andwater parks often provide storage lockers and other equipment that aguest can rent for a period of time to store personal belongings or toenhance enjoyment of the venue. For example, storage lockers may be usedwhen a guest is taking a ride on a water slide, when it gets too warm toski with excessive clothing, when the personal articles (e.g. cameras)one is carrying are not suitable for a “thrill ride” such as aroller-coaster, and in other similar types of situations. Some userswill use the locker only to store a wallet while others will use thelockers to store multiple purses, backpacks, etc.

Normally there is a charge for using a locker. Historically, smalllockers that could be rented for a quarter were the norm. Recently, asthe cost of doing business in these venues has increased, it has becomeunviable to only charge a few coins for the rental and the operators ofsuch rental facilities (whether an owner of a venue or a concessionaire)have been charging more. In some venues there is an attendant thatcollects money from the guest and then hands them a mechanical key. Theguest can then use the locker they are assigned for the time period theyhave paid for. This system has disadvantages: first, attendant salariescan be a major expense; second, there are accountability issues becauseit is difficult to audit the true rental income; and third; it isdifficult to maintain security with mechanical keys. The keys may bepassed around and not turned in. The operator must then obtain new keysand/or change the locks.

The limitations and disadvantages presented by coins and mechanical keyshave motivated the development of locker systems based on electronichardware and software. Such electronic systems may be designed to acceptcash (banknotes) or credit cards and can provide financial reports basedon system utilization. These systems conventionally employ aself-service pay station (or “kiosk”), and a server that in turncontrols a number of lockers. In such conventional electronic systems, auser may be requested to follow directions for renting a storage locker(or other rental unit or securable device) by way of instructionspresented on an electronic display or touch screen monitor. At thekiosk, the user may select a locker or other securable device, make apayment for a rental period, and either obtain or enter a personalidentification number (“PIN”) for the assigned locker. Alternately, someknown systems have employed biometrics and electronic RFID-based tokensin place of user codes. Once the user has completed a rentaltransaction, the user may be directed to proceed to the assigned lockerwhich the system has enabled for use. Enabling for use, conventionally,means remotely unlocking the storage locker. The user can then accessthe locker and store articles therein by opening its unlocked door,storing the articles, and shutting and locking the door.

Thereafter, each time the user wants to access the locker, the user mustfirst proceed to the kiosk, enter the PIN or scan the personal RFID tagand only then proceed to his or her locker. The user is normally allowedto access the locker frequently during their rental period. This meansthat the kiosk serves as both the rental station and the individualpoint-of-access for all the lockers coupled to the kiosk.

The above described architecture gives rise to several problems. Forexample, when the lockers are located at an entertainment venue, guestsusually arrive and leave such a venue at similar times based on the timethe area opens and closes and what special events may be scheduled.Consequently, a significant queue of guests will be assembled at thekiosk during these peak usage periods. This is inconvenient for the userand decreases revenue because new renters cannot get to the kiosk whenit is being used by current renters trying to rent new lockers or gainaccess the locker they have already rented. This problem is amplified bythe fact that users are normally in groups of family and friends, eachwanting to use their rented locker multiple times during the rentalperiod. Other guests become frustrated when this happens. Furthermore,security risks arise because of the heightened chance that a guest willsee the personal code of another guest at the pay station, or that alocker unlocked remotely by the kiosk upon entry of an authorized user'sPIN will be accessed by an unauthorized person before the authorizeduser arrives at the locker after leaving the kiosk.

The existing architectures also pose reliability and customersatisfaction issues because when either the kiosk or the electroniccommunication network connecting the kiosk to the rental units fails,users are not able to access their rental unit.

Accordingly, a need exists for a locker system that will eliminate thepreceding shortcomings.

SUMMARY OF THE INVENTION

Controlled access to a securable device is assigned whereby a kiosk isoperable to assign an authorized user an ability to access a securabledevice selected from among a plurality of securable devices locatedremotely from the kiosk. The kiosk associates a unique personalidentification number (PIN) with the authorized user and with theselected securable device, and is operable to transmit the unique PIN tothe selected securable device, inform the user of the unique PIN;provide the user with location information of the selected securabledevice. The selected securable device is adapted to accept entry, at thesecurable device, of a PIN, and permits access upon entry of the uniquePIN.

One embodiment of a system for assigning controlled access to asecurable device may include (i) a kiosk configured to enable a user torent a securable device from among multiple securable devices and (ii) alock unit associated with the securable device and being incommunication with the kiosk. The lock unit may further be configured toenable the user to access the securable device after being rented by theuser via said kiosk. The kiosk may further be configured to enable theuser to purchase goods or services in addition to rental of thesecurable device.

One embodiment of a method for assigning controlled access to asecurable device may include enabling, via a kiosk, a user to rent asecurable device from among multiple securable devices. A lock unitassociated with the securable device may enable the user to access thesecurable device after being rented by the user via the kiosk. The usermay be enabled by the kiosk to purchase goods or services in addition torental of the securable device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an apparatus embodiment of the invention.

FIG. 2 illustrates an example of a high level component architectureusable in an embodiment of the invention.

FIG. 3 illustrates an example of a high level software architectureusable in an embodiment of the invention.

FIG. 4 is a flow chart illustrating steps performed in connection withan embodiment of the invention.

FIGS. 5-8 illustrate examples of a user interface suitable for anembodiment of the invention.

DETAILED DESCRIPTION OF THE DRAWINGS

The present inventors have recognized that problems and deficienciesinherent in the prior art described above may be mitigated by asecurable device such as, for example, a storage locker, adapted toaccept entry of a PIN such that the securable device permits access onlyupon entry of a unique PIN communicated to an authorized user and to thesecurable device by a remotely located kiosk, where the kiosk isoperable to transmit the unique PIN to the selected securable device,inform the user of the unique PIN, and provide the user with locationinformation of the selected securable device.

Referring now to FIG. 2, in an embodiment, one or more such kiosks 210may be networked together with any number of securable devices, such aslockers 230. Although in FIG. 2 and elsewhere in the specification anddrawings, reference is made to “Lockers” it will be understood by oneskilled in art that a securable device, as contemplated by theinventors, includes many types of devices or equipment amenable tohaving controlled access assigned to an authorized user. For example asecurable device may include a rental appliance (such as, for example, aclothes washer or dryer), a vending machine, a rental vehicle, or arecreation or entertainment device.

As illustrated in FIG. 2, any locker 230 within a facility may be rentedfrom any other kiosk 210 connected to a facility local area network 201.Furthermore, the facility local area network 201 may be communicativelycoupled to the Internet, enabling a user to go on-line to rent a locker230 in advance. Being on-line also enables an operator of the system toview current rental status in-real-time and to manage functionalattributes on-line. These attributes could include pricing, messaging onthe touch screen, report generation, and any other attributes designatedby the operator.

Further, kiosk 210 may be operable as a point of sale device. In anembodiment, kiosk 210 may accept payment in the form of cash, a creditcard, a debit card and/or an RFID device. In a further embodiment, kiosk210 may be adapted to provide a user with an opportunity to procure, forexample, by rental or purchase, related goods and services. For example,in a water park setting, equipment (such as tubes and other devices thatare used in water rides) could be rented by the guest. At a ski resort,lift tickets, ski lessons and/or ski equipment may be offered. Kiosk 210may include a printer capable of printing a proof of purchase receiptthat includes information on the goods and services purchased. In anembodiment, a bar code may be printed on the receipt that may then beelectronically scanned when the receipt is redeemed for the goods andservices purchased. Electronically scanning the receipt at redemptionprovides further opportunity for the system to automate and trackutilization.

A securable device, such as a locker 230 may be secured by way of anindividual electronic lock unit and be communicatively coupled to kiosk210. The securable device may function in a networked mode, under commoncontrol of, for example kiosk 210, or in a stand-alone mode that mayadvantageously be adapted in the event of a power or network failure.Each securable device (and/or its individual lock unit) may have thecapability, after receiving an authorized user's unique PIN from kiosk210, to accept entry of a PIN, and permit access only upon entry of theunique PIN. Advantageously, this capability may be operable irrespectiveof whether the securable device remains communicatively coupled to kiosk210. For example, the securable device is advantageously adapted tostore one or more current user PIN's in such a manner that a network orpower failure will not interfere with the user's ability to access thesecurable device.

Referring now to FIG. 1, the securable device may provide a userinterface such as a touch pad 101 or the like to input a PIN and an “endrental” button 102 that enables the user to end the rental as part ofthe process of using the individual locker 230. When used, this featuremay clear the individual locker 230 for re-rental to a new user. In anembodiment, the user interface may provide means to output informationor messages to the user by way, for example, of one or more indicatorlights, a message screen or an audio message indicator.

Access to securable devices by the system operator may be provided, forexample by way of a “master code”. Such a master code may enable systemoperator employees such as on-site attendants to access individuallockers in the event the guest has forgotten his user code.Advantageously, for security reasons, a fresh master code may beregenerated on a daily basis. Similarly, “maintenance codes” that may beused by on-site attendants for opening a group or all lockerssimultaneously for cleaning at the end of the day may be generated dailyor on any other periodic basis.

In an embodiment, each individual securable device may have the abilityto retain, after receiving a currently active unique PIN code from kiosk210, an audit trail of use for that individual locker and the ability toidentify which type of code that was used to access a particular locker.

In an embodiment, each touchpad 101 may comprise an intelligentelectronic keypad and electronic interconnect capable of being pluggedinto a local area network. Electrical and mechanical interfaces to anynumber of securable devices may be provided by a common frame or “rack”assembly. This assembly may interface with and provide power to both theelectronic key pad and the lock mechanism, enabling a locker unit to beopened once a correct PIN code has been entered. In an embodiment, uponentry of the correct PIN, at the individual locker unit, the electronickeypad assembly provides power to the lock mechanism, enabling thesecurable device to be accessed by the user or attendant.

In an embodiment, entry of the correct PIN enables operation of amechanical actuator 103 (including, for example, a lever, knob, or pushbutton) to disengage the lock mechanism and to open the locker door.Mechanical actuator 103 may, for example, be located on a stationarylocker frame or mounted on a locker door. Advantageously, a user'smanual operation of mechanical actuator 103 may provide a portion or allof the force and power needed to disengage or engage a lock mechanism(such as a bolt, for example) thereby minimizing the need to utilizesolenoids and motors to move the lock mechanism. The inventors havefound that these conventional electrical devices have poor reliability,particularly when deployed in a locker environment associated with, forexample, a ski area or theme park where there are extreme temperatures,water contamination and other challenging conditions including frequentand aggressive use.

Referring now to FIG. 2, it is illustrated how kiosk 210 may becommunicatively coupled by local area network (LAN) 201 to a number oflockers 230 and to at least one virtual server 205. Advantageously,server 205 may be virtual server operating on existing processing meanswithin kiosk 210. In an embodiment, LAN 201 may be a wireless LAN.Advantageously, a group of lockers 230 (a “locker bank” 203) may beconnected to LAN 201 by way of a serial data bus 207.

Referring to FIG. 3, a software architecture adapted for use with asystem embodiment may include several kiosks 210. Virtual server 205(which, in an embodiment, may be a kiosk 210 assigned certain additionaltasks and having certain capabilities not ordinarily required by everykiosk 210) may include system controller 301, and locker supervisor 303.Virtual server 205 may be communicatively coupled to any number ofclient kiosks 210, which may be under the supervision of systemcontroller 301. Advantageously, persistent storage 305 provides acentral location to collect and store, for example, transaction datagenerated by the various client kiosks 210.

Each kiosk 210 may be provided with an embedded browser 311 that mayprovide a user interface and is adapted to execute one or more kioskapplications 312. Kiosk applications 312 may include, for example, anapplication to conduct a locker rental transaction, to rent or sellrelated items, and to provide administration functions such as reportsof transactions, locker usage statistics and the like. Embedded browser311 may be adapted to conduct a rental or other transaction whereby theuser remits payment by way of a bank (debit or credit) card processed bycard service module 315, or by a cash payment processed by bill servicemodule 313. Transactions paid by bank card may be verified and settledby way of payment service module 317 which may be communicativelycoupled via a payment gateway to a third party transaction settlementservice as is known in the art. Print service module 319 may interfacewith embedded browser 311 and a receipt printer to provide printed proofof sale receipts. Thus, the kiosk 210 may be operable as a free standingelectronic funds transfer point of sale (EFT POS) device.

Advantageously, kiosk 210 may have a display screen providing agraphical, touch screen user interface using methods known in the art.For example, kiosk 210 may provide a screen display such as thatillustrated in FIG. 5, providing a user with options for various sizelockers. Once a transaction is selected by the user, the user may bepresented with a screen display such as that illustrated in FIG. 6,providing the user with an itemized list of costs, a total cost, andpayment options. In an embodiment, the user is permitted to select hisor her own PIN for use in connection with a rental. This PIN is thenassociated with a selected locker by kiosk 210. Where the PIN isselected by the user, the user may advantageously be presented with ascreen display such as that illustrated in FIG. 7, by which the user maybe enabled to enter the desired PIN on display of a key pad similar tothe physical keypad located at each locker or other securable device.

In an embodiment, kiosk 210 may be operable to interface with a systemoperator or administrator. Accordingly kiosk 210, in response, forexample, to entry of an appropriate management code or key, may beadapted to provide a screen display such as that illustrated in FIG. 8,whereby an administrator or other authorized agent of the systemoperator may obtain access to one or to a block of lockers and/or mayproduce certain administrative reports such as sales records, usagerates, trouble reports, and the like.

Referring now to FIG. 4, a series of potential interactions between auser and the kiosk are illustrated. At step 401, for example, the kioskmay present the user with a “welcome screen” or the like, and provide auser having an existing account to so indicate. If the user does nothave an account, the kiosk may, at step 403, provide an opportunity forthe user to open an account. If the user declines, step 405, the userwill next be presented with an opportunity to select or be assigned alocker, as discussed further below. If the user accepts the opportunity,step 407, to open an account, the kiosk may present the user, step 407,with a registration site at which the user may enter personal andfinancial information, for example. When the user has an existingaccount and enters a personal code, step 411, or successfully registers,step 409, the user may be presented with the decision, step 413 whetherto use that personal code as a PIN, step 415, for subsequent lockeraccess, or to request, step 417, a new PIN.

Locker selection may occur as illustrated in step 419. In an embodiment,a user is given an opportunity to select a specific locker by, forexample, location. In another embodiment, the user is permitted tospecify, for example, the locker size and/or other general parametersregarding the locker (e.g., its general location within a venue) but thespecific locker number assignment is made by the system. Advantageously,locker assignments may be selected by the system and the selectiondetermined, for example, based on actual assignment of other securabledevices, projected assignment of other securable devices, and/orreserved assignment of other securable devices. Thereby, for example,overcrowding caused by a number of users simultaneously accessingadjacent lockers may be minimized.

Next, the user may be provided the opportunity to select, step 421, aduration for the rental, after which the user may be provided, step 423,with one or more payment options. Because the kiosk may operate as anEFT POS, electronic payment means may be subject to a conventionalapproval process, step 425. In the event of a disapproved electronictransaction, step 427, the user may be given the opportunity to providean alternate payment means, or to cancel the transaction, step 429. Uponacceptance of payment, a locker access code (unique PIN) will begenerated, step 431. In an embodiment, the unique PIN is specified bythe user. Alternately, the unique PIN may be randomly generated at thekiosk. In either case, the unique PIN is transmitted to the selectedlocker, and the user is informed of the unique PIN.

In an embodiment, at least some receipts may be imprinted with a barcode or the like and serve as coupons for merchandise or services to befulfilled at another location. For example, the kiosk may be operable toaccept payment for rental of recreation equipment appropriate to thevenue. In such case the user, having paid for the rental, may beprovided by the kiosk with a bar coded receipt which may be presentedfor fulfillment, for example, at an appropriate, separate location(where the equipment is normally stored and vended, for example).

Various specifications could apply to a locker system as describedabove. These specifications could include information about thefunctional characteristics of the system; the physical characteristicsof the system; the power requirements of the system; the cablingnecessary to interconnect all aspects of the lockers, kiosks, andcontrollers (along with any other components); and the softwarecontained within the system.

Those of skill in the art would understand that information and signalsmay be represented using any of a variety of different technologies andtechniques. For example, data, instructions, commands, information,signals, bits, symbols, and chips that may be referenced throughout theabove description may be represented by voltages, currents,electromagnetic waves, magnetic fields or particles, optical fields orparticles, or any combination thereof.

The various logical blocks and algorithm steps described herein may beimplemented as hardware, software, or combinations of both. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. The described functionality may be implemented in varying waysfor each particular application, but such implementation decisionsshould not be interpreted as causing a departure from the scope of thepresent invention.

The various illustrative logical blocks, modules, and circuits describedin connection with the embodiments disclosed herein may be implementedor performed with a general purpose processor, a digital signalprocessor (DSP), an application specific integrated circuit (ASIC), afield programmable gate array (FPGA) or other programmable logic device,discrete gate or transistor logic, discrete hardware components, or anycombination thereof designed to perform the functions described herein.

Methods described in connection with the embodiments disclosed hereinmay be embodied directly in hardware, in a software module executed by aprocessor, or in a combination of the two. A software module couldreside in any form of storage medium known in the art, including,without limitation, RAM, ROM, or flash memory, a CD-ROM, a removabledisk, or otherwise. In the alternative, the storage medium may beintegral to the processor. The processor and the storage medium mayreside in an ASIC. In the alternative, the processor and the storagemedium may reside as discrete components in a user terminal.

The previous description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the principles and novelfeatures disclosed herein.

The previous description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the principles and novelfeatures disclosed herein.

What is claimed is:
 1. A system for assigning controlled access to asecurable device, said system comprising: a kiosk configured to enable auser to rent a securable device from among a plurality of securabledevices; and a lock unit associated with the securable device and beingin communication with said kiosk, said lock unit further beingconfigured to enable the user to access the securable device after beingrented by the user via said kiosk, said kiosk further being configuredto enable the user to purchase goods or services in addition to rentalof the securable device.
 2. The system according to claim 1, whereinsaid kiosk, in enabling the user to purchase goods and services, isconfigured as an Electronic Funds Transfer Point of Sale (EFT POS). 3.The system according to claim 1, wherein said kiosk includes a printerto print a receipt of a purchase of the goods or services.
 4. The systemaccording to claim 1, further comprising a second kiosk configured toenable a user (i) to rent a second securable device from among theplurality of securable devices and (ii) to purchase goods or services inaddition to rental of the second securable device.
 5. The systemaccording to claim 4, wherein said second kiosk operates in parallelcommunication with said kiosk and is in communication with said kiosk,said second kiosk communicating information indicative of the secondsecurable device being rented via said second kiosk, thereby informingsaid kiosk that the second securable device is rented to prevent saidkiosk from simultaneously renting the second securable device.
 6. Thesystem according to claim 1, wherein said lock unit is configured toreceive a PIN from said kiosk, said lock unit further being configuredto enable the user to access the securable device in response to theuser entering the PIN into said lock unit without further communicationwith said kiosk.
 7. The system according to claim 1, wherein housings ofsaid kiosk and the plurality of securable devices are physicallyseparate from one another.
 8. The system according to claim 1, whereinsaid kiosk further includes means for accepting payment for the goods orservices.
 9. The system according to claim 1, wherein said kiosk isfurther configured to accept an alternative form of payment in the eventthat a first form of payment for rental of the securable device orpurchase of goods or services is rejected.
 10. The system according toclaim 1, wherein said kiosk is further configured to produce anadministrative report inclusive of rentals of securable devices andsales of goods or services.
 11. A method for assigning controlled accessto a securable device, said method comprising: enabling, via a kiosk, auser to rent a securable device from among a plurality of securabledevices; enabling, by a lock unit associated with the securable device,the user to access the securable device after being rented by the uservia the kiosk; and enabling, by the kiosk, the user to purchase goods orservices in addition to rental of the securable device.
 12. The methodaccording to claim 11, further comprising configuring the kiosk as anElectronic Funds Transfer Point of Sale (EFT POS) to enable the user topurchase goods and services.
 13. The method according to claim 11,further comprising including a printer with the kiosk to print a receiptof a purchase of the goods or services.
 14. The method according toclaim 11, further comprising including a second kiosk configured toenable a user (i) to rent a second securable device from among theplurality of securable devices and (ii) to purchase goods or services inaddition to rental of the securable device.
 15. The method according toclaim 14, further comprising: operating the second kiosk in parallelcommunication with the kiosk and being in communication with the kiosk;and communicating, by the second kiosk to the kiosk, informationindicative of the second securable device being rented via the secondkiosk, thereby informing the kiosk that the second securable device isrented to prevent the kiosk from simultaneously renting the secondsecurable device.
 16. The method according to claim 11, furthercomprising: receiving a PIN, by the lock unit, from the kiosk; andenabling the user, by the lock unit, to access the securable device inresponse to the user entering the PIN into the lock unit without furthercommunication with the kiosk.
 17. The method according to claim 11,further comprising positioning the kiosk and the plurality of securabledevices separate from one another.
 18. The method according to claim 11,further comprising accepting payment, by the kiosk, for the goods orservices.
 19. The method according to claim 11, further comprisingaccepting an alternative form of payment in response to a first form ofpayment for rental of the securable device or payment for the goods orservices being rejected.
 20. The method according to claim 11, furthercomprising producing, by the kiosk, an administrative report inclusiveof rentals of securable devices and sales of goods or services.