Electronically-controlled locker system

ABSTRACT

An electronically-controlled locker system that utilizes distributing processing to control access to, and assignment of, a plurality of lockers in a school, workplace, fitness center, etc. The system uses a plurality of locker control units that control access to a corresponding set of lockers based on user inputs and on user/locker authorization data that is provided from a central administrator workstation. This administrator workstation communicates with a system control unit that is in communication with every locker control unit and which allows cross-communication between locker control units.

FIELD OF THE INVENTION

The invention generally relates to electronically-controlled lockers,and more particularly, to a system for remotely-controlling access to aplurality of lockers such as those found in schools, fitness clubs,employee lockers, airports, resorts, shopping malls, and lawenforcement.

BACKGROUND OF INVENTION

There are now increased security needs in schools and commercialbuildings. There is also a high degree of computer literacy amongeducators, and property managers. Furthermore, there is increasing useof ID cards, coded with intelligence for recording of activities and thetrend now is towards large school construction budgets with more fundsbeing allocated to security issues. It is now common place for newconstruction to include extensive pre-wiring for data transmissionsystems. As a result, there remains a need for an electronicallycontrolled locker system for use, especially in schools. For example,school administrators can spend up to 240 man hours setting up lockersand locks for the new school year, which does not even include the timeand effort involved in handing out and returning of padlocks,combination locker assignments and accompanying paperwork.

The following patents and patent applications relate to electroniclockers: U.S. Pat. No. 2,153,088 (J. Knell); U.S. Pat. No. 3,831,408(Featherman); U.S. Pat. No. 5,219,386 (Kletzmaier et al.); U.S. Pat. No.5,774,058 (Henry et al.); U.S. Pat. No. 6,061,316 (Glick, et al.); U.S.Patent Application No. U.S. 2001/0017507(Hara); and British PatentApplication GB 2078845 (Kindborg).

However, in view of the above, there still remains a need for anelectronically-controlled locker system that provides systemadministrators, especially school administrators, with locker managementcapabilities that are not possible with conventional locker systems thatenhance security and reduce operating costs.

SUMMARY OF THE INVENTION

An electronically-controlled locker system for use by a plurality ofauthorized users (e.g., school students, employees at a workplace,patrons at a fitness center, airport, etc.,) and managed by anadministrator. The system comprises: a first plurality of lockerswherein each locker comprises a respective electronically-activatedlock; at least one input device (e.g., a card reader, keypad, proximityreader, biometric, display and/or touch screen, etc.) for allowing theplurality of authorized users to communicate with the system; at leastone locker control unit, in communication with eachelectronically-activated lock and with the at least one input devicewherein the at least one locker control unit controls the activation ofthe electronically-activated locks; a computer, controlled by theadministrator, for maintaining a database of authorized user and lockerinformation; a system control unit, in communication with the at leastone locker control unit and with the computer, wherein the systemcontrol unit provides the at least one locker control unit with theauthorized user and locker information; and wherein the at least onelocker control unit uses data from the at least one input device and theauthorized user and locker information to provide access tocorresponding lockers for the plurality of authorized users.

A method for controlling access to a plurality of lockers for aplurality of authorized users (e.g., school students, employees at aworkplace, patrons at a fitness center, airport, etc.,) by anadministrator. The method comprises the steps of: storing andmaintaining information about the plurality of authorized users and theplurality of lockers, referred to as predetermined data, at a firstlocation; providing an electronic lock at each one of the plurality oflockers; assigning a respective locker control unit to a respectivesubset of the plurality of lockers, wherein each of the locker controlunits communicates with every electronic lock in the subset and each ofthe locker control units is located in the vicinity of a respectivesubset; coupling at least one input device to each of the locker controlunits for permitting the authorized users in that subset to requestaccess to their respective lockers; loading each of the locker controlunits with the predetermined data from the first location; controllingaccess to each of the lockers in a subset by a respective locker controlunit based on the predetermined data and the access request by theauthorized users.

An electronically-controlled locker system for use by a plurality ofauthorized users (e.g., school students, employees at a workplace,patrons at a fitness center, airport, etc.,) and managed by anadministrator. The system comprises: a first plurality of lockerswherein each locker comprises a respective electronically-activatedlock; at least one input device (e.g., a card reader, keypad, proximityreader, biometric, display and/or touch screen, etc.) for allowing theplurality of authorized users to communicate with the system; at leastone locker control unit, in communication with eachelectronically-activated lock and with the at least one input device,and wherein the at least one locker control unit controls the activationof the electronically-activated locks; a computer, controlled by theadministrator, for managing at least one database of authorized user andlocker information, and wherein the computer is in communication withthe at least one locker control unit for providing the at least onelocker control unit with the authorized user and locker information; andwherein the at least one locker control unit uses data from the at leastone input device and the authorized user and locker information toprovide access to corresponding lockers for the plurality of authorizedusers.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is block diagram of the electronically-controlled locker system(ECLS) of the present invention;

FIG. 2 is a block diagram of exemplary types of input devices that maybe coupled to each locker control unit (LCU);

FIG. 3 is a block diagram of the interface of a single LCU and depictinglocker access stations (LASs);

FIG. 4 depicts three exemplary electronic access key cards for use in aschool ECLS, a fitness center ECLS and a workplace ECLS;

FIG. 5A is a cross-sectional top view of an exemplary electronic lockmechanism that may be used for each locker in the ECLS;

FIG. 5B is a functional diagram of the single circuit used to controleach electronic lock mechanism and to detect the open/closed state ofeach locker door in the ECLS;

FIGS. 6A-6C depict exemplary single-tier, two-tier and three-tier lockerframe configurations, respectively;

FIG. 7 is a functional diagram of alternative communication mediabetween the system control unit (SCU) and the locker control units(LCUs);

FIG. 8 is a flowchart of the process for dynamically assigning lockersin an ECLS used, for example, in a fitness center;

FIG. 9 is a hardware diagram of the system control unit (SCU);

FIG. 10 is a flowchart of the system control unit (SCU) operation;

FIG. 11 is a hardware diagram of a locker control unit (LCU);

FIG. 12 is a flowchart of a locker control unit (LCU) operation;

FIGS. 13A-13B form a flowchart of system administrator computer (SAC)operation; and

FIG. 14 is an alternative electronically-controlled locker system (ECLS)that does not use a system control unit (SCU).

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now in detail to the various figures of the drawing whereinlike reference characters refer to like parts, there is shown at 20 inFIG. 1 an electronically-controlled locker system (hereinafter the“ECLS”) of the present invention. The ECLS 20 basically comprises asystem administrator computer 22 (SAC, e.g., a personal computer havingWindows-95 capability, Apple Macintosh capability, etc.), a systemcontrol unit (SCU) 24, a plurality of locker control units (LCUs) 26, aplurality of input devices (IDs) 28 that control access to anotherplurality of electronic locks 30 for respective lockers 32. Although theECLS 20 is primarily designed for use in schools, the ECLS 20 can beeasily adapted for use in other environments such as fitness clubs,employee lockers, workplaces, airports, resorts, shopping malls, lawenforcement, etc., or any environment where it is desirable to controlaccess to banks of lockers from a remote location. The ECLS 20 providesthe ability to search locker availability and to dynamically assign (seeFIG. 8) lockers, e.g., in gymnasium and health club settings.

It should be understood that the ECLS 20 allows for the use of varioustypes of IDs 28 such as card readers 128, keypads 228, proximity readers328, biometrics 428, display screens 60 (including touch screen, notshown) or any other type of individual input/output device that permitsthe individual to provide an input into, and obtain output from, theELCS 20 at the locker level and obtain access, if proper, to his/hercorresponding locker 32. Thus, as used throughout this Specification,the terminology “ID 28, ID 28A, ID 28B, ID 28C, and ID28D (see FIG. 3)”includes all of these various input/output means and is not limited toany particular one of them. Where card readers 128 are used, anddepending on the environment, FIG. 4 depicts exemplary electronic accesskey cards 129A (for use in a school ECLS 20), 129B (for use in a fitnesscenter ECLS 20) and 129C (for use in a workplace ECLS 20). Furthermore,as used throughout this Specification, the term “biometric” includes anytechnology that identifies or verifies individuals based upon anindividual's unique physical or behavioral characteristics. Devicesemploying these technologies match patterns of live individuals in realtime against pre-stored records. Examples of biometric technologies are,but are not limited to, those that recognize and authenticate faces,hands, fingers, signatures, irises, voices, fingerprints, etc. The useof RS-485 ports in the LCUs 26 support the interface of “smart” inputdevices and allow for virtually any type of input device to the LCUs 26.

In particular, the SAC 22 provides the system administrator with anon-dedicated, user interface to the ECLS 20 and maintains a database ofECLS 20 information. The SAC 22 is typically provided by the customer.The SAC 22 utilizes administrative/electronic locker software that runson the personal computer. The software running on the personal computermanages information about the lockers 32, the electronic hardware (e.g.,the SCU 24, LCUs 26), the users, passwords, locker assignments, etc.,and stores this in a database. The software that runs on the SAC 22 maybe coded using the JAVA programming language, or other programminglanguages, to provide portability to Windows, Macintosh, and Linuxoperating systems. FIGS. 13A-13B provide a flowchart of SAC 22operation. The SAC 22 communicates with the SCU 24 via a communicationsmedium, e.g., standard RS-232C serial interface. The SCU 24 is acustom-made electronic with microprocessors or micro-controllers andcommunication interfaces, e.g., RS-232 and/or RS-485 interfaces. The SCU24 device comprises firmware, specific to the operation of the ECLS 20,encoded onto chips on internal hardware boards.

The SCU 24 sends data and control information to each LCU 26. The SCU 24acts like a “master control” for the ECLS 20 and facilitatescommunication between LCUs 26 and uploads activity logs from each LCU26. In particular, the SCU 24 downloads user information to each LCU 26,provides a communication link from any ID 28 to any LCU 26 in the ECLS20, executes administrative commands throughout the ECLS 20, performsdiagnostic checks on each LCU 26 and provides system alarm monitoringcapability. Both the SCU 24 and the LCUs 26 may include respectivebattery back-up provisions (see FIGS. 9 and 11, respectively) to ensurereliable access for users even in the event of power failure. Thebattery back-up for these devices provides operation for a predeterminedperiod of time (e.g., up to four hours) with no external power. The SCU24 has small onboard batteries (e.g., battery S46; see FIG. 9) toprovide back-up of user information but does not have full functionalitywithout battery back-up.

In particular, as shown most clearly in FIG. 9, the SCU 24 accepts inputfrom the SAC 22 and distributes the information to the LCUs 26 and otherdevices. The SCU 24 comprises UART (Universal Asynchronous ReceiverTransmitter) S31 which allows an internal processor S33 input data fortransmission on different media. UART S31 is used for communications tothe LCUs 26. The processor S33 is the main component of the SCU 24.Through embedded firmware, the processor S33 handles all communicationsbetween the SAC 22 and the LCUs 26, memory access. The processor S33handles all communications between the SAC 22 and the SCU 24. Theinformation/data is then stored in memory at the SCU 24 and is sent tothe appropriate LCU 26. The processor S33 also handles the communicationbetween the SCU 24 and LCU 26. The processor in the LCU 26 then takesthe data that was sent by the SCU 24 and stores it in the LCU's 26 ownmemory. An exemplary processor is a Motorola 6809 but other processorscould be used. The SCU controller board includes a High Speed 128K CMOSRAM chip S34. This chip S34 is used for storing tenant access codes,configuration setups and other information. UART S35 allows theprocessor S33 to output data for transmission on different media and isused for communications to the SAC 22. Communications circuitry S36allows for communications on different types of media (Power Line,RS-485, Network, etc.,). This circuitry S36 interfaces between UART S35and the appropriate communications media. Communications circuitry S36is used for communications to the SAC 22. Communications circuitry S38allows for communications also on different types of media (e.g., PowerLine, RS-485, Network, etc.,). Communications circuitry S38 interfacesbetween UART S31 and the appropriate communications media and is usedfor communications to the LCUs 26. The SCU 24 controller board has anormally-opened or normally-closed relay output S39. The relay S39 israted at 10 A/28VDC or 10 A/20VAC. This relay S39 can be configured tointerface with a siren or alarm panel. In normal situations, the relayS39 is configured to energize for a specified period of time after analarm condition occurs. The SCU 24 includes supervisory hardware S40 toautomatically restart the microprocessor S33 should it encounter powerfluctuations sufficient to cause erratic operation or lock the processorS33 up but insufficient to trigger a power-on restart. The SCU 24requires a power supply connected to the ECLS 20. The power is thendistributed to appropriate places on the SCU 24 circuit board through apower input/bus. S41. In addition, the SCU 24 can have an optionalbattery backup device S43 which allows for the SCU 24 to operate in theevent of a power failure and also operates through the power input/busS41 which routes the power from the battery S43 to the appropriateplaces on the circuit board. The system controller includes a system busport, also referred to as relay expansion board S44, which allows forexpansion to other relay boards and other devices to be connecteddirectly to the SCU 24. All ECLS 20 data is stored in nonvolatile memorypowered by a lithium battery S46. In addition, the battery S46 providespower for the real time clock circuit. The SCU 24 circuit board retainsall configurations and access codes as well as keeps the ECLS 20 timecurrent for approximately thirty days. This allows the ECLS 20 to resumeoperation after an extended power outage. Although not shown, the SCU 24controller board has an onboard parallel printer output which allows fora PC-compatible printer to be connected directly to the ECLS 20; theprinter allows for the user to have a real time, hard copy record ofsite activity. FIG. 10 provides a flowchart of SCU 24 operation.

The LCUs 26 are also custom-made electronics with microprocessors ormicro-controllers and communication interfaces, e.g., RS-232 and/orRS-485 interfaces. The LCU 26 devices also comprise firmware, specificto the operation of the ECLS 20, encoded onto chips on internal hardwareboards and includes flash memory to provide back-up of user information.Each LCU 26 is hardwired to the electronic lock mechanism 30 in eachlocker 32 and consequently includes the necessary electronics to supplypower to the locks 30. The LCUs 26 also contain circuitry to determineif a locker door is open or closed and also includes means to detect anunauthorized entry condition and to set an alarm accordingly. Thus, theECLS 20 is a distributed processing system since each LCU 26 has onboardprocessing and stores essential locker control data while logging lockeractivity.

In particular, as shown most clearly in FIG. 11, each LCU 26 comprises aprocessor L45 for handling communications between the LCU 26 and the SCU24 and for performing locker 32 opening and locker sensing (e.g., dooropen/closed), as will be discussed in detail later. An exemplaryprocessor Motorola MC68HC908GP32. The LCU 26 board contains circuitryL46 that allows the ECLS 20 to interface with the IDs 28. The LCUcontains input device circuitry L46 and firmware to control four IDs 28(as will be discussed in detail later) to be connected directly to LCU26 circuit board. Each LCU 26 also includes a LCD (liquid crystaldisplay) port L47 capable of interfacing with LCD displays 60 up toeighty characters from several different manufacturers. The LCD port L47provides required power, data and contrast control. Each LCU 26comprises a UART L48 that allows the processor L45 to output data fortransmission on different media. UART L48 is used for communications tothe LCU 26. Communication circuitry L49 allows for communications ondifferent types of media (e.g., Power Line, RS-485, Network, etc.)interfaces between UART L48 and the appropriate communications media.Circuitry L49 is used for communications to the SCU 24. Communicationcircuitry L50 allows for communications on different types of media(e.g., Power Line, RS-485, Network, etc.,) and interfaces between UARTL51 and the appropriate communications media. Communications circuitryL50 is used for communications to other devices that are connecteddirectly the LCU 26 board. UART L51 allows the processor L45 to outputdata for transmission on different media and is used for communicationsto other devices that are connected directly to the LCU 26 board. UARTL51 allows for communication to other remotely located devices. Each LCU26 also contains an RS232 port L52 that allows for field programming ofthe LCU 26 firmware. Each LCU 26 board includes a flash chip L53 whichis used for storing tenant access codes, configuration setups and otherinformation. A power input L54 routes the power from a power supplyand/or a battery to the appropriate places on the LCU 26 circuit board.The LCU 26 board also contains an input point L55 that allows the ECLS20 to be connected to a button B. The button B (adjacent the LCD display60) can be used for user input (e.g., reserving a locker). As will bediscussed next, each LCU 26 has the ability to control a predeterminednumber (e.g., 48) of lockers 32. The LCU 26 control circuitry L56handles the energizing of the actuator 61 (e.g., solenoid, motor, etc.,)in each locking mechanism 30. The LCU 26 control circuitry also handlesthe sensing of the current status of the locker 32 door (e.g., whetherthe door is open or closed). Locker control circuitry L56 in each LCU 26connects to each locking mechanism 30 with two wires W1 and W2. The twowires W112 allow for control of the locking mechanism 30 (e.g., open thelock 30) and also allows for sensing of the current status of the door(e.g., is the locker 32 door opened or closed). FIG. 12 provides aflowchart of LCU operation.

As mentioned previously, each LCU 26 controls access to a predeterminednumber of lockers 32 (e.g., forty-eight lockers) based on user inputfrom a corresponding input device ID 28. These lockers 32/input devices28 can be distributed over different areas of the school, fitnesscenter, etc., as desired by the customer into locations known as lockeraccess stations (LASs). As shown most clearly in FIG. 3, four LASs25A-25D are shown under the control of one LCU 26. For example, usershaving lockers at LAS 25A would communicate with the corresponding inputdevice 28A and, if access is granted, the user would be able to go tohis/her corresponding locker 32 at LAS 25A and insert or remove contentsfrom the locker 32. The particular input device ID 28 for a LAS islocated in the vicinity of the lockers 32 (e.g., in the middle of, or atthe end of, the bank of lockers 32 at the LAS; these lockers 32 havingthe ID 28 are also known as a “cluster”) to permit users to communicatewith the ECLS 20 and then to proceed to the particular locker 32 in thatLAS; the LCU 26 itself can be located within one of the four LASs25A-25D. Therefore, in its broadest sense, an LAS may not even comprisethe LCU 26. As a result, in its broadest sense, an LAS defines thelocation where a user provides input to the ECLS 20 in order to gainaccess to a particular locker 32.

If the lockers 30 are operating in an “assign-on-demand” mode (e.g., ina locker room or health club) as opposed to the mode where each user hasa pre-assigned “permanently” assigned locker (e.g., as in a schoolcorridor), then the LAS contains the input device 28 (e.g., the cardreader 128 which includes an LCD display, not shown). When the useractivates the card reader 128 (e.g., a magnetic card reader that meetsthe ISO Specification 7810ID-1,7811/2) by swiping his/her card (e.g.,see FIG. 4, card 129B), the ECLS 20 verifies that the card is valid,searches for an available locker, and then opens the electronic lock 30corresponding to that locker 32. On subsequent swipes of the card 129B(e.g., 30-mil PVC laminated card, in accordance with the ISOspecification, and wherein each card comes encoded with a respectiveuser ID), the LCD display 60 provides a message asking if the user wantsto keep the locker 32. The user then pushes the button B to indicatethat the locker 32 is to be kept; or, in the alternative, the user takesno action at all. This cycle is repeated until the user takes no actionat which point the locker 32 then becomes available after a time-outperiod. FIG. 8 provides a flowchart of this locker assignment process inmore detail.

As mentioned earlier, each lock 30 is an electronic lock mechanism andit should be understood that the ECLS 20 may use any locking mechanismthat can be activated electrically (see FIG. 5A, e.g.,solenoid-operated; a motor-operated mechanism may be used as analternative, etc.,); thus, each locker 32 is devoid of handles, knobs orother hardware devices; see FIGS. 6A-6C which depict exemplary lockersconfigurations where FIG. 6A depicts a single tier locker configuration,FIG. 6B depicts a two-tier locker configuration and FIG. 6C depicts athree-tier locker configuration, all by way of example only.

Also, by way of example only, the ECLS 20 incorporates a lock designthat comprises a pin 34 that is float-mounted to the locker door 33(FIG. 5A) and a lock portion 35 (FIG. 5A) that is mounted to the lockerbody 37 and whereby the lock portion 35 captures and releases the pin34. This arrangement provides for easy concealment of wiring used toconnect the locking device 30 to the LCU 26. The locking mechanism 30allows the locker door 33 to latch automatically when the locker door 33is closed. Once activated, the lock mechanism 30 releases and the lockerdoor 33 pops open. The locking mechanism 30 is a multi-function device.When the user pushes the locker door 33 closed, it automaticallylatches. No signal from the LCU 26 is required to accomplish thisaction. As shown in FIGS. 5A-5B, the lock mechanism 30 incorporates anactuator 61 (e.g., a solenoid, a motor, etc.,) that latches upon commandfrom the LCU 26. The automatic latch mode of operation supportsenvironments where the locker 32 is normally closed. The latch oncommand mode of operation supports environments where the locker 32 isin a normally open condition (e.g., a gymnasium or health club lockerroom where lockers are not permanently assigned).

In particular, the pin 34 is float-mounted in a receiver portion 36 thatis mounted on a bracket 39 to the locker door 33. The pin 34 comprises ahead 68 that gets trapped against a latching plate 65 whose movement iscontrolled by the actuator 61 and a spring 66. When the locker door 33is closed, the underside 70 of the head 68 is trapped against surface 71of the latching plate 65; the latching plate 65 can move in thedirection of the arrow 72 (right) or in the direction of the arrow 73(left). With the door 33 closed, the head 68 compresses a driver member69 against the action of a coaxial spring 64. Additionally, in thisposition, the head 68 also closes a contact 62 of a switch 63. As can beseen most clearly in FIG. 5B, closure of the contact 62/switch 63completes a circuit 74 comprising electrical conductors W1, W2 and W3.

When the LCU 26 commands a locker door 33 opening using a current pulse(e.g., 7 amps @ 0.25 seconds) into the circuit 74, the actuator 61momentarily moves the latching plate 65 in the direction of the arrow73, thereby permitting the driver member 69 (under the action of thecoaxial spring 64) to forcefully drive the head 68 through a hole 67 inthe latching plate 65 and “pop” the locker door 33 open; this actionalso “opens” the switch 63 since the contact 62 is no longer closed andtherefore “opens” circuit 74. This movement of the latching plate 65 inthe direction of the arrow 73 causes another spring 66 to compress.Following the LCU command pulse duration, the actuator 61 isde-activated and the spring 66 is free to drive the latching plate 65 inthe direction of the arrow 72 which moves the hole 67 slightly out ofalignment of the head 68 movement. Conversely, when the user closes thedoor 33, the head 68 “finds” a portion of the slightly mis-aligned hole67 and pushes the latching plate 65 in the direction of the arrow 73,against the action of the spring 66. Once the head 68 passes through thehole 67, the spring 66 is free to move the latching plate 65 in thedirection of the arrow 72 until one is side of the hole 67 contacts theshank 76 of the pin 34; this action traps the underside 70 of the head68 against the surface 71 of the latching plate 65, while simultaneouslyclosing the contact 63 of the switch 62.

The circuit 74 also provides the LCU 26 with the means for detecting theopen or closed condition of the locker door 33. The LCU 26 polls all ofthe locker doors 33 using another current pulse (e.g., 36 mA @ 1 ms) andcan determine if the circuit 74 is open or closed. An “open” circuit(e.g., no return pulse to the LCU 26) indicates that the locker door 33is open since the contact 62/switch 63 is not closed; a “closed” circuit(e.g., return pulse detected by the LCU 26) indicates that the lockerdoor 33 is closed since the contact 62/switch 63 is closed. It should benoted that the LCU 26 can poll all of the locker doors 33 in less than asecond. As a result, the function of detecting locker door 33 condition(open/closed) and supplying power to the actuator 61 are bothaccomplished using the circuit 74. This is in contrast to the commonapproach or running two wires to a locker door sensing device andanother two wires to a lock actuator. Thus, this electronicconfiguration between the LCUs 26 and lockers 32 allows the systemadministrator to open each locker 32 door as well as detect when eachlocker door has been opened or closed. Each time the locker 32 door isopened, the user, locker number and time and date are recorded in thecentral database.

Information from the database required for system function is downloadedfrom the SAC 22 to the SCU 24. The SCU 24 downloads portions of thisinformation to each LCU 26. Each LCU 26 stores data related to inputs,lock openings and closings, and alarm conditions for its correspondinglockers 32 and uploads this information to the SCU 24. The SCU 24 thenreports this information back to the SAC 22. The SCU 24 also sends eachLCU 26 the access codes for each locker hooked directly to acorresponding LCU 26. Each LCU 26 also stores transaction information.Furthermore, all LCUs 26 in the ECLS 20 communicate with each otherthrough the SCU 24. Thus, the SCU 24 and LCUs 26 can be disconnected andthe user can gain access to his/her locker from any LAS. Under normaloperation the access code is verified at the LCU 26 for lockers and IDs28 wired directly to the LCU 26. If the ID 28 is attached to a differentLCU 26, then the LCU 26 requests verification from the SCU 24 and, ifverified, passes the open command through the SCU 24 to the appropriateLCU 26. If the connection to the SCU 24 were severed, then thisfunctionality would be severed but users can still gain access to thelocker 32 from a LAS attached to the LCU 26 that his/her locker isattached to. The SCU 24 maintains the access codes for each locker 32and also stores transaction information. The SCU 24 does not need to beconnected to the SAC 22 for system operation.

The SCU 24 and LCU 26 are in constant communication so that if theconnection between the two is severed, system function can continue.

The SCU 24 can operate without connection to the SAC 22 for long periodsof time even if new or changed information has not been sent to the SCU24.

The SCU 24, LCUs 26, IDs 28 and electronic locks 30 are all connectedvia low voltage wiring. The SCU 24 and LCU 26 connections can be over avariety of communication interfaces, such as a standard RS-485 interfacespecification by way of example only. Furthermore, the LCUs 26 may evenbe connected in a daisy chain configuration to reduce the number andlength of wiring runs. As shown in FIG. 7, the ECLS 20 provides theability to communicate between the SCU 24 and the LCUs 26 over differentmedia, e.g., wireless technology 200, RS 485 Daisy Chain 300, modulatedpower line 400, etc. The wireless technology 200 eliminates the need torun wiring required by the RS-485 communication protocol. Wheremodulated power line 400 communication is utilized, the SCU 22 and theLCU 24 can be equipped with power line modem modules that are selectablefor use with 110VAC or 240VAC systems.

It should further be noted that it is within the broadest scope of thepresent invention 20 to include an ECLS 20 that operates over theInternet. In particular, every component, or a select group ofcomponents, of the ECLS 20 may comprise an Internet address and whereincontrol and monitoring of the ECLS 20 is accomplished using a TCP/IPnetwork.

As mentioned earlier, the system administrative user is a user that hasaccess to and periodically uses the administrative software toconfigure, control and assign users to (students, members, etc.) thesystem 20. The system administrative user can possibly have limitedaccess to the software depending on the security level that he/she hasbeen assigned. The system administrative user of the ECLS 20 hasmanagement capabilities and more privileges and can lock out aparticular locker. The administrator may deny access to one or all(selectable by various groups); the administrator may open one or all(selectable by groups). The administrative user is provided with a setof tools for setting up and controlling the system. Several reports areavailable to the administrator as well. The administrator can add,change, and delete individual users and can organize and identifyindividual users by various groupings. Access to lockers by individualusers can also be restricted to specific time periods. The administratorcan assign identification and location information to each locker andcan also track maintenance needs for each locker. A card managementfeature gives the administrator full control over the management ofindividual user cards and is highly automated to make management ofcards a simple task. Reports provide the administrator information onlocker inventory, available lockers, users not assigned, repairsrequired, and various activity reports.

The administration software and database allows the administrator toassign each locker 32 to several different user-defined groups. (e.g.,Area-Upper Campus; Building-Student Center; Hall A; etc.) Likewise, eachuser (e.g., student, member) can be assigned to one or more user-definedgroups (e.g., sophomore, junior, senior; football team; drill team,band; Mrs. Thompson's home room, Mr. Green's home room; etc.). Thisability to assign both lockers 32 and users to groups (also referred toas “virtual grouping capabilities”) gives the administrator a powerfultool to manage lockers and users in the system. For example, theadministrator can select all members of Mr. Green's home room class andautomatically assign them lockers 32 in Hall A with a very minimalamount of input. Lockers 32 can be locked down, unlocked, or openedbased on their group assignment (e.g., geographical location).

The software allows the administrator to create an unlimited number oftime zone assignments that grant access to the user during specific dayand time periods. Using the virtual grouping capabilities theadministrator can apply these time zone assignments to groups ofstudents instantly giving the administrator tremendous control overlocker use. For example, the administrator can grant nominal access tothe lockers 32 around standard school hours (e.g., Monday-Friday 8:00a.m. to 4:00 p.m.) but allow members of the football team and drill teamto have access to lockers following a late Friday night game.

Since the groups are user-defined, the ECLS 20 can be readily configuredto meet the needs of any facility or organization.

As mentioned earlier, the administrative software comprises a centraldatabase. This database may comprise several databases (e.g., Tables1-16) that are discussed next by way of example only and are not limitedin any way to only those shown.

A “user database” is used to store locker user information. Depending onthe environment that the software is used in, a user may be a student ifthe software is used in a school setting, or a client if the software isused in a health club setting. The following user information is storedin this database. TABLE 1 User Database Structure FieldName DescriptionLength Type Comments FirstName User first name 20 Alphanumeric LastNameUser last name 20 Alphanumeric HomePhone User Primary phone numberContactName Parent/Guardian 20 Alphanumeric Name ParentPrimPhoneParent/Guardian Primary Telephone ParentSecPhone Parent/GuardianSecondary Telephone UserID User ID Number 6 Alphanumeric Gender Gender 1M or F Locker1 Assigned Locker 6 Alphanumeric Number One Locker1 AccessLocker One 10 Numeric Combination Locker2 Assigned Locker 6 AlphanumericNumber Two Locker2 Access Locker Two 10 Alphanumeric Combination GradeGrade 1 Alphanumeric HomeRoom Home Room 2 Alphanumeric Selected fromhome room data base. This field references the data stored in home roomdatabase. GymPeriod Gym Glass 2 Alphanumeric 1-99 Period BirthdayMembers B Day Date VideoImage Picture of Member UsageCount Usage NumericCounter for number of usages remaining LockerRoom Locker Room 2Alphanumeric 1-99 UserOne User Group One 2 Alphanumeric Selected fromthe user group database. This field references the data stored in theUser Group database. UserTwo User Group Two 2 Alphanumeric Selected fromthe user group database. This field references the data stored in theUser Group database. TimeZone Time Zone 2 Alphanumeric Time Zone thatthe user is allowed to access the locker. This field references the timezone database. Comment Comment 200 Memo Field Allows for comments to beentered about student.

The administrative software allows for the configuration of theinstitution name, address and telephone number. The system administratorcreates this information during initial setup and customization of thesoftware: TABLE 2 Institution Name Setup Field Name Description LengthType Comments SiteName Name of 20 Alphanumeric Institution ororganization Address1 20 Alphanumeric Address2 20 Alphanumeric City 30Alphanumeric State Alphanumeric PostalCode Alphanumeric Phone Phonenumber for institution Fax Fax number for institution

The administrative software also allows the system administrator todefine certain security levels. These security levels allow the systemadministrator to designate others as “administrative users” and whichlimits these administrative users to access of certain functions andoptions. TABLE 3 Security Levels Field Name Description Length TypeComments ID Security Level Unique ID for ID each record DescriptionSecurity Level 15 Alphanumeric Alpha description description of securitylevel User 1 Boolean Ability to perform functions on individual users

The administrative software also allows for the creation of user names,passwords and security levels. The user name and password is used to logonto the administrative software and perform functions. Depending on thesecurity level that is selected for the individual, user functionalitywithin the software is limited. Each administrative user can also beassigned a card number that they can use with the ECLS 20. TABLE 4Administrator User Setup Field Name Description Length Type CommentsUserID User 4 Alphanumeric Used in identification conjunction that isused to with the access the password administrative below by softwareadminis- trative user to log into the software Password This password 4Used in is used in conjunction conjunction with the with the userIDuserID above above to to log into access the the software administrativesoftware UserFirstName First name of 20 Alphanumeric user UserLastNameLast name of 20 Alphanumeric user SecurityLevel Security level 2Alphanumeric This is the in security level administrative for the user.software that Security user has levels are predefined. AccessNumberMagnetic card 10 Alphanumeric This is the access magnetic number stripecard of the user TimeZone Time Zone for 2 Alphanumeric user

The administrative user creates the locker database during initial setupand customization of the software. The locker database recordsinformation about every locker 32 in the ECLS 20. The locker database isused to assign locker users to specific databases. TABLE 5 LockerDatabase Field Name Description Length Type Comments RegNumber Locker 10UniqueID Registration Number Number Locker 6 Alphanumeric Number SizeLocker Size Occupancy Locker 6 Single or Occupancy shared Status Lockerstatus 2 Alphanumeric Available, occupied, need repair, not available orother user defined. Status fields can be defined by user LocationLocation 2 Alphanumeric Location where locker is descriptions locatedare stored in location description database. This field refers to thisdatabase Cluster Cluster where 2 Alphanumeric Clusters locker isdescriptions located are stored in cluster description database. Thisfield refers to this database. Zone Zone where 2 Alphanumeric Zonelocker is descriptions located are stored in zone description database.This field refers to this database Area Area where 2 Alphanumeric Arealocker is descriptions located are stored in area description database.This field refers to this database. Building Building where 2Alphanumeric Building locker is descriptions located are stored inbuilding description database. This field refers to this database. LockType Describes the Alphanumeric Solenoid, type of lock Motorizedinstalled on the locker opening LastTran Last transaction LastAlarm Lastalarm Supervisor Supervisor or assignment maintenance group MaintenanceLast Date Field Date of last maintenance maintenance date on lockerCombination ???? LCU LCU number Slot Slot number of LCU Comment 200 MemoComment Field

The administrative user creates a holiday database during initial setupand customization of the administrative software. The holiday databaseis used in conjunction with the time zone database to determine thehours of access a user may have on a holiday. TABLE 6 Holiday DatabaseField Name Description Length Type Comments HolidayID 2 AlphanumericAuto assigned ID StatusDescrip 20 Alphanumeric Locker status description

The administrative user creates the locker status database duringinitial setup and customization of the administrative software. Thelocker status database contains descriptions of locker status. Thelocker status database is referenced by the status field in the lockerdatabase. The default options for this database are “available,occupied, need repair, not available.” The administrative user may alsodefine other locker status descriptions. TABLE 7 Locker Status DatabaseField Name Description Length Type Comments StatusID 2 Alphanumeric Autoassigned ID StatusDescrip 20 Alphanumeric Locker status description

The administrative user creates the locker location database duringinitial setup and customization. This database allows for segregation oflockers into different locations. TABLE 8 Locker Location Database FieldName Description Length Type Comments LocationID 2 Alphanumeric Autoassigned ID LocationDescrip 20 Alphanumeric Locker location description

The administrative user creates a locker cluster database during initialsetup and customization. This database allows for segregation of lockersinto different clusters. TABLE 9 Locker Cluster Database Field NameDescription Length Type Comments ClusterID 2 Alphanumeric Auto assignedID ClusterDescrip 20 Alphanumeric Locker cluster description

The administrative user creates a locker zone database during initialsetup and customization. This database allows for segregation of lockersinto different zones. TABLE 10 Locker Zone Database Field NameDescription Length Type Comments ZoneID 2 Alphanumeric Auto assigned IDZoneDescrip 20 Alphanumeric Locker zone description

The administrative user creates a locker building database duringinitial setup and customization. This database allows for segregation oflockers into different buildings. TABLE 11 Locker Building DatabaseField Name Description Length Type Comments BldgID 2 Alphanumeric Autoassigned ID BldgDescrip 20 Alphanumeric Locker building description

The administrative user creates a locker area database during initialsetup and customization. This database allows for segregation of lockersinto different areas. TABLE 12 Locker Area Database Field NameDescription Length Type Comments AreaID 2 Alphanumeric Auto assigned IDAreaDescrip 20 Alphanumeric Locker area description

The administrative user creates a user group database during initialsetup and customization. This database allows for segregation of lockersinto different groups. TABLE 13 User Group Database Field NameDescription Length Type Comments GroupID 2 Alphanumeric Auto assigned IDGroupDescrip 20 Alphanumeric Group description

The administrative user creates a home room database during initialsetup and customization. This database allows for segregation of lockersinto different home rooms. TABLE 14 Home Room Database Field NameDescription Length Type Comments HomeRoomID 2 Alphanumeric Auto assignedID Description 20 Alphanumeric Home Room description

The administrative user creates a time zone database during initialsetup and customization. This database allows for the ability to givespecific locker users limited times during the day for access to theirlockers. TABLE 15 Time Zone Database Field Name Description Length TypeComments Time Zone ID Time zone id 2 Alphanumeric Auto assigned IDTZDescrip 20 Alphanumeric Time zone description SunOpen 7 AlphanumericOpen time for Sundays SunClose 7 Alphanumeric Close time for SundaysMonOpen 7 Alphanumeric Open time for Mondays MonClose 7 AlphanumericClose time for Mondays TueOpen 7 Alphanumeric Open time for TuesdaysTueClose 7 Alphanumeric Close time for Tuesdays WedOpen 7 AlphanumericOpen time for Wednesday WedClose 7 Alphanumeric Close time for WednesdayThuOpen 7 Alphanumeric Open time for Thursday ThuClose 7 AlphanumericClose time for Thursday FriOpen 7 Alphanumeric Open time for FridayFriClose 7 Alphanumeric Close time for Friday SatOpen 7 AlphanumericOpen time for Saturday SatClose 7 Alphanumeric Close time for SaturdayHolOpen 7 Alphanumeric Open time for Holidays HolClose 7 AlphanumericClose time for Holidays

This database is used to track when and what an administrative user hasdone in the software. TABLE 16 Administrative Transaction Log DatabaseField Name Description Length Type Comments RecordNum Unique IDAutomatic record ID Administrator 4 Alphanumeric Administrator ID id whoperformed the action User ID 20 Alphanumeric User ID action performed onUser Name 20 Alphanumeric User name action performed on Locker ID 6Alphanumeric Locker action performed on Date Date Date action performedTime Time Time action performed Action 2 Alphanumeric Action PerformedThe ECLS 20 also includes an option for importing/exporting data using acomma separated file (CSF) format. The data import/export option alsoprocesses the following formats:

-   -   Administrative Software Interface: The Schools Interoperability        Framework (SIF) is an industry standard designed to provide data        integration and maintain data accuracy across various K-12        educational administrative and curriculum systems. Programs that        are SIF compliant allow for data to be entered once and        automatically updated in all connected systems;    -   Another option provides for an ASCII file transfer option        between the administrative software and the electronic locker        software. This option provides a linked, interactive interface        to other software packages, such as a school administration        software package. Using this option, when data is updated in one        program, the related field in the other program is automatically        updated as well. This option eliminates the need for data        import/export (i.e., it operates this function dynamically) and        eliminates the need for inputting the same information in two        different programs. This saves work and improves data integrity        and enhances accuracy, since the data needs to be maintained in        one place only.    -   Furthermore, the ECLS 20 also provides means to download data        from the locker control software to a Palm Pilots device and can        even provide the system administrator with the ability to        perform all administrative functions remotely via the Internet;        where the ECLS 20 is used in a fitness center setting, a        software option is available that meets the specific        requirements of the health club industry.

As mentioned earlier, the ECLS 20 includes monitoring and alarmfunctionality. In particular, the lock mechanism 30 contains a sensordevice (not shown) to determine when the locker 32 door is opened. Ifthe door is opened without, e.g., the user card 129A (129B or 129C)being swiped through the card reader 128, or without an administrativecommand being issued, an alarm is detected on the locker 30. A visibleand audible signal will sound the SAC 22 when an alarm condition istriggered. Furthermore, it is possible to interface other securitydevices to the ECLS 20 such as cameras, and alert devices. These can beintegrated to selectively activate when an alarm condition is triggered.

Where electronic access keys are used (e.g., such as the cards 129A-129Cshown in FIG. 4), these cards can be used in the particular ECLS 20 fora variety of functions. For example, in a school setting, the card cannot only be used for opening a locker 32, but also for trackingattendance at school, as a library card, and in a lunch program;similarly, in a work place setting, these cards can be used for buildingaccess, time keeping, locker access, and equipment check-out. In afitness center, these cards can be used for admission, assigning andopening lockers, workout schedule and for purchasing refreshments, etc.Furthermore, with regard to the computer records of locker activity,these locker records can be unified with user records such as astudent's class schedule.

The ECLS 20 provides quick, accurate and safe locker administration inthat:

-   -   it provides for the re-assignment of lockers and access thereto        which can be accomplished instantly by computer control.    -   it is compatible with current database software packages;    -   it uses computerized records of electronic locker locations and        users that can be integrated with existing administration        software;    -   its central administrative SAC 22 has complete control of locker        opening parameters and access;    -   it provides for unified user and locker assignment records;    -   it provides for instant user re-populations;    -   it provides for recorded history of locker usage;    -   it alerts the administrator of attempted locker intrusions and        records location, date and time.    -   during times when there is no user activity or when a manager or        administrator does not want a user or users to access lockers        (e.g., off-hours, sporing events, night school and vacations)        any locker user can be locked out by the system administrator;    -   individual locations, or groups of lockers, can be opened for        inspections, cleaning or maintenance.    -   all of the information in the administration software is        password protected. Managers or administrators can choose who        has access to locker information and how much information each        user can view.

Thus, as described, the ECLS 20 provides secure storage with easy accessfor individual users and simple but powerful management tools for thesystem administrator. The ECLS 20 provides a safe, secure, convenient,accountable, centralized and time saver locker control system.

It should be understood that it is within the broadest scope of thepresent invention to include an ECLS 20 that combines the functionalityof the SCU 24 within the SAC 22. FIG. 14 illustrates such an ECLS 20that does not require a SCU 24 and wherein a modified SAC 22′ comprisesthe functionality of the SCU 24 therein. One of the advantages of havingthe SCU 24 is that the SAC 22 may comprise any type of conventional PC(as mentioned earlier) that is not dedicated to the ECLS 20. In otherwords, the SAC 22 may administer the ECLS 20 while supporting othernormal business functions. On the other hand, where the ECLS 20 does notutilize a SCU 24, the SAC 22′ is dedicated to ECLS 20 operation.However, in all other respects, the ECLS 20 that does not include theSCU 24 (FIG. 14) operates similarly to the ECLS 20 that does include theSCU 24 (FIG. 1) and provides all of the operations regarding lockeraccess control, locker monitoring and virtual grouping, administratorcontrol, etc., discussed earlier.

Without further elaboration, the foregoing will so fully illustrate ourinvention that others may, by applying current or future knowledge,readily adopt the same for use under various conditions of service.

1. An electronically-controlled locker system for use by a plurality ofauthorized users and managed by an administrator, said systemcomprising: a first plurality of lockers wherein each locker comprises arespective electronically-activated lock; at least one input device forallowing the plurality of authorized users to communicate with saidsystem; at least one locker control unit, in communication with eachelectronically-activated lock and with said at least one input device,said at least one input device being in communication solely with saidat least one locker control unit and said at least one locker controlunit controlling the activation of said electronically-activated locks;a computer, controlled by the administrator, for managing at least onedatabase of authorized user and locker information; a system controlunit, in communication with said at least one locker control unit andwith said computer, said system control unit providing said at least onelocker control unit with said authorized user and locker information,said system control unit comprising a watchdog and having no harddrives; and wherein said at least one locker control unit uses data fromsaid at least one input device and said authorized user and lockerinformation to provide access to corresponding lockers for the pluralityof authorized users.
 2. The system of claim 1 wherein said computerallows the administrator to control access to, and assignment of, saidfirst plurality of lockers.
 3. The system of claim 1 wherein said systemcontrol unit allows communication between at least two locker controlunits.
 4. The system of claim 1 wherein said electronically-activatedlock controls the locked or unlocked state of a corresponding lockerdoor, said electronically-activated lock comprising: an actuatorelectrically coupled to said locker control unit; a switch, coupled inseries with said actuator and not accessible to a user of the lockerdoor, said switch completing an electrical circuit whenever said lockerdoor is closed and opening said electrical circuit whenever said door isopened; and wherein said actuator is momentarily activated by a firstcurrent pulse from said locker control unit to open said locker door andwherein said switch opens said electrical circuit upon activation ofsaid actuator.
 5. The system of claim 4 wherein said locker control unittransmits a second current pulse to determine the locked or unlockedstate of said locker door, said locker control unit receiving a returncurrent pulse if said locker door is in a locked state and said lockercontrol unit receiving no return current pulse if said locker door is anunlocked state.
 6. (canceled)
 7. The system of claim 1 wherein said atleast one input device is a card reader.
 8. The system of claim 1wherein said at least one input device is a keypad.
 9. The system ofclaim 1 wherein said at least one input device is a proximity reader.10. The system of claim 1 wherein said at least one input device is abiometric.
 11. The system of claim 1 wherein said system control unitand said at least one locker control unit are coupled together using anRS-485 daisy chain.
 12. The system of claim 1 wherein said systemcontrol unit and said at least one locker control unit are coupledtogether for communication using modulated power lines.
 13. The systemof claim 1 wherein said system control unit and said at least one lockercontrol unit are coupled together using wireless means.
 14. The systemof claim 1 wherein a second locker control unit is in communication witheach electronically-activated lock of a second plurality of lockers andis in communication with a second input device and with said systemcontrol unit, said second locker control unit communicating with saidsystem control unit in order to control access to a locker in said firstplurality of lockers when a user having a locker in said first pluralityof lockers communicates with said second input device.
 15. The system ofclaim 2 wherein said computer allows the administrator to modify accessprivileges to a locker by time or date.
 16. The system of claim 1wherein said plurality of lockers are lockers in a school.
 17. Thesystem of claim 1 wherein said plurality of lockers are lockers in afitness center.
 18. The system of claim 1 wherein said plurality oflockers are lockers in a workplace.
 19. The system of claim 1 whereinsaid computer allows the administrator to track locker usage.
 20. Thesystem of claim 1 wherein said computer alerts the administrator toattempts at unauthorized access to any locker.
 21. The system of claim 1wherein said computer allows the administrator to allow others to usesaid computer with limited access privileges.
 22. The system of claim 18wherein said computer allows the administrator to track usage by othersof said computer.
 23. The system of claim 1 wherein said computer allowsthe administrator to designate virtual groupings of lockers in saidsystem.
 24. A method for controlling access to a plurality of lockersfor a plurality of authorized users by an administrator, said methodcomprising the steps of: storing and maintaining information about theplurality of authorized users and said plurality of lockers, referred toas predetermined data, at a first location; providing an electronic lockat each one of said plurality of lockers; assigning a respective lockercontrol unit to a respective subset of said plurality of lockers, eachof said locker control units communicating with every electronic lock insaid subset and each of said locker control units being located in thevicinity of a respective subset; coupling at least one input device toone of said locker control units for permitting the authorized users inthat subset to request access to their respective lockers, said at leastone input device communicating solely with said one of said lockercontrol units; loading each of said locker control units with saidpredetermined data from said first location; controlling access to eachof said lockers in a subset by a respective locker control unit based onsaid predetermined data and said access request by the authorized users;and linking each one of said locker control units to a system controlunit and wherein said system control unit permits communication betweensaid locker control units such that a first locker control unit canunlock a locker in a plurality of lockers that is not in said respectivesubset of plurality of lockers assigned to said first locker controlunit.
 25. (canceled)
 26. (canceled)
 27. The method of claim 24 whereinsaid step of controlling access to said lockers further comprisesdetermining the open or closed state of said lockers using an electricalcircuit which also controls unlocking said lockers.
 28. The method ofclaim 27 wherein said steps of controlling access to said lockers anddetermining the open or closed state of said lockers uses a firstcurrent pulse through said electrical circuit to unlock said lockers anda second current pulse through said electrical circuit to detect an openor a closed state of said lockers.
 29. The method of claim 24 whereinsaid step of storing and maintaining information further comprisespermitting a system administrator to create user names, passwords andsecurity levels.
 30. The method of claim 24 wherein said step of storingand maintaining information further comprises permitting a systemadministrator to control the time and date of locker access.
 31. Themethod of claim 24 wherein said step of storing and maintaininginformation further comprises permitting a system administrator todesignate lockers into virtual groupings.
 32. The method of claim 24wherein said step of storing and maintaining information furthercomprises tracking any changes in said information.
 33. The method ofclaim 24 wherein said step of coupling at least one input device to eachof said locker control units comprises coupling a card reader to said atleast one input device.
 34. The method of claim 24 wherein said step ofcoupling at least one input device to each of said locker control unitscomprises coupling a keypad to said at least one input device.
 35. Themethod of claim 24 wherein said step of coupling at least one inputdevice to each of said locker control units comprises coupling aproximity reader to said at least one input device.
 36. The method ofclaim 24 wherein said step of coupling at least one input device to eachof said locker control units comprises coupling a biometric to said atleast one input device.
 37. The method of claim 24 wherein said step oflinking said system control unit and said locker control units togethercomprises using an RS-485 daisy chain.
 38. The method of claim 24wherein said step of linking said system control unit and said lockercontrol units together comprises using modulated power lines forcommunication therebetween.
 39. The method of claim 24 wherein said stepof linking said system control unit and said locker control unitstogether comprises using wireless means.
 40. The method of claim 24wherein the step of linking said system control unit with said lockercontrol units further comprises allowing an authorized user in a firstsubset to gain access to his/her corresponding locker by communicatingwith an input device in a second subset.
 41. The method of claim 24wherein said plurality of lockers are lockers in a school.
 42. Themethod of claim 24 wherein said plurality of lockers are lockers in afitness center.
 43. The method of claim 24 wherein said plurality oflockers are lockers in a workplace.
 44. The method of claim 24 furthercomprising the step of permitting the administrator to track lockerusage.
 45. The method of claim 24 further comprising the step ofalerting the administrator of attempts at unauthorized access of anylocker.
 46. (canceled)
 47. (canceled)