Method and apparatus for securing delivery of goods

ABSTRACT

A method and apparatus for providing security for delivered goods purchased via electronic or telephonic commerce is provided in the form of a digital lock box, and method of operating the lock box in cooperation with senders of goods. This method further comprises generating a owner access code for full access to a secured area, individually dividing this secured area into a plurality of sections after each delivery, generating a delivery access code for access to particular sections of a secured area, forwarding this delivery access code to senders of deliverable goods, and deactivating this delivery access code after the delivery of these goods.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority pursuant to 35 U.S.C. § 119(e) to U.S.Provisional Application No. 60/217,614, filed Jul. 11, 2000, whichapplication is specifically incorporated herein, in its entirety, byreference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a method and apparatus for securingdelivery of goods from multiple senders to an address, such asfrequently occurs when goods are purchased via electronic or telephoniccommerce. More specifically, this invention pertains to a security boxthat provides either full or partial access to the contents within thesecurity box according to variable combinations entered into a digitalinterface, and to a method of operating the security box in cooperationwith senders and deliverers of goods.

2. Description of Related Art

For many years, the global retail market has been characterized as amarket in which products are sold from physical locations. In recentyears, however, this dynamic has undergone a significant change inresponse to the increasing popularity of the Internet and in particularwith the increasing popularity of electronic commerce. Despite the manyconveniences provided by the emerging electronic marketplace, however,some problems still exist. In particular, potential problems may stemfrom the fact that physical products purchased via electronic commerceare sometimes delivered to a vacant business or residence. For example,if a consumer is not home at the time of delivery, the delivery may bedelayed, cancelled, or the delivery may be left unsecured outside thevacant business or residence.

Prior art methods developed to address this problem have primarilyinvolved the use of a lock box secured outside of a business orresidence. In one such prior art method, a lock box owner may mail a keyto a mail-order merchant, along with payment for its product, so thatthe product may be securely delivered into the lock box by thedeliverer. There are several problems, however, to this method includingthe fact that people are generally reluctant to send items such as keysthrough conventional mail for fear that they may be stolen orduplicated. A further problem exists in that is simply inconvenient formost people to physically send a key to a merchant via conventionalmail.

Prior art methods developed to address this problem have mostly includedmethods of remotely setting lock codes and making them difficult tointercept. In particular, these prior arts anticipate the need for usersto repeatedly and easily obtain access to a locked area. A problemstill, however, exists in that no such method anticipates the need togrant a one-time only access to a locked area (e.g., a lock box), andthereafter prevent others (or even the same person) from later accessingthe same area. With respect to delivering packages, a further problemexists in that no such method prevents package deliverers from obtainingaccess to the contents of prior deliveries. Another prior art methodcomprises providing a box into which mail or other items may be placedthrough a drop-off door. The door is configured so that items may noteasily be removed through the drop-off door. Mail or other items droppedin the box may be removed from the box through a normally locked, largeraccess door. This method is commonly used by postal services for dropboxes, and is also the underlying method used with mail slots that enterinto locked homes and other enclosures. However, the drop box or mailslot method is difficult to implement with large packages, because thedrop-off door or mail slot cannot easily be made large enough for mostpackages without requiring a bulky enclosure.

A need in the industry therefore exists for a method to secure thedelivery of purchased goods, and particularly, packages, to vacantbusinesses or residences. More specifically, a need in the industryexists for a method that provides package deliverers temporary access toa section of a secure area, preferably one containing no packages fromprior deliveries.

SUMMARY OF THE INVENTION

In an embodiment of the invention, a method and apparatus for providingsecurity for delivered goods is provided in the form of a digital lockbox. The method further comprises generating a owner access code forfull access to a secured area, generating a delivery access code foraccess to a section of the secured area designated for delivery ofgoods, forwarding this delivery access code to merchants of deliverablegoods, and deactivating this delivery access code after the delivery ofthese goods. As used herein, “merchant” includes any person or entityfrom whom delivery of goods is desired, and is not limited to sellers ofgoods. Preferably, the method further comprises securing the deliveredgoods from access by later deliverers to the secured area. This may beaccomplished by reconfiguring the secured area, such as by moving orclosing a security gate, so that the section designated for futuredeliveries of goods is empty.

The apparatus according to the invention comprises a lock box with adigital lock. The digital lock is preferably operated by a controller incommunication with a personal computer or other terminal devicebelonging to the lock box owner. As used herein, “owner” connotes anyperson or entity authorized to receive goods using the lock box, and isnot limited to the person with legal title to the lock box. The ownerpreferably may generate and control the combination codes used with thebox using the terminal device, including providing variable codes tomerchants or deliverers of goods. In the alternative, the combinationcodes may be controlled manually by an input device, such as a keypad,connected to the controller.

The interior of the lockbox may comprise a simple enclosure with twoaccess doors. Through a delivery access door, goods may be placed in thebox, but not removed. A larger removal door is used for removal ofgoods. The controller controls access to both doors. However, this typeof lockbox may be undesirably bulky.

Therefore, in an embodiment of the invention, the interior of the box isdivisible into at least two sections. The box may be accessed by one ormore doors, each under the control of the controller. At least one ofthe sections, that is, a receiving section or sections, may bedesignated for future delivery of goods. At least another of thesections, that is, a storage section or sections, may be designated forstorage of goods after delivery. Preferably, the receiving section isaccessible by deliverers of goods, but the storage section is not.Preferably, the lock box is configured such that after goods aredelivered to it, the goods are moved to a storage section, or in thealternative, the configuration of the storage section is changed so thatit includes all of the delivered goods. Movement of goods or sections inthe lock box may be accomplished using a movable divider. Movement ofthe divider may be accomplished manually, or using an automaticmechanism.

A more complete understanding of a method and apparatus for securingdelivery of goods will be afforded to those skilled in the art, as wellas a realization of additional advantages and objects thereof, by aconsideration of the following detailed description of the preferredembodiment. Reference will be made to the appended sheets of drawingswhich will first be described briefly.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of a closed security box according to apreferred embodiment of the invention.

FIG. 2 is an illustration of an open security box according to apreferred embodiment of the invention.

FIG. 3 is a cross sectional view of the front of the security boxaccording to a preferred embodiment of the invention.

FIG. 4 is a block diagram illustrating the computer network systemimplemented in a preferred embodiment of the invention.

FIG. 5A is a cross sectional view of a side of a closed security boxbefore the delivery of a package.

FIG. 5B is a cross sectional view of the side of a security box openedfor the delivery of a first package.

FIG. 5C is a cross sectional view of the side of a closed security boxafter the delivery of a first package.

FIG. 5D is a cross sectional view of the side of a security box openedfor the delivery of a second package.

FIG. 6 is a flow chart illustrating the steps followed by user computerswhen generating access codes according to a preferred embodiment of theinvention.

FIG. 7 is a flow chart illustrating the procedure for unlocking thesecurity box for deliveries.

FIG. 8 is a flow chart illustrating the procedure for unlocking thesecurity box for retrieval of deliveries by the owner.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention is directed towards a method and apparatus forsecuring delivery of goods. More specifically, this invention pertainsto a security box 100 that can only be opened with variablecombinations, represented either by an owner access code or a delivereraccess code, entered into a digital interface, and method of operatingthe security box in cooperation with merchants, deliverers, and owners.Owner access codes may be given upon purchasing a security box, andsubsequently changed at the discretion of the owner. Owner access codesare operative for repeated access to the security box. Deliverer accesscodes are only for one-time use. Deliverer access codes may be generatedby the user computer system 400 after purchasing a deliverable product,or by the consumer directly on the security box 100, such as by using akeypad or other input device. In a preferred embodiment of theinvention, the deliverer access code is simultaneously transmitted tothe merchant computer system 300 providing the deliverable product. Themerchant then forwards this access code to the appropriate shippingproviders for use upon delivery.

In FIG. 1, shows an exemplary closed security box 100 according to anembodiment of the invention. The exemplary security box 100 is drawn anddescribed in a simplified, conceptual manner illustrative of thefunctions of a box according the invention. Numerous mechanical details,as would be apparent to one skilled in the art, have been omitted. Oneskilled in the art will recognize that the functions of box 100 may beaccomplished using various alternative mechanical designs, and theinvention is not limited by any particular design such as may besuggested by the illustrated embodiment. Exemplary security box 100 iscomprised of a partitioned security door 120, a security door storagecompartment 125, and a digital interface 110. The digital interface 110is further comprised of a liquid crystal display (LCD) 112 and a keypad114. In a preferred embodiment, the owner of the security box 100 aswell as deliverers of packages to the security box 100 obtain access tothe security box 100 by entering the appropriate access code via thedigital interface 110. Upon obtaining access, the security box isunlocked enabling the security door 120 to be lowered into the securitydoor storage compartment 125.

In FIG. 2, an illustration of an open security box is provided accordingto a preferred embodiment of the invention. As previously stated,security door 120 lowers into the security door storage compartment 125as illustrated. In FIG. 2, it is also shown that security box 100 isfurther comprised of a storage area A 174, a security box controller130, a plurality of shelves (shelf A 170, shelf B 160, and shelf C 150)attached to both shelf rail A 190 and shelf rail B 192, lock A 140, lockB 142, dowel rail A 180, and dowel rail B 182. It should be appreciatedthat, although only three shelves, 170, 160, and 150, are shown, anynumber of shelves may be used in the described implementation withoutaltering the scope and spirit of the invention.

In a preferred embodiment of the invention, shelves 170, 160, and 150are individually lowered whenever a package is delivered to the securitybox 100. The dynamics of this particular mechanical system may be betterunderstood by examining the cross sectional view of the front of thesecurity box provided in FIG. 3. Additional components to the securitybox 100 shown here in FIG. 3 include extendable dowels 181 and 183, andsensor array A 172. Once a package is delivered to storage area A 174,shelf A 170 is lowered along shelf rails 190 and 192. Shelf A 170continues to be lowered until contact is made between any part of sensorarray A 172 and the delivered package. This process is then repeatedwhen subsequent packages are delivered to different shelves.

In a multiple shelf system, deployment of the shelves, i.e., movement ofthe shelves after a new package is placed in the security box, may beaccomplished manually or automatically. If the shelves are movedmanually, the need for sensors, actuators, and control mechanisms may beavoided. After placing a package in the box, the deliverer would simplyslide the next shelf in the stack to its lowest position in the box, andlock it in place. The sliding of the shelves is preferably governed by aone-way ratchet mechanism, so that deliverers may slide the shelves inonly one direction. The ratchet is preferably made accessible only tothe box owner, who after removing the packages from the security box,may return the shelves to their starting position. Deliverers would bemotivated to move the shelf in order to protect their package fromaccess or damage from the next delivery.

Although the illustrated embodiment shows multiple shelves, it may bedesirable to utilize a single shelf similar to one of shelves 150, 160,170, instead of multiple shelves. The single shelf should be madecapable of retracting or folding out of the way when a new package isplaced in the security box. For example, after a deliverer has placed anew package in the security box and closed the box, the retractableshelf would automatically retract from under the package (such as by atelescoping or folding action), move to the top of the security box,extend to a fully open position, and then slowly lower itself until itcontacted the top of the new package. The retractable shelf would thusact as a movable, automatically deployed divider between a receivingsection of the security box and a storage section of the box. After theretractable shelf is redeployed, the receiving area is empty and readyto receive another package.

As stated previously, in a preferred embodiment two types of accesscodes may be used that trigger two slightly different mechanisms foropening the security door 120. In particular, one type of access codemay used exclusively for the owner of the security box 100 and a secondtype of access code given for one-time use by deliverers of packages.When using the owner access code, full access may be granted (i.e.,access to all shelves, 150, 160, and 170), while a deliverer access codemay provide only partial access to the security box (i.e., access toonly one of shelves, 150, 160, and 170).

Operation of the security box 100 is further illustrated by FIGS. 5A,5B, 5C, and 5D. Once an owner or a deliverer obtains access to thesecurity box 100, via either type of access code, locks 140 and 142 aredeactivated by the security box controller 130. If an owner access codeis used, extendable dowels 181 and 183 remain unextended as shown inFIGS. 5A and 5C. However, if a deliverer access code is used, extendabledowels 181 and 183 extend themselves and lock into their respectivedowel cavities located in security door 120 as shown in FIGS. 5B and 5C.As a result, security door 120 may either be fully lowered into thesecurity door storage compartment 125 without obstruction (i.e., usingan owner access code) or, only partially lowered until the paths ofextended dowels, 181 and 183, become obstructed (i.e., using a delivereraccess code). The function of these dowels, 181 and 183, is thus togrant full access of shelves to owners and to prevent deliverers fromhaving access to shelves where other packages from other deliverers maybe. As illustrated in FIG. 5D, for example, the extension of dowel 181prevents security door 120 from being lowered below shelf A 170, thusproviding security for delivered package 175.

Any other suitable locking mechanism capable of locking security door120 at various open positions may be used instead of extendable dowels181, 183. For example, the top edge of the security door may be providedwith a protruding lock (such as a series of lockable, retractable pins)that prevents lowering of the door past the level of the topmost shelfin use. Any unused shelves would be stored in a ceiling space above thedoor, so as to not interfere with the operation of the door. Theprotruding lock on the security door may be retracted only by the owner,to allow the owner to fully open the door to access all packages storedin the security box. One skilled in the art may devise other suitablemechanisms for dividing the security box into two areas of variablespace, and locking the areas as described.

In FIG. 4, a block diagram illustrating the computer network systemimplemented in a preferred embodiment of the invention is provided. Asillustrated, a security box controller 130 is shown to communicate withmerchant computer systems 300 and a user computer systems 400 via theInternet 200. The Internet is defined here as a collection ofinterconnected (public and/or private) networks linked together by a setof standard protocols (such as TCP/IP and HTTP) to form a global,distributed network. While this term is intended to refer to what is nowcommonly known as the Internet, it is also intended to encompassvariations that may be made in the future, including changes andadditions to existing standard protocols. User computers 400 may includeany type of computing device that allows a user to interactively browsewebsites, such as a personal computer (PC) that includes a Web browserapplication 420 (e.g., Microsoft Internet Explorer™ or NetscapeCommunicator™). Suitable user computers 400 equipped with browsers 420are available in many configurations, including handheld devices (e.g.,PalmPilot™), personal computers (PC), laptop computers, workstations,television set-top devices, multi-functional cellular phones, and soforth.

As illustrated in FIG. 4, the security box controller 130 is furthercomprised of an applications processor coupled to the shelf rail controlunit 136, the dowel control unit 135, the locking mechanism control unit137, the sensor unit 138, a digital interface 110, and a Web browser134. The merchant computer system 300 is, meanwhile, further comprisedof a core processor 310 coupled to a Web server 312 connected to an HTML(Hyper-Text Markup Language) documents database 314. As is alsogenerally known in the art, Web servers (such as Web server 312) accessa plurality of Web pages, distributable applications, and otherelectronic files containing information of various types respectivelystored in HTML document database 314. As a result, Web pages may beviewed on various user computers 400; for example, a particular Web pageor other electronic file may be viewed through a suitable applicationprogram residing on a user computer 400, such as a browser 420, or by adistributable application provided to the user computer 400 by Webserver 312.

It should be appreciated that a user identifies a desired Web page fordelivery to the user computer 400 by communicating an HTTP (Hyper-TextTransport Protocol) request from the browser application 420. The HTTPrequest includes the Uniform Resource Locator (URL) of the desired Webpage, which may correspond to an HTML document stored in the HTMLdocuments databases 314. The HTTP request is then routed to Web server312 via the Internet 200. The Web server 312 then retrieves the HTMLdocument identified by the URL, and communicate the HTML document acrossthe Internet 200 to the browser application 420. The HTML document maybe communicated in the form of plural message packets as defined bystandard protocols, such as the Transport Control Protocol/InternetProtocol (TCP/IP).

In FIG. 6, a flow chart illustrating the steps followed by the usercomputer system 400 when generating access codes is provided. In apreferred embodiment, the user computer system may also be used toaccess the security box controller via the Internet 200. The procedurebegins at step 500 when the user computer system 400 sends an HTTPrequest corresponding to the electronic commerce Web page of the desiredmerchant computer system 300. The appropriate HTML document, accordingto the request made at step 500, is then received by the user computer400 at step 505.

At this point, the user computer 400 has obtained access to theelectronic commerce platform of the desired merchant computer system300. Once this access is obtained, the user proceeds by orderingwhichever products it desires from this particular merchant. Meanwhile,the user computer system 400 continuously monitors the actions of theuser at step 510 in order to determine if a purchase is made. If apurchase is indeed made at step 510, then a purchase request is sent tothe merchant computer system 300 at step 515.

The procedure continues with the user computer 400 awaiting confirmationfor this order from the merchant computer system 300 at step 520. Ifthis order is indeed confirmed at step 520, then the user computer 400proceeds by receiving package dimensions for this order at step 530 fromthe merchant computer system 300; otherwise, the order is cancelled anda cancellation message is subsequently sent by the user computer 400 atstep 525.

Once the user computer 400 receives package dimensions at step 530, itis then determined whether there is sufficient space in the security box100 for this package at step 535. For example, in the security box 100shown in FIG. 5A, storage area A 174 is the largest area available fordeliveries. Within this example, if a purchase is made by the user, thedimensions of the package corresponding to that purchase are compared tothe dimensions of storage area A 174 at step 535. Similarly, if thelargest available storage space is storage area B 164, as shown in FIG.5C, then the dimensions of the package are compared to the dimensions ofstorage area B 164 at step 535.

If it is determined, at step 535, that the space available is sufficientto store the package purchased by the user, then a security access codeis generated at step 550 which is then forwarded to both the merchantcomputer system 300 and the security box controller 130 at step 555;otherwise, the user computer 400 shall ask the user how it wants thepackage to be sent at step 540. In particular, step 540 asks the user ifit wants to proceed with delivery to the security box 100, or whether itwants the package sent via conventional methods. Therefore, if usercomputer 400 determines that the user wants its purchased productsshipped conventionally, then a request for this particular type ofshipment is sent to the merchant computer system 300 at step 545;otherwise, the user computer generates an access code for thisparticular delivery at step 550 which is then forwarded to both themerchant computer system 300 and the security box controller 130 at step555. If the user decides to continue with delivery to the security box100, regardless of the unavailability of space, the user must make spaceprior to the delivery of the package in order to ensure that it fits inthe appropriate storage area.

In FIG. 7, a flow chart illustrating the procedure for unlockingsecurity box 100 for deliveries is provided. This procedure begins atstep 600 when the security box controller 130 receives an input from itsdigital interface 110. The security box controller 130 then determineswhether this input is a valid delivery access code at step 605. If theinput is indeed a valid delivery access code, then dowel A 181 and dowelB 183 are both extended at step 615; otherwise, access to the securitybox 100 is denied at step 610. Once the dowels 181, 183 have beenextended at step 615, the procedure continues with security lock A 140and security lock B 142 both being unlocked at step 620.

At this point, the deliverer of the expected package may open thesecurity box 100. It should be noted, however, that extended dowels 181and 183 (or other suitable locking mechanism) will allow for thesecurity door 120 to only open as far as the locking mechanism allows.For example, in the security box 100 shown in FIG. 5A, storage area A174 is empty. In this example, when a first deliverer opens the securitydoor 120, extended dowels 181 and 183 will respectively slide down dowelrails 180 and 182 until they are prevented from further movement by thebottom of storage area A 174 (i.e., the inside floor of the security box100) as shown in FIG. 5B. After this first package 175 is delivered, thesecurity box 100 will appear as shown in FIG. 5C. Therefore, when asecond deliverer opens the security box to deliver a second package, thesecurity door 120 will only open as far as the level of extended dowels181 and 183 at the bottom of storage area B 164 (i.e., the top of shelfB 160) as illustrated in FIG. 5D.

Returning to the flow chart described in FIG. 7, a package is thenreceived from the deliverer at step 625. After receiving the package atstep 625, the security box controller waits until the security door 120has been properly closed at step 630. Once the security door 120 isproperly closed at step 630, the access code accepted at step 605 isdeactivated at step 635. Next, dowels 181 and 183 are retracted andreturned to their original positions on dowel rail A 180 and dowel railB 182, respectively. The sensor array corresponding to the shelfdirectly above the delivered package is then activated at step 645followed by the lowering of that particular shelf at step 650. If thiswas a first delivery, for example, then sensor array A 172 would beactivated at step 645 and shelf A 170 would be lowered at step 650.

Continuing with this example, the security box controller 130 thenproceeds with step 655 where it continuously monitors the triggering ofany sensor in sensor array A 172 as shelf A 170 is lowered. Once contactis made on at least one of these sensors, the lowering of the shelf ishalted at step 660. The procedure then concludes at step 665 with thesecurity box controller 130 determining how much remaining storage spaceis available for any additional deliveries. It should be appreciatedthat this determination may be made according to where the lowered shelfis stopped at step 660. In the security box 100 illustrated in FIG. 5C,for example, the security box controller 130 may determine thedimensions of storage area B 164 based on how far shelf A 170 waslowered. As a result, subsequent purchases by the user may be madeaccording to how much available space the security box 100 currentlycomprises.

In FIG. 8, a flow chart illustrating the procedure for unlocking thesecurity box for retrieval of deliveries by the owner is provided. Thisprocedure begins at step 700 when the security box controller 130receives an input from its digital interface 110. The security boxcontroller 130 then determines whether this input is a valid user accesscode at step 710. If the input is indeed a valid user access code, thenthe procedure continues with security lock A 140 and security lock B 142both being unlocked at step 730; otherwise, access to the security box100 is denied at step 720.

Once security locks 140 and 142 are unlocked at step 730, the user mayopen the security door 120. Because dowels 181 and 183 were notextended, security door 120 may be fully opened. As a result, the usermay retrieve packages located on any of the shelves within the securitybox 100. After retrieving these packages, the security box controller130 waits for the user to confirm that these packages were indeedretrieved at step 740. In a preferred embodiment, this confirmation maybe received via a reset button located on the digital interface 110.

If confirmation is received from the user at step 740, then all shelvesare returned to their original positions at step 750 followed by adetermination of whether security door 120 has been closed at step 760;otherwise, step 750 is bypassed and the procedure continues directlywith the determination of whether security door 120 has been closed atstep 760. Once the security door 120 has been closed, the procedureconcludes with security locks 140 and 142 being activated at step 770.

Having thus described a preferred embodiment of a method and apparatusfor securing delivery of good purchased via electronic or telephoniccommerce, it should be apparent to those skilled in the art that certainadvantages of the within system have been achieved. It should also beappreciated that various modifications, adaptations, and alternativeembodiments thereof may be made within the scope and spirit of thepresent invention. For example, a security box with multiple slidingshelves has been described, but a security box with a single slidingshelf or other divider is also be within the scope of the invention.Security boxes with no movable divider at all may also be operatedwithin the scope of the invention. The invention is further defined bythe following claims.

What is claimed is:
 1. A method for receiving packages delivered to asecured area, the method comprising: dividing the secured area into aplurality of separate sections; opening for access at least one of theseparate sections of the secured area upon receipt of a delivery accesscode; securing from access any section of the secured area that alreadycontains a package when the delivery access code is used to access thesecured area; deactivating the delivery access code so that the deliveryaccess code is no longer operative to access the secured area after theat least one of the separate sections has been accessed using thedelivery access code, and automatically determining an amount of vacantspace available in a largest one of the plurality of separate sectionsof the secured area.
 2. The method of claim 1, the further comprisingproviding a secured area comprising a digital lock box.
 3. The method ofclaim 1, further comprising opening for access all of the separatesections of the secured area upon receipt of a owner access code.
 4. Themethod of claim 1, further comprising transmitting the delivery accesscode to a remote party.
 5. The method of claim 1, wherein said dividingstep further comprises dividing the secured area using at least onemovable barrier.
 6. The method of claim 1, wherein said dividing stepfurther comprises adjusting at least one dimension of the at least oneof the plurality of separate sections of the secured area according toat least one dimension of a package placed in the at least one of theplurality of separate sections.
 7. The method of claim 1, furthercomprising comparing the amount of vacant space available withdimensions of a package that is not yet delivered to the secured area.8. The method of claim 7, further comprising transmitting a message whenthe dimensions of the package that is not yet delivered exceeds theamount of vacant space available.
 9. The method of claim 1, wherein saiddividing step further comprises a reset mechanism triggered upon removalof all delivered contents of the secured area.
 10. The method of claim1, wherein said dividing step further comprises dividing the securedarea using a plurality of movable barriers.
 11. A system for receivingpackages delivered to a secured area, the system comprising: a digitallock box connected to a computer network, the digital lock box operativeto perform the functions of: opening for access at least one of theseparate sections of the secured area upon receipt of a delivery accesscode; securing from access any section of the secured area that alreadycontains a package when the delivery access code is used to access thesecured area; and deactivating the delivery access code so that thedelivery access code is no longer operative to access the secured areaafter the at least one of the separate sections has been accessed usingthe delivery access and automatically determining an amount of vacantspace available in a largest one of the plurality of separate sectionsof the secured area.
 12. The system of claim 11, wherein the digitallock box is further operative to perform the function of opening foraccess all of the separate sections of the secured area upon receipt ofa owner access code.
 13. The system of claim 11, wherein the digitallock box is further operative to perform the function of transmittingthe delivery access code to a remote party.
 14. The system of claim 11,wherein the digital lock box is further operative to perform thefunction of adjusting at least one dimension of the at least one of theplurality of separate sections of the secured area according to at leastone dimension of a package placed in the at least one of the pluralityof separate sections.
 15. The system of claim 11, wherein the digitallock box is further operative to perform the function of comparing theamount of vacant space available with dimensions of a package that isnot yet delivered to the secured area.
 16. The system of claim 15,wherein the digital lock box is further operative to perform thefunction of transmitting a message when the dimensions of the packagethat is not yet delivered exceeds the amount of vacant space available.17. The system of claim 11, wherein the digital lock box is furtheroperative to perform the function of dividing the secured area using aplurality of movable barriers.
 18. The system of claim 11, wherein thedigital lock box is further operative to perform the function ofdividing the secured area using at least one movable barrier.