Messages associated with unopened delivered packages

ABSTRACT

This disclosure is directed at least in part to providing coded messages associated with unopened delivered packages. The coded messages may help recipients determine information about the contents of packages without opening the packages, and thereby help prevent spoiling surprises (e.g., holiday gifts, etc.) or otherwise preventing other unwanted behavior. In some embodiments, the coded messages may be decrypted or otherwise received by an authorized recipient of the package.

BACKGROUND

With the increased popularity of electronic commerce and onlineshopping, many people receive more packages through carrier mail ordelivery services than when these people purchased items primarily fromphysical locations of retailers. Most delivered packages arrive to adestination days after a purchase. The packages are typically genericbrown boxes or envelopes that often provide little or no indication ofthe contents of the package. Sometimes this is by design for purposessuch as to avoid solicitation that may result in theft of the package,for privacy reasons, for cost reasons, or for other reasons. However,some recipients may desire to know some information about the contentsof a package prior to opening the package.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is described with reference to the accompanyingfigures. In the figures, the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Thesame reference numbers in different figures indicate similar oridentical items.

FIG. 1 is a schematic diagram of an illustrative environment to createand reveal messages associated with unopened delivered packages.

FIGS. 2A and 2B are schematic diagrams of illustrative computingarchitecture that perform operations to provide messages associated withunopened delivered packages.

FIG. 3 is a flow diagram of an illustrative process to create and redeemmessages associated with an unopened package.

FIG. 4 is a flow diagram of an illustrative process to transmitauthentication information to a recipient to enable redeeming a messageassociated with an unopened package.

FIG. 5 is an illustrative user interface (UI) that enables a user tocreate messages for recipients of an unopened package.

FIG. 6 is a flow diagram of an illustrative process to deliver apersonalized message to a recipient of a package.

FIG. 7 is a flow diagram of an illustrative process to decrypt a code toobtain a message associated with an unopened package.

FIG. 8 is a flow diagram of an illustrative process to create codedmessages on behalf of a seller that provides items in packages forrecipients.

DETAILED DESCRIPTION

Overview

This disclosure is directed at least in part to providing coded messagesassociated with unopened delivered packages. The coded messages may helprecipients determine information about the contents of packages withoutopening the packages, and thereby help prevent spoiling surprises (e.g.,holiday gifts, etc.) or otherwise preventing other unwanted behavior.

In accordance with one or more embodiments, the messages may bedecrypted or otherwise received by an authorized recipient of thepackage. For example, the message may be coded or otherwise associatedwith an image on the package that the recipient can scan and thendecrypt using a token or key stored in an electronic device (e.g., amobile telephone, etc.). The recipient may receive the token or keyafter providing credentials that identify the recipient (e.g., login andpassword, etc.), by electronic messaging (receive an electronic messagefrom the sender that includes the token, etc.), or by other techniques.In some instances, the code or image on the package may be a token orkey that enables the recipient to obtain a message from a remote serviceafter providing additional authentication information that proves theidentity of the recipient.

In some embodiments, the message may be unique for each potentialrecipient, such as when a household or address has multiple possiblerecipients. For example, if a husband purchases a gift for his wife, thehusband may create a first message for receipt by the wife (if shereceives the package) that asks her to not open the box and a secondmessage for receipt by the husband (if he receives the package) thatreminds him of the contents of the package.

The techniques and systems described herein may be implemented in anumber of ways. Example implementations are provided below withreference to the following figures.

Illustrative Environment

FIG. 1 is a schematic diagram of an illustrative environment 100 tocreate and reveal messages associated with unopened delivered packages.The environment 100 includes a distributor 102 that may be a merchant, ahost of an electronic marketplace, or any other entity that may receivea request for an item to be delivered to a destination 104. Thedistributor 102 may process sales or other acquisitions of items to bedelivered to the destination 104. For example, the distributor 102 mayreceive an order of items that is to be shipped to a residentialaddress. In some instances, the distributor 102 may include adistribution center 106, which may be a separate location and possibly aseparate entity. For example, when the distributor 102 is a largeretailer, the distributor may process transactions and then send anorder 108 to the distribution center 106 for order fulfillment. Thedistribution center 106 may then obtain the items in the order 108,package the items into a package 110, and then initiate shipment of thepackage 110 through a delivery service, common courier, etc. Thedistribution center 106 may place items in the package, which may be ageneric box and/or envelop that does not reveal the contents of thebox/envelop. In some instances, when the distributor 102 is a smallretailer, the distribution center 106 may be combined with thedistributor such as when a small retailer ships items directly fromtheir store or order processing location.

The distributor 102 or the distribution center 106 may create a code 112for inclusion with the package 110. The code 112 may be contained in animage which may be included on a packing label of the package 110, suchas a barcode or a quick response (QR) code. The code 112 may be storedin a radio frequency identifier (RFID) tag, which may be placed insidethe package and/or otherwise provided with the package and capable ofreceipt by a recipient (via an electronic device) without opening thepackage.

In accordance with one or more embodiments, the code may contain anencrypted message that can be read by an electronic device 114associated with a recipient 116. For example, the recipient 116 may havea token or obtain a token that can enable the electronic device 114 (oranother device) to decrypt the message. As discussed herein, the tokeninclude any data or object used to decrypt data that is encrypted. Theterm “token” may be used interchangeably with the term “key” or otherterms of art used in encryption/decryption. The recipient 116 mayreceive the token, that when used with the code 112 may enable access tothe message. In some instances, the recipient 116 may receive the tokenvia an electronic message (pushed message) or may request the tokenafter providing authentication information (e.g., user credentials, useof a registered telephone number, etc.).

In various embodiments, the code 112 may be a token that enables therecipient 116 to obtain the message from the distributor 102, thedistribution center 106, and/or an intermediary 118. In someembodiments, the intermediary 118 may provide a service that managescreation of the messages on behalf of the distributor 102 and/or thedistribution center 106, such as when the messages are provided as aservice to the distributor 102 and/or the distribution center 106. Whenthe code 112 is the token, the recipient 116 may use the electronicdevice 114 to transmit the code 112 and at least some identificationinformation to the distributor 102, the distribution center 106, and/orthe intermediary 118 via a network 120. The network 120 may be any typeof wired and/or wireless network that enables message transmissionbetween different communication devices, such as the electronic device114 (e.g., mobile telephones, computers, tablets, gaming devices,electronic book readers, etc.), servers, and/or other communicationdevices. In response, the distributor 102, the distribution center 106,and/or the intermediary 118 may transmit a message back to the recipient116 via the electronic device 114. The message may include informationabout contents of the package. Thus, the recipient 116 may discoverinformation about the contents of the package 110 using the code 112 andwithout opening the package. This may prevent the recipient 116 fromspoiling a surprise and/or may provide other beneficial information tothe recipient without sacrificing privacy information to other peoplewho do not have the identification information.

In some embodiments, the electronic device 114 may present an interface122 that enables the recipient to obtain the code 112, receive a token,and/or read the message. The interface 122 may enable control of anapplication designed at least partially for purposes of reading the code112 and accessing or decrypting a message for view by the recipient 116.

Illustrative Computing Architecture

FIGS. 2A and 2B are schematic diagrams of illustrative computingarchitecture that perform operations to provide messages associated withunopened delivered packages. The FIGS. 2A and 2B are described withreference to the environment 100.

FIG. 2A shows an illustrative computing architecture 200 that mayinclude servers 202. The computing architecture 200 may be implementedin a distributed or non-distributed computing environment. The servers202 may be servers of the distributor 102, the distribution center 106,and/or the intermediary 118.

In servers 202 may include one or more processors 204 and one or morecomputer readable media 206 that stores various modules, applications,programs, or other data. The computer-readable media 206 may includeinstructions that, when executed by the one or more processors 204,cause the processors to perform the operations described herein for apackage manager 208.

Embodiments may be provided as a computer program product including anon-transitory machine-readable storage medium having stored thereoninstructions (in compressed or uncompressed form) that may be used toprogram a computer (or other electronic device) to perform processes ormethods described herein. The machine-readable storage medium mayinclude, but is not limited to, hard drives, floppy diskettes, opticaldisks, CD-ROMs, DVDs, read-only memories (ROMs), random access memories(RAMs), EPROMs, EEPROMs, flash memory, magnetic or optical cards,solid-state memory devices, or other types of media/machine-readablemedium suitable for storing electronic instructions. Further,embodiments may also be provided as a computer program product includinga transitory machine-readable signal (in compressed or uncompressedform). Examples of machine-readable signals, whether modulated using acarrier or not, include, but are not limited to, signals that a computersystem or machine hosting or running a computer program can beconfigured to access, including signals downloaded through the Internetor other networks. For example, distribution of software may be by anInternet download.

In some embodiments, the computer-readable media 206 may store thepackage manager 208. The package manager 208 may include variousmodules, which may include a code module 210, an authentication module212, and a message module 214, each described in turn. The modules maybe stored together or in a distributed arrangement.

The code module 210 may create or generate the code 112 that is includedwith the package 110. The code 112 may be stored as an image, such as abarcode or a QR code and/or provided by printed symbols (e.g., analphanumeric code, etc.). For example, the code 112 may be printed in amailing label for the package 110. In some embodiments, the code 112 maybe stored in an RFID tag or other communication media that is accessiblewithout opening the package 110. As discussed above, the code 112 may bean encrypted message or may be a token that enables an authorizedrecipient to access a message. In various embodiments, the code 112 maybe a same number or identifier used by the distributor 102, thedistribution center 106, or another party for product identification(e.g., a mailing barcode, etc.)

The authentication module 212 may authenticate the recipient 116 thatwants to access a message associated with the package 110. In someembodiments, the authentication module 212 may create a token thatallows a recipient in possession of the token to decrypt the code (usingthe electronic device 114) and read the message. The token may then betransmitted to the recipient(s) that may receive the package for usewhen the package arrives. In these instances, the code module 210 mayuse the token to encrypt the message when creating the code 112.

In various embodiments, the authentication module 212 may be used toverify an identity of the recipient 116. For example, the recipient 116may provide information to the authentication module 212 that positivelyidentifies the recipient using recipient data 216, such as by providinguser credentials, calling from a registered telephone number linked tothe recipient, and so forth. The recipient data 216 may be stored dataassociated with the recipient 116. The recipient 116 may also providethe code 112, which when combined with a successful authentication bythe authentication module 212, may direct the package manager 208 toprovide a message to the recipient 116.

The message module 214 may create one or more messages for theassociation with package 110. In some instances, the message 214 mayinclude information based at least in part on order data 218 related tothe order 108 of items included in the package. The message module 214may create default messages to provide information about the package,such as those shown in FIG. 5. In some embodiments, the message module214 may enable a purchaser (person who initiates the order 108 of theitems) to create custom message(s). The messaging module 214 maymaintain messages for different recipients for each package. Thus, asingle package may include multiple different messages, each associatedwith a different possible recipient of the package 110.

For example, a mother may purchase some gifts for her children from anonline company that delivers the gifts by mail. The mother may select amessage that is associated with her information and a father'sinformation, which may be stored in the recipient data 216. When thepackage arrives at the destination 104, the mother or father mayretrieve the message without opening the package while the message maybe unreadable by others, such as a delivery person or neighbor.

FIG. 2B shows an illustrative computing architecture 220 that may berepresentative of the electronic device 114. The computing architecture220 may include one or more processors 222, a code reader device 224,and one or more computer readable media 226 that stores various modules,applications, programs, or other data. The computer-readable media 226may be include instructions that, when executed by the one or moreprocessors 222, cause the processors to perform the operations describedherein for the electronic device 114. Like the computer-readable media206, the computer-readable media 226 may include a non-transitorymachine-readable storage medium and/or a transitory machine-readablesignal. The code reader device 224 may be any device hardware capable oruseable to read the code 112, such as without limitation, a camera, anoptical scanner, an RFID reader, or other type of input device.

In accordance with various embodiments, the computer-readable media 226may include a package application 228 and a communication application230. The package application 228 may initially be used to read the code112 using the code reader device 224. When the code 112 is an encryptedmessage, the package application 228 may be used to decrypt the codeusing a token received by the communication application 230. When thecode 112 is a token, the package application 228 may communicate thecode 112 to the authentication module 212 to enable receipt of themessage. For example, the code 112 may be scanned by a mobile telephonewith a known identification number or telephone number that isassociated with the recipient 116 via the recipient data 216, andtransmitted to the authentication module 212. In some embodiments, therecipient 116 may provide user credentials along with the code 112 usingthe package application 228.

The communication module 230 may receive the token when the token istransmitted to the electronic device 114. In some instances, the packageapplication may 228 receive the token without user input when the tokenis received by the communication module 230. Thus, when the token ispresent (stored by the electronic device 114) and the recipient 116reads the code 112 with the electronic device, the message may beautomatically decrypted and revealed to the user assuming the token is acorrect token associated with the code. The communication module 230 mayalso operate to facilitate exchanges of data with the servers 202 whenthe code 112 is a token. Thus, the package application 228 may interactwith the communication application 230 to exchange data with the packagemanager 208. The communication module 230 may utilize any practicalcommunication technique to facilitate an exchange of data, such asthrough email protocols, short message service (SMS) text messaging,instant messaging, and so forth.

Further operation of the package manager 208 executed by the servers 202and the package application 228 and the communication application 230executed by the electronic device 114 are described with reference tothe following figures.

Illustrative Operation

FIGS. 3, 4, and 6-8 are flow diagrams of illustrative processes tocreate and/or read messages associated with unopened delivered packages.The processes are illustrated as a collection of blocks in a logicalflow graph, which represent a sequence of operations that can beimplemented in hardware, software, or a combination thereof. In thecontext of software, the blocks represent computer-executableinstructions stored on one or more computer-readable storage media that,when executed by one or more processors, perform the recited operations.Generally, computer-executable instructions include routines, programs,objects, components, data structures, and the like that performparticular functions or implement particular abstract data types. Theorder in which the operations are described is not intended to beconstrued as a limitation, and any number of the described blocks can becombined in any order and/or in parallel to implement the processes. Theprocesses are described with reference to the environment 100. Ofcourse, the processes may be performed in other similar and/or differentenvironments.

FIG. 3 is a flow diagram of an illustrative process 300 to create andredeem messages associated with an unopened package. The process 300 maybe performed by the servers 202 and may be performed by any one or moreof the distributor 102, the distribution center 106, and/or theintermediary 118. In the process 400, the code 112 is a token used toretrieve a message from the servers 202.

Operations 302 and 304 may be performed prior to delivery of the package110. At 302, the code module 210 may generate a code (e.g., the code112) for the package 110. In some embodiments, the code 112 may be atoken assessable by the authentication module 212.

At 304, the code module 210 may associate the code 112 with message(s)and recipient(s). For example the code 112 may be associated a singlemessage that provides generic information about the order 108. However,in some instances, the code 112 may be associated with multiplemessages, where each message is directed to a possible recipient of thepackage.

Operations 306, 308, and 310 may occur after the package 110 has beendelivered to a destination 104 and prior to opening of the package. At306, the authentication module 212 may receive the code 112 from theelectronic device 114 of the recipient 116. The code 112 may be scanned,read, or otherwise extracted from the package 110 without opening thepackage.

At 308, the authentication module 212 may receive authenticationinformation from the electronic device 114. The authenticationinformation may be provided by inputs from the recipient 116 (e.g., usercredentials, etc.) and/or by data associated with the electronic device(e.g., device identifier, etc.).

At 310, the messaging module 214 may provide a message to the electronicdevice 114 for presentation to the recipient 116. The message may bespecific for the package 110 containing the code 112, and possiblyspecific to the recipient 116 providing the authentication data to theauthentication module 212.

In some instances, the order 108 may be shipped in multiple packages. Inaccordance with one or more embodiments, the messages associated with apackage may include information about the existence, shipping or transitstatus, or other information about related packages. For example, afirst package may arrive at the destination 104. The message module 214may update the message associated with the first package to include anindication of a second package and a tracking number associated with thesecond package, for example. The message may also include informationabout the contents of the second package and/or other relevantinformation. The message module 214 may update the message to includeactual shipping information using the tracking number, such as toindicate the estimated arrival date and/or current location of thesecond package to the recipient 116. Thus, the message module may updatethe message one or more times during transit of the first package and/orthe second package to provide current information to the recipient.

FIG. 4 is a flow diagram of an illustrative process 400 to transmitauthentication information to a recipient to enable redeeming a messageassociated with an unopened package. The process 400 may be performed bythe servers 202 and may be performed by any one or more of thedistributor 102, the distribution center 106, and/or the intermediary118. In the process 400, the code 112 may be an encrypted message.However, the code 112 may be a token in the process 400. The process 400describes operations that occur prior to delivery of the package to thedestination 104.

At 402, the package manager 208 may receive the order 108 of items froma buyer (who may or may not be the recipient 116).

At 404, the code module 210 may generate a code (e.g., the code 112) forthe package 110. In some embodiments, the code 112 may be encryptedusing a token assessable by the authentication module 212.

At 406, the code module 210 may associate the code 112 with message(s)and recipient(s).

At 408, the authentication module 212 may transmit authenticationinformation to one or more possible recipients of the package. Theauthentication information may be a token that can be used to decryptthe code 112 when the code is read by an electronic device (e.g., theelectronic device 114) executing an application to perform decryption ofthe code (e.g., the package application 228).

FIG. 5 is an illustrative user interface (UI) 500 that enables a user tocreate messages for recipients of a package. The UI 500 may be presentedto a customer prior to completing the order 108.

The UI 500 may include an authorized recipients section 502 that enablesthe customer to select authorized recipients. In some embodiments, thepackage manager 208 may include suggested authorized recipients 504,which may include the customer and other people that are associated witha shipping address (e.g., stored in the recipient data 216, etc.) and soforth. The authorized recipients section 502 may also include an addcommand 506 to allow the customer to add authorized recipients, whichmay be saved in the recipient data 216. In some embodiments, theauthorized recipients section 502 may enable selection of deliverymethods of a token (e.g., who to send a token to that enables decryptionof the code”, password selection, etc.). When the authorized recipientshave accounts with the distributor (or other party associated with thepackage manager 208), then the authorized recipients may use thecredentials for those accounts to access the messages.

The UI 500 may include a default messages section 508 that enables acustomer to select a default message that is presented to any one of theauthorized recipients after the authorized recipient provides a tokenand authentication information as discussed above. In variousembodiments, the message module 214 may create sample messages 510 basedon information from the order data 218. The sample messages 510 may begenerated using generic information about the order, such as to includea name of the seller, a status as a gift, a category of the gift, and/orother information. The default messages section 508 may also include acreate command 512 to enable a customer to create a default message. Thedefault messages are sent by the message module 214 to recipients thatare not associated with a custom message, as described below.

The UI 500 may include a custom message section 514 to enable thecustomer to create customer messages for any of the authorizedrecipients using creation commands 516. For example, a customer named“Joe H” may create a custom message for himself that reminds him of thecontents of the package, such as “Bracelet for Mary.” The customer maycreate a message for his wife, “Mary H”, which asks her not to open thepackage, such as “Darling, please do not open this package without me!”When authorized recipients do not have a custom message, they mayreceive the default message. A continue command 518 may be used toaccept the selections in the UI 500.

FIG. 6 is a flow diagram of an illustrative process 600 to deliver apersonalized message to a recipient of a package. The process 600 may beperformed by the servers 202 and may be performed by any one or more ofthe distributor 102, the distribution center 106, and/or theintermediary 118. The process 600 may be performed after the customerinteracts with the UI 500.

At 602, the code module 210 may receive the code 112 from the electronicdevice 114 of the recipient 116.

At 604, the authentication module 212 may receive authenticationinformation from the recipient 116. The authentication information maybe a token transmitted to the recipient 116 (e.g., via the process 400),credentials of the recipient (e.g., username/password for an account), aknown telephone number or device identifier associated with theelectronic device 114 in communication with the authentication module212, and/or other data that positively identifies the recipient 116.

At 606, the message module 214 may select a message for a particularrecipient based at least in part on the authorization information fromthe operation 604 and/or input from the UI 500 as discussed above. Forexample, when the customer generates a custom message for the recipient116, the message module 214 will select the custom message at 606.Otherwise, the message module 214 may select the default message.

At 608, the message module 214 may provide the message to the recipient.The message may be provided by any practical communication type, such asthrough the communication application 230.

FIG. 7 is a flow diagram of an illustrative process 700 to decrypt acode to obtain a message associated with an unopened package. Theprocess 700 may be performed by the electronic device 114 under controlof the recipient 116.

At 702, the package application 228 may receive the code 112 from thepackage 110. For example, the package application 228 may activate thecode reader device 224 to obtain the code 112 from the package 110.

At 704, the package application 228 may receive the authenticationinformation. In some instances, the authentication information may be atoken received by the communication application 230 (e.g., via email,SMS, direct to application, etc.). However, the authenticationinformation may be user credentials or other identifying informationabout the recipient that enables access to the token, which may bestored remotely and/or by in the electronic device 114.

At 706, the package application 228 may decrypt the code 112 using theauthentication information or data retrieved from the authenticationinformation (e.g., the token).

At 708, the package application 228 may present the message to therecipient via the electronic device 114.

FIG. 8 is a flow diagram of an illustrative process 800 to create codedmessages on behalf of a seller that provides items in packages for arecipient. The process 800 may be performed by the servers 202 and maybe performed by the intermediary 118. For example, the process 800 maybe implemented as a service provided by the intermediary 118 on behalfof the distributor 102 and/or the distribution center 106.

At 802, the intermediary 118 may receive the code 112 from the sender(e.g., the distributor 102 and/or the distribution center 106). Forexample, the intermediary 118 may receive an alphanumeric number used inthe code 112, which is also displayed on the packages as an image (e.g.,barcode, QR code, etc.), or stored in an RFID tag in the package.

At 804, the intermediary 118 may receive order information and/ormessages for recipients of the package 110. The order information and/ormessages may be provided by the distributor 102 that creates the order108 for the customer.

At 806, the intermediary 118 may receive a designation of recipient(s)authorized to read a message. The recipients may include the customerthat purchased the items in the package, people designated by thecustomer as possible recipients, or other people.

At 808, the intermediary 118 may receive information about therecipients that may be used by the authentication module 212 (e.g.,messaging addresses, device identifier, etc.).

At 810, the intermediary 118 may associate the code 112 with themessage(s) and recipient(s). In this way, the intermediary 118 mayprovide the messages associated with unopened delivered packages onbehalf of the distributor 102 and/or the distribution center 106. Thismay be particularly useful when the distributor 102 is a small businessand does not have infrastructure to support providing the messages.

Conclusion

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described. Rather,the specific features and acts are disclosed as illustrative forms ofimplementing the claims.

What is claimed is:
 1. A method comprising: under control of one or moreservers configured with executable instructions, generating a first codeand a second code for a package, the codes being accessible by anelectronic device without opening the package; associating the firstcode with a first message and a recipient, the first message providinginformation associated with the package; associating the second codewith a second message, the second message providing informationassociated with the package; after delivery of the package to adestination, receiving one of the codes from the electronic device; inresponse to receiving the first code: receiving authenticationinformation from the recipient that positively identifies the recipientas being associated with the first code; and transmitting the firstmessage to the electronic device in response to the receivedauthentication information being associated with the first code; and inresponse to receiving the second code, transmitting the second messageto the electronic device.
 2. The method as recited in claim 1, whereinindividual ones of the codes are included in at least one of a barcode,a quick response (QR) code, or a radio frequency identifier (RFID) tagthat is readable by the electronic device without opening the package.3. The method as recited in claim 1, wherein the authenticationinformation that positively identifies the recipient includes at leastone of a device identifier associated with the recipient or usercredentials associated with the recipient.
 4. The method as recited inclaim 1, wherein the codes are unique tokens associated with thepackage.
 5. The method as recited in claim 1, wherein the recipient is afirst recipient, further comprising: associating the second code with asecond recipient; and in response to receiving the second code:receiving authentication information from the second recipient thatpositively identifies the second recipient as being associated with thesecond code, wherein the transmitting the second message transmits thesecond message in response to the received authentication informationfrom the second recipient associated with the second code, wherein thefirst and second recipients are associated with the same destination andthe first message is different than the second message.
 6. A method,comprising: generating a first code and a second code for a package, thecodes being messages that are encrypted and provide informationassociated the package, the first and second codes being accessiblewithout opening the package; and transmitting a first of at least twotokens to a first recipient and a second of the at least two tokens to asecond recipient prior to delivery of the package to a destination, thefirst token being usable by an electronic device to decrypt the firstcode to reveal the associated message after the first code is read bythe electronic device, the second token being usable by the electronicdevice to decrypt the second code to reveal the associated message afterthe second code is read by the electronic device.
 7. The method asrecited in claim 6, further comprising creating the messages based atleast in part on information about items in the package.
 8. The methodas recited in claim 6, further comprising creating the messages inresponse to input from a customer that purchased items included in thepackage.
 9. The method as recited in claim 6, further comprisingencrypting the messages.
 10. The method as recited in claim 6, whereinindividual ones of the codes are included in at least one of a barcode,a quick response (QR) code, or a radio frequency identifier (RFID) tagthat is readable by the electronic device without opening the package.11. A method, comprising: accessing, by an electronic device, one of atleast two codes associated with a package, the codes being associatedwith different messages that are encrypted and provide informationassociated the package, the codes being accessible without opening thepackage; receiving, by the electronic device, one of at least two tokensprior to delivery of the package to a destination; decrypting one of thecodes using a first one of the received tokens, by the electronicdevice, to obtain an associated one of the different messages; andoutputting the associated one of the different messages.
 12. The methodas recited in claim 11, wherein the receiving the one of at least twotokens includes receiving the one of at least two tokens by at least oneof an email message or a text message.
 13. The method as recited inclaim 11, wherein the accessing the one of at least two codes includesat least one of obtaining the one of at least two codes with an opticalreader device or receiving data from a radio frequency identifier (RFID)tag.
 14. The method as recited in claim 11, wherein the outputting theassociated one of the different messages includes causing the associatedone of the different messages to be displayed on a display of theelectronic device.
 15. One or more non-transitory computer-readablemedia storing computer-executable instructions that, when executed onone or more processors, performs acts comprising: associating a firstcode from a package with a first message and a recipient; associating asecond code from the package with a second message, the first messageand the second message providing information associated the package, thefirst code and the second code being accessible without opening thepackage; after shipment of the package, receiving a request to redeem atleast one of the first code or the second code from an electronicdevice; in response to receiving the first code: receivingauthentication information from the recipient that positively identifiesthe recipient as being associated with the first code; and transmittingthe first message to the electronic device in response to the receivedauthentication information being associated with the first code; and inresponse to receiving the second code, transmitting the second messageto the electronic device.
 16. The one or more non-transitorycomputer-readable media as recited in claim 15, wherein the first codeand the second code are unique tokens associated with the package. 17.The one or more non-transitory computer-readable media as recited inclaim 15, wherein the receiving the authentication information includesat least one of receiving an identifier from the electronic device thatidentifies the recipient or receiving credentials from the recipient toidentify the recipient.
 18. The one or more non-transitorycomputer-readable media as recited in claim 15, wherein the recipient isa first recipient, and further comprising associating the second codewith a second recipient.
 19. The one or more non-transitorycomputer-readable media as recited in claim 18, wherein the firstrecipient and the second recipient are associated with the destinationand the first message is different than the second message.
 20. The oneor more non-transitory computer-readable media as recited in claim 15,wherein the package is a first package, and wherein at least one of thefirst message or the second message includes an indication of a secondpackage that is related to the first package.
 21. The one or morenon-transitory computer-readable media as recited in claim 20, whereinthe acts further comprise updating the first message or the secondmessage to include at least one of an estimated arrival date or acurrent location of the second package.
 22. A system comprising: one ormore servers configured to, generate a first code and a second code fora package, the codes being accessible by an electronic device withoutopening the package; associate the first code with a first message and arecipient, the first message providing information associated with thepackage; associate the second code with a second message, the secondmessage providing information associated with the package; afterdelivery of the package to a destination, receive one of the codes fromthe electronic device; in response to receiving the first code: receiveauthentication information from the recipient that positively identifiesthe recipient as being associated with the first code; and transmit thefirst message to the electronic device in response to the receivedauthentication information being associated with the first code; and inresponse to receiving the second code, transmit the second message tothe electronic device.
 23. The system as recited in claim 22, whereinthe recipient is a first recipient and in response to receiving thesecond code, the one or more servers are further configured to:associate the second code with a second recipient; and in response toreceiving the second code: receive authentication information from thesecond recipient that positively identifies the second recipient asbeing associated with the second code, wherein the transmission of thesecond message is based on the received authentication information fromthe second recipient associated with the second code, wherein the firstand second recipients are associated with the same destination and thefirst message is different than the second message.
 24. The system asrecited in claim 22, wherein individual ones of the codes are includedin at least one of a barcode, a quick response (QR) code, or a radiofrequency identifier (RFID) tag that is readable by the electronicdevice without opening the package.
 25. The system as recited in claim22, wherein the authentication information that positively identifiesthe recipient includes at least one of a device identifier associatedwith the recipient or user credentials associated with the recipient.