System, method and apparatus for creating and maintaining biometric secure safe deposit boxes, and similar containers and facilities
First Claim
Patent Images
1. A method for biometrically electronically controlling access to a container secured by an electronic lock, comprising the steps of:
- a) inserting an electronic key into the lock and recording an internal code needed to open the lock;
b) transferring the internal code for that lock into a data processing machine;
c) maintaining the internal code together with an identifying code for the lock of interest in the data processing machine;
d) electronically biometrically identifying a potential user seeking to access a container secured by the lock;
e) electronically comparing the identified potential user to a previously generated list of biometrically identified users authorized to have access to the secured container to determine whether the identified potential user is authorized to have access;
f) providing the internal code to a user identified as authorized to access materials secured by the lock by encoding the internal code into an electronic key usable by the identified authorized user;
wherein recording the internal code is performed within the electronic key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for commissioning a collection of electronic locks by inserting the same electronic key into each of the locks and recording in the electronic key an internal code unique to that lock which identifies the lock and is needed to open the lock and a method for biometrically permitting controlled secure access to a container having one of the commissioned electronic locks.
-
Citations
5 Claims
-
1. A method for biometrically electronically controlling access to a container secured by an electronic lock, comprising the steps of:
- a) inserting an electronic key into the lock and recording an internal code needed to open the lock;
b) transferring the internal code for that lock into a data processing machine;
c) maintaining the internal code together with an identifying code for the lock of interest in the data processing machine;
d) electronically biometrically identifying a potential user seeking to access a container secured by the lock;
e) electronically comparing the identified potential user to a previously generated list of biometrically identified users authorized to have access to the secured container to determine whether the identified potential user is authorized to have access;
f) providing the internal code to a user identified as authorized to access materials secured by the lock by encoding the internal code into an electronic key usable by the identified authorized user;wherein recording the internal code is performed within the electronic key. - View Dependent Claims (2, 3, 4, 5)
- a) inserting an electronic key into the lock and recording an internal code needed to open the lock;
Specification