Locker system for storage and delivery of packages

ABSTRACT

A modular system of locker banks for receipt and delivery of packages is described. The system may include associate modules each having one or more lockers and a control board in communication with each of the lockers in the module. Each locker may include a locker board having a processor and memory configured to control operation of the locker. Each locker may include a lock and a light. The system may further include one or more control modules, each having the above components and further including a kiosk having one or more input and output devices for entering information to the module for controlling operation of the system. The modular system may be connected to a server and/or an administrator terminal.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application No.62/841,073, filed on Apr. 30, 2019, and U.S. Provisional Application No.62/953,848, filed on Dec. 26, 2019.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to the field of deliverycontainer systems that securely store goods for consumer pick-up. Moreparticularly, a customer can order goods from a retailer, and the systemcoordinates the storage of these goods in a secure locker. The consumercan retrieve the goods at his or her convenience.

BACKGROUND

Package delivery locker systems can be used by courier services, retailstores, and on-line vendors to aid in facilitating last mile delivery oforders made by recipients, such as through “buy online, pick-up instore.” These locker systems are often made up of several lockers, eachindividually controllable by an adjacent controller and used forsecurely storing packages of multiple recipients for later pick-up.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a perspective view of a first example of a package deliverysystem having two control modules and two associate modules.

FIG. 2 is a perspective view of a control module of the package deliverysystem of FIG. 1 with a plurality of locker doors in a fully openposition.

FIG. 2A is a detail perspective view of a control module of the packagedelivery system of FIG. 1 , in partial cut-away and with several lockerdoors in a fully open position, in particular showing the lock andlighting of a locker.

FIG. 2B is a plan view of a representative lock in a locked position,with a portion of the housing removed for clarity, useful with thelockers of the package delivery system of FIG. 1 .

FIG. 2C is a perspective view of the lock of FIG. 2B.

FIG. 2D is a plan view of the lock of FIG. 2B in an unlocked position.

FIG. 2E is a perspective view of the lock of FIG. 2D.

FIG. 3 is a schematic depicting the main electronic components of thepackage delivery system of FIG. 1 and their connections.

FIG. 4 is a schematic depicting components of the control modules and acloud-based server.

FIG. 5 is a schematic of a main board of the control module.

FIG. 6 is a schematic of a control board of the control modules and theassociate modules.

FIG. 7 is a schematic of a lock board of the control modules and theassociate modules.

FIG. 8A is a detail perspective view of a locker of the package deliverysystem of FIG. 1 in a fully open position.

FIG. 8B is a simplified schematic sectional view of the locker of FIG.8A in a closed position, taken along section line 8B-8B in FIG. 8A.

FIG. 8C is a simplified schematic sectional view of the locker of FIG.8A in a partially open position, taken along section line 8B-8B in FIG.8A.

FIG. 8D is a simplified schematic sectional view of the locker of FIG.8A in a fully open position, taken along section line 8B-8B in FIG. 8A.

FIG. 9 is a perspective view of a second embodiment of a control moduleof the package delivery system of FIG. 1 with a plurality of lockerdoors in a fully open position, where each locker interior includes asterilizing lamp.

FIG. 10 is a perspective view in partial breakaway of an interior paneland the sterilizing lamp of the control module of FIG. 9 .

FIG. 11 is a plan view in partial breakaway of the interior panel andsterilizing lamp of FIG. 10 .

FIG. 12 is a flow chart describing an example of an initializationprocedure for the locks in the package delivery system of FIG. 1 .

FIG. 13 is a flow chart describing a first example of a drop-off processfor storing an item in the package delivery system of FIG. 1 .

FIG. 14 is a flow chart describing a second example of a drop-offprocess for storing an item in the package delivery system of FIG. 1 .

FIG. 15 is a flow chart describing an example of a first process for arecipient retrieving an item from the package delivery system of FIG. 1.

FIG. 16 is a flow chart describing a second example of a process for arecipient retrieving an item from the package delivery system of FIG. 1.

FIG. 17 is a flow chart describing a subroutine within the drop-offprocess for optimizing locker availability for the disabled.

DETAILED DESCRIPTION

Reference will now be made in detail to examples of a package deliverysystem 10, examples of which are disclosed in the associated figures.Wherever possible, the same or corresponding parts will be referred toby the same or similar reference numbers across the drawings. Moreover,when more than one element of the same type is present, reference may bemade either collectively or individually. Such reference is onlyexemplary, and, furthermore, reference to elements in the singularincludes the plural and vice versa without limitation to the exactnumber or type of such elements. Headings used herein are for ease ofreference, and no limitation should be read into the disclosure based onthe headings.

FIG. 1 discloses an example of the package delivery system 10 thatallows for a recipient to securely receive items that they have ordered.Although the system 10 is described in one example herein as a packagedelivery system that can be used by a courier, the system 10 can beemployed in other applications in addition to securing packages fordelivery. For example, retailers can also use the package deliverysystem 10 for securing products ordered by their on-line customers forpick-up. A large condominium building or dormitory could employ it as asecure method of delivering documents or other materials to their ownersand/or tenants or as a secure location for drop-off of packages by acourier ordered by the tenants or owners that are too large to fit intheir mailboxes. The disclosed exemplary system 10 advantageouslycreates a record of both delivery of the item to the system 10 and arecord of the recipient retrieving the item from the system 10. In otheruseful examples, the system 10 can used in the service and repairindustry, such as in a laundromat or dry-cleaning business, whereclothing that has been cleaned can be stored in the lockers awaitingpick-up. Similar uses include securely storing items for pick-up thathave been repaired, such as personal computers, shoes, watches, and thelike. The system 10 can also be refrigerated and store groceries, eitherfor in-store pick-up or for delivery drop-off at a predeterminedlocation. Moreover, the system 10 could be heated and store preparedfood while awaiting consumer pick-up.

In another non-limiting example of use, the delivery system 10 can alsobe used as a drop-off location for consumers, such as for returningunwanted products or to ship goods to others. The delivery system 10could further include a printer capable of printing delivery labels thatcan be applied to the packages to be returned or shipped. The user wouldalso have the option of printing delivery labels via their homecomputer. The courier can retrieve the package from the locker andreturn it to the manufacturer or send it to whatever destinationindicated by the user. Similarly, the consumer can drop off clothing tobe laundered or a product to be repaired, and the service provider canretrieve the product and perform the required service.

Referring now to FIGS. 1 and 2 , the package delivery system 10 includesa series of modules 12 including two control modules 14 and twoassociate modules 16. Both the control modules 14 and the associatemodules 16 include a plurality of lockers 18 that can be arranged in anyneeded configuration and have a plurality of sizes. Each of the controlmodules 14 includes a kiosk 20 designed to allow, for example, couriers,retail employees, and recipients to input information to the packagedelivery system 10 to gain access to the lockers 18 and to store andretrieve items contained within the lockers 18. As will be describedbelow, each kiosk 20 can control each and every locker 18 within thepackage delivery system 10, and the kiosks 20 can also receiveinformation from each of the lockers 18 as well. Although two controlmodules 14 and two associate modules 16 are depicted, more or fewermodules 14, 16 can be used, according to the needs of the end users.

The kiosks 20 are disposed in the control modules 14 and include dataoutput devices including a display 22 and/or a speaker (not shown) forproviding information to the user. The speaker is particularly usefulfor the visually-impaired. The kiosks 20 also include data input devicesfor receiving information, such as authentication information, from theuser. The display 22 can also a touchscreen and therefore can functionas a data input device as well. Other data input devices can include abarcode reader 24, a digital camera 92, a mobile ID reader 94, or otherinput devices, including RFID readers, keyboards, track balls, mouses,microphones, biometric identification devices, or USB ports. As isknown, the mobile ID reader can include NFC, Bluetooth, BLE, or othermobile technologies. Other known data input devices are well-known inthe art. The package delivery system 10 can use these input devices invariety of ways to collect the needed information from a user and frompackages and can use this information when making decisions.

The control modules 14 can have a standard configuration that includesthe kiosk 20 and a predetermined layout of lockers 18. The configurationof FIG. 1 discloses a first control module 76 and a second controlmodule 78. The control modules 14 include lockers 18 configured in aleft column 28 and a right column 30 with small lockers 32, medium-sizedlockers 34, and large lockers 36 at the bottom as shown. The associatemodules 16 can have different configurations with different layouts oflockers 18 and no kiosk 20. The first associate module 38 includes leftand right columns 28, 30 of medium sized lockers 34. The secondassociate module 39 includes left and right columns 28, 30 of lockers18, with small lockers 32, medium-sized lockers 34, and large lockers 36at the bottom. Other configurations for both the control modules 14 andassociate modules 16 are, of course, possible.

The lockers 18 of both modules 14, 16 of the system 10 are suitable forreceiving and storing packages, letters, and other items that likewisewill have various dimensions. Obviously, different dimensions and moreor fewer categories of locker sizes can be employed. In fact, asassociate module 16 may include a single locker 18 that is very large.The lockers 18 can be made of durable materials such as high-strengthsteel to protect against unauthorized entry.

Referring now to FIG. 2 , each locker 18 includes a door 40 thatselectively provides access to a locker interior 42. Each locker door 40is hingedly attached to its respective locker 18. In this embodiment,the door 40 is hinged on one side and opens outwardly to allow access tothe locker interior 42 such that the interior 42 can be accessed anditems can be deposited and retrieved from inside the locker 18. Eachdoor 40 is selectively closeable by closing the door 40 such that thedoor's associated strike 163 is inserted into the door's lock 46, aswill be discussed in detail below. Each door 40 is mounted to eachlocker 18 by a high-strength hinge and can be spring-biased outwardlysuch that when the locker door 40 is in a closed position and the lock46 is unlocked, the door 40 will swing open automatically and allowaccess to the interior 42 of the locker 18. In another embodiment, thelocker door 40 itself is not biased towards an open position. Instead,when the lock 46 unlocks, the lock 46 generates a force to automaticallypush the door 40 open. Of course, a door 40 could be both spring-biasedand receive an opening force from the lock 46.

In one example, the locker door 40 can be the same material as thelocker itself, e.g. high-strength steel. In another example, the lockerdoor 40 can include a window 44 (best seen in FIG. 2A) that allows auser to view the contents of the interior of the locker. Such window 44can be made of phenolic resin, polycarbonate, or anotherimpact-resistant, transparent sheet. In the examples depicted in FIGS. 1and 2 , the first control module 76 and the first associate module 38include locker doors 40 with windows 44. The second associate module 39and the second control module 78 include locker doors 40 of the samematerial of the locker itself. Of course, the locker door can be adifferent material for various reasons, including cost and/oraesthetics.

As best seen in FIGS. 2 and 2A, each locker 18 further includes anelectronically-operated latch-type lock 46 that selectively locks itsrespective door 40 in the closed position. The lock 46 secures the doorso that the items within the locker 18 are only accessible to authorizedusers. The disclosed system 10 is not limited to latch-type locks 46,and other locks known in the art can be used to selectively secure thedoors 40 in a closed position.

Disposed within each locker interior 42 is an illumination source 48such as an LED light 48 that is configured to illuminate the lockerinterior 42. In one example, the LED light 48 is in communication withthe lock 46 itself such that the lock 46 can coordinate the lighting ofthe LED light 48. The LED light 48 can be configured such that it isilluminated whenever a locker door 40 is opened. Further, the system 10can be configured such that the LED light 48 stays illuminated when apackage or other item is disposed within the associated locker 18, evenwhen the locker door 40 is closed. This can be especially useful whenthe locker door 40 includes a window 44 so as to draw attention to andhighlight the lockers 18 that have packages or other items disposedtherein and are awaiting pickup.

As shown in FIG. 2A, the LED light 48 can be disposed near the lock 46on a side panel of the locker 18. Also as shown in FIG. 2A, the LEDlight can be a linear light mounted to or near a ceiling panel of thelocker 18. While both LED lights are shown in FIG. 2A, it is possiblethat one or the other of the disclosed LED lights 48 are employed.Therefore, the LED light 48 is not necessarily disposed on the lock 46itself, and it can be connected via wiring to the lock 46 to allowplacement of the LED light 48 within the locker 18. Further, the LEDlight 48 can have a rope light configuration to provide differentillumination effects. With a rope light configuration, the LED light 48could be disposed on the ceiling of the locker 18 or around thecircumference of the window 44. Moreover, the lock 46 can be configuredto illuminate or flash the LED light 48, or the lock 46 can illuminatethe LED light 48 in different colors and different times or underdifferent circumstances, such as seconds prior to the locker door 40opening to draw attention to the locker 18 prior to its opening. Morethan one LED light 48 can be used, and other lighting sources, such ascompact fluorescent bulbs, could be used as well.

In one example, each lock 46 is activated and locks the locker door 40when the door 40 is shut; and when the proper credentials are input andthe lock 46 is unlocked, the locker door 40, which is biased to beopened, opens automatically.

The interior 42 of the lockers 18 can further include several sensors.For example, the latches contained within the locks 46 include sensorsregarding whether they are in the locked or unlocked state. Further, thelocks 46 may be connected to proximity sensors that are configured tosense whether the locker door 40 is open or closed. The lock 46 canfurther be connected to a temperature sensor to record the temperatureof the interior of the associated locker. Other sensors, such as weightsensors and optical sensors, can be employed to confirm the presence orabsence of a package or item within the locker interior 42. Finally, asdepicted in FIG. 2A, the modules 12 include a mechanical override lock51, such that operation of the mechanical override lock 51 can open alldoors 18 at once. The mechanical override lock 51 can be connected via aone or more and connectors and/or levers (not shown) to each lock 46.

Referring now to FIGS. 2B and 2C, an example of the internal mechanicsof the lock 46 is shown. The lock 46 includes a housing 160 having arecess 161 providing access to a latch hook 162. The latch hook 162 ispivotable and includes a latch hook recess 164 sized and shaped toreceive a strike 163 (shown in FIG. 2 ) associated with the locker 18,as is known in the art. The latch hook 162 has a first leg 166 and asecond leg 168 that is longer than the first leg 166. The latch hook 162is rotatable between a first locked position, as shown in FIGS. 2B and2C, wherein the latch hook 162 can retain the strike 163 within itsrecess 164, and an unlocked position shown in FIGS. 2D and 2E, where thelatch hook 162 has rotated in a clockwise direction and released thestrike 163.

The latch hook 162 is biased in the housing 160 in a clockwise directionby a torsion spring 170 to the unlocked position. As will be understood,the housing 160 includes a portion not shown in FIGS. 2B-2E, i.e. theportion that has been removed to allow the mechanics to be visible. Thetorsion spring 170 includes an end 170 a that is affixed to that portionof the housing 160 that has been removed in the figures. Accordingly,the end 170 a of the torsion spring 170 remains fixed to the samelocation while the latch hook 162 rotates, which allows the torsionspring 170 to compress and provide the biasing force. As discussedpreviously, the force generated by the torsion spring 170 when the lock46 switches from the locked position to the unlocked position can begreat enough to throw the locker door 40 open.

A latch 172 is further disposed in the housing 160 and is pivotable. Thelatch 172 includes a lip 174 that engages the second leg 168 of thelatch hook 162 to maintain the latch hook 162 in the locked positionagainst the biasing force of the torsion spring 170. When the latch 172pivots in the counter-clockwise direction, the latch lip 174 releasesthe second leg 168, and the latch hook 162 rotates from the lockedposition to the unlocked position under the force of the torsion spring160.

A linear actuator 150 controls, in part, the rotation of the latch 162,and is biased by a coil spring 178 outwardly to bias the latch 172 tothe position shown in FIGS. 2B and 2C. When the actuator 150 isactuated, the actuator 150 pulls the latch 172 downwardly, which therebyreleases the latch 172 from the latch hook 162, allowing the latch hook162 to rotate under the force of the torsion spring 170, and therebyautomatically opening the locker door 40. The actuator 150 can be anyelectrically operated actuator known in the art, including, for example,a solenoid or an electric motor.

The actuator 150 is connected to lock circuit board (or, simply, lockboard) 140 that contains a microprocessor 142 (shown in FIG. 7 ) withassociated logic to determine if the system 10 should unlock the lock46, and thereby open the locker door 40. Disposed on the lock board 140is a first connector 144 a that receives power and control signalsregarding the lock status. The lock board 140 further includes a secondconnector 144 b that passes on power and control signals to the otherlocks 46 in the module 12. Finally, a mechanical limit switch 152 isdisposed on the lock board 140 and includes a lever 182. The latch hook162 further includes a lobe 184 that can selectively engage the lever182 of the limit switch 152 to provide feedback regarding the latchhook's 162 position. In the locked position, the lobe 184 does notengage the lever 182, but when the latch hook 162 is rotated to theunlocked position, the lobe 184 bears on the lever 182 and triggers theswitch, thereby providing feedback that the lock 46 is unlocked.

The lock 46 is further manually operable by way of a lever 186 extendingout the back of the latch 172 and outside of the housing 160.Accordingly, if a user wishes to manually unlock the lock 46, he or sheneed only push the lever 186 downwardly (as shown in FIG. 2B) and thelatch 172 will disengage the latch hook 152, thereby allowing the lock46 to shift to the unlocked position as described above. As discussedabove, by operating the override lock 51, the attached levers andconnectors can mechanically push on the levers 186 of each lock 46generally simultaneously, thereby shifting all locks 46 in the system 10to the unlocked position.

Referring now to FIG. 3 , a schematic of the control system 60 for themodules 12 is depicted. The control module 14 includes a kiosk 20 asdescribed above which is connected to a main circuit board 62, and eachoutput device and input device of the kiosk 20 is operatively connectedto the main board 62. The main board 62 receives power from a powersupply 64. The main board 62 of the control module 14 is connected to acontrol board 66 within the module 14 via a UART connection. The controlboard 66 is connected to each and every lock 46 within the controlmodule 14, again via UART connections.

The control board 66 of the control module 14 is also connected via UARTconnection to a control board 68 housed in the first associate module38. The control board 68 of the first associate module 38 is likewisepowered by a power supply 70. The control board 68 is connected via UARTto each and every lock 46 within the first associate module 38. Finally,the control board 68 of the first associate module 38 can be connectedto a control board 72 in the second associate module 39. The controlboard 72 in the second associate module 39 also is powered by a powersupply 74 and is connected via a UART connection to each of the locks 46in the second associate module 39.

As will be understood, the control board 72 of the second associatemodule 39 can be connected to a control board in the second controlmodule 78, and, as described above, the second control module 78 can beconstructed substantially the same as the first control module 76. Inthis manner, the kiosks 20 of both the first control module 76 and thesecond control module 78 are connected to and in communication with eachand every lock 46 in the package delivery system 10. Multiple controlmodules 14 can be advantageous to allow for multiple users of thepackage delivery system 10 at one time. In other words, two people maysimultaneously be retrieving their items from the lockers 18 within thepackage delivery system 10. As can be seen in FIG. 3 , each controlboard 66, 68, 72 has separate connections for locks 46 in the leftcolumn 28 and for the locks 46 in the right column 30. Further, thesystem 10 is effectively modular in that one or more control modules 14can be employed, and any number of associate modules 16 can be employed,depending on the floor size available and the number of lockers 18needed, and they can easily be connected and disconnected.

Referring now to FIG. 4 , the main boards 62 of the control modules 14may include a Wi-Fi or WLAN chip and antenna, or other wired or wirelesstransmitter for connecting the system 10 to a router and a network 79,such as, for example, one or more of the Internet, a WAN, or a LAN. Thecontrol modules 14 can be in communication with a cloud-based server 80via the Internet that can both monitor and record the operations of thepackage delivery system 10. Although a cloud-based server is depictedand referred to herein, any server 80 can be used, including local,remote, or other form of dedicated or non-dedicated server. Accordingly,any reference to a cloud-based server shall be understood broadly toencompass any computing device capable of performing the functionsdescribed herein.

Further, an administrator may communicate with and control the system 10remotely using a personal computer device 82 such as a PC, tablet, smartphone, or the like, that is also connected to the network 79 and theserver 80. By connecting to the system 10 via a personal computer 82,for example, an administrator may grant, amend, or revoke authorizationprivileges to users. The administrator may update the locks 46 with themost up-to-date firmware and security protocols and may operate thelocks 46 remotely. Further, the system 10 is able to provide reportingand notifications to the administrator such as, for example, audit logsfor lock history and user history, current statuses of each display case18, invalid access attempts, malfunctioning any low batteries, internetoutages, the amount of time a package has been stored in a locker 18,and the like. Although a WLAN chip is discussed herein, as discussedabove the package delivery system 10 can also be hardwired to thenetwork 79, using known systems and methods or connected to the Internetusing any other known method.

The main boards 62 can further communicate the on-going status of thesystem to the server 80, which can pass the information onto theadministrator at the personal computing device 82. For example, the mainboards 62 can signal the server 80 that an item has been placed in alocker 18 or retrieved from a locker 18, and the server 80 can serve asa back-up data storage unit. Moreover, for multi-control module systems,the server 80 can pass on information to the control modules 14 thatweren't used to execute the transaction to ensure that all controlmodules 14 have the most up-to-date information. For example, if a useruses the first control module 76 to deposit an item into a particularlocker 18, then that locker 18 will not be available until that item isremoved. It is important that the second control module 78 be informedof the status of the locker 18 so that it does not assign anotherdrop-off for that locker 18. In this scenario, the first control module76 signals the server 80 of the drop-off, and the server 80 signals thesecond control module 78 of the drop-off. The second control module 78can then update its database to record the unavailability of the locker18. In another example, the first control module 76 can signal thesecond control module 78 through the control boards 66, 68, 72.

The cloud-based server 80 can further be configured to communicate withthe package recipient. When a drop-off has occurred, the cloud-basedserver 80 can provide an indication to the recipient that the item isready for pick-up. Such indication can be via email, text message, orother communication.

In other scenarios, the WLAN chip can be connected to a retailer's ITsystem. In this case, the delivery system 10 can be configured to notifythe retailer upon an item being placed in a locker 18, but the packagedelivery system 10 will not inform the recipient that the item is ready.Instead, the retailer will inform the recipient that the item is ready,and the delivery system 10 will never be in possession of anyinformation able to identify the recipient. Such configuration can behelpful to minimize the number of systems having access to personallyidentifiable information.

Referring now to FIG. 5 , the main board 62 is detailed. The main board62 can include one or more processors and memory and is configured toreceive the input from the input devices of the kiosk 20. The processorscan be configured with logic to render decisions based on the data inputby the users via the input devices.

In this example, the input devices are the barcode reader 24, a digitalcamera 92, and the touchscreen display 22, all connected to the mainboard 62 via UART. The display 22 also is connected via HDMI to transferthe digital image signals, as well as an independent power supply 96.The main board 62 can further include an Ethernet connection 98 toprovide, for example, a hardwired connection to the Internet, a USBconnection 100 to connect with its respective control board 66 via UARTprotocol, and a Wi-Fi dual-band antenna 102 connected to the Wi-Fi chipdiscussed above for wireless connection to the Internet. Further, themain board 62 can include an RFID reader 90 and/or a mobile ID reader 94such as NFC, Bluetooth, or BLE. A courier or recipient can input his orher credentials or authorization in this manner. The touchscreen display22 can further be used to provide further validation of the recipient byrequiring a signature before opening of the locker door 40. Therecipient may be required to scribe his or her signature on thetouchscreen 22 by finger.

The main board 62 can also have a printer 97 connected thereto. Theprinter 97 can be used in conjunction with a process of printing ashipping label. A user may wish to ship a package to another address.The shipping company can have an application based in the main board 62that walks the user through the process of creating a shipping label.Once the shipping label is created, user can affix it to a package, anddeposit that package in a locker 18. The package delivery system 10 cannotify the shipping company that a package is awaiting delivery, and theshipping company can then retrieve the package and commence the shippingof the package. Such process can simplify and streamline the shippingprocess.

A security camera 99 may further be in communication with the main board62 to monitor the package delivery system 10. The output of the securitycamera 99 may be fed by the main board 62 to the server 80 on anon-going basis, with deletion after a pre-determined amount of time suchas two weeks.

Referring now to FIG. 6 , each module 12 includes a control board 66that is substantively the same and is either directly or indirectly incommunication with the main boards 62 of the control modules 76, 78.Moreover, the control boards 66 are in communication with each of thelocks 46 and can direct the functionality of each of the locks 46 intheir respective module 12. In this example, the control board 66includes a microprocessor 110 having one or more processors and memory.Although control board 66 is described herein, control boards 68, 72 aresimilar. Further, although the term microprocessor is used herein, itwill be understood by one of ordinary skill that any number ofstructures can be used to effectuate the functions described herein,e.g. controllers, processors, microcontrollers, and addressableswitches, and therefore the term microprocessor as used herein shall beunderstood to be exemplary and encompass all such structures.

The control board 66 includes first and second ports 112, 114, each portserving as a UART connection to a respective column of locks 18. Thecontrol board 60 further includes third and fourth ports 116, 118, eachof these ports 116, 118 serving as UART connections to control boards 66of adjacent control modules 14 or associate modules 16. The controlboard 66 further includes a power input and distribution port 120 thatreceives power from the power supply 70 and distributes power to thefirst through fourth ports 112, 114, 116, 118 as well as a voltageregulator 121 that passes on power to the microprocessor 110. Thecontrol board 66 further includes a USB connector 122 that, if used in acontrol module 14, can be used to connect to the main board 62. The USBport 122 can also be used to connect to a PC for programming of themicroprocessor 110. The control board 66 can contain several other inputand output devices that aid in programming an operating, including anin-circuit programmer/debugger port 124, status and debug LEDs 126, abuzzer 128, and a reset button 130.

Referring now to FIG. 7 , each lock 46 itself contains the lock board140 as described above having a microprocessor 142 that is incommunication with the control board 66 of its respective module 12 suchthat the lock 46 can receive various instructions from the control board66. These instructions can include unlock the lock or illuminate the LEDlights, and the lock board 140 can pass back information to the controlboard 66 from its sensors, such as whether the lock is locked/unlocked,door is open/closed, a package is within locker, temperature, and thelike. Power to the locks 46 can also be supplied through the respectivecontrol boards 66.

As discussed with respect to FIGS. 2B-2E, the lock board 140 includesthe microprocessor 142 and the two ports 144 a, 144 b for communicationwith the control board 66 and further locks 46. The lock boards 140 arearranged in daisy chain fashion such that each lock 46 has an input port144 a and an output port 144 b. When the control board 66 provides anunlock instruction, for example, the instruction will travel from thecontrol board 66 to the input 144 a of the lock board 140 and then tothe microprocessor 142 of the lock board 140 and to the lock boardoutput 144 b. The instruction will then pass from the output 144 b tothe input of the next lock board 140 in the module, and the process willbe repeated. Each lock board 140 will determine if the instruction isdirected to it, and, if so execute the instruction. Otherwise, it willignore the instruction.

The lock board 140 further includes an output 146 for the LED light 48and an output to a solenoid driver 148, which can drive the actuator 150within the lock 46, thereby locking and/or unlocking the lock 46 on thedoor 40 to the locker 18 as described above. Again, other forms of locksand electronic lock control may be used. The lock board 140 can alsoreceive an input from the switch 152 that informs the lock board of theposition of the lock 46 and direct that signal to the control board 66.Because each lock 46 includes its own microprocessor and memory, thesystem 10 is flexible and actions taken with respect to the lockers 18can be controlled at the lock board 140 rather than at the control board66. For example, the lighting can be controlled by logic stored on thelock board 140 itself, rather than signals direct from the control board66.

Referring now to FIGS. 8A, 8B, 8C, and 8D, each locker 18 of the modules14, 16 may include a door damper 200 to control the response of a lockerdoor 40 as the door 40 is opened and closed. Each locker 18 includes aframe 210 that defines the opening for the interior 42. The frame 210includes a lower cross member 212, a first upright 214 on the hingeside, a second upright (not shown) opposite the first upright, and anupper cross member (not shown) opposite the lower cross member.

Disposed on the first upright 214 is the door damper 200. In thisembodiment, the door damper 200 is a locker nub 200 that is disposed onthe first upright 214 and extends outwardly relative to the interior 42of the locker 40. The nub 200 includes a protruding head made of nylon,polytetrafluoroethene (PTFE), acetal resin, or another resilient,wear-resistant material. The nub 200 can take the form of a button-headpin with a shaft that is interference fit into a hole in the upright 214or other button-type structures known to those of skill in the art. Inthis example, the nub 200 is manufactured from nylon 6.

Each locker door 40 includes a front face 220, a rear face 222, andspine 224. The rear face 222 and the spine 224 meet at a rear edge 226.The locker nub 200 is disposed at a particular location on the firstupright 214 of the locker 18 such that, when the locker door 40 is in aclosed position as shown in FIG. 8B, the rear face 222 either does nottouch the nub 200 or bears slightly against the nub 200. After thelocker door 40 is unlocked, and thus begins to automatically swing opendue either to the spring-biasing or the unlocking force of the lock 46,the nub 200 soon after either engages in frictional contact with therear edge 226 or generates an increased level of frictional force bybearing further on the rear edge 226. This frictional force of the rearedge 226 bearing against the nub 200 is greater than the force of thedoor 40 opening and is therefore sufficient to slow the rotation of thedoor 40 until finally bringing the rotation to a halt at a partiallyopen position as shown in FIG. 8C.

By controlling the opening response of locker door 40 in this particularmanner, the locker door 40 is hindered from fully opening automaticallyupon unlocking and may be helpful to prevent a locker from opening ontoan unsuspecting person.

With the locker door 40 now stably resting in the partially openposition as shown in FIG. 8C, a user may thereafter manually open thedoor 40 further to a fully open position. As the user manually opens thedoor 40, the rear edge 226 continues to bear against the nub 200,thereby elastically deforming the nub 200. Further manual opening of thedoor 40 by the user overcomes the increased friction applied by lockernub 200, and the user places the door 40 in the fully open position asshown in FIG. 8D. As further shown in FIG. 8D, due to the particularlocation of locker nub 200, the nub 200 either disengages fromfrictional contact with the rear edge 226 or applies a decreased levelof frictional force by only slightly bearing on the rear edge 226 whenthe door 40 is placed in the fully open position. The nub 200 maintainsthe locker door 40 in the fully open position shown in FIG. 8D because,if the locker door 40 begins to close again, the rear edge 226 of thelocker door 40 may reengage frictional contact with locker nub 200. Assuch, once placed in the fully open position, locker 40 will thus beable to maintain the fully open position and resist being inadvertentlyclosed due to weak external closing forces, such as light winds,accidental bumps, or gravity if the package delivery system 10 is at anangle.

With locker door 40 now stably resting in the fully open position asshown in FIG. 8D, the user may more easily access the locker interior42, allowing items to be deposited and retrieved from inside the locker18. Once the user is done using the locker 18, she may thereaftermanually close the door 40, overcoming the friction applied by lockernub 200, and placing the door 40 in the closed position as shown in FIG.8B.

The manner of control of locker door 40 by locker nub 200 when the door40 is not locked may be characterized as behaving similarly to abi-stable system, where the locker door 40 is substantially at rest whenin either the partially open position as shown in FIG. 8C or the fullyopen position as shown in FIG. 8D, and where the locker door 40 resistsbeing placed in an intermediary position between the two restingpositions due to the frictional contact of locker nub 200. Otherbi-stable systems, such as spring-loaded systems and magnetic systems,and other shapes for the nub, such as a ramp or a resilient lining ofthe surface of the upright 214, may be used.

Referring now to FIGS. 9-11 , a second example of a control module 240is depicted. In this example, the control module 240 is constructedgenerally similarly to the control module 14, with a series of lockers18, each having a locker door 40 and a locker interior 42. In thisexample, the locker doors 40 are solid, but they could have windows 44as in previous examples.

The lockers 18 further include locks 46 and lights 48 as in previousexamples, and as better seen in FIGS. 9 and 10 , each locker 18 includesan interior side 242 on which is disposed a removable lock panel 244. Inthese examples, the lights 48 are disposed in the removable lock panels244 and are connected as described above to the lock boards 140. Thelock panels 244 can be removed to gain access to the locks 46 fortroubleshooting, updating, and replacement when necessary.

In this example, each locker 18 can further include a UV lamp 246, eachUV lamp 246 having a transparent cover 248 that allows passage of UVlight, a UV light 250, and a reflective housing 252. Each UV lamp 246 isalso in electrical connection with its respective lock board 140,thereby receiving both power and control from the lock board 140.

In this example, the UV lamp 246 emits UV-C light waves and is asterilizing lamp. This form of lamp is useful for destroying the abilityof bacteria, viruses, and other pathogens to reproduce. In other words,the UV lamp 246 may be used to help remove pathogens from the surface ofa package stored in the unit, and it may thereby improve the safety ofthe system for the package recipients. UV light in this spectrum mayalso be harmful to humans, and care must be taken in designing the unitto prevent humans from contacting the UV light. For example, the lockers18 may be designed such that the locker doors 40 will not open while theUV lamp is illuminated. Moreover, if the locker door 40 is open, the UVlamp 246 is unable to illuminate. The UV lamps 246 can be connected tothe lock board 140 in known manner, and each microprocessor 142 of thelock board 140 can control operation of the respective UV lamp 246 inconnection with the operation of the lockers 18, locker doors 40, andlocks 46.

In one process, the courier places a package in an empty locker 18 andcloses the respective locker door 40, which can inform the lock board140 that a package has been placed in that locker 18. The lock board 140then causes the illumination of the UV lamp 246 for a specified periodof time effective to help eliminate pathogens from the surface of thepackage. During this period of time that the UV lamp is illuminated, thelock board 140 prevents the lock 46 from opening. Moreover, if the lock46 is opened manually, or if the door 44 is force opened, each locker 18can include sensors that inform the lock board 140, and the lock board140 can immediately extinguish the UV lamp 246. Further, if windows 44are to be used in the doors, the transparent material used for thewindows 44 must be capable of blocking the UV light.

Referring now to FIG. 12 , prior to use, the control boards 66 for eachmodule 12 may be programmed and each lock 46, disposed in each locker18, may be mapped to the package delivery system 10 such that thecontrol system 60 knows which lock 46 is disposed relative to eachlocker 18. Referring to FIG. 12 , a user such as a technician firstconnects his or her computer to the control board via the USB port 122at step 300. The technician executes a program that initializes thecontrol board 66 and provides it with a unique identification number(“UID”) at step 302. That UID will be used by the main board 62 foraddress purposes.

The technician may then provide a unique identification number to eachof the locks 46 in the module 12. The technician may start by unlockingall of the locker doors 40, such as by using the kiosk 20 as describedabove or by operating the mechanical override lock 51 by use of acorresponding key. With all locker doors 40 open, the technicianmanually places the lock 46 in the upper-most position in the leftcolumn 28 in the unlocked position, such as by leaving the correspondinglocker door 40 open. The technician then manually places all remaininglocks 46 in the locked position at step 304, such as by closing thecorresponding locker doors 40 in the closed position. The technicianexecutes a program on his or her computer that generates a UID andassigns it to the lock 46 in the unlocked position in step 306. Thetechnician reviews whether all locks 46 have been assigned UIDs at step308, and, if not, the technician then manually places that lock 46 inthe locked position, then places the lock 46 in the locker 18immediately below the first locker in the unlocked position at step 310.The technician then executes the same program at step 306, which assignsa second randomly generated UID to the second lock. The techniciancontinues in this manner reaching the bottom locker of the left column28, then moving on to the top locker 18 in the right column 30, thenmoving down until reaching the bottom locker 18 in the right column 30until all locks 46 have been assigned UIDs. In this way, eachmicroprocessor 142 in each lock board 140 is provided with a uniqueidentification number.

The technician may then map each lock 46 to its position within in themodule 12. The technician calls a mapping program, here called“Initialize Panel,” at step 312, and within that program identifieswhich configuration of module 12 is being used. In most embodiments,there will be a few pre-programmed configurations of modules 12 havingvarying locker layouts and sizes. In this disclosure there are threeconfigurations—the control modules 14, the first associate module 38,and the second associate module 39. By selecting from the pre-programmedconfigurations, the control board 66 is instructed as to how manylockers 18 are present in each column 28, 30 and what the sizes of eachlocker 18 are. After selecting the configuration of module 12, thetechnician executes the program at step 314.

The technician then, again, places the lock 46 in the upper left lockerin the unlocked position, and all other locks are placed in the lockedposition at step 316. The technician then executes a third program, herecalled, “Program Next Door,” at step 318 which maps the unlocked lock 46to the location of the locker 18 within the module 12. The technicianthen reviews whether all locks 46 have been mapped at step 320, and thenunlocks the lock 46 directly beneath the first lock at step 321, andthen executes Program Next Door again at step 318. The techniciancontinues in this way, first moving downwardly to the locker 18 at thebottom of the first column 28, then to the locker 18 at the top of theright column 30, then down again to the locker 18 at the bottom of theright column 30. After all locks 46 are mapped, the technician canexecute a final program at step 322 that will output the lockerlocations and the lock UIDs for review. Here, that program is called,“Read Panel Info.” The technician reviews the output at step 324 toensure that he or she has mapped all locks 46 correctly. If there isincorrect mapping, the technician can start again at step 302. Ofcourse, the titles of the programs are for description only and nolimitations should be read therefrom.

Other mapping protocol could be used. For example, instead ofidentifying which of the locks 46 is unlocked to assign the lock UID,the program used by the technician may instead identify which of thelocks 46 is locked to assign the lock UID. For example, the system couldagain start with all locks unlocked and all locker doors open. Thetechnician can then close the upper left locker door, then execute“Program Next Door.” The user would then close the locker doorimmediately below the first and execute Program Next Door. The userwould continue with the remaining doors as described above.

Referring now to FIG. 13 , a first example of a delivery procedure willbe discussed. A courier, who has previously been registered with thesystem, approaches the package delivery system 10 and the touchscreen 22displays at least two exemplary options: “PICK-UP” and “DROP OFF.” Instep 350, the courier selects the options “DROP OFF” by touching thetouchscreen. After selecting drop-off, the courier is prompted to enterhis or her access code or other credentials at step 352. The access codecan be a numeric sequence such as a PIN code, an RFID tag, NFC, aBluetooth signal, a BLE signal, or any other known system ofauthentication. The package delivery system 10 then analyzes the accesscode at step 354, and if the access code is not valid, it presents anerror code at step 256 and returns to step 352.

If the access code is valid, the courier is prompted by the touchscreen22 at step 358 to enter the recipients' name, email address, or otheridentifying information. Using the touchscreen, the courier enters aportion of the recipient's name or other information, at which time thepackage delivery system 10 locates the recipient's name and associatedemail address. At step 362, the package delivery system 10 prompts thecourier to take a photo of the package using the digital camera 92 ofthe kiosk 20 as proof that the package was delivered.

After the digital photo is successfully captured, the system 10 promptsthe courier at step 364 to select which size of locker 18 is needed tostore the package. In the disclosed example, the touchscreen 22 providesicons of small, medium, and large, and the courier touches the screenicon at step 366 representing the size of locker 18 needed. The system10 selects a locker 18 of the requisite type, informs the courier whichlocker 18 has been selected, and, at step 368, automatically unlocks thelock 46 of the selected locker 18 and the door 40 opens. The LED light48 may illuminate at this point, with either steady illumination orflashing illumination. The courier then places the package in the locker46 at step 370 and closes the door 40, with the lock 46 lockingautomatically after the door 40 is closed.

At step 372, the system 10 prompts the courier with a query of whetherthe courier completed the drop-off. At step 374, the courier responds,and if not completed, the system 10 returns to step 366 and prompts thecourier to enter the size of the locker 46 needed.

If the drop-off was competed, the package delivery system 10 prompts thecourier with an inquiry of whether any further packages are to be storedfor other recipients at step 376. Again, the courier responds at step378, and if further packages are to be delivered, the system 10 returnsto step 358. If not, step 380 is performed, and the system 10 updatesits local database on the main board 62 and the cloud-based server 80with the occupied locker status. The status can include the locker UID,the time and date of delivery, and identification of package andrecipient. The cloud-based server 80 will then update the database onany other control module 14 within the package delivery system 10. Thecloud-based server 80 will then notify the recipient that his or herpackage has been delivered at step 382. In another example, the server80 will update the local databases after completing the delivery andprior to step 376.

In certain instances, the recipient will not have registered with thesystem 10. If this happens, either the main board 62 or the server 80will inform the administrator 82, and the administrator can inform therecipient that the package is waiting in a particular locker 18.

Referring now to FIG. 14 , a second drop-off process is disclosed. Thefollowing drop-off process may be suitable for a retailer that acceptsorders through its website or other on-line system, and then fulfillsthe order by locating the item within its retail environment (or byhaving the item shipped to the retail store) and storing it in a locker18 within the store to await pick-up by the customer. Thus, after anorder is placed and the employee has located the item, the employeeapproaches the delivery system 10. The touchscreen 22 prompts theemployee with the choices of drop-off or pickup, and in step 400, theemployee selects drop-off. The employee next inputs his or her accesscode at step 402. Again, the access code can be a numeric code, RFID,Bluetooth, or any other known authentication process or procedure. Themain board 62 determines whether the access code is valid at step 404,and if not, the touchscreen 22 provides an error message at step 406 tothe employee and returns the system 10 to step 402 to request a validaccess code. If the access code is valid, the package delivery system 10prompts the employee to scan the barcode associated with the order withthe barcode reader 24. In other words, it is understood that retailerwill generate an access code such as a barcode and associate thatbarcode with the order. Of course, other access codes, such as numericcodes, can be used.

After the employee scans the barcode at step 407, the touchscreen 22prompts the employee with available size lockers at step 408, and theemployee selects the required locker size at step 410 via thetouchscreen 22. Much as in the previous example, the package deliverysystem 10 then indicates via the touchscreen 22 the locker 46 that willbe used, and, at step 412, the system 10 unlocks the lock 46 associatedwith the locker 18, and the locker door 40 opens automatically due tobeing biased in the open orientation. At step 414, the employee placesthe item associated with the order in the locker 18 and closes thelocker door 40. The system 10 then prompts the employee at step 416 witha query of whether the delivery for this particular order is complete.If the employee touches “no” at step 418, the system 10 returns to step408 and queries the employee of which size locker 18 is necessary. Ifyes, the system 10 prompts the employee at step 420 regarding whetherany additional orders are ready to be fulfilled. If the employeeresponds with “yes” at step 422, the system 10 returns to step 407 andrequests the employee to enter the barcode associated with the nextorder. If the employee responds with “no,” the system 10 directs the LEDlight 48 associated with the locker used by the employee to illuminatethe locker 18 at step 424 until the package is removed.

The system 10 next informs the retailer's IT system via either its mainboard 62 or its cloud-based server 80 that the package associated withthe order has been stored in a particular locker 46. It is understoodthat the retailer's IT system can then inform the recipient that thepackage is waiting for them in the selected locker 46. In this manner,the package delivery system 10 never possesses any information relatedto the recipient. The cloud-based server 80 can then update thedatabases of any other control modules 14 within the package deliverysystem 10 as described earlier. Again, the server 80 may update thelocal databases after the delivery is completed and before step 420.

Referring now to FIG. 15 , a first example of a pick-up process isdisclosed, most useful with the drop-off process of FIG. 13 . It isunderstood that the recipient has been notified via email that thepackage has been delivered and is awaiting at the package deliverysystem 10. The recipient may have already created an account with thesystem providing a telephone number and PIN code. Further, the emailreceived by the user may provide an access code or a QR code.

In step 450, the recipient is provided with the same opening selectionpossibility as in the previous processes, i.e., “PICK-UP” or “DROP OFF,”and the recipient selects “pick-up” on the touchscreen 22 of the kiosk20. The touchscreen 22 then prompts the recipient for a credential atstep 452 which can be the recipient's phone number, an access codeprovided in the email or a QR code provided in the email. After thecredential is entered, the system 10 determines whether the recipienthas entered a telephone number at step 454. If the recipient has entereda telephone number, the system then requests that the recipient providehis or her PIN code at step 456. After receipt of the PIN code, thesystem 10 will then determine if the combination of the telephone numberand PIN code is valid at step 460. If not, the system presents an errormessage to the user at step 462 and returns to step 456 requesting avalid PIN code.

If the user did not enter a telephone number, the system determineswhether the recipient has entered an access code provided in the emailat step 464. If yes, the system 10 then determines if the access code isvalid in step 466. If not valid, the system 10 presents an error messageat step 468 and returns the system 10 to step 452. If the recipient didnot present either a telephone number or an access code, the system nextdetermines if the recipient input a QR code at step 470. If not, thesystem 10 returns to step 452 and await the user input of credentials.If the user did input a QR code via the barcode reader 24, the system 10then determines if the QR code is valid at step 466. Again, if the QRcode is not valid, the system 10 presents the user with an error messageat step 468, then returns the system to step 452. In another example,the user can simply be provided the option of scanning the QR code atstep 400, on the screen of the kiosk 20 at the same time as the optionof drop-off or pick-up. After the recipient enters his or hercredentials and the package delivery system 10 validates thosecredentials, the digital camera 92 can take a photo of the recipient forsecurity reasons.

If any of the telephone number/PIN code, access code, or QR code isvalid, the system 10 opens the associated locker door 40 at step 472.The recipient can remove the package and close the locker door 40 atstep 474. The system 10 then prompts the recipient whether he or she isdone picking up packages from this order at step 476. The recipientresponds in step 478, and if not done, the system will return to step472 and open the next locker door 40 associated with the order. If done,the system 10 updates the local database and the cloud-based serverregarding the empty locker status at step 480. The system 10 can thenfurther email or text message the recipient to notify them of thesuccessful pick-up at step 482, and within that email or text message,the system 10 can include the photo taken of the recipient after thecredentials were validated. As mentioned earlier, the cloud-based server80 can perform the communication and update the other control modules 14within the system.

Finally, referring now to FIG. 16 , a pick-up process that can be usedin conjunction with the drop-off process of FIG. 14 is disclosed. Again,the recipient approaches the package delivery system 10 and selectspick-up in step 500. The recipient scans his or her barcode received inthe email or text notification that the package was ready for pick-up atstep 502. Next, the recipient enters his or her PIN code associated withhis or her account at step 504. The system 10 evaluates the barcode andPIN code at step 506, and if not valid, presents an error message atstep 508 and returns the system 10 to step 504 for re-entry of the PINcode. If the combination is valid, the system 10 opens the appropriatelocker door at step 510. The recipient can then retrieve his or her itemfrom the locker 18 and close the door 40 at step 512. The system 10queries whether the recipient has additional packages to pick-up at step514. If the recipient enters yes at step 516, the system returns to step502 to allow the recipient to enter another barcode. If the user inputs“no,” the system 10 moves to step 518 and updates the local database andthe cloud-based server 80 and notifies the retailer's IT system that thepackage was picked up. The retailer, who again has information relatingto the recipient, can email or text the customer to inform them thatthey package was retrieved.

Other functions can be added. For example, it is desirable that therecipient retrieves his or her package soon after it is delivered to thepackage delivery system 10. With rapid turnover, the couriers and theretailers can deliver more items. Accordingly, administrators may placea time limit on the amount of time that a package may be stored beforebeing automatically returned. Certain couriers or retailers may seek tolimit the time to three or four days. To address any issues with therecipient being unavailable during that time frame, the package deliverysystem 10 may include a vacation hold feature, whereby the recipient,upon receiving the notification that his or her package has beendelivered, can request an extended time period with which to pick up thepackage. Thus, the system may default to a short three-day period, butthe recipient can extend the time period to one week or more. The lengthof the vacation hold can be set by the administrator via an applicationor website running on the personal computing device 82.

In other features, the kiosk 20 can allow an administrator to accessadministration features directly on the control module 14. After loggingin with an access code and PIN number, the administrator can select an“add module” function, and control module 14 will query whether anothermodule 12 has been connected as described above. If so, the main panel62 will execute a function recognizing the second module and enablingcommunications and control data to be sent between the two.

The display 22 can then display the names and locations of lockers 18 ofthe newly recognized module 12 and further can display touchscreen iconsthat allow a function to be called to open each door 40. In this way,the technician can ensure that the main board 62 of the control module14 can control the lock boards 140 within the newly recognized module12.

In another function, when an administrator logs in, the package deliverysystem 10 may provide the administrator a report of the packages thathave been stored within the package delivery system 10 for too long. Theadministrator may then either set those packages for return to sender orreturn the items back to the sales floor.

The display 22 can further open a maintenance screen for servicing thepackage delivery system 10. The display can include touchscreen iconsfor ordering an entirely new module, for ordering a replacement controlboard 66, or for ordering replacement lock boards 140 for any of thelocks 46 of the associated module 12. By touching the icon on thedisplay, the main board 62 signals the cloud-based server 80, and thecloud-based server 80 can be configured to signal, for example, aservice company, the manufacturer of the module 12, or a supplier of theparts.

Referring now to FIG. 17 , the package delivery system 10 can beconfigured to allocate lockers in a way that optimizes lockeravailability for the disabled. FIG. 17 is a flowchart that is asubroutine that may be incorporated into the drop-off procedure of FIG.13 . One of ordinary skill will understand that it can be incorporatedinto the drop-off procedure of FIG. 14 as well. Accordingly, asdisclosed with respect to FIG. 13 , the courier in a drop-off procedurecan, at step 358, look up the recipient by entering his or her name,email address, or other identifying information in the kiosk 20. Oncethe package delivery system 10 locates the individual, it can thenreview the individual's account to determine if that individual has a“disabled” indicator contained therein. In other words, when creating anaccount for the package delivery system, the recipient may check a boxor otherwise indicate his or her status with regard to physicaldisability.

The package delivery system 10 can be programmed with an algorithm thatoptimizes locker selection for accessibility for the disabled. Thepackage delivery system may have categorized the lockers into twogroups: a first group that are highest off the ground and a second groupthat are lower to the ground and accessible to the disabled. The packagedelivery system will prioritize filling the lockers 18 that are highestoff the ground for those recipients who are not disabled, and it willdelay filling lockers 18 that are nearer the ground in an effort to savethose lockers 18 for the disabled. Accordingly, the package deliverysystem 10 will review the account of the recipient of the package atstep 552. If the recipient does have a disability indicator in his orher account, at step 554 the package delivery system will only allowthose lockers in the second group to be filled. But if the recipientdoes not have a disability indicator in his or her account, the packagedelivery system will prioritize filling those lockers in the first groupat step 556. Thereafter, the package delivery system 10 will proceed asin FIG. 13 , and the system 10 will require the courier to take a photoof the package (step 362), provide the available locker size options(step 364), the courier will select the required size (step 366), andthe system 10 will open the door of a locker of the specified size (step368), with the locker being selected by the system 10 under thedirection of the algorithm of steps 550-556.

In another aspect of the package delivery system 10, an application canreside on a recipient's personal computing device such as a smart phonethat can simplify and speed interactions with the package deliverysystem 10. For example, the system 10 can push notifications to thesmart phone indicating that a package has been delivered and is awaitingpickup. The system can also push notifications that the package will bereturned if not picked up within a certain amount of time, and later,that a package has been returned for failure to retrieve. The app canalso control or provide credentials via Mobile ID. Accordingly, the appcan generate a unique identification for a recipient, and that recipientcan provide that identification via mobile ID through, for example, NFC,Bluetooth, or BLE. The app can receive a QR code from the system 10 andprovide an image of the QR code for scanning at the system 10.

In another aspect, the system 10 may be used in a retail storeenvironment to protect against theft. Theft from a retail storeenvironment, both from customers and employees, has long been a problemfor retailers. In particular, certain items are small and expensive, andtherefore are more likely to be subject to theft. One solution has beento place these items on a retail floor under lock and key in a cabinet.Accordingly, when a customer seeks to purchase that item, he or she mustfirst locate a store employee to open the cabinet. This can befrustrating for customers, as store employees may not be available whenneeded. Even when a store employee can be located, the employee may takethe product and immediately require the customer to purchase theproduct. This may not be satisfactory, as the customer may have toimmediately wait in line to purchase that product, and he or she maythen wish to continue shopping and be required to conduct a secondtransaction upon leaving the store. Further, this system does nothing toprotect against employee theft. In another unsatisfactory solution,those products are stored behind the check-out counter or servicecounter, and the customer cannot access the product without firstwaiting in line. It would be a great advantage if a retailer could storeand display high-value items in an access-controlled cabinet that bothprotected against loss as well as made the items more easily availableto customers.

In a first example of improving control and reducing theft, the system10 is placed on the floor within a retail environment. A customer caninput on the kiosk 20 an identification of the locker display case 18(the display cases 18 may be individually numbered, for example) and, ifapplicable, the number of products desired. As noted above, the kiosk 20can include a touchscreen display 22 and a camera 92. The customer can,by using the touchscreen display 22, indicate which display case 18 toopen. The camera 92 will take a picture of the user, and the system 10will store the photo, either at the kiosk 20 or on the server 80. Thesystem 10 will then open the display case 18, allowing the user toretrieve the desired product. The user, knowing of the recording of thephotograph and identification of the goods taken, will be less likely tocommit theft of the goods.

Facial recognition technology and artificial intelligence can also beemployed at the register and at the retail store exits to determine ifthe user has paid for the goods. The cloud server 82 can be connected tothe retail store's security systems By using known techniques ofcomparing the photo of the user with video taken at the retail storeregisters and the exits, and further by cross-referencing the user'spurchased goods against the goods identified at the kiosk, it can bedetermined whether the user paid for the goods while checking out.Moreover, the goods stored in the display cases 18 may include securitydevices affixed thereto or other identification devices. These devicescan alert the cloud server 80 when the goods are purchased and/orremoved from the store premises.

In a second example of protection against retail theft, the user caninform the administrator that he or she would like to retrieve a storedgood. As noted above, the kiosk 20 can include a display 22, a camera92, a microphone, and a speaker. Further, the kiosk 20 can be connectedto a personal computing device 82 operated by the retail storeadministrator via the network 79 as described above. The main board 62of the kiosk 20 can be programmed such that a customer can initiate arequest at the kiosk 20, which will then alert the administrator. Thecustomer can interact with the administrator and indicate the specificdisplay case 18 that he or she would like opened to access the productcontained therein. The customer can communicate the request using one ormore of the touchscreen display 22, the microphone, and the camera 92.The camera 92 can take a photo of the customer, which can be savedeither at the administrator's CPU 82 or on the server 80. Theadministrator can ask how many of the products the customer will betaking, and upon receiving a response, can then initiate an unlocking ofthe requested display case 18. The user, knowing that his or her photois stored along with a record of the product retrieved, in combinationwith potential facial recognition technology at the register and exit asdiscussed above, will be far less likely to shoplift.

The above described preferred embodiments are intended to illustrate theprinciples of the invention, but not to limit its scope. Otherembodiments and variations to these preferred embodiments will beapparent to those skilled in the art and may be made without departingfrom the spirit and scope of the invention as defined in the followingclaims.

The invention claimed is:
 1. A locker system, comprising: a moduleincluding a first locker and a second locker, the first locker includinga first light, the second locker including a second light, each lightconfigured to illuminate an interior of its respective locker; a controlboard disposed in the module; a first lock board associated with thefirst locker and a first lock; a second lock board associated with thesecond locker and a second lock; the first and second lock board eachincluding a processor and memory, each lock board further including aninput port for receiving control signals and a first output port forforwarding control signals, each lock board further including a secondoutput port, wherein the second output port of the first lock board iscoupled to the first light, and the second output port of the secondlock board is coupled to the second light; and wherein the control boardis in communication with the input port of the first lock board, whereinthe first output port of the first lock board is in communication withthe input port of the second lock board; wherein the control board isconfigured to transmit a lock instruction to the first lock board,wherein upon receipt of the lock instruction, the first lock board isconfigured to read the instruction and transmit the instruction to thesecond lock board.
 2. The locker system of claim 1, wherein the firstlight is an LED.
 3. The locker system of claim 2, the first lockerfurther comprising an auxiliary light, the auxiliary light being a UVlight.
 4. The locker system of claim 1, wherein the first light is a UVlight.
 5. The locker system of claim 4, wherein the first lock board isconfigured to illuminate the UV light for a predetermined period of timeupon insertion of a package within the first locker.
 6. The lockersystem of claim 1, wherein the first lock board is configured toilluminate the first light while a package is disposed within the firstlocker.
 7. The locker system of claim 1, the lock instruction furtherincluding a unique identification associated with the first locker orthe second locker.
 8. The locker system of claim 7, wherein the firstlock board is configured to perform a lock function if the uniqueidentification is associated with the first locker.
 9. A locker systemcomprising: a control module including a kiosk having one or more inputdevices, a main board having a processor in communication with thekiosk, and a first control board having a processor in communicationwith the main board, the first control board further including a firstcontrol output and a first lock output, the control module furtherincluding a first locker, a first lock board and first lock associatedwith the first locker, the first lock board including a processor incommunication with the first lock output; an associate module having asecond control board having a processor in communication with the firstcontrol output, the second control board further including a secondcontrol output and a second lock output; and the associate modulefurther including a second locker, a second lock board and a second lockassociated with the second locker, the second lock board including aprocessor in communication with the second control board; wherein thesecond control board is releasably connected to the first controloutput.
 10. The locker system of claim 9, the second lock boardincluding an input port and an output port, the input port incommunication with the second lock output of the second control board.11. The locker system of claim 10, the associate module furthercomprising a third locker, a third lock board and a third lockassociated with the third locker, the third lock board including aprocessor and having an input port and an output port, the input port ofthe third lock board in communication with the output port of the secondlock board.
 12. The locker system of claim 9, wherein the main boardfurther comprises connecting means for connecting to an externalnetwork.
 13. The locker system of claim 12, wherein the connecting meansis one or more of a wireless antenna and an ethernet port.
 14. Thelocker system of claim 12, wherein the main board is configured tocommunicate status information with a remote server via the connectingmeans.
 15. The locker system of claim 9, wherein the input device is oneor more of a touch screen display, an RFID reader, a mobile ID reader, abarcode scanner, and a camera.
 16. The locker system of claim 9, whereinthe first lock board is configured to receive a lock instruction fromthe first control board.
 17. The locker system of claim 16, wherein thefirst lock board is configured to transmit the lock instruction to thesecond lock board.
 18. The locker system of claim 9, wherein the firstlock board further comprises a lamp power outlet.
 19. The locker systemof claim 9, wherein the associate module is configured to be communicatewith a second associate module or a second control module via the secondcontrol output of the second control board.
 20. The locker system ofclaim 9, the associate module further comprising a third locker, a thirdlock board, and a third lock associated with the third locker, whereinthe second locker is within a first column of lockers in the associatemodule, wherein the third locker is within a second column of lockers inthe associate module.