System and method for securely controlling container unlocking based on biometric data
First Claim
1. A locking container access system comprising:
- at least one processor; and
a memory storing instructions for execution on the at least one processor, wherein the instructions include;
establishing a connection to a locking container and obtaining an identifier from the locking container, wherein the locking container includes a bottle and a cap that attaches to the bottle, and wherein the connection is established with the cap; and
in response to a user authenticating to the locking container access system;
establishing a remote networking connection to an access control system;
obtaining access parameters for the user from the access control system; and
in response to receiving an open instruction from the user for the locking container, (i) requesting verification of the user based on biometric information of the user, (ii) determining whether the identifier is included in the access parameters, and (iii) in response to determining that the identifier is included in the access parameters and successful verification of the user based on the biometric information, transmitting an open command to the locking container.
1 Assignment
0 Petitions
Accused Products
Abstract
A locking container access system includes (i) at least one processor and (ii) a memory storing instructions for execution on at least one processor. The instructions include establishing a connection to a locking container and obtaining an identifier from the locking container. The instructions include, in response to a user authenticating to the locking container access system, establishing a remote networking connection to an access control system, obtaining access parameters for the user from the access control system, and, in response to receiving an open instruction from the user for the locking container, performing additional operations. The additional operations include (i) requesting verification of the user based on biometric information, (ii) determining whether the identifier is included in the access parameters, and (iii) in response to the identifier being included in the access parameters and successful biometric verification of the user, transmitting an open command to the locking container.
-
Citations
20 Claims
-
1. A locking container access system comprising:
-
at least one processor; and a memory storing instructions for execution on the at least one processor, wherein the instructions include; establishing a connection to a locking container and obtaining an identifier from the locking container, wherein the locking container includes a bottle and a cap that attaches to the bottle, and wherein the connection is established with the cap; and in response to a user authenticating to the locking container access system; establishing a remote networking connection to an access control system; obtaining access parameters for the user from the access control system; and in response to receiving an open instruction from the user for the locking container, (i) requesting verification of the user based on biometric information of the user, (ii) determining whether the identifier is included in the access parameters, and (iii) in response to determining that the identifier is included in the access parameters and successful verification of the user based on the biometric information, transmitting an open command to the locking container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of accessing a locking container, the method comprising:
-
establishing a connection to the locking container; obtaining an identifier from the locking container; and in response to receiving an indication that a user has authenticated to a locking container access system; establishing a remote networking connection to an access control system; obtaining access parameters for the user from the access control system, wherein the access parameters include an expiration date; and in response to receiving an open instruction from the user for the locking container, (i) requesting verification of the user based on biometric information of the user, (ii) determining whether the identifier is included in the access parameters, and (iii) in response to determining that the identifier is included in the access parameters and successful verification of the user based on the biometric information, transmitting an open command to the locking container, wherein transmission of the open command is prevented subsequent to the expiration date. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium storing processor-executable instructions, the instructions comprising:
-
establishing a connection to a locking container; obtaining an identifier from the locking container; and in response to receiving an indication that a user has authenticated to a locking container access system; establishing a remote networking connection to an access control system; obtaining access parameters for the user from the access control system; in response to receiving an open instruction from the user for the locking container, (i) requesting verification of the user based on biometric information of the user, (ii) determining whether the identifier is included in the access parameters, and (iii) in response to determining that the identifier is included in the access parameters and successful verification of the user based on the biometric information, transmitting an open command to the locking container; and in response to a delegation instruction from the user, displaying a unique code for capture by a second device, wherein the unique code enables access to the locking container by the second device. - View Dependent Claims (19, 20)
-
Specification