Storage room with inventory control

ABSTRACT

Systems and methods of the invention relate to managing an inventory of items within a storage container. A storage container can house one or more items for distribution among one or more users such as, for instance, employees. The storage container discussed herein provides authentication of a user, tracking of the inventory each user removes or returns, video/image capture of user during access of the storage container, wireless tracking of items housed within the storage container, among others.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part application of U.S.Non-provisional application Ser. No. 17/162,414, filed on Jan. 29, 2021,and entitled “STORAGE ROOM WITH INVENTORY CONTROL”, which is acontinuation application and claims the benefit of U.S. Non-provisionalapplication Ser. No. 16/577,213, filed on Sep. 20, 2019, and entitled“STORAGE CONTAINER WITH INVENTORY CONTROL”, which is a continuationapplication and claims the benefit of U.S. Non-provisional applicationSer. No. 15/276,239, filed on Sep. 26, 2016, and entitled “STORAGECONTAINER WITH INVENTORY CONTROL.” The entireties of the aforementionedapplications are incorporated herein by reference.

BACKGROUND Technical Field

Embodiments of the subject matter disclosed herein relate generally tosystems and methods for inventory management in an environment, and morespecifically, relate to a powered storage container for managinginventory items and providing for the inventory's ease of replenishment.

DISCUSSION OF ART

A variety of professional and other environments rely on a diverseassortment of inventory. From pens and pencils, which may be stocked inthe hundreds, to expensive or specialized electronic equipment sharedbetween a group of workers, it is important for organizations or evenindividuals to track and evaluate supplies or equipment. Traditionally,supplies are kept in open areas, where anyone may remove or utilizethem, or secured areas, which require a specific person to controlaccess. In open areas, easy access to supplies may encourage theirmisuse or loss, increasing costs and the burden of managing supplies. Insecure areas, key personnel who frequently access inventory may beinconvenienced, inventory may not be immediately available as-needed,and additional personnel is required to control access. An alternativearrangement can be for individuals to seek their own supply, which isless efficient than ordering in bulk for a group, and either encumbersindividuals with the expense of furnishing their respective inventoryitems at retail cost or creates additional paperwork and effort forreimbursement.

Existing technologies attempting to automate such management are complexand expensive. They typically rely on expensive or custom hardware andsoftware, are error-prone, and are frequently limited to specific areasand difficult to move. Further, existing systems do not positivelyidentify each user, which limits the resolution of inventory managementdata and increases the likelihood of misuse or abuse by individuals. Inaddition, existing systems are complex and cumbersome, and as a resultaccess to inventory is tedious, frustrating, and wasteful.

Accordingly, it may be desirable to have systems or methods for managingan inventory that differs from those systems and methods that arecurrently available, for example, to reduce cost, improve ease of use,affirmatively identify users interacting with inventory, increase systemflexibility after deployment, and decrease the time required to access,remove, or replenish inventory properly. Such examples arenon-exhaustive and non-limiting, and the systems and methods describedherein will include other benefits and possess other motivations thanthose expressly listed.

BRIEF DESCRIPTION

In an embodiment, a system is provided that includes a storage containerthat houses a first item and a second item, wherein the first itemincludes a first amount and a second item includes a second amount andthe first item and the second item are non-medical related. In theembodiment, the inventory system can further include a verificationcomponent that is configured to receive a portion of data from a userand a lock mechanism for the storage container that secures an accessthereto based upon the portion of data from the user. The inventorysystem further includes a camera system that provides a first camerafocused on the user and a second camera focused on at least one of thefirst item or the second item. In an embodiment, the system can includeat least four (4) cameras in which one camera is positioned and focusedon the user accessing the storage container and the three (3) camerasare focused on sections of the storage container that includes items(e.g., on each shelf, among others), and all user motions around thoseitems.

In the embodiment, the inventory system can include a controllercomponent that is configured to record media from the first camera andthe second camera upon verification of the portion of data from the userand a wireless scanning device that provides a scan of a portion of thefirst item or a portion of the second item to indicate a removal fromthe storage container. The controller component monitors at least one ofthe first amount of the first item or the second amount of the seconditem based on at least one of the scans or recorded media and thecontroller component stores at least one of the portion of data, thescan, or the recorded media.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference is made to the accompanying drawings in which particularembodiments and further benefits of the invention are illustrated asdescribed in more detail in the description below, in which:

FIG. 1 is an illustration of an embodiment of a system for managing aninventory of items for an environment;

FIG. 2 is an illustration of an embodiment of a system for managing aninventory of items for an environment;

FIG. 3 is an illustration of an embodiment of a system for managing aninventory of items for an environment;

FIG. 4 is an illustration of an embodiment of a system for managing aninventory of items for an environment;

FIG. 5 is an illustration of a block diagram of a system for managing aninventory of items for an environment;

FIG. 6 is an illustration of a block diagram of components used forinventory management;

FIG. 7 is an illustration of a block diagram of a computing environmentfor use herewith;

FIG. 8 is an illustration of an embodiment of a system for managing aninventory of items for an environment;

FIG. 9 is an illustration of a front view of an embodiment of a systemfor managing an inventory of items for an environment;

FIG. 10 is an illustration of a rear view of an embodiment of a systemfor managing an inventory of items for an environment;

FIG. 11 is an illustration of a side view of an embodiment of a systemfor managing an inventory of items for an environment;

FIG. 12 is an illustration of a top right perspective view of anembodiment of a system for managing an inventory of items for anenvironment;

FIG. 13 is an illustration of a bottom left perspective view of anembodiment of a system for managing an inventory of items for anenvironment;

FIG. 14 is an illustration of an embodiment of shelf system for storagecontainer;

FIG. 15 is a front view of the container having a magnet attached;

FIG. 16 is a side view of the container having a magnet attached;

FIG. 17 is a top view of the container having a magnet attached;

FIG. 18 is a perspective view of the container having a magnet attached;

FIG. 19 is a perspective view of an embodiment of the shippingcontainer;

FIG. 20 is a perspective view of an embodiment of an inventory system;

FIG. 21 is a perspective view of an embodiment of a transceiver;

FIG. 22 is a front view of an exemplary bracket;

FIG. 23 is a perspective view of an exemplary bracket; and

FIG. 24 is a flow diagram of a method of operating an inventory.

DETAILED DESCRIPTION

Embodiments of the invention relate to methods and systems for managingan inventory of items within a storage container, wherein the inventoryof items are non-medical related. A storage container can house one ormore items for distribution among one or more users (e.g., employees,members, students, volunteers, contractors, and others). The storagecontainer discussed herein provides authentication of a user, trackingof inventory that each user removes or returns, video/image capture ofuser during access of the storage container, wireless tracking of itemshoused within the storage container, among others. The storage containercan provide management of items within an environment by tracking eachuser and items consumed, used, removed, and/or returned. In addition,the storage container and/or interfaces associated therewith can enableusers (e.g., administrators) to add or remove items of the environmentfrom the container to effect detailed, accurate tracking of particularitems and dynamically manage inventory control efforts.

With reference to the drawings, like reference numerals designateidentical or corresponding parts throughout the several views. However,the inclusion of like elements in different views does not mean a givenembodiment necessarily includes such elements or that all embodiments ofthe invention include such elements.

The term “component” as used herein can be defined as a portion ofhardware, a portion of software, or a combination thereof. A portion ofhardware can include at least a processor and a portion of memory,wherein the memory includes an instruction to execute. The term“component” can further include a controller programmed to perform afunction, step, or methodology as described herein.

The term “storage container” or “container” as used herein can bedefined as a mechanical device that defines a volume, at least partiallysurrounded by the device, wherein the volume can house one or moreitems. In particular, the storage container or container can include anopening that allows a user to retrieve one or more items housed therein.Moreover, the storage container can house the items and such storagecontainer may be secured/unsecured, open/closed, locked/unlocked, etcetera, thereafter.

As used herein, an “inventory” can be one or more items capable of beingat least partially controlled by systems or methods disclosed herein.While the concept of “inventory” lends itself to boxes of pens or sheetsof paper, it will be understood on review of the disclosures herein thatan inventory can be a single item (e.g., a computer, a piece ofscientific equipment, a camera, sensitive print information, a piece ofmanufacturing equipment), a plurality of items (e.g., paperclips,batteries, manufacturing components, repair parts), and/or combinationsthereof. In embodiments, only a portion or related aspect of aninventory is stored in a container described herein. For example, oneset of items controlled by a container herein can be keys for one ormore vehicles. Thus, a vehicle inventory can be managed by aspectsherein, although the vehicles themselves are not stored in thecontainer. In another embodiment, a large piece of equipment can bepartially secured using devices in here, and cannot be used or movedwithout unlocking, despite the fact that physical contact with at leasta portion of the equipment is possible before it is released by thecontainer. These aspects are provided for illustrative purposes only,and are not intended to prohibit the use of larger containers (e.g.,sufficient to contain an automobile) with aspects herein. For example, ashipping container or secure room can be configured with aspects hereinto maintain larger items in its volume. While “inventory” can be used toindicate a collective plural, it may also be used herein to indicate aparticular item or items. “Inventory item” or similar terminology canrefer to one or more of a specific item within an inventory. Unlessspecifically indicated otherwise, such language may be usedinterchangeably in instances.

Further, while aspects herein are generally directed toward a workplaceenvironment and an inventory of supplies or equipment associated with anoffice, no example given or inference drawn should be deemed to limitapplication of the techniques herein to a particular environment. Thecontainer may be used in a variety of indoor or outdoor settings, and,in embodiments, may be ruggedized or include hermetic seals to withstandenvironmental conditions or hazards associated with use in a particularenvironment.

Systems and methods herein can be designed to track internal inventoryfor customers who currently use earlier vending machines at less thanhalf the cost of existing systems. Low-cost components can be integratedand flexible systems provided to avoid the expense of custom solutions.

Systems and methods herein can further include biometric or otherpositive user authentication. Video recording adds an additional levelof accurate monitoring. By carefully identifying each and every userinteracting with an inventory control system, users are motivated to usethe system properly and properly manage organizational resources.

Hardware and software used with aspects disclosed herein canadditionally be integrated end-to-end through an organization. Network,hardware, and software compatibility between components permits devicesto “talk to” one another, as well as communicate with other devices.

Despite the capability of systems and methods herein to interactremotely, aspects herein are configured to function without Internetaccess. By avoiding a connectivity requirement to use, aspects hereinare made more robust and flexible than a system that only functions withInternet access.

Systems and methods herein also dramatically increase the speed andefficiency of inventory access and management from the user perspective.

Authentication, opening, removal, and closing of inventory managementsystems herein can take less than 15 seconds, whereas existing solutionsoften require dramatically more time to utilize.

FIG. 1 is an illustration of a system 100 (also referred to as aninventory system) for managing items housed within a storage container10. FIGS. 1-3 illustrate the storage container 10 and variousembodiments of the system 100. In particular, FIG. 1 illustrates thestorage container 10 in a closed state (e.g., no access to the internalhousing of items) and FIG. 2 illustrates the storage container 10 in anopen state (e.g., access to the internal housing of items). The storagecontainer 10 houses one or more items. It is to be appreciated that theitems can be any suitable item or good that is used within anenvironment. For instance, in an office work environment, the item canbe an office supply such as, but not limited to, a pen, a ruler, tape,compact disks, DVD's, among others. In another example, the environmentcan be an industrial work environment, wherein the item can be a tool, apair of gloves, safety goggles, among others. It is to be appreciatedthat the subject innovation is intended to include any suitable itemthat is to be managed and/or tracked to optimize consumption of suchitem. The storage container 10 can be placed in any suitable locationsuch as personal property or land, ships, drilling rigs, vehicles,hospitals, schools, retail stores, construction sites, mines, amongothers.

The storage container 10 further includes a verification component 12.The verification component 12 is configured to receive a portion of datafrom a user as input to determine whether the user is allowed access tothe storage container and/or inside of the storage container 10 thathouses items. In an example, the system 100 can utilize a lookup datatable that includes corresponding portions of data for each registereduser that has access to the storage container 10. Thus, if a portion ofdata is received by the verification component 12 and is containedwithin the lookup table (e.g., corresponding to a user based on a priorregistration), the user is allowed access. It is to be appreciated thatregistration for a user can be employed in various manners andregistration techniques are intended to be included with thisapplication.

For instance, a user can access the storage container 10 via theverification component 12 that is configured to receive a portion ofdata from the user. The portion of data can be, but is not limited to, aportion of biometric data, a code, a number, a letter, a barcode, aproximity sensor via wireless data transfer (e.g., Radio FrequencyIdentification (RFID), Near Field Communication (NFC), wirelesscommunication via a transmitter and a receiver, among others), a keypadentry, an identification badge, a security badge, among others. By wayof example, the biometric data can be a handprint, a fingerprint, aretinal scan of an eye, a portion of facial data of the operator, aheight of the operator, a weight of the operator, body-shape of theoperator, capacitance of operator based on body-mass index, amongothers. By way of example, the portion of data can further be, but isnot limited to, a username, a password, employee identification, imageidentification, or a combination thereof. For example, the imageidentification can be a barcode, a Quick Response (QR) code, a portionof a graphic, a logo, a three-dimensional (3D) barcode, among others.

Embodiments herein can utilize a multi-factor authentication employingtwo or more verification techniques to access one or more portions ofcontainer 10. For example, entered data, biometric data, and otherinformation can be evaluated in combination to complete verification.

Upon verification, the user can be allowed access to the storagecontainer. In a particular example, a lock mechanism 18 is released orengaged based upon whether or not a user is authorized or verified. Forinstance, a lock mechanism 18 can be a magnetic based lock that isreleased upon verification of a user to allow access to the storagecontainer. Lock mechanism 18 can be an electronic lock, or a lock withmechanical components that are controlled by associated electroniccomponents. For example, a user is verified by the verificationcomponent 12 prior as having access to inside the storage container 10by, for instance, a thumbprint. Once verified, the storage container 10allows access to the housed items by releasing or disengaging the lockmechanism 18. As discussed in more detail below, the verification canalso activate one or more cameras 14 (also referred to as camera systemand/or first camera, second camera, and the like).

The system 100 can further include a first camera focused on the userwhen opening or accessing the items and a second camera focused on theitems housed within the storage container 10. The system 100 can includea controller component 15 that is configured to initiate recording ordata collection from the cameras 14 based upon at least one of averification of the user via the verification component 12 or anunlocking of the lock mechanism 18 based upon approval of the user. Inanother example, the controller component 15 can initiate recording ordata collection based on motion sensing. It is to be appreciated thatthe controller component 15 can manage the lock mechanism 18 based onthe verification component 12, (e.g., access to the storage container10) as well as, management of tracking items removed or returned to thestorage container 10.

In a particular embodiment, the inventory system 100 can include astorage container 10 with shelves at a top position, a middle position,and a lower position respectively. While the illustrated embodimentshows three shelves, any number of shelves can be included. Each shelfcan include at least one corresponding camera to capture the area withimage or video, in addition to the camera capturing media of the user.Thus, the user is monitored during the interaction with the storagecontainer 10 to identify any removal or return of items to or from thestorage container 10. The cameras 14 can collect media (e.g., images,video, and the like) to capture the user and the items as the items arereturned or removed from the storage container 10. It is to beappreciated that any suitable number of shelves and/or cameras can beemployed with the subject innovation.

In an embodiment, the cameras 14 can be installed inside the storagecontainer 10 such that at least one camera is focused on the useraccessing the storage container 10 and one or more cameras are focusedon items within the storage container 10 (to track removal orreturning). Additionally, the cameras 14 can be remotely controlled tomove focus and/or aim to a different location.

In another embodiment, the cameras 14 can be attached to one or moredoors (e.g., on the inside of the doors) of the storage container 10,wherein the doors can be limited with motion as to ensure the cameras 14are focused on at least one of the items in the storage container 10and/or the user opening or accessing the storage container 10.

The system 100 can further include a scanner 16 (e.g., wireless orhard-wired, also referred to as a scanning device) which is contained orplaced within the storage container 10. A user, upon verification andaccess to the storage container 10 via verification component 12, canutilize the scanner 16 to indicate which items are removed or returned.For instance, a scanning of a first item can indicate the item is beingremoved and a second scan of the same item can indicate the item isbeing returned. It is to be appreciated that each item can include amarking component as an identifier to allow tracking of the quantity ofeach item housed within the storage container. In another embodiment, adevice (discussed below) can be used to track removal or return of anitem.

In another embodiment, the system 100 can utilize a scale system 46 thatis configured to measure a weight of one or more items housed within thestorage container 10 and determine whether the number of items changedbased on a change in weight. For instance, a number of items can have afirst weight and when one or more items are removed or returned, a newweight is detected by a scale system 46 to determine a number of items.This can be utilized in combination or in the alternative of one or morecameras to detect item removal or return.

The scale system 46 can use one or more algorithms to determine theaddition or removal of items. For example, upon impulse, the scalesystem 46 may pause for the weight detected to remain within a threshold(e.g., not varying by more than ten (10) grams) for a preset time (e.g.,for three (3) seconds) before an inventory removed or added iscalculated. In embodiments, one or more inventory items can be trackedby weight. Various tolerances and thresholds can be employed toaccurately track inventory without permitting fraud or abuse. Further,as discussed elsewhere herein, weight can function as one of amulti-factor test to confirm proper inventory tracking. Inventorytracking, including multi-factor inventory tracking, need not dealexclusively with the removal of inventory, but can also confirm orverify return, replacement, or complete use or exhaustion of previouslyaccessed inventory.

The system 100 can further include and/or work in conjunction with awireless tracking system (not shown) such as, but not limited to, RFID,NFC, or a suitable transmitter and receiver system on each item. Thewireless tracking system can be used to track each item and quantitiesof items housed within the storage container 10. In another example, thecameras 14 can track movement to determine whether or not an item isremoved or replaced/returned. Based on the tracked movements, thecontroller component 15 can manage an inventory within the storagecontainer 10.

In an embodiment, the controller component 15 monitors an amount of theitems based on at least one of the scanner 16 and/or recorded media fromcameras 14. Additionally, the controller component 15 stores at leastone of the portion of data, the scan, the recorded media, and/or anyother suitable data from the system 100 to a data store.

It is to be appreciated that the detail of tracking inventory items fromthe storage container 10 can be any suitable level based on use of thescanner 16, scale system 46, motion sensors, among others. The describedstorage container 10 can be employed with one or more of the describedfeatures in order to tailor to a particular environment. For instance,the system can be employed with cameras when the environment ormanagement of the environment is not concerned with tracking each amountof each item stored in the storage container 10 (e.g., user behavior isinfluenced by awareness of being recorded). In another embodiment, acamera tracking system can include the scanner 16 as well. In anotherexample, the scale system 46 can be used in combination or in thealternative of the scanner 16. For instance, an environment thatincludes items that are difficult to track due to size (e.g., small insize) can leverage cameras 14, as well as, the a scale system 46 ratherthan the scanner 16 (e.g., scanning small items can be difficult due tosize).

As alluded, a variety of techniques can be employed to track inventorywithin the system 100. In order to more accurately track inventorypresent, added, or removed, inventory can be marked in one or more waysfacilitating accurate identification. Accurate identification caninclude a multi-factor test applied based on activity related to thecontainer 10 (e.g., weight on scale reduced or increased, motion sensed,and others). For example, a blue pen can be accidentally replaced orbumped into the area designated for red pens. In this example, theweight of each red pen and blue pen is similar and a motion detectionmay be used to accurately track the inventor for the red pens and bluepens. Moreover, the total weight of all the items in a designated areacan be detected as well as the total weight of all items in an areasurrounding or proximate so as to detect any changes in weight that arebased on an item being placed in an area not designate for that item.

will result in an inaccurate inventory for both the red pens and theblue pens or pencils. Such activity may thwart highly accurate inventorymanagement.

In an embodiment, the system 100 can utilize a marking component (notshown) as an identifier. Marking can include any combination ofstickers, tags, bands, and other attachments or treatments. Such markingcan relate to color coding, defining reflective portions, definingportions having a known infrared signature, including differentpatterns, including magnetic portions, and so forth. Various machinevision techniques can be employed alone or in combination with scanners(e.g., scanner 16) or sensors (e.g., detectors used in combination withRFID technology, magnets, light intensity, and so forth) to accuratelyidentify specific inventory items.

Additional means for identifying the removal or replacement ofparticular items can include inventory holder 48. Inventory holder 48can be a standalone device or integrated into one or more portions ofcontainer 10. Inventory holder 48 can include one or more mechanical orelectrical means to detect the presence or absence of an item. Forexample, inventory holder 48 can retain a plurality of thumb drives.Based on whether a thumb drive is present, a mechanical closure may beheld open, or an electrical circuit may be held open, such that removalof the thumb drive closes the apparatus or circuit, triggering a signalto indicate the thumb drive was removed. In embodiments, inventoryholder 48 can be specially sized or configured to accept a specificinventory item. In alternative or complementary embodiments, inventoryholder 48 can be adapted to accept a plurality of different itemssimultaneously or at different times.

The system 100 can include a first power source 22 and a backup powersource 24 to provide power thereto. For instance, a first power source22 can provide power to the system 100 from a main line of power,wherein a backup power source 24 can provide power as a backup system inthe event power is unobtainable via the main line of power. Forinstance, the backup power source 24 can be, but is not limited to, abattery power source. In an embodiment, one or more of first powersource 22 and/or backup power source 24 can provide surge protection toprevent damage or outages. In an embodiment, the backup power source 24can operate as the power supply for continued extended use in the eventthe primary power supply (e.g., wired AC power) is interupted in theenvironment around the storage container 10 (e.g., a property wherestorage container 10 is deployed may experience a property-wide poweroutage, but backup power source 24 prevents impact on operationalcapability of storage container 10 and/or components thereof).

Backup power source 24 also allows system 100 to be moved withoutinterruption (e.g., powering down) of one or more electrically poweredcomponents. First power source 22 can be a primary (e.g., wired ACpower) cord, and this cord may be disconnected (e.g., from a wall plug).Backup power source 24 can keep system 100 energized until first powersource 22 is reconnected. First power source 22 can be reconnected in adifferent location after moving system 100.

In embodiments, backup power source 24 can be, at least in part, outsidecontainer 10. In alternative embodiments, backup power source 24 can bestored within container 10 (not pictured). In still additionalalternative or complementary embodiments, backup power source 24 caninclude multiple components or sources, some of which are stored incontainer 10, and some of which exist outside container 10. Power cable26 can link backup power source 24 to the power line through which firstpower source 22 or another power supply energizes the components ofsystem 100.

The system 100 can further include a notification component 20 that isconfigured to communicate a notification or signal. The notificationcomponent can generate at least one of an audible signal, a visiblesignal, a haptic signal, a wireless signal to another component ordevice, an email notification, among others. The notification component20 can be customized to transmit or display a signal based upon at leastone of a repair needed, a maintenance needed, a duration of time lapsed,a replenishment of inventory needed, a theft, an unauthorized access, adetected tampering (e.g., shaking, force detected, among others), andthe like. For instance, upon an item being below defined quantity, asignal can be communicated to replenish such item. Each time a signal iscommunicated or displayed from notification component 20, it can belogged into a data store.

System 100 can include a communications component 54. Communicationscomponent 54 can facilitate one or more techniques of wired or wirelessdata communication to transfer information for storage or analysis,transmit notifications, facilitate remote access, et cetera. Inembodiments, communications component 54 can be enclosed withincontainer 10. In alternative or complementary embodiments,communications component 54 exists, at least partially, outsidecontainer 10. In another example, communications component 54 can besubstantially housed in container 10, but include an external link, suchas antenna 32, external wiring, or other techniques.

The system 100 can further include a remote access to at least one ofthe storage container 10, the lock mechanism 18, the verificationcomponent 12, the cameras 14, the controller component 15, the scanner16, the power source 22, the backup power source 24, the notificationcomponent 20, the communications component 54 or a combination thereof.The remote access allows control of the system 100 from a location otherthan at the storage container 10. For instance, a remote access canallow control of the storage container 10 from a computer in a differentphysical location in comparison to the location of the storage container10. In another embodiment, a remote access can be from one network to asecond network hosting the storage container 10. It is to be appreciatedthat the network can be any suitable network such as, but not limitedto, a wireless network, LAN, WAN, Ethernet, Wi-Fi, local, remote,cloud-based, or a combination thereof. The remote access can be utilizedto manage video capture or media capture, access to the storagecontainer 10, turn on or off components, unlock or lock the storagecontainer 10, move or adjust cameras 14, access the scanner 16,communicate a signal from the notification component 20, among others.In another example, a remote access can be utilized to providetrouble-shooting (including, e.g. off-site trouble-shooting) to thesystem 100.

The system 100 can further be utilized to analyze usage, patterns, orpurchases of items based on the data collected related to items removed,returned, used, consumed, among others. For instance, a number of itemsin the storage container can be determined to have a particular lifetimeor last a specific amount of time based on historical data.Additionally, historical data can be used to determine a user that isconsuming or using too much of an item. It is to be appreciated thatinventory data collected can be used in various applications and isintended to be included with the subject innovation. In an embodiment,the controller component 15 is configured to provide an estimation ofconsumption for a plurality of items (e.g., the first item or the seconditem) based upon collected historical data related to removal of itemsfrom the storage container.

In an example, a user can interact with the storage container 10 with adevice, wherein the interaction can be a verification (e.g., viaverification component 12) or a logging of items (e.g., using a device,such as a scanner 16). It is to be appreciated that the device can be,but is not limited to being, a computer, a desktop machine, a tablet, aportable device, a portable digital assistant, a smartphone, a laptop, acomputing device, a portable gaming device, a game console, a devicethat can access the Internet, a kiosk, a terminal, a display, a surfacecomputing device, smart glass, a surface that interacts with a user'smotion or touch, and the like.

Although not depicted in FIG. 1 , it is to be appreciated that, in anembodiment, the controller component 15 can be a stand-alone component(as depicted in FIG. 5 ), incorporated into the storage container 10, ora suitable combination thereof. Similarly, it is to be appreciated that,in an embodiment, the verification component 12 can be a stand-alonecomponent (as depicted FIG. 5 ), incorporated into the storage container10, or a suitable combination thereof. Similarly, it is to beappreciated that, in an embodiment, the lock mechanism 18 can be astand-alone component (as depicted in FIG. 5 ), incorporated into thestorage container 10, or a suitable combination thereof. Similarly, itis to be appreciated that, in an embodiment, the camera(s) 14 can be astand-alone component (as depicted in FIG. 5 ), incorporated into thestorage container 10, or a suitable combination thereof. Similarly, itis to be appreciated that, in an embodiment, the power source 22 and/orbackup power source 24 can be stand-alone components (as depicted),incorporated into the storage container 10, or a suitable combinationthereof. Similarly, it is to be appreciated that, in an embodiment, thenotification component 20 can be a stand-alone component (as depicted inFIG. 5 ), incorporated into the storage container 10, or a suitablecombination thereof. In various embodiments, other components (e.g.,scanner 16, scale system 46, inventory holder 48, power cable 26,communication component 54) can be stand-alone components, incorporatedinto storage container 10, or combinations thereof.

The system 100 can store media from cameras, portions of data fromusers, registration data, inventory information, item data, among othersin a data store. It is to be appreciated that the data store can be, forexample, either volatile memory or nonvolatile memory, or can includeboth volatile and nonvolatile memory. The data store of the subjectsystems and methods is intended to comprise, without being limited to,these and other suitable types of memory. In addition, it is to beappreciated that the data store can be a server, a database, a harddrive, a flash drive, an external hard drive, a portable hard drive, acloud-based storage, a solid-state drive, and the like. The data storecan further be a local data store, a remote data store, a cloud-baseddata store, or a combination thereof.

Specifically shown in FIG. 3 , system 100 can include display component36 mounted to container 10. Display component 36 can display anyinformation, including information related to container 10, itsinventory, users, and other containers. In embodiments, displaycomponent 36 can display the inventory contained in summary oritem-by-item. In some embodiments, display component 36 can display astatus of container 10 related to its function (e.g., offline orrequiring service) or its inventory (e.g., items checked out orexhausted). In the event that container 10 requires service (e.g.,damaged, inventory requiring replenishment), display component 36 candisplay the location of nearby containers with one or more desiredinventory items. Display component 36 can be couple with one or moreother components (e.g., processors, memory) to receive data related tothe information presented on display component 36.

In alternative or complementary embodiments, display component 36 candisplay information about an inventory item, user, or group of users.For example, inventory information can include information about aninventory item, its cost, its expected lifespan or usage, and others. Inembodiments, a user's inventory usage can be displayed, such as thenumber or value of items utilized. In embodiments, display component 36can facilitate an account system where credits or debits are tracked byuser. In particular embodiments, the user can be given an inventory“allowance” where they will be prevented from accessing additionalinventory items after debits exceed a threshold. Finally, users orgroups of users can be displayed on display component 36 in terms oftheir total usage or efficiency, or comparative usage or efficiency inview of other users or groups.

Container 10 can include panels 28. In embodiments, panels 28 can betransparent or opaque. In such embodiments, panels 28 can enable viewingof at least a subset of inventory items in container 10. In alternativeembodiments, one or both of panels 28 are solid, preventing view intocontainer 10.

Closure 34 can be used to manually actuate opening or closing ofcontainer 10 once verification is complete via verification component12.

With specific reference to FIG. 4 , other aspects are depicted. Asshown, a plurality of cameras and motion sensors can be included withoutregard for their type, position, or arrangement. Container 10 mayinclude motor component 58, which can automatically open or close one ormore security features of container 10. For example, motor component 58can open one or both doors based on a verification. Motor component 58can be used alone or in combination with one or more camera(s) 14 (orother sensors). For example, when used with camera(s) 14, logicemploying imagery from camera(s) 14 (or other sensors) can be used toprevent harm to users or damage to inventory based on opening or closingof container 10.

Container 10 may include vending component 50. Vending component 50 may,upon proper verification via verification component 12 (or othercomponents), dispense one or more inventory items to a manual retrieval.Vending component 50 may be integrated into container 10, or may be astandalone device placed therein. For instance, the vending component 50can automatically release an item stored in the container 10 based uponverification, authentication, and the like. For instance, the vendingcomponent 50 can include multiple items with each item secured, whereinupon authentication or verification, one of the multiple items can beautomatically dispensed to a user. It is to be appreciated that theautomatic dispensing of the item from the container 10 can include atleast unlocking, unsecuring, releasing, delivering, or providing theitem to the user.

Container 10 may include one or more security sector components 38.Security sector 38 is secured by sector locking component 40. Based onverification via verification component 12 (or other components,including manual locks), security sector 38 may be unsecured to accesscontents. In this regard, security sector 38 can store specificinventory items whereby a user who does not have verificationcredentials to access security sector 38 can still access the remainderof container 10.

Container 10 may also include security box 42 having a box lockingcomponent 44. Like sector locking component 40, box locking component 44can be secured or unsecured based on one or both of verificationinformation from verification component 12 or other mechanisms. Boxcomponent can be fixed or movable within container 10, and deny at leasta portion of users access to contents of security box 42 while stillpermitting access to the remainder of container 10.

Container 10 can include single sides 60 and 62 separated by divider 52.Divider 52 prevents a user from accessing single side 60 or 62 when thedoor or closure covering this side is secured. For example, averification via verification component 12 can unsecure one door or halfof container 10, allowing a user to access only the permitted portionsof container 10. By separating single sides 60 and 62, divider 52 deniesusers lacking adequate verification level from accessing one side andthe inventory associated therewith.

The aforementioned systems, components, (e.g., storage container 10,camera(s) 14, verification component 12, controller component 15,scanner 16, lock mechanism 18, notification component 20, power source22, backup power source 24, among others), and the like have beendescribed with respect to interaction between several components and/orelements. It should be appreciated that such devices and elements caninclude those elements or sub-elements specified therein, some of thespecified elements or sub-elements, and/or additional elements. Furtheryet, one or more elements and/or sub-elements may be combined into asingle component to provide aggregate functionality. The elements mayalso interact with one or more other elements not specifically describedherein.

In an embodiment, an inventory system 100 is provided with the portionof data being at least one of a biometric data of the user, a barcode,an identification badge, a number, a code, a face detection of the user,a fingerprint of the user, or a wireless communication from the user. Inan embodiment, the inventory system 100 further includes a power source22 that supplies a portion of power to at least one of the wirelessscanning device 16, the camera system 14, the controller component 15,or the lock mechanism 18. In an embodiment, the inventory system 100further includes a backup battery power source 24 that supplies aportion of power upon the interuption of power to the power source 22.

In an embodiment, the inventory system 100 further includes a scalesystem 46 that measures a weight associated with at least one of thefirst item or the second item to determine at least one of the firstamount or the second amount. In an embodiment, the inventory system 100further includes a notification component 20 that is configured tocommunicate a notification based upon at least one of a service call, amaintenance, a repair, or a replenishment of the first item or thesecond item.

In an embodiment, the inventory system 100 further includes the wirelessscanning device providing a scan of a portion of the first item or aportion of the second item to indicate a return to the storage container10, wherein the controller component 15 is further configured to monitorthe return of at least one of the first item or the second item. In anembodiment, the inventory system 100 further includes a camera system 14that detects movement from the user to determine at least one of aremoval or a return of at least one of the first item or the seconditem.

As described above, a first camera can focus on a user in proximity toinventory system 100. A second camera may focus on at least a first areainside the storage container. In an embodiment, the camera system 14further includes a third camera and a fourth camera, wherein the thirdcamera focuses on a second area inside the storage container, and thefourth camera focuses on a third area inside the storage container.Additional cameras may be provided to focus on other areas in someembodiments. In an embodiment, the controller component 15 is furtherconfigured to provide an estimation of consumption for at least one ofthe first item or the second item based upon collected historical datarelated to removal of the first item or the second item from the storagecontainer 10.

In an embodiment, the system 100 can emit a signal in the event the doorof storage container 10 remains open (or is improperly closed) for aspecified duration of time (e.g., 35 seconds, among others) after beingpermitted to open (e.g., via verification component 12 and/or lockmechanism 18). For example, container 10 can alert via a signal in theevent a user forgets to close or incorrectly closes the door to accesscontainer 10. In this example, the alert signal indicates to those inthe vicinity of container 10 that the door needs to be closed.

In an embodiment, an inventory management system 100 is provided thatincludes at least the following: a container 10 with at least one openside; doors 30 including at least a first door that closes a firstportion of the open side; a second door that closes a second portion ofthe open side; a locking component 18 that secures the first door andthe second door; a verification component 12 that selectively unsecuresand resecures at least one of the first door and the second door basedon a verification input, wherein the verification input controls thelocking component 18; an inventory tracking component that assesses aninventory quantity within the container; and a controller component 15that records the inventory quantity to a database.

In the embodiment, the container can include a display component 36 thatdisplays information related to at least one of a user associated withthe verification input, the inventory quantity, the inventory managementcontainer, or a group of users, wherein the display component 36 is atleast one of accessible outside the container or viewable from a user infront of the first door or the second door. In the embodiment, thecontainer 10 can include a first power source 22 and a second powersource, wherein at least one of the first power source 22 and the secondpower source is a battery backup 24. In the embodiment, the at least oneof the first power source 22 and the second power source is enclosedwithin the container 10.

In the embodiment, at least one of the first door and the second door isat least partially transparent (panels 28, or other portions). In theembodiment, the container 10 can include a security sector, wherein theverification component 12 selectively unsecures and resecures thesecurity sector based on the verification input. In the embodiment, theinventory tracking component includes a scale component 46 thatascertains an item within the container 10 based on at least a weight ofthe item. In the embodiment, the inventory tracking component includesan inventory holder 48 that holds an item within the container 10. Inthe embodiment, the inventory tracking component includes a vendingcomponent 50 that automatically dispenses an item from the container 10to a user.

In an embodiment, a system is provided that includes at least thefollowing: means for retaining an inventory in an enclosure; means forverifying a user requesting the inventory with a user verification;means for permitting access to the enclosure based on the userverification; means for capturing an image related to the user; meansfor capturing an image related to the inventory; means for determiningremoval of the inventory; and means for recording removal of theinventory in a data. It is to be appreciated that an enclosure is ahousing that includes a volume. It is to be appreciated that anyenclosure or container can be chosen with sound engineering judgmentwithout departing from the intended scope of the subject innovation.

Turning to FIG. 6 , illustrated is an extension of system 100 whereby amanagement component 200 receives information from (and, in embodiments,transmits information to) controller component 15. Specifically,management component 200 can receive inventory information, locationinformation, user information, group information, and other data thatcan be used in inventory management. Management component 200 can trackand forecast inventory usage, and be used to automate service orreplenishment to container 10. Management component 200 can analyzecontainer 10 and inventory utilization for a single container 10 oracross an enterprise in multiple locations and with different usersand/or functional groups. Management component 200 can identify trends,and flag users, locations or groups which are statistically aberrant interms of unusually high usage, replenishment requirements, or service.Fraud or theft can be tracked. Coordination between multiple containers(e.g., container 10 and another container) in terms of orderinginventory, replenishment, service, et cetera, can be effected.

Management component 200 can track efficiency or usage by individualuser or group, and provide reports related thereto. Further, users mayutilize container 10 to request particular inventory not present orsubmit messages to personnel involved in inventory management, which canbe enabled using communication between controller component 15 andmanagement component 200.

Management component 200 can improve enterprise efficiency by reducinginventory replenishment costs. For example, in addition to forecastingand tracking usage within the enterprise, management component 200 cantrack and forecast pricing from inventory suppliers. Pricing trends,bulk offers, alternative suppliers, coupons, et cetera, can be trackedusing network connections, and management component 200 can identifyopportune times for the enterprise associated with container 10 to savecosts by buying or delaying purchase of inventory. In embodiments,strike conditions can be manually set or inferred by managementcomponent 200, and purchasing can be automated using managementcomponent 200. Ultimately, resource planning related to at least theinventory stored in container 10 and associated devices can be effectedusing management component 200.

With reference to FIG. 7 , illustrated is an example general-purposecomputer 710 or computing device (e.g., desktop, laptop, server,hand-held, programmable consumer or industrial electronics, set-top box,game system, et cetera). The computer 710 includes one or moreprocessor(s) 720, memory 730, system bus 740, mass storage 750, and oneor more interface components 770. The system bus 740 communicativelycouples at least the above system components. However, it is to beappreciated that in its simplest form the computer 710 can include oneor more processors 720 coupled to memory 730 that execute variouscomputer executable actions, instructions, and or components stored inmemory 730.

The processor(s) 720 can be implemented with a general purposeprocessor, a digital signal processor (DSP), an application specificintegrated circuit (ASIC), a field programmable gate array (FPGA) orother programmable logic device, discrete gate or transistor logic,discrete hardware components, or any combination thereof designed toperform the functions described herein. A general-purpose processor maybe a microprocessor, but in the alternative, the processor may be anyprocessor, controller, microcontroller, or state machine. Theprocessor(s) 720 may also be implemented as a combination of computingdevices, for example a combination of a DSP and a microprocessor, aplurality of microprocessors, multi-core processors, one or moremicroprocessors in conjunction with a DSP core, or any other suchconfiguration.

The computer 710 can include or otherwise interact with a variety ofcomputer-readable media to implement one or more aspects of the claimedsubject matter. The computer-readable media can be any available mediathat can be accessed by the computer 710 and includes volatile andnonvolatile media, and removable and non-removable media. By way ofexample, and not limitation, computer-readable media may comprisecomputer storage media and communication media.

Computer storage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules, or other data. Computer storage media includes, but isnot limited to memory devices (e.g., random access memory (RAM),read-only memory (ROM), electrically erasable programmable read-onlymemory (EEPROM), et cetera), magnetic storage devices (e.g., hard disk,floppy disk, cassettes, tape . . . ), optical disks (e.g., compact disk(CD), digital versatile disk (DVD), et cetera), and solid state devices(e.g., solid state drive (SSD), flash memory drive (e.g., card, stick,key drive, et cetera), et cetera), or any other medium which can be usedto store the desired information and which can be accessed by thecomputer 710.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of any ofthe above should also be included within the scope of computer-readablemedia.

Memory 730 and mass storage 750 are examples of computer-readablestorage media. Depending on the exact configuration and type ofcomputing device, memory 730 may be volatile (e.g., RAM), non-volatile(e.g., ROM, flash memory . . . ) or some combination of the two. By wayof example, the basic input/output system (BIOS), including basicroutines to transfer information between elements within the computer710, such as during start-up, can be stored in nonvolatile memory, whilevolatile memory can act as external cache memory to facilitateprocessing by the processor(s) 720, among other things.

Mass storage 750 includes removable/non-removable, volatile/non-volatilecomputer storage media for storage of large amounts of data relative tothe memory 730. For example, mass storage 750 includes, but is notlimited to, one or more devices such as a magnetic or optical diskdrive, floppy disk drive, flash memory, solid-state drive, or memorystick.

Memory 730 and mass storage 750 can include, or have stored therein,operating system 760, one or more applications 762, one or more programmodules 764, and data 766. The operating system 760 acts to control andallocate resources of the computer 710. Applications 762 include one orboth of system and application software and can exploit management ofresources by the operating system 760 through program modules 764 anddata 766 stored in memory 730 and/or mass storage 750 to perform one ormore actions. Accordingly, applications 762 can turn a general-purposecomputer 710 into a specialized machine in accordance with the logicprovided thereby.

All or portions of the claimed subject matter can be implemented usingstandard programming and/or engineering techniques to produce software,firmware, hardware, or any combination thereof to control a computer torealize the disclosed functionality. By way of example, and notlimitation, controller component 15, cameras 14, verification component12, other components or aspects herein, or portions thereof, can be, orform part of, an application 762, and include one or more programmodules 764 and data 766 stored in memory 730 and/or mass storage 750whose functionality can be realized when executed by one or moreprocessor(s) 720.

In accordance with one particular embodiment, the processor(s) 720 cancorrespond to a system on a chip (SOC) or like architecture including,or in other words integrating, both hardware and software on a singleintegrated circuit substrate. Here, the processor(s) 720 can include oneor more processors, as well as, memory at least similar to processor(s)720 and memory 730, among other things. Conventional processors includea minimal amount of hardware and software and rely extensively onexternal hardware and software. By contrast, a SOC implementation ofprocessor is more powerful, as it embeds hardware and software therein,that enables particular functionality with minimal or no reliance onexternal hardware and software. For example, the controller component15, the cameras 14, verification component 12, and/or associatedfunctionality can be embedded within hardware in a SOC architecture.

The computer 710 also includes one or more interface components 770 thatare communicatively coupled to the system bus 740 and facilitateinteraction with the computer 710. By way of example, the interfacecomponent 770 can be a port (e.g; serial, parallel, PCMCIA, USB,FireWire, et cetera) or an interface card (e.g., sound, video, etcetera) or the like. In one example implementation, the interfacecomponent 770 can be embodied as a user input/output interface to enablea user to enter commands and information into the computer 710 throughone or more input devices (e.g., pointing device such as a mouse,trackball, stylus, touch pad, keyboard, microphone, joystick, game pad,satellite dish, scanner, camera, other computer, et cetera). In anotherexample implementation, the interface component 770 can be embodied asan output peripheral interface to supply output to displays (e.g., CRT,LCD, plasma . . . ), speakers, printers, and/or other computers, amongother things. Still further yet, the interface component 770 can beembodied as a network interface to enable communication with othercomputing devices (not shown), such as over a wired or wirelesscommunications link.

Turning to FIGS. 8-13 , the storage container 10 is illustrated inanother embodiment. The storage container 10 is illustrated withouthinged doors in FIGS. 8-13 and it is to be appreciated based on at leastthe above description that the storage container 10 can include two ormore doors hinged thereto. For example, each door can include one ormore cameras attached or removeably coupled to a corner of an interiorside of the door or a center edge of an interior side of one of thedoors. FIG. 9 illustrates the storage container 10 in a front view. FIG.10 illustrates the storage container 10 in a rear view. FIG. 11illustrates the storage container in a right side view (with the leftside view being a mirror image of the right side view. FIG. 12illustrates the storage container 10 in a top perspective view. FIG. 13illustrates the storage container 10 in a bottom perspective view.

The storage container 10 can be configured to vend a stored item to auser based on verification of the user, unlocking the doors, andmonitoring access of the user and/or the stored item before verication,during verification, during access, and after the doors are secured. Ina particular example, the storage container 10 can be energy efficientby maintaining a low energy state. The low energy state can includehaving cameras off, internal lighting off, and powering only thecontroller component 15 and/or the verification component 12. Uponverification of a user or upon activation of a keypad or screen thatcommunicates with a user to determine verification, a camera, fixed toan exterior of the storage container 10, can be activated to capture whoaccesses or activated the keypad or screen to begin verification. Afterverification, the locks for the doors can be deactivated. Upondeactivation of the doors, a sensor can detect when a door is opened topower or activate one or more cameras that monitor the contents of thestorage container 10. The cameras can be located on an interior side ofat least one door and preferably in a corner (opposite of a hinged side)of a door or at a center edge (opposite of a hinged side) of a door. Thecameras can be aimed to the internal area of the storage container 10when the doors are approximately at a 90 degree in comparison to a frontside of the storage container 10. As discussed, the storage container 10includes a motion limiting device that restricts motion of at least onedoor so as to provide a line of site for the camera. This allows acamera to capture what is being taken out of the storage container 10.

The storage container 10 can include a first sidewall 806, a secondsidewall 808 opposite the first sidewall 806, a top 810, a bottom 812opposite the top 810, and a backwall 804. Inside the storage container10 can include one or more shelves 802. The shelf or shelves 802 cansupport one or more items and in particular, can support a container816. The container 816 can house one or more items that are secured inthe storage container 10. As discussed above, the shelf 816 can includea corresponding camera on an interior side of a door to capture whetheritems have been removed from the container 816. The camera can be at aheight location on the interior side of the door that corresponds to aheight of the shelf 816 inside the storage container 10.

The shelf or shelves 802_can be removably coupled to an inside wall(e.g., backwall 804, first sidewall 806, second sidewall 808, top 810,bottom 812). For instance, an overlapping configuration (e.g., edgefitting or supported by a hook on an inside wall) can be used in whichan edge of the shelf 802_can be engaged into a hook coupled orintegrated onto the inside wall. In another embodiment, the shelf 802can be stationary and non-removeably affixed by a weld. In addition toan overlapping configuration, the shelf 802_can be removeably coupled tothe storage container 10 or inside the storage container 10 by a screw,bolt, weld, tongue and groove configuration, hook configuration, pegconfiguration, and the like.

The shelf 802 can be angled or slanted to allow for at least one of aline-of-site for a camera or for a user, wherein the line-of-site allowsfor a view into the storage cabinet 10 and the container 816. The shelf802 can include a rectangular shape in which there is a front side(e.g., closest to the front of the storage container 10) and a backside(e.g., closest to the back of the storage container 10) opposite thefront side. The backside can be raised a distance above the front sideof the shelf 802. In particular, the inside walls can include a firstset of hooks on two or more locations on the inside walls on a firstplane and a second set of hooks on two or more locations on the insidewalls on a second plane, wherein the first plane and the second planecan be separated by a distance. The distance can be above or below inwhich the first plane can be higher than the second plane or the secondplane can be higher than the first plane. It is to be appreciated thatthere can be a number of planes for the sets of hooks so as to customizethe distance between one or more shelves and/or the angles of theshelves 802. For instance, a frontside of the shelf 802 can be affixedto a first set of hooks on a first plane and the backside of the shelf802 can be affixed to a second set of hooks on a second plane, whereinthe second plane is a distance above the first plane providing an anglein comparison to a ground level of where the storage container 10 islocated. Based on which hooks the edge of the shelf is engaged into cantranslate into a level shelf (e.g., level compared to a ground level) ora raised shelf 802 (where the backside of the shelf 802 is raised higherthan the front side of the shelf 802), or a lowered shelf (where thefront side of the shelf 802 is higher than the backside of the shelf802). It is to be appreciated that the height of the shelf 802 can bemanually adjusted, automatically adjusted, or a combination thereof.

In order for the container 816 to be stationary on a raised or angledshelf 802, the container 816 can include a magnet 1410 to maintain alocation of the container 816 on the shelf 802. The magnet 1410 can beaffixed to a bottom of the container 816, wherein the magnetism to ametal or metallic-based shelf 802 allows restriction of movement. Themagnet 1410 can be affixed to a suitable location on the container 816.In an embodiment, the magnet 1410 can be affixed to the container 816with a glue, apoxy, an adhesive, and the like. The storage container 10can include one or more containers 816 each having a magnet or magnetsto allow for customized layouts for contiainers and such layouts haverestricted movement due to the magnetism to the shelf 802. The storagecontainer 10 can include an “N” number of containers, each having arespective size or shape, where N is a positive integer.

In addition to a magnet, the container 816 can utilize a pad or materialthat has a high coefficient of friction to reduce movement on an angledor raised shelf 802. In another embodiment, the container 816 caninclude a sticker or tacky material on the bottom of the container 816.

Turning to FIG. 14 , a cross-sectional view 1400 of the shelf 802 isillustrated. The shelf 802 can have a front side 1406 and a backside1408, wherein the backside 1408 is higher than the front side 1406 incomparison to a groundlevel 1404. This configuration of the shelf 802 inFIG. 14 allows for the shelf 802 to have an angle 1402, wherein theangle can be approximatelys zero (0) degrees to approximately sixty (60)degrees. In an embodiment, the angle 1402 can be nine (9) degrees.

FIG. 14 further illustrates a first container 816 and a second container816, each having a respective magnet 1410. It is to be appreciated thatthe containers can be oriented side-by-side or front-to-back (asdepicted), or a combination thereof. The angle 1402 allows a firstline-of-site 1412 for a camera that captures the removal or return ofitems housed by each container 816. The angle 1402 further allows asecond line-of-site 1414 for a user to view items housed by eachcontainer 816.

It is to be appreciated that the height of the shelf 802 can be manuallyadjusted, automatically adjusted, or a combination thereof. For example,a height of the shelf 802 or angle of the shelf 802 can be adjustedbased on a parameter, wherein the parameter is a user, a height of auser, a title of a user, a security clearance of a user, an amount ofmoney dispensed into the storage unit 10, an inventory of an item on ashelf 802, an amount removed of a requested item by a user, a user'shistorical data related to accessing the storage container 10, and thelike. In another embodiment, the angle of the shelf 802 can correspondto an accessibility of items on the shelf 802. For example, a flat oreven (compared to groundlevel) can indicate unrestricted items or itemson that flat or even shelf.

In an embodiment, the storage container 10 can identify a user anddetermine a height of such user. The height of the user can be utilizedto adjust a height of the shelf 802 and/or an angle of the camera inorder to capture the inside of the storage cabinet 10 withoutrestriction of view. For example, a taller user can have the shelf orshelves 802 be angled with the front side 1406 higher than the backside1408. In another example, a shorter user can have the shelf or shelvesbe angled with the front side 1406 lower than the backside 1408.Moreover, based on the height of the user, the camera aim orline-of-site to capture imagery can be adjusted such that a taller userwould correspond to an up-angled view from the camera to the inside ofthe storage cabinet 10 and that a shorter user would correspond to adown-angled view from the camera to teh inside of the storage cabinet10. In another embodiment, an average height of users that can accessthe storage cabinet 10 can be used as a baseline height for thecamera(s) line-of-site and/or the angle 1402 of the shelf or shelves802, wherein if a user is above the baseline, an adjustment is made forthe camera or the shelf.

FIGS. 15-18 illustrate the container 816. The container 816 can houseone or more items, wherein the container 816 can be a size, shape,color, or fabricated by a material (e.g., metal, plastic, polymer,alloy, and the like). In a particular embodiment, the container 816 canbe fabricated out of a plastic having a bright green tint. FIG. 15 is afront view of the container 816 having a magnet attached. FIG. 16 is aside view of the container 816 having a magnet attached. FIG. 17 is atop view of the container 816 having a magnet attached. FIG. 18 is aperspective view of the container 816 having a magnet attached. It is tobe appreciated that the magnet 1410 and/or the container 816 can be anysuitable shape or size that holds a volume and can be chosen by soundengineering judgment.

As described above, systems and methods herein include various computerhardware and software aspects. In some embodiments described above, openor closed networks between containers and associated circuits and logiccan be used to integrate inventory management end-to-end throughbusiness units, locations, or entire enterprises. Information can beaggregated and shared between containers as well. Computers not directlyassociated with container systems can also be used to access, display,and process information generated from container systems.

In an example, iteration of an inventory activity utilizing suchcombined hardware and logic, a system begins by authenticating a user,wherein such authentication can be biometric, a password, an ID badgescan, magnetic stripe, barcode, an input from a user, among others.Thereafter, a container of the system can be un-secured to allow accessto allow one or more items to be accessed. In embodiments, a barcodescanner is provided to track taking or returning items, and the userscans a barcode on the item to identify such taking or returning. Theinformation gleaned from the barcode scanner can, in some embodiments,be corroborated by information from another sensor (e.g., scale).Alternatively, another sensor can be utilized in place of a barcodescanner. During this time, a video camera can also be recording theactivity. The container can be closed and re-secured after the desireditems are removed and accounted for. After the transaction is complete,or at regular intervals, information can be retrieved from the system.Retreival of information can be performed locally or remotely, andautomatically or manually with human interaction. This information canbe stored in a database facilitating review and management of inventoryinformation. The database can be leveraged by administrators andmanagers, as well as, supply personnel who can use system information toreplenish inventory and forecast demand. Notifications can be generatedand transmitted to ensure the appropriate personnel are aware whenaction is required (e.g., inventory low, specific item taken, fraud orabuse). The information can be, but is not limited to, information offrequency of use of the item, number of items taken, number of itemsreturned, information related to a condition of the item, a record ofwho is taking an item, a record of who is returning an item, a record ofa duration of time the item was used, tracking of a job the item wasused, among others. Information may be connected to various outsidesystems for replenishment, asset tracking, reporting among others.

Turning back to FIG. 2 , the storage container 10 is illustrated. In anembodiment, at least one of the first door or the second door can becoupled with at least one door extension arm 11 that includes a firstend and a second end opposite thereto. The door extension arm 11 canfurther include means to provide a force to open and/or close the doorwithout a users input or effort. The door extension arm 11 can beattached at a top of the door, a bottom of the door, or a combinationthereof. The other end of the door extension arm 11 can be secured to apoint located on the frame or structure of the storage container. Thedoor extension arm 11 biases the door towards an open position. Inanother embodiment, the door extension arm 11 can be used to bias thedoor towards a closed position. Moreover, a first pair of door extensionarms can be used on a first door (e.g., located at the top and bottom ofthe first door) and a second pair of door extension arms can be used ona second door (e.g., located at the top and bottom of the second door).

By way of example, if a door extension arm 11 is coupled to the seconddoor, the first door secures the second door shut when the doors are ina closed position. When a user opens the first door, the door extensionarm 11 imposes an outward force, causing the second door to openautomatically. Door extension arm 11 can comprise at least one of aspring, a pneumatic piston, a hydraulic piston, or a combination thereofto provide a force to open and/or close the door.

With further reference to FIG. 2 , cameras 14 may also exist on anyexterior surface of the storage container 10. A camera 14 may be mountedon either side or the back of the storage container 10. This placementof the camera 14 allows for viewing or surveillance of the immediatearea surrounding the storage container 10 and can view any person orthing approaching the storage container 10 regardless of what directionthe person or thing comes from.

Turning back to FIG. 5 , the storage container 10 is illustrated withadditional features and embodiments. The storage container 10 furthercomprises an air purifying and/or filtration system 19 (further referredto as “air purifying system”) that is configured to receive air frominside the storage container 10 and filter this air with an air filterand pump the filtered air to the inside of the storage container 10. Itis to be appreciated that the air purifying system 19 can be locatedwithin the storage container 10, outside the storage container 10, or acombination thereof. Air purifying system 19, for example, can utilizean air pump and a filter. By way of example and not limitation, thefilter can be a HEPA filter, ionic air filter, activated carbon filter,Ultraviolet (UV) light air filter, among others. Air purifying system 19can maintain the interior of the storage container 10 free from excessdust, particulates, odors, or fumes with the circulation of air insidevia the pump and the filter.

Referring back to FIG. 8 , the storage container 10 is illustrated andcan be supported by one or more adjustable feet 818 wherein the verticalposition of each of the four adjustable feet 818 is individuallyadjustable to account for uneven floors or surfaces. Adjustable foot 818can include a base portion and a shaft portion. The base portion can beany shape, including circular, polygon-shaped, triangle-shaped, orsquare-shaped, and is in contact with the ground or surface the storagecontainer 10 is situated. The shaft portion is attached to the baseportion on one end and is engaged with the bottom surface or frame ofstorage container 10 on its other end. In an embodiment, the shaftportion is threaded and is vertically adjustable by way of rotating theshaft portion. In certain embodiments, an adjustable foot 818 can beengaged with the storage container 10 at each of the storage container's10 four bottom corners. Vertically adjusting an individual adjustablefoot 818 can cause the respective corner of the storage container 10 tobe raised or lowered. In this manner, the storage container 10 may belevelled or tilted by way of raising or lowering the adjustable feet 818as desired. It is to be appreciated that the adjustable feet 818 can belocated on the corners, the perimeter of the base, within the middle ofthe base, or any other location that can be beneficial to ensure thestorage container is level. In another embodiment, a customizable systemfor the adjustable feet 818 can be employed with the storage container10 such that a user can place the adjustable feet on the base of thestorage unit at user-defined locations. Such feet can be attached tocaster type wheels or be installed by themselves in addition to wheels,or without wheels altogether.

As further seen in FIG. 8 , a customizable partition system isillustrated. The customizable partition system can include partitionswithin or on each shelf 802. The customizable partition system caninclude a first partition 820 and/or a second partition 822, whereineach can be arranged within the storage container 10 to create one ormore compartments on the shelf 802. It is to be appreciated that thefirst partition 820 and the second partition 822 can be used together orindependently. First partition 820 comprises a magnetic base portion821. In other embodiments, the first partition's base portion 821 maycomprise other means of attachment such as hook-and-loop connectors(e.g. Velcro), adhesive, screw attachments, suction cups, mountinghooks/loops, among others. The magnetic base portion 821 removeablyattaches flush with the inside surface of the back wall 804 of thestorage container 10. A divider member 823 can extend perpendicular tothe magnetic base portion 821. In an embodiment, the divider member 823extends from a center of the magnetic base portion 821, creating a “T”shaped partition. Second partition 822 comprises a magnetic base portion824. In other embodiments, the second partition's base portion 824 maycomprise other means of attachment such as hook-and-loop connectors(e.g. Velcro), adhesive, screw attachments, suction cups, mountinghooks/loops, among others. The magnetic base portion 824 removeablyattaches flush with an inside surface of either the first side wall 806or second side wall 808. A barrier member 825 extends perpendicular tothe magnetic base portion 824. In an embodiment, the barrier member 825extends from one end of the magnetic base portion 825, creating an “L”shaped partition.

The first partition 820 and second partition 822 can be arranged orpositioned in such a manner that the divider member 823 of the firstpartition 820 and the barrier member 825 of the second partition 822meet perpendicularly to form a compartment on the shelf 802 with thefirst partition 820 forming a side of the compartment and the secondpartition 822 forming a front end of the compartment. In embodiments,multiple first partitions 820 and multiple second partitions 822 arearranged to create a plurality of compartments within the interior ofthe storage container 10 on the shelf 802 or on a plurality of shelves802.

FIG. 19 shows a perspective view of an embodiment of an inventory system1900. The inventory system 1900 can be used with a shipping container, astorage room, a truck trailer, a storage unit, a room rented to storeitems, a barn, a shed, a tent, a garage, a mobile home, a truck body,among others. The system 1900 can be employed with a shipping containerthat is removeably coupled to a truck trailer or semi. For instance atruck trailer system can include a vehicle and a removable trailer. Incertain embodiments, the removable trailer can be attached andtransported via either a truck or a train. The removable trailer orstorage room can have a double-door on an end that allows access to aninterior. Often, the removable trailer can be transported to a location.The removable trailer can be placed in any suitable location such aspersonal property or land, ships, drilling rigs, vehicles, hospitals,schools, retail stores, construction sites, mines, among others. Thisremovable trailer can be adapted to become an inventory system 1900. Itis to be appreciated that a type of a removable trailer can be ashipping container. The inventory system 1900 is illustrated in FIG. 19as a shipping container but it is to be appreciated that any suitableroom or trailer or compartment can be utilized with the subjectinnovation. For the below description and ease of readability, ashipping container 1900 is described. The shipping container 1900encloses an interior. Shipping container 1900 can be any size thataccommodates the entry of a user as well as providing space for storingitems. For example, the shipping container 1900 can have a widthcorresponding to a trailer or truck. For example, the shipping containercan have a width of 8 feet, 9 inches which corresponds to a standardtruck width. The length of the shipping container 1900 can vary as well.For example, the shipping container 1900 can be a 52 foot-long traileror a 10 foot, 20 foot, or 40 foot-long container.

Shipping container 1900 can have a first entry door 1902 that providesaccess to a security barrier 1910 within the interior of the shippingcontainer 1900. In an embodiment, an external verification component1904 can be located adjacent to the first entry door 1902. The externalverification component 1904 is configured to receive a portion of datafrom a user as input to determine whether the user is allowed access tothe shipping container 1900 through the first entry door 1902. Firstentry door 1902 can have a locking component. In an embodiment, thelocking component is magnetically actuated. In other embodiments, thelocking component is a mechanical lock and/or a latch system that canreceive a padlock. External verification component 1904 deactivatesfirst entry door's 1902 locking component upon proper user verification.In the embodiment of the shipping container 1900 being a removabletrailer for a truck, the first entry door 1902 can be double-doors thatare latched and secured with a padlock, wherein the externalverification component 1904 is not used.

Security barrier 1910 can include a second entry door 1906. The secondentry door 1906 can provide a user access to a secure room upon properuser verification or validation. It is to be appreciated that the secondentry door 1906 can include additional security features to gain accessin comparison to the first entry door 1902. For example, the first entrydoor 1902 can include a latch and padlock for security measures, whereinthe second entry door 1906 can include internal verification component1908 in addition to a locking component (e.g., padlock or magneticlock). By way of example, the security barrier 1910 can be a metal fencethat is adjustable in width and height to account for a size of theshipping container 1900 dimensions. In certain embodiments, securitybarrier 1910 can be a solid wall. The security barrier 1910 can beadjustable to accommodate shipping containers of various widths orsizes. For example, the security barrier can have detachable extensionpieces that can be added or removed, or it may consist of telescopingparts that can be extended or contracted to fit the width of theshipping container 1900.

In an embodiment, an internal verification component 1908 can be locatedon the security barrier 1910 adjacent to the second entry door 1906. Theinternal verification component 1908 is configured to receive a portionof data from a user as input to determine whether the user is allowedaccess to the secure room through the second entry door 1906. The datareceived from the user can be data from a security badge, a lanyard, acode, a PIN, an employee number, a combination of digits or letters, auser name, among others. Second entry door 1906 can have a lockingcomponent. In an embodiment, the locking component is magneticallyactuated. In other embodiments, the locking component is a mechanicallock. Internal verification component 1908 deactivates second entrydoor's 1906 locking component upon proper user verification, providingthe user access to the secure room. In some embodiments, an exit buttonexists inside of the secure room. When a user activates the exit button,the second entry door's 1906 locking component disengages, allowing theuser to exit the secure room through the second entry door 1906. Infurther embodiments, another exit button may be used in a similarfashion to disengage the first entry door's 1902 locking mechanism inorder to allow the user to exit through the first entry door 1902 inorder to allow exit in case of an emergency.

The inventory system 1900 can house various shelving 1916. The shelvingcan hold one or more items 1914. The inventory system 1900 can alsoinclude a control enclosure 1912 which comprises a controller component15. In an embodiment, the inventory system 1900 can also house ascanning device 16 which may be removabely docked on top of or inside ofthe control enclosure 1912. In some embodiments, a command sheet ishoused within the inventory system 1900. A user can utilize the scanningdevice 16 to scan a barcode or an indicia on the command sheet toprovide instructions to the controller component 15. For example, a usercan scan a bar code printed on the command sheet that instructs thecontroller component 15 to undo the last scan or action. As anotherexample, a user can scan a bar code printed on the command sheet tonotify the controller component 15 that the next scan input representsan item that is going to be accessed, borrowed, or taken.

The inventory system 1900 can also comprise a camera system having oneor more cameras 1918. In certain embodiments, a camera 1918 can bemounted on an exterior wall of the shipping container 1900. The camera1918 can be mounted in such a way to focus and record an image of a userapproaching or standing at the first entry door 1902. A camera 1918 mayalso be located within the first entry door 1902, but in front of thesecurity barrier 1910. This camera 1918 can be mounted in such a way tofocus and record an image of a user standing at the second entry door1906. In further embodiments, cameras 1918 can be mounted inside of thesecure room. For example, any number of cameras 1918 can be mounted onany of the interior walls of the secure room or mounted in any of thefour corners of the secure room. A digital video recorder system can beused to keep records of the camera footage. This system can allow a useror administrator to view camera footage that is stored on a computerharddrive. This digital video recorder system and harddrive can belocated within the shipping container 1900 or they can be locatedexternal to the shipping container 1900.

With further reference to FIG. 19 , cameras 1918 may also exist on anyexterior surface of the shipping container 1900. A camera 1918 may bemounted on either side or the back of the shipping container 1900. Thisplacement of the camera 1918 allows for viewing or surveillance of theimmediate area surrounding the shipping container 1900 and can view anyperson, vehicle, object, or large products approaching the shippingcontainer 1900 regardless of what direction the person or thing comesfrom.

Turning now to FIG. 20 , one embodiment of the inventory system 2000includes a container 2002. It should be appreciated that the inventorysystem 2000 can include any of the components and features as describedwith respect to inventory system 1900. The inventory system 2000 can befully enclosed by a plurality of exterior walls and a roof 2004. Theinventory system 2000 can further include a wireless tracking systemconfigured to track a collection of items stored within the container2002 that are available to a user. The wireless tracking system caninclude a wireless transceiver 2006 mounted to an exterior surface ofthe container 2002. In certain embodiments, the wireless transceiver2006 can be a radio frequency identification (RFID) transceiver. In oneembodiment, the wireless transceiver 2006 can be mounted to the roof2004 of the container 2002. In other embodiments, the wirelesstransceiver 2006 can be mounted to exterior walls of the container 2002.The wireless transceiver 2006 can be configured to transmit atransmission signal 2008 towards an area 2010 outside of the first entrydoor 2012 of the container 2002.

A wireless transmitter 2014 can be affixed to an item 2016 of thecollection of items stored within the container. In certain embodiments,the wireless transmitter 2014 can be a passive radio frequencyidentification (RFID) transmitter. The wireless transmitter 2014 can bepre-programmed with an identifier that corresponds to the item 2016. Incertain embodiments, the identifier can be a serial number, a name, aproduct description, among others. Upon entering the area 2010 coveredby the transmission signal 2008, the wireless transmitter 2014 canreceive the transmission signal 2008, which energizes the wirelesstransmitter 2014 and causes the wireless transmitter 2014 to emit areturn signal that contains the identifier. The return signal can bereceived by the wireless transceiver 2006, which can transmit the returnsignal to a controller component 15 by way of a wired signal or awireless signal. In certain embodiments, the wireless transceiver 2006can communicate with the controller component 15 by way of a coaxialconnection, ethernet, fiber-optic, wi-fi, Bluetooth, among others.

Turning now to FIG. 21 , an exemplary wireless transceiver 2006 ismounted to a roof 2004 of the container 2002 by way of a bracket 2018.The bracket 2018 can be configured to allow a user to bend the bracket2018 in at least one dimension to adjust an angle 2020 of the wirelesstransceiver. For example, a user can bend the bracket 2018 upwards ordownwards to adjust the angle 2020 of the wireless transceiver 2006 toan angle of between 0 degrees and 90 degrees, inclusive, as measuredfrom a horizontal plane extending from the roof 2004. Bending thebracket 2018 can allow a user to modify the direction of thetransmission signal 2008 transmitted from the wireless transceiver 2006and locate a desired position of the area 2010 in which the transmissionsignal 2008 reaches, in a first direction. In other embodiments, a usercan also twist or rotate the bracket 2018 to adjust the direction of thetransmission signal 2008 transmitted from the wireless transceiver 2006and locate a desired position of the area 2010 in which the transmissionsignal 2008 reaches, in a second direction perpendicular to the firstdirection. In one embodiment, a user can adjust the direction of thetransmission signal 2008 such that the area 2010 is located immediatelyoutside of the first entry door 2012 such that a user cannot carry anitem having a wireless transmitter 2014 into or out of the first entrydoor 2012 without the wireless transceiver 2006 detecting a returnsignal from the wireless transmitter 2014. In one embodiment, a user canadjust the direction of the transmission signal 2008 such that thetransmission signal 2008 avoids contact with any metallic surfaces,which would cause reflections of the transmission signal 2008 andtherefore unpredictable location of the area 2010.

Turning now to FIGS. 22 and 23 , an exemplary bracket 2018 is shown. Thebracket 2018 can include a first mounting portion 2022 and a secondmounting portion 2024, which are each flat, and include one or moreholes 2026 for receiving one or more fasteners such as screws or nailsfor mounting into a surface of the container 2002 such as the roof 2004.The bracket 2018 can further include a middle portion 2028 extending inbetween the first mounting portion 2022 and the second mounting portion2024. The middle portion 2028 can be flat. In certain embodiments, themiddle portion 2028 can connect to the first mounting portion 2022 at afirst end by way of a first bend 2030, and to the second mountingportion 2024 at a second end by way of a second bend 2032. In oneembodiment, the first bend 2030 and the second bend 2032 can connect tothe middle portion 2028 and the respective mounting portion each at 45degree angles. It should be appreciated that the angles at which thefirst bend 2030 and the second bend 2032 connect with the other portionscan be independently adjusted and/or bent by a user to achieve a desiredangle 2020 of transmission signal 2008.

FIG. 24 depicts a flow chart of a method 2400 for tracking a collectionof items. At reference numeral 2402, the wireless transceiver 2006transmits a transmission signal 2008 towards an area 2010 outside of anentrance 2012 to the container 2002. When a wireless transmitter 2014affixed to an item 2016 enters the area 2010, it can be energized by thetransmission signal 2008. In response to being energized by thetransmission signal 2008, the wireless transmitter 2014 can transmit areturn signal that contains an identifier corresponding to an item 2016associated with the wireless transmitter 2014. At reference numeral2404, the wireless transceiver 2006 receives the return signal from thewireless transmitter 2014 that is affixed to an item 2016 of acollection of items. The wireless transceiver 2006 can transmit thereturn signal and/or the identifier contained within the return signalto a controller component 15. At reference numeral 2406, the controllercomponent 15 identifies the item 2016 based upon the return signal. Forexample, the controller component 15 can identify the item 2016 basedupon the identifier contained in the return signal by comparing theidentifier to a database of items.

Within the controller component 15 or a memory in communication with thecontroller component 15, a first status and a second status can bestored for each item. The first status can provide an indication ofwhether the particular item is currently checked-in or checked-out. Achecked-in status indicates that the particular item is likely currentlylocated within the container 2002. A checked-out status indicates thatthe particular item has been removed from the container 2002. The secondstatus can provide an indication of whether the particular item is aconsumable item or a non-consumable item. A consumable item is an itemthat, when checked-out, is not intended to be returned. For example, aconsumable item may be used and discarded by a user or may be an itemthat is only used once. Examples of consumable items are food items,disposable utensils, disposable gloves, face masks, ear plugs, nails,screws, among others. A non-consumable item is an item that, whenchecked-out is intented and expected to be returned. Examples ofnon-consumable items are hand tools such as hammers, screw drivers, andpliers, and power tools such as drills, saws, among others.

At reference numeral 2408, the controller component 15 determineswhether the first status of the item 2016 is checked-in or checked out.If the first status of the item 2016 is checked-out, then the method2400 proceeds to reference numeral 2410 where the controller component15 changes the first status to “checked-in”. In this situation, theinventory system detects that the item 2016, which was currentlychecked-out, is being brought back and returned by a user. On the otherhand, if the first status of the item 2016 is checked-in, then themethod 2400 proceeds to reference numeral 2412, where the controllercomponent 15 determines whether the second status indicates that theitem 2016 is consumable or non-consumable. In this situation, theinventory system detects that the item 2016, which was currentlychecked-in, is being removed and checked-out by a user.

If the second status indicates that the item 2016 is a consumable item,the method 2400 proceeds to reference numeral 2414, where the controllercomponent 15 removes the item from inventory. To achieve this, thecontroller component 15 can, for example, remove the item from adatabase, or decrease a quantity of the item. In this situation, theinventory system detects that a consumable item is being taken by auser, without the expectation of the item being returned. On the otherhand, if the second status indicates that the item 2016 isnon-consumable, the method 2400 proceeds to reference numeral 2416,where the controller component 15 changes the first status of the item2016 to “checked-out”. In this situation, the inventory system detectsthat a non-consumable item is being taken by a user, and there is anexpectation that the item will be returned at a later time.

While aspects herein have generally been described in reference tomanagement of office supplies, it is understood that systems and methodsherein can be applied to other environments as well. For example,container systems herein can be used in food service, laboratoryenvironments (including “clean rooms”), and others.

In the specification and claims, reference will be made to a number ofterms that have the following meanings. The singular forms “a”, “an” and“the” include plural referents unless the context clearly dictatesotherwise. Approximating language, as used herein throughout thespecification and claims, may be applied to modify a quantitativerepresentation that could permissibly vary without resulting in a changein the basic function to which it is related. Accordingly, a valuemodified by a term such as “about” is not to be limited to the precisevalue specified. In some instances, the approximating language maycorrespond to the precision of an instrument for measuring the value.Moreover, unless specifically stated otherwise, a use of the terms“first,” “second,” etc., does not denote an order or importance, butrather the terms “first,” “second,” etc., are used to distinguish oneelement from another.

As used herein, the terms “may” and “may be” indicate a possibility ofan occurrence within a set of circumstances; a possession of a specifiedproperty, characteristic or function; and/or qualify another verb byexpressing one or more of an ability, capability, or possibilityassociated with the qualified verb. Accordingly, usage of “may” and “maybe” indicates that a modified term is apparently appropriate, capable,or suitable for an indicated capacity, function, or usage, while takinginto account that in some circumstances the modified term may sometimesnot be appropriate, capable, or suitable. For example, in somecircumstances an event or capacity can be expected, while in othercircumstances the event or capacity cannot occur—this distinction iscaptured by the terms “may” and “may be.”

This written description uses examples to disclose the invention,including the best mode, and also to enable one of ordinary skill in theart to practice the invention, including making and using devices orsystems and performing incorporated methods. The patentable scope of theinvention is defined by the claims, and may include other examples thatoccur to one of ordinary skill in the art. Such other examples areintended to be within the scope of the claims if they have structuralelements that do not differentiate from the literal language of theclaims, or if they include equivalent structural elements withinsubstantial differences from the literal language of the claims.

What is claimed is:
 1. An inventory system, comprising: a containerhaving a first entry door that provides access to a security barriercontained within the container, the security barrier having a secondentry door; a verification component located on the security barrieradjacent to the second entry door that is configured to receive aportion of data from a user to complete a verification of the user; alock mechanism for the second entry door that secures an access throughthe second entry door, allowing the user to enter a secure room locatedwithin the container, based upon the verification of the user, whereinthe secure room is defined by the security barrier, a rear wall oppositethe security barrier, a first sidewall, and a second sidewall oppositethe first sidewall; a wireless tracking system configured to track acollection of items stored within the container that are available tothe user, the wireless tracking system comprises: a wireless transmitteraffixed to an item of the collection of items within the container; anda wireless transceiver mounted to an exterior surface of the container,wherein the wireless transceiver is configured to transmit atransmission signal towards an area outside of the first entry door andreceive a return signal from the wireless transmitter when the wirelesstransmitter is energized by the transmission signal; and a controllercomponent that is configured to determine an inventory of the collectionof items in the container based at least partially on the wirelessreturn signal received by the wireless transceiver of the wirelesstracking system.
 2. The inventory system of claim 1, wherein thewireless transceiver is an RFID transceiver.
 3. The inventory system ofclaim 1, wherein the wireless transceiver is mounted on an outsidesurface of the container.
 4. The inventory system of claim 3, whereinthe wireless transceiver is mounted on a roof of the container at anangle between 0 degrees and 90 degrees, inclusive, as measured from ahorizontal plane extending from the roof.
 5. The inventory system ofclaim 1, wherein the wireless transceiver is mounted to the containerusing a bracket configured to bend in at least one dimension to adjustan angle of the wireless transceiver.
 6. The inventory system of claim1, wherein the controller component is configured to store a firststatus of each item of the collection of items, wherein the first statuscomprises an indication of whether each item is checked-in orchecked-out.
 7. The inventory system of claim 6, wherein the controlleris configured to, upon receiving the wireless return signal from thewireless transmitter: upon determining that the item has a checked-infirst status, change the first status to checked-out, or upondetermining that the item has a checked-out first status, change thefirst status to checked-in.
 8. The inventory system of claim 6, whereinthe the controller component is configured to store a second status ofeach item of the collection of items, wherein the second statuscomprises an indication of whether each item is consumable ornon-consumable.
 9. The inventory system of claim 8, wherein thecontroller component is configured to, upon determining that the itemhas a second status of consumable and the first status changes tochecked-out, remove a record of the item from the inventory of thecollection of items.
 10. The inventory system of claim 9, wherein thecontainer is constructed of a material configured to prevent thetransmission signal from entering the container.
 11. The inventorysystem of claim 1, wherein the wireless return signal comprises anidentifier corresponding to the item.
 12. A wireless tracking systemconfigured to track a collection of items stored within a container, thewireless tracking system comprises: a wireless transmitter affixed to anitem of the collection of items within the container; and a wirelesstransceiver mounted to an exterior surface of the container, wherein thewireless transceiver is configured to transmit a transmission signaltowards an area outside of an entrance to the container and receive awireless return signal from the wireless transmitter when the wirelesstransmitter is energized by the transmission signal; and a controllercomponent that is configured to determine an inventory of the collectionof items in the container based at least partially on the wirelessreturn signal received by the wireless transceiver of the wirelesstracking system.
 13. The wireless tracking system of claim 12, whereinthe wireless transceiver is an RF ID transceiver.
 14. The wirelesstracking system of claim 12, wherein the wireless transceiver is mountedon a roof of the container, above the first entry door, and at an anglebetween 0 degrees and 90 degrees, inclusive, as measured from ahorizontal plane extending from the roof.
 15. The wireless trackingsystem of claim 12, wherein the controller component is configured tostore a first status of each item of the collection of items, whereinthe first status comprises an indication of whether each item ischecked-in or checked-out, and wherein the controller is furtherconfigured to, upon receiving the wireless return signal from thewireless transmitter: upon determining that the item has a checked-infirst status, change the first status to checked-out, or upondetermining that the item has a checked-out first status, change thefirst status to checked-in.
 16. The wireless tracking system of claim15, wherein the the controller component is configured to: store asecond status of each item of the collection of items, wherein thesecond status comprises an indication of whether each item is consumableor non-consumable; and upon determining that the item has a secondstatus of consumable and the first status changes to checked-out, removea record of the item from the inventory of the collection of items. 17.The wireless tracking system of claim 12, wherein the wireless returnsignal comprises a serial number corresponding to the item.
 18. A methodfor tracking a collection of items comprising: transmitting atransmission signal from a wireless transceiver mounted to an exteriorsurface of a container towards an area outside of an entrance to thecontainer; receiving a wireless return signal from a wirelesstransmitter affixed to an item of the collection of items; identifyingthe item based upon the return signal; determining, upon receipt of thereturn signal, whether a first status corresponding to the item iseither checked-in or checked-out; and updating the first status of theitem by: upon determining that the item has a checked-in first status,change the first status to checked-out, or upon determining that theitem has a checked-out first status, change the first status tochecked-in.
 19. The method of claim 18, further comprising: determining,upon receipt of the wireless return signal, whether a second statuscorresponding to the item is either consumable or non-consumable. 20.The method of claim 19, further comprising: upon determining that theitem has a second status of consumable and the first status changes tochecked-out, remove a record of the item from the inventory of thecollection of items.