Systems and methods for accessing or managing protected storage

A storage space, asset manager technology, applied in the direction of coinless or similar appliances, lock applications, time registers, etc., can solve the trouble of updating or changing, expensive to operate, not yet tried access, management integration methods, etc. question

Inactive Publication Date: 2016-03-09
TELEZYGOLOGY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although remote control locks are known to access rooms, no integrated approach to controlling access to different areas (including micro-areas), managing the environment of these areas, and / or otherwise controlling these areas has yet been attempted.
Because an integrated approach was never attempted, previous systems were complex to design, expensive to produce, expensive to operate, difficult to maintain, and cumbersome to update or change

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for accessing or managing protected storage
  • Systems and methods for accessing or managing protected storage
  • Systems and methods for accessing or managing protected storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] refer to figure 1 , illustrating an example of a system for packaged asset delivery. The system includes: locker system 102 , network hub 104 , interface controller 106 , data input device 108 , network 110 , memory storage device 112 , and asset manager 114 .

[0068] Locker system 102 is any type of storage device in which one or more storage spaces are secured by one or more locking devices. Each locker has a locking device (eg, an electronic lock) communicatively coupled to the hub 104 . The locking device is actuated by receiving an access code that opens / releases the locking device to allow the barrier protecting the storage space to open to allow access to the storage space. For simplicity, in figure 1Only one locking device 105 is identified in , but it will be understood that each locker has a locking device. It will also be understood that the locking device 105 may be coupled to the hub 104 by any type of connection, such as a wired connection, a wireless...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention concerns a method for controlling access to a storage bin (102). When the item is delivered to the storage device (102), an access code is sent to the recipient. When the recipient enters the access code, the access code is accepted and access to the storage device (102) is permitted. The invention also provides a system for controlling access to a storage device (102) protected by a closure. The system includes a processor (112) configured to transmit an access code to the recipient when an item for the recipient is delivered to the storage device (102), recognize the access code entered by the recipient, and The closure allows a recipient to access the storage device (102).

Description

technical field [0001] The present application relates to storage areas, and more particularly, to systems and methods of accessing or otherwise managing such storage areas. Background technique [0002] Over the years, different methods have been used to control access to protected spaces or areas. In one example, a locked door secures a secure (protected) space, such as a storage locker. The lock securing the door may be opened manually (eg, by manually turning a key and moving a handle), or, in some examples, automatically from a remote location. When opening a lock remotely, some determination is typically made that the user is allowed access to the protected space (eg, the user enters some code that is verified to be authentic), and then the lock is actuated. After the lock is actuated, the door is opened and the user accesses the protected space. [0003] Different types of packages are delivered to recipients in different locations. In one example, packages are de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): E05B49/00G07F17/12
CPCG07C9/00571G07C9/00896G06Q10/083G07F17/13
Inventor D·鲁达克C·凯丽赫B·福特A·怀特M·R·樊都锦J·E·弗雷塞E·格塞尔
Owner TELEZYGOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products