High security wireless key for asynchronous delivery drop boxes

ABSTRACT

A wireless key ( 6 ), capable of transmitting an ultra-low frequency radio wave signal ( 5 ), is used to gain access to a secure receptacle ( 1 ), the wireless key ( 6 ) and receptacle ( 1 ) comprising a system to ensure the secure transfer or delivery of items between parties typically engaging in e-commerce. The wireless key ( 6 ) possesses a means to discriminate against the unauthorized entry of the receptacle, such as through the use of buttons to enter a secure access code. The wireless key ( 6 ) accepts an access code entry from the user desiring entry to the receptacle ( 1 ) and subsequently transmits an ultra-low frequency signal ( 5 ) to a receiving and processing means ( 4 ). If the analysis of the signal indicates the user of the wireless key ( 6 ) is authorized to gain entry to the receptacle ( 1 ), the receptacle&#39;s locking mechanism ( 3 ) is disengaged to allow entry.

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority from U.S. application Ser. No.10/415,502 filed Apr. 28, 2003, which is a Section 371 national phase ofPCT/US01/26840 filed Aug. 28, 2001, which is a non-provisional of U.S.application No. 60/228,555 filed Aug. 28, 2000, all of which areincorporated herein by reference for all purposes.

BACKGROUND OF THE INVENTION

The present invention relates to the secure transfer of retail goodsbetween a delivery carrier and a consumer. With the advent ofe-commerce, a consumer can order a retail good through the Internet orother telecommunications means and the delivery carrier must make adelivery to the consumer and at a time that is potentially inconvenientfor the consumer to receive the order. To deliver the retail goods tothe consumer, the parties will make use of a secure drop box orreceptacle that possesses a lock to prevent unauthorized parties, suchas thieves, from accessing the drop box.

Currently, many secure receptacles employ a keypad which is physicallyintegrated with the secure receptacle. When a delivery carrier orconsumer desires to gain access to the secure receptacle, an access codeis entered using the keypad. Keypads thus provide some level ofsecurity, but the access code may be compromised through either thedirect observation of an authorized party entering the code, or bydetermining which keys have been previously depressed by inspecting thekeys of the keypad.

Therefore, there is a need to increase the means by which security ofdrop boxes can be increased to ensure the delivery of retail goods to aconsumer.

SUMMARY OF THE INVENTION

The present invention is directed towards a system for the delivery ofretail goods to a secure receptacle. A wireless key transmitting anaccess code allows entry to the secure receptacle upon the successfulprocessing of the access code and the subsequent disengagement of thesecure receptacle's locking mechanism.

DESCRIPTION OF THE DRAWINGS

FIG. 1 shows the wireless key transmitting an unlocking signal to theantenna cooperatively positioned within the secure receptacle.

FIG. 2 shows one embodiment of the wireless key.

FIG. 3 shows a cellular telephone acting as a wireless key through ageographically distanced central server.

FIG. 4 shows a two-way pager acting as a wireless key through ageographically distanced central server.

FIG. 5 shows a home computer acting as a wireless key through ageographically distanced central server.

FIG. 6 shows a wireless key in which the programmable memory and centralprocessing unit of the wireless key determine whether the access code isauthorized before a signal is transmitted to the antenna that isphysically integrated with a secure receptacle.

FIG. 7 shows a wireless key in which unlocking signals are sent to thesecure receptacle and the central processing unit and programmablememory integrated with the secure receptacle determine whether theaccess code entered into the wireless key is authorized.

FIG. 8 shows the process associated with the use of a wireless key, oneaccess code, and a secure receptacle in the secure delivery of retailgoods.

FIG. 9 shows the process associated with the use of a wireless key, akeypad, two access codes, and a secure receptacle in the secure deliveryof retail goods.

FIG. 10 shows the process associated in the use of an icon that informsa consumer about how much space is left in that consumer's securereceptacle as an order for retail goods is placed.

DETAILED DESCRIPTION OF THE INVENTION

The present invention is directed to a system that uses a wireless keyand a secure receptacle in the transfer of retail goods between aconsumer and a delivery carrier. The system, through the use of thewireless key, possesses several means to discriminate against thoseparties who are not authorized to use the wireless key for gainingaccess to the secure receptacle.

A retail good in the present invention comprises any good or servicethat a consumer can purchase remotely from a supplier, such as throughthe Internet or over the telephone, and involves the delivery or pickupof a tangible item. Such retail goods, for example, include perishableand packaged dry goods, pharmaceutical prescriptions, and beverages. Inaddition, retail goods include items associated with convenienceservices. For example, movie rentals and the dry cleaning of clothingare retail goods as envisioned in this invention, although such“products” are closely related to the performance of a service. Thepresent invention contemplates a retail good as anything which can bedelivered and picked up at a consumer's residence by a delivery carrierand stored in a secure receptacle. Thus, the present inventioncontemplates the transfer of retail goods, which includes not only thedelivery of items, but also the pickup of items.

The secure receptacle is designed to safely guard retail goods betweenthe times that the retail goods are transferred between the user of thesecure receptacle, the consumer, and the delivery carrier for thesupplier. In order for a delivery carrier to access the securereceptacle to either pickup or deliver a retail good, the securereceptacle must be located in a place that is accessible to the rest ofthe public. Thus, to protect against thieves and other unauthorizedpersons, two variables must be addressed in securing the receptacle:securing the interior so that the contents of the receptacle remainsafe, and securing the receptacle itself so as to minimize the risk ofthe theft of the receptacle itself.

Securing the receptacle itself may be accomplished by many means, suchas attaching the receptacle to the exterior side of a house or boltingthe bottom of the interior to the ground. However, the preferredembodiment of the invention is to secure the bottom of the securereceptacle (1) to a separate platform base (2), as shown in FIG. 1, thathas a large weight, such as 120 pounds. A platform base of this massallows the receptacle to be moved relatively easy, yet provides adeterrent to theft.

The receptacle possesses a locking mechanism (3), as shown in FIG. 1,coupled with a central processing unit to prevent unauthorized access tothe contents of the receptacle. The locking mechanism is disengaged bythe central processing unit (4) only if an unlocking signal (5) istransmitted from the wireless key (6) and ultimately received by theantenna (7) and processed as acceptable by the central processing unit(4). The unlocking signal in the preferred embodiment comprises anultra-low frequency radio wave.

Those skilled in the art will recognize that many different electronicembodiments are possible to produce a device that comprises a wirelesskey. One embodiment of the invention, as shown in FIG. 2, contemplates awireless key (6) that possesses ten buttons (8) and is convenientlyshaped to be about the size of a credit card. The wireless keyfurthermore possesses a central processing unit that controls thetransmission of the unlocking signal, and a programmable memory forstoring the access code known by a party authorized to use the wirelesskey. Upon the entry of an access code, the central processing unitcompares the entry to that stored in the first programmable memory. Ifthe entered access code correctly matches the access code stored in thememory, an unlocking signal will be transmitted by the wireless key whenthe user of the wireless key presses an “OPEN” button (9).

The following examples further illustrate, without limitation, how awireless key can be used with a secure receptacle.

EXAMPLE 1

In one embodiment of a system for the secure delivery of a retail good,as shown in FIG. 3, a wireless key comprising a cellular telephone (20)and possessing a plurality of buttons to enter an access code transmitsa first unlocking signal (21) to a geographically distant central server(22), the wireless key being physically separate from a securereceptacle and typically stored in locations inaccessible tounauthorized users of the secure receptacle. A receiving unit (23),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (22). The receiving unit receives a second unlockingsignal (24) from the geographically distant central server. The centralprocessing unit of the receiving unit (23) processes the secondunlocking signal (24), whereupon a locking mechanism (25) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 2

In one embodiment of a system for the secure delivery of a retail good,as shown in FIG. 4, a wireless key comprising a two-way pager (30) andpossessing a plurality of buttons to enter an access code transmits afirst unlocking signal (31) to a geographically distant central server(32), the wireless key being physically separate from a securereceptacle and typically stored in locations inaccessible tounauthorized users of the secure receptacle. A receiving unit (33),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (32). The receiving unit receives a second unlockingsignal (34) from the geographically distant central server. The centralprocessing unit of the receiving unit (33) processes the secondunlocking signal (34), whereupon a locking mechanism (35) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 3

In one embodiment of a system for the secure delivery of a retail good,as shown in FIG. 5, a wireless key comprising a home computer with amodem (40) transmits a first unlocking signal (41) to a geographicallydistant central server (42), the wireless key being physically separatefrom a secure receptacle and typically stored in locations inaccessibleto unauthorized users of the secure receptacle. A receiving unit (43),comprising a central processing unit communicatively connected to aprogrammable memory, is cooperatively positioned within the securereceptacle and communicatively connected to the geographically distantcentral server (42). The receiving unit receives a second unlockingsignal (44) from the geographically distant central server. The centralprocessing unit of the receiving unit (43) processes the secondunlocking signal (44), whereupon a locking mechanism (45) for the securereceptacle is disengaged thereby allowing entry to the securereceptacle.

EXAMPLE 4

In a further embodiment of the invention, as shown in FIG. 6, areceiving unit comprises an antenna (50) and a first central processingunit (51). The receiving unit is cooperatively positioned within asecure receptacle, the first central processing unit (51)communicatively connected to the antenna (50), and the antennacommunicatively connected to a transmitter of a wireless key (52) via awireless link (53). The wireless key comprises a programmable memory(54), a second central processing unit (55), and a transmitter (52), thewireless key being physically separate from the secure receptacle andtypically stored in locations inaccessible to unauthorized users of thesecure receptacle. The wireless key further possesses a plurality ofbuttons (56), the plurality of buttons being used to enter an accesscode. The second central processing unit (55) of the wireless keyproceeds to determine whether the access code entered is consistent withthe access code stored in the programmable memory (54). Upon the centralprocessing unit (55) determining that the access code entered isacceptable, the transmitter (52) of the wireless key transmits a signalto the antenna (50) when the user pushes the “OPEN” button. The firstcentral processing unit (51) receives a signal from the antenna (50) andsubsequently disengages the locking mechanism (57) to allow access tothe interior of the secure receptacle.

EXAMPLE 5

Another embodiment of the invention, as shown in FIG. 7, involves areceiving unit comprising an antenna (60), a programmable memory (61),and a central processing unit (62). The receiving unit is cooperativelypositioned within a secure receptacle, with the central processing unit(61) communicatively connected to the antenna (60) and the programmablememory (62), and the antenna communicatively connected to a transmitter(63) of a wireless key via a wireless link (64). The wireless keycomprises a transmitter (63) that transmits a plurality of unlockingsignals in sequential order, with one unlocking signal being sent uponthe pushing of one of the plurality of buttons (65) of the wireless key.The plurality of unlocking signals are received by the antenna (60) andprocessed by the central processing unit (61). If the sequence ofunlocking signals transmitted by the wireless key is consistent with theaccess code stored in the programmable memory (62), the centralprocessing unit (61) disengages the locking mechanism (66) of the securereceptacle, thereby allowing the user of the wireless key access to theinterior of the receptacle.

EXAMPLE 6

The invention is further directed towards a process for the delivery ofa retail good, the steps comprising the programming at least oneprogrammable access code into a programmable memory (shown as 70 in FIG.8); the ordering through a first telecommunications device by a user atleast one retail good from a supplier (shown as 71 in FIG. 8);delivering at least one retail good by the supplier to a securereceptacle (shown as 72 in FIG. 8); the user entering a user access codeinto a wireless key (shown as 73 in FIG. 8), the wireless key beingphysically separate from the secure receptacle to avoid accessibility byunauthorized parties; processing the user access code entered into thewireless key (shown as 74 in FIG. 8); and disengaging a lockingmechanism of the secure receptacle (shown as 75 in FIG. 8), therebyallowing the user to gain access to at least one retail good previouslyordered and delivered.

EXAMPLE 7

In a further embodiment of the invention as shown in FIG. 9, a processfor the delivery of a retail good employs two access codes, one that isentered through the use of a wireless key, the second which is enteredthrough a keypad that is physically integrated with the securereceptacle. The process associated with the use of two access codescomprises the steps of programming at least one primary programmableaccess code into a first programmable memory that is integrated with thewireless key (shown as 80 in FIG. 9); programming at least one secondaryprogrammable access code into a second programmable memory (shown as 81in FIG. 9), the second programmable memory being integrated a keypadmounted to the secure receptacle; a user of a secure receptacle orderingat least one retail good from a supplier and the delivery of the orderto the secure receptacle by the supplier's delivery carrier, entering aprimary user access code by the user into a wireless key (shown as 82 inFIG. 9), the wireless key being physically separate from the securereceptacle; entering a secondary user access code by the user into akeypad (shown as 83 in FIG. 9), the keypad being physically integratedto the secure receptacle; processing the primary user access codeentered into the wireless key and the secondary user access code enteredinto the keypad (shown as 84 in FIG. 9); and disengaging the lockingmechanism of the secure receptacle (shown as 85 in FIG. 9), therebyallowing the user to gain access to at least one retail good previouslyordered and delivered.

EXAMPLE 8

A further embodiment of the invention is directed towards a process toinform the consumer of how much space remains in his or her securereceptacle as more and more items are ordered. Of course, the secure orefficient delivery of items may be frustrated if too many items areordered and they must either be left unattended by the secure receptacleor delivered at another time. Accordingly, when the consumer is placingan order through the Internet, an icon is presented which informs theconsumer about the amount of space remains in his or her receptacle forthe purchase of further retail goods. The process encompasses theordering a plurality of retail goods through the Internet (shown as 90in FIG. 10); providing a secure receptacle to the user with a predefinedvolume to which the plurality of retail goods will be delivered by adelivery carrier; calculating the percent volume a retail good orderedby the consumer will occupy in the secure receptacle when the retailgood is placed in the secure receptacle by a delivery carrier (shown as91 in FIG. 10); summing the percent volume for each retail good orderedby the user to obtain a total percent volume occupied by the pluralityof retail goods; indicating the total percent volume to the user throughthe Internet while the user is ordering the plurality of retail goods(shown as 92 in FIG. 10); and resetting the total percent volume to zeroafter the user removes the plurality of retail goods from the securereceptacle.

EXAMPLE 9

In another embodiment of the invention, a first unlocking signal is sentby the wireless key via a cellular wireless network, in which thewireless key can be a cellular telephone or a RIM 902M Radio Modem thatis manufactured by Research in Motion, Ltd. The buttons of such devicesare used to input the access code known by a party having authorizationto gain entry to the secure receptacle. Upon the input of the accesscode, the unlocking signal is transmitted via the cellular network to acentral server. The central server processes the unlocking signal andsends a second unlocking signal to a modem that is found within theinterior of the secure receptacle. The modem is coupled to a centralprocessing unit, the central processing unit in turn being coupled to aprogrammable memory and a locking mechanism for the receptacle. Upon themodem receiving the second unlocking signal, the central processing unitcoupled to the programmable memory determines whether the secondunlocking signal is consistent with the access code stored within theprogrammable memory. If the second unlocking signal is consistent, thecentral processing unit disengages the locking mechanism of thereceptacle, thereby allowing entry.

The wireless key in any of the embodiments of the invention possessesseveral means to discriminate against those who attempt to transmit anunlocking signal from the wireless key but are not authorized to do so.First, the wireless key is not attached to the secure receptacle andwhen not in use is stored in a location typically inaccessible tounauthorized users. Thus, the wireless key operates as a remote controland is only likely to be in the possession of only those parties who areauthorized to gain access to the secure receptacle. Only under certainscenarios will an unauthorized party have possession of the wirelesskey, such as when the wireless key is lost or stolen.

Other embodiments of the wireless key also enhance security. In oneembodiment of the invention, the wireless key possesses a plurality ofbuttons or means for entering data on the face of the wireless key. Togain access to the secure receptacle, an access code must be entered bydepressing or pushing a combination of these buttons in a specific andpredetermined sequence. The buttons may be labeled with alphanumericindicia or color indicia.

For example, the wireless key may have ten buttons labeled with thenumbers 0-9, respectively, with an access code consisting of athree-digit number which must be entered using the wireless key. Anotherexample involves a wireless key possessing six buttons that uses colorto distinguish between the different buttons, with the access codeconsisting of a color sequence, such as red-blue-red-yellow. Thoseskilled in the art will recognize that the use of alphanumeric and colorindicia to create access restrictions will have many variations, both inthe number of buttons possessed by the wireless key and the number ofalphanumeric or color indicia that are used to create an access code.

The wireless key may employ other means which are capable ofdistinguishing an authorized user of the wireless key from anunauthorized user. As discussed above, knowledge of an access codedistinguishes between authorized and non-authorized users. However,other criteria involving knowledge may be used, such as birth dates,maiden names, and social security numbers. In other embodiments,authorized and unauthorized users can also be distinguished by the useof physical characteristics of the authorized user. Examples of thismethod include voice printing and finger printing, wherein the wirelesskey possesses a means to distinguish the voice or finger print of anauthorized user from an unauthorized user. A Breathalyzer can also beintegrated into any of the above embodiments of the wireless key toensure the sobriety of the authorized user.

In the embodiments in which knowledge-based criteria are used todistinguish authorized users from non-authorized users, an additionallevel of security is gained by the ability to alter such knowledge-basedaccess codes. This allows an authorized party to change an access codeto prevent others who once had knowledge of the previous access codefrom now gaining access to the receptacle.

In another embodiment of the invention, a wireless key is used inconjunction with a keypad that is physically integrated with the securereceptacle. An authorized user desiring access to the secure receptaclewill enter a primary access code into the wireless key and a secondaryaccess code into the keypad. The primary access code will be processedin accordance with the means previously disclosed, while the secondaryaccess code will be processed with a central processing unitcommunicatively coupled to the keypad. Upon the processing of both theprimary and secondary access codes, the locking mechanism of the securereceptacle is disengaged.

A knowledge-based access code may be altered by many means, and themethod employed is dependent upon the embodiment of the invention. Forexample, if the wireless key directly transmits the unlocking signaldirectly to the wireless link that is contained within the interior ofthe receptacle as previously described, both the programmable memory ofthe wireless key and the programmable memory of the wireless link mustbe edited. The programmable memory of the wireless key can be programmedusing a programming device, such as internally through the use ofbuttons contained on the wireless key. For example, depressing the“OPEN” and “0” button simultaneously will allow a new access code to beentered and stored within the programmable memory of the wireless key.The programmable memory of the wireless link can be similarly programmedusing a keypad attached to the receptacle and coupled to the centralprocessing unit.

The programming of at least one programmable access code into aprogrammable memory can be accomplished by several means. The userdesiring to use a certain access code can access a web site to designatethe desired access code. When the delivery carrier is delivering aretail good to the secure receptacle, the delivery carrier's wirelesskey downloads the desired programmable access code from the web site.The carrier's wireless key then transmits the desired access code via alow frequency signal to a wireless link physically integrated with thesecure receptacle. The desired access code is subsequently uploaded tothe programmable memory.

In a further embodiment of the invention, the programming of at leastone programmable access code into a programmable memory can beaccomplished through the use of the Internet. The user enters thedesired access code through the use of a web site. The desired accesscode is downloaded to a modem from the web site through the Internet.The modem is physically integrated with the secure receptacle andcommunicatively coupled to the programmable memory. After downloadingthe desired access code from the web site, it is uploaded to theprogrammable memory.

The programming of at least one programmable access code into aprogrammable memory can further be accomplished through the use of akeypad physically integrated with the secure receptacle andcommunicatively coupled to the programmable memory. The user enters thecode using the keys of the keypad and the desired code is uploaded tothe programmable memory.

1. A process for ordering a plurality of retail goods, comprising thesteps of: ordering the plurality of retail goods through a computerconnected to the Internet by a user, providing a secure receptacle tothe user with a predefined volume to which the plurality of retail goodswill be delivered by a delivery carrier, calculating the percent volumea retail good ordered by the consumer wilt occupy in the securereceptacle when the retail good is placed in the secure receptacle by adelivery carrier, summing the percent volume for each retail goodordered by the user to obtain a total percent volume occupied by theplurality of retail goods, indicating the total percent volume to theuser through the Internet while the user is ordering the plurality ofretail goods, and resetting the total percent volume to zero after theuser removes the plurality of retail goods from the secure receptacle.2. The process of claim 1, wherein the total percent volume consists ofsumming the percent volume for each retail good ordered by the user in aplurality of orders by the user.
 3. The process of claim 2, wherein theplurality of orders comprise orders from different suppliers.
 4. Theprocess of claim 2, wherein the plurality of orders comprise ordersplaced at different times by the user.
 5. The process of claim 1,further comprising the steps of: delivering the retail goods ordered bythe user to the secure receptacle; and receiving at a geographicallydistant central server a wireless key code from the user and unlockingthe receptacle allowing user access to the receptacle; wherein theresetting step occurs after the user is allowed access to thereceptacle.
 6. The process of claim 5, wherein the total percent volumeconsists of summing the percent volume for each retail good ordered bythe user in a plurality of orders by the user.
 7. The process of claim6, wherein the plurality of orders comprise orders from differentsuppliers.
 8. The process of claim 6, wherein the plurality of orderscomprise orders placed at different times by the user.