High security wireless key for asynchronous delivery drop boxes

ABSTRACT

A wireless key ( 6 ), capable of transmitting an ultra-low frequency radio wave signal ( 5 ), is used to gain access to a secure receptacle ( 1 ), the wireless key ( 6 ) and receptacle ( 1 ) comprising a system to ensure the secure transfer or delivery of items between parties typically engaging in e-commerce. The wireless key ( 6 ) possesses a means to discriminate against the unauthorized entry of the receptacle, such as through the use of buttons to enter a secure access code. The wireless key ( 6 ) accepts an access code entry from the user desiring entry to the receptacle ( 1 ) and subsequently transmits an ultra-low frequency signal ( 5 ) to a receiving and processing means ( 4 ). If the analysis of the signal indicates the user of the wireless key ( 6 ) is authorized to gain entry to the receptacle ( 1 ), the receptacle&#39;s locking mechanism ( 3 ) is disengaged to allow entry.

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This application claims priority from and incorporates byreference U.S. Provisional Patent Application No. 60/228,555, filed onAug. 28, 2001.

BACKGROUND OF THE INVENTION

[0002] The present invention relates to the secure transfer of retailgoods between a delivery carrier and a consumer. With the advent ofe-commerce, a consumer can order a retail good through the Internet orother telecommunications means and the delivery carrier must make adelivery to the consumer and at a time that is potentially inconvenientfor the consumer to receive the order. To deliver the retail goods tothe consumer, the parties will make use of a secure drop box orreceptacle that possesses a lock to prevent unauthorized parties, suchas thieves, from accessing the drop box.

[0003] Currently, many secure receptacles employ a keypad which isphysically integrated with the secure receptacle. When a deliverycarrier or consumer desires to gain access to the secure receptacle, anaccess code is entered using the keypad. Keypads thus provide some levelof security, but the access code may be compromised through either thedirect observation of an authorized party entering the code, or bydetermining which keys have been previously depressed by inspecting thekeys of the keypad.

[0004] Therefore, there is a need to increase the means by whichsecurity of drop boxes can be increased to ensure the delivery of retailgoods to a consumer.

SUMMARY OF THE INVENTION

[0005] The present invention is directed towards a system for thedelivery of retail goods to a secure receptacle. A wireless keytransmitting an access code allows entry to the secure receptacle uponthe successful processing of the access code and the subsequentdisengagement of the secure receptacle's locking mechanism.

DESCRIPTION OF THE DRAWINGS

[0006]FIG. 1 shows the wireless key transmitting an unlocking signal tothe antenna cooperatively positioned within the secure receptacle.

[0007]FIG. 2 shows one embodiment of the wireless key.

[0008]FIG. 3 shows a cellular telephone acting as a wireless key througha geographically distanced central server.

[0009]FIG. 4 shows a two-way pager acting as a wireless key through ageographically distanced central server.

[0010]FIG. 5 shows a home computer acting as a wireless key through ageographically distanced central server.

[0011]FIG. 6 shows a wireless key in which the programmable memory andcentral processing unit of the wireless key determine whether the accesscode is authorized before a signal is transmitted to the antenna that isphysically integrated with a secure receptacle.

[0012]FIG. 7 shows a wireless key in which unlocking signals are sent tothe secure receptacle and the central processing unit and programmablememory integrated with the secure receptacle determine whether theaccess code entered into the wireless key is authorized.

[0013]FIG. 8 shows the process associated with the use of a wirelesskey, one access code, and a secure receptacle in the secure delivery ofretail goods.

[0014]FIG. 9 shows the process associated with the use of a wirelesskey, a keypad, two access codes, and a secure receptacle in the securedelivery of retail goods.

[0015]FIG. 10 shows the process associated in the use of an icon thatinforms a consumer about how much space is left in that consumer'ssecure receptacle as an order for retail goods is placed.

DETAILED DESCRIPTION OF THE INVENTION

[0016] The present invention is directed to a system that uses awireless key and a secure receptacle in the transfer of retail goodsbetween a consumer and a delivery carrier. The system, through the useof the wireless key, possesses several means to discriminate againstthose parties who are not authorized to use the wireless key for gainingaccess to the secure receptacle.

[0017] A retail good in the present invention comprises any good orservice that a consumer can purchase remotely from a supplier, such asthrough the Internet or over the telephone, and involves the delivery orpickup of a tangible item. Such retail goods, for example, includeperishable and packaged dry goods, pharmaceutical prescriptions, andbeverages. In addition, retail goods include items associated withconvenience services. For example, movie rentals and the dry cleaning ofclothing are retail goods as envisioned in this invention, although such“products” are closely related to the performance of a service. Thepresent invention contemplates a retail good as anything which can bedelivered and picked up at a consumer's residence by a delivery carrierand stored in a secure receptacle. Thus, the present inventioncontemplates the transfer of retail goods, which includes not only thedelivery of items, but also the pickup of items.

[0018] The secure receptacle is designed to safely guard retail goodsbetween the times that the retail goods are transferred between the userof the secure receptacle, the consumer, and the delivery carrier for thesupplier. In order for a delivery carrier to access the securereceptacle to either pickup or deliver a retail good, the securereceptacle must be located in a place that is accessible to the rest ofthe public. Thus, to protect against thieves and other unauthorizedpersons, two variables must be addressed in securing the receptacle:securing the interior so that the contents of the receptacle remainsafe, and securing the receptacle itself so as to minimize the risk ofthe theft of the receptacle itself.

[0019] Securing the receptacle itself may be accomplished by many means,such as attaching the receptacle to the exterior side of a house orbolting the bottom of the interior to the ground. However, the preferredembodiment of the invention is to secure the bottom of the securereceptacle (1) to a separate platform base (2), as shown in FIG. 1, thathas a large weight, such as 120 pounds. A platform base of this massallows the receptacle to be moved relatively easy, yet provides adeterrent to theft.

[0020] The receptacle possesses a locking mechanism (3), as shown inFIG. 1, coupled with a central processing unit to prevent unauthorizedaccess to the contents of the receptacle. The locking mechanism isdisengaged by the central processing unit (4) only if an unlockingsignal (5) is transmitted from the wireless key (6) and ultimatelyreceived by the antenna (7) and processed as acceptable by the centralprocessing unit (4). The unlocking signal in the preferred embodimentcomprises an ultra-low frequency radio wave.

[0021] Those skilled in the art will recognize that many differentelectronic embodiments are possible to produce a device that comprises awireless key. One embodiment of the invention, as shown in FIG. 2,contemplates a wireless key (6) that possesses ten buttons (8) and isconveniently shaped to be about the size of a credit card. The wirelesskey furthermore possesses a central processing unit that controls thetransmission of the unlocking signal, and a programmable memory forstoring the access code known by a party authorized to use the wirelesskey. Upon the entry of an access code, the central processing unitcompares the entry to that stored in the first programmable memory. Ifthe entered access code correctly matches the access code stored in thememory, an unlocking signal will be transmitted by the wireless key whenthe user of the wireless key presses an “OPEN” button (9).

[0022] The following examples further illustrate, without limitation,how a wireless key can be used with a secure receptacle.

EXAMPLE 1

[0023] In one embodiment of a system for the secure delivery of a retailgood, as shown in FIG. 3, a wireless key comprising a cellular telephone(20) and possessing a plurality of buttons to enter an access codetransmits a first unlocking signal (21) to a geographically distantcentral server (22), the wireless key being physically separate from asecure receptacle and typically stored in locations inaccessible tounauthorized users of the secure receptacle. A receiving unit (23),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (22). The receiving unit receives a second unlockingsignal (24) from the geographically distant central server. The centralprocessing unit of the receiving unit (23) processes the secondunlocking signal (24), whereupon a locking mechanism (25) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 2

[0024] In one embodiment of a system for the secure delivery of a retailgood, as shown in FIG. 4, a wireless key comprising a two-way pager (30)and possessing a plurality of buttons to enter an access code transmitsa first unlocking signal (31) to a geographically distant central server(32), the wireless key being physically separate from a securereceptacle and typically stored in locations inaccessible tounauthorized users of the secure receptacle. A receiving unit (33),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (32). The receiving unit receives a second unlockingsignal (34) from the geographically distant central server. The centralprocessing unit of the receiving unit (33) processes the secondunlocking signal (34), whereupon a locking mechanism (35) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 3

[0025] In one embodiment of a system for the secure delivery of a retailgood, as shown in FIG. 5, a wireless key comprising a home computer witha modem (40) transmits a first unlocking signal (41) to a geographicallydistant central server (42), the wireless key being physically separatefrom a secure receptacle and typically stored in locations inaccessibleto unauthorized users of the secure receptacle. A receiving unit (43),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (42). The receiving unit receives a second unlockingsignal (44) from the geographically distant central server. The centralprocessing unit of the receiving unit (43) processes the secondunlocking signal (44), whereupon a locking mechanism (45) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 4

[0026] In a further embodiment of the invention, as shown in FIG. 6, areceiving unit comprises an antenna (50) and a first central processingunit (51). The receiving unit is cooperatively positioned within asecure receptacle, the first central processing unit (51)communicatively connected to the antenna (50), and the antennacommunicatively connected to a transmitter of a wireless key (52) via awireless link (53). The wireless key comprises a programmable memory(54), a second central processing unit (55), and a transmitter (52), thewireless key being physically separate from the secure receptacle andtypically stored in locations inaccessible to unauthorized users of thesecure receptacle. The wireless key further possesses a plurality ofbuttons (56), the plurality of buttons being used to enter an accesscode. The second central processing unit (55) of the wireless keyproceeds to determine whether the access code entered is consistent withthe access code stored in the programmable memory (54). Upon the centralprocessing unit (55) determining that the access code entered isacceptable, the transmitter (52) of the wireless key transmits a signalto the antenna (50) when the user pushes the “OPEN” button. The firstcentral processing unit (51) receives a signal from the antenna (50) andsubsequently disengages the locking mechanism (57) to allow access tothe interior of the secure receptacle.

EXAMPLE 5

[0027] Another embodiment of the invention, as shown in FIG. 7, involvesa receiving unit comprising an antenna (60), a programmable memory (61),and a central processing unit (62). The receiving unit is cooperativelypositioned within a secure receptacle, with the central processing unit(61) communicatively connected to the antenna (60) and the programmablememory (62), and the antenna communicatively connected to a transmitter(63) of a wireless key via a wireless link (64). The wireless keycomprises a transmitter (63) that transmits a plurality of unlockingsignals in sequential order, with one unlocking signal being sent uponthe pushing of one of the plurality of buttons (65) of the wireless key.The plurality of unlocking signals are received by the antenna (60) andprocessed by the central processing unit (61). If the sequence ofunlocking signals transmitted by the wireless key is consistent with theaccess code stored in the programmable memory (62), the centralprocessing unit (61) disengages the locking mechanism (66) of the securereceptacle, thereby allowing the user of the wireless key access to theinterior of the receptacle.

EXAMPLE 6

[0028] The invention is further directed towards a process for thedelivery of a retail good, the steps comprising the programming at leastone programmable access code into a programmable memory (shown as 70 inFIG. 8); the ordering through a first telecommunications device by auser at least one retail good from a supplier (shown as 71 in FIG. 8);delivering at least one retail good by the supplier to a securereceptacle (shown as 72 in FIG. 8); the user entering a user access codeinto a wireless key (shown as 73 in FIG. 8), the wireless key beingphysically separate from the secure receptacle to avoid accessibility byunauthorized parties; processing the user access code entered into thewireless key (shown as 74 in FIG. 8); and disengaging a lockingmechanism of the secure receptacle (shown as 75 in FIG. 8), therebyallowing the user to gain access to at least one retail good previouslyordered and delivered.

EXAMPLE 7

[0029] In a further embodiment of the invention as shown in FIG. 9, aprocess for the delivery of a retail good employs two access codes, onethat is entered through the use of a wireless key, the second which isentered through a keypad that is physically integrated with the securereceptacle. The process associated with the use of two access codescomprises the steps of programming at least one primary programmableaccess code into a first programmable memory that is integrated with thewireless key (shown as 80 in FIG. 9); programming at least one secondaryprogrammable access code into a second programmable memory (shown as 81in FIG. 9), the second programmable memory being integrated a keypadmounted to the secure receptacle; a user of a secure receptacle orderingat least one retail good from a supplier and the delivery of the orderto the secure receptacle by the supplier's delivery carrier, entering aprimary user access code by the user into a wireless key (shown as 82 inFIG. 9), the wireless key being physically separate from the securereceptacle; entering a secondary user access code by the user into akeypad (shown as 83 in FIG. 9), the keypad being physically integratedto the secure receptacle; processing the primary user access codeentered into the wireless key and the secondary user access code enteredinto the keypad (shown as 84 in FIG. 9); and disengaging the lockingmechanism of the secure receptacle (shown as 85 in FIG. 9), therebyallowing the user to gain access to at least one retail good previouslyordered and delivered.

EXAMPLE 8

[0030] A further embodiment of the invention is directed towards aprocess to inform the consumer of how much space remains in his or hersecure receptacle as more and more items are ordered. Of course, thesecure or efficient delivery of items may be frustrated if too manyitems are ordered and they must either be left unattended by the securereceptacle or delivered at another time. Accordingly, when the consumeris placing an order through the Internet, an icon is presented whichinforms the consumer about the amount of space remains in his or herreceptacle for the purchase of further retail goods. The processencompasses the ordering a plurality of retail goods through theInternet (shown as 90 in FIG. 10); providing a secure receptacle to theuser with a predefined volume to which the plurality of retail goodswill be delivered by a delivery carrier; calculating the percent volumea retail good ordered by the consumer will occupy in the securereceptacle when the retail good is placed in the secure receptacle by adelivery carrier (shown as 91 in FIG. 10); summing the percent volumefor each retail good ordered by the user to obtain a total percentvolume occupied by the plurality of retail goods; indicating the totalpercent volume to the user through the Internet while the user isordering the plurality of retail goods (shown as 92 in FIG. 10); andresetting the total percent volume to zero after the user removes theplurality of retail goods from the secure receptacle.

EXAMPLE 9

[0031] In another embodiment of the invention, a first unlocking signalis sent by the wireless key via a cellular wireless network, in whichthe wireless key can be a cellular telephone or a RIM 902M Radio Modemthat is manufactured by Research in Motion, Ltd. The buttons of suchdevices are used to input the access code known by a party havingauthorization to gain entry to the secure receptacle. Upon the input ofthe access code, the unlocking signal is transmitted via the cellularnetwork to a central server. The central server processes the unlockingsignal and sends a second unlocking signal to a modem that is foundwithin the interior of the secure receptacle. The modem is coupled to acentral processing unit, the central processing unit in turn beingcoupled to a programmable memory and a locking mechanism for thereceptacle. Upon the modem receiving the second unlocking signal, thecentral processing unit coupled to the programmable memory determineswhether the second unlocking signal is consistent with the access codestored within the programmable memory. If the second unlocking signal isconsistent, the central processing unit disengages the locking mechanismof the receptacle, thereby allowing entry.

[0032] The wireless key in any of the embodiments of the inventionpossesses several means to discriminate against those who attempt totransmit an unlocking signal from the wireless key but are notauthorized to do so. First, the wireless key is not attached to thesecure receptacle and when not in use is stored in a location typicallyinaccessible to unauthorized users. Thus, the wireless key operates as aremote control and is only likely to be in the possession of only thoseparties who are authorized to gain access to the secure receptacle. Onlyunder certain scenarios will an unauthorized party have possession ofthe wireless key, such as when the wireless key is lost or stolen.

[0033] Other embodiments of the wireless key also enhance security. Inone embodiment of the invention, the wireless key possesses a pluralityof buttons or means for entering data on the face of the wireless key.To gain access to the secure receptacle, an access code must be enteredby depressing or pushing a combination of these buttons in a specificand predetermined sequence. The buttons may be labeled with alphanumericindicia or color indicia.

[0034] For example, the wireless key may have ten buttons labeled withthe numbers 0-9, respectively, with an access code consisting of athree-digit number which must be entered using the wireless key. Anotherexample involves a wireless key possessing six buttons that uses colorto distinguish between the different buttons, with the access codeconsisting of a color sequence, such as red-blue-red-yellow. Thoseskilled in the art will recognize that the use of alphanumeric and colorindicia to create access restrictions will have many variations, both inthe number of buttons possessed by the wireless key and the number ofalphanumeric or color indicia that are used to create an access code.

[0035] The wireless key may employ other means which are capable ofdistinguishing an authorized user of the wireless key from anunauthorized user. As discussed above, knowledge of an access codedistinguishes between authorized and non-authorized users. However,other criteria involving knowledge may be used, such as birth dates,maiden names, and social security numbers. In other embodiments,authorized and unauthorized users can also be distinguished by the useof physical characteristics of the authorized user. Examples of thismethod include voice printing and finger printing, wherein the wirelesskey possesses a means to distinguish the voice or finger print of anauthorized user from an unauthorized user. A Breathalyzer can also beintegrated into any of the above embodiments of the wireless key toensure the sobriety of the authorized user.

[0036] In the embodiments in which knowledge-based criteria are used todistinguish authorized users from non-authorized users, an additionallevel of security is gained by the ability to alter such knowledge-basedaccess codes. This allows an authorized party to change an access codeto prevent others who once had knowledge of the previous access codefrom now gaining access to the receptacle.

[0037] In another embodiment of the invention, a wireless key is used inconjunction with a keypad that is physically integrated with the securereceptacle. An authorized user desiring access to the secure receptaclewill enter a primary access code into the wireless key and a secondaryaccess code into the keypad. The primary access code will be processedin accordance with the means previously disclosed, while the secondaryaccess code will be processed with a central processing unitcommunicatively coupled to the keypad. Upon the processing of both theprimary and secondary access codes, the locking mechanism of the securereceptacle is disengaged.

[0038] A knowledge-based access code may be altered by many means, andthe method employed is dependent upon the embodiment of the invention.For example, if the wireless key directly transmits the unlocking signaldirectly to the wireless link that is contained within the interior ofthe receptacle as previously described, both the programmable memory ofthe wireless key and the programmable memory of the wireless link mustbe edited. The programmable memory of the wireless key can be programmedusing a programming device, such as internally through the use ofbuttons contained on the wireless key. For example, depressing the“OPEN” and “0” button simultaneously will allow a new access code to beentered and stored within the programmable memory of the wireless key.The programmable memory of the wireless link can be similarly programmedusing a keypad attached to the receptacle and coupled to the centralprocessing unit.

[0039] The programming of at least one programmable access code into aprogrammable memory can be accomplished by several means. The userdesiring to use a certain access code can access a web site to designatethe desired access code. When the delivery carrier is delivering aretail good to the secure receptacle, the delivery carrier's wirelesskey downloads the desired programmable access code from the web site.The carrier's wireless key then transmits the desired access code via alow frequency signal to a wireless link physically integrated with thesecure receptacle. The desired access code is subsequently uploaded tothe programmable memory.

[0040] In a further embodiment of the invention, the programming of atleast one programmable access code into a programmable memory can beaccomplished through the use of the Internet. The user enters thedesired access code through the use of a web site. The desired accesscode is downloaded to a modem from the web site through the Internet.The modem is physically integrated with the secure receptacle andcommunicatively coupled to the programmable memory. After downloadingthe desired access code from the web site, it is uploaded to theprogrammable memory.

[0041] The programming of at least one programmable access code into aprogrammable memory can further be accomplished through the use of akeypad physically integrated with the secure receptacle andcommunicatively coupled to the programmable memory. The user enters thecode using the keys of the keypad and the desired code is uploaded tothe programmable memory.

What is claimed is:
 1. A system for the secure delivery of a retail goodcomprising: a wireless key comprising a first cellular telephone thattransmits a first unlocking signal to a geographically distant centralserver, the wireless key physically separate from a secure receptacle, areceiving unit, the receiving unit comprising a central processing unitcommunicatively connected to a programmable memory, the receiving unitcooperatively positioned with the secure receptacle and communicativelyconnected to the geographically distant central server, said receivingunit receiving a second unlocking signal from the geographically distantcentral server, the secure receptacle comprising a cover and a body, thebody defining an interior within the secure receptacle, the bodyconfigured to possess an opening from which a retail good can be placedor removed from the interior of the secure receptacle, and the bodyfurther dimensioned to receive a plurality of retail goods, the securereceptacle further comprising a locking mechanism communicativelycoupled to the central processing unit and cooperatively positioned tosecurely engage the cover against the body and over the opening, therebypreventing access to the interior of the secure receptacle whendesirable, at least one access code stored in the programmable memory,of which one of the secure access codes comprises a current secureaccess code, and the wireless key further comprising a face and aplurality of buttons, the plurality of buttons located on the face, acombination of the buttons comprising the current secure access code, asuccessful entry of the current secure access code using the buttonsresulting in the processing of the second unlocking signal by thecentral processing unit and the subsequent release of the lockingmechanism to allow the cover to be displaced from over the opening ofthe secure receptacle.
 2. The system of claim 1, wherein the pluralityof buttons comprise buttons marked with alphanumeric indicia.
 3. Thesystem of claim 1, wherein the programmable memory stores more than onecode, and a code system contained in the programmable memory andexecuted by the central processing unit selects the current access code.4. The system of claim 1, wherein the geographically distant centralserver is communicatively connected to the receiving unit through theInternet.
 5. The system of claim 1, wherein the receiving unit furthercomprises a pager, the pager communicatively connected to the centralprocessing unit.
 6. The system of claim 1, wherein the receiving unitfurther comprises a second cellular telephone, the second cellulartelephone communicatively connected to the central processing unit. 7.The system of claim 1, wherein the receiving unit further comprises amodem, the modem communicatively connected to the central processingunit.
 8. The system of claim 1, wherein the receiving unit furthercomprises a computer within a residence of a user, the computercommunicatively connected to the central processing unit.
 9. The systemof claim 1, wherein the input device comprises a keypad cooperativelypositioned to the secure receptacle and communicatively connected to thecentral processing unit, the keypad used to alter any of the secureaccess codes stored in the programmable memory.
 10. The system of claim9, wherein the input device comprises a keypad cooperatively positionedwith the secure receptacle.
 11. The system of claim 9, wherein the inputdevice comprises the wireless key.
 12. The system of claim 9, whereinthe input device comprises a computer within a residence of a user. 13.A system for the secure delivery of a retail good comprising: a wirelesskey comprising a two-way pager that transmits a first unlocking signalto a geographically distant central server, the wireless key physicallyseparate from a secure receptacle, a receiving unit, the receiving unitcomprising a central processing unit communicatively connected to aprogrammable memory, the receiving unit cooperatively positioned withthe secure receptacle and communicatively connected to thegeographically distant central server, said receiving unit receiving asecond unlocking signal from the geographically distant central server,the secure receptacle comprising a cover and a body, the body definingan interior within the secure receptacle, the body configured to possessan opening from which a retail good can be placed or removed from theinterior of the secure receptacle, and the body further dimensioned toreceive a plurality of retail goods, the secure receptacle furthercomprising a locking mechanism communicatively coupled to the centralprocessing unit and cooperatively positioned to securely engage thecover against the body and over the opening, thereby preventing accessto the interior of the secure receptacle when desirable, at least oneaccess code stored in the programmable memory, of which one of thesecure access codes comprises a current secure access code, and thewireless key further comprising a face and a plurality of buttons, theplurality of buttons located on the face, a combination of the buttonscomprising the current secure access code, a successful entry of thecurrent secure access code using the buttons resulting in the processingof the second unlocking signal by the central processing unit and thesubsequent release of the locking mechanism to allow the cover to bedisplaced from over the opening of the secure receptacle.
 14. The systemof claim 13, wherein the plurality of buttons comprise buttons markedwith alphanumeric indicia.
 15. The system of claim 13, wherein theprogrammable memory stores more than one code, and a code systemcontained in the programmable memory and executed by the centralprocessing unit selects the current access code.
 16. The system of claim13, wherein the geographically distant central server is communicativelyconnected to the receiving unit through the Internet.
 17. The system ofclaim 13, wherein the receiving unit further comprises a second pager,the second pager communicatively connected to the central processingunit.
 18. The system of claim 13, wherein the receiving unit furthercomprises a cellular telephone, the cellular telephone communicativelyconnected to the central processing unit.
 19. The system of claim 13,wherein the receiving unit further comprises a modem, the modemcommunicatively connected to the central processing unit.
 20. The systemof claim 13, wherein the receiving unit further comprises a computerwithin a residence of a user, the computer communicatively connected tothe central processing unit.
 21. The system of claim 13, wherein aninput device is communicatively connected to the central processingunit, the input device used to alter any of the secure access codesstored in the programmable memory.
 22. The system of claim 21, whereinthe input device comprises a keypad cooperatively positioned with thesecure receptacle.
 23. The system of claim 21, wherein the input devicecomprises the wireless key.
 24. The system of claim 21, wherein theinput device comprises a computer within a residence of a user.
 25. Asystem for the secure delivery of a retail good comprising: a wirelesskey comprising a computer within a residence of a user that transmits afirst unlocking signal to a geographically distant central server, thewireless key physically separate from a secure receptacle, a receivingunit, the receiving unit comprising a central processing unitcommunicatively connected to a programmable memory, the receiving unitcooperatively positioned with the secure receptacle and communicativelyconnected to the geographically distant central server, said receivingunit receiving a second unlocking signal from the geographically distantcentral server, the secure receptacle comprising a cover and a body, thebody defining an interior within the secure receptacle, the bodyconfigured to possess an opening from which a retail good can be placedor removed from the interior of the secure receptacle, and the bodyfurther dimensioned to receive a plurality of retail goods, the securereceptacle further comprising a locking mechanism communicativelycoupled to the central processing unit and cooperatively positioned tosecurely engage the cover against the body and over the opening, therebypreventing access to the interior of the secure receptacle whendesirable, at least one access code stored in the programmable memory,of which one of the secure access codes comprises a current secureaccess code, and the wireless key further comprising a face and aplurality of buttons, the plurality of buttons located on the face, acombination of the buttons comprising the current secure access code, asuccessful entry of the current secure access code using the buttonsresulting in the processing of the second unlocking signal by thecentral processing unit and the subsequent release of the lockingmechanism to allow the cover to be displaced from over the opening ofthe secure receptacle.
 26. The system of claim 25, wherein the pluralityof buttons comprise buttons marked with alphanumeric indicia.
 27. Thesystem of claim 25, wherein the programmable memory stores more than onecode, and a code system contained in the programmable memory andexecuted by the central processing unit selects the current access code.28. The system of claim 25, wherein the geographically distant centralserver is communicatively connected to the receiving unit through theInternet.
 29. The system of claim 25, wherein the receiving unit furthercomprises a pager, the pager communicatively connected to the centralprocessing unit.
 30. The system of claim 25, wherein the receiving unitfurther comprises a cellular telephone, the cellular telephonecommunicatively connected to the central processing unit.
 31. The systemof claim 25, wherein the receiving unit further comprises a modem, themodem communicatively connected to the central processing unit.
 32. Thesystem of claim 25, wherein the receiving unit further comprises thecomputer within a residence of a user, the computer communicativelyconnected to the central processing unit.
 33. The system of claim 25,wherein an input device is communicatively connected to the centralprocessing unit, the input device used to alter any of the secure accesscodes stored in the programmable memory.
 34. The system of claim 33,wherein the input device comprises a keypad cooperatively positionedwith the secure receptacle.
 35. The system of claim 33, wherein theinput device comprises the wireless key.
 36. The system of claim 33,wherein the input device comprises the computer within a residence of auser.
 37. A system for the secure delivery of a retail good comprising:a receiving unit comprising an antenna and a first central processingunit, the receiving unit cooperatively positioned with a securereceptacle, the first central processing unit communicatively connectedto the antenna, and the antenna communicatively connected to a wirelesskey via a wireless link, the wireless key comprising a programmablememory, a second central processing unit, and a transmitter thattransmits an unlocking signal that is received by the antenna, thewireless key physically separate from the secure receptacle, the securereceptacle comprising a cover and a body, the body defining an interiorwithin the secure receptacle, the body configured to possess an openingfrom which a retail good can be placed or removed from the interior ofthe secure receptacle, and the body further dimensioned to receive aplurality of retail goods, the secure receptacle further comprising alocking mechanism communicatively coupled to the first centralprocessing unit and cooperatively positioned to securely engage thecover against the body and over the opening, thereby preventing accessto the interior of the secure receptacle when desirable, at least onesecure access code stored in the programmable memory of which one of thesecure access codes comprises a current secure access code, and thewireless key further comprising a face and a plurality of buttons, theplurality of buttons located on the face, a combination of the buttonscomprising the current secure access code, a successful entry of thecurrent secure access code using the buttons processed by the secondcentral processing unit and resulting in the transmission of theunlocking signal via the wireless link to the receiving unit and therelease of the locking mechanism to allow the cover to be displaced fromover the opening of the secure receptacle.
 38. The system of claim 37,wherein the plurality of buttons comprise buttons marked withalphanumeric indicia.
 39. The system of claim 37, wherein the pluralityof buttons comprise buttons marked with color indicia.
 40. The system ofclaim 37, wherein the programmable memory stores more than one code anda code system contained in the programmable memory and executed by thefirst central processing unit selects the current access code.
 41. Thesystem of claim 37, wherein a programming device is communicativelycoupled to the programmable memory to upload at least one access code.42. The system of claim 37, wherein the plurality of buttons on the faceof the wireless key are communicatively coupled to the programmablememory to upload at least one access code.
 43. A system for the securedelivery of a retail good comprising: a receiving unit comprising anantenna, a programmable memory and a central processing unit, thereceiving unit cooperatively positioned with a secure receptacle, thecentral processing unit communicatively connected to the antenna and theprogrammable memory, and the antenna communicatively connected to awireless key via a wireless link, the wireless key comprising atransmitter that transmits a plurality of unlocking signals insequential order, the plurality of unlocking signals received by theantenna, the wireless key physically separate from the securereceptacle, the secure receptacle comprising a cover and a body, thebody defining an interior within the secure receptacle, the bodyconfigured to possess an opening from which a retail good can be placedor removed from the interior of the secure receptacle, and the bodyfurther dimensioned to receive a plurality of retail goods, the securereceptacle further comprising a locking mechanism communicativelycoupled to the central processing unit and cooperatively positioned tosecurely engage the cover against the body and over the opening, therebypreventing access to the interior of the secure receptacle whendesirable, at least one secure access code stored in the programmablememory of which one of the secure access codes comprises a currentsecure access code, and the wireless key further comprising a face and aplurality of buttons, the plurality of buttons located on the face, acombination of the buttons comprising the current secure access code, asuccessful entry of the current secure access code using the buttonsresulting in the transmission of the plurality of unlocking signals viathe wireless link to the antenna, the processing of the plurality ofunlocking signals by the central processing unit, and the release of thelocking mechanism to allow the cover to be displaced from over theopening of the secure receptacle.
 44. The system of claim 43, whereinthe plurality of buttons comprise buttons marked with alphanumericindicia.
 45. The system of claim 43, wherein the plurality of buttonscomprise buttons marked with color indicia.
 46. The system of claim 43,wherein the programmable memory stores more than one code and a codesystem contained in the programmable memory and executed by the centralprocessing unit selects the current access code.
 47. The system of claim43, wherein an input device is communicatively connected to the centralprocessing unit, the input device used to alter any of the secure accesscodes stored in the programmable memory.
 48. The system of claim 47,wherein the input device comprises a keypad cooperatively positionedwith the secure receptacle.
 49. The system of claim 47, wherein theinput device comprises the wireless key.
 50. A process for the deliveryof a retail good, comprising the steps of: programming at least oneprogrammable access code into a programmable memory, ordering through afirst telecommunications device by a user at least one retail good froma supplier, delivering at least one retail good by the supplier to asecure receptacle, entering a user access code by the user into awireless key, the wireless key being physically separate from the securereceptacle, processing the user access code entered into the wirelesskey, and disengaging a locking mechanism of the secure receptacle,thereby allowing the user to gain access to at least one retail goodpreviously ordered and delivered.
 51. The process of claim 50, whereinthe access code comprises knowledge-based information that distinguishesthe user who ordered at least one retail good from an unauthorized userattempting to gain access to the secure receptacle.
 52. The process ofclaim 51, wherein the access code comprises a combination ofalphanumeric characters.
 53. The process of claim 51, wherein the accesscode comprises a combination of colors.
 54. The process of claim 50,wherein the access code comprises physical characteristics of the user.55. The process of claim 54, wherein the physical characteristic of theuser comprises a finger print.
 56. The process of claim 54, wherein thephysical characteristic of the user comprises a voice print.
 57. Theprocess of claim 50, wherein the programming the programmable accesscode into the programmable memory comprises the steps of: downloadingfrom a web site to a supplier's wireless key the programmable accesscode, the programmable access code previously designated by the user,transmitting the programmable access code by a low frequency signal to areceiving unit physically integrated with the secure receptacle, anduploading the programmable access code into the programmable memory fromthe receiving unit.
 58. The process of claim 50, wherein the programmingthe programmable access code into the programmable memory comprises thesteps of: accessing a modem through the Internet, the modem beingphysically integrated with the secure receptacle and communicativelycoupled to the programmable memory, downloading from the Internet theprogrammable access code designated by the user, and uploading theprogrammable access code into the programmable memory.
 59. The processof claim 50, wherein the programming the programmable access code intothe programmable memory comprises the steps of: entering theprogrammable access code using a keypad physically integrated with thesecure receptacle and communicatively coupled to the programmablememory, and uploading the programmable access code to the programmablememory.
 60. The process of claim 50, wherein processing the access codefurther comprises the steps of: comparing the user access code enteredby the user with the programmable access code programmed into theprogrammable memory, the programmable memory physically integrated withthe wireless key, pushing a button on the wireless key by the user totransmit a low-frequency radio wave signal, and transmitting thelow-frequency radio wave signal from the wireless key to a receivingunit physically integrated with the secure receptacle, a receiving unitcommunicatively connected to the locking mechanism of the securereceptacle, the receiving unit comprising an antenna and a centralprocessing unit.
 61. The process of claim 60, wherein processing theaccess code further comprises the step of testing the sobriety of theuser through a means for detecting a blood alcohol content.
 62. Theprocess of claim 50, wherein processing the access code furthercomprises the steps of: transmitting a first unlocking signal from asecond telecommunications device to a geographically distant centralserver, transmitting a second unlocking signal from the geographicallydistant central server to a receiving unit, the receiving unitphysically integrated with the secure receptacle and communicativelycoupled to a central processing unit, the central processing unitfurther communicatively coupled to the locking mechanism, and comparingthe user access code entered by the user with the programmable accesscode programmed into the programmable memory, the programmable memoryphysically integrated with secure receptacle and communicatively coupledto the central processing unit.
 63. The process of claim 62, wherein thesecond telecommunications device comprises a pager.
 64. The process ofclaim 62, wherein the second telecommunications device comprises a firstcellular telephone.
 65. The process of claim 62, wherein the receivingunit comprises a modem.
 66. The process of claim 62, wherein thereceiving unit comprises a second cellular telephone.
 67. The process ofclaim 62, wherein the receiving unit comprises a two-way pager.
 68. Theprocess of claim 62, wherein the receiving unit comprises a homecomputer within a residence of a user.
 69. A process for the delivery ofa retail good, comprising the steps: programming at least one primaryprogrammable access code into a first programmable memory, programmingat least one secondary programmable access code into a secondprogrammable memory, ordering through a first telecommunications deviceat least one retail good from a supplier by a user, delivering at leastone retail good by the supplier to a secure receptacle, entering aprimary user access code by the user into a wireless key, the wirelesskey being physically separate from the secure receptacle, entering asecondary user access code by the user into a keypad, the keypad beingphysically integrated to the secure receptacle, processing the primaryuser access code entered into the wireless key, processing the secondaryuser access code entered into the keypad, and disengaging a lockingmechanism of the secure receptacle, thereby allowing the user to gainaccess to at least one retail good previously ordered and delivered. 70.The process of claim 69, wherein the primary and secondary access codescomprise knowledge-based information that distinguishes the user whoordered at least one retail good from an unauthorized user attempting togain access to the secure receptacle.
 71. The process of claim 69,wherein the primary and secondary access codes comprise a combination ofalphanumeric characters.
 72. The process of claim 69, wherein theprimary access code comprises a combination of colors.
 73. The processof claim 69, wherein the primary access code comprises physicalcharacteristics of the user.
 74. The process of claim 73, wherein thephysical characteristic of the user comprises a finger print.
 75. Theprocess of claim 73, wherein the physical characteristic of the usercomprises a voice print.
 76. A process for ordering a plurality ofretail goods, comprising the steps of: ordering the plurality of retailgoods through the Internet by a user, providing a secure receptacle tothe user with a predefined volume to which the plurality of retail goodswill be delivered by a delivery carrier, calculating the percent volumea retail good ordered by the consumer will occupy in the securereceptacle when the retail good is placed in the secure receptacle by adelivery carrier, summing the percent volume for each retail goodordered by the user to obtain a total percent volume occupied by theplurality of retail goods, indicating the total percent volume to theuser through the Internet while the user is ordering the plurality ofretail goods, and resetting the total percent volume to zero after theuser removes the plurality of retail goods from the secure receptacle.77. The process of claim 76, wherein the total percent volume consistsof summing the percent volume for each retail good ordered by the userin a plurality of orders by the consumer and before.
 78. The process ofclaim 77, wherein the plurality of orders comprise orders betweendifferent suppliers.
 79. The process of claim 77, wherein the pluralityof orders comprise orders between different times at which the userplaces an order.