Locker port system for gps tracked portable securement devices

ABSTRACT

A locker bank and kiosk system that provide storage for multi-featured portable locker boxes, wherein each portable locker box includes a global position system receiver for location monitoring as well as other features. Using an app that is running on a mobile device or the kiosk, the user can identify an available or vacant locker, reserve the locker, open the locker and retrieve the portable locker box and store other items within the locker in the locker bank.

BACKGROUND

Just imagine that you have returned to your lounge chair and shadeumbrella after meandering down the beach with your kids collecting seashells. You notice your spouse is not yet back from the bar with thedrinks so you sit down to check your texts for a moment. You reach intothe bag, but no phone. You dig deeper and then reach for your pocket andrealize that your phone and your wallet are missing. You think thatsurely your spouse has them, so you sit back and wait. As your spousefinally approaches with arms full of beverages and a look of angst onher face, you are greeted with “why the heck did not you answer yourphone, I needed help carrying all this and I called you several times”.At this point your little trip to the beach begins to unravel in frontof you as you slowly realize that your spouse did not have your phone oryour wallet, and now you are frantically searching for what else may bemissing and asking others around you if they saw anyone steal yourbelongings.

Similar scenes like this happen all over the world—on beaches, in parks,at sporting events, concerts, theme parks, etc. Many such locations havepublicly available or pay-per use locker box banks that a person can useor rent to keep their items safe. However, generally these locker boxbanks are not conveniently located to where the person will be (i.e.lounging in a chair on the beach) and so, the user has to trudge backand forth between the locker box bank and his or her current location toretrieve items (i.e. to look at his or her phone to check for messages,grab an ID and cash to purchase a drink, etc.). Further, thieves knowwhere the locker box banks are located, and it makes them more of atarget. There is a need in the art for a lock box or safe that isportable, self-service and publicly accessible.

BRIEF SUMMARY

An embodiment of the present invention is directed towards a lockersystem that includes a plurality of ports for housing a plurality ofmulti-featured lock boxes. Each of the multi-featured lock boxes includea global position system receiver for location monitoring as well asother features. Using an app that is running on a mobile device, a usercan register and select an access PIN, search for vacant lock boxes,navigate to or locate a vacant lock box and enable use of the lock boxby pairing the user's mobile device with the lock box. Once paired andenabled, the app is synchronized with the paired lock box and the userselected PIN is loaded into the lock box to be used for opening (and insome embodiments locking) the lock box. The user can enter the PIN toopen the lock box, place items within the lock box, then close and lockthe lock box. When the user is done with the lock box, the user can openthe lock box by entering the PIN, remove his or her belongings, closethe lock box and unpair using the user's mobile device. The lock boxesmay be dispersed, such as sitting at their last used location or theymay be stored in a locker bank. For locker stored lock boxes, the usercan approach a locker bank that houses one more lock boxes or the usercan utilize the app to find a locker bank. The user can utilize the appto register with a vacant locker stored lock box or the user canapproach a kiosk to register with a vacant lock box. Once registered,the locker door housing the lock box may automatically open or, the usercan enter the PIN after approaching the locker bank to open the lockerdoor. Further, the locker bank may identify that the user is proximateto the locker by detecting the user's phone, using facial recognition orthe like, and then automatically open the locker door or provide someindicia to identify the locker. The user can then remove the lock boxand utilize it as described above, as well as store other items withinthe locker. Other aspects and features of the lock box and the systemusing the lock box are described in further detail in the followingdescription and figures.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

FIG. 1 is a conceptual diagram illustrating an exemplary embodiment ofthe lock box.

FIG. 2 is a functional block diagram of the components that may exist inan exemplary embodiment of a processor, processor board or controllerboard (collectively referred to as a controller) that could be used invarious embodiments of the lock box 100.

FIG. 3 is a block diagram illustrating an exemplary structure for thevarious electronic and mechanical elements that may be included in anexemplary embodiment of the lock box 100.

FIG. 4 is a flow diagram illustrating an exemplary operation of anembodiment of the lock box 100.

FIG. 5 is a conceptual illustration of a display screen of an exemplarylock box app showing the results of a lock box search.

FIG. 6 is a block diagram illustrating an exemplary environment for thedeployment and control of a fleet of lock boxes.

FIG. 7 is a conceptual diagram of a lock box user interface panel. Inthe illustrated embodiment, the display panel shows the use of a QR codefor pairing the lock box with a mobile device.

FIG. 8 is a conceptual diagram of a lock box user interface including aPIN pad entry panel or control panel.

FIG. 9 is a conceptual diagram of the interior of a single compartmentlock box.

FIG. 10 is a conceptual diagram of a lock box user interface including aBLUETOOTH button.

FIG. 11 is a conceptual diagram of a lock box including an externalspeaker.

FIG. 12 is a conceptual diagram of a lock box including an externalcharger port.

FIG. 13 is a conceptual diagram of a lock box including a solar panel.

FIG. 14 is a conceptual diagram of a lock box including charging cablesand ports for a variety of charging needs.

FIG. 15 is a conceptual diagram of a geographic area that includes adeployment of a fleet of lock boxes.

FIG. 16 is a conceptual diagram of a deployment of a locker bank andkiosk with each of the lockers being in a closed state.

FIG. 17 is illustrates a conceptual view of the front panel of anexemplary cubby hole locker 1614.

FIG. 18 is a conceptual diagram of a deployment of a locker bank andkiosk with select lockers being in an open state.

FIG. 19 is a flow diagram illustrating an exemplary method for a patronto acquire or rent a lock box from a locker bank.

DETAILED DESCRIPTION OF THE VARIOUS EMBODIMENTS

The present invention, as well as features and aspects thereof, isdirected towards providing a mobile lock box or safe, and moreparticularly, a weather tolerant totable lock box that be made publiclyaccessible to consumers at a variety of locations or venues, such as thebeach, concerts, sporting events and parks as a few non-limitingexamples.

FIG. 1 is a conceptual diagram illustrating an exemplary embodiment ofthe lock box. In the illustrated embodiment, the lock box 100 is shownas being placed on the sand at the beach or similar location. Thus, itwill be appreciated that advantageously, embodiments of the lock box canbe resistant to environmental conditions such as sand, heat, moisture,etc. The illustrated lock box 100 is shown as including a handle 102, adisplay 104, a solar panel 106 and a keypad 108. Further, theillustrated embodiment of the lock box 100 includes a speaker 110 and anaccess door 112. It should be appreciated that in some embodiments, thelock box may be purely mechanical, however, in the illustratedembodiments described herein, the lock box 100 will be described asincluding a combination of mechanical elements and electronic elementsthat include a controller board with various interfaces and/or aprocessor or multi-function processor or processor board that includesfirmware or software to facilitate the operation of the lock box 100. Itshould also be appreciated that the processor or processor board mayinclude multiple processors or processor boards depending on the designof the particular lock box.

FIG. 2 is a functional block diagram of the components that may exist inan exemplary embodiment of a processor, processor board or controllerboard (collectively referred to as a controller) that could be used invarious embodiments of the lock box 100. It will be appreciated that notall components illustrated in FIG. 2 are required in all embodiments orimplementations of the controller but, each of the components arepresented and described in conjunction with FIG. 2 to provide a completeand overall understanding of the components. Further, while some of thefunctions or features of the controller may be illustrated in variousblocks in FIG. 2, it should be appreciated that the functionality orfeatures may also be implemented across multiple components of theillustrated components. Thus, the controller illustrated in FIG. 2 isprovided to show only an example of an exemplary controller board and isnot necessarily meant to be the only configuration or to illustrate theactual production of the controller.

The controller can include a general computing platform 200 illustratedas including a processor/memory device 202/204 that may be integratedwith each other or, communicatively connected over a bus or similarinterface 206. The processor 202 can be a variety of processor typesincluding microprocessors, micro-controllers, programmable arrays,custom IC's etc., and may also include single or multiple processorswith or without accelerators or the like. The memory element of 204 mayinclude a variety of structures, including but not limited to RAM, ROM,magnetic media, optical media, bubble memory, FLASH memory, EPROM,EEPROM, etc. The processor 202, or other components in the controllermay also provide components such as a real-time clock, analog to digitalconvertors, digital to analog convertors, etc. The processor 202 is alsoillustrated as optionally interfacing to a variety of elements includinga control interface 212, a display adapter 208, an audio adapter 210,and network/device interface 214. The control interface 212 can be usedto provide an interface to external controls or elements, such assensors, actuators, GPS receiver, SPDT relays, the PSTN, BLUETOOTHtransceivers, WIFI transceivers, a cellular network, pressure actuators,step motors, a keyboard, a mouse, a pin pad, an audio activated device,as well as a variety of the many other available input and outputdevices or, another computer or processing device or the like. Thedisplay adapter 208 can be used to drive a variety of alert elements216, such as display devices including an LED display, LCD display, oneor more LEDs or other display devices. The audio adapter 210 mayinterface to and drive a speaker, or another alert element 218, such asa speaker or speaker system, buzzer, bell, etc. The audio adapter 210may also interface to an input element, such as a microphone 226. Theoptional network/interface 214 may interface to a network 220 which maybe any type of network including, but not limited to the Internet, aglobal network, a wide area network, a local area network, a wirednetwork, a wireless network or any other network type including hybrids.Through the network 220, or even directly, the controller 200 caninterface to other devices or computing platforms such as one or moreservers 222 and/or third-party systems 224. A battery or power sourceprovides power for the controller 600. The power source may include aninternal or external battery, a low voltage input, a 110v input, a solarpanel input, etc.

FIG. 3 is a block diagram illustrating an exemplary structure for thevarious electronic and mechanical elements that may be included in anexemplary embodiment of the lock box 100. In the illustrated embodiment,the controller board 300 is shown as including a processing unit 302, amemory element 304 and an interface component 312. In the illustratedembodiment, the interface component 312 can include the elements of adisplay adapter, audio adapter and general control or input/outputinterface elements. Thus, as illustrated in FIG. 3, the interfacecomponent, while shown as a single block, may include multiple physicalinterface elements that can be defined by hardware, software or acombination of both hardware and software. As such, the illustratedinterface component 312 is shown as interfacing with a GPS receiver 330,an audio amp (optionally including an alarm and/or speaker and/ormicrophone) 332, a door motor lock 334, a user input 336 and a display338.

The controller board 300 is also illustrated as interfacing to a powersource 340. The power source 340 can be used to power the controllerboard 300, charge an internal battery 342 or both. The power source 340can be any of a variety of sources, such as a 110v AC current, a 110vconversion to 5v, etc. The power source 340 may be an external battery,a solar cell or solar panel, as a few non-limiting examples.

The controller board 300 is also illustrated as interfacing to a devicecharger 350. The device charger 350 may include a variety of interfaces,such as a USB port that phone charging cables can be connected to or awireless phone charger that can be embedded in a top or side panel ofthe lock box 100 as a few non-limiting examples.

The controller board 300 is also illustrated as interfacing to a lockbox app 360. The lock box app 360 may be a downloadable app availablefrom the APP STORE or GOOGLE APP STORE, etc. Once the user downloads thelock box app to the user's mobile device and initiates the app for thefirst time, the lock box app 360 may register the user. The registrationprocess may include entering the user's name, contact information, ageverification, credit card or other payment information and other userpreferences such as a default PIN, notification selections, accesspermissions for various elements of the mobile device (i.e., locationinformation, camera function, etc.). It should be appreciated that insome embodiments, a simple remote device may be rented by a user thatdoes not own or have a mobile device. The remote device may comepreloaded with the lock box app.

The controller board 300 also includes a communication module 370. Thecommunication module 370 is used to send out signals regarding thestatus and location of the lock box 100 and to receive control andcommands from a remote system. This aspect or feature is described ingreater detail in the description of FIG. 6.

The various embodiments of the lock box 100 may include many differentfeatures, aspects and functions. FIG. 4 is a flow diagram illustratingan exemplary operation of an embodiment of the lock box 100. Initially,a user downloads the lock box app and registers with the system, such asa master server 402. During the registration session, the user may beprompted to enter profile information including but not limited to a,identification information, credit card information and a PIN. Once theuser or the user's mobile phone is registered, the user searches for avacant or available lock box 404. It should be appreciated that in someembodiments, the lock boxes 100 may be geo-located by a user desiring toutilize the lock box 100, however, in some embodiments, system may causelock boxes 100 within the vicinity of the user to simply sound an alarm,flash a light, etc. The lock boxes may initially be housed at a centraldistribution center and then obtained by a user and carried by the userto a different location. Alternatively, some or all of the lock boxesmay be deployed by the owner to strategic locations. In otherembodiments, some or all of the lock boxes may simply be left in thelocation that they were last used. Regardless of the technique used todeploy the lock boxes 100, an advantage of various embodiments of thelock box 100 is that once a user is done using the lock box 100, theuser can simply leave the lock box 100 at the location the user lastused it. As such, a subsequent user can either obtain a lock box 100from the central distribution center or find a lock box 100 that hasalready been deployed but is currently vacant or available for use. Insuch embodiments, a user may down load a lock box application (lock boxapp) to the user's mobile device, such as a smart phone, pad, notebookcomputer, etc. The user can then activate the lock box app, permit thelock box app to have access to the location of the user's device, andthen the lock box app can enter a locate mode to search for availablelock boxes 100 that are in the vicinity of the user. Thus, the lock boxapp can identify if any lock boxes 100 are available at the centraldistribution center as well as any deployed lock boxes that arecurrently vacant. Further, it should be appreciated that in someembodiments, a user can download the lock box app and enablenotifications. This advantageously will allow the user to beautomatically notified if he or she comes into a particular distancefrom an available lock box 100.

FIG. 5 is a conceptual illustration of a display screen of an exemplarylock box app showing the results of a lock box search. In theillustrated display, the user's current location 502 is presented with adiamond. The location of vacant lock boxes is illustrated with a squarebox and number indicating how many vacant lock boxes are present at aparticular location. The display may also include a message box toindicate the distance to the nearest lock box 100 and/or providedirections to the nearest lock box. Thus, at location 504, 2 vacant lockboxes are available, at location 506, 1 vacant lock box is available, atlocation 508, 1 vacant lock box is available and at location 506, 6 lockboxes are available. Further, location 6 is illustrated with a bolderbox to indicate that this is a central distribution center. Thus, theuser can follow the directions indicated on the display of device 500 totraverse to a desired lock box 100 or can travel to the centraldistribution center 506 to obtain a lock box 100 or to speak with a lockbox distributor regarding how to use the lock box or obtaininstructions. It should be understood by those of ordinary skill in theart that the display screen may include an overlay of a map with streetnames, points of reference, bathrooms, restaurants etc. such as what isavailable with GOOGLE MAPS, WAZE, etc. The lock box app may include aninterface to a mapping app such as GOOGLE MAPS and WAZE. It should alsobe appreciated that additional information about the available lockboxes can be presented on the display such as, but not limited to, thecolor, size, features, etc. of the available lock boxes.

The lock box app 360 can obtain the location of the lock boxes bydetecting signals that are transmitted by the lock box or, by accessinga master server that maintains and keeps track of the locations of eachof the lock boxes.

Returning to FIG. 4, the user can then proceed to the location of thelock box 100 to finally find the desired lock box 406. Once the lock box100 is located, the user can initiate access to the lock box. Accessingthe lock box 100 can be done in a variety of manners. In the illustratedembodiment, the lock box 100 is accessed by the user pairing his or hermobile device with the lock box 100, such as with BLUETOOTH pairing. Assuch, embodiments of the lock box 100 may include a BLUETOOTH modulethat is configured to pair with other devices. In some embodiments, thelock box may include a QR code, bar code or other insignia that the usercan scan with the camera or optical reader of the mobile device. Theinsignia may be permanently attached to the lock box 100 or it may bedisplayed on the screen of the lock box 100 and thus updated asnecessary. As a non-limiting example, if the lock box app 360 is active,once the lock box 100 detects that the user is at the lock box 100, thelock box app 360 can prompt the user to pair the mobile device with thelock box 100. In some embodiments, the lock box app 360 may activate thecamera of the mobile device and present a target window on the displayof the mobile device along with instructions telling the user to aim thecamera so that the QR code, bar code or other insignia is displayedwithin the target window. Once the QR code, etc., is visually displayedwithin the target window, the lock box app may automatically initiatepairing between the mobile device and the lock box or, prompt the userto activate a button or touch the screen to initiate the pairing.

In some embodiments, when the lock box 100 is vacant, it may be in anunlocked state. However, preferably the lock box 100 is in a lockedstate until the user pairs with the lock box100. During the pairingprocess the PIN information entered during the registration process 402is synchronized 408 with the lock box 100 (i.e., the lock box app 360communicates with the controller 300 within the lock box 100 to transmitthe PIN which is then stored within memory 304 or protected memory ofthe lock box 100). Once the synchronization is completed, the user canthen enter the PIN into the lock box 100 device to gain access to theinterior of the lock box100. It should be appreciated that selection ofthe PIN may be done on the fly rather than during registration in someembodiments. For instance, if the user is not utilizing the lock box app360, in some embodiments, the user can simply enter a PIN in accordancewith provided instructions (such as a card or sticker attached to thelock box 100). If the user is utilizing the lock box app 360, the lockbox app 360 can prompt the user to enter a PIN either by typing it intothe mobile device or through the user interface of the lock box 100. Ifthe user types the PIN into the mobile device, the lock box app 360 willinterface with the lock box 100 and program the PIN into the lock box.This can be accomplished using a wireless connection such as BLUETOOTH,cellular data or any other wireless communication technique. In someembodiments, the lock box app 360 may have a previously assigned PINthat the user has selected when registering the app and the lock box appmay automatically program the PIN into the lock box after or duringpairing the lock box 100 and mobile device. In yet other embodiments,the lock box app 360 may gain access to the PIN that the user utilizesto unlock his or her mobile device and automatically program the lockbox with that PIN.

Once the PIN is utilized to gain access to the lock box 100 (regardlessof the technique for selecting the PIN), the user can place items 412into the lock box 100. At this point, the user can close 414 the accesspanel 112 to the lock box 100. Upon detecting that the access panel 112is closed, the lock box 100 and/or the lock box app 360 can cause theprocessing unit 302 to activate the door lock motor 334 through theinterface component and cause the door lock to transition from anunlocked state to a locked state. It should be appreciated that theaccess panel 112 and the lock box 100 may include a sensor to detectwhen the access panel 112 is in the opened or closed state. Thoseskilled in the art will be aware of such sensors that can be utilizedfor this purpose.

At this point, processing unit 302 can activate the door lock motor 334through the interface component and cause the door lock to transitionfrom a locked state to an unlocked state. The door lock motor 334 drivesa locking mechanism that is used to prevent the access panel from beingopened while engaged. Those skilled in the art will be familiar with awide variety of locking mechanisms including pins that can be verticallyand/or horizontally slid into apertures or receiving element of thepanel or from the panel into apertures of the container, as non-limitingexamples.

When the user wishes to gain access to the interior of the lock box 100,the user can simply re-enter the PIN 416. Once the PIN is re-entered,the processing unit 302 can activate the door lock motor 334 through theinterface component and cause the door lock to transition from thelocked state to the unlocked state. Again, the user may enter the PINusing the interface on the lock box 100 or the mobile device if the userdid not place the mobile device into the lock box 100.

Once the access panel is unlocked and opened, the user can remove 418some or all of his or her belongings 114 from the lock box 100. If theuser is done with the lock box 100, the user can unpair the user'smobile device and the lock box 420. The user can unpair 420 the mobiledevice and the lock box through the lock box app 360. The time that themobile phone initially pairs with the lock box 100 and then unpairs canthus recorded by the lock box app 360 and can be provided to a back-endbilling system for determining how much to charge the user in a timerental scenario and/or for tracking purposes to determine the level ofutilization of lock boxes 100 for a particular demographic to helpfacilitate redistribution of the lock boxes 100 to maximize or increaseutilization.

FIG. 6 is a block diagram illustrating an exemplary environment for thedeployment and control of a fleet of lock boxes. The exemplaryenvironment illustrates the deployment of 4 lock boxes (100A-D) althoughit will be appreciated that more or fewer lock boxes 100 may be deployedin the environment but the number 4 was selected only for illustrativepurposes. Each of the lock boxes 100A-D may include one or morecommunication modules 370 as illustrated in FIG. 3. The communicationmodules may be of a variety of wireless based communication technologiesand the selected technology would be dependent upon the particularapplication. For instance, if a WIFI network footprint is available overthe entire geographic region that the lock boxes 100A-D are deployed,the communication modules may utilize WIFI technology. Similarly, if thegeographic region is limited in scope, the communication modules mayemploy BLUETOOTH technology or some other unlicensed RF spectrumtechnology. In the illustrated environment, it is assumed that thecommunication modules include cellular communication technology. Assuch, each of the communication modules in such an environment wouldinclude the ability to place and receive calls over the cellular networkor to utilize cellular data communication channels. Other embodimentsmay utilize the Internet of Things (IOT) modules or any othercommunication technology. Further, cellular micro cells may bepositioned within the geographic region to allow the communicationmodule to use a non-cellular communication technology to connect to thecellular micro cells and the cellular micro cells would then communicateover the cellular network.

In the illustrated environment, the lock boxes 100A-D can engage inbi-directional communication with a mobile station 610. The mobilestation 610 is then connected through a network, such as atelecommunications network or the public switched telephone network(“PSTN”) 630 to a master server 600. A mobile device 620 is alsocommunicatively coupled to the master server 600, the mobile station 610and optionally, each of the lock boxes 100A-D through thetelecommunications network 630. Although only one mobile device 620 isillustrated, it will be appreciated that the environment would supportmultiple mobile devices.

In operation, each of the lock boxes 100A-D would be provisioned by acommunications service provider and registered with the master server600. As a non-limiting example, the registration process may includecausing a lock box 100 to initiate communication with the master server600 through the mobile station 610 and the telecommunications network630. For instance, the lock box 100 may place a call or send an SMSmessage to a phone number associated with the master server 600. Thecommunication to the master server 600 may include a unique ID assignedto the lock box100, a status of the lock box (such as locked, unlocked,opened, closed, reserved, battery power level, location, etc.). Onceregistered, the master server 600 can enable the lock box 100 foroperation. It should be understood that the registration may also beinitiated by the master server 600 in some embodiments. In such anembodiment, the master server 600 can initiate communication with aparticular lock box of the lock boxes 100A-D using a phone numberassigned to a particular lock box. In either case, it should beappreciated that the master server 600 and the lock boxes 100A-D caninitiate, receive and engage in bi-directional communication with eachother. In some embodiments, only uni-directional communication may beused.

The master server 600 can maintain a list and status of each of the lockboxes 100A-D and to which operator or owner the lock box 100 isassigned. In addition, the master server 600 can send an announcementmessage to one or more of the lock boxes100. Upon receipt of anannouncement message from the master server 600, the controller 300within a lock box 100 can display the announcement or sound theannouncement over the speaker or both. For instance, the master server600 can send a message to alert users that severe weather isapproaching, or that all lock boxes need to be returned to centraldistribution, or that a particular lock box needs to be recharged, orthat a lock box alarm is being sounded indicating that one of the lockboxes in the vicinity is being moved so the other users can look for theculprit, etc.

The mobile device 620, running a lock box app 360, may initiatecommunication with the master server 600, such as requesting a lock boxlocator function to identify the location of one or more lock boxes inthe vicinity of the mobile device 620.

Having described the general operation of an exemplary embodiment of thelock box 100, additional features and functionality can be betterunderstood. It should be appreciated that any particular embodiment ofthe lock box may include each of the previously described features ormay omit one or more of the previously described features. Likewise, anyparticular embodiment may also include or omit any of the additionalfeatures and functions that are described in the next sections.

System Manager App—It should be appreciated that as users access and usethe lock boxes 100, that the lock boxes 100 may be spread out over ageographical area. If the lock box operator (which may include an owner,a franchisee, etc.) wishes to collect the lock boxes 100 at the end of aperiod of time (such as the end of the day), locate the lock boxes 100,verify operation of the lock boxes 100, determine the current state ofthe lock boxes 100, sound an alarm for the lock box 100, etc., the ownermay require capabilities that are not included in the lock box app 360.Thus, the owner may have access to a system manager app, which could bea stand-alone downloadable app or, may be implemented as additionalfeatures within the standard lock box app 360 that can only be accessedor are enabled only for an owner. In the latter example, a special loginor access code may be used to access the additional capabilities. Forinstance, the lock box app 360 only presents the location of vacant lockboxes 100 to a normal user. However, the owner may want to know thelocation of all of his or her lock boxes 100 regardless as to if theboxes 100 are vacant or occupied. The system manager app can thuspresent the location and the state of each of the owners' lock boxes. Inaddition, a geographical region may include lock boxes that belong todifferent owners. The lock box app 360 may display all of the local andavailable lock boxes, whereas the owner may only want to see thelocation of his or her lock boxes. As such, the system manager app mayinclude a filter that only displays lock boxes that belong to the owner.This can be accomplished in several manners, including assigning aunique ID code to each lock box 100 and having the unique ID'sassociated with a particular owner. In addition, the master server 600may keep track of all of the lock boxes that have been deployed or putinto commerce and the system manager app may access the master server toobtain information about the lock boxes that are assigned or associatedwith that particular owner.

Geo-fencing and Alarm—Exemplary lock boxes 100 may be equipped with aGPS receiver 330 to identify the current location of the lock box 100.Because the lock boxes 100 are mobile, it is advantageous to determineif a lock box 100 is being moved (such as being accidentally taken byanother use or actually being stolen. Each lock box 100 may include thedefinition of a geographic zone or geo-fence in which the lock box 100is allowed to reside. Thus, the controller 300 can identify a currentlocation and store that as an anchor point. For example, the anchorpoint can be set at the time that the mobile device 620 is paired withthe lock box 100, when the lock box 100 is closed and locked or someother triggering event. If the lock box 100 is moved, the controller 300can identify the current location and determine if it is the same ordifferent as the anchor point. If the current location is different fromthe anchor point, then the controller 300 knows that the lock box 100has been moved or is being moved. If the lock box 100 is beingtransported near or across the boundary of this geo-fence, the lock box100 can sound an alarm. The intelligence for the geo-fence may residecompletely within the lock box 100 or may be implemented within themaster server 600. It should be appreciated that a vacant lock box 100may have a wider geo-fence area than a lock box 100 that is in use(i.e., is safe keeping a user's valuables). As such, one geo-fencedefinition may apply if the lock box 100 is vacant and another geo-fencedefinition may apply if the lock box 100 is in use. A threshold ormultiple thresholds may be defined regarding the alarming for a lock box100. For instance, a warning threshold may be set to sound an alarm ifthe lock box 100 is moved from the anchor point to a location exceedingthe warning threshold. As an example, crossing the warning threshold maycause the lock box to pronounce a warning message such as “you havemoved the lock box too far, if you continue authorities will benotified”. An alarm threshold may be set to be higher than the warningthreshold. If the alarm threshold is exceeded, the lock box 100 mayautomatically send an alarm to the master server and/or sound a loud,highly noticeable alarm sound designed to draw attention and/or causemessages or alarms to be sent to other lock boxes 100 within thevicinity so that other users can be on the lookout. This may alsoinclude an audible message such as “this lock box is being stolen,return it immediately to the previous location”. It should beappreciated that the lock box 100 and/or the master server 600 may alsoinitiate a communication with law enforcement that a lock box 100 isbeing stolen and provide continuous location updates of the lock box100. It should also be appreciated that rather than an audible alarm,the lock box 100 may sound a silent alarm by notifying the masterserver, owner or authorities. Advantageously, this feature in anexemplary lock box 100 would not put a potential thief on notice that heor she was being pursued. The GPS elements should account for GPS drift.In addition, the lock box 100 may be enabled to sound an alert or alarmunder other conditions, such as the lock box 100 is tipped over or isbeing overcome by environmental elements, needs charging, needs to bereturned, etc.

Other Alarm/Safety Features.

Strobe Alarm. The lock box 100 may also include an external strobe lightthat can be used to indicate an alarm condition. As such, if an alarmcondition is triggered, in addition to, or in lieu of an audible alarm,the strobe light can be used to indicate that the box is being stolen.This feature may also be useful for identifying the location of the lockbox 100 for a user seeking a vacant lock box or for authorities orowners to track down a thief.

Open Box Alarm. If the lock box 100 is opened and remains open, this maybe a condition that needs to invoke an alarm. For instance, if the userputs his or her valuables into the lock box 100 but forgets to close thelock box 100 or does not close the access panel 112 all the way, thelock box 100 can alert the user by sounding an alarm or reciting amessage such as “don't forget to close and lock the access panel”. Thisfeature can be implemented with a threshold time and once the time iscrossed (such as 5 minutes) then the lock box 100 can sound the alarm oralert.

Automatic door shutting. In addition to a motor used to lock and unlockthe access panel 112, embodiments may include an automatic door openerand/or closer. For instance, if the lock box 100 remains open for athreshold period of time, the controller 300 may actuate the door closerto automatically close and lock the lock box 100. In addition, after auser enters the PIN, the controller 300 may actuate the door opener toautomatically open the access panel 112.

Safety Light. Some embodiments may also include a safety light that canbe activated to help the user find his or her lock box 100 or to helpthe user navigate back to the central distribution center if the userstays out after dark. The light can also be used to indicate if the lockbox 100 is open or closed. If the lock box 100 is open, the light isilluminated and if the lock box 100 is closed, the light is turned off.Some embodiments may include colored LEDs such that one color mayindicate the lock box 100 is opened and another color indicate that thelock box 100 is closed. In addition, an internal light may illuminatewhen the lock box 100 is open to facilitate seeing the contents.

Security Camera. Some embodiments of the lock box 100 may include one ormore external cameras to allow the master server 600 to monitor thelocation and activity surrounding the lock box 100. In addition, thecamera can snap a photo each time a lock box 100 is registered, opened,locked or moved beyond a threshold location.

Location Tracker. Embodiments of the lock box 100 can maintain a historyof where and when and how long the lock box 100 was in a particularlocation. This information may be stored within the memory of the lockbox 100 and extracted, and/or it can be transmitted to the master server600.

Refrigerator and/or Cooler.

In some embodiments, the lock box 100 may be constructed from aninsulating material to help keep items within the lock box 100 at theircurrent temperature. For instance, the lock box 100 may retardtemperature changes of cold items or hot items that are placed withinthe lock box 100. In addition, the lock box 100 may include a coldcompartment and a hot compartment so that the lock box 100 can houseboth cold drinks and warm food items. Other embodiments may includecompartments for beverages and/or food items and/or valuables to holdthem all separately. In other embodiments, the lock box 100 may includea heating element and/or a cooling element. Such embodiments wouldrequire a more powerful source of power and so, they may need a largersolar panel or to be plugged into a 110v AC outlet.

Mobile Device Emulator. In some embodiments of the lock box 100, thelock box 100 may interface to a mobile device 620 that is placed withinthe lock box 100 and emulate the user interface of the mobile device 620similar to a wired or wireless docking station. In such embodiments, theoperation of a mobile device 620 within the lock box100 can becompletely or partially controlled using the user interface on theexterior of the lock box 100. In such embodiments, a user can place andreceive calls and texts from the user's mobile device 620 by utilizingthe user interface, the speaker and the microphone of the lock box andthe lock box would control the operation of the mobile device. In someembodiments, the display on the lock box 100 may be configured to be thesame look and feel as the display on the mobile device 620 includingtouch screen, etc.

SIRI/ALEXA or APPLE/GOOGLE HOME Equipped. In some embodiments,

SIRI/ALEXA or APPLE/GOOGLE home capabilities may be built into the lockbox 100. Advantageously, such embodiments would allow further control ofthe lock box 100 as well as the mobile device 620 that may be storedtherein.

Forgotten PIN. It happens, a user will eventually forget what his or herPIN is and thus will not be able to access the contents of the lock box100. Some embodiments may allow the user to interact with the masterserver 600 to recover a lost PIN. For instance, the user profile mayinclude one or more challenge questions, similar to password recovery,that allows the user to interact directly with the lock box 100 or themaster server 600 to recover from a forgotten PIN. In some embodiments,once the challenge questions are correctly answered, the lock box can beopened.

Content Detection. In some embodiments, sensor can be utilized to detectif a lock box 100 has contents within it or if it is empty. This can beuseful if a user fails to unpair with the lock box 100. Thus, if thelock box 100 is locked and listed as reserved for an extended period oftime but, no items are within the lock box 100, the lock box canautomatically reset or reset under master server 600 control to a vacantstate. The sensor may include optical sensors, cameras, weight sensors,etc. as a few non-limiting examples.

FIG. 7 is a conceptual diagram of a lock box user interface panel. Inthe illustrated embodiment, the display panel shows the use of a QR codefor pairing the lock box with a mobile device.

FIG. 8 is a conceptual diagram of a lock box user interface including aPIN pad entry panel or control panel. In the illustrated embodiment, keyentries labeled 0-9 are provided for the entrance of a PIN code or othercontrols to operate the lock box 100.

FIG. 9 is a conceptual diagram of the interior of a single compartmentlock box. In the illustrated embodiment, the access panel is on the sideof the lock box 100 and it illustrated contents that have been placedwithin the lock box 100. It should be appreciated that the access panel112 may be located on the side of the lock box 100, as illustrated, onthe top of the lock box 100 (more suitable for lock boxes that can beused as a cooler), or both. In addition, the size of the panel may bereduced and/or a pull-out drawer structure could be utilized.

FIG. 10 is a conceptual diagram of a lock box user interface including aBLUETOOTH button. The BLUETOOTH button can be used to initiate pairingof a BLUETOOTH enabled device to the speaker of the lock box 100.

FIG. 11 is a conceptual diagram of a lock box including an externalspeaker. The external speaker may be of a marine grade to allow thespeaker to exist in humid and wet environments. The speaker may be usedfor any of the functions described above, such as sounding alarms ormessages, playing music, emulation of the mobile device or other uses.

FIG. 12 is a conceptual diagram of a lock box including an externalcharger port. The external charger port can be connected to a powersource for charging and/or operating the lock box 100.

FIG. 13 is a conceptual diagram of a lock box including a solar panel.The solar panel can be used to maintain charge of an internal batteryfor operation of the lock box.

FIG. 14 is a conceptual diagram of a lock box including charging cablesand ports for a variety of charging needs. The illustrated embodimentincludes ports that are located within the lock box 100 that can be usedto charge items that are placed within the lock box. It should beappreciated that one or more embodiments may also include external portsso that a user can charge a device external to the lock box 100.

FIG. 15 is a conceptual diagram of a geographic area that includes adeployment of a fleet of lock boxes. The illustrated lock boxes may bevacant or in use and a user, operating the lock box app can navigatethrough the geographic area to find and locate a vacant lock box.

While the afore-described embodiments have focused on lock boxes thatare geographically dispersed, it should be appreciated that in someembodiments, the lock boxes may be stored in locker banks that may belocated in a centralized area or a location easily accessible to patronsin the area. For instance, at a public beach, the locker bank may belocated near a wash room or changing room, bathrooms, vendor site or ata location on the beach. The locker bank may also include a kiosk thatusers can utilize to register for and check out a lock box. The lockerbank may be modular, such that lockers can easily be added or removed toaccommodate various use patterns for that location.

FIG. 16 is a conceptual diagram of a deployment of a locker bank andkiosk with each of the lockers being in a closed state. The locker bank1610 is illustrated as including 3 full-sized locker 1612A, 1612B and1612C (collectively and individually referred to as 1612), and 4 cubbyhole lockers 1614A, 1614B, 1614C and 1614D (collectively andindividually referred to as 1614). Each of the locker doors in thelocker bank 1610 are illustrated as being closed/locked. A kiosk 1650 isproximate to the locker bank 1610, although it will be appreciated thatas long as the kiosk 1650 is communicatively coupled to the locker bank1610, there is no specific distance requirement between the kiosk 1650and the locker bank 1610.

In the illustrated embodiment, the locker bank 1610 includes one or moresolar panels 1616(A-C) (collectively 1616) for receiving solar energyand converting it to charge a battery or battery bank 1618. Asillustrated, the solar panels 1616A and 1616C are in a differentorientation than solar panel 1616B to receive solar exposure atdifferent times of day. In some embodiments, the solar panels 1616 maybe manually adjustable, electronically adjustable or automaticallyadjust based on the time of day or location of the sun. Further, someembodiments may utilize a direct power source, such as an AC outlet asthe primary power source and utilize the solar converted energy andbattery stored charge for times when the AC power source is notavailable.

The locker bank 1610 also includes a communications system and a controlsystem 1620, including an antenna 1621. The communications system andcontrol system 1620 include a transceiver for receiving and transmittingsignals through antenna 1621 as well as logic circuits for controllingthe state of the lockers, and providing feedback on individual lockerdoor displays (best illustrated in FIG. 17.

FIG. 17 is illustrates a conceptual view of the front panel of anexemplary cubby hole locker 1614. The outer face of the locker door 1710includes an access handle 1712 and a display device 1714. The displaydevice may be a graphical display device, an LCD screen, an LED7-segment device, individual LEDs, a single multi-colored LED or simplya single LED. In the illustrated embodiment, the display device 1714 ofthe locker 1614 displays the word VACANT (or a similar indicia) toindicate that the locker is available to a patron. However other words,symbols or labels may also be utilized. The display can also be used toindicate that the locker is in use, unlocked, out of order, out ofservice, etc. The access handle 1712 may simply be a knob or handle, butit is anticipated that it may also be a standard dial locker combinationhandle for manual access. Each locker in the locker bank 1610 includes alock 1718. Each locker in the locker bank 1610 also includes acommunications/control box 1716. The locker communications/control box(LCB) may be mounted to the inside face of the locker door 1710 or itmay be located within an area of the locker bank 1610 andcommunicatively coupled to one or more components of the locker door,such as the display device 1714 and the lock 1718. It should beappreciated that rather than utilizing a display device for each locker,a single display device, such as an LED screen may be located on asurface of the locker bank 1610 to display the state and location ofeach locker. In addition, in some embodiments a display device may becompletely omitted. In other embodiments, the display device may bereplaced by or include a audible indicator, such as a buzzer or bell.Further, while each locker is illustrated as including the LCB 1716, allof the control and status checking of the locker bank 1610 may behandled by the single control system 1620 being either wired or wirelessinterfaced to the various locker components (i.e., display device 1714and lock 1718).

Returning to FIG. 16, the kiosk 1650 can be utilized to reserve a lockerin the locker bank 1610, check the status of a locker, identify anavailable locker, etc. The illustrated kiosk 1650 includes a displayscreen 1654, a control system 1670 with antenna 1671, one or more solarpanel 1656, one or more batteries 1668 to be charged from the solarpanels 1656, a speaker/microphone 1680, a card reader 1682 and a receiptprinter 1684. In the illustrated embodiment the display screen 1654 is atouch screen but in other embodiments a keyboard or one or more entrybuttons can be used for information input, as well as the microphone forreceiving audio input.

FIG. 18 is a conceptual diagram of a deployment of a locker bank andkiosk with select lockers being in an open state. In the illustratedembodiment, locker 1612C and 1614C have been opened, revealing a lockbox 100 that can be removed and taken to the patron's desired location.Further, the patron can insert other items into the locker, close thedoor and have those items secured as well.

FIG. 19 is a flow diagram illustrating an exemplary method for a patronto acquire or rent a lock box from a locker bank. The flow diagram issimilar to the flow diagram of FIG. 4 with a few modifications.Ultimately, a user can download and install the lock box app, althoughthis step can be performed at a later stage in the process. However,similar to FIG. 4, the lock box app is used by the patron to registerwith the system, such as a master server 600 (FIG. 6). However, in thelocker bank embodiments, the user may also or alternatively perform theregistration process using the kiosk 1650. In either case, during theregistration session, the user may be prompted to enter profileinformation including but not limited to an identification information,credit card information and a PIN. Once the user or the user's mobilephone is registered, the user can identify an available or vacant lockbox by either searching for a vacant or available lock box using themobile app and/or the user can be notified of available lock boxes onthe display of the kiosk 1650, which may display to the user the lockeridentification of an available locker and locker bank identificationwhere the available locker may be found. If the user selects a lockerbank lock box, that locker can then be reserved for the user. Thereservation may have an expiration date/time such that the user mustaccess the locker before the expiration, otherwise the reservation canbe cancelled and the locker made available to someone else. The user maybe prompted on the mobile app when the reservation is about to expireand the user can select to let the reservation expire or request anextension of time if the user is still planning on utilizing the locker.

The user can access the locker by approaching the locker bank andentering the PIN code on the user's mobile device 1906. In someembodiments the user may just be notified of the locker bank and, whenthe user approaches the locker bank, the locker bank can detect theuser's phone in proximity and then use the displays on the lockers toindicate which lockers the user can select. The user can select aparticular locker by either scanning a QR code, bar code or the like onthe locker door, actuating a button on the locker door, or selecting thelocker using the mobile app. At this point, the locker door may openproviding access to the user. For instance, if the user scans a QR codeon the locker door using the mobile app, the mobile app cancommunication with the master server 600 (which could be located in thekiosk 1610 or the locker bank 1610, and the master server 600 can causethe lock 1718 on the locker to automatically open. In some embodiments,if the user selects a locker from the kiosk 1650, the master server 600may automatically open the locker door so that as the user approachesthe locker bank, the user can identify his or her locker by noticing theopen door. Further or alternatively, the user's name or ID can bedisplayed on the display device of the locker door. As the userapproaches the locker bank 1610, the display can begin to flash, soundan alarm or use some other mechanism to attract the user's attention.

Once the user accesses the locker, the user can then pair their devicewith the lock box. It should be appreciated that this process could alsobe conducted at the kiosk 1650 and by using the kiosk. Further, itshould be appreciated that the user may actually pair with the lock boxprior to opening the locker. During the pairing process the PINinformation entered during the registration process 1902 is synchronized1908 with the lock box 100 (i.e., the lock box app 360 or the kiosk 1650communicates with the controller 300 within the lock box 100 to transmitthe PIN which is then stored within memory 304 or protected memory ofthe lock box 100). Further, the pairing process may also include pairingwith the locker as well by communicating through the controller 1620.Once the synchronization is completed, the user can then enter the PINinto the lock box 100 device, to gain access to the interior of the lockbox 100, to lock the locker 1614 and/or to gain access to the interiorof the locker. It should be appreciated that selection of the PIN may bedone on the fly rather than during registration in some embodiments. Forinstance, if the user is not utilizing the lock box app 360, in someembodiments, the user can simply enter a PIN in accordance with providedinstructions (such as a card or sticker attached to the lock box 100 orthe locker bank 1610). If the user is utilizing the lock box app 360,the lock box app 360 can prompt the user to enter a PIN 1910 either bytyping it into the mobile device or through the user interface of thelock box 100. If the user types the PIN into the mobile device, the lockbox app 360 will interface with the lock box 100 and program the PINinto the lock box and also interface to the locker bank 1610 and/orlocker 1614 and program the PIN into the controller 1620 for theselected or reserved locker. This can be accomplished using a wirelessconnection such as BLUETOOTH, cellular data or any other wirelesscommunication technique. In some embodiments, the lock box app 360 mayhave a previously assigned PIN that the user has selected whenregistering the app and the lock box app may automatically program thePIN into the lock box 100 after or during pairing the lock box 100 andmobile device and into the locker bank 1610 after or during pairing thelocker 1614 and mobile device, or by the kiosk. In yet otherembodiments, the lock box app 360 may gain access to the PIN that theuser utilizes to unlock his or her mobile device and automaticallyprogram the lock box 100 and locker 1614 with that PIN.

Once the PIN is utilized to gain access to the lock box 100 and/or thelocker 1614 (regardless of the technique for selecting the PIN), theuser can place items 1912 into the lock box 100 or locker 1614. At thispoint, the user can close 1914 the access panel 112 to the lock box 100and either leave the lock box 100 within the locker 1614 or remove thelock box 100 to take to the beach or other location. Upon detecting thatthe access panel 112 is closed, the lock box 100 and/or the lock box app360 can cause the processing unit 302 to activate the door lock motor334 through the interface component and cause the door lock totransition from an unlocked state to a locked state. The user can thenclose door to the locker 1614. Upon detecting that the locker door isclosed 1914, the controller 1620 and/or lock box app can cause thelocker door lock to transition from unlocked state to a locked state. Itshould be appreciated that the access panel 112 and the lock box 100, aswell as the locker 1614 or locker bank 1610 may include a sensor todetect when the access panel 112 or locker door respectively is in theopened or closed state. Those skilled in the art will be aware of suchsensors that can be utilized for this purpose.

At this point, processing unit 302 can activate the door lock motor 334through the interface component and cause the door lock to transitionfrom a locked state to an unlocked state. The door lock motor 334 drivesa locking mechanism that is used to prevent the access panel from beingopened while engaged. Further, controller 1620 can send signals to thelocker locking element to lock the locker. Those skilled in the art willbe familiar with a wide variety of locking mechanisms including pinsthat can be vertically and/or horizontally slid into apertures orreceiving element of the panel or from the panel into apertures of thecontainer, as non-limiting examples.

When the user wishes to gain access to the interior of the lock box 100,the user can simply re-enter the PIN 1916. Once the PIN is re-entered,the processing unit 302 can activate the door lock motor 334 through theinterface component and cause the door lock to transition from thelocked state to the unlocked state. Again, the user may enter the PINusing the interface on the lock box 100 or the mobile device if the userdid not place the mobile device into the lock box 100.

Once the access panel is unlocked and opened, the user can remove 1918some or all of his or her belongings 114 from the lock box 100. If theuser is done with the lock box 100, the user can unpair the user'smobile device and the lock box 1920. The user can unpair the mobiledevice and the lock box through the lock box app 360. The time that themobile phone initially pairs with the lock box 100 and then unpairs canthus recorded by the lock box app 360 and can be provided to a back-endbilling system for determining how much to charge the user in a timerental scenario and/or for tracking purposes to determine the level ofutilization of lock boxes 100 for a particular demographic to helpfacilitate redistribution of the lock boxes 100 to maximize or increaseutilization. The user can then simply leave the lock box 100 where itis, or the user can return it to the locker 1614, such as when the usergoes to retrieving items from the locker 1922.

In some embodiments, the locker bank may simply be a docking station forthe lock boxes. In such embodiments, rather than lockers with doors, thelocker bank may simply be a bank of open cubbies for people to utilize.Further, if the battery power depletes on the locker box, it can sound asignal to request the user to return the lock box to thecharging/docking station.

The general construction of the lock box may include a construction thatprevents obstructions, such as sand, from preventing the access panelfrom opening. For instance, a beveled edge may be used to encourage anydebris to fall out of the path of the door edge. It is also anticipatedthat some embodiments of the lock box 100 may include hermetic seals toallow the lock box 100 to be complete submerged in a liquid or preventdamage during rainstorms or thunderstorms. The material chosen for theconstruction of the lock box 100 may be selected to prevent or retardcorrosion due to salt or humidity. For instance, the interior and/orexterior of the lock box may be painted with an amortized paint or beconstructed or covered with anodized plastic. Further, the lockingmechanism and hinges of the access panel 112 may be configured such thatthey are not externally accessible, thereby preventing or retarding theability to be tampered with. Further, sensors can be utilized to detectwhen the access panel 112 is being tampered with, such as vibrationsensors, and to sound an alarm if the condition exists. The lock box 100should be constructed to be light weight and easily transported.Preferred embodiments will be less than 15 pounds, while otherembodiments may be heavier. The weight could be selected to allow thelock box to be easily transported but not so light that it can be blownover by the wind. Some embodiments may be constructed so that the lockboxes 100 can be stacked on top of each other.

The electronics of the lock box 100 and locker bank 1610 should behoused within the interior of the lock box 100 or locker bank 1610respectively, or behind an interior accessible panel to provideprotection and prevent tampering. The electronics may also beconstructed to be modular so that portions can be removed for repair orreplacement, receive upgraded electronics/software, and features can beadded by inserting additional or alternative plug and play components.In some embodiments, the features and operation of the lock box can bemodified over the air or through a connection by downloading newsoftware or configuration files. Similarly, the internal battery of thelock box should also be protected and should be accessible for removingso that the batteries can be replaced or charged externally.

The locker bank can be constructed of a wide variety of materialsincluding polyurethane or polyurethane coated material, or similarmaterial to protect the locker bank from the elements. The materialshould be selected to be rugged enough to prevent easy break in such ascutting the door open with a knife.

The locker bank may be fully modularized. This can be accomplished byutilizing a bus type system that connects to the main locker unit thathouses the controller 1620, the batteries 1618 and the input from thesolar panels 1616. Each modular component of the locker bank can then beconnected to an adjacent modular component and thus be hooked into thebus system for power, control, etc.

In some embodiments, the locker bank 1610 and/or kiosk 1650 may includeone or more cameras to monitor activity around the locker bank 1610 andor kiosk. The cameras can provide live feed through the locker bankcommunications/control subsystem 1620 for local or online storageaccessible over the Internet or a local area network. The camera feedscan be backed up to storage and archived for a period of time orperpetually. The cameras can be hidden or in the open. In someembodiments the cameras can be controlled by one or more motiondetectors and only provide feeds when motion is detected or, the camerascan run continuously. Further, in some embodiments, the cameras may runcontinuously but only provide the feed for storage when motion isdetected or plus and minus a period of time after detecting motion orlocker activity, such as a locker being opened, closed, or accessattempted. The camera subsystem may also be activated by the presence ofsounds, or digital signal processing can be performed on detected soundsto recognize voices. The locker bank may also include an alarm subsystemto detect any tampering with the locker bank or individual lockers.Activity such as multiple failed access attempts, signal processedsounds that may resemble banking or prying of the locker doors,excessive motion such as tilting or jarring of the locker bank, etc.Once suspicious activity is detected, an audible alarm can be sounded ora silent alarm can be triggered to notify authorities or operators.

In the description and claims of the present application, each of theverbs, “comprise”, “include” and “have”, and conjugates thereof, areused to indicate that the object or objects of the verb are notnecessarily a complete listing of members, components, elements, orparts of the subject or subjects of the verb.

In this application the words “unit” and “module” are usedinterchangeably. Anything designated as a unit or module may be astand-alone unit or a specialized module. A unit or a module may bemodular or have modular aspects allowing it to be easily removed andreplaced with another similar unit or module. Each unit or module may beany one of, or any combination of, software, hardware, and/or firmware.

The present invention has been described using detailed descriptions ofembodiments thereof that are provided by way of example and are notintended to limit the scope of the invention. The described embodimentscomprise different features, not all of which are required in allembodiments of the invention. Some embodiments of the present inventionutilize only some of the features or possible combinations of thefeatures. Variations of embodiments of the present invention that aredescribed and embodiments of the present invention comprising differentcombinations of features noted in the described embodiments will occurto persons of the art.

It will be appreciated by persons skilled in the art that the presentinvention is not limited by what has been particularly shown anddescribed herein above. Rather the scope of the invention is defined bythe claims that follow:

What is claimed is:
 1. A system to provide securement of valuables inpublic locations, the system comprising: a locker bank of one or morelockers, the locker bank comprising: a communications/controllersubsystem; and a solar based battery charging system; and each locker ofthe one or more lockers comprising: a display; a lockercommunications/control subsystem that is communicatively coupled to thelocker bank communications/control system; a door; a lock; and an accesshandle; a kiosk comprising: a display screen; an input device; a kioskcommunications/control subsystem that is communicatively coupled to thelocker bank communications control system, the kiosk being configuredto: provide a user interface for a user to register with the system;identify a PIN code for the user; enable the user to select a particularlocker from the locker bank; and program the locker bankcommunications/control system to recognize the PIN code to gain accessto the particular locker.
 2. The system of claim 1, wherein one or moreof the one or more locker includes a portable locker box within aninterior of the locker, each portable locker box comprising: a containerdefining at least one interior compartment and an access panel that cantransition between a closed state thereby preventing access to theinterior compartment and an open state thereby granting access to theinterior compartment; a controller mounted within the interior of thecontainer and comprising a processing unit, memory and an interfacecomponent communicatively coupled to each other; a global positioningsystem (“GPS”) receiver mounted within the interior of the container andcommunicatively coupled to the controller, wherein the GPS receiver canprovide a current location of the apparatus to the controller; a displaymounted on the exterior of the container and communicatively coupled tothe controller; a user interface mounted on the exterior of thecontainer and communicatively coupled to the controller, the userinterface configured to receive a PIN and control input from a user; alock motor, communicatively coupled to the controller and configured toactuate a locking mechanism to a first state to secure the access panelin a closed position and to a second state to allow the access panel tobe opened; a charging port for charging a mobile device; and acommunication module associated with the container and communicativelycoupled to the controller, the communication module including a wirelesstransceiver for communicating the current status of a locking mechanismand the current location to external devices.
 3. The system of claim 2,wherein the communication module includes a BLUETOOTH module, whereinthe portable locker box can be BLUETOOTH paired with a mobile device. 4.The system of claim 2, further comprising an insignia on an externalsurface of each portable locker box, wherein the insignia can be scannedby a mobile device to facilitate BLUETOOTH pairing with the mobiledevice.
 5. The system of claim 4, further comprising an insignia on anexternal surface of the locker door, wherein the insignia can be scannedby a mobile device to facilitate opening the locker door and facilitateBLUETOOTH pairing of the portable locker box within the locker with themobile device.
 6. The system of claim 1, further comprising an insigniaon an external surface of the locker door, wherein the insignia can bescanned by a mobile device to facilitate opening the locker door.
 7. Thesystem of claim 6, wherein the insignia is a QR code.
 8. The system ofclaim 6, wherein the controller is operative to determine that theportable locker box has been removed from the locker.
 9. The system ofclaim 1, wherein the locker box communications/controller subsystem isoperative to determine that the portable locker box has been removedfrom the locker and, wherein the locker bank communications/controllersubsystem can provide a status update to the kioskcommunications/controller subsystem.
 10. The system of claim 2, whereinthe locker bank communications/controller subsystem can detect when theportable locker box is returned to the locker and is unpaired from themobile device of the user and, wherein the locker bankcommunications/controller subsystem can provide a status update to thekiosk communications/controller subsystem.