Service kiosk access

ABSTRACT

Examples associated with service kiosk access are described. One example includes a non-transitory computer-readable medium storing processor executable instructions that, when executed, control a processor to detect a specified condition resolvable by in-person service at a service kiosk that includes a set of compartments. Each compartment is adapted to store an electronic device in a manner that provides a data connection to the electronic device while restricting communications involving the electronic device to the data connection. The instructions further control the processor to generate a request for technician support responsive to detecting the specified condition. The instructions further control the processor to authenticate that a technician is physically present at the service kiosk. The instructions further control the processor to grant physical access to compartments associated with the specified condition.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/481,350, filed on Jul. 26, 2019, which claims priority toInternational Application No. PCT/US2018/030290, filed on Apr. 30, 2018,the disclosure of each being incorporated herein by reference in theirentireties.

BACKGROUND

Computing devices today have become a fundamental part of the way welive and work, as well as smaller and more mobile. Individuals, forexample, use computers and mobile devices for entertainment,communication, shopping, and so forth. Further, businesses often providecomputers for their employees so that the employees can efficientlycarry out their duties across a wide variety of functions. While somebusinesses take on ownership and maintenance of devices provided totheir users, other companies may opt to offload certain informationtechnology costs using a variety of techniques. For example, somecompanies may rely on a device-as-a-service (DAAS) offering. A DAASoffering may involve periodic payments to a device provider in exchangefor user devices and service guarantees for the hardware, software, andso forth, of the devices.

BRIEF DESCRIPTION OF THE DRAWINGS

The present application may be more fully appreciated in connection withthe following detailed description taken in conjunction with theaccompanying drawings.

FIG. 1 illustrates an example service kiosk associated with servicekiosk access.

FIG. 2 illustrates a flowchart of example operations associated withservice kiosk access.

FIG. 3 illustrates another service kiosk associated with service kioskaccess.

FIG. 4 illustrates an example computing device in which example systems,and methods, and equivalents, may operate.

DETAILED DESCRIPTION

Examples associated with service kiosk access are described. As will bemore fully described herein, a service kiosk is an apparatus that ismeant to store a set of devices for supporting a device-as-a-servicemodel. The service kiosk includes a set of compartments each fitted withconnectors to provide a connection between a device stored within thecompartment and various control modules embedded in the service kiosk.The service kiosk may be physically installed in a location accessibleto employees of a company relying on a device-as-a-service model toprovide electronic devices to its employees. When service eventsassociated with devices occur, the employees may visit the kiosk to havetheir device repaired by the kiosk and/or replaced by backup devicesstored in the kiosk. This may increase the uptime of devices assigned tothe employees. The backup devices may also reduce support costsassociated with sending out technicians to provide support as a devicefailure can be at least temporarily mitigated by replacing the faileddevice with a new device in the kiosk, until eventually, a techniciancan be sent out to efficiently service or replace many devices stored inthe kiosk in a single visit.

This description covers the process by which the contents of a kiosk maybe monitored for the purposes of determining when to send out atechnician to perform in-person service on the kiosk itself, devicesstored in the kiosk, and/or to adjust the number or types of devices inthe kiosk. Over time, depending on a variety of factors related to abusiness in which the service kiosk is embedded, the kiosk may becomeempty as new employees join the business, full as employees leave thebusiness, and so forth. Similarly, devices may benefit from in personservice or replacement as a result of devices in the service kiosk beingused to replace devices in use by the business that have encountered ahardware or other failure. Consequently, when a condition is met thatindicates desirability of an in person visit by a technician to servicethe kiosk, a message may be transmitted (e.g., from the kiosk) toschedule such a visit. When the technician arrives, the technician maybe authenticated by the service kiosk, and then granted physical accessto compartments of the service kiosk storing devices to be removedand/or repaired, as well as compartments of the service kiosk thatshould have a new device added in the case that the service kiosk waslow on devices. The service kiosk may guide the technician through theprocess through an interface on the kiosk, such as a display thatdescribes what action to take with respect to individual compartmentsand the device(s) therein, as well as, for example, indicators onindividual compartments themselves.

It is appreciated that, in the following description, numerous specificdetails are set forth to provide a thorough understanding of theexamples. However, it is appreciated that the examples may be practicedwithout limitation to these specific details. In other instances,methods and structures may not be described in detail to avoidunnecessarily obscuring the description of the examples. Also, theexamples may be used in combination with each other.

“Module,” as used herein, includes but is not limited to hardware,firmware, software stored on a computer-readable medium or in executionon a machine, and/or combinations of each to perform a function(s) or anaction(s), and/or to cause a function or action from another module,method, and/or system. A module may include a software controlledmicroprocessor, a discrete module, an analog circuit, a digital circuit,a programmed module device, a memory device containing instructions, andso on. Modules may include gates, combinations of gates, or othercircuit components. Where multiple logical modules are described, it maybe possible to incorporate the multiple logical modules into onephysical module. Similarly, where a single logical module is described,it may be possible to distribute that single logical module betweenmultiple physical modules.

As used herein a service kiosk is intended to broadly describe acategory of apparatuses used to securely store electronic devices in amanner that allows the devices to be configured while stored in theservice kiosk. The service kiosk may have one or more compartmentshaving data and/or power connectors. Devices that are attached to thedata connectors may be configured either directly by the service kioskor remotely by a remote service. Depending on where the devices are intheir life cycle, the configuration may include setting up a device fora new user, modifying the device on behalf of a current user (e.g.,reconfiguring the device, repairing the device), deprovisioning adevice, and so forth. The service kiosk may also include an interfacefor communicating with and/or authenticating users. Once authenticated,the service kiosk may grant the user access to devices and orcompartments to allow the user to perform a task related to a deviceassigned to the user. The task may involve obtaining a device from thekiosk, storing a device in the kiosk, and so forth. In various examples,the service kiosk may resemble, for example, a vending machine, a set oflockers, a chest of drawers, and so forth. Various structural componentsof a service kiosk may be made from wood, metal, plastic, or othersuitable materials. The service kiosk may include structural elementssuch as legs, supports, wall fasteners, and so forth.

Consequently, the service kiosk may facilitate fulfilling serviceguarantees of a device-as-a-service (DAAS) offering. In a DAAS offering,a user or business may periodically pay a device provider for a deviceand a promise to service the device in the event the device fails. Theservice guarantee may include a variety of terms and in various examplesmay cover firmware, software, hardware, device data, user data, periodiclifecycle upgrades, and so forth. In this example, ownership of thedevice may remain with the device provider. In the event of a failure ofthe device or some other technical issue related to the device, aservice kiosk stationed in a location accessible to the user may allowthe device provider to more easily provide technical support for thedevice, up to and including replacing the device with a working device.For businesses that are relying on several devices at any given time, itmay be cost effective for the business to have an on-site service kioskto be able to quickly provision a new device for a new user, deprovisiona device when that device's user leaves the business, and so forth, inaddition to the technical support features that may be facilitated bythe service kiosk itself. Eventually, when it is determined that thestate of the devices in the service kiosk make it likely the servicekiosk will begin failing to fulfil the service guarantee to the business(e.g., because the service kiosk is full, empty, has a number of devicesin need of repair, or a combination of factors) a technician may becalled to service the kiosk and/or devices stored within. This may beless expensive to the business and/or the device provider than having atechnician on site, or having a technician called to service eachmalfunctioning device.

FIG. 1 illustrates an example service kiosk 100 associated withreceptacle isolation. Service kiosk 100 includes a set of receptacles110. While 18 receptacles are shown, in other examples, service kiosk100 may include a greater or lesser number of receptacles. Thereceptacles 110 may be adapted for storing electronic devices 199.Different receptacles may be adapted to store different types ofelectronic devices 199. Here for example, receptacles 112 may be adaptedto store a first type of device (e.g., laptops), and receptacles 114 maybe adapted to store a second type of device (e.g., cell phones). Inother examples, receptacles may be configured to store different types,models, and/or brands of laptops, phones, tablets, or other devicetypes. Receptacles 110 may be adapted to store different types ofdevices based on a variety of attributes. For example, receptacles 110for storing phones may be smaller than receptacles 110 for storinglaptops.

One receptacle 140 is illustrated in additional detail to furtherillustrate features of receptacles 110. In this example, receptacle 140is adapted for storing cellular phones 199. This may affect the size ofreceptacle 140, connectors 160 installed in receptacle 140, and soforth. Here, receptacle 140 is shown as having a universal serial bus(USB) connector 160. USB connector 160 may provide power to device 199as well a data connection between device 199 and other components ofservice kiosk 100. For laptops, receptacles 110 may use a differentconfiguration of connectors 160 for providing power and/or data to adevice 199. For example, a regional power adaptor may be used forproviding power to devices. The data connection for a laptop may beprovided using, for example, an ethernet port, a universal serial busport, or other types of ports.

It is also worth observing that in other examples, connector 160 maytake different physical forms. Here, connector 160 is illustrated as aUSB port in the rear wall of receptacle 140. This may mean that toconnect device 199 to connector 160, an appropriate cable would alsoneed to be provided. In other examples, connectors 160 may be cables orretractable cables of the appropriate type for connecting to a devicetype for which receptacle 140 is configured, a docking port of theappropriate type for connecting to a device type for which receptacle140 is configured, a wireless communication transmitter (e.g., WIFI,Bluetooth) and so forth. The different connector types may havedifferent tradeoffs. For example, a USB port as illustrated may ensurethat a device appropriate cable is provided to a user who obtains adevice from receptacle 140, but would also mean that a user inserting adevice 199 would have to bring or be provided such a cable.Alternatively, a connector that involves an installed cable or dockingport may ensure that a person inserting a device into receptacle 140would be able to insert the device without providing an additionalcable, but would mean that a user retrieving a device from receptacle140 would have to be provided an appropriate cable through analternative method.

Receptacle 140 also includes a locking mechanism 155. In this example,locking mechanism 155 is illustrated as being attached to a door 150 ofreceptacle 140. However, locking mechanism 155 may take a variety offorms and its form may depend on the form by which door 150 is designedto give access to users. Here for example, door 150 is illustrated asopening outwards, though in other examples, a sliding, rotating, orretracting door may be appropriate. Locking mechanism 155 may becontrollable by other components of service kiosk 100 to grant andrestrict access to receptacle 140. These other components and thesituations in which access to receptacle 140 may be controlled are morefully discussed below. In some examples, it may also be desirable forlocking mechanism 155 to be controllable via a physical mechanism (e.g.,a service key). This may allow receptacle 140 to be serviced by atechnician to, for example, modify the contents of receptacle 140,repair a component of receptacle 140, and so forth, even when servicekiosk 100 is unpowered.

In this example, receptacle 140 is illustrated as incorporating adigital isolator 170. Here, digital isolator 170 is illustrated as afaraday cage 170 that is built into the structure of receptacle 140.Faraday cage 170 may prevent wireless electronic signals from beingtransmitted by device 199 to devices external to receptacle 140, as wellas preventing device 199 from receiving wireless signals from devicesexternal to receptacle 140. In this example, faraday cage 140 isillustrated as being grounded 175, though in other examples, the groundmay be excluded. Other digital isolation techniques may also beemployed. For example, digital isolation may also be achieved via theport 160 providing a data connection between device 199 and othercomponents of service kiosk 100. By way of illustration service kiosk100 may implement individualized networks to prevent direct transmissionof wired signals between devices in members of the set of receptacles110. This may also prevent devices 199 from detecting whether otherdevices are connected to service kiosk 100. Digital isolation may alsoinclude signal isolation to ensure secure communication between devicesin the receptacles 110 and other components of service kiosk 100. Insome examples, digital isolation may also incorporate power isolation.

Service kiosk 100 also includes an interface 120. Interface 120 mayinclude several components. Here interface 120 includes a display 122, akeyboard 128, a keypad 126, and a radio frequency identification (RFID)scanner 124. Interface 120 may use these components to facilitatecommunicating with user interacting with service kiosk 100. Interface120 may also include additional components including for example,cameras, touch input devices, external device connectors (e.g., toprovide power and/or data to devices not in receptacles 110), and soforth. Interface 120 may also make use of lights 180 associated withindividual receptacles 110. These lights 180 may allow the interface todirect a user to a specific receptacle 110 of service kiosk 100. Forexample, when service kiosk 100 seeks to direct a user to a specificreceptacle 110, service kiosk 100 may control a light on that receptacleto turn on, blink, and so forth.

Service kiosk 100 may also include a variety of modules 130 forperforming various functions associated with service kiosk 100 and/orconfiguring devices 199 stored in compartments 110 of service kiosk 100.Modules 130 may be, for example, performed by a processor of a computerembedded in service kiosk 130. In other examples, modules 130 may act asa communication pass through for communications between a remoteinformation technology module (e.g., a device-as-a-service operation)and devices 199 stored in compartments 110 of service kiosk 100.

In various examples, the modules 130 may interact with a user viainterface 120, with devices 199 in compartments 110, with other modules130, and with remote servers and/or devices. For example, modules 130may include an authentication module. The authentication module mayreceive a credential from a user and authenticate the credential basedon authentication data associated with the user. The authentication datamay have been received from a remote information technology module. Whenthe user is successfully authenticated, the authentication module oranother module 130 of service kiosk 100 may grant the user access to oneor more receptacles 110 of service kiosk 100. The user may provide thecredential via user interface 120. The credential may be, for example, ausername and password pair that identifies the user that the user inputsvia keyboard 128. In another example, the credential may be an RFIDsignal the user provides via RFID scanner 124. In another example, theuser may authenticate themselves by attaching the mobile device 199 to adata connector of service kiosk 100. Multi-factor authentication mayalso be appropriate involving a combination of the above and/or otherauthentication techniques.

In various examples, service kiosk 100 may be selective about grantinguser access to receptacles 110. How service kiosk 100 determines whichreceptacles 110 to which a user is granted access may depend on whatfunction service kiosk 100 is performing for the user. In variousexamples, the user may be picking up a device from service kiosk 100,storing a device in service kiosk 100, having a device repaired orconfigured by service kiosk 100, diagnosing a technical issue with adevice with the help of service kiosk 100, and so forth. In theseexamples, service kiosk 100 may grant such a user access only toreceptacles associated with the task being performed by service kiosk100. The user may be granted access to these receptacles 110 by servicekiosk 100 controlling locking mechanisms 155 on the respectivereceptacles 110. In cases where the user is a technician responsible forservicing service kiosk 100, the user may be granted access to specificreceptacles, or in some cases general access to all receptacles 110.This may allow the technician to adjust the contents of the receptaclesand/or perform physical maintenance on devices stored within servicekiosk 100 or on service kiosk 100 itself.

Service kiosk 100 may also include a variety of other components 195.For example, component 195 may be a compartment storing additionalsupplies that support the purpose of service kiosk 100. By way ofillustration, component 195 may store spare parts, extra data and/orpower cables, and so forth that may be used by users interacting withservice kiosk 100. In other examples, component 195 may also store, forexample, packaging and mailing supplies for shipping devices 199 forservice. Other potential components 195 may also be contemplated.

FIG. 2 illustrates an example method 200. Method 200 may be embodied ona non-transitory processor-readable medium storing processor-executableinstructions. The instructions, when executed by a processor, may causethe processor to perform method 200. In other examples, method 200 mayexist within logic gates and/or RAM of an application specificintegrated circuit (ASIC).

Method 200 may perform various tasks associated with service kioskaccess. Method 200 includes monitoring the contents of a set ofcompartments of a service kiosk at 210. The compartments may each becapable of storing at least one electronic device in a manner thatprovides power to the electronic device and a data connection to theelectronic device.

Method 200 also includes generating a request for a technician at 220.Generating the request for the technician may occur upon reaching aspecified condition. The specified condition may relate to, for example,contents of compartments of the service kiosk, a status of the servicekiosk, a status of a content of a compartment of the service kiosk, andso forth. In some examples, the request may identify components and/ordevices that will facilitate resolving the specified condition.

Method 200 also includes authenticating the technician is physicallypresent at the service kiosk at 230. The technician may be authenticatedvia an interface of the service kiosk. The interface may include adisplay, input devices (e.g., keyboard, mouse, keypad), radio frequencyidentification readers, and so forth. The technician may beauthenticated based on a credential provided by the technician. Thecredential may include, for example, a password, a radio frequencyidentifier, a biometric, and so forth. Authenticating the user mayinclude transmitting the credential to a remote device and receiving asignal from the remote device signaling that the credential belongs tothe technician.

Method 200 also includes granting the technician physical access tocompartments of the service kiosk at 240. The compartments thetechnician is granted access to may be compartments associated with thespecified condition. For example, the specified condition may relate tothe compartments of the service kiosk reaching a predefined capacitythreshold. In this example, the technician may be granted physicalaccess to compartments to adjust the number of devices stored in thecompartments (e.g., removing devices from the compartments, addingdevices to the compartments). In another example, the specifiedcondition may relate to a quantity of devices in the compartments thathave reached a certain life cycle status. Here the technician may begranted physical access to compartments to replace out of life cycledevices.

In another example, the specified condition may relate to a quantity ofdevices that have a malfunction flagged for physical repair. In thisexample, the technician may be granted physical access to compartmentsto perform the physical repairs on the devices. The physical repairs mayinvolve for example, replacing components of devices, replacing devices,and so forth. In another example, the specified condition may relate toa quantity of devices that have been requested at a site at which thekiosk is located. The devices may have been requested by anadministrator in association with an upcoming service event. Here, thetechnician may be granted access to compartments in support offulfilling the upcoming service event.

In another example, the specified condition may relate to a physicalproperty of a component of the service kiosk itself. Here the technicianmay be granted access to the component of the service kiosk to, forexample, repair the component of the service kiosk. In another example,the specified condition may relate to a combination of factors. Thesecombined factors may indicate that current statuses of devices in theservice kiosk indicates that a likelihood of being able to fulfil aquality of service guarantee has achieved a specified threshold level.

In some examples, method 200 may also include providing the technicianinstructions on a compartment by compartment basis for resolving thespecified condition (not shown). The instructions may be provided via aninterface on the service kiosk. By way of illustration, a display on theservice kiosk may identify compartments by location and/or number, aswell as an action to take with respect to the compartments.Alternatively, lights or other indicators built into individualcompartment may be lit, flashed, or otherwise activated to indicatecompartments that the technician should access to resolve the specifiedcondition.

FIG. 3 illustrates an example service kiosk 300 associated with servicekiosk provisioning. Service kiosk 300 includes a set of receptacles 310.An example receptacle 340 is illustrated in additional detail. Eachmember of the set of receptacles 310 includes an adaptor 360. Adaptor360 may provide power to an electronic device 399, a data connectionbetween electronic device 399 and components of service kiosk 300, andso forth. Members of the set of receptacles 310 may also include alocking mechanism 355 to secure the contents of the receptacles 310(e.g., electronic device 399). In this example, locking mechanism 355 isattached to a door 350 of example receptacle 340. Here the lockingmechanism may be able to rotate in a manner that prevents door 355 fromopening.

Service kiosk 300 also includes a monitor module 330. Monitor module 330may monitor statuses of the contents of the receptacles 310. Monitormodule 330 may monitor the contents via the data connections in thereceptacles 310. When a specified condition is reached, monitor modulemay transmit a signal requesting a technician provide physical servicefor service kiosk 300. The specified condition may relate to, forexample, a status of service kiosk 300, contents of compartments 310 ofservice kiosk 300, and statuses of contents of compartments 310 ofservice kiosk 300. In some examples, the signal requesting thetechnician may specify components, devices, and so forth, that thetechnician should bring to resolve the specified condition.

Service kiosk 300 also includes an authentication module 332.Authentication module 332 may authenticate the physical presence of thetechnician based on a credential provided by the technician. When thetechnician is authenticated, authentication module 332 may provide thetechnician physical access to receptacles 310 associated with thespecified condition. Physical access may be granted using lockingmechanisms corresponding to the receptacles associated with thespecified condition.

In some examples, service kiosk 300 may include a user interface (notshown). The user interface may provide the technician instructions forresolving the specified condition on a receptacle by receptacle basis.

FIG. 4 illustrates an example computing device in which example systemsand methods, and equivalents, may operate. The example computing devicemay be a computer 400 that includes a processor 410 and a memory 420connected by a bus 430. Computer 400 includes a service kiosk accessmodule 440. Service kiosk access module 440 may perform, alone or incombination, various functions described above with reference to theexample systems, methods, and so forth. In different examples, servicekiosk access module 440 may be implemented as a non-transitorycomputer-readable medium storing processor-executable instructions, inhardware, software, firmware, an application specific integratedcircuit, and/or combinations thereof.

The instructions may also be presented to computer 400 as data 450and/or process 460 that are temporarily stored in memory 420 and thenexecuted by processor 410. The processor 410 may be a variety ofprocessors including dual microprocessor and other multi-processorarchitectures. Memory 420 may include non-volatile memory (e.g.,read-only memory, flash memory, memristor) and/or volatile memory (e.g.,random access memory). Memory 420 may also be, for example, a magneticdisk drive, a solid state disk drive, a floppy disk drive, a tape drive,a flash memory card, an optical disk, and so on. Thus, memory 420 maystore process 460 and/or data 450. Computer 400 may also be associatedwith other devices including other computers, devices, peripherals, andso forth in numerous configurations (not shown).

It is appreciated that the previous description of the disclosedexamples is provided to enable any person skilled in the art to make oruse the present disclosure. Various modifications to these examples willbe readily apparent to those skilled in the art, and the genericprinciples defined herein may be applied to other examples withoutdeparting from the spirit or scope of the disclosure. Thus, the presentdisclosure is not intended to be limited to the examples shown hereinbut is to be accorded the widest scope consistent with the principlesand novel features disclosed herein.

What is claimed is:
 1. A non-transitory computer-readable medium storingprocessor executable instructions that, when executed, control aprocessor to: detect a specified condition resolvable by in-personservice at a service kiosk that includes a set of compartments, whereineach compartment is adapted to store an electronic device in a mannerthat provides a data connection to the electronic device whilerestricting communications involving the electronic device to the dataconnection; generate a request for technician support responsive todetecting the specified condition; authenticate that a technician isphysically present at the service kiosk; and grant physical access tocompartments associated with the specified condition.
 2. Thenon-transitory computer-readable medium of claim 1, wherein theinstructions further control the processor to restrict physical accessto compartments unassociated with the specified condition.
 3. Thenon-transitory computer-readable medium of claim 1, wherein thespecified condition relates to devices that have a malfunction flaggedfor physical repair, and the instructions further control the processorto identify a compartment in the set of compartments that stores adevice having the malfunction flagged for physical repair.
 4. Thenon-transitory computer-readable medium of claim 1, wherein thespecified condition relates to devices that have reached a certain lifecycle status, and the instructions further control the processor toidentify a compartment in the set of compartments that stores a devicehaving reached the certain life cycle status.
 5. The non-transitorycomputer-readable medium of claim 1, wherein the specified conditionrelates to a physical property of a component of the service kiosk, andthe instructions further control the processor to restrict physicalaccess to devices stored in the set of compartments.
 6. Thenon-transitory computer-readable medium of claim 1, wherein theinstructions further control the processor to activate indicators ofcompartments associated with the specified condition.
 7. Thenon-transitory computer-readable medium of claim 1, wherein theinstructions further control the processor to implement individualizednetworks for devices stored in the set of compartments.
 8. Thenon-transitory computer-readable medium of claim 1, wherein theinstructions further control the processor to identify compartmentsassociated with the specified condition on a display of the servicekiosk.
 9. The non-transitory computer-readable medium of claim 1,wherein the instructions further control the processor to authenticatethat the technician is physically present at the service kiosk using acredential received at the service kiosk.
 10. The non-transitorycomputer-readable medium of claim 1, wherein the instructions furthercontrol the processor to transmit a credential to a remote device toconfirm that the credential belongs to the technician.
 11. Thenon-transitory computer-readable medium of claim 1, wherein componentsof the service kiosk exclude devices stored in the set of compartments.12. A system, comprising: a compartment adapted to store an electronicdevice, wherein the compartment includes a network adaptor to provide adata connection to the electronic device, a locking mechanism to controlphysical access to the compartment, and an isolation mechanism torestrict communications involving the electronic device to the dataconnection; a processor coupled to the compartment; and memory coupledto the processor, the memory storing instructions that upon execution bythe processor cause the processor to: generate a request for techniciansupport responsive to detecting a specified condition resolvable byin-person service; authenticate physical presence of a technician basedon a received credential; and control the locking mechanism based onassociation of the specified condition with the compartment.
 13. Thesystem of claim 12, wherein the specified condition is unassociated withthe compartment, and the instructions further cause the processor tocontrol the locking mechanism to restrict physical access to thecompartment.
 14. The system of claim 12, wherein the specified conditionis associated with the compartment, and the instructions further causethe processor to control the locking mechanism to grant physical accessto the compartment.
 15. The system of claim 12, wherein the isolationmechanism prevents the electronic device from receiving wireless signalsfrom devices external to the compartment.
 16. The system of claim 12,wherein the instructions further cause the processor to control aninterface to display information for resolving the specified condition.17. A method, comprising: detecting a specified condition resolvable byin-person service at a service kiosk that includes a compartment adaptedto store an electronic device in a manner that provides a dataconnection to the electronic device while restricting communicationsinvolving the electronic device to the data connection; generating arequest for technician support responsive to detecting the specifiedcondition; authenticating that a technician is physically present at theservice kiosk; and controlling a locking mechanism of the compartmentbased on association of the specified condition with the compartment.18. The method of claim 17, wherein the specified condition isunassociated with the compartment, and controlling the locking mechanismincludes controlling the locking mechanism to restrict physical accessto the compartment.
 19. The method of claim 17, wherein the specifiedcondition is associated with the compartment, and controlling thelocking mechanism includes controlling the locking mechanism to grantphysical access to the compartment.
 20. The method of claim 17, furthercomprising controlling an interface to display information for resolvingthe specified condition.