Ex Parte Nakajima et al - Page 7



             Appeal 2007-2110                                                                                     
             Application 10/223,408                                                                               
             points to the interior of a locker, providing alarm and monitoring functions,                        
             providing locking mechanisms, and any other specialized security features and                        
             functions which may be desired based upon the characteristics of goods to be                         
             stored in the locker, the location of the locker, the time of day, the frequency of use              
             of the locker, or any other variable (Moreno, col. 5, ll. 11-20).                                    
                    9. Another example of a security feature supported by the lockers 120 is                      
             the use of remotely or automatically controlled locks 118 (Moreno, col. 5, ll. 33-                   
             35).                                                                                                 
                    10. A customer may access a locker 120, upon entry of the appropriate                         
             access code (Moreno, col. 6, ll. 66-67).                                                             
                    11. The system may also be configured to monitor and/or control                               
             environmental conditions, safety and security features, and perform other                            
             functions.  For example, the storage unit 200 may be equipped with fire                              
             suppression systems, fire alarms, smoke detectors, video monitors (for example,                      
             web cameras), and/or burglar or intrusion alarms (Moreno, col. 7, ll. 59-65).                        
                    12. Fig. 4 illustrates a process by which a customer may utilize the system                   
             according to an embodiment of Moreno.  The process begins when a customer                            
             registers with a service provider and obtains a password, username and access code                   
             (Block 402) (Moreno, col. 12, ll. 27-31).                                                            
                    13. Once the customer has registered with the service provider, the                           
             process continues with the customer placing an order with the service provider                       
             (Block 404) (Moreno, col. 12, ll. 44-46).                                                            



                                                        7                                                         



Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013