Locking system for exchange of items, services, and/or facilities

ABSTRACT

One or more techniques and/or systems are provided for generating locking codes. For example, a remote interface (e.g., hosted by a kiosk or a cloud service provider) may receive a request from a requestor for an unlocking code. The unlocking code may be used to unlock a lock, such as a lock integrated into or attached by a secondary means of attached to a containment component. The remote interface generates the unlocking code valid for a timespan. The unlocking code may be generated based upon a unique identifier of the containment component. The remote interface transmits the unlocking code to the requestor for unlocking the lock. In an example, the unlocking code is transmitting after a delay.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is continuation-in-part of U.S. patent application Ser.No. 17/405,789, filed on Aug. 18, 2021 and titled “LOCKING SYSTEM FOREXCHANGE OF ITEMS, SERVICES, AND/OR FACILITIES,” which is a continuationof U.S. Pat. No. 11,100,738, filed on Oct. 16, 2020 and titled “LOCKINGSYSTEM FOR EXCHANGE OF ITEMS, SERVICES, AND/OR FACILITIES,” which is acontinuation-in-part of U.S. Pat. No. 10,825,277, filed on May 21, 2020and titled “LOCKING SYSTEM FOR EXCHANGE OF ITEMS, SERVICES, AND/ORFACILITIES,” which is a continuation of U.S. Pat. No. 10,679,447, filedon Jun. 10, 2019 and titled “LOCKING SYSTEM FOR EXCHANGE OF ITEMS,SERVICES, AND/OR FACILITIES,” which is a continuation-in-part of U.S.Pat. No. 10,339,750, filed on Apr. 18, 2018 and titled “LOCKING SYSTEMFOR EXCHANGE OF ITEMS, SERVICES, AND/OR FACILITIES,” which claimspriority to U.S. Provisional Patent Application No. 62/486,577, filed onApr. 18, 2017, which are incorporated herein by reference.

BACKGROUND

Providers and consumers of new or used items, services, or facilitiesface many issues in a physical exchange between one another. Shippingvia courier is expensive and often impractical for items of lower valueand/or large size and there may not be suitable and secure means ofexchange readily available. Access to facilities and rental of items canbe even more difficult to arrange common exchange times and locations.Furthermore many consumers and businesses are looking for new ways toreduce costs, seeking more used items and reducing free amenities.

SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the detaileddescription. This summary is not intended to identify key factors oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

A remote interface (e.g., hosted by a kiosk or a cloud service provider)may receive a request from a requestor for an unlocking code. Theunlocking code may be used to unlock a lock, such as a lock integratedinto or attached by a secondary means of attached to a containmentcomponent. The remote interface generates the unlocking code valid for atimespan. The unlocking code may be based upon a unique identifier ofthe containment component. The remote interface transmits the unlockingcode to the requestor for unlocking the lock. In an example, theunlocking code is transmitting after a delay.

To the accomplishment of the foregoing and related ends, the followingdescription and annexed drawings set forth certain illustrative aspectsand implementations. These are indicative of but a few of the variousways in which one or more aspects may be employed. Other aspects,advantages, and novel features of the disclosure will become apparentfrom the following detailed description when considered in conjunctionwith the annexed drawings.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flow diagram illustrating an exemplary method offacilitating exchange of an item.

FIG. 2 is a component block diagram illustrating an exemplary system forfacilitating exchange of an item.

FIG. 3 is a component block diagram illustrating an exemplary system forfacilitating exchange of an item.

FIG. 4 is a component block diagram illustrating an exemplary system forfacilitating exchange of an item.

FIG. 5A is a component block diagram illustrating an exemplary systemfor facilitating exchange of an item, where a user retrieves an itemfrom a first containment component.

FIG. 5B is a component block diagram illustrating an exemplary systemfor facilitating exchange of an item, where a user returns an item to afirst containment component.

FIG. 6 is an illustration of an exemplary computing device-readablemedium wherein processor-executable instructions configured to embodyone or more of the provisions set forth herein may be comprised.

FIG. 7 illustrates an exemplary computing environment wherein one ormore of the provisions set forth herein may be implemented.

FIG. 8A illustrates a locking configuration.

FIG. 8B illustrates a locking configuration.

FIG. 9 illustrates a motor assembly.

FIG. 10 illustrates a motor assembly.

FIG. 11 illustrates a rear housing.

FIG. 12 is a flow diagram illustrating an exemplary method ofselectively buying or holding an item using a locking component.

FIG. 13 is a flow diagram illustrating an exemplary method of verifyingreturn of an item that has been resecured by a locking component.

FIG. 14 is a flow diagram illustrating an exemplary method of using alocking component for remote pawn.

FIG. 15 is a flow diagram illustrating an exemplary method of removal ofan abandoned or improperly placed item.

FIG. 16A illustrates a cloud based listing for an item.

FIG. 16B illustrates a cloud based listing for an item.

FIG. 17 illustrates a cloud based listing for an item.

FIG. 18 illustrates a web marketplace listing for an item.

FIG. 19 illustrates a lock service website.

FIG. 20 illustrates a lock service website.

FIG. 21 illustrates a lock service website.

FIG. 22 is a flow diagram illustrating an exemplary method offacilitating exchange of an item.

FIG. 23 illustrates a base station and containment components.

FIG. 24 illustrates a user using a mobile device to interact with acontainment component.

FIG. 25 is a flow diagram illustrating an exemplary method of generatingand providing an unlocking code.

FIG. 26 is a flow diagram illustrating an exemplary method of generatingand providing an unlocking code through a listing interface.

FIG. 27 is a component block diagram illustrating an exemplary systemfor generating and providing an unlocking code.

DETAILED DESCRIPTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are generally used to refer tolike elements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providean understanding of the claimed subject matter. It may be evident,however, that the claimed subject matter may be practiced without thesespecific details. In other instances, structures and devices areillustrated in block diagram form in order to facilitate describing theclaimed subject matter.

A locking and unlocking means is provided having a moveable restraint, alatch, and a prime mover. The restraint is configured to selectivelyrestrict or permit access to an item (e.g., food, a bike, an object,etc.), service, or facility. The restraint is selectively opened andclosed by the latch. Operation of the latch may be performed, enabled,or restricted by the motion of the prime mover. The prime mover iscontrolled by a code entry means, a code processing means, and a powersource. The code entry means may be manual, such as a keypad, orwireless, such as RF, IR, Bluetooth, WiFi, ANT, Zigbee, Cellular, orother suitable means. The code entry means may also be used to receiveinformation from the locking and unlocking means. A visible display,such as light emitting diodes, liquid crystal display, etc. is provided.The locking and unlocking means is identified by a serial number, whichmay consist of letters, numbers, symbols, or any combination thereof. Asecondary identifier may be used to publicly identify the lock, as theserial number may be kept confidential. This secondary identifier mayalso consist of letters, numbers, symbols, or any combination thereof.The locking and unlocking means may be equipped with a real time clockand supporting hardware and software, including a temperaturemeasurement means configured to adjust the operation of the real timeclock for accurate operation in a variety of temperatures. The codeentry means may additionally provide for the setting of the clock,configuring of the serial number, and other maintenance andconfiguration aspects of the locking and unlocking means. The moveablerestraint may be conductive and complete an electrical circuit whenclosed, for the purpose of electronically verifying the closure of theelectronic restraint. There may be an alternate means of attachment andan internal alarm.

The locking and unlocking means may be configured as a portable padlockor cable lock, an integrated cabinet lock, or a functional part of apiece of equipment. As a part of the functional piece of equipment, thelock may alternatively or additionally disable or enable the functionalpiece of equipment. The locking and unlocking means may be configured aspart of a vending device, selectively enabling vending of products orservices.

By having a locking and unlocking means as described, it allows multiplepersons to interact in new and unique ways at multiple locations andcapacities during an item exchange. A lock provider generally providesat least one locking and unlocking means. A location provider generallyprovides the location for at least part of the item exchange. An itemprovider provides at least one item involved in the exchange. A consumeraccesses or uses at least one item used in the item exchange.Additionally, a transportation provider may transport an item. A singleperson or party may fulfill one or many capacities in the same itemexchange. This provides a very flexible ecosystem for exchange of items.In addition, each capacity may have its own location. For example, thelock provider has a provider location, while the consumer has a consumerlocation. These locations may be public or private and commercial ornon-commercial.

This flexible ecosystem allows for items to be exchanged freely withouta fixed storage location. For example, a first consumer at a firstconsumer location may borrow a mobile object via operation of the primemover at the provider location. The first consumer may then re-securethe mobile object at the first consumer location. In this way, the firstconsumer, although still potentially financially responsible for themobile object, may offer the mobile object for use at the first consumerlocation, rather than returning to the provider location. A secondconsumer may then borrow the mobile object at the first consumerlocation. In many rental scenarios, such as bicycle rentals, there isoften a lack of storage space in living quarters or an inconvenientreturn transportation, and thus it is advantageous to re-secure themobile object at its point of last use, which may be a more likely pointfor re-rental or display.

In one embodiment, the system may include the locking and unlockingmeans and a remote computer with an application configured to generatecodes specific to the lock provider's serial numbers, which are underhis control. Codes may also be generated specific to certain time framesin conjunction with the serial numbers.

In another embodiment, the system may include the locking and unlockingmeans and remote computer that the lock provider does not control. Withan application to generate codes specific to the lock providers serialnumbers. In this embodiment, the lock provider would relinquish controland knowledge of the serial numbers and/or access to the applicationconfigured to generate said codes. This will allow the remote computerto generate codes and provide additional services. For example, theremote computer would prevent issuance of an unlocking code for acertain amount of time, thus creating a hold on the item secured in thelocking and unlocking means. In addition, the remote computer may easilyprovide access to multiple parties, coordinate codes, and charge feesappropriate to each party.

The lock provider and/or location provider can set rules as to what canbe sold, placement fee, commission, and pricing requirements. Forexample, at a store that sells new lawnmowers, a lock provider may onlyallow used lawnmowers selling at over $100, $1 placement fee, with acommission of 20% while a convenience store may allow lawnmowers with nominimum price and no commission, and provide a placement incentive togenerate visitors to their store. This will allow the location or lockprovider to control the mix of products and their desired customer baseto achieve the maximum overall value based on the operations of thespecific location.

The locking and unlocking means can interact with a website, addingconvenience to a transaction. For example, the consumer may search andfind a listing on a website before locating the item and the locking andunlocking means. Alternatively, a consumer may interact with the itemand locking and unlocking means before seeking information about theitem on the website. In either instance, the unlocking code can beprovided via the website or an alternate remote computer.

Codes for the locking and unlocking means can be one time or multipleuse. If a code is multiple use it may have a cancellation code that endsthe validity of the multiple use code.

The locking and unlocking means may have one or more master codes whichare always valid. However, the validity of the one or more master codesmay have cancellation codes that end their validity.

The codes may be generated to be valid only during a fixed time frame atwhich they will become invalid.

It is often useful to know when an item has been secured or re-secure inthe locking and unlocking means. A means of remotely generating are-locking code related to said unlocking code is provided, which may berelated to a specific serial number, time, and/or unlocking code. Saidrelocking code being provided by said locking and unlocking means afterthe defined duration of validity has ended. The relocking code may alsobe provided if no unlocking code is provided, such that the item can besecured in the locking and unlocking means when it is in an unlockedstate. Said relocking code may be provided via a visible display orwireless communications. The restraint of the locking and unlockingmeans may be visible, such that one can visibly see that an item issecured. When said restraint and visible display are simultaneouslyperceivable via a single vantage point, a digital photograph may betaken with a mobile device which provides a confirmation that an itemhas been secured or re-secured. The digital photograph can be sent toanother party and may be embedded with time, location, and personalidentification information, which are contained in the mobile device.This methodology allows items to be secured or re-secured at anylocation, providing flexibility in locations. This can allow for itemsto be secured or re-secured in the most convenient locations, which maybe a desirable location for any party involved in an item exchange. Thismay include re-securing the item at a point of display for sale or rent.This will save time and labor for parties, and reduce storage andtransportation costs.

Access to a point of entry secured by the locking and unlocking meansmay often be bi-directional. For example, a door may be used to access afacility having an inside and an outside. The point of entry, often adoor, is accessible from the inside and the outside. When relinquishingaccess to the facility at the end of a purchased time of access, thecancellation code and relocking code may be entered from the outside,preventing access from both the inside and the outside. The digitalphotograph showing the unlocking code and the point of entry will thenprovide confidence that no parties have chosen to remain on the insideof the facility after the end of the purchased time of access.

The locking and unlocking means may have services that are provided on asubscription. As such a deactivation code may be entered into thelocking and unlocking means to deactivate its functionality. Inaddition, a visible deactivation confirmation code may be displayed inresponse to the entry of the deactivation code.

In some cases, it may be desirable to conceal the item after visualconfirmation that the item has been secured. This may be particularlyuseful with items of great value or those subject to theft. Examplesinclude but are not limited to cash payments, jewelry, precious metals,pharmaceuticals, and electronic devices. An enclosure for performingthis function may include a main housing, a significantly transparentcover, a first latch having an open position and a closed position andconfigured to receive a locking and unlocking means to securely containan item when in a closed position, a significantly opaque cover, asecond latch configured to secure said significantly opaque cover in aclosed position. The second latch is configured to be inaccessible whenboth the significantly transparent cover and the significantly opaquecover are simultaneously in their said closed positions. This enclosuremay be a standalone device or may be integrated into the locking andunlocking means.

The locking and unlocking means has a first means of selectivelyattaching said locking and unlocking means via said prime mover,however, it may be desirable to selectively attach the locking andunlocking means via an alternate means of attachment, such that thelocking and unlocking means is attached to the item or location evenwhen the first means of selectively attaching said locking and unlockingmeans is unattached. Examples include attaching to a fixed feature atspecific location or a specific item.

Payment or other compensation may be made by any suitable means. Thismay include, but is not limited to cash, trade, electronic payment,internet based payment, utility bill, reward points, credits, bitcoin,cryptocurrency, etc. Payment made separately from the item maypreventing crime, thus it may be advantageous to receive physicalpayment in one locking and unlocking means at a first location andsimultaneously receive an item in a second locking and unlocking meansat a second location. By providing the unlocking and relocking codesthat are dependent on substantially the same time, this can be achieved.

In some cases, the secured item with visual confirmation, may prompt apayment for purchase rental or loan. This creates a virtual pawn shop.The item is secured at the first location by a loan seeker with visualconfirmation sent to a pawn broker. The pawn broker provides a loan. Ifloan is not repaid after a certain time, the item can be removed fromthe locking and unlocking means or listed for resale at the firstlocation. If the loan is repaid, the unlocking code is provided to theloan seeker. This use case is not limited to loans, as it may be easilyadapted for a purchase for resale transaction.

If this device is used to vend items it offers several unique advantagesover coin operated vending. When used for vending, no secure credit cardprocessing is used at the vending level and no currency is stored.Because there is substantially little value to stolen vended items vscurrency or credit card access codes stored in the device, the devicecan be less secure and much lower cost than previous vending devices.This lends itself to construction without the use of expensive materialsor components. Use of plastic enclosures vs. metal enclosures is oneexample. In addition, as no wireless connectivity is required foroff-line operation, lower costs can be achieved vs wirelessly connecteddevices.

Many businesses may utilize electronic safes for securely storing items.For example, a hotel may maintain electronic safes within hotel roomsfor use by guests of the hotel. An electronic safe may utilize a staticunlocking code (e.g., the hotel may maintain a single master staticunlocking code as a recovery code for a particular electronic safe orfor all of the electronic safes in the event a guest forgets anunlocking code for an electronic safe). Unfortunately, maintaining andutilizing static unlocking codes is problematic as the static unlockingcodes are often lost or forgotten. A static unlocking code is usuallyknown by the business/location or the manufacture of the electronicsafe. When a static unlocking code is used as a recovery code, therecovery code is at risk of being used by unscrupulous employees such asfor theft. These problems with static unlocking code are furthercomplicated when the static unlocking codes are never changed from thefactory default code during installation. Anyone who obtains orpurchases a similar electronic safe would easily have access to allelectronic safes of the same model because all of the electronic safesof that model may have the same factory default code as the recoverycode.

Accordingly, in order to overcome these problems with electronic safesusing static unlocking codes such as recovery codes, it is desirable toutilize a safe with an internal real time clock such that a recoverycode can be generated/issued based upon a unique serial number of thesafe and/or is valid for a certain timespan. This generated recoverycode could be used for accessing the safe, reconfiguring the safe suchas to set the internal real time clock, and/or establishing a new staticunlocking code.

There are often groups of lockers or safes that would benefit fromeasier manufacturing, installations, and/or management. For example,groups of electronic lockers, groups of electronic safe access doors,groups of safety deposit boxes, and/or other locking containmentcomponents currently require either wireless access (e.g., WiFi,Bluetooth, cellular, etc.), or a system of wires and actuators to managethem. This communication requirement results in significant costs ofboth manufacturing and maintenance. It would be desirable to remotelyissue an unlocking code valid for a certain timespan. The unlocking codemay be based upon a unique identifier of a lock (e.g., a containmentcomponent, an electronic safe, a safety deposit box, an electroniclocker, etc.) using from a remote interface that is remote to the lock.The remote interface may be implemented as a local interface (e.g., akiosk) or could be cloud based where the remote interface is hostedthrough a cloud service provider with network communication to thelocking containment component. In this way, all of the individual lockson groups of locks can be controlled on an individual basis withoutrequirement a wireless interface or writing from a kiosk.

Also, it is desirable to delay access to certain locks (e.g., locks ofcontainment components such as electronic safes, safety deposit boxes,electronic locks, etc.). For example, delaying access to a plurality ofcontainment components (e.g., 500 safety deposit box drawers) ensuresthat the containment components cannot be quickly accessed in quicksuccession such as in the case of a robbery. Thus, a time delay can beadded for issuing real time unlocking codes for successive locks thatare proximate to one another (e.g., within a same building or location).This is particularly desirable for safes in pawn shops or jewelry storesto limit loss during a robbery when there are many small, valuable itemsthat can be separately and individually locked up.

In some embodiments, a method is provided. The method includesreceiving, by a remote interface, a request from a requestor for anunlocking code used to unlock a lock for a containment component. Themethod further includes generating, by the remote interface, theunlocking code valid for a timespan. The method further includestransmitting, by the remote interface, the unlocking code to therequestor for unlocking the lock.

In some embodiments, the lock is integrated into the containmentcomponent.

In some embodiments, the lock is separate from the containment componentand has secondary means of attachment to attach the lock to thecontainment component.

In some embodiments, the lock is an offline lock without communicationcapabilities of communicating with the remote interface.

In some embodiments, the method includes generating the unlocking codebased upon a unique identifier of the lock.

In some embodiments, the request comprises the unique identifier.

In some embodiments, the remote interface is hosted by a cloud serviceprovider accessible to the requestor over a communication network.

In some embodiments, the method includes waiting a time delay betweenreceiving the request and generating the unlocking code.

In some embodiments, the method includes transmitting the unlocking codeas a time based recovery code via the remote interface.

In some embodiments, the method includes configuring the remoteinterface to generate time delayed unlocking codes for a plurality oflocks for containment components at single location.

In some embodiments, the method includes configuring the remoteinterface to generate time delayed unlocking codes for a plurality oflocks for containment components connected together.

In some embodiments, the lock is a padlock and the containment componentis a locker locked by the padlock.

In some embodiments, a method is provided. The method includes providinga listing interface configured to be populated with informationregarding a lock. The method further includes receiving, through thelisting interface, a request from a requestor for an unlocking code forthe lock. The method further includes generating the unlocking codevalid for a timespan. The method further includes displaying, by thelisting interface, the unlocking code to the requestor for unlocking thelock.

In some embodiments, the method includes waiting a time delay betweenreceiving the request and generating the unlocking code.

In some embodiments, the method includes waiting a time delay betweenreceiving the request and transmitting the unlocking code.

In some embodiments, a method is provided. The method includesreceiving, by a remote interface, a request from a requestor for anunlocking code used to unlock a lock. The method further includesgenerating, by the remote interface, the unlocking code based upon aunique identifier of the lock. The method further includes transmitting,by the remote interface, the unlocking code to the requestor forunlocking the lock.

In some embodiments, the method includes waiting a time delay betweenreceiving the request and transmitting the unlocking code.

In some embodiments, the request is received through a user interface ofa kiosk.

In some embodiments, the remote interface is hosted by a cloud serviceprovider.

FIG. 1 illustrates a method 100 for facilitating exchange of an item. At102, a request may be received from a requestor for access to an item(e.g., a lawn mower) secured within a containment component (e.g., aphysical structure to which the lawn mower can be secured by a lock) bya locking component. At 103, payment by the requestor for accessing theitem may be verified. At 104, an unlocking code is generated. Theunlocking code is valid within a time range (e.g., a user may use theunlocking code within the next 3 hours to gain access to the lawnmower). The unlocking code may be valid for a single use or a pluralityof uses. At 106, the unlocking code may be provided to a requestor(e.g., through a display of the containment component, text message,email, audible notification, etc.). In some embodiments, a containmentcomponent may comprise a locking structure, such as a mobile lockingstructure (e.g., a cable bicycle lock), such that the containmentcomponent is mobile as opposed to a fixed structure such as a box. Insome embodiments, a containment component may comprise a lockingstructure, and the containment component is mobile and thus can movewith an item. In some embodiments, a containment component may comprisea fixed structure. In some embodiments, the containment component maycomprise a padlock, a cable lock, a locker, a compartment, a fixedstructure such as a box, etc. At 107, a location of the item is providedto the requestor.

At 108, user input of a code may be received through a code entrycomponent (e.g., the display, a keypad, a code scanner, a wirelesstransmission means, etc.) associated with the containment component. At110, the locking component is modified into an unlocked state forproviding the requestor with access to the item in response to the codebeing validated (e.g., by a code validation component) as correspondingto the unlocking code and being used within the time range. For example,the containment component and/or the locking component may comprise acode validation component that can validate codes based upon anunlocking code configured for the code validation component.

In an example, a temperature measurement may be obtained using atemperature sensor associated with the containment component. A clock,used to determine a current time for validating codes against timeranges, may be adjusted based upon the temperatures measurement.

In an example, a return request, to return the item to a returncontainment component (e.g., the containment component at an originallocation from which the item was retrieved; a different containmentcomponent located at a different location; the containment componentcurrently located at a new position that is different than a position ofthe containment component when the user retrieved the item such as wherethe containment component is mobile), may be received. A relocking codemay be generated as corresponding to the unlocking code. The relockingcode may be provided to the requestor (e.g., displayed through a displayassociated with the return containment component). A second user inputof a second code may be received such as through the code entrycomponent. The locking component may be modified into a locked state forlocking the item into the return containment component based upon thesecond code being validated as corresponding to the relocking code.

In an example, imagery from a device of the requestor may be received(e.g., a photo captured by a mobile device of the user). The imagery maybe evaluated to validate whether the requestor has returned the iteminto a returned containment component in a locked state in an acceptablecondition (e.g., human evaluation, image recognition evaluation, etc.).The imagery may be tagged with geolocation and time from a device suchas the mobile device.

In an example, a translucent over is used to display the item within avisible state through the containment component to users. An opaquecover is utilized to hide the item (e.g., or payment such as money)within a hidden state through the containment component from users.

In an example, a determination may be made that a consignment agreementexists between a first entity and a second entity. The first entity maybe offering the item and the second entity may own a location at whichthe containment component is located. Responsive to payment beingsubmitted by the requestor for accessing the item, a first portion ofthe payment may be provided to the first entity and a second portion ofthe payment may be provided to the second entity.

In an example, an instruction to lock the containment component forrestricting access to the item for a time duration may be received andimplemented.

In an example, a delayed pickup request for the item at a delayed pickuptime may be received. Responsive to the item not being retrieved fromthe containment component before expiration of the delayed pickup time,the requestor may be charged a penalty.

In an example, the containment component may be used as a dispenser fora plurality of items that are dispensed based upon valid code entry.

In an example, the code entry component may be configured as an add-oncomponent for integration into a machine, such as a coin-op machine,such that validation of codes trigger operation of the coin-op machine.

In an example, a second user input of a second code may be received. Theitem (e.g., a product) may be deactivated in response to the second codebeing validated as corresponding to a deactivation code.

In an example, a third user input of a third code may be received.Access to a clock, the ability to delete or replace a master code, theability to block an issued code, or the ability to change a serialnumber may be provided based upon the third code being validated ascorresponding to a maintenance code.

In an example, the item may correspond to medication. Access may berestricted to the medication according to a planned interval of accessand verification of proper consumption.

In an example, an alarm component may be provided to generate an alertbased upon unauthorized attempts to access the item.

In an example, a fourth user input of a fourth code is received. Accessto a sample of the item is provided in response to the fourth code beingvalidated as corresponding to a sample access code.

In an example, a master code, having an indefinite validity timespan, ismaintained.

In one embodiment of facilitating exchange of an item, a website isconfigured by an administrator for a product to be sold with aconfidential serial number. A vendor is given access to modify portionsof the product description, picture, price, etc. However, the serialnumber may be kept private and not shared with the vendor. The vendorcan include a public location or a location that is to be kept privatein which case a very genera location is given such as a city, zip code,visual radius on a map, etc. The vendor can determine if an unlockingcode will be single or multiple use.

A buyer can view items online and request to inspect, purchase ahold/reservation, or purchase the item outright. The buy can select aduration of time to inspect, hold, or pickup, or a fixed time can be setby an administrator or vendor. A payment is made (e.g., for inspectionor to hold the item then the payment is a deposit that could be refundedlater). The payment is confirmed. A private location of the item isdisclosed to the buyer.

When a purchase is made, a current time (UTC) is used by a server inconjunction with the serial number and duration to generate an encryptedunlocking code. The unlocked code is used to generate a visual relockingcode. The visual relocking code may not be generated if the buyer ismerely holding or inspecting the item. The unlocking code is sent to thebuyer (not the seller or vendor). The visual relocking code is sent onlyto the vendor. A sold product will be listed as out of stock untilrelisted/edited by the vendor. A hold product will be shown with a holdtime. New potential buyers can “get in line” and may be charged a feefor such.

When the unlocking code is entered, a current UTC time, serial number,and duration are used to validate the unlocking code. If validated, thena lock is unlocked to grant the buyer access to the item. If valid andunlocked and expired (single use is automatically expired, multiple usewill expire at duration or enter a code to expire the code) the lockwill calculate the visual relocking code and display it on the LEDs for20 seconds after the lock is locked. It will turn on visual relockingcode anytime a button is depressed and leave on for 10 seconds.

In some instances, when a product is on display online, etc., it may beadvantageous for the end user to keep the exact location private. Inthis case, the public listing may only provide a general location, suchas city, postal code, or vague depiction of the item location. Uponrequesting a location, paying the requisite fee, or alternately placinga hold or purchasing the item, the exact location will be automaticallyor manually divulged. This reduces theft and increases safety.

After a lock is used by the general public, for example at a safe pickuplocation at a police station or business, a second seller will need toaccess the website to provide a code. The visual relocking code will beentered as the new password. For example, Red, Green, Off, etc. Thiswill allow the code to be known at the physical location to anyone whoseeks to use the lock. The website, having generated the relocking codefor the last sale, will automatically change the password to therelocking code after the sale is completed.

FIG. 2 illustrates an example system 200 of circuitry used by anapparatus for facilitating exchange of an item. The system 200 maycomprise a keypad 202 for receiving an unlocking or relocking code. Thesystem 200 may comprise an indicator 204 (e.g., an LED, a light thatblinks, or other status indicator). The system may comprise a powersupply 210. The system 200 may comprise a motor controller 208 havingforward and/or reverse drive for locking or unlocking a lock. The system200 may comprise a microcontroller 206 for validating codes orperforming other operation. The system may further comprise wirelessconnectivity 212, such as WiFi, Bluetooth, ANT, cellular, etc.

FIG. 3 illustrates an example system 300 of an apparatus forfacilitating exchange of an item 312. The apparatus comprises a house302 within which an item 312 can be stored. A first cover 308 is atleast partially translucent and may be configured to either be in alocked state or an unlocked state by a lock attached securing the house302 to the first cover 308 at attachment points 316 and 314. A secondcover 304 having an opaque portion may be configured to either be in thelocked state by moving the second cover 304 into proximity of firstcover 308 such that the latch protrusions 306 extend through theopenings 310. The second cover 304 can then be moved to an unlockedstate only when the first cover is in an unlocked state allowing accessto the latch protrusions 306 that are extending through the openings310.

FIG. 4 illustrates an example system 400 of an apparatus forfacilitating exchange of an item 406. The apparatus comprises acontainment component 402 configured to store the item 406 for selectiveretrieval. The apparatus comprises a locking component 404 configured toselectively lock or unlock the containment component 402 for restrictingor providing access to the item 406. The apparatus comprises a codegeneration component 408 configured to receive a request, from arequestor, for access to the item 406 secured within the containmentcomponent 402 by the locking component 404. The code generationcomponent 408 is configured to generate an unlocking code that is validwithin a time range and is valid for either a single use or a pluralityof uses. In an example, the unlocking codes and relocking codes aregenerated in the cloud or app, but the apparatus must receive them todecrypt them to determine validity. The relocking/confirmation typecodes would be generated by the apparatus to be displayed on thedisplay.

The apparatus comprises a code entry component 410 configured to receivea user input of a code. The code entry component 410 is configured tomodify the locking component 404 into an unlocked state for providingaccess to the requestor to the item 406 in response to the code beingvalidated as corresponding to the unlocking code and being used withinthe time range.

The apparatus comprises a display 412 through which various informationmay be provided, such as a cost to access the item 406, terms ofaccessing the item, how to provide visual proof of returning the item, astate of the locking component, the unlocking code, a re-locking code, ahold time for which the locking component 404 will not be unlocked, etc.

FIGS. 5A and 5B illustrate examples of a system 500 of an apparatus forfacilitating exchange of an item 506. For example, a user 504 may submita code that is validated to provide the user 504 with access to retrievethe item 506 from a first containment component 502 at a first location(e.g., near a downtown coffee shop), as illustrated in FIG. 5A. The user504 may travel with the item 506 to a second location (e.g., near ahotel) at which a second containment component 520 is located, asillustrated in FIG. 5B. Accordingly, the user 504 may use a re-lockingcode for returning the item 506 into the second containment component520 in a locked state. The user 504 may capture a photo of the item 506being locked in the locked state within the second containment component520, which may be sent to a remote computing device for validating aproper return of the item 506. In this way, another user may retrievethe item 506 from the second containment component 520. In an example,the first containment component may travel with the item to a secondlocation, and the first containment component is used to secure the itemat the second location.

In one embodiment of facilitating the exchange of an item, a request, toobtain a loan secured by an item, may be received from a requestor ofthe loan. A locking code may be sent to the requestor for locking theitem within a containment component. Imagery may be received from adevice of the requestor, a mobile device, a camera, or from a cameraassociated with the containment component. The imagery may be evaluatedto validate whether the requestor has secured the item into thecontainment component in a locked state in an acceptable condition.Responsive to validating the imagery, a transaction between therequestor and a loaner (e.g., a loan company) for the requestor toobtain the loan secured by the item may be facilitated. If adetermination is made that the loan has not been repaid by the requestoraccording to a repayment term of the loan, the item may be offered forsale through the containment component.

In one example of an apparatus for facilitating exchange of an item,unlocking codes are time based and lock specific. A serial number isconfidential to a user. Codes, such as unlock codes, are generated towork at a specific time. A code may be embedded with a start time, avalidity duration, and/or a type (single/multiple use). A user canestablish a unique name to publically identify a lock. A clock of theapparatus can be temperature compensated for keeping an accurate time.

In one example of an apparatus for facilitating exchange of an item,unlock codes are generated by the apparatus, which is easy to maintain,needs little to no setup, works even though there may be no wirelessservice, and there are not transmission between the apparatus andanother component that can be captured.

In one example of an apparatus for facilitating exchange of an item,codes can be requested and sent using any type of technology, and thusthe apparatus may be relatively future proof.

In one example of an apparatus for facilitating exchange of an item,photo confirmation of return of the item may be facilitated. Forexample, the apparatus may comprise a display (e.g., an LED display)showing a state of the lock (e.g., a return code). A camera/smart devicecan simultaneously show a condition of the item, the lock securing theitem, etc. Location, time, and user information may be embedded intoimagery from the device that is then verified such as by a human or byimage recognition functionality.

In one example of an apparatus for facilitating exchange of an item,photo confirmation of a secured physical payment, and subsequentconcealment of the payment is facilitated by the apparatus.

In one example of an apparatus for facilitating exchange of an item, theapparatus provides for the ability to enclose and lock money or otheritems under a translucent cover and then cover such with a second opaquecover that cannot be opened until the translucent cover isunlocked/opened.

In one example of an apparatus for facilitating exchange of an item, theability to pawn and/or resell the item is provided. For example, theitem is secured within the apparatus, a photo confirmation is sent, andpayment is received such as to acquire a loan secured by the item. Ifthe loan is not repaid within a certain amount of time, then the itemcan be offered for sale through the apparatus. In an example, the itemcan be at a display location the entire time of the loan period.

In one example of an apparatus for facilitating exchange of an item, theapparatus may be used to facilitate consignment of the item. Forexample, the apparatus is used to display the item at a location. If theitem is sold, then the location gets a cut. If the item is not sold,then the apparatus can be removed. In an example, a time of the itembeing on display can be used to calculate a charge amount to the entityoffering the item for sale. This leads to the addition of consignment atlocations that historically sell only new items. The location controlspricing, types of products, fees, commission, duration of display, etc.(e.g., buying a used lawnmower at a hardware store).

In one example of an apparatus for facilitating exchange of an item, theapparatus can be used for providing holds on items. The seller/lockowner relinquishes control of unlocking codes, such that a third partycan prevent the seller or another buyer from accessing the item for acertain amount of time. Holds can be paid for based on the time of thehold. Potential buyers do not have to worry about an item being sold outfrom under them before they can inspect it or pick it up.

In one example of an apparatus for facilitating exchange of an item, theapparatus can provide for late pick-up, such as buy now and pick up at alater date. If the item is not picked up by a certain time, the chargepenalties can be applied.

In one example of an apparatus for facilitating exchange of an item,third party delivery can be provided. Third parties can be engaged topick up an item from a lock and deliver it to a buyer, potentiallylocking it up for the buyer at an alternate location. A user could ordera taxi, Uber, Lyft, etc. and issue the code to the driver and get theitem delivered.

In one example of an apparatus for facilitating exchange of an item, theapparatus advantageous provides a means for exchanging items that areotherwise too large to profitably ship. For example, a used bicycle,lawnmower, or firewood cannot be shipped profitably, but displaying forpickup can now be practical.

In one example of an apparatus for facilitating exchange of an item, theapparatus can be used for providing vending of items. For example, anunlocking code can be used to dispense/deliver a product. This can beadvantageous for situations where there is no coin/cash system becauseit does not require connectivity or a payment system. Thus, there are nofunds or payment gateway to protect, just the products in the vendingmachine, which are often very low value (e.g., a gumball machine orsanitary napkin machine).

In one example of an apparatus for facilitating exchange of an item, theapparatus can be used for retrofitting a machine, such as a coin-op. Forexample, a module could replace a coin slot and knob (turn crank/pull).A code could be entered instead of the coin, the use of a manual (turncrank/pull), or automatic enabled machine. For example, this could beused for video games, gumball machines, vending machines, etc.

In one example of an apparatus for facilitating exchange of an item, theapparatus is used to increase foot traffic and/or advertising. When anitem is picked up, it creates a unique destination. That destination iscontrolled by the seller, so it can benefit from whatever business thatwants to add foot traffic, such as a convenience store/drug store.Sellers and buyers can select locations on a map to pick up or displayitems (e.g., an interactive map interface may be displayed through acomputing device, such as where a user can place a pin to mark a pickupor return location; the interactive map interface may be populated withlocations of available apparatuses and items; etc.).

In one example of an apparatus for facilitating exchange of an item, theapparatus can utilize a network or a cloud for payment and generationsupply of codes. For example, a database is created in seller's accountwith lock, cost, and receivable account information. A payment is sentfrom a seller electronically, the payment is confirmed automatically, acode is generated, and the code is sent to the buyer that then entersthe code in the lock. This could be done by text. A user sends a textwith lock information, a payment request link is returned, and theseller then clicks link to pay. After payment is confirmed, the code isgenerated and texted to the buyer, who enters it into the lock. In anexample, fees can be charged for transaction, which may be asubscription/service plan.

In one example of an apparatus for facilitating exchange of an item,items can be returned anywhere. For example, if a lock is attached to arented item, then the rented item can be re-secured to any fixed object,across town, even at renter's location. Thus, the rented item can bepicked up by the owner or re-rented at the return location. If re-rentedat the return location, the first renter would still be responsibleuntil the rented item is re-rented to the second renter. This createsrental businesses without the requirement for storage, re-inspection,etc.

In one example of an apparatus for facilitating exchange of an item, areal time map could display available items for rent.

In one example of an apparatus for facilitating exchange of an item,deactivation of a product can be provided as a service. For example, adeactivation code can be generated to be entered into a lock todecommission the produce. A visible confirmation code can be displayed.

In one example of an apparatus for facilitating exchange of an item,maintenance functions may be provided for the apparatus. For example,code entry can set the real time clock, delete master codes,cancel/block issued codes, change a serial number, etc.

In one example of an apparatus for facilitating exchange of an item,connectivity is provided for the apparatus, such as global positionsystem (GPS), cellular, wifi, etc.

In one example of an apparatus for facilitating exchange of an item, theapparatus can be used to convert expense items to profit centers. Forexample, low cost vending items can replace complimentary items. In arestroom, a low cost vendor could provide toilet seat covers. At arestaurant, extra napkins could be charged for.

In one example of an apparatus for facilitating exchange of an item, theapparatus provides for little to no haggle. For example, if the buyerand seller are remote, then there could be no means to negotiate theprice.

In one example of an apparatus for facilitating exchange of an item, theapparatus provides for sampling and market research. For example,samples may be given on site in exchange for a survey. Contactinformation may be taken, a code can be given, and a survey can beprovided as a follow-up. This can replace a live person, manualcollection, and/or shipping/handling.

In one example of an apparatus for facilitating exchange of an item, theapparatus can be used to sell extra items, such as through front ofhouse vending. For example, a mustard company may want to put mustardproduct in a restaurant location that prefers not to stock the mustardproduct in a condiment bar. Thus, a customer can pay extra for access tothe mustard product. The mustard company can restock the mustardproduct. A portion of the charge could be provided to the restaurant.

In one example of an apparatus for facilitating exchange of an item, theapparatus can be employed for medication management, such as homemedication management. For example, time based codes only allow accessat planned intervals, only if the medication is properly taken, and auser provides valid verification codes. In this way, the apparatus canact similar to a mini pill dispenser. This could prevent overdose, canconfirm compliance for insurance/employer purposes (insurance couldrefuse to pay if the user does not follow a required regimen), etc.

In one example of an apparatus for facilitating exchange of an item, amaster unlocking code is generated that does not expire. The masterunlocking code may be kept secret. In an example, the master unlockingcode may be sold for a sell.

In one example of an apparatus for facilitating exchange of an item, analarm may be provided for the apparatus. The alarm can sound due toimproper opening (detected by sensor) or from improper motion, too manywrong codes, etc.

In one example of an apparatus for facilitating exchange of an item, alock can have an identifier other than a name. In an example, a bar orQR code, RFID tag/nfc, Bluetooth beacon, phone number/shorcode, webaddress etc. can be used to facilitate transactions.

In one embodiment, a locking system comprises a locking and unlockingmeans comprising a code entry means, a code processing means, a powersource, and a prime mover configured to move between a locked andunlocked state. The locking system comprises a means of remotelygenerating an unlocking code unique to said locking and unlocking meansthat has a predefined duration of validity. The locking system comprisesa means of remotely generating a re-locking code related to theunlocking code. The relocking code may be provided by the locking andunlocking means after the predefined duration of validity has ended.

In one embodiment, the relocking code is provided via a visible display.

In one embodiment, the relocking code is provided via wirelesscommunications.

In one embodiment, the relocking code is provided only after saidlocking and unlocking means has been unlocked using the unlocking codeand relocked.

In one embodiment, the locking system comprises a visible retentionmeans. The visible retention means and the visible display aresimultaneously perceivable via a single vantage point, such as by auser.

In one embodiment, the predefined duration of validity is determined byat least one of a number of uses, a fixed time duration, and/or a fixedtime interval.

In one embodiment, the predefined duration of validity is determined bya cancellation request.

In one embodiment, an apparatus comprises an enclosure. The enclosurecomprises a main housing, a significantly transparent cover, a firstlatch having an open position and a closed position. The first latch isconfigured to receive a locking and unlocking means to securely containan item when in a closed position. The enclosure comprises asignificantly opaque cover, a second latch configured to secure thesignificantly opaque cover in a closed position. The second latch isconfigured to be inaccessible when both the significantly transparentcover and the significantly opaque cover are simultaneously in closedpositions.

In one embodiment, a locking system comprises a locking and unlockingmeans comprising a code entry means, a code processing means, a powersource, and a prime mover configured to move between a locked andunlocked state.

In one embodiment, the locking system comprises a first means ofselectively attaching the locking and unlocking means via the primemover.

In one embodiment, the locking system comprises a second means ofselectively attaching the locking and unlocking means via an alternatemeans of attachment.

In one embodiment, a lock is provided without a lock user (e.g., aperson selling, renting, or otherwise offering the item) being able tounlock the lock.

In one embodiment, a master code is provided that does not expire. Asale of the master code may be facilitated between a first entity and asecond entity.

In one embodiment, a sale of a service plan for accessing the item maybe facilitated.

In one embodiment, deactivation of the item may be provided withconfirmation.

In one embodiment, the first means of selectively attaching the lockingand unlocking means is attached to a considerably fixed object and thesecond means of selectively attaching the locking and unlocking means isattached to a considerably mobile object.

In one embodiment, the second means of selectively attaching the lockingand unlocking means is attached to a considerably fixed object and thefirst means of selectively attaching said locking and unlocking means isattached to a considerably mobile object.

In one embodiment, the considerably mobile object is a mechanism forperforming a useful function.

In one embodiment, the locking system is configured to interface with aprovider at a provider location, a first consumer at a first consumerlocation, and/or a second consumer at a second consumer location. Thefirst consumer may be borrowing a mobile object via a first operation ofthe prime mover at the provider location. Subsequently, the secondconsumer may be borrowing the mobile object via a second operation ofthe prime mover at the first consumer location. In one example, theremay be a plurality of consumers with which the locking system interfaceswith, such as a third consumer.

FIG. 6 is an illustration of a scenario 600 involving an examplenon-transitory machine readable medium 602. The non-transitory machinereadable medium 602 may comprise processor-executable instructions 612that when executed by a processor 616 cause performance (e.g., by theprocessor 616) of at least some of the provisions herein. Thenon-transitory machine readable medium 602 may comprise a memorysemiconductor (e.g., a semiconductor utilizing static random accessmemory (SRAM), dynamic random access memory (DRAM), and/or synchronousdynamic random access memory (SDRAM) technologies), a platter of a harddisk drive, a flash memory device, or a magnetic or optical disc (suchas a compact disk (CD), a digital versatile disk (DVD), or floppy disk).The example non-transitory machine readable medium 602 storescomputer-readable data 604 that, when subjected to reading 606 by adevice 608 (e.g., a read head of a hard disk drive, or a read operationinvoked on a solid-state storage device), express theprocessor-executable instructions 612. In some embodiments, theprocessor-executable instructions 612, when executed cause performanceof operations, such as at least some of the example method 100 of FIG. 1, for example. In some embodiments, the processor-executableinstructions 612 are configured to cause implementation of a system,such as at least some of the example system 400 of FIG. 4 , for example.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing at least some of the claims.

As used in this application, the terms “component,” “module,” “system”,“interface”, and/or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. Of course, manymodifications may be made to this configuration without departing fromthe scope or spirit of the claimed subject matter.

FIG. 7 and the following discussion provide a brief, general descriptionof a suitable computing environment to implement embodiments of one ormore of the provisions set forth herein. The operating environment ofFIG. 7 is only one example of a suitable operating environment and isnot intended to suggest any limitation as to the scope of use orfunctionality of the operating environment. Example computing devicesinclude, but are not limited to, personal computers, server computers,hand-held or laptop devices, mobile devices (such as mobile phones,Personal Digital Assistants (PDAs), media players, and the like),multiprocessor systems, consumer electronics, mini computers, mainframecomputers, distributed computing environments that include any of theabove systems or devices, and the like.

Although not required, embodiments are described in the general contextof “computer readable instructions” being executed by one or morecomputing devices. Computer readable instructions may be distributed viacomputer readable media (discussed below). Computer readableinstructions may be implemented as program modules, such as functions,objects, Application Programming Interfaces (APIs), data structures, andthe like, that perform particular tasks or implement particular abstractdata types. Typically, the functionality of the computer readableinstructions may be combined or distributed as desired in variousenvironments.

FIG. 7 illustrates an example of a system 700 comprising a computingdevice 712 configured to implement one or more embodiments providedherein. In one configuration, computing device 712 includes at least oneprocessor 716 and memory 718. Depending on the exact configuration andtype of computing device, memory 718 may be volatile (such as RAM, forexample), non-volatile (such as ROM, flash memory, etc., for example) orsome combination of the two. This configuration is illustrated in FIG. 7by dashed line 714.

In other embodiments, device 712 may include additional features and/orfunctionality. For example, device 712 may also include additionalstorage (e.g., removable and/or non-removable) including, but notlimited to, magnetic storage, optical storage, and the like. Suchadditional storage is illustrated in FIG. 7 by storage 720. In oneembodiment, computer readable instructions to implement one or moreembodiments provided herein may be in storage 720. Storage 720 may alsostore other computer readable instructions to implement an operatingsystem, an application program, and the like. Computer readableinstructions may be loaded in memory 718 for execution by processor 716,for example.

The term “computer readable media” as used herein includes computerstorage media. Computer storage media includes volatile and nonvolatile,removable and non-removable media implemented in any method ortechnology for storage of information such as computer readableinstructions or other data. Memory 718 and storage 720 are examples ofcomputer storage media. Computer storage media includes, but is notlimited to, RAM, ROM, EEPROM, flash memory or other memory technology,CD-ROM, Digital Versatile Disks (DVDs) or other optical storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other medium which can be used to storethe desired information and which can be accessed by device 712.Computer storage media does not, however, include propagated signals.Rather, computer storage media excludes propagated signals. Any suchcomputer storage media may be part of device 712.

Device 712 may also include communication connection 726 that allowsdevice 712 to communicate with other devices. Communication connection726 may include, but is not limited to, a modem, a Network InterfaceCard (NIC), an integrated network interface, a radio frequencytransmitter/receiver, an infrared port, a USB connection, or otherinterfaces for connecting computing device 712 to other computingdevices. Communication connection 726 may include a wired connection ora wireless connection. Communication connection 726 may transmit and/orreceive communication media.

The term “computer readable media” may include communication media.Communication media typically embodies computer readable instructions orother data in a “modulated data signal” such as a carrier wave or othertransport mechanism and includes any information delivery media. Theterm “modulated data signal” may include a signal that has one or moreof its characteristics set or changed in such a manner as to encodeinformation in the signal.

Device 712 may include input device 724 such as keyboard, mouse, pen,voice input device, touch input device, infrared cameras, video inputdevices, and/or any other input device. Output device 722 such as one ormore displays, speakers, printers, and/or any other output device mayalso be included in device 712. Input device 724 and output device 722may be connected to device 712 via a wired connection, wirelessconnection, or any combination thereof. In one embodiment, an inputdevice or an output device from another computing device may be used asinput device 724 or output device 722 for computing device 712.

Components of computing device 712 may be connected by variousinterconnects, such as a bus. Such interconnects may include aPeripheral Component Interconnect (PCI), such as PCI Express, aUniversal Serial Bus (USB), firewire (IEEE 1394), an optical busstructure, and the like. In another embodiment, components of computingdevice 712 may be interconnected by a network. For example, memory 718may be comprised of multiple physical memory units located in differentphysical locations interconnected by a network.

Those skilled in the art will realize that storage devices utilized tostore computer readable instructions may be distributed across anetwork. For example, a computing device 730 accessible via a network728 may store computer readable instructions to implement one or moreembodiments provided herein. Computing device 712 may access computingdevice 730 and download a part or all of the computer readableinstructions for execution. Alternatively, computing device 712 maydownload pieces of the computer readable instructions, as needed, orsome instructions may be executed at computing device 712 and some atcomputing device 730.

FIGS. 8A and 8B generally depicts a locking configuration 800. Thelocking configuration 800 may include a lock assembly 810, a primarymeans of attachment 820 which may be a flexible cable as shown or arigid member. The lock assembly 810 may optionally be secured to a fixedattachment point 840 via a secondary means of attachment 842 such thatthe lock assembly 810 remains secured to the fixed attachment point 840when the primary means of attachment 820 is unlocked by entering anunlocking code into keypad 830. An attachment point can be any fixed(e.g., the fixed attachment point 840) or mobile item that willrestrict, impede, indicate, or monitor the motion of the lock assembly810. The primary means of attachment 820 can be used to selectivelysecure a mobile item, such as a bicycle or tool, to a location while thesecondary means of attachment 842 selectively secures the lock assembly810 to the mobile item, or vice versa. A secondary lock assembly 844 ofthe secondary means of attachment 842 allows the lock assembly 810 to beselectively removed from attachment point 840 if it is desired to changethe location of transfer. It should be noted that the primary means ofattachment 820 and the secondary means of attachment 842 are operatedseparately via lock assembly 810 and the secondary lock assembly 844 ofthe secondary means of attachment 842. This allows users to selectivelycontrol access via the primary means of attachment 820 and the secondarymeans of attachment 842.

Secondary means of attachment 842 may be achieved wirelessly via IR,Bluetooth, RF, WIFI, magnetic detection, proximity sensor, etc. suchthat an indication occurs when the lock assembly is out of proximity ofthe fixed attachment point. The indication could be audible, visible,email, SMS, web based, etc. The indication may initiate other actionssuch as activating a camera, alerting police, etc. FIG. 23 illustratesan alternate locking configuration generally shown as 2300 employing abase station 2310 providing secondary means of attachment 842 tomultiple containment components 402. In the alternate lockingconfiguration 2300 it should be appreciated that the functions of thecontainment components 402 may be shared with the base station 2310. Forexample, the base station may have code entry 410 and display 412, whilemanaging several containment components 402 that have only lockingcomponents 404 via a secondary means of attachment 842.

Keypad 830 may include indicators 831, 832, 833. These may be lightemitting diodes of multiple colors such as red, green, blue, yellow,etc. The combination of the colors of indicators 831, 832, 833 mayindicate a specific state of the lock assembly 810. Alternately, adisplay 412, show in FIG. 4 capable of using symbols, pictures, oralphanumeric characters could be employed for indication as well asinstructions. One use of this may be to indicate that a specificunlocking code has been used and the lock assembly 810 has beenrelocked. The visible nature of indicators 831, 832, 833 allow for apicture depicting an item in its locked state, verifying that it hasbeen returned. This can initiate the release of a deposit or the postingof an item, location, or service as available for sale or rent.

The primary means of attachment 820 is fixed to the lock assembly 810 ata fixed end 838 and at a removable end 845 that may be selectivelyinserted into opening 837 where is it retained by a latch 835. Theprimary means of attachment 820 and removable end 845 may beelectrically conductive so as to complete a circuit inside the lockassembly 810 to verify the status of the primary means of attachment820.

A sound emitter 834 may be included as an indicator of button press,locking, unlocking, tampering, motion, theft or other status of lockassembly 810.

Unique identifier 847 may be configured to communicate with a mobiledevice such that the information is transferred wirelessly via QR code,NFC, Bluetooth, etc.

A label 846 is included to provide information on operation and steps toaccess the primary means of attachment 820. The label 846 includes aunique identifier 847 which provides specific information uniquelyidentifying the lock assembly 810 and its present contents such as aserial number, phone number, or hyperlink. The unique identifier 847 maybe static, dynamic or a hybrid of both. A static identifier may be afixed identifying a name or mark, whereas a dynamic identifier may beremotely changed on display 412 via wireless communication. A hybrididentifier would provide direction to dynamically managed information,such as a hyperlink or web address. For example, the unique identifier847 may be a weblink that has information about a bicycle and it may beremotely changed to information about a lawnmower at an alternate time.The label 846 also includes general instructions 848 which describe howthe item contained by the primary means of attachment 820 may beaccessed. The label 846 may be attached to any point or object in thelocking configuration 800, including objects at or related to thelocation.

Now referring to FIGS. 9 and 10 . The motor assembly 950 includes themotor 951, speed reducer 952, and cam assembly 955. Speed reduction canbe performed by gears, belts, or any other suitable means or combinationthereof. The cam assembly 955 includes an output shaft 956, whichprovides reduced speed output from speed reducer 952 and transmits thereduced speed output to the cam assembly 955 via interface ring 957. Themotor 951 is rotated in one or more directions such that a cam 958 ispositioned to block or allow movement of latch 835. When movement of thelatch 835 is allowed and the latch 835 is depressed by a user, theremovable end 845 may be removed from opening 837, thus providing accessto items contained by primary means of attachment 820. When movement ofthe latch 835 is restricted by the cam 958, access is restricted, as thelatch 835 securely retains removable end 845 in opening 837. The latch835 is returned to a non-depressed state by spring 962. When theremovable end 845 is positioned within opening 837, a contact 961 isdepressed, completing an electrical circuit from the contact 961 to thefixed end 838 via the primary means of attachment 820. Position detector960 is provided to detect the position of the cam 958. Position detector960 can be a switch, encoder, magnetic sensor, optical sensor or anyother suitable device capable of position sensing. Knowing the positionof the cam 958 and continuity status between contact 961 and the fixedend 838, the security status of the lock assembly 810 can be determinedby control circuit 970. The cam 958 is carried by interface ring 957which may be configured to allow the cam 958 to slip. This allows forlimited torque and force to be applied to any physical stop providedwithin the lock assembly 810 and as a result, limits current to themotor 951. As this lock assembly 810 may be used in wet environments, acircuit gasket 971 is provided to prevent the entry of water into theelectronics. A housing switch 972 is provided to detect improper accessto the system, triggering an alarm from sound emitter 834.

Now referring to FIG. 11 , rear housing 975 provides a holder for cells,such as three cells or any other number of cells. The three cells powerthe system via battery contacts 973 and are enclosed by battery cover976 and sealed by battery gasket 974. Rear housing 975 is retained byscrews 977. One or more of screws 977 may by of the security type, tofurther prevent tampering.

FIG. 12 provides a detailed method for selectively buying or holding anitem using a locking component. The method is generally shown as 1100. Auser views a listing of an item, at 1102, and decides at decision point1104 whether to buy the item outright or hold for inspection beforepurchase. If buy is selected, a pickup time is selected, at 1170, whichallows for the purchase to be picked up at a later time. Depending onthe time selected, the seller may charge a different fee. At 1172, thepurchase payment is processed for the appropriate amount. At 1154,detailed location information is provided. This will include a specificaddress if the listing of the item did not include this information. Itis often preferred that the location is obfuscated to allow potentialbuyers to know general distance of an item, yet prevent uninvitedshoppers at the exact location. At 1156, any other specific instructionsfor locating, operating, or obtaining the item is provided. This couldinclude where and how the item is attached and located, like on a porch,attached to the rear of a house, or inside a shed, etc. At step 102, arequest is received for access to item. At 104, an unlocking code isprovided to requestor. At 108, the buyer enters the code through thecode entry component. At 110, the locking component is modified to anunlocked state in response to a validated code. At this point, the buyercan remove the item from the locking component. At 1190, commissionswould be paid to any of the location provider, lock service, onlinelisting service, affiliates, or other appropriate parties. At 1192,proceeds are paid to the seller. Payments may be delayed by a thresholddelay time to account for returns and disputes, and to discourage fraud.

If hold is selected, at 1150, then a hold payment is processed at 1152.Location information of the item is provided, at 1154. Item specificinstructions are provided, at 1156. At 1158, the item is designated aswaiting made available. At 1160, the item may be inspected, such as bythe buyer. At 1162, a decision is made as to whether the item waspurchased within a hold time. If not, then the item is relisted forsale, at 1164, and a waiting list of availability is provided, at 1168.

FIG. 13 outlines a method 1200 of verifying return of an item that hasbeen resecured by locking component. When an unlocking code is issued tothe buyer, at 1202, a cancellation code can be issued to the buyer, at1204, if the code issued is a multi-use code. If the code is a one-timeuse code, there is no need to issue a cancellation code. At 1206, thevisual indication of return of the item is sent to the seller. Note thatthe buyer does not know what the visual indication of return will be.Steps 1202, 1204, and 1206 can occur substantially simultaneously. At1207, the unlocking code is entered into the lock assembly. At 1208, theitem is used/inspected. At 1210, the buyer enters the cancellation codeinto the lock assembly and, at 1212, relocks the item with the lockassembly. At 1214, the buyer activates the visual indication of thereturn on the lock assembly so it can be seen. At 1216, the buyer takesa photo showing the secured state of the item and the visual indicationof the return. The buyer then sends a geotagged and time stamped phototo the seller, at 1218. The visual indication of return and photo isverified, at 1220. At 1222, any deposit, credit card hold, or purchaseprice due to the buyer is returned or released. The item can then bereposted for sale or rent at the point of geotagging, at 1224.

FIG. 14 shows a method for using a locking component for remote pawn. At1410, a pawner secures the item in the locking component forpresentation for pawn. At 1412, a visual indication of locking is issuedto the pawnee. This can be performed after the last use of the lock inmany cases, as there is not a reason to wait until a new event occurs.At 1414, the pawner activates the visual indication of locking. At 1416,the buyer takes a photo showing the secured state of the item and thevisual indication of the return. The buyer then sends a geotagged andtime stamped photo to the seller, at 1418. At 1420, the photo and/oractual item are inspected by the pawnee. At 1422, the pawnee makes anoffer to the pawner. Note that this offer may be for a loan or forpurchase of the item. It should also be noted that a zero value offercan also be sent. At decision point 1424, the pawner decides to acceptor reject the offer. If the offer is not accepted, then an unlockingcode is issued to the pawner, at 1426, such that the item can be removedfrom the lock. If the offer is accepted a payment is made the pawner, at1428. At 1430, the loan is either repaid during the specified time ornot. In the case of a purchase, the specified time would be zero, sodecision point 1430 would be no. If the loan is not repaid on time, theitem is posted for sale or rent, at 1432. This posting can happen at thepoint of geotagging immediately, or the item can be relocated to a moreviable location based on the preference of the pawnee. If the loan istimely repaid, at 1430, then an unlocking code is issued to the pawnerat 1426.

FIG. 15 shows a method 1500 for removal of an abandoned or improperlyplaced item. At 1501, a seller registers with a lock service. Afterregistering, a payment is made for the service, at 1502. This may be aone-time payment or a recurring payment, and may include a deposit orfee schedule for abandoned or improperly placed items. At 1504, a uniqueidentifier is provided for the lock. At 1506, the seller registers withthe location at which the item will be locked. Upon registration withthe location, an optional, additional deposit or fee will be paid, at1508. This may include but is not limited to deposits, licenses, orcommissions to the location. At 1510, a third party inquires as to theabandonment status of an item. This may be to see how long the item hasbeen in the location, if it is authorized, etc. This will also allownon-visible items to be identified, which is important to verify thatthey are not hazardous, illegal, etc. If an initial determination ismade or cannot be made, the third party can proceed to contact customerservice, at 1512. At 1514, customer service will validate the locationalauthority of the third party. This can be manual or automatic and mayrequire credentials of the third party. The third party may showownership of the venue, or other authority, such as that of lawenforcement. If authority is verified, at 1514, customer service cansupply an unlocking code to the third party, at 1516. At 1518, removalthen occurs and can be by the inquiring third party or a removalservice. At 1520, the seller is penalized for the abandonment and/orimproper use. Penalties may include fine, loss of service fees,suspensions of account, or any viable means of deterring such behavior.

FIGS. 16A and 16B show a cloud based listing 1600 for an item associatedwith a locking assembly, wherein the cloud based listing 1600 isrendered on a display by a computing device. Listing 1600 includes titleof the item 1601, general purchase price 1602, an add to cart button1615, and photo 1620. An in stock status 1610 is also displayed and whenout of stock, may act as a link to a waitlist. FIG. 16A illustrates abuy now pickup later pull down box 1605 with pickup times and relatedfees. Alternately, FIG. 16B illustrates a get location and hold for pulldown box 1608.

FIG. 17 illustrates the cloud based listing 1600 on a browser generallyas 1700. The cloud based listing 1660 is assessable by inputting a URL1702 through the browser, where the URL 1702 acts as the uniqueidentifier.

FIG. 18 illustrates an example web marketplace listing 1800 of an itemassociated with a lock assembly. An address of the marketplace 1804 isrendered through the web marketplace listing 1800. The web marketplacelisting 1800 comprises a category 1708, an item header 1710, amarketplace price 1712, a marketplace image 1716, a description 1714,and a URL 1702 that is related to the unique identifier.

FIG. 19 illustrates a lock service website 1900, which includes auniquely formatted date/time 1902 used to facilitate clock setting andmaintenance of a lock assembly associated with an item.

FIG. 20 illustrates an administrative view of a lock service website2000. The administrative view can be used to set a serial number 2010for an item, fees for a buy duration 2012, fees for a hold duration2014, a hold time and price 2106, and can be used to specify whether anunlocking code can be used multiple times. Depending on the type ofaccount access, administrative access may be limited.

FIG. 21 illustrates an administrative view of a lock service website2100. In one embodiment, the administrative view displays, for eachorder, an order number 2102, a product id 2104, a product key 2106, aconfirm key 2108, status 2110, and an expiration time. The product key2106 is used as the unlocking code and the confirm key 2108 is used asto confirm relocking of the locking assembly. In this example, thecolors of LEDs are used for the confirm key.

In some embodiments, a method for facilitating a transactional exchangeis provided. The method comprises receiving a request, from a requestor,to hold an item secured within a containment component by a lockingcomponent for a hold duration. The method comprises selectivelyrestricting, by the locking component, access to the item until eitherthe hold duration has expired or the requestor has purchased the item.In an example, the method comprises restricting, by the lockingcomponent, a seller of the item from accessing the item for the holdduration. In an example, the method comprises restricting, by thelocking component, an alternate purchaser of the item from accessing theitem for the hold duration. In an example, the method comprisesmaintaining the locking component in a locked state until either thehold duration has expired or the requestor has purchased the item. In anexample, the method comprises charging a fee to the requestor forrestricting access to the item for the hold duration. In an example, themethod comprises selecting the hold duration from a set of values. In anexample, the set of values comprise a fee based value and a non-feebased value. In an example, the fee comprises a first portion paid to afirst entity and a second portion paid to a second entity. In anexample, the method comprises providing item specific instructions tothe requestor. In an example, the method comprises generating andproviding access to a waiting list for the item. In an example, themethod comprises transmitting a notification to entities within thewaiting list that the item is available based upon the hold durationexpiring.

In some embodiments, a method for facilitating a transactional exchangeis provided. The method comprises receiving a request for access to anitem secured within a containment component by a locking component. Themethod comprises generating an unlocking code that is valid within atime range and is valid for either a single use or a plurality of uses.The method comprises providing the unlocking code. The method comprisesreceiving input of a code through a code entry component associated withthe containment component. The method comprises modifying the lockingcomponent into an unlocked state for providing access to the item inresponse to the code being validated off-line as corresponding to theunlocking code and being used within the time range. In an example, thelock component comprises a primary means of attachment and a secondarymeans of attachment, the secondary means of attachment keeping thelocking component secured to a fixed attachment point when access isprovided to the item. In an example, the method comprises processing ahold request, received before the request for access is received, tohold the item for a hold duration. In an example, the method comprisesselectively restricting, by the locking component, access to the itemuntil either the hold duration has expired or the requestor haspurchased the item.

In some embodiments, a method for facilitating a transactional exchangeis provided. The method comprises receiving a request for access to anitem secured within a containment component by a locking component. Themethod comprises selecting a pick-up time. The method comprisesgenerating an unlocking code that is valid for either a single use or aplurality of uses. The method comprises providing the unlocking code.The method comprises receiving input of a code through a code entrycomponent associated with the containment component. The methodcomprises modifying the locking component into an unlocked state forproviding access to the item in response to the code being validated ascorresponding to the unlocking code. In an example, the method comprisesproviding item specific instructions relating to the item. In anexample, the method comprises providing location information relating toa location of the item. In an example, the method comprises providing anotification that the item is available. In an example, the locationinformation comprises a route populated within a map.

FIG. 22 illustrates a method 2200 of sellers and buyers transacting overa network. A seller 2201 may make a determination 2202 to acquire anapparatus (e.g., a locking component associated with a containmentcomponent within which an item can be secured by the locking componentfrom being accessed or removed) for facilitatingexchange/purchase/rental of items (e.g., a bike, pizza, a videogame, atool, an object, etc.). The seller 2201 generates a vendor account byregistering 2203 with a service that manages the apparatus. For example,an enrollment code 2210 may be used, along with user authentication2211, to register and/or access the vendor account. The seller 2201 maypurchase and/or associate 2204 the apparatus (the locking component)with a subscription through the vendor account for selling items usingthe apparatus. This may be performed 2230 through a shopping cart andgateway 2215 and monetary transaction functionality 2213 provided by theservice. In an example, the service may correspond to a web service or astandalone API configured to support a remote locking component orcontainment component.

The seller 2201 may receive 2205 shipment of the apparatus. The seller2201 may configure 2206 account parameters of the subscription in orderto activate the apparatus for selling a particular item. The seller 2201may purchase 2207, through the shopping cart and gateway 2215 andmonetary transaction functionality 2213 provided by the service, aserial code to use with the apparatus by paying a listing fee 2231. Theseller 2201 creates 2208 a product listing to list the item for salethrough a product listing interface 2212 (e.g., hosted by the service orseparately hosted by the seller 2201). The product listing interface2212 may be accessible to users through an application, a website, orother medium. The seller 2201 may post 2209 the listing of the item forsale and an ability for buyers to purchase a hold on the item for a holdduration through the product listing interface 2212. The listing may beposted 2209 through various websites, such as in response to a singlepost request from the seller 2201 (e.g., the post request may specifythe websites through which the listing is to be posted).

The service may host an account 2216, such as an escrow account, throughwhich payment 2232 from buyers purchasing items are provided to theseller 2201. When items are purchased and thus become unavailable, theservice updates 2217 the product listing of items for sale through theproduct listing interface 2212. In an example, a seller may need toobtain an unlocking code, used by a code validation component of thecontainment component, if the item for sale is not purchased. Access tothe unlocking code may be restricted until the item is delisted (e.g.,as part of an update 2217 to the product listing). The seller isrestricted from delisting the item if there is a hold on the item. Afterpurchase, the item would be automatically delisted. In an example,unlocking codes may be generated by the service (e.g., a cloud service),which are then transmitted to another provider (e.g., a website, a cloudenvironment hosting a market place for buying/renting items, through apayment service, etc.).

A buyer 2220 may interact 2221 with the product listing interface 2212,such as by using a mobile device to interact with the service and/or theapparatus. In an example, the buyer 2220 may determine to purchase 2226access to the product through the product listing interface 2212. Uponsubmitting payment, an unlocking code may be provided 2227, such as bybeing sent to the mobile device of the buyer 2220. The buyer 2220 mayutilize 2228 the unlocking code to unlock the locking component of theapparatus in order to gain access to the item, thus completing 2229 thebuyer 2220 and seller 2201 interaction. If any issues arise, the buyer2220 can create a support ticket 2214 with the service in order toresolve such issues with the seller 2201.

In another example, instead of directly purchasing access to the itemright away, the buyer 2220 may submit a request 2222 for the item to besecured by the apparatus for a hold duration. Various hold durations maybe available, such as a non-fee based duration (e.g., a shorterduration) or a fee based duration (e.g., a longer duration). Forexample, a fee may be charged to the buyer 2220 for holding the item.The fee may be split and paid to one or more entities, such as theseller 2201, the service, etc. Access to the item is selectivelyrestricted by the apparatus (e.g., the locking component may bemaintained in a locked state so that the item cannot be removed from thecontainment component) until either the hold duration expires or thebuyer 2220 purchases the item. During the hold duration, the seller 2201and/or other alternative/potential buyers may be restricted fromaccessing the item. Once the hold duration has expired, any alternativebuyers on a waiting list for purchasing access to the item may benotified of the availability to now purchase access to the item. Forexample, users may access the service to be placed on the waiting listduring the hold duration.

During the hold duration, a geolocation of the mobile device of thebuyer 2220 may be tracked, such as to determine whether the buyer 2220is located proximate the item for inspection. During the hold duration,the buyer may purchase 2226 access to the item or allow the holdduration to expire 2225.

FIG. 24 illustrates an example 2400 of a user 504 utilizing a mobiledevice 2410 to interact with a containment component 402 over a network728, such as by accessing the containment component 402 through theservice that manages the containment component.

In an embodiment, a method is provided for facilitating a transactionalexchange. The method comprises receiving a request, from a requestor, tohold an item secured by a containment component using a lockingcomponent for a hold duration. The hold corresponds to an exclusiveright for the requestor to subsequently purchase access to the item notyet purchased by the requestor. The method comprises selectivelyrestricting access to the item from parties other than the requestorbased upon the hold until the hold duration has expired.

In an example, the hold is implemented on the item in response to therequestor paying a fee for the hold. In an example, one or more holddurations and fees for the hold durations are displayed. In response toreceiving a selection of the hold duration from the one or more holddurations, the requestor is charged a fee associated with the holdduration. In an example, the requestor is charged with a purchase pricefor the item, wherein the purchase price excludes the fee. In anexample, the request is charged with a purchase price for the item,wherein the fee is deducted from the purchase price. In an example, therequestor is charged with a purchase price for the item. The purchaseprice is collected and held until either the hold duration expires orthe item is purchased. In an example, at least one of the purchase priceor a portion of the purchase price is refunded if the item is notpurchased.

In an embodiment, a method is provided for facilitating a transactionalexchange. The method comprises receiving a request for access to an itemsecured by a containment component using a locking component that isportable from a first party. The method comprises generating anunlocking code that is valid within a time range and is valid for eithera single use or a plurality of uses. The method comprises facilitatingaccess to the unlocking code to a second party. The method comprisesreceiving input of a code through a code entry component associated withthe containment component by the second party. The method comprisesmodifying the locking component into an unlocked state for providingaccess to the item in response to the code.

In an example, the second party comprises a transportation provider. Inan example, the facilitating comprises suggesting the transportationprovider. In an example, the code is internally validated off-line bythe locking component as corresponding to the unlocking code and beingused within the time range. In an example, the locking componentdetermines what is a valid locking code in real-time in response toreceiving the input of the code. In an example, the locking componentcomprises a primary means of attachment and a secondary means ofattachment. The secondary means of attachment is operable to keep thelocking component secured to a fixed attachment point when access isprovided to the item. In an example, the secondary means of attachmentis selectively removable.

In an embodiment, a method is provided for facilitating a transactionalexchange. The method comprises receiving a request, through a productlisting interface, for access to an item secured by a containmentcomponent using a locking component. The method comprises generating anunlocking code that is valid within a time range and is valid for eithera single use or a plurality of uses. The method comprises providing theunlocking code. The method comprises receiving input of a code through acode entry component associated with the containment component. Themethod comprises modifying the locking component into an unlocked statefor providing access to the item in response to the code.

In an example, the product listing interface is associated with anon-listed URL. The non-listed URL is modifiable. In an example, accessis provided to at least one of the product listing interface or theunlocking code based upon verification of a password. The password ismodifiable by a lock owner of the locking component. In an example, thepassword is displayed on the locking component. In an example, thelocking component is portable. In an example, the locking componentcomprises a primary means of attachment and a secondary means ofattachment. The secondary means of attachment is operable to keep thelocking component secured to a fixed attachment point.

In an example of facilitating a transactional exchange, a hold on anitem and/or the ability to obtain access to the item may be purchased ormay be obtained with merely credentials without being purchased.Purchase of a hold may correspond to a requestor paying a fee to anentity associated with the item (e.g., an owner of the item; aservice/company selling or renting the item; a service/company owningthe containment component; etc.), the requestor being charged the fee,or any other purchase arrangement. Purchase of access to the item maycorrespond to the requestor paying the fee, the requestor paying the feeand physically obtaining access to the item (e.g., payment in additionto the requestor obtaining the item), or any other purchase arrangement.If access to the item has not yet been purchased, then that could meanthat the requestor has yet to pay the fee or the requestor has paid thefee but has not obtained the item yet (e.g., the fee may be refunded ifthe requestor does not obtain the item within a threshold amount oftime). In this way, transactional functionality is incorporated into thecontainment component and locking component (e.g., financial transactionand payment). In an example of facilitating a transactional exchange, acode transfer may be performed between two parties such as between theentity associated with the item and the requestor. The code may bemanually entered into the locking component or through a listinginterface. In an example, a contact within a contacts list may besuggested as a party. In an example of facilitating a transactionalexchange, merely credentials (e.g., identification information, adriver's license, a real estate agent credentials, etc.) are needed toobtain a hold on an item and/or obtain access to the item (e.g., used toaccess a key for a house, used to test drive a car, etc.), as opposed torequiring payment of a fee.

FIG. 25 is a flow diagram illustrating an exemplary method of generatingand providing an unlocking code. During operation 2502, a request may bereceived from a requestor for an unlocking code for a lock. The requestmay be received through a remote interface (e.g., hardware and/orsoftware hosted by a kiosk, a remote server, a cloud service provider,or other computing device). In some embodiments, the lock may beintegrated into a containment component (e.g., a lock of an electronicsafe). In some embodiments, the lock may be attached to the containmentcomponent by a secondary attachment means (e.g., a padlock attached to alocker). During operation 2504, the remote interface generates anunlocking code valid for a timespan (e.g., valid for the next 5minutes). In some embodiments, the unlocking code is generated basedupon a unique identifier of the lock (or a serial number of thecontainment component). The remote interface may store the uniqueidentifier within a database or the unique identifier may be specifiedby the request. During operation 2506, the unlocking code is transmittedby the remote interface to the requestor (e.g., transmitted over anetwork to a computing device of the requestor used to generate therequest or a different device associated with the requestor such as amobile device, cell phone, smart watch, or other device whose number wasspecified by the request; an email address specified by the request;etc.). In some embodiments, the unlocking code is only provided after atime delay (e.g., a 2 minute delay). In some embodiments where there isa plurality of locks and requests for unlocking codes for the locks(e.g., locks within a particular threshold distance of one another suchas the same building or location; locks that are part of multiplecontainment components connected together such as drawers of the sameelectronic safe; etc.), the unlocking codes are sequentially providedone after another where each unlocking code is provided after the timedelay (e.g., a 15 minute time delay between processing each request inorder to mitigate theft from a burglary). In this way, the requestor canutilize the unlocking code to unlock the lock.

FIG. 26 is a flow diagram illustrating an exemplary method of generatingand providing an unlocking code through a listing interface. Duringoperation 2602, a listing interface is provided for display to arequestor through a computing device (e.g., a laptop, a tablet, awearable device, a smart phone, a kiosk, a website, etc.). The listinginterface is configured to be populated with information regardinglocks. The locks may (e.g., a lock attached to a bike) or may not beassociated with containment components (e.g., a lock integrated into alocker). The requestor may be able to request an unlocking code for alock through the listing interface. In some embodiments, the unlockingcode may be provided to the requestor through the listing interface onlyif the requestor is able to authenticate through the listing interface(e.g., provide a user name and password). In some embodiments, theunlocking code may be free or may only be provided at a certain cost.During operation 2604, a request may be received through the listinginterface for the unlocking code. During operation 2606, an unlockingcode is generated. The unlocking code may be valid for a certaintimespan and/or may be based upon a unique identifier of the lock. Insome embodiments, the unlocking code is generated after a time delay(e.g., if there are multiple requests for unlocking codes from the samelocation or building, then the time delay may be implemented, otherwise,the time delay may not be implemented). During operation 2608, theunlocking code is displayed through the listing interface for therequestor for unlocking the lock.

FIG. 27 is a component block diagram illustrating an exemplary systemfor generating and providing an unlocking code. A first lock may beassociated with a first containment component 2702. A second lock may beassociated with a second containment component 2704. Other locks may beassociated with other types of items than containment components, suchas a bike. A requestor 2706 may utilize a device (e.g., a kiosk, amobile device, a website) to request an unlocking code 2716 for thefirst lock in order to obtain access to the containment component 2702.The request may be routed to a remote interface 2710 hosted by a device2708 (e.g., a kiosk, a cloud service provider, a computing device,etc.). The remote interface 2710 may utilize an unlocking code generator2712 configured to generate the unlocking code 2716 that is valid for acertain timespan (e.g., 10 minutes). The unlocking code may be generatedbased upon a unique identifier of the first lock (or the firstcontainment component 2702) and/or based upon other criteria such astemporal/time criteria/constraints (e.g., the unlocking code generator2712 may execute a code generator algorithm to generate the unlockingcode 2716). In this way, the remote interface 2710 transmits theunlocking code 2716 to the requestor 2706 for unlocking the first lock(e.g., the first lock may have a corresponding unlocking codegenerator/verifier or code generator/verification algorithm to determinewhere the unlocking code 2716 is valid). The remote interface 2710 mayalso be configured to provide unlocking codes, such as unlocking code2718, requested through a listing interface 2714 (e.g., a kiosk userinterface, a website, an application, etc.).

Various operations of embodiments are provided herein. In oneembodiment, one or more of the operations described may constitutecomputer readable instructions stored on one or more computer readablemedia, which if executed by a computing device, will cause the computingdevice to perform the operations described. The order in which some orall of the operations are described should not be construed as to implythat these operations are necessarily order dependent. Alternativeordering will be appreciated by one skilled in the art having thebenefit of this description. Further, it will be understood that not alloperations are necessarily present in each embodiment provided herein.Also, it will be understood that not all operations are necessary insome embodiments.

Further, unless specified otherwise, “first,” “second,” and/or the likeare not intended to imply a temporal aspect, a spatial aspect, anordering, etc. Rather, such terms are merely used as identifiers, names,etc. for features, elements, items, etc. For example, a first object anda second object generally correspond to object A and object B or twodifferent or two identical objects or the same object.

Moreover, “exemplary” is used herein to mean serving as an example,instance, illustration, etc., and not necessarily as advantageous. Asused herein, “or” is intended to mean an inclusive “or” rather than anexclusive “or”. In addition, “a” and “an” as used in this applicationare generally be construed to mean “one or more” unless specifiedotherwise or clear from context to be directed to a singular form. Also,at least one of A and B and/or the like generally means A or B and/orboth A and B. Furthermore, to the extent that “includes”, “having”,“has”, “with”, and/or variants thereof are used in either the detaileddescription or the claims, such terms are intended to be inclusive in amanner similar to the term “comprising”.

Also, although the disclosure has been shown and described with respectto one or more implementations, equivalent alterations and modificationswill occur to others skilled in the art based upon a reading andunderstanding of this specification and the annexed drawings. Thedisclosure includes all such modifications and alterations and islimited only by the scope of the following claims. In particular regardto the various functions performed by the above described components(e.g., elements, resources, etc.), the terms used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., that is functionally equivalent), even though notstructurally equivalent to the disclosed structure. In addition, while aparticular feature of the disclosure may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.

What is claimed is:
 1. A method comprising: receiving, by a remoteinterface, a request from a requestor for an unlocking code used tounlock a lock for a containment component; generating, by the remoteinterface, the unlocking code valid for a timespan; and transmitting, bythe remote interface, the unlocking code to the requestor for unlockingthe lock.
 2. The method of claim 1, wherein the lock is integrated intothe containment component.
 3. The method of claim 1, wherein the lock isseparate from the containment component and has secondary means ofattachment to attach the lock to the containment component.
 4. Themethod of claim 1, wherein the lock is an offline lock withoutcommunication capabilities of communicating with the remote interface.5. The method of claim 1, wherein the generating comprises: generatingthe unlocking code based upon a unique identifier of the lock.
 6. Themethod of claim 5, wherein the request comprises the unique identifier.7. The method of claim 1, wherein the remote interface is hosted by acloud service provider accessible to the requestor over a communicationnetwork.
 8. The method of claim 1, comprising: waiting a time delaybetween receiving the request and generating the unlocking code.
 9. Themethod of claim 1, comprising: transmitting the unlocking code as a timebased recovery code via the remote interface.
 10. The method of claim 1,comprising: configuring the remote interface to generate time delayedunlocking codes for a plurality of locks for containment components atsingle location.
 11. The method of claim 1, comprising: configuring theremote interface to generate time delayed unlocking codes for aplurality of locks for containment components connected together. 12.The method of claim 1, comprising: implementing the remote interface asa kiosk.
 13. The method of claim 1, wherein the lock is a padlock andthe containment component is a locker locked by the padlock.
 14. Amethod, comprising: providing a listing interface configured to bepopulated with information regarding a lock; receiving, through thelisting interface, a request from a requestor for an unlocking code forthe lock; generating the unlocking code valid for a timespan; anddisplaying, through the listing interface, the unlocking code to therequestor for unlocking the lock.
 15. The method of claim 14,comprising: waiting a time delay between receiving the request andgenerating the unlocking code.
 16. The method of claim 14, comprising:waiting a time delay between receiving the request and transmitting theunlocking code.
 17. A method, comprising: receiving, by a remoteinterface, a request from a requestor for an unlocking code used tounlock a lock; generating, by the remote interface, the unlocking codebased upon a unique identifier of the lock; and transmitting, by theremote interface, the unlocking code to the requestor for unlocking thelock.
 18. The method of claim 17, comprising: waiting a time delaybetween receiving the request and transmitting the unlocking code. 19.The method of claim 17, wherein the request is received through a userinterface of a kiosk.
 20. The method of claim 17, wherein the remoteinterface is hosted by a cloud service provider.