System and method of providing a wireless unlocking system for a group of battery-powered storage devices

ABSTRACT

A pair of devices includes a first device and a second device that communicate lock control signals. The first device can have both a reader component and a control module that controls both (1) a first operation of the first device (such as a sensor control) and (2) a first locking component of the first device for accessing a first door of the first device. A second device can be in communication with the first device. The second device can have a second locking component for the second device for accessing a second door of the second device. The second device in one aspect does not having a reader component or a control module that independently controls the second locking component.

RELATED APPLICATION

The present disclosure is related to Provisional Application No.63/066,471, filed Aug. 17, 2020 (Docket No. S027-7059US2), andProvisional Application No. 63/065,747, filed Aug. 14, 2020 (Docket No.S027-7059US0), and Provisional Application No. 63/066,474, filed Aug.17, 2020 (Docket No. S027-7059US3) and each of which are incorporatedherein by reference.

TECHNICAL FIELD

This disclosure introduces a group of battery-powered devices that eachinclude a control module that manages the operation of the compactor andincludes within the control module the coding and functionality tomanage a locking mechanism. A user can provide identificationinformation via a reader on one of the devices and unlock any of thedevise in the group of devices.

BACKGROUND

Trash containers are distributed in various communities to enable peopleto dispose of waste. These containers have a number of differentstructures and different functions. Generally speaking, many trashcontainers are locked by a locking mechanism that prevents individualsfrom accessing the trash bin or other internal components configuredinside the trash containers. A locking mechanism is typically associatedwith a door on the trash container. The locking mechanism is oftenopened by a single key configuration. Keys that are the same can bedistributed to people with authority to access the trash container. Oneproblem with this approach is that if any unauthorized individual findsone of the keys, that person can open any trash container as the samekey opens up numerous trash containers. Assume an unauthorized persongains access to a trash container. If the trash container is monitoringaccess to the interior of the unit, it may report access by anindividual to a central server. If the access does not involve amaintenance person emptying a trash bin but perhaps the unauthorizedperson is looking for bottles or cans, the servicing schedule for thattrash container can be compromised and can thereby become much lessefficient. The data related to the access incident will lead toinaccurate historical data for operation of the particular unit.

In another example, each trash container or a group of trash containerscan have respective dedicated unique keys capable of opening the trashcontainer. One problem with this approach is that it increases thecomplexity of managing and distributing the proper unique key to open arespective trash container.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the various advantages andfeatures of the disclosure can be obtained, a more particulardescription of the principles described above will be rendered byreference to specific embodiments thereof, which are illustrated in theappended drawings. Understanding that these drawings depict only exampleembodiments of the disclosure and are not to be considered to limit itsscope, the principles herein are described and explained with additionalspecificity and detail through the use of the drawings in which:

FIG. 1 illustrates an example system embodiment;

FIG. 2 illustrates an example architecture for remotely controllingelectrically-powered compactors or other publically available object;

FIG. 3 illustrates an example storage device;

FIG. 4 illustrates the locking system of a storage device;

FIG. 5 illustrates a grouping of storage devices that coordinate lockingfunctionality;

FIG. 6 illustrates a method embodiment;

FIG. 7 illustrates a remote server communicating with one or more localdevices;

FIG. 8 illustrates another method embodiment;

FIG. 9 illustrates yet another method embodiment;

FIG. 10 illustrates another method embodiment;

FIG. 11 illustrates a method embodiment related to a pair of devices;

FIG. 12 illustrates a method related to remote server control of lockingoperations of devices; and

FIG. 13 illustrates another method of using a remote server to managelocking operations for one or more devices.

DETAILED DESCRIPTION

Certain aspects and embodiments of this disclosure are provided below.Some of these aspects and embodiments may be applied independently andsome of them may be applied in combination as would be apparent to thoseof skill in the art. In the following description, for the purposes ofexplanation, specific details are set forth in order to provide athorough understanding of embodiments of the application. However, itwill be apparent that various embodiments may be practiced without thesespecific details. The figures and description are not intended to berestrictive.

The ensuing description provides example embodiments only, and is notintended to limit the scope, applicability, or configuration of thedisclosure. Rather, the ensuing description of the exemplary embodimentswill provide those skilled in the art with an enabling description forimplementing an exemplary embodiment. It should be understood thatvarious changes may be made in the function and arrangement of elementswithout departing from the spirit and scope of the application as setforth in the appended claims.

Overview

The present disclosure introduces a new system or structure that can beused to enable access to the interior of a trash container, a trashcompactor, a storage device, or some other object. Examples providedherein can be in the context of a trash compactor but unlessspecifically required, such as in a claim, such references are meant tobe broader in terms of any container that includes a control module thatcontrols storage device functions and that is programmed to include thelocking management functionality. This disclosure provides an improvedaccess control system for servicing and collection of items in a storagecontainer. The solution solves the various problems outlined aboverelated to keys and how they can be used to govern or manage access tothe storage containers. Indeed, with the solution provided herein, nophysical keys are necessary and the process of managing who isauthorized to access a storage device with a mobile phone, RFID card, orother means is simplified.

There are various embodiments or examples shown. Any feature from anyexample can be mixed with any other feature of an example or embodiment.One aspect disclosed herein covers a single device that communicateswith a remote server and that has a control module for managing alocking mechanism on the single device. Various aspects of datacommunication and locking management are addressed in this first aspect.

Another aspect relates to a plurality of devices and how they worktogether to control and manage respective locking mechanisms. Forexample, a pair of devices might include a first device that has areader and a control module and the second device is “dumb” in that itdoes not have these hardware components but has its locking operationscontrolled by the first device. The second device can have a controlmodule but not a control module that is configured with all thefunctionality to authorize a user via a reader component on the seconddevice. A user can then utilize a device or some kind of input toauthenticate themselves with the reader on the first device and one ormore of the respective control modules and locking mechanisms on eachdevice of the pair of devices (or three or more devices) can coordinateand unlock any of the devices. In this manner, only one of the deviceswill need the reader component that reduces the overall cost of thegroup of devices.

In yet another example disclosed herein, a remote server includesmanagement software for managing a plurality of local devices and/orgroups of devices and provides such data as authorization lists,blacklists, master keys, and so forth to centrally manage the lockingprocedures and operations for individual or groups of devices remotely.These and other ideas are developed herein generally under the theme ofmanaging the locking and unlocking control of devices, including, butnot limited, to storage devices and battery-powered devices.

In one example embodiment, a storage device such as a trash compactorcan be a solar-powered trash compactor that includes a solar panel, abattery, a control module, and a locking mechanism in connection with adoor. The control module in the solar-powered trash compactor controlsthe operational and functional aspects of the trash compactor. Forexample, the control module can manage a compaction cycle based onbattery power and may shut down some functionality of the trashcompactor upon determining that the battery level is below a threshold.As disclosed herein, this disclosure focuses on the locking operation ofthe storage device and can include, as managed by the control module,also adjusting the locking functionality based on battery power.

The service provided herein with respect to locking control can beenabled on a subscription basis. For example, clients who use storagedevices with the access control systems disclosed herein may pay asubscription fee to utilize or activate the access control capability.

In the trash containers described in the Introduction above, theweaknesses in the previous approaches include the locking mechanismsbeing configured to either be opened or unlocked via a general key whichcan work on any trash compactor or dedicated key for a respective trashcompactor or a group of trash compactors. The locking mechanism istypically mechanical in nature and simply unlocks a door or access panelto the interior of the trash compactor when the appropriate key is used.As noted above, the use of physical keys can be problematic for a numberof different reasons. The disclosure herein presents a new lockingmechanism and system that includes a locking component that is inelectronic communication with the control module of the solar-poweredstorage device. The locking functions in this disclosure are managed viaprogram code that is added to the existing control module for thesolar-powered storage device. Adding locking control functionality tothe control module of a solar-powered storage device represents a novelapproach to managing access to the interior of the storage device.Previously, the locking mechanism was independent of any control moduleand fully contained in the mechanical structure of the lock itself.

The new locking mechanism disclosed herein, in one example, can includean electronic component such as a near field communication component ora radio frequency identification component. The locking mechanism iscontrolled or managed by the control module in the solar-powered storagedevice. The locking mechanism can include a lock itself and anelectronic reader component. The electronic reader component caninteract with an RFID (radio-frequency identification) card or a mobiledevice and thereby receive identification information for the individualthat desires to gain access, as instructed by the control module, to theinterior of the solar-powered storage device. The control module of thesolar-powered storage device can include a listing of individuals thatare authorized to gain access to the interior of the solar-poweredstorage device. Thus, a maintenance person with the appropriateauthorization can utilize a mobile phone, an RFID card, bio-metric datasuch as a fingerprint or faceprint, or some other mechanism to interactwith the electronic reader component to cause the locking mechanism tounlock and thus to gain access. The control module of the solar-poweredstorage device can then confirm whether the individual is authorized togain access to the interior of the unit. If no, then the electroniclocking mechanism does not unlock. If the individual is authorized togain access, that the electronic locking mechanism unlocks and enablesthe user to gain access to the interior of the solar-powered storagedevice.

In another aspect, a magnet can be configured in connection with anaccess door. The magnet can be configured to hold the door in a closedposition even when the electronic locking mechanism is in an unlockedstate or unlocked position. The magnet thereby requires the personseeking access to pull on the access door to gain access to theinterior. The magnet can prevent accidental opening of the door in casean inadvertent triggering of the electronic locking mechanism occurs,such as when a maintenance person might be walking by the solar-poweredtrash compactor and their mobile phone is near enough to the electroniclocking component to unlock the lock.

In one example, a storage device (such as a solar-powered trashcompactor or a battery-powered storage device) can include a processor,a storage bin configured within the storage device, a solar panel(optionally), a battery that stores energy, a sensor component thatsenses items in the storage bin, an electronic locking mechanism thatenables access to an interior portion of the storage device and acontrol module in control communication with the electronic lockingmechanism. The control module, when executed by the processor as poweredby the battery or when providing instructions to the processor, managesthe sensor component and is in communication with the electronic lockingmechanism. The electronic locking mechanism can be powered by thebattery. A reader component can be in communication with the controlmodule. The reader component can be powered by the battery and cancommunicate with or receive signals or data from an external entity toobtain authorization to unlock the storage device via the electroniclocking mechanism.

The system can track each user's access and store the informationlocally and then transmit the information to a central or network-basedserver to coordinate, aggregate and/or report such data.

In one aspect, the storage device can include a processor, a storage binconfigured within the storage device, a battery that stores energy foroperation of the storage device, a sensing component that determines afullness level of the storage bin or some other characteristic of thestorage bin and an electronic locking mechanism that enables access toan interior portion of the device. A control module can haveinstructions (stored in a memory) which, when executed by the processor,manages various functions operational in the storage device includingthe sensing component. The control module can be in communication withthe electronic locking mechanism. A reader component can communicatewith an external entity to obtain access authorization requestinformation. The control module can allow or deny access to the devicebased on stored authorization allowances or an authorization list ofusers obtained from a remote server.

An example method can include receiving identification information viaan external entity from a reader component on a battery-powered storagedevice. The reader component can be connected to a control module thatmanages compaction using a compactor component or some other componentin the battery-powered storage device and the control module can controlan electronic locking mechanism. Based on the identificationinformation, via the control module, the method can include unlockingthe electronic locking mechanism in the battery-powered storage device.

In another example, a group of two or more devices can be incommunication with each other to enable an authorization step and anunlocking step to occur within the group but not necessarily all on thesame device. One of the devices can include a reader component and acontrol module having unlocking and locking functionality. The otherdevice or devices in a group may not have a reader component or thecontrol module having the locking and unlocking control functions andtake instructions from the device having these components.

A pair of devices can include a first device and a second device thatcommunicate lock control signals. The first device can have both areader component and a control module that controls both (1) a firstoperation of the first device (such as a sensor control or compactioncontrol) and (2) a first locking component of the first device foraccessing a first door of the first device. A second device can be incommunication with the first device. The second device can have a secondlocking component for the second device for accessing a second door ofthe second device. The second device in one aspect does not having areader component.

The devices can be storage devices, mailboxes, lamp posts, solar-powereddevices, trash compactors, or a combination of different types ofdevices. In another example related to a pair of compaction devices, thepair of devices can include a first storage device having a first solarpanel, a first battery connected to the first solar panel, a firstcontrol module powered by the first battery, a first compactioncomponent controlled by the first control module and powered by thefirst battery, a first electronic locking mechanism and a first readercomponent and a second storage device. The second storage device caninclude a second solar panel, a second battery connected to the secondsolar panel, a second control module powered by the second battery, asecond compaction component controlled by the second control module andpowered by the second battery, a second electronic locking mechanism anda second reader component. The first control module can be incommunication with the second control module. One of the first readercomponent or the second reader component can enable one or both thefirst electronic locking mechanism and the second electronic lockingmechanism.

An example of a central or remote control system for managing lockingoperations for a plurality of local devices can be as follows. A systemcan include a processor and a computer-readable storage device storinginstructions which, when executed by the processor, cause the processorto perform operations. The operations can include receiving anidentification of a local device having a control module that manages areader component and a locking mechanism and transmitting anauthorization list to the local device that identifies authorized usersthat can gain access to the local device via the locking mechanismthrough interacting with the reader component. The control module on thelocal device can manage multiple functions of the local device includingmanagement of the reader component and the locking mechanism. The systemcan also remotely control and manage authorizations to access groups ofdevices in which one device in a respective group includes the necessaryhardware components and control module functionality to enable a user tobe authenticated by interacting with one device in the group but haveaccess to unlock a door on any of the devices in the group.

DETAILED DESCRIPTION

This disclosure now provides more details with respect to the lockingsystem for storage devices as disclosed herein. While solar-poweredtrash compactors are discussed as an example device, other solar-poweredor battery-powered storage devices could also have the electroniclocking mechanism connected to a control module. For example, a FedEx®package device that stores packages to be picked up and delivered by acarrier can be solar-powered and include a control module that can beupgraded to include locking control functionality. Mailboxes or otherstorage containers can also be updated to include the concepts disclosedherein. Other devices could include the locking functionality as well,such as safes, vehicles, buildings, and so forth. Therefore, unlessspecifically required, any reference to a solar-powered trash compactor,a storage device, storage device, a battery-powered device, or otherterm is meant to have the broader interpretation to encompass systemsbeyond just solar-powered trash compactors. The system disclosedimproves the ability to control access authorization for individuals whocan unlock a storage device and gain access to the interior for variouspurposes. The disclosure now turns to FIG. 1.

With reference to FIG. 1, an exemplary system and/or computing device100 includes a processing unit (CPU or processor) 120 and a system bus110 that couples various system components including the system memory130 such as read only memory (ROM) 140 and random access memory (RAM)150 to the processor 120. The computer components disclosed in FIG. 1can be used in connection with any device, control system, controlmodule, locking system or any other computer-related component disclosedherein in connection with the functional control of a storage device oraccess to other devices, buildings, and so forth. The system 100 caninclude a cache 122 of high-speed memory connected directly with, inclose proximity to, or integrated as part of the processor 120. Thesystem 100 copies data from the memory 130 and/or the storage device 160to the cache 122 for quick access by the processor 120. In this way, thecache provides a performance boost that avoids processor 120 delayswhile waiting for data. These and other modules can control or beconfigured to control the processor 120 to perform various operations oractions. Other system memory 130 may be available for use as well. Thememory 130 can include multiple different types of memory with differentperformance characteristics. It can be appreciated that the disclosuremay operate on a computing device 100 with more than one processor 120or on a group or cluster of computing devices networked together toprovide greater processing capability. The processor 120 can include anygeneral purpose processor and a hardware module or software module, suchas module 1 162, module 2 164, and module 3 166 stored in storage device160, configured to control the processor 120 as well as aspecial-purpose processor where software instructions are incorporatedinto the processor. The processor 120 may be a self-contained computingsystem, containing multiple cores or processors, a bus, memorycontroller, cache, etc. A multi-core processor may be symmetric orasymmetric. The processor 120 can include multiple processors, such as asystem having multiple, physically separate processors in differentsockets, or a system having multiple processor cores on a singlephysical chip. Similarly, the processor 120 can include multipledistributed processors located in multiple separate computing devices,but working together such as via a communications network. Multipleprocessors or processor cores can share resources such as memory 130 orthe cache 122, or can operate using independent resources. The processor120 can include one or more of a state machine, an application specificintegrated circuit (ASIC), or a programmable gate array (PGA) includinga field PGA.

The system bus 110 may be any of several types of bus structuresincluding a memory bus or memory controller, a peripheral bus, and alocal bus using any of a variety of bus architectures. A basicinput/output (BIOS) stored in ROM 140 or the like, may provide the basicroutine that helps to transfer information between elements within thecomputing device 100, such as during start-up. The computing device 100further includes storage devices 160 or computer-readable storage mediasuch as a hard disk drive, a magnetic disk drive, an optical disk drive,tape drive, solid-state drive, RAM drive, removable storage devices, aredundant array of inexpensive disks (RAID), hybrid storage device, orthe like. The storage device 160 can include software modules 162, 164,166 for controlling the processor 120. The system 100 can include otherhardware or software modules. The storage device 160 is connected to thesystem bus 110 by a drive interface. The drives and the associatedcomputer-readable storage devices provide nonvolatile storage ofcomputer-readable instructions, data structures, program modules andother data for the computing device 100. In one aspect, a hardwaremodule that performs a particular function includes the softwarecomponent stored in a tangible computer-readable storage device inconnection with the necessary hardware components, such as the processor120, bus 110, display 170, and so forth, to carry out a particularfunction. In another aspect, the system can use a processor andcomputer-readable storage device to store instructions which, whenexecuted by the processor, cause the processor to perform operations, amethod or other specific actions. The basic components and appropriatevariations can be modified depending on the type of device, such aswhether the device 100 is a small, handheld computing device, a desktopcomputer, or a computer server. When the processor 120 executesinstructions to perform “operations”, the processor 120 can perform theoperations directly and/or facilitate, direct, or cooperate with anotherdevice or component to perform the operations.

Although the exemplary embodiment(s) described herein employs the harddisk 160, other types of computer-readable storage devices which canstore data that are accessible by a computer, such as magneticcassettes, flash memory cards, digital versatile disks (DVDs),cartridges, random access memories (RAMs) 150, read only memory (ROM)140, a cable containing a bit stream and the like, may also be used inthe exemplary operating environment. Tangible computer-readable storagemedia, computer-readable storage devices, or computer-readable memorydevices, expressly exclude media such as transitory waves, energy,carrier signals, electromagnetic waves, and signals per se.

To enable user interaction with the computing device 100, an inputdevice 190 represents any number of input mechanisms, such as amicrophone for speech, a touch-sensitive screen for gesture or graphicalinput, keyboard, mouse, motion input, speech, RFID card input,fingerprint or faceprint input or any biometric input, near-fieldcommunication component, multi-modal input, gesture input, Bluetoothprotocol input, multi-modal input sensor, motion sensor input, and soforth. In one example, the input device 190 can include the variousdevices or components described herein that can be configured on astorage device and that can receive identification informationassociated with an individual that wants to unlock the storage device.

An output device 170 can also be one or more of a number of outputmechanisms known to those of skill in the art. In some instances,multimodal systems enable a user to provide multiple types of input tocommunicate with the computing device 100. The communications interface180 generally governs and manages the user input and system output.There is no restriction on operating on any particular hardwarearrangement and therefore the basic hardware depicted may easily besubstituted for improved hardware or firmware arrangements as they aredeveloped.

For clarity of explanation, the illustrative system embodiment ispresented as including individual functional blocks including functionalblocks labeled as a “processor” or processor 120. The functions theseblocks represent may be provided through the use of either shared ordedicated hardware, including, but not limited to, hardware capable ofexecuting software and hardware, such as a processor 120, that ispurpose-built to operate as an equivalent to software executing on ageneral purpose processor. For example the functions of one or moreprocessors presented in FIG. 1 may be provided by a single sharedprocessor or multiple processors. (Use of the term “processor” shouldnot be construed to refer exclusively to hardware capable of executingsoftware.) Illustrative embodiments may include microprocessor and/ordigital signal processor (DSP) hardware, read-only memory (ROM) 140 forstoring software performing the operations described below, and randomaccess memory (RAM) 150 for storing results. Very large scaleintegration (VLSI) hardware embodiments, as well as custom VLSIcircuitry in combination with a general purpose DSP circuit, may also beprovided.

The logical operations of the various embodiments are implemented as:(1) a sequence of computer implemented steps, operations, or proceduresrunning on a programmable circuit within a general use computer, (2) asequence of computer implemented steps, operations, or proceduresrunning on a specific-use programmable circuit; and/or (3)interconnected machine modules or program engines within theprogrammable circuits. The system 100 shown in FIG. 1 can practice allor part of the recited methods, can be a part of the recited systems,and/or can operate according to instructions in the recited tangiblecomputer-readable storage devices. Such logical operations can beimplemented as modules configured to control the processor 120 toperform particular functions according to the programming of the module.For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 andMod3 166 which are modules configured to control the processor 120.These modules may be stored on the storage device 160 and loaded intoRAM 150 or memory 130 at runtime or may be stored in othercomputer-readable memory locations.

One or more parts of the example computing device 100, up to andincluding the entire computing device 100, can be virtualized. Forexample, a virtual processor can be a software object that executesaccording to a particular instruction set, even when a physicalprocessor of the same type as the virtual processor is unavailable. Avirtualization layer or a virtual “host” can enable virtualizedcomponents of one or more different computing devices or device types bytranslating virtualized operations to actual operations. Ultimatelyhowever, virtualized hardware of every type is implemented or executedby some underlying physical hardware. Thus, a virtualization computelayer can operate on top of a physical compute layer. The virtualizationcompute layer can include one or more of a virtual machine, an overlaynetwork, a hypervisor, virtual switching, and any other virtualizationapplication.

The processor 120 can include all types of processors disclosed herein,including a virtual processor. However, when referring to a virtualprocessor, the processor 120 includes the software components associatedwith executing the virtual processor in a virtualization layer andunderlying hardware necessary to execute the virtualization layer. Thesystem 100 can include a physical or virtual processor 120 that receiveinstructions stored in a computer-readable storage device, which causethe processor 120 to perform certain operations. When referring to avirtual processor 120, the system also includes the underlying physicalhardware executing the virtual processor 120. The computing componentsdisclosed herein can apply to a storage device, a mobile device, anetwork-based server that manages a fleet of storage devices or otherdevices for controlling or managing access to respective devices, evenof different types.

Having disclosed some components of a computing system, the disclosurenow turns to FIG. 2, which illustrates an exemplary architecture forcontrolling solar-powered storage devices such as trash compactors bothlocally and remotely via a network. While a number of differentfunctions are disclosed with respect to a storage device 204, thisdisclosure will focus on the use of the locking system 264 and the IDsensor 266 that can sense or interact with an ID device 268. The lockingfeatures will be developed more fully below. Other functionalitydescribed in connection with a control system or control module for thedevice 204 will highlight that the locking mechanism or lockingfunctionality is introduced into the control system or control module210 of the storage device 204. The control system 210 can control one ormore of the other functions of the storage device 204, such as thecamera 224 or temperature sensors 222G. In addition to one or more ofthese other functions, the control system or control module 210 willalso include the ability to manage access to the device 204.

The storage device 204 can be a solar-powered storage device forcollecting waste, such as trash and recyclables, for example. While astorage device 204 is illustrated, other publicly available objects,such as light posts, stoplights, or other objects can be similarlycontrolled, powered and locked or unlocked as disclosed herein. Asillustrated, the storage device 204 can be, for example, a solar, wind,geo-thermal, or battery-powered device and/or compactor. Preferably, thestorage device 204 can recharge while in an inactive state. Moreover,storage device 204 can include a motor 226 for performing variousoperations, such as compaction operations.

Not shown in the figures is the actual structure for compaction.However, in general, the system in FIG. 2 will include a control systemor control module 210 to utilize power in the battery 236 to run a motor226 that performs compaction on the trash within a bin inside thestorage device 204. Further, storage device 204 can be remotelycontrolled via remote control device (RCD) 244. The RCD can be anothernode in a mesh network or can be a controlling device accessed via anetwork 202 which is not a node. To this end, the storage device 204 caninclude transmitter 206 and receiver 208 for communicating with RCD 244via the network 202. In particular, transmitter 206 and receiver 208 cancommunicate with transmitter 240 and receiver 242 on RCD 244, and viceversa. Here, transmitters 206 and 240 can transmit information, andreceivers 208 and 242 can receive information, such as controlinformation or a listing of authorized users who can access the storagedevice 204. Other control information can include a schedule for turningon the locking mechanism. This way, the storage device 204 and RCD 244can be connected to transmit and receive information, such asinstructions, commands, statistics, alerts, notifications, files,software, data, and so forth. The storage device 204 can alsocommunicate with other devices, such as a server and/or a collectionvehicle, via transmitter 206 and receiver 208. Similarly, RCD 244 cancommunicate with other devices, such as a server and/or a user device246, 252, via transmitter 240 and receiver 242.

Moreover, storage device 204 and RCD 244 can communicate with each otherand/or other devices via network 202. The network 202 can include apublic network, such as the Internet, but can also include a private orquasi-private network, such as an intranet, a home network, a virtualprivate network (VPN), a shared collaboration network between separateentities, etc. Indeed, the network 202 can include many types ofnetworks, such as local area networks (LANs), virtual LANs (VLANs),corporate networks, wide area networks, a cell phone transmitter andreceiver, a WiFi network, a Bluetooth network, and virtually any otherform of network.

In one example, another storage device 272 communicates with the storagedevice 204. The pair of devices 204, 272 can coordinate the unlocking ofone or more of the devices through a person using the ID device 268 thatinteracts with the ID sensor or reader component 266 on storage device204. In other words, a kiosk or pairing of two or more storage devices(or any other kinds of devices) can coordinate identifying an individualand unlocking one of the devices in the grouping. Thus, the individualcan use ID device 268 for identification by interacting with componentsof the storage device 204 but it may be the second storage device 272,or another remote device 254 that is unlocked as the devices communicateand coordinate authorization and unlocking functions. One or morecontrol modules 210 on each respect device can communicateauthorizations and instructions to each other for performing theidentification step or an unlocking step in the process. For example,the ID device 268 can interact with the ID sensor 266 of the storagedevice 204. The storage device 204 can authorize the individual. Thestorage device 204 can transmit via the transceiver 270 theauthorization data to a second storage device 272. The ID sensor 266 canbe positioned anywhere on the storage device 204 where a user caninteract with the ID sensor 266 using an ID device 268 as describedherein. For example, the ID sensor might be on a top surface of thestorage device 204.

Instructions can be provided to unlock the second storage device 272using the respective locking system of the second storage device 272.Unlocking instructions can be coordinated across control modules of thevarious storage devices in the grouping or in the pair of storagedevices. In one aspect, an application or the user interface can bepresented on a user device 268 or on a display 232 which enable the userto select which storage device to unlock or to provide other userinteractions with the system to achieve the desired results of the user.In one aspect, the authorization data stored at the storage device 204can include not only an authorization of the individual but accessinstructions or restrictions. For example, one user may only beauthorized to open the second storage device 272 and not the storagedevice 204. Thus, individual restrictions can be enforced in thisconfiguration that are not possible when just using a simple key foraccess.

Transmitter 206 and receiver 208 can be connected to printed circuitboard (PCB) which can be part of the control system or control module210, which controls various functions on device 204. In someembodiments, the RCD 244 can be incorporated within the PCB. In FIG. 2,the RCD 244 is electrically connected to the PCB via transmitters 206,240 and receivers 208, 242. The RCD 244 can be connected to transmitter240 and receiver 242 via a two-way communication port, which includestransmitter 240 and receiver 242. The control system or control module210 can control electrical functions performed by the storage device204, including those focused on herein which relate to the locking andunlocking of the storage device 204. Electrical functions can include,for example, running compactions by actuating a motor 226; sensing wasteor recyclables volume inside the device 204 using a sensor at regular orprogrammable intervals, such as a sonar-based sensor 222A, a proximitysensor, and/or photoeye sensors 222B-C; changing status lamps 230 atregular and/or programmable thresholds to/from a color indicating thatthe device 204 is not full (e.g., green), to/from a color indicatingthat the device 204 is almost full (e.g., yellow), to/from a colorindicating that the device 204 is full (e.g., red); operating a lockingsystem 264 and an ID sensor or ID reader 266 which communicates orreceives data from an ID device 268. For devices that are not trashcompactors, other functionality can be included, such as reports on howmany packages are in a bin for a carrier to pick up, or whether to turna traffic light on or off, or whether to open a door to a building, andso forth.

The ID sensor 266 can also be characterized as an ID reader or readercomponent that can interact with an ID device 268. The ID device 268actually represents a number of different identification entities. TheID device 268 can represent a mobile device such as an Apple iPhone oran Android device, a radio frequency identification card (RFID), afingerprint or a faceprint or other bio-metric input, speech, a voice, amulti-modal input in which different types of input are provided to theID sensor 266 to obtain authorization, and so forth. The ID sensor 266will receive the identification information and compare the informationto a database or listing of authorized users. The network 202 canprovide or download the listing to the storage device 204 of authorizedpeople including specific restrictions for each individual so that localauthorization decisions can be made. Upon authorization, the controlsystem or control module 210 can cause a locking system 264 to unlock adoor and provide access to the interior of the storage device 204 to theuser.

The system can track access on an individual user or identificationbasis. Such data can be reported by the storage device 204 to a remotedevice 252 or application 254 that can aggregate the data. For example,a cloud software system can track or record who accessed which deviceand when. Other sensor data can be transmitted as well to the cloudsystem for analysis. Such data can also be incorporated into a machinelearning algorithm or tracking system that schedules the removal ofitems from respective storage devices 204. Such systems can be adjustedor modified based on the data received related to unlocking operations.Other data can also be coordinated with unlocking functions. Forexample, sensor data from a sensor 222H can be coordinated to confirmthat trash in a bin within the storage device 204 has been removed inconnection with an unlocking operation.

When access is denied to the storage device 204 such as when anunauthorized person tries to access a device, such interaction can alsobe reported to a network server for analysis.

In one aspect a user can be provided access to specific storage deviceswithin a geographical area or based on some classification (for example,size, quality of service parameter, subscription status, time since lastservice, device status). Cards can be provided to service people suchthat they are given proper access to the respective appropriate storagedevices. Authorization can also be provided to mobile devices of theusers who need access. A mobile device can have a communication protocolthat can imitate the signal of an RFID card. The access can then also bechanged or modified on an individual basis in the architecture throughupdates transmitted to respective storage devices.

The storage device 204 can include a transceiver 270 that can enablecommunication with another storage device 272 as well. The communicationcan be wired or wireless using any protocol that can achieve thecommunication. The communication can enable two or more storage devicesto coordinate their respective locking systems 264 such that, forexample, a user at a group of two or more storage devices 264, 272 canprovide their ID 268 once to an ID sensor 266 and have one or more ofthe grouped storage devices 204, 272 unlocked. The two or more devices264, 272 can exchange authorization information or data to enable theflexibility of different devices performs different parts of the processto ultimately grant access for a user to one of the devices 264, 272.

The RCD 244 can enable remote control and/or alteration of the functionsperformed or operated by the control system or control module 210,including placing the device 204 in an active and/or passive state. TheRCD 244 can also provide access to, and control over, the variouscomponents 206, 208, 210, 212, 214A-B, 216, 218, 220, 222A-H, 224, 226,228, 230, 232, 234, 236, 238 of the device 204. Users can use anetworked device, such as smartphone 246 and/or remote device 252, tocommunicate with the RCD 244 in order to manage and/or control thedevice 204. For example, a user can communicate with the RCD 244 via theremote device 252 to change a threshold value on the control system orcontrol module 210, which can control, for example, a collection timing;the compaction motor 226; the use of energy on a lighted advertisingdisplay, such as display 232; the status lamps 230; the sensors 222A-H;the camera 224; unlocking functionality 264, etc. The remote device 252can include virtually any device with networking capabilities, such as alaptop, a portable media player, a tablet computer, a gaming system, asmartphone, a global positioning system (GPS), a smart television, adesktop, etc. In some embodiments, the remote device 252 can also be inother forms, such as a watch, imaging eyeglasses, an earpiece, etc.

The remote device 252 and RCD 204 can be configured to automaticallymodify the control system or control module 210 operating parameters.However, users can also manually modify the control system or controlmodule 210 operating parameters via the remote device 252 and RCD 204.The operating parameters can be modified in response to, for example,evolving industry benchmarks; user inputs; historical data, such as thedata gathered from a separate database 250A-B; forecasted data, such asupcoming weather characteristics; traffic conditions; a collectionschedule; a collection route; a proximity of a collection vehicle; atime and/or date; a location; a capacity, such as a capacity of thedevice 204 and/or a capacity of a collection vehicle; a fullness stateof the device 204; lapsed time between collections; lapsed time betweencompactions; usage conditions of the device 204; energy usage; batteryconditions; statistics; a policy; regulations; a detected movement of anobject, such as an object inside or outside of the device 204;collection trends; industry and/or geographical standards; zoningpolicies and characteristics; real-time information; user preferences;and other data. The data from the remote device 252 can be relayed tothe RCD 244, and the data from the RCD 244 can be relayed, via thenetwork 202, to the device 204 and/or the remote device 252 forpresentation to the user.

The user can control the RCD 244 and/or access and modify information onthe RCD 244 via a user interface, such as a web page, an application254, a monitor 256, and/or via voice messages and commands, textmessages, etc. The remote device 252 can include a user interface, whichcan display, for example, graphs of collection statistics and trends(e.g., collection frequency, usage, temperature, access history, accesstrends, access denials, etc.), collection reports, device settings,collection schedules, collection configurations, historical data, statusinformation, collection policies, configuration options, deviceinformation, collection routes and information, alerts, etc. This way,users can access information to make educated decisions about how to setand/or reset operating parameters on the control system or controlmodule 210; to control, for example, which sensors are used to gatherdata, which thresholds to set; to control outputs from the status lamps230 and other components; to control who accesses a device or the timesof device access or other policies, etc. Users can change settings onthe device 204, such as optimal collection timing, timing of sensoractuation; and/or modify parameters, such as desired capacity andfullness thresholds; using a scroll down menu, click-and-slide tools,interactive maps displayed on the remote device 252, touch screens,forms, icons, text entries, audio inputs, text inputs, etc. In response,the RCD 244 can automatically reconfigure the control system or controlmodule 210 settings, recalibrate sensors and displays, change operatingparameters, change access policies on a device, individual, group ofindividuals, or group of devices basis, etc.

The RCD 244 can include a two-way communication port that includestransmitter 240 and receiver 242, which can wirelessly communicate withthe control system or control module 210 of the device 204, via thetransmitter 206 and receiver 208 on the device 204, which are connectedelectrically to the control system or control module 210. On scheduledand/or programmable intervals, the control system or control module 210transmitter 206 can send data to a central server, such as data server248, via the network 202. The same transmitter 206 and receiver 208 canbe used to communicate with other nodes (whether devices, benches, orother public objects) in a mesh network. Moreover, the RCD's 244receiver 242 can be configured to query the data server 248, which canalso be connected to the remote device 252, for incoming data. The dataserver 248 can communicate data from databases 250A-B. If there is nodata to be received by the receiver 208, the control system or controlmodule 210 can be configured to promptly return to a low-power mode,where the transmitter 206 and receiver 208 circuits are turned off,until another scheduled, received, initiated, and/or programmedcommunication event. Such a low-power mode can be the same as an“inactive” mode, or can be distinct from an “inactive” mode because thesensor/transmitter being used are distinct from the transmitter 206 andreceiver 208. If there is data to be received by the receiver 208, suchas a command to turn the device 204 off and then back on, a command tochange the thresholds upon which compactions are operated, a command tochange the thresholds for providing status updates and/or determiningfullness states, etc., then the RCD receiver 242 can download the newdata from the data server 248, via the RCD 244, to the control system orcontrol module 210, altering its operating configuration. The RCDreceiver 242 can also be configured to send data to the data server 248to acknowledge the receipt of data from the control system or controlmodule 210, and to send selected data to the remote device 252, thesmartphone 246, and/or any other device, for presentation to a user.Access control functionality can also be adjusted with respect to andone or more of a threshold, a time period a lock is held open, a timeperiod in which a reader component is operational or when a user wouldbe enabled to gain access to the device, and so forth.

The data server 248 can also display the data to a user on remote device252, smartphone 246, or any other device. The data can be apassword-protected web page, a display on the smartphone 246, a displayon the monitor 256, etc. Remote control using the RCD 244 to reconfigureoperating thresholds, sensor use, sensor hierarchy, energy usage, etc.,can enable the device 204 to alter characteristics that control itsenergy generation, energy consumption, access control policies orparameters, and/or the collection and management logistics, furtherenabling sound operation of the device 204.

The RCD 244 can be configured to communicate over a wireless networkwith the control system or control module 210, and transmit data to thedata server 248, so the data can be stored for viewing and manipulationby a user via any web-connected computer, phone, or device. The RCD 244can also be configured to receive data from the data server 248, andtransmit the data back to the control system or control module 210. Thecontrol system or control module 210 can be electrically connected to avariety of sensors, such as sensors 222A-H, within the device 204.Through the RCD 244, the control system or control module 210 can alsobe wirelessly connected to the databases 250A-B, and/or other externaldatabases, such as a weather database, which may, for example, reside ona National Oceanographic and Atmospheric (NOAA) server, a database oftrucks and locations and schedules, which may reside on a waste hauler'sserver, a database of traffic conditions, etc. A user can also changewhich of the sensors 222A-H are used in setting thresholds, among otherthings, in response to, for example, user commands and/or changes inoutside data, such as weather data or truck location data.

The control system or control module 210 can also communicate with atemperature sensor 222G to gather temperature information, which can betransmitted to the RCD 244 via the PCB transmitter 206. The temperatureinformation can be used, among other things, to fine tune operationalfunctions and energy consumption of the device 204. For example, thecontrol system or control module 210 can be reconfigured to run lesscompaction per day, such as four to eight compactions, in cold weather,since batteries are less powerful in cold weather. Coinciding with coldweather, the winter days are shorter, thus solar energy and batterypower is limited. In order to conserve power on low-sunlight days, theRCD 244 can adjust the control system or control module 210 normalfullness sensitivity levels, so that collections are prompted to be madeearlier. For example, if the control system or control module 210typically runs 20 compactions before changing status lamps from green toyellow, a signal that suggests optimal collection time, the RCD 244 canadjust the thresholds of the control system or control module 210 to run10 compactions before changing from a green state to a yellow state,thus changing the total energy consumption of the compactor betweencollections. In a busy location, the control system or control module210 can be configured to sense device fullness every minute, whereas ina less busy location, the control system or control module 210 can beconfigured to sense fullness once a day.

In some embodiments, the RCD 244 can also alter the timing of eventsusing algorithms based on the results of historical events. For example,the RCD 244 can be initially configured to sense fullness once perminute, but based on resulting readings, it can then alter the timing offuture readings. Thus, if three consecutive readings taken at one-minuteintervals yield a result of no trash accumulation, the RCD 244 canincrease the timing between readings to two minutes, then three minutes,etc., based on the various readings. The RCD 244 can also be configuredto adjust sensing intervals based on the level of fullness of the device204, so it would sense more frequently as the device 204 fills, in orderto reduce the margin of error at a critical time, before the device 204overflows. This “learning feature” can save energy by ultimatelysynchronizing the sensor readings with actual need to sense. The RCD 244can also alter thresholds of status lamps 230 based on collectionhistory, the need for capacity as determined by the frequency of red oryellow lights on the device 204, temperatures, expected weather andlight conditions, expected usage conditions, etc. The status lamps 230can be LED lights, for example. Access control can also have varioustiming elements established and adjusted based on battery level or otherfactors.

In FIG. 2, the RCD 244 can be enabled, via the control system or controlmodule 210, to read, for example, a temperature sensor 222G; an encodersensor 222D, which can measure movement of a compaction ram by utilizingan “encoder wheel” which is mounted on a motor shaft; one or morephotoeye sensors 222B-C; door sensors; a sensor which measures currentfrom the solar panel and a sensor which can measure current from thebattery 236 to the motor 226; a hall effect sensor 222F, which candetect movement of, for example, a door; an infrared (IR) sensor 222E, acamera 224, etc. In addition, the thresholds set by the RCD 244 can bebased on historical and real-time information, user preferences,industry norms, weather patterns and forecasts, and other information.The RCD 244 can reset the control system or control module 210 normalthresholds hourly, daily, weekly, monthly, yearly, or at adjustableintervals, based on a variety of information and user decisions.

The RCD 244 can also alter the control system or control module 210normal hierarchy of sensor usage. For example, if the control system orcontrol module 210 is configured to run a compaction cycle when one ormore of the photoeyes 222B-C located inside the device 204 are blocked,the RCD 244 can reconfigure the sensor hierarchy by reconfiguring thecontrol system or control module 210 to run compaction cycles after acertain amount of time has passed, by reading the position of theencoder sensor 222D at the end of a cycle, by reading one or morephotoeye sensors 222B-C, by calculating a sensor hierarchy based onhistorical filling rates, by a change in user preferences, etc. Using anaggregate of data from other devices located worldwide in a variety ofsettings, the RCD's 244 configurations can depend on constantly evolvingparameters for optimizing energy utilization, capacity optimization, andoperational behavior, among other things. The RCD 244 innovation andgrowing database of benchmarks, best practices and solutions toinefficiency, enables the device 204 to adapt and evolve.

Based on the data from the control system or control module 210, thesensors, inputs by the users (e.g., the customer or the manufacturer)via the RCD 244, and/or based on other data, such as historical orweather data, the RCD 244 can change the control system or controlmodule 210 thresholds, operational parameters, and/or configuration, toimprove the performance of the device 204 in different geographies orseasons, or based on different user characteristics or changingparameters. Thus, the system and architecture can be self-healing.

The RCD 244 can also be configured to change the control system orcontrol module 210 normal operating parameters. For example, the RCD 244can be configured to cause the control system or control module 210 torun multiple compaction cycles in a row, to run energy through aresistor 220 to apply a strong load upon the battery 236, which cansupply the energy. The RCD 244 can measure battery voltage atpredetermined or programmable intervals, to measure the “rebound” of thebattery 236. A strong battery will gain voltage quickly (e.g., thebattery will almost fully recover within 15 minutes or so). A weakbattery will drop significantly in voltage (e.g., 3-5 volts), willrecover slowly, or will not recover to a substantial portion of itsoriginal voltage. By changing the normal parameters of the controlsystem or control module 210, the battery 236 can be subjected to aheavy load during a test period, which will determine the battery'sstrength without jeopardizing operations. The RCD 244 can then beconfigured to relay a message to the user that a battery is needed, orto use the battery differently, for example, by spacing out compactionsin time, reducing the degree of voltage decline within a certain timeperiod, shortening the time period in which a lock is held open,establishing short timeframes in which the locking mechanism can beoperated, etc. Based on the message and any additional information fromthe RCD 244, the user can then order a new battery by simply clicking ona button on a web page, for example. The RCD 244 can also alter thecontrol system or control module 210 to do more compactions or otherenergy-using functions (like downloading software) during the daytime,when solar energy is available to replenish the battery 236 as it usesenergy.

Since the RCD 244 can be connected to databases, and can be informed bythe control system or control module 210 on each device of conditions orstatus information at the respective device, the RCD 244 can also beused to relay data collected from the databases or control system orcontrol module 210 for other types of servicing events. In other words,the RCD 244 can obtain, collect, maintain, or analyze status, operating,or conditions information received from the control system or controlmodule 210 of one or more devices and/or one or more databases storingsuch information, and relay such data to a separate or remote device,such as a remote server or control center. For example, the RCD 244 canbe configured to relay a message to a waste hauler to collect the device204 if two or more parameters are met simultaneously. To illustrate, theRCD 244 can relay a message to a waste hauler to collect the device 204if the device 204 is over 70% full and a collection truck is within 1mile of the device 204. Authorization data for the maintenance person inthat truck can be downloaded to the device 204 to enable access. Inother words, authorization can be more dynamic and related to otherparameters such as location-based data for a person who should gainaccess for a period of time. The access can be provided for a limitedtime period. The RCD 244 can then send a message to the remote device252 to alert a user that a collection had been made, and the cost of thecollection will be billed to the user's account.

In addition, the RCD 244 can change the circuitry between the solarpanel 234 and the battery 236, so that solar strength can be measuredand an optimal charging configuration can be selected. The chargingcircuitry 214A-B is illustrated as two circuitries; however, one ofordinary skill in the art will readily recognize that some embodimentscan include more or less circuitries. Charging circuits 214A-B can bedesigned to be optimized for low light or bright light, and can beswitched by the RCD 244 based on programmable or pre-determinedthresholds. Also, while solar information can be readily available(e.g., Farmers' Almanac), solar energy at a particular location can varywidely based on the characteristics of the site. For example, light willbe weaker if reflected off a black building, and if the building istall, blocking refracted light. For this reason, it can be useful tomeasure solar energy on site, as it can be an accurate determinant ofactual energy availability at a particular location. To do this, thebattery 236 and solar panel 234 can be decoupled using one or morecharging relays 212. In other aspects, a very high load can be placed onthe battery 236 to diminish its voltage, so that all available currentfrom the solar panel 234 flows through a measureable point. This can bedone, for example, by causing the device 204 to run compaction cycles,or by routing electricity through a resistor, or both.

There are a variety of other methods which can be used to create a load.However, putting a load on the battery 236 can cause permanent damage.Thus, the RCD 244 can also be configured to disconnect the battery 236from the solar panel 234, instead routing electricity through a resistor220. This can allow for an accurate measurement of solar intensity at aparticular location, without depleting the battery 236, which can helpassess the potential for running compactions, communicating, poweringilluminated advertisements, and powering other operations. In someembodiments, the control system or control module 210 can bereconfigured by the RCD 244 to run continuous compaction cycles for aperiod of time, measure solar panel charging current, relay the data,and then resume normal operations. Different configurations orcombinations of circuits can be used to test solar intensity, batterystate or lifecycle, and/or predict solar or battery conditions in thefuture.

The RCD 244 can also track voltage or light conditions for a period ofdays, and alter the state of load and charging based on constantlychanging input data. For example, the RCD 244 can configure the timer218 of the control system or control module 210 to turn on the display232 for advertising for a number of days in a row, starting at aspecific time and ending at another specific time. However, if thebattery voltage declines over this period of time, the RCD 244 can thenreduce the time of the load (the display 232) to every other day, and/ormay shorten the time period of the load each day. The locking mechanismcan have its parameters adjusted in various ways to reduce the load onthe battery 236. Further, the RCD 244 can collect information on usageand weather patterns and reconfigure the control system or controlmodule 210 normal operating regimen to increase or reduce the load (forexample, the advertisement on the display 232) placed on the battery236, based on the information collected. For example, if it is aSaturday, and expected to be a busy shopping day, the RCD 244 can allowa declining state of the battery 236, and can schedule a period in thenear future where a smaller load will be placed on the battery 236, by,for example, not running the advertisement on the coming Monday. Indoing so, the RCD 244 can optimize the advertising value and energyavailability to use energy when it is most valuable, and recharge (useless energy) when it is less valuable. In order to maximize solar energygained from a variety of locations, the RCD 244 can cause the controlsystem or control module 210 to select between one of several chargingcircuits. For example, if it is anticipated that cloudy conditions areimminent, the RCD 244 can change the circuit that is used for batterycharging, in order to make the charger more sensitive to lower lightconditions. In a sunny environment, the charger circuit used can be onewith poor low-light sensitivity, which would yield more wattage indirect sunlight.

The architecture 200 can also be used for monitoring functions, whichcan enable users to access information about the device 204 andcollection process. With this information, users can make judgments thatfacilitate their decision-making, helping them remotely adjust settingson the device 204 to improve performance and communication. For example,the RCD 244 can be configured to enable users to easily adjust callbacktime, which is the normal time interval for communication that isconfigured in the control system or control module 210. The RCD 244 canenable the user to alter this time setting, so that the device 204communicates at shorter or longer intervals. Once the control system orcontrol module 210 initiates communication, other parameters can bereconfigured, such as awake time, which is the amount of time thereceiver is in receiving mode. This enables users to make “on the fly”changes. In some cases, the control system or control module 210 canshut down after sending a message and listening for messages to bereceived. In these cases, it can be difficult to send instructions, waitfor a response, send more instructions and wait for a response, becausethe time lapse between normal communications can be a full day. However,by remotely adjusting the setting through the RCD 244, the user can makecontinuous adjustments while testing out the downloaded parameters inreal time, and/or close to real time. This can enhance the ability ofthe user to remotely control the device 204.

Further, the RCD 244 can alter the current of the photoeyes 222B-C, in atest to determine whether there is dirt or grime covering the lens.Here, the RCD 244 can reconfigure the normal operating current of thephotoeyes 222B-C. If the lens is dirty, the signal emitter photoeye willsend and the signal receiver will receive a signal on high power, butnot on low power. In this way, a service call can be avoided or delayedby changing the normal operating current to the photoeyes 222B-C. Thiscan be a useful diagnostic tool.

In some embodiments, regular maintenance intervals can be scheduled, butcan also be altered via information from the RCD 244. The RCD 244 can beconfigured to run a cycle while testing motor current. If motor currentdeviates from a normal range (i.e., 2 amps or so), then a maintenancetechnician can be scheduled earlier than normal. The RCD 244 can send amessage to the user by posting an alert on the users web page associatedwith the device 204.

Other settings can be embodied in the device 204 as well. For example,the control system or control module 210 can sense that the device 204is full. The RCD 244 can then configure the control system or controlmodule 210 to have a web page, or another display, present a fullsignal. The RCD 244 can alter when the full signal should be presentedto the user. For example, after accessing a database with historicalcollection intervals, the RCD 244 can reconfigure the control system orcontrol module 210 to wait for a period of time, e.g., one hour, beforedisplaying a full signal at the web page. This can be helpful because,in some cases, a “false positive” full signal can be signaled by thecontrol system or control module 210, but this can be avoided based onhistorical information that indicates that a collection only a fewminutes after the last collection would be highly aberrational. The RCD244 can thus be configured to override data from the control system orcontrol module 210. Instead of sending a full signal to the user, theRCD 244 reconfigures the control system or control module 210 to ignorethe full signal temporarily, and delay the display of a full-signal onthe user's web page or smart phone, in order for time to go by andadditional information to be gathered about the device's actual fullnessstatus. For example, when a collection is made and ten minutes later,the fullness sensor detects the device 204 is full, the fullness displaymessage on the web page can be prevented from displaying a full status.In some cases, a plastic bag can be full of air, causing the proximitysensor in the device 204 to detect a full bin. Within a certain timeperiod, e.g., twenty minutes in a busy location, a few hours in a lessbusy location, as determined based on the historical waste generationrate at the site, the bag can lose its air, and the proximity sensor cansense that the bin is less full than it was twenty minutes prior, whichwould not be the case if the bin was full with trash instead of air.Thus, “false positive” information can be filtered out.

Likewise, tests and checks can be performed so that false negativeinformation is avoided as well. For example, if a bin regularly fills updaily, and there is no message that it is full after two or three days,an alert can appear on the user's web page indicating an aberration.Thresholds for normal operating parameters and adjustments to normal canbe set or reset using the RCD 244, or they can be programmed to evolvethrough pattern recognition. Although many operating parameteradjustments can be made through the web portal, adjustments can also bemade automatically. This can be controlled by a software program thataggregates data and uses patterns in an aggregate of enclosures to altercontrol system or control module 210 settings on a single enclosure. Forexample, if the collection data from 1,000 enclosures indicates thatcollection personnel collect from bins too early 50% of the time whencompaction threshold setting is set to “high”, compared to 10% of thetime when compaction settings are set at “medium,” then the RCD 244 canreprogram the compaction thresholds to the medium setting automatically,so that collection personnel can be managed better, limiting the amountof enclosures that are collected prematurely. Automatic reprogramming,governed by software programs, can be applied to other aspects, such asuser response to dynamic elements of the device 204, such as lighted orinteractive advertising media displayed on the device 204. For example,if users respond to an LCD-displayed advertisement shown on the device204 for “discounted local coffee” 80% of the time, the RCD 244 canconfigure all devices within a certain distance, from participatingcoffee shops, to display the message: “discounted local coffee.”

In some embodiments, the RCD 244 can include a data receiving portal forthe user with information displays about an aggregate of devices. Here,the user can access real-time and historical information of, forexample, devices on a route, and/or devices in a given geography, and/oraccess control or history. The data can be displayed for the user on apassword-protected web page associated with the aggregate of deviceswithin a user group. The device 204 can also display, for example, binfullness, collections made, the time of collections, battery voltage,motor current, number and time of compaction cycles run, graphs andcharts, lists and maps, access control historical information, etc. Thisdata can be viewed in different segments of time and geography in orderto assess device and/or fleet status, usage, and/or trends. The user'sweb page can show, for example, a pie chart showing percentage of binscollected when their LED was blinking yellow, red and green, or ahistogram showing these percentages as a function of time. Thesestatistics can be categorized using pull down menus and single-clickfeatures. A single click map feature, for example, is where summary datafor a particular device is displayed after the user clicks on a dotdisplayed on a map which represents that device. This can allow the userto easily view and interact with a visual map in an externalapplication.

The RCD 244 can be configured to display calculated data, such as“collection efficiency,” which is a comparison of collections made tocollections required, as measured by the utilized capacity of the device204 divided by the total capacity of the device 204 (CollectionEfficiency=utilized capacity/total capacity). The user can use thisinformation to increase or decrease collections, increase or decreasethe aggregate capacity across an area, etc. Typically, the user's goalis to collect the device 204 when it is full—not before or after. Theuser can click buttons on their web page to show historical trends, suchas collection efficiency over time, vehicle costs, a comparison ofvehicle usage in one time period versus vehicle usage in another timeperiod, diversion rates, a comparison of material quantity deposited ina recycling bin versus the quantity of material deposited into a trashbin. Other statistics can be automatically generated and can includecarbon dioxide emissions from trucks, which can be highly correlated tovehicle usage. Labor hours can also be highly correlated with vehicleusage, so the web page can display a labor cost statistic automaticallyusing information generated from the vehicle usage monitor. As the userclicks on buttons or otherwise makes commands in their web portal, theRCD 244 can change the PCB control system or control module 210operating parameters, usage of sensors, unlocking functionality, etc.,and/or measurement thresholds in response. The RCD 244 can also beconfigured to automatically display suggested alterations to the fleet,such as suggestions to move devices to a new position, to increase ordecrease the quantity of devices in a given area, to recommend a newsize device based on its programmed thresholds, resulting in animprovement in costs to service the fleet of devices.

Heat mapping can also be used to provide a graphical representation ofdata for a user. Heat mapping can show the user the level of capacity ineach part of an area, for example a city block, or it can be used toshow collection frequency in an area. In each case, the heat map can begenerated by associating different colors with different values of datain a cross sectional, comparative data set, including data from aplurality of enclosures. The heat map can be a graphical representationof comparative data sets. In some embodiments, red can be associatedwith a high number of a given characteristic, and “cooler” colors, likeorange, yellow and blue, can be used to depict areas with less of agiven characteristic. For example, a heat map showing collectionfrequency or compaction frequency across 500 devices can be useful todetermine areas where capacity is lacking in the aggregate ofenclosures—a relative measure of capacity. In this case, the highestfrequency device can be assigned a value of red. Each number can beassigned progressively cooler colors. In other embodiments, the redvalue can be associated with a deviation from the average or median, forexample, a darker red for each standard deviation. The heat maps can beshown as a visual aid on the user's web page and can color-code regionswhere “bottlenecks” restrict vehicle and labor efficiency. A small redregion can show graphically, for example, that if the user were toreplace only ten devices with higher-capacity compactors, the collectionfrequency to a larger area could be reduced, saving travel time. Heatmaps can be a helpful visual tool for showing data including, but notlimited to, data showing “most collections” in a given time period,“most green collections,” which can visually demonstrate the number ofbins collected too early (before they are actually full), “mostcompactions,” which can show on a more granular level the usage level ofthe bin, “most uses,” which can represent how many times the insertiondoor of the bin is opened or utilized, “most alerts,” which can showvisually the number of “door open alerts,” which can show when doorswere not closed properly, “voltage alerts,” which can show visuallywhich devices are of low power, etc. While specific measurements aredescribed herein to demonstrate the usefulness of heat mapping, thereare other sets of data that can be represented by the heat maps, whichare within the scope and spirit of this disclosure.

The heat map can also be used to present a population density in one ormore areas, as well as a representation of any other activity orcharacteristic of the area, such as current traffic or congestion, forexample. This information can also be shared with other businesses ordevices. For example, the RCD 244 can analyze the heat map and sharepopulation statistics or activity with nearby businesses ormunicipalities. The RCD 244 can, for example, determine a highpopulation density in Area A on Saturday mornings and transmit thatinformation to a nearby locale to help the nearby locale prepare for theadditional activity. As another example, if the device is placed in apark, the RCD 244 can determine population and activity levels atspecific times and alert park officials of the expected high levels ofactivity so the park officials and/or those managing the device can planaccordingly.

The RCD 244 can also be used for dynamic vehicle routing and compactionand/or device management. Because the RCD 244 can be a two-waycommunicator, it can both send and receive information between variousdevices and databases, using a mesh network. This can allow the user tocross-correlate data between the fleet of devices and the fleet ofcollection vehicles. The RCD 244 can receive data from the user and/orthe user's vehicle. For example, the RCD 244 can receive GPS data oravailability data and use it to change parameters on a given device oraggregate of devices. The RCD 244 can receive this data from the user'sGPS-enabled smartphone, for example. Similarly, the RCD 244 can senddata to the user, a user device, a smartphone, etc., about the status ofthe device 204. With this two-way data stream, collection optimizationcan be calculated in real time or close to real time. For example, acollection truck is traveling to the east side of a city and has 30minutes of spare time. The RCD 244 can receive information about thetruck's whereabouts, availability and direction, and query a databasefor device real time and historical fullness information and determinethat the truck can accommodate collections of twenty device locations.The RCD 244 can then display a list of twenty device locations that thetruck can accommodate. The user can view a map of the twenty recommendedlocations, see a list of driving directions, etc. The map of drivingdirections can be optimized by adding other input data, such as trafficlights, traffic conditions, average speed along each route, etc. At thesame time, as the truck heads to the east side of the city, the RCD 244can reconfigure devices on the west side to change compactionthresholds, so that capacity is temporarily increased, freeing upadditional time for the truck to spend in the east section.Alternatively, the RCD 244 can reconfigure a device to temporarilydisplay a “full” message to pedestrians, helping them find a nearbydevice with capacity remaining. The RCD 244 can, in the case where thedevice requires payment, increase pricing to the almost-full device,reducing demand by pedestrians or other users. This same logic can beeffective in situations where trucks are not used, for example, indoorsat a mall or airport. The demand for waste capacity can vary, so havingremote control over the device 204 can allow users to change settings,parameters, and/or prices to make the collection of waste dynamic andefficient.

The location of the device 204 and other devices can be determined viatriangulation and/or GPS, for example, and placed on a map in theinteractive mapping features. Moreover, the location of an indoor devicecan be obtained from indoor WiFi hot spots, and the indoor device can beplaced on a map in the interactive mapping features. As a staff memberaccomplishes tasks (i.e., cleaning a bathroom) and moves inside afacility, the staff member's location can be tracked, and the fullnessand location of nearby devices can be plotted on a map or given to thestaff member by other means, as instructions to add a collectionactivity to the list of tasks. Whether by GPS, Wifi, Bluetooth, etc.,triangulation between communication nodes can serve to locate a deviceon a map, and measurements of fullness of devices can be used to creatework instructions for staff members or truck drivers, so that efficientroutes and schedules can be created to save time.

To better manage the collection process, user groups can be separatedbetween trash and recycling personnel. In many cities, there areseparate trucks used to collect separate streams of waste, such as trashand recyclables. For this reason, it can be helpful to configure theuser's web page to display data based on a waste stream. The data canalso be divided in this fashion and displayed differently on asmartphone, hand-held computer, and/or other user device. In addition,data can be displayed differently to different users. For example, themanager of an operation can have “administrative privileges,” and thuscan change the location of a particular device in the system, viewcollection efficiency of a particular waste collector, view loginhistory, and/or view industry or subgroup benchmarks, while a wastecollector with lower privileges can only view device fullness, forexample. The RCD 244 or another device can also be configured to print alist of devices to collect next, a list of full or partially full bins,etc. For example, the remote device 252 can be configured to print alist of devices to collect in the remaining portion of a route.

The disclosure now turns to FIG. 3, which illustrates an exemplarystorage device 300. The storage device 300 can be configured todynamically adjust sensors and compaction operations, as furtherdescribed below.

The storage device 300 includes a bin 302 for storing content items, anda door 306 for opening the storage device 300 to throw or deposit itemsin the bin 302. An ID sensor or reader component 320 can be providedwhich enables a user to provide identification via the ID device 330 tothe storage device 300. For example, an RFID card, a mobile phonethrough near-field communication, a biometric input such as afingerprint or a faceprint, and so forth. A control module (not shown)is configured within the storage device 300 and includes a listing asprovided by a remote server of authorized individuals who can enter thestorage device 300. A locking mechanism 322 is in communication with thecontrol module and the reader component 320 and will unlock the lockingmechanism 322 for a predetermined period of time. For example, thelocking mechanism 322 may be open for 3-6 seconds. After the period oftime, the locking mechanism 322 returns to a locked state or lockedposition. A magnet 324 can be configured to hold the door 306 closed incase the unlock request was inadvertent. The door 306 and other lockingcomponents can be configured at any location on the storage device 300.For example, the door 306 may be configured on a side wall, front wallor rear wall. The locking mechanism 322 may enable the user to open up atop portion of the storage device 300 to gain access to the interior.The particular structure of the door 306 is not critical to the conceptsdisclosed herein. For example, an alternate door 326 is shown on theside with a magnet 328 used to prevent the door from swinging open uponthe door 326 being unlocked by a locking mechanism 322.

In addition, each of the sensor modules can include an emitter andreceiver. Moreover, the storage device 300 can include compactorsoftware or firmware configured to run self-diagnostics on each of thesensor modules and the normal paths, to ensure the storage device 300 isrunning properly and to report any errors to the management console.

In some configurations, the storage device 300 can also include a sonarsensor 308 to detect objects in the device 300 and calculate thefullness state of the device 300. The signal transmitted and sensed inorder to determine trash levels can be any frequency (IR, visual range,etc.) and at any pulse rate. Further, any number and combination ofsensors, transmitters, and receivers could be applied in various placeswithin the device 300. The storage device 300 can also include othertypes of sensors 304, such as an infrared sensor, a temperature sensor,a hall effect sensor, an encoder sensor, a motion sensor, a proximitysensor, reader component 320, etc. The sonar sensor 308 and sensors 304can sense fullness at regular intervals, and/or based on manual inputsand/or a pre-programmed schedule, for example. Moreover, the sonarsensor 308 and sensors 304 are electrically connected to the printedcircuit board (PCB), control system or control module 316. Further, thesonar sensor 308 and sensor 304, locking mechanism 322 and readercomponent 320 can be actuated, powered and/or controlled by the controlsystem or control module 316, which can be configured to control thevarious operations of the storage device 300.

The control system or control module 316 can control electricalfunctions performed by the storage device 300. The electrical functionscontrolled by the control system or control module 316 can include, forexample, running compactions by actuating a motor; sensing waste orrecyclables volume inside the device 300 using a sensor at regular orprogrammable intervals, such as sensors 304; changing status lamps 318at regular and/or programmable thresholds to/from a color indicatingthat the device 300 is not full (e.g., green), to/from a colorindicating that the device 300 is almost full (e.g., yellow), to/from acolor indicating that the device 300 is full (e.g., red); collectingdata and transmitting the data to another device; receiving data fromanother device; managing a power mode; measuring and managing a current;performing diagnostics tests; managing a power source; controllingaccess to the storage device 300 via the reader component 320 and thelocking mechanism 322, etc. The motor controller 310 can enable voltageto be applied across a load in either direction. The control system orcontrol module 316 can use the motor controller 310 to enable a DC motorin the device 300 to run forwards and backwards, to speed or slow, to“brake” the motor, etc.

The storage device 300 includes a transmitter 312 and a receiver 314 forsending and receiving data to and from other devices, such as a serveror a remote control device. Accordingly, the storage device 300 cantransmit and receive information such as instructions, commands,statistics, alerts, notifications, files, software, data, and so forth.The transmitter 312 and receiver 314 can be electrically connected tothe control system or control module 316. This way, the transmitter 312can transmit data from the control system or control module 316 to otherdevices, and the receiver 314 can receive data from other devices andpass the data for use by the PCB 316. In this regard, a user who ischecking the status of the device could drive down the street near thedevice (say within a wireless range, such as Bluetooth or WIFI, forexample), not even get out of their vehicle, but receive a signalindicating that all is well, that the trash needs to be emptied, or thata repair or cleaning is needed. Authorization information can also beprovided such that the person receiving the notice is already authorizedto unlock the storage device 300 and to just use their mobile phone on anear-field communication reader 320.

Status lamps 318 can provide an indication of the status of the storagedevice 300. For example, the status lamps 318 can indicate the fullnessstate of the storage device 300. To this end, the status lamps 318 canbe configured to display a respective color or pattern when the storagedevice 300 is full, almost full, not full, etc. For example, the statuslamps 318 can be configured to flash red when the storage device 300 isfull, yellow when the storage device 300 is almost full, and green whenthe storage device 300 is not full. Moreover, the status lamps 318 canbe LED lights, for example.

The status lamps 318 can also be configured to flash in various patternsto indicate various other conditions. For example, the status lamps 318can be configured to flash at the same time and in combination to showthat the device 300 is full. The status lamps 318 can also be configuredto flash in different patterns or times or colors to showtroubleshooting status information for example. In some cases, thestatus lamps 318 can be configured to flash in a predetermined manner toshow that a door of the device is open, a component is damaged, anobstacle is stuck, an operation is currently active, etc. A displaycould also show the name of a person authorized to open the door 306/326or other locking instructions or information.

As one of ordinary skill in the art will readily recognize, the device300 can include other components, such as motors, sensors, batteries,solar panels, displays, relays, chargers, GPS devices, timers, fuses,resistors, remote control devices, cameras, etc. However, for the sakeof clarity, the device 300 is illustrated without some of thesecomponents.

In some configurations, the storage device 300 can be configured toimplement dirt-sensing technology. The dirt sensing technology can usefirmware or other software instructions to monitor the signals, such asinfra-red signals, through the sensors on the device 300, and use thisdata to determine how dirty the detection sensors have become. Forexample, in some cases, a “clean” sensor 304D can take around six 38 kHzpulses transmitted from a transmitter 304C before the signal isdetected. As the sensor becomes more and more dirty it typically takeslonger to detect the signal, and may even take twenty 38 kHz pulses, forexample. This data can be used to provide a scale of how dirty thesensor has become and provide feedback to the user before the sensorbecomes completely blocked. Once the sensor is blocked, the capacity ofthe compactor can be reduced since compactions may no longer performed.As one of ordinary skill in the art will readily recognize, thefrequencies and number of pulses discussed herein are provided fornon-limiting illustration purposes. In fact, the frequencies used andnumber of pulses associated with specific dirt levels can vary based ona number of factors, such as hardware and preference settings. Moreover,other applications, frequencies and number of pulses are contemplatedherein.

Furthermore, since the voltage of a battery does not generally indicatethe actual capacity in a battery, it can be beneficial to understandwhat capacity is available to ensure accurate machine operation and deadbattery notification. To this end, the machine firmware can analyzevoltage drops that occur after a compaction occurs at what current, andcan determine a ratio which can provide feedback and indications of thetrue battery capacity. The machine firmware can also analyze how fastvoltage is dropping based on current wireless usage and predict when analternative node in the mesh network, and particularly the paired node,should be switched to. For example, if the machine firmware detects thatthe system will have sufficient capacity for 3 hours of work in 20minutes, the system can configure a switch between nodes to take placein 20 minutes. If the system calculates the other node, in an activestate, will reach a critical power level in 15 minutes, the system cancause a transfer to an active state take place sooner than mightotherwise have occurred so that coverage continues. The firmware can usea ratio to limit compactions, sensor activity, wireless/cellularactivity, and/or notify the management console of the battery state. Aspreviously mentioned, the management console can be a console on theactual storage device 300 and/or a remote device, such as a server, forexample.

FIG. 4 illustrates another example of a storage device 400 that includesa processor 401, a storage bin 414 configured within the storage device400, a solar panel 412, a battery 416 that stores energy from the solarpanel 412, a compaction component 418 that compacts items in the storagebin 414, a lock mechanism 406 which enables access to an interiorportion of the storage device 400, a control module 402 which, whenexecuted by the processor as powered by the battery 416, manages thecompaction component 418 and is in communication with the lock mechanism406 and a reader component 404 that is in communication with the controlmodule 402. The reader component 404 communicates with an externalentity 420 (such as a mobile phone, an RFID card, a bio-metric input,speech input, gesture input, multi-modal input, etc.) to obtainauthorization to unlock the storage device 400 via the lock mechanism406. In one aspect, an application has been downloaded on the mobiledevice 420 of the user and that includes user interfaces andfunctionality used to interact with the reader component 404. The readercomponent 404 can include one of an RFID reader, a near-fieldcommunication component, a Bluetooth reader component, a gesture sensingor detecting component, a facial recognition component, a bio-metricreader, a touch-sensitive display, a keypad, a multi-modal inputcomponent and a motion detection component. Upon triggering the lockingmechanism 406, the control module 402 can maintain the lock component406 in an unlock position for a predetermined period of time, afterwhich the lock component 406 locks or changes to a locked position orstate to prevent a door 408 from being opened by a user.

When the reader component 404 communicates with the external entity 420to obtain authorization to unlock the storage device 400, the controlmodule 402 can obtain identification data associated with the externalentity 420 and report at least the identification data to a remoteserver 422. The storage device can further include a magnet 410 and adoor 408. The magnet 410 can be configured to hold the door 408 closedupon the lock mechanism 406 unlocking the door 408. In this manner, thedoor 408 would not swing open upon an accidental unlocking of thestorage device 400.

The external entity 420 can be authorized to unlock the storage device400 on one or more of an individual station level, a group of stationslevel, a customer level, an individual person level, or a multiplecustomer level. In one aspect, the control module 402 stores a listingon the storage device 400 of authorized external entities that canunlock the storage device 400. The listing stored in the storage device400 can be updated based upon a communication between the storage device400 and the remote server 422. In this manner, the unlocking capabilityand authorization can be instantaneous (handled locally at the storagedevice 400) rather than requiring a network communication confirmationfrom a remote device 252.

The control module 402, upon initial setup of the storage device 400,can enable unlocking of the lock mechanism 406 upon the reader component404 reading a disposable external entity 420 that can include, forexample, an ID card shipped with the storage device 400. In this manner,upon initiating the storage device 400 with the disposable externalentity 420, the storage device 400 can communicate with the remoteserver 422 and receive the listing of authorized external entities thatcan unlock the storage device 400. The system can be shipped with abattery that is disconnected such that the lock would not work. Aplastic shim can be used or wedged into the locking mechanism such thatit is prevented from locking upon initial setup. Once the battery isconnected and the locking mechanism is active, the disposable ID cardcan be used to unlock the system and initiate the downloading of theauthorized access list. In one aspect, in this initiation mode, prior tothe first access control list being downloaded, only the disposableexternal entity 420 or any ID card could be used to unlock the system.Once the authorized user list is downloaded, then the disposableexternal entity 420 no longer would have access after theinitialization. The control module, upon initial setup of the storagedevice and before communication between the storage device and theremote server, can enable unlocking of the electronic locking mechanismupon the reader component interacting with any external entity of anyacceptable format, regardless of specific ID information. In thismanner, the device will always be unlockable at initial setup until theunit can communicate with the remote server and receive and store anauthorization list of users or entities.

In another aspect, a master ID entity could be used to open any storagedevice. Such information or access control can be stored in the controlmodule or a memory of the device.

The control module 402 can store instructions to adjust a temporaryperiod of time, based on a battery power level, that a door 408 isunlocked upon triggering the lock mechanism 404. Holding the lockingmechanism 404 in the unlocked position takes battery power. The controlmodule 402 can cause the electronic locking mechanism 404 to functionbelow a compaction shut off voltage defined in the control module 402.For example, the control module 402 can cause the compaction componentto shut off because the battery level is too low. However, the controlmodule 402 can be programmed to cause the electronic locking mechanism404 and the associated reader component 404 to remain operational aslong as possible. The control module 402 can cause the reader component404 to function at certain periods of time when a battery power level isbelow a threshold as well. In once example, the storage device 400 caninclude likely times during which historically or based on a schedulethat an authorized user may desire to unlock the storage device 400. Thedata can include probabilities of when the storage device 400 may beopened. The control module 402 can progressively keep the electroniclocking mechanism 404 and the associated reader component 404 operationsstarting with the most probable time frames when an authorized usermight arrive. Thus, a controlled shutdown can occur which maintains theunlocking capability beyond other components that are shut down. Thecontrol module 402, as the battery power continues to be reduced, mayshut down the electronic locking mechanism 404 and the associated readercomponent 404 during times with less probability of access beingattempted.

In another aspect, if the normal operation of the system is to hold thelocking mechanism 404 in the unlock position or state for a period of 5seconds, then the battery saving algorithm or operation of the controlmodule 402 can cause the locking mechanism 404 to be held in the unlockposition for a shorter period of time. Thus, in a low battery mode basedon a threshold value, the time in which the unlock position is held canbe reduced to 2 or 3 seconds. Further, the period of time can beprogressively shortened as well depending on the battery power level.

The control module 402 may also send out notifications to a centralcontrol system 252 or to previous users or current users on theauthorization list about the battery power and a predicted loss ofability to unlock the storage device 400. In one aspect, the storagedevice 400 at a certain threshold or not could communicate with one ormore individuals who are authorized to access the storage device 400 toschedule a time to unlock the storage device 400. The storage device 400could then shut down the electronic locking mechanism 404 and theassociated reader component 404 until the appointed time.

In yet another aspect, the system could include a port (such as USBport) that could be used by an authorized user to power the electroniclocking mechanism 404 and the associated reader component 404. Thus, ifthe power was too low on the storage device 400, a user could use theirown mobile device, or a portable battery, and plug into the storagedevice 400 to provide just enough power to operate the electroniclocking mechanism 404 and the associated reader component 404. Awireless connection could also be used to provide power from a mobiledevice or battery to the electronic locking mechanism 404 and theassociated reader component 404.

In one aspect, any communication protocol that enables two devices 400,420 to communicate data with each other can be used. For example, aprotocol similar to what is used with Google Pay or Apple Pay at a pointof sale NFC device could be used to establish a short distance wirelesscommunication between the mobile device 420 and the storage device 400.

In one aspect, a storage device can include a processor, a storage binconfigured within the storage device, a battery that stores energy foroperation of the storage device, a sensing component that determines afullness level of the storage bin and an electronic locking mechanismthat enables access to an interior portion of the device. A controlmodule can have instructions (stored in a memory) which, when executedby the processor, manages the sensing component and is in communicationwith the electronic locking mechanism. A reader component cancommunicate with an external entity to obtain access authorizationrequest information. The control module can allow or deny access to thedevice based on stored authorization allowances obtained from a remoteserver.

In one aspect, the storage device can unlock and remain unlocked in theevent of a low battery condition. A threshold could be met where thereis just sufficient energy in the battery to unlock the device before thebattery goes dead or hits a threshold. The system could also switch topure solar power where the unlocking mechanism is powered directly froma solar panel. For example, the storage device can operate theelectronic locking mechanism directly via a solar panel in the event ofbattery failure or some other condition.

The external entity in one aspect may only unlock the device if thestorage device is deemed ready for a collection. Whether the device isdeemed “ready” for collection could be based on one or more of a timingof the day, a status of a storage bin (fullness level), a service levelagreement, a payment schedule, a route or location of a collectiontruck, a pattern of previous collections, a machine-learning algorithmoutput, a battery level, a sunlight level, a future weather prediction,and so forth. A remote server may set the status of the storage deviceas in a mode for collection or not. The decision can also be madelocally by the storage device.

In one aspect, the external entity will only be able unlock the deviceduring specific hours of the day. The timing of when unlocking ispossible can be managed by the control module and/or a remote server. Aseparate service compartment can also be provided to the storage devicewhich can be accessible only to authorized external entities. Theseparate compartment may not provide access to an internal storage binbut to other items like envelopes or other items.

FIG. 5 illustrates a group 500 of storage devices 502, 504, 506 with aconfiguration that enables locking control to be shared or communicatedbetween different devices. In one aspect, the number of storage devicescan be two or more. Thus, while three are shown in FIG. 5, the numbercan be two, three, four, five, or more. In one example, a pair 502, 504of storage devices can include a first storage device 502 having a firstsolar panel 508, a first battery 538 connected to the first solar panel508, a first control module 546 powered by the first battery 538, afirst compaction component (not shown in FIG. 5) controlled by the firstcontrol module 544 and powered by the first battery 538, a first lockingmechanism 520 and a first reader component 514. The pair 502, 504 ofstorage devices can include a second storage device 504 having a secondsolar panel 510, a second battery 540 connected to the second solarpanel 510, a second control module 546 powered by the second battery540, a second compaction component (not shown) controlled by the secondcontrol module 546 and powered by the second battery 540, a secondlocking mechanism 522 and a second reader component 516. The storagedevices 502, 504 can provide different functionality from the compactionof trash. In such a case, the storage devices 502, 504 may not includethe compaction component.

The first control module 544 can be in communication with the secondcontrol module 546 via a wireless or a wired communication link. One ofthe first reader component 514 or the second reader component 516 canenable both the first locking mechanism 520 and/or the second lockingmechanism 522. For example, a maintenance person can be at pair 502, 504of storage devices and use an RFID card, mobile phone, key, or otherexternal entity 544 to identify who they are at the first readercomponent 514 of the first storage device 502. The identification can becommunicated from the first storage device 502 to the second storagedevice 504. The identification can be further communicated to the thirdstorage device 506 or other devices as well. One or more listings ofauthorized individuals stored on one or more of the storage devices 502,504, 506 can be accessed to enable any one of the respective lockingmechanisms 520, 522, 524 to be unlocked based on the single interactionwith one of the reader components 514, 516, 518. In this manner, forexample, the person could be authorized on one storage device and unlockone or more of the storage devices 502, 504, 506 in the group with oneaccess action. Other types of devices can also be coordinated togetheras well. For example, an authorization to access storage device 502using reader component 514 could also be coordinated with a mailbox ortraffic light control system to enable the user to unlock differentcontainers or systems in connection with the storage device 502.

A wireless communication link can be used for communication between thefirst control module 544 and the second control module 546, as well asother control modules 548. In one aspect, the first reader component 514and the second reader component 516, as well as other reader components518, each can be one of an RFID reader, a near-field communicationcomponent, a Bluetooth reader component, a gesture sensing or detectingcomponent, a facial recognition component, a bio-metric reader, atouch-sensitive display, a keypad, a multi-modal input component, amulti-modal input component, and a motion detection component. QR codes,near-field communication tags, or other devices can also be used inconnection with a mobile device to gain access to the interior of astorage device 502, 504, 506.

The first control module 544 and the second control module 546 can storeinstructions to adjust a temporary period of time, based on a batterypower level, that a door is unlocked. As the battery power level isreduced, the period of time that the door is unlocked can also bereduced as it takes power to hold the locking mechanism 520, 522, 524 inthe unlocked position. In one aspect, the first control module 544causes the first reader component 514 to function at certain periods oftime when a battery power level is below a threshold. This also isanother energy saving approach when the battery power level is low. Oneor more of these energy saving functions can be implemented. At leastone of the first control module 544 and the second control module 546can store a listing of authorized external entities that can unlock atleast one of the first storage device 502 and the second storage device504.

In one example, the group of storage devices 502, 504, 506 may all runon a single battery 538. In this case, a user may gain access orauthorize themselves using storage device 504 and its reader component516 but the system may then grant access or unlock the door 532 onstorage device 502 since that is where the battery 538 is for the groupof storage devices 502, 504, 506.

In a grouping scenario, the magnet concept is helpful where a user maycause two doors to be unlocked from two storage devices 502, 504 but theuser is only there to remove trash from one storage device 502 and notrecyclable material from another storage device 504. The recyclablestorage device 504 may have its door 534 unlocked but the magnet 528would maintain the door 534 in the closed position for safety and aftera few seconds, say 5 seconds for example, the locking mechanism 522would switch from the unlock state to the locked state.

In the scenario of two storage devices 502, 504 where the battery levelis running low, the system may only unlock the storage device 502, 504that needs servicing and not unlock the door on the other storagedevice. This will reduce the drain on the battery as holding the lockingmechanism in the unlocked position takes battery power.

In another example, an embodiment can cover a pair of devices includinga first device 502. The first device 502 can have both a readercomponent 514 and a control module 544 that controls both (1) a firstoperation of the first device 502 (such as a sensor control) and (2) afirst locking component 520 of the first device 502 for accessing afirst door 532 of the first device 502. A second device 504 can be incommunication with the first device 502. The second device 504 can havea second locking component 522 for the second device for accessing asecond door 534 of the second device 504. The second device in oneaspect does not having a reader component or a control module thatindependently controls the second locking component. In this manner, agroup of devices can be managed with respect to access control whereonly one device of the group needs the reader component and the controlsoftware. The devices can communicate with each other and provideinstructions related to locking or unlocking. For example, one controlmodule on one device might be programmed to provide authorization andinstructions to a second device that has a control module configured toreceive unlocking instructions. Access to the first device 502 and thesecond device 504 can both be controlled by use of the reader component514 and the control module 544 on the first device 502 such that thefirst device 502 and the second device 504 can be unlockedsimultaneously, one at a time, or individually based on access rulesimplemented by the control module.

The same principles can also apply to additional devices 506, etc., inwhich one (or more), but not all, of the devices can have the readercomponent and control module functionality and can thus be used tomanage access to all of the devices in the group.

In another aspect, a pair of storage devices can include a first storagedevice 502 having a first battery 538 storing energy for operating thefirst storage device 502, a first control module 544 powered by thefirst battery 538, a first sensor component controlled by the firstcontrol module 544 and powered by the first battery 538, a first lockingmechanism 520 and a first reader component 514. A second storage device504 can include a second battery 540 storing energy for operating thesecond storage device 504, a second control module 546 powered by thesecond battery 540, a second sensor component controlled by the secondcontrol module 546 and powered by the second battery 540, a secondlocking mechanism 522 and a second reader component 516. The firstcontrol module 544 can be in communication with the second controlmodule 546. One of the first reader component 514 or the second readercomponent 516 (If the second device 504 has such a component) enablesboth the first locking mechanism 520 and the second locking mechanism522 to be controlled.

The first reader component 514 and the second reader component 516 caneach include one of an RFID reader, a near-field communicationcomponent, a Bluetooth reader component, a gesture sensing or detectingcomponent, a facial recognition component, a bio-metric reader, atouch-sensitive display, a keypad, a multi-modal input component, and amotion detection component. In one aspect, one of the first controlmodule 544 and the second control module 546 can store additionalinstructions to adjust a temporary period of time, based on a batterypower level, that a door is unlocked. The period of time for operationor to turn on the capability of unlocking the respective devices canalso be provided based on a time of day, a battery level threshold, acollection schedule, a status or state of a respective device such thatit is ready for collection (sensor indicated a full level) or in need ofservice. In one aspect, an external entity that interacts with the firstreader component may only unlock the device during specific hours of aday, or only while it is light. Other examples of timing control canalso be provided, such as after a large sales day or holiday.

At least one of the first control module 544 and the second controlmodule 546 can store a listing of authorized external entities that canunlock at least one of the first storage device and the second storagedevice. The different devices can be unlocked independently,simultaneously, based on respective batter powers in the group ofdevices, upon request of a user, and so forth.

At least one of the first control module 544 and the second controlmodule 546 can store (as received from a remote server) a listing ofblack-listed external entities that cannot unlock at least one of thefirst storage device 502 or the second storage device 504.

In one aspect, one of the first storage device and the second storagedevice can unlock and remain unlocked when a respective low batterycondition exists. This enables service to be provided to the device suchthat it is not set in the lock position without any battery power tounlock the device.

An external entity can interact with the first reader component 514 andmay only be able to unlock one of the first storage device 502 or thesecond storage device 504 if the first storage device 502 or the secondstorage device 504 is respectively deemed ready for a collection orneeds service. The definition of “ready” can vary and having suchmeaning as a full level of a storage been as sensed by a sensor, or thata component indicates that it needs service or has stopped working. Forexample, a solar panel or a sensor may stop working and an action couldbe taken such as unlocking the door to enable service on the device.

In one aspect, one or more of the devices 502, 504, 506 can include aseparate service compartment that is accessible only to authorizedexternal entities. This separate compartment can store envelopes, paper,tools, electrical components, spare parts, or any other items. Inanother aspect, the first storage device 520 can operate the lockingmechanism 520 directly off of a solar panel when battery failure occurs.In another aspect, power can be communicated from one device to anotherdevice to provide power to unlock the other device. Power can betransferred in a wired fashion or in a wireless fashion between devicesas necessary.

FIG. 6 illustrates an example method 600. A method can include receivingidentification information via an external entity from a readercomponent on a solar-powered or battery-powered storage device (602).The reader component can be connected to a control module that managesat least one component in the storage device such as a compactioncomponent in the solar-powered compaction device. Further, the controlmodule can control a locking mechanism. The method further can include,based on the identification information and via the control module,unlocking the locking mechanism in the solar-powered or battery-poweredstorage device (604).

In one aspect, the method or the system can include the concept whereindividual storage devices can receive their respective listings ofauthorized users. Then an entity can deliver RFID cards or enable mobiledevices 268 to be authorized when they interact with the readercomponent 266. There can be an overlay of the devices 268 that is on topof the underlying system authorization process or listings that aredownloaded and stored on individual devices. In another aspect, thesystem could be triggered based on the interaction of a mobile device268 and the reader component 266 on the storage device 204 to cause aconnection to be established between a mobile device 268 of the user anda remote server 252. Data regarding the identification of the user andof the particular storage device 204 can be transmitted to the remoteserver 252 and a wireless authorization can provided from the remoteserver to the storage device 204 or to the mobile device 268 to unlockthe locking mechanism on the storage device 204.

In another aspect, the method can include any of the other functionalitydescribed herein, such as controlling the active status of a lockingmechanism and/or a reader component based on battery level. Any concept,component, module or step can be used in connection with any otherconcept, component, module or step disclosed herein. Each embodiment orexample is meant to be exemplary and not as a mutually exclusiveembodiment.

FIG. 7 illustrates a network 700 having a remote or centralized server702 that communication via a network 704 with one or more local devicesD1, D2, D3, D4, D5, D6, D7, D8 and D9. The remote server 702 operates asoftware platform and control components that manage the locking andunlocking authorizations and functionality of one or more of the localdevices D1-D9. The devices D1-D9 can be any of the types of devicesdisclosed herein and can include groupings as well. For example, a pairof devices D1-D2 can be co-located or grouped together such that onedevice, say D1, is a “dumb” device that does not have a reader componentor the locking/unlocking management technology built into its localcontrol module. Paired device D2 can communicate with D1. D2 can havethe necessary reader component and control module that can includeauthorization lists or instructions received from the remote server 702for managing authorizations to access one or both of D1 and D2. D7, D8and D9 illustrate a group of three devices that are in communicationwith each other. The locking mechanisms on the respective devices can beindependently controlled and reader component and a control module onone (or more) of the devices, for example D8, can be used to controlopening all of the devices D7-D9 simultaneously, one at a time insequence, or any one individually based on the access and authorizationrules stored locally or accessed from the remote server 702.

The remote server 702 can further perform a number of differentmanagement functions with respect to authorizations and the lock controlof respective devices D1-D9. In one example, the system can have “masterkeys” where if an external entity has a certain password or “magic”password programmed into it, the system will unlock the door withouthaving that ID stored on the local access list. A password can bemanually entered or provided in another modality. Such passwords will bereserved for super users like large service providers or companyemployees that need to access any station in a large geography or theworld.

Master keys can be used further as follows. If a master key, password,or other entity operating to enable access to a user not specifically onan authorized user list, were to get into an unauthorized user's hand,it could then be used to open any device D1-D9. In order to combat thispotential threat, the remote server 702 can transmit a locally stored“black list” that would prevent specific ID from accessing a station,even if it had the magic password. Thus, is a magic password were knownto have been made public or been stolen, the system 702 can add thatidentification to a “black list” stored on the various devices D1-D9. Inthis manner, a master key, authorization lists, and black lists can allbe used to control authorization procedures by local devices.

If a device D1-D9 loses communication with the remote server 702, itwill not be able to update its authorized user list. In this scenario,the local control module can include functionality to enable any ID ofany acceptable format, independent of specific ID information orconfirmation of the user being on an authorized user list, to unlock thedevice. Thus, a maintenance person can open that station to performservice work to restore communication.

One aspect of the use of the remote server 702 or operations on localdevices D1-D9 includes alerts. The system can provide multiple alerts toindicate error or misuse. For example, one alert can include “Electroniclock not responding to control module”, “Too many card swipes”,“Collection outside of scheduled hours” and so forth. These alerts canbe based on detected events from local devices D1-D9. Any device cantransmit an alert through the network 704 to the remote server 702. Analert can be transmitted to an external entity such as a mobile deviceused to seek access to a respective device.

Another aspect of the remote server 702 can be collection tracking. Inone aspect, the server 702 can receive data from various devices D1-D9and can count any door opening as a collection. Additional functionalitycan be provided however. With different external entity IDs, the system702 can differentiate between a waste collector and someone performingservice maintenance. By differentiating amongst different people openingup a device, and to have more accurate data on when collections orservice events occurred, the system 702 can track who performed acollection or opening of the device and provide reports on one or moreof the various types of openings, timing, how long the device wasopened, whether a bin was emptied or some other task was performed, andso forth. FIG. 8 illustrates a method embodiment 800. This methodrelates to functions for enabling a user to force a storage device torequest and receive from a remote server 702 an updated authorizationlist for access to the device. The method can include one or more ofreceiving identification information from an external entity via areader component on a storage device (802), wherein the reader componentis connected to a control module that manages at least one component inthe in the storage device and wherein the control module also controls alocking mechanism that controls access to the storage device. The methodincludes determining that a user associated with the identificationinformation is not authorized to access the storage device based on alocally-stored authorization list (804), receiving data from the user(806), based on the data from the user, receiving an updatedauthorization list from a remote server (808) and applying the updatedauthorization list to determine whether to grant the user access to thestorage device (810).

The data from the user can include one or more of the identificationinformation, a combination of the identification information and asecond type of input, a single-mode input and a multi-modal input. Thesecond type of input can include by way of example a magnet input to asensor on the storage device. Thus, if a user is not authorized tounlock a device, the user can provide their User ID via the externalentity while at the time or in succession can hover a magnet over asensor component on the device. The two inputs can cause an operation tobe implemented which forces the device to request and receive from aremote server 702 an updated authorized user list. The device could thenapply the new list automatically based on the previous receipt of theID, or can require the user again to provide their user ID to testagainst the updated authorization user list. Asking for an updated listcan also be an option presented on a touch-sensitive screen in which theuser interacts with an object such as a button to request the updatedlist.

FIG. 9 illustrates another method embodiment 900 related to the use ofmaster keys. The method includes providing, from a remote server, anauthorization list to a local device that governs access to the localdevice (902) and providing data to the local device which enables accessto the local device based on a master key independent of theauthorization list (904). Other steps can include providing a black listof specific IDs that are prevented from accessing the local device (906)and providing access to any identification in any acceptable format whenthe device loses communication with the remote server (908).

FIG. 10 illustrates a method 1000 associated with the collection of datain a configuration like that shown in FIG. 7. The method includesclassifying a first group of individuals who can access a local device(1002) and classifying a second group of individuals that can access thelocal device (1004). For example, one group can be waste collectors andanother group can provide mechanical service to the units. The methodcan include receiving data from a plurality of local devices at a remoteserver identifying which individuals from the first group and the secondgroup of individuals accessed each respective device (1006) andgenerating a report on the access to the plurality of local devicesbased on the data received and the classifications (1008). As notedabove, the data that can be reported on can include many different typesof data associated with accessing the various devices. For example, oneor more of the following factors can be applied to the analysis orreporting: the person who accessed each device, the type of access,sensor data before and after the access, a time of day, how long thedevice was unlocked, a time between a notice going out to a person andwhen the person arrived and unlocked a device, and so forth.

FIG. 11 illustrates a method 1100 that relates to managing the lockingoperations for a group of devices. The method can include receivingidentification information from an external entity via a readercomponent on a first storage device (1102). The reader component can beconnected to a control module that manages at least one component in thein the first storage device. The control module can also control a firstlocking mechanism that controls access to the first storage device and asecond locking mechanism configured on a second storage device, thesecond locking mechanisms controlling access to the second storagedevice.

The method can include determining that a user associated with theidentification information is authorized to access one of the firststorage device or the second storage device based on a locally-storedauthorization list (1104) and unlocking one of the first lockingmechanism on the first device and the second locking mechanism on thesecond storage device (1106). When it is the second locking mechanismthat is unlocked, the unlocking can be based on a signal transmittedfrom the first storage device to the second storage device.

In one aspect, the second storage device does not include asecond-device reader component. The locally-stored authorization listcan be stored at the first storage device and the locally-storedauthorization list can provide authorization information on one or moreof a per-device, per user, per group of devices, per time, or perunlocking need basis. The control modules for the different devices maybe different as one may include commands and another control module mayonly be configured to receive unlocking instructions from the otherdevice.

The locally-stored authorization list further can define timinginformation regarding when at least one of the first storage device andthe second storage device are eligible to be unlocked. The controlmodule can store access rules and control instructions that can causethe first locking mechanism and/or the second locking mechanism to opensimultaneously, independently, at a certain time, based on a specificevent or parameter, or in a sequence. The method can further includeregistering the second storage device with the first storage device toenable management of the second locking mechanism by the control moduleof the first storage device.

FIG. 12 illustrates an example method 1200 related to using a remoteserver to manage a group of or a plurality of local devices. A methodincludes receiving, at a remote server, an identification of a localdevice, the local device having a control module that manages a readercomponent and a locking mechanism (1202) and transmitting anauthorization list to the local device that identifies authorized usersthat can gain access to the local device via the locking mechanismthrough interacting with the reader component (1204). The control moduleon the local device can manage multiple functions of the local deviceincluding management of the reader component and the locking mechanism.

Upon triggering the locking mechanism, the control module of the localdevice can maintain the locking mechanism in an unlock position for apredetermined period of time, after which the unlock position changes toa lock position. In one aspect, when the reader component of the localdevice communicates with an external entity to obtain authorization tounlock the local device, the control module can obtain identificationdata associated with the external entity and report at least theidentification data to the remote server.

The method can further include transmitting an updated authorizationlist to the local device that identifies a new group of authorized usersthat can gain access to the local device via the locking mechanismthrough interacting with the reader component (1206). In another aspect,the method can also include transmitting a black list to the localdevice that identifies one or more users not allowed to gain access tothe local device via the locking mechanism through interacting with thereader component (1208).

The authorization list can define access control data for both the localdevice and a second local device in communication with the local device.Other devices can be covered as well such that the group can consist ofthree or more devices.

The method can also include transmitting a master key list to the localdevice, the master key list defining super users who can gain access tothe local device independent of being listed on the authorization list.This can cover a maintenance person perhaps from the manufacturer of thestorage devices or other person who needs access who might notspecifically be on the authorization list. In yet another example, theremote server may receive a request for an updated access list andrespond by transmitting an updated access list to the local device fromwhich the request came.

FIG. 13 illustrates another method embodiment 1300. A method includesestablishing, via a remote server, communication with a plurality oflocal devices, each device of the plurality of local devices having arespective control module, a respective reader component and arespective locking mechanism (1302) and transmitting to each device ofthe plurality of local devices a respective authorization list whichidentifies authorized users who can gain access to the respective localdevice based on a respective authorized user interacting with therespective reader component (1304). The respective control module cancause the respective locking mechanism to unlock upon authorizationlocally based on the respective authorization list.

As introduced in FIG. 1 above, some of the component can be electricalor computer components. In some cases, such a computing device orapparatus may include a processor, microprocessor, microcomputer, orother component of a device that is configured to carry out the steps ofthe methods disclosed above. In some examples, such computing device orapparatus may include one or more antennas for sending and receiving RFsignals. In some examples, such computing device or apparatus mayinclude an antenna and a modem for sending, receiving, modulating, anddemodulating RF signals, as previously described.

The components of the computing device can be implemented in circuitry.For example, the components can include and/or can be implemented usingelectronic circuits or other electronic hardware, which can include oneor more programmable electronic circuits (e.g., microprocessors,graphics processing units (GPUs), digital signal processors (DSPs),central processing units (CPUs), and/or other suitable electroniccircuits), and/or can include and/or be implemented using computersoftware, firmware, or any combination thereof, to perform the variousoperations described herein. The computing device may further include adisplay (as an example of the output device or in addition to the outputdevice), a network interface configured to communicate and/or receivethe data, any combination thereof, and/or other component(s). Thenetwork interface may be configured to communicate and/or receiveInternet Protocol (IP) based data or other type of data.

The methods discussed above are illustrated as a logical flow diagram,the operations of which represent a sequence of operations that can beimplemented in hardware, computer instructions, or a combinationthereof. In the context of computer instructions, the operationsrepresent computer-executable instructions stored on one or morecomputer-readable storage media that, when executed by one or moreprocessors, perform the recited operations. Generally,computer-executable instructions include routines, programs, objects,components, data structures, and the like that perform particularfunctions or implement particular data types. The order in which theoperations are described is not intended to be construed as alimitation, and any number of the described operations can be combinedin any order and/or in parallel to implement the processes.

Additionally, the methods disclosed herein may be performed under thecontrol of one or more computer systems configured with executableinstructions and may be implemented as code (e.g., executableinstructions, one or more computer programs, or one or moreapplications) executing collectively on one or more processors, byhardware, or combinations thereof. As noted above, the code may bestored on a computer-readable or machine-readable storage medium, forexample, in the form of a computer program comprising a plurality ofinstructions executable by one or more processors. The computer-readableor machine-readable storage medium may be non-transitory.

The term “computer-readable medium” includes, but is not limited to,portable or non-portable storage devices, optical storage devices, andvarious other mediums capable of storing, containing, or carryinginstruction(s) and/or data. A computer-readable medium may include anon-transitory medium in which data can be stored and that does notinclude carrier waves and/or transitory electronic signals propagatingwirelessly or over wired connections. Examples of a non-transitorymedium may include, but are not limited to, a magnetic disk or tape,optical storage media such as compact disk (CD) or digital versatiledisk (DVD), flash memory, memory or memory devices. A computer-readablemedium may have stored thereon code and/or machine-executableinstructions that may represent a procedure, a function, a subprogram, aprogram, a routine, a subroutine, a module, a software package, a class,or any combination of instructions, data structures, or programstatements. A code segment may be coupled to another code segment or ahardware circuit by passing and/or receiving information, data,arguments, parameters, or memory contents. Information, arguments,parameters, data, etc. may be passed, forwarded, or transmitted via anysuitable means including memory sharing, message passing, token passing,network transmission, or the like.

In some embodiments the computer-readable storage devices, mediums, andmemories can include a cable or wireless signal containing a bit streamand the like. However, when mentioned, non-transitory computer-readablestorage media expressly exclude media such as energy, carrier signals,electromagnetic waves, and signals per se.

Specific details are provided in the description above to provide athorough understanding of the embodiments and examples provided herein.However, it will be understood by one of ordinary skill in the art thatthe embodiments may be practiced without these specific details. Forclarity of explanation, in some instances the present technology may bepresented as including individual functional blocks comprising devices,device components, steps or routines in a method embodied in software,or combinations of hardware and software. Additional components may beused other than those shown in the figures and/or described herein. Forexample, circuits, systems, networks, processes, and other componentsmay be shown as components in block diagram form in order not to obscurethe embodiments in unnecessary detail. In other instances, well-knowncircuits, processes, algorithms, structures, and techniques may be shownwithout unnecessary detail in order to avoid obscuring the embodiments.

Individual embodiments may be described above as a process or methodwhich is depicted as a flowchart, a flow diagram, a data flow diagram, astructure diagram, or a block diagram. Although a flowchart may describethe operations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be re-arranged. A process is terminated when itsoperations are completed, but can have additional steps not included ina figure. A process may correspond to a method, a function, a procedure,a subroutine, a subprogram, etc. When a process corresponds to afunction, its termination can correspond to a return of the function tothe calling function or the main function.

Processes and methods according to the above-described examples can beimplemented using computer-executable instructions that are stored orotherwise available from computer-readable media. Such instructions caninclude, for example, instructions and data which cause or otherwiseconfigure a general purpose computer, special purpose computer, or aprocessing device to perform a certain function or group of functions.Portions of computer resources used can be accessible over a network.The computer executable instructions may be, for example, binaries,intermediate format instructions such as assembly language, firmware,source code. Examples of computer-readable media that may be used tostore instructions, information used, and/or information created duringmethods according to described examples include magnetic or opticaldisks, flash memory, USB devices provided with non-volatile memory,networked storage devices, and so on.

Devices implementing processes and methods according to thesedisclosures can include hardware, software, firmware, middleware,microcode, hardware description languages, or any combination thereof,and can take any of a variety of form factors. When implemented insoftware, firmware, middleware, or microcode, the program code or codesegments to perform the necessary tasks (e.g., a computer-programproduct) may be stored in a computer-readable or machine-readablemedium. A processor(s) may perform the necessary tasks. Typical examplesof form factors include laptops, smart phones, mobile phones, tabletdevices or other small form factor personal computers, personal digitalassistants, rackmount devices, standalone devices, and so on.Functionality described herein also can be embodied in peripherals oradd-in cards. Such functionality can also be implemented on a circuitboard among different chips or different processes executing in a singledevice, by way of further example.

The instructions, media for conveying such instructions, computingresources for executing them, and other structures for supporting suchcomputing resources are example means for providing the functionsdescribed in the disclosure.

In the foregoing description, aspects of the application are describedwith reference to specific embodiments thereof, but those skilled in theart will recognize that the application is not limited thereto. Thus,while illustrative embodiments of the application have been described indetail herein, it is to be understood that the inventive concepts may beotherwise variously embodied and employed, and that the appended claimsare intended to be construed to include such variations, except aslimited by the prior art. Various features and aspects of theabove-described application may be used individually or jointly.Further, embodiments can be utilized in any number of environments andapplications beyond those described herein without departing from thebroader spirit and scope of the specification. The specification anddrawings are, accordingly, to be regarded as illustrative rather thanrestrictive. For the purposes of illustration, methods were described ina particular order. It should be appreciated that in alternateembodiments, the methods may be performed in a different order than thatdescribed.

Where components are described as being “configured to” perform certainoperations, such configuration can be accomplished, for example, bydesigning electronic circuits or other hardware to perform theoperation, by programming programmable electronic circuits (e.g.,microprocessors, or other suitable electronic circuits) to perform theoperation, or any combination thereof.

The phrase “coupled to” refers to any component that is physicallyconnected to another component either directly or indirectly, and/or anycomponent that is in communication with another component (e.g.,connected to the other component over a wired or wireless connection,and/or other suitable communication interface) either directly orindirectly.

Claim language or other language reciting “at least one of” a set and/or“one or more” of a set indicates that one member of the set or multiplemembers of the set (in any combination) satisfy the claim. For example,claim language reciting “at least one of A and B” or “at least one of Aor B” means A, B, or A and B. In another example, claim languagereciting “at least one of A, B, and C” or “at least one of A, B, or C”means A, B, C, or A and B, or A and C, or B and C, or A and B and C. Thelanguage “at least one of” a set and/or “one or more” of a set does notlimit the set to the items listed in the set. For example, claimlanguage reciting “at least one of A and B” or “at least one of A or B”can mean A, B, or A and B, and can additionally include items not listedin the set of A and B.

We claim:
 1. A pair of storage devices comprising: a first storagedevice having a first battery storing energy for operating the firststorage device, a first control module powered by the first battery, afirst sensor component controlled by the first control module andpowered by the first battery, a first locking mechanism and a firstreader component; and a second storage device having a second batterystoring energy for operating the second storage device, a second controlmodule powered by the second battery, a second sensor componentcontrolled by the second control module and powered by the secondbattery, a second locking mechanism and a second reader component,wherein the first control module is in communication with the secondcontrol module, wherein one of the first reader component or the secondreader component enables both the first locking mechanism and the secondlocking mechanism.
 2. The pair of storage devices of claim 1, wherein awireless communication link enables communication between the firstcontrol module and the second control module.
 3. The pair of storagedevices of claim 1, wherein the first reader component and the secondreader component each comprise one of an RFID reader, a near-fieldcommunication component, a Bluetooth reader component, a gesture sensingor detecting component, a facial recognition component, a bio-metricreader, a touch-sensitive display, a keypad, a multi-modal inputcomponent, and a motion detection component.
 4. The pair of storagedevices of claim 1, wherein one of the first control module and thesecond control module stores additional instructions to adjust atemporary period of time, based on a battery power level that a door isunlocked.
 5. The pair of storage devices of claim 1, wherein the firstcontrol module causes the first reader component to function at certainperiods of time when a battery power level is below a threshold.
 6. Thepair of storage devices of claim 1, wherein at least one of the firstcontrol module and the second control module stores a listing ofauthorized external entities that can unlock at least one of the firststorage device and the second storage device.
 7. The pair of storagedevices of claim 1, wherein at least one of the first control module andthe second control module stores a listing of black-listed externalentities that cannot unlock at least one of the first storage device andthe second storage device.
 8. The pair of storage devices of claim 1,wherein one of the first storage device and the second storage devicewill unlock and remain unlocked when a respective low battery conditionexists.
 9. The pair of storage devices of claim 1, wherein an externalentity that interacts with the first reader component will only be ableto unlock one of the first storage device or the second storage deviceif the first storage device or the second storage device is respectivelydeemed ready for a collection or needs service.
 10. The pair of storagedevices of claim 1, wherein an external entity that interacts with thefirst reader component will only unlock the device during specific hoursof a day.
 11. The pair of storage devices of claim 1, furthercomprising: a first separate service compartment on the first storagedevice that is accessible only to authorized external entities.
 12. Thepair of storage devices of claim 1, wherein the first storage deviceoperates the first locking mechanism directly off of a solar panel whenbattery failure occurs.
 13. A pair of devices comprising: a firstdevice, the first device having a battery, a first reader component anda first control module that controls both (1) a first operation of thefirst device and (2) a first locking component of the first device foraccessing a first door of the first device; and a second device incommunication with the first device, the second device having a secondlocking component for the second device for accessing a second door ofthe second device, the second device not having a reader componentoperating with a control module that controls the second lockingcomponent, wherein access to the first device and the second device areboth controlled by use of the first reader component and the firstcontrol module on the first device such that the first device and thesecond device can be unlocked simultaneously, one at a time, orindividually based on access rules implemented by the first controlmodule.
 14. A method comprising: receiving identification informationfrom an external entity via a reader component on a first storagedevice, wherein the reader component is connected to a control modulethat manages at least one component in the in the first storage deviceand wherein the control module also controls a first locking mechanismthat controls access to the first storage device and a second lockingmechanism configured on a second storage device, the second lockingmechanisms controlling access to the second storage device; determiningthat a user associated with the identification information is authorizedto access one of the first storage device or the second storage devicebased on a locally-stored authorization list; and unlocking one of thefirst locking mechanism on the first storage device and the secondlocking mechanism on the second storage device.
 15. The method of claim14, wherein the second storage device does not comprise a second-devicereader component.
 16. The method of claim 14, wherein the locally-storedauthorization list is stored at the first storage device and wherein thelocally-stored authorization list provides authorization information onone or more of a per-device, per user, per group of devices, per time,or per unlocking need basis.
 17. The method of claim 14, furthercomprising: receiving, from a remote server, the locally-storedauthorization list.
 18. The method of claim 14, wherein thelocally-stored authorization list further defines timing informationregarding when at least one of the first storage device and the secondstorage device are eligible to be unlocked.
 19. The method of claim 14,wherein the control module stores access rules and control instructionsthat can cause the first locking mechanism and the second lockingmechanism to open simultaneously, independently, or in a sequence. 20.The method of claim 14, further comprising: registering the secondstorage device with the first storage device to enable management of thesecond locking mechanism by the control module of the first storagedevice.