Systems and methods for securing access to storage and retrieval systems

ABSTRACT

In some embodiments, apparatuses and methods are provided herein useful to secure access. In some embodiments, there is provided a system for securing access using decentralized biometric authentication data through a blockchain network including: a user interface product operable on a user device and configured to: receive a first one or more biometric data; receive near real-time location data associated with the first one or more biometric data; receive a token comprising a second one or more biometric data; determine whether the first one or more biometric data matches within a threshold with the second one or more biometric data; determine whether the first one or more biometric data and the second one or more biometric data are associated with the user device; determine whether the near real-time location data is within a threshold distance from a storage and retrieval system (SRS); and provide data associated with unlocking the SRS.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Application No.62/578,639, filed Oct. 30, 2017, which is incorporated herein byreference in its entirety.

TECHNICAL FIELD

This invention relates generally to securing access to retail productsin storage and retrieval systems.

BACKGROUND

Generally, after a receipt of an order for a delivery of an item from acustomer, a retailer, a manufacturer, or an order processing agent orassociate prints out a label that includes a destination address of aplace to deliver the item and an intended recipient. The label is thenplaced on a box storing the item. Generally, the box is left at thedestination address and with an assumption that a person who will accessthe box to retrieve the item is the intended recipient that isauthorized by the customer to receive the item.

BRIEF DESCRIPTION OF THE DRAWINGS

Disclosed herein are embodiments of systems, apparatuses and methodspertaining to securing access to storage and retrieval systems through ablockchain network. This description includes drawings, wherein:

FIG. 1 illustrates a simplified block diagram of an exemplary system forsecuring access to storage and retrieval systems using decentralizedbiometric authentication data in accordance with some embodiments;

FIG. 2 shows a flow diagram of an exemplary process of securing accessto storage and retrieval systems using decentralized biometricauthentication data in accordance with some embodiments;

FIG. 3 shows a flow diagram of an exemplary process of securing accessto storage and retrieval systems using decentralized biometricauthentication data in accordance with some embodiments;

FIG. 4 shows a flow diagram of an exemplary process of securing accessto storage and retrieval systems using decentralized biometricauthentication data in accordance with some embodiments;

FIG. 5 illustrates an exemplary system for use in implementing methods,techniques, devices, apparatuses, systems, servers, sources and securingaccess to storage and retrieval systems using decentralized biometricauthentication data, in accordance with some embodiments;

FIG. 6 comprises an illustration of blocks as configured in accordancewith various embodiments of these teachings;

FIG. 7 comprises an illustration of transactions configured inaccordance with various embodiments of these teachings;

FIG. 8 comprises a flow diagram in accordance with various embodimentsof these teachings;

FIG. 9 comprises a process diagram as configured in accordance withvarious embodiments of these teachings;

FIG. 10 comprises an illustration of a delivery record configured inaccordance with various embodiments of these teachings; and

FIG. 11 comprise a system diagram configured in accordance with variousembodiments of these teachings.

Elements in the figures are illustrated for simplicity and clarity andhave not necessarily been drawn to scale. For example, the dimensionsand/or relative positioning of some of the elements in the figures maybe exaggerated relative to other elements to help to improveunderstanding of various embodiments of the present invention. Also,common but well-understood elements that are useful or necessary in acommercially feasible embodiment are often not depicted in order tofacilitate a less obstructed view of these various embodiments of thepresent invention. Certain actions and/or steps may be described ordepicted in a particular order of occurrence while those skilled in theart will understand that such specificity with respect to sequence isnot actually required. The terms and expressions used herein have theordinary technical meaning as is accorded to such terms and expressionsby persons skilled in the technical field as set forth above exceptwhere different specific meanings have otherwise been set forth herein.

DETAILED DESCRIPTION

Generally speaking, pursuant to various embodiments, systems,apparatuses and methods are provided herein useful for securing accessto storage and retrieval systems using decentralized biometricauthentication data. In some embodiments, there is a system for securingaccess to storage and retrieval systems using decentralized biometricauthentication data through a blockchain network including a userinterface product. The user interface product may be operable on a userdevice coupled to the blockchain network. The user device may includeone or more biometric sensors, at least one location sensor, atransceiver, and/or a control circuit operatively coupled to the userinterface product. The user interface product is adapted to enhancedecentralized biometric authentication through the blockchain network bybeing configured to: receive, at a first time, from the one or morebiometric sensors a first one or more biometric data of a userassociated with the user device. By one approach, the user interfaceproduct may receive, at the first time, from the at least one locationsensor near real-time location data associated with the first one ormore biometric data. The user interface product may receive, via thetransceiver, from at least one computer server coupled to the blockchainnetwork a token comprising a second one or more biometric data of theuser. In one configuration, the user interface product may determinecooperatively with the control circuit, at the first time, whether thefirst one or more biometric data matches within a threshold with thesecond one or more biometric data. In another configuration, the userinterface product may determine cooperatively with the control circuit,at the first time, whether the first one or more biometric data and thesecond one or more biometric data are associated with the user device.By one approach, the user interface product may determine cooperativelywith the control circuit, at the first time, whether the near real-timelocation data received from the at least one location sensor is within athreshold distance from a storage and retrieval system (SRS) associatedwith the user. In yet another approach, the user interface product mayprovide, at the first time via the transceiver, data associated withunlocking the SRS based on the determination that: the first one or morebiometric data matches within the threshold with the second one or morebiometric data; the near real-time location data is within the thresholddistance from the SRS; and the first one or more biometric data and thesecond one or more biometric data are associated with the user device.In one configuration, the system may include the SRS. The SRS may beoperatively coupled to the user device. By one approach, the SRS maycomprise an opening to a storage area adapted to receive one or moreitems for delivery. By another approach, the SRS may include a covermechanism to prevent access to the opening. By yet another approach, theSRS may include a receiver configured to receive the data associatedwith unlocking the SRS via a release of the cover mechanism.

In some embodiment, there is provided a computer program productembodied on a computer readable storage medium for enhancingdecentralized biometric authentication through the blockchain network.The computer program product includes computer code for receiving fromone or more biometric sensors a first one or more biometric data of auser associated with a user device. In one configuration, the userdevice may include the computer readable storage medium. By oneapproach, the computer program product may include computer code forreceiving from at least one location sensor associated with the userdevice near real-time location data associated with the first one ormore biometric data. The computer program product may include computercode for receiving from at least one computer server coupled to ablockchain network a token including a second one or more biometric dataof the user. By another approach, the computer program product mayinclude computer code for determining whether the first one or morebiometric data matches with the second one or more biometric data. Inone configuration, the computer program product may include computercode for determining whether the first one or more biometric data andthe second one or more biometric data are associated with the userdevice. In another configuration, the computer program product mayinclude computer code for determining whether the near real-timelocation data received from the at least one location sensor is within athreshold distance from a storage and retrieval system (SRS) associatedwith the user. In yet another configuration, the computer programproduct may include computer code for determining that: the first one ormore biometric data matches with the second one or more biometric data;the near real-time location data is within the threshold distance fromthe SRS; and the first one or more biometric data and the second one ormore biometric data are associated with the user device. By oneapproach, the computer program product may include computer code forproviding data associated with unlocking the SRS based on thedetermination that: the first one or more biometric data matches withthe second one or more biometric data; the near real-time location datais within the threshold distance from the SRS; and the first one or morebiometric data and the second one or more biometric data are associatedwith the user device.

FIG. 1 illustrates a simplified block diagram of an exemplary system 100that secures access to storage and retrieval systems using decentralizedbiometric authentication data in accordance with some embodiments. Thesystem 100 includes a user interface product 102. By one approach, theuser interface product 102 may be operable on a user device 104. Byanother approach, the user interface product 102 may operate as astand-alone device capable of performing and/or executing functionsdescribed herein. As such, functions described herein of the userinterface product 102 being operable on the user device 104 may equallybe applicable to the user interface product 102 operating as astand-alone device. In one configuration, the user interface product 102and/or the user device 104 may be coupled to a blockchain network 116.By one approach, the user device 104 may include one or more biometricsensors 108, at least one location sensor 110, a transceiver 112, and acontrol circuit 106 that are operatively coupled to the user interfaceproduct 102. By another approach, the control circuit 106 may instead beincluded with the user interface product 102. In one configuration, thecontrol circuit 106 may be operatively coupled via one or morecommunication buses 136. In another configuration, the transceiver 112may comprise a receiver, a transmitter, or a device including both thereceiver and/or the transmitter configured to receive wired and/orwireless data from the blockchain network 116 and/or a storage andretrieval system (SRS) 120. In one example, the wired and/or wirelessdata may be based on one or more IEEE wired and wireless communicationstandards (e.g., local area network, Ethernet, WI-FI, Bluetooth wirelesscommunication, among other such IEEE communication standards). Inanother example, the wired and/or wireless data may be based on aproprietary wired and wireless communication protocols. In anotherconfiguration, the one or more biometric sensors 108 may include one ormore devices that change one or more biometric traits of a person intoelectrical signal and/or digital data. The biometric traits (orbiometric data) may include facial, fingerprint, hand, iris, DNA,keystroke, signature, voice, stride, posture, gait, subconsciousmovements and mannerisms, among other types of biometrictraits/characteristics of a person. In another configuration, the atleast one location sensor 110 may include a global positioning system(GPS), and/or other types of devices configured to determine a nearreal-time location of a device, such as the user device 104. The deviceor the user device 104 may include a smartphone, a smart watch, alaptop, any smart devices, a server, a computer, among other electronicproducts capable of processing data.

In some embodiments, the system 100 may include one or more computerreadable storage mediums 114. The computer readable storage medium 114may include a random access memory (RAM), a read only memory (ROM), acache memory, a hard disk, an optical disk, a USB drive, among othertypes of storage devices capable of storing electronic data. By oneapproach, the user interface product 102 may cooperatively operate withthe control circuit 106 in conjunction with the computer readablestorage medium 114. In one configuration, the user interface product 102may be integrated with the user device 104. In another configuration,the user interface product 102 may be detachably coupled to the userdevice 104. In such a configuration, the user interface product 102, forexample, may include the computer readable storage medium 114. Inanother such configuration, the user interface product 102, for example,may be communicatively coupled to the computer readable storage medium114 that may be integrated with the user device 104.

In some embodiments, the SRS 120 may include one or more openings 128 toone or more storage areas 122 that are adapted to receive one or moreitems for delivery. By one approach, the SRS 120 may include one or moredoors or other cover mechanisms 126 with one or more locking systemscontrolled to prevent and allow access to the storage areas 122 throughthe one or more openings 128 depending on a determined accessauthorization. By another approach, the SRS 120 may include a wiredand/or wireless communication receiver 124 configured to receive dataassociated with unlocking one or more cover mechanisms 126 of the SRS120 via a release of the locking system of one or more cover mechanisms126. In one example, each of the storage areas 122 may be at leasttemporarily associated with a customer order and/or a customer. Theitems received by each of the storage areas 122 may be secured fromaccess through at least one of the openings 128. In one configuration,at least one of the openings 128 are locked and/or unlocked based onauthentication implemented at least in part through the user interfaceproduct 102. At least a lock signal and/or an unlock signal may becommunicated to the SRS 120 via the blockchain network 116 and/or awireless network 118. In one example, the wireless network 118 mayinclude a local wireless network, a peer-to-peer network, and/or othertype of networks that is configured to provide local and/or securecommunications between the user interface product 102 and the SRS 120.Descriptions of the blockchain network 116 is described further below.

In one configuration, the receiver 124 of the SRS 120 may receive thelock signal and/or the unlock signal. In response to the receiver 124receiving the lock signal, the SRS 120 may secure the storage area 122via the one or more cover mechanisms 126. Alternatively, or in additionto, in response to the receiver 124 receiving the unlock signal, the SRS120 may release the one or more cover mechanisms 126 to enable access tothe storage area 122. By one approach, the one or more cover mechanisms126 may include a sliding structure, a pivoting structure, and/or otherways of covering, disabling access through, and/or securing the opening128. In some embodiments, the SRS 120 may include a storage locker,kiosk, automatic storage and retrieval tower, and/or other holding anddispensing systems and/or devices used to hold, store, and/or stageitems for delivery to customers. In one configuration, the SRS 120 mayinclude a plurality of storage lockers. In one example, one or more ofthe plurality of storage lockers are associated, owned, and/or assignedto a particular customer. In another example, each of the plurality ofstorage lockers in the SRS 120 may be associated, owned, and/or assignedto a plurality of customers.

In some embodiments, the user device 104 may be paired with a vehicle130 via a vehicle control system 132. By one approach, the pairing mayenable the user interface product 102 to be communicatively coupled tothe vehicle control system 132 via a second wireless network 134. In oneexample, the second wireless network 134 may include a local wirelessnetwork, a peer-to-peer network, and/or other type of networks that isconfigured to provide a local and/or secure communications between theuser interface product 102 and the vehicle 130.

As further described below, the user interface product 102 is adapted toenhance decentralized biometric authentication through the blockchainnetwork by ensuring that a user who requests access to the SRS 120,and/or particularly to the storage area 122, is a person with anauthority to access, is an actual person authorized to access, and is aperson about to access the SRS 120 and/or the storage area 122. The usermay comprise of a customer, a delivery agent (e.g., an associate of aretailer, a third-party contractor, a crowd-source agent, etc.),maintenance agent, and/or other such authenticated person. Further, theuser interface product 102, as described herein, may be implementable ina plurality of configurations. For example, in one configuration, theuser interface product 102 may include the control circuit 106. Inanother configuration, the user interface product 102 may be distinctfrom the control circuit 106. In another configuration, the userinterface product 102 may be distinct from the user device 104. In yetanother configuration, the user device 104 may include the userinterface product 102. In yet another configuration, the user device 104may include the user interface product 102 and the control circuit 106.In yet another configuration, the control circuit 106 may be distinctfrom the user interface product 102 and the user device 104. In yetanother configuration, the user interface product 102 may be embodied onthe computer readable storage medium 114 and operable by the controlcircuit 106.

In an illustrative non-limiting example, a customer associated with theSRS 120 may receive a message (e.g., via the user device 104, personalcomputer, or the like) that an item has been delivered to the SRS 120.At a first time, the user interface product 102 may receive from the oneor more biometric sensors 108 a first one or more biometric data of auser associated with the user device 104. In one configuration, a firsttime may include a period of time that starts when the user is within aproximate distance to the SRS 120 and ends when the user is within athreshold distance away from the SRS 120 and/or a period of time thatcorresponds to a day, an hour, and/or a span of hours and/or minuteswhen the user delivers, retrieves, and/or returns one or more itemsassociated with an order.

By one approach, the one or more biometric sensors 108 may be triggeredby the user interface product 102, in cooperation with the controldevice 106, to capture and/or provide the first one or more biometricdata when the user device 104 is within a threshold distance from theSRS 120. In one example, the user interface product 102 and/or thecontrol circuit 106 may determine whether the user device 104 is withinthe threshold distance from the SRS 120 based on a comparison of nearreal-time location data provided by the location sensor 110, the vehicle130, or other device with a location data of the SRS 120 stored in atleast one computer readable storage medium 114 or a remote memory. Forexample, a time corresponding to when the location sensor 110 providesthe near real-time location data may be instantaneously or substantiallybe at the same time as when the one or more biometric sensors 108provides the first one or more biometric data. In another example, thefirst one or more biometric data provided by the one or more biometricsensors 108 may include a captured one or more biometric data of theuser and a time when the first one or more biometric data were captured.In another example, the control circuit 106 may record the time the oneor more biometric sensors 108 captures the first one or more biometricdata. As such, the user interface product 102 and/or the control device106 may determine whether the time corresponding to the capturing of theone or more biometric data of the user and the time corresponding to thelocation sensor 110 determining the near real-time location data arewithin a first time and/or within a threshold of time predetermined bythe user and/or the retailer.

By another approach, the one or more biometric data may be received bythe control circuit 106 and stored temporarily in at least one computerreadable storage medium 114, for example, a cache memory, when the userinitiates use of the user device 104 while at the threshold distancefrom the SRS 120. In such an approach, an initiation of operation of theuser interface product 102 (e.g., by the user) may trigger a receipt ofthe first one or more biometric data at the first time. By one approach,the user interface product 102 may trigger receipt of the near real-timelocation data. In one scenario, the receipt of the near real-timelocation data may be triggered by the receipt of the first one or morebiometric data. In another scenario, the user interface product 102 maytrigger receipt of the first one or more biometric data in response to adetermination that the near real-time location data received from the atleast one location sensor 110 is within the threshold distance from theSRS 120. In yet another scenario, the user interface product 102 mayboth receive the near real-time location data and the first one or morebiometric data substantially at the same time when the user device 104crosses a geofence of the SRS 120. In other words, the user interfaceproduct 102 and/or the user device 104 may detect the crossing of thegeofence and triggers the receipt of the near real-time location dataand the first one or more biometric data.

In such approaches, configurations, scenarios, and/or examples, the userinterface product 102 may receive, at the first time, from at least onelocation sensor 110 the near real-time location data associated with thefirst one or more biometric data received from one or more biometricsensors 108. In an illustrative non-limiting example, when the userarrives at a location proximate to the SRS 120, the user may unlock theuser device 104 that the user carries. Alternatively or in addition to,the user interface product 102 in cooperation with the control circuit106 may prompt the user to unlock the user device 104 and/or operate onthe user interface product 102 when the user device 104 is within thethreshold distance from the SRS 120. In one example, the thresholddistance may be selectively defined and/or updated by the user and/or aretailer associated with the order when the order is created and/or whenthe user initiates a transaction with the retailer.

In some embodiments, the user interface product 102 may receive, via thetransceiver 112, from at least one computer server (not shown) coupledto the blockchain network 116 a token comprising a second one or morebiometric data of the user. In one example, the second one or morebiometric data may be provided by the user at the time the userinitiated, during, and/or at the completion of an order. In anotherexample, the second one or more biometric data may correspond to one ormore stored biometric data of the user. In one configuration, at thestart, at the completion, or at the submission of the order, the secondone or more biometric data may be included with the token. As such,there are numerous ways to associate the user device 104 with the secondone or more biometric data (e.g., stored biometric data) of the user.For example, the second one or more biometric data may be provided bythe user through the user device 104 at the time the user initiated,during, and/or at the completion of an order using the user device 104.In another example, the second one or more biometric data along with anidentifier associated with the user device 104 may be included with thetoken. In yet another example, the second one or more biometric data maybe associated with the user device 104 based on a user profileassociated with the user. In such examples, the identifier of the userdevice 104 associated with the second one or more biometric data may becompared with the identifier of the user device 104 associated with thefirst one or more biometric data (e.g., the near-real time biometricdata obtained through the user device 104 when the user is at athreshold distance and/or at a threshold time away from the SRS 120and/or the storage area 122) to determine whether the same user device104 are associated with the first and second one or more biometric data.

By one approach, the token may correspond to a blockchain contract,transaction, bitcoin, or the like that includes information associatedwith an order initiated by the user. In one example, the information mayinclude descriptions and/or identifiers associated with one or moreitems ordered and/or bought, delivery information, one or more deliverylocations, one or more user profiles, information associated with theSRS 120 and/or the storage area 122 that is associated with the user(e.g., location data of the SRS 120 and/or the storage area 122), storedbiometric data of the user and/or authorized user (e.g., the second oneor more biometric data referred to in this application), one or moreidentifiers of the user device 104 that were used to capture the storedbiometric data, and/or one or more identifiers of vehicles 130associated with the user and/or authorized user and/or associated withone or more identifiers of the user device 104.

In one configuration, the user interface product 102 may determinecooperatively with the control circuit 106, at the first time, whetherthe first one or more biometric data matches within a threshold with thesecond one or more biometric data. In one scenario, the matching of thebiometric data may include image processing and/or data processing ofthe first and second biometric data. As such, the user interface product102 determines whether the user requesting access to the SRS 120 and/orthe storage area 122 is an authorized user to access a particularstorage area 122 of the SRS 120 based on the information included in thetoken. Further, the receipt of the token via the blockchain network 116indicates to the user interface product 102 that the token and theinformation included in the token have not been tempered with, alteredsince the submission of the order, modified without permission of theuser, and/or the like. By one approach, the threshold used to determinethat there is a match is selectively defined and/or updated by the userand/or the retailer associated with the order. By one approach, the userinterface product 102 may provide an alert message to the user device104 in response to the first one or more biometric data not matchingwithin the threshold with the second one or more biometric data. In oneconfiguration, the alert message may be provided after one or morefailed matching attempts of the biometric data. In such a configuration,for example, the user interface product 102 may provide a denial ofaccess message to the user device 104 after the one or more failedmatching attempts. As such, the user may notify the retailer of thefailed attempts. Alternatively or in addition to, the user interfaceproduct 102 may notify the retailer of the failed attempts.

In another configuration, the user interface product 102 may determinecooperatively with the control circuit 106, at the first time, whetherthe first one or more biometric data and the second one or morebiometric data are associated with the user device 104. As such, theuser interface product 102 may determine that the user who provided thefirst one or more biometric data is the user requesting access and theuser authorized to access the SRS 120 and/or the storage area 122. Byone approach, the user interface product 102 in cooperation with thecontrol circuit 106 may compare at least one identifier of the userdevice 104 that is associated with the second one or more biometric dataincluded in the token with at least one identifier of the user device104 that is associated with the first one or more biometric dataprovided by the one or more biometric sensors 108. In one example, theuser interface product 102 may receive the at least one identifier ofthe user device 104 when the first one or more biometric data and/or thenear real-time location data is received the first time.

In another configuration, the user interface product 102 may determinecooperatively with the control circuit 106, at the first time, whetherthe near real-time location data received from the at least one locationsensor 110 is within the threshold distance from the SRS 120. As such,the user interface product 102 may determine that the user requestingaccess to the SRS 120 and/or the storage area 122 is the user at thelocation within the threshold distance from the SRS 120. By oneapproach, a geofence may be associated with the SRS 120 and that whenthe user device 104 is within the threshold distance from the SRS 120,the user interface product 102 may receive the near real-time locationdata of the user device 104 from the at least one location sensor 110.As previously described above, the threshold distance may be selectivelydefined and/or updated by the user and/or a retailer associated with theorder.

In yet another configuration, the user interface product 102 mayprovide, at a first time via the transceiver 112, data associated withunlocking the SRS 120 based on the determination that: the first one ormore biometric data matches within the threshold with the second one ormore biometric data; the near real-time location data is within thethreshold distance from the SRS 120; and the first one or more biometricdata and the second one or more biometric data are associated with theuser device 104. Thus, when the user interface product 102 has multipleconfirmations indicating that the user requesting access to the SRS 120and/or the storage area 122 is the authorized user, the user isproximate the SRS 120, and that the user is the authorized user based onthe customer order, the user interface product 102 then unlocks the SRS120 and/or the storage area 122. As such, accessing the SRS 120 and/orthe storage area 122 is based on the multiple confirmations as describedand/or a determination that the multiple confirmations is based on theuser device 104 of the user. Thus, the customer may control delivery ofand access to a delivered item via the use of the user interface product102 operable on the user device 104 of the user who makes the deliveryof the item (e.g., when the user is a delivery agent) or the user device104 of the user who retrieves or returns the delivered item (e.g., whenthe user is the customer and/or the intended recipient).

In yet another configuration, the receiver 124 of the SRS 120 mayreceive the data associated with unlocking the SRS 120 and/or thestorage area 122. In response, the SRS 120 may release the covermechanism 126 to allow access to the storage area 122 through the one ormore openings 128. By one approach, the data associated with unlockingthe SRS 120 may be provided to the SRS 120 through the blockchainnetwork 116, thereby validating authenticity of the unlocking datareceived by the SRS 120. Alternatively or in addition to, the dataassociated with unlocking the SRS 120 may be provided to the SRS 120through the wireless network 118. In such a configuration, the SRS 120may be configured to selectively accept communication with the userdevice 104 via the wireless network 118. In an illustrative non-limitingexample, the SRS 120 may be configured to only pair with the user device104. For example, the wireless network 118 may correspond to a Bluetoothwireless network. When the user is within the threshold distance fromthe SRS 120, the SRS 120 may recognize and initiate communication withthe user device 104. Alternatively or in addition to, the user device104 may initiate communication with the SRS 120 when the user device 104is within the threshold distance from the SRS 120. On the other hand,when an unrecognized user device initiates communication with the SRS120, the SRS 120 does not respond.

Alternatively or in addition to, in some embodiments, the user interfaceproduct 102 in cooperation with the control circuit 106 may determineone or more patterns of the user's daily route routine based onhistorical location data received over time from the at least onelocation sensor 110. In one configuration, the historical location datamay comprise a compilation of location coordinates of places and/orareas the user device 104 had been over a period of time (e.g., one ormore years, months, and/or days. As such, the user interface product 102may determine a route taken by the user prior to arriving at a locationwithin the threshold distance from the SRS 120. In one instance, theroute may correspond to the route taken within a threshold of timeimmediately prior to arriving at the location. By one approach, the userinterface product 102 may determine the route taken based on capturedlocation data received from the at least one location sensor 110. In anillustrative non-limiting example, the user may habitually (e.g.,substantially every weekday morning) go to a coffee shop a block fromthe user's house. In response, the user interface product 102 incooperation with the control circuit 106 may recognize this routine as apattern based on a number of times for a period of time the user device104 has been at a particular sequence of location coordinates providedby the at least one location sensor 110. As such, by one approach, theuser interface product 102 in cooperation with the control circuit 106may initiate storing of the pattern in at least one computer readablestorage medium 114. The stored pattern may be included in the historicallocation data. In some embodiments, the user interface product 102 incooperation with the control circuit 106 may determine whether the routetaken matches with the one or more patterns of the user's daily routeroutine. By one approach, in response to the determination of the match,the user interface product 102 may, alternatively or in addition to,provide data associated with unlocking the SRS 120.

In some embodiments, the user interface product 102 may determinecooperatively with the control circuit 106 whether the vehicle 130 ispaired with the user device 104 at the first time when the vehicle 130and the user device 104 is within the threshold distance from the SRS120. As such, the pairing of the vehicle 130 with the user device 104 atthe threshold distance from the SRS 120, provides another layer ofauthentication that indicates to the user interface product 102 that theuser requesting access to the SRS 120 and/or the storage area 122 is anauthorized user. In one configuration, the data associated withunlocking the SRS 120 may be provided by the user interface product 102to the SRS 120 based at least in part on the determination that thevehicle 130 paired with the user device 104 is within the thresholddistance from the SRS 120.

In yet some embodiments, the user interface product 102 may provide asecond data associated with unlocking the SRS 120. By one approach, thesecond data may be provided to the SRS 120 via the wireless network 118,for example, a Bluetooth wireless network. In one configuration, the SRS120 may release the cover mechanism 126 only after the receipt of thesecond data. In such a configuration, the token may further include afirst identification data associated with the user device 104. The firstidentification data may correspond to one of the information previouslydescribed as being included in the token. By one approach, the userinterface product 102 may determine a second identification dataassociated with the user device 104. In one example, the secondidentification data may correspond to one of the biometric datapreviously described. In such an approach, the user interface product102 may prompt the user, via the user device 104, to provide the secondidentification data when the user device 104 is within the thresholddistance from the SRS 120. In response, the user interface product 102may determine cooperatively with the control circuit 106 whether thefirst identification data matches with the second identification data.The user interface product 102 may recognize a positive match when thematch is within a threshold. In one configuration, the threshold may bepredetermined by the user and/or the retailer prior to the user'ssubmission of the order and/or the request for delivery. Alternativelyor in addition to, in response to the positive match, the user interfaceproduct 102 may provide the second data indicating that the firstidentification data matches with the second identification data to theSRS 120. In response, the SRS 120 may release the cover mechanism 126 toallow access to the storage area 122.

FIG. 2 illustrates a flow diagram of an exemplary method 200 forsecuring access to storage and retrieval systems using decentralizedbiometric authentication data. The exemplary method 200 may beimplemented in the system 100 of FIG. 1. By one approach, one or moresteps of the method 200 may be implemented by the user interface product102, the control circuit 106 of FIG. 1, and/or the user device 104. Byanother approach, the user interface product 102, the computer readablestorage medium 114, and the control circuit 106 may cooperativelyoperate to implement the method 200. The method 200 includes, at step202, receiving from one or more biometric sensors a first one or morebiometric data of a user associated with a user device. In one example,the user device may correspond to the user device 104 of FIG. 1. In oneconfiguration, the method 200 may include, at step 204, receiving fromat least one location sensor associated with the user device nearreal-time location data associated with the first one or more biometricdata. By one approach, the method 200 may include receiving from atleast one computer server coupled to a blockchain network a tokencomprising a second one or more biometric data of the user, at step 206.By another approach, the method 200 may include determining whether thefirst one or more biometric data matches with the second one or morebiometric data, at step 208. In one configuration, the method 200 mayinclude, at step 210, determining whether the first one or morebiometric data and the second one or more biometric data are associatedwith the user device. In yet another configuration, the method 200 mayinclude, at step 212, determining whether the near real-time locationdata received from the at least one location sensor is within athreshold distance from a storage and retrieval system (SRS) associatedwith the user. By one approach, the method 200 may include determiningthat the first one or more biometric data matches with the second one ormore biometric data; the near real-time location data is within thethreshold distance from the SRS; and the first one or more biometricdata and the second one or more biometric data are associated with theuser device, at step 214. By yet another approach, the method 200 mayinclude, at step 216, providing data associated with unlocking the SRSbased on the determination that the first one or more biometric datamatches with the second one or more biometric data; the near real-timelocation data is within the threshold distance from the SRS; and thefirst one or more biometric data and the second one or more biometricdata are associated with the user device.

FIG. 3 illustrates a flow diagram of an exemplary method 300 forsecuring access to storage and retrieval systems using decentralizedbiometric authentication data. The exemplary method 300 may beimplemented in in the system 100 of FIG. 1. By one approach, one or moresteps of the method 300 may be implemented in at least one of the userinterface product 102, the control circuit 106 of FIG. 1, and/or theuser device 104. By another approach, the method 300 and/or one or moresteps of the method may optionally be included in and/or performed incooperation with the method 200 of FIG. 2. The method 300 includes, atstep 302, triggering the receiving of the first one or more biometricdata when the user initiates use of a user interface product associatedwith the computer program product. In one configuration, the method 300may include triggering the receiving of the near real-time locationdata, at step 304. In another configuration, the method 300 may include,at step 306, determining one or more patterns of the user's daily routeroutine based on historical location data received over time from the atleast one location sensor. By one approach, the method 300 may include,at step 308, determining a route taken by the user based on capturedlocation data received from the at least one location sensor. By anotherapproach, the method 300 may include determining whether the route takenmatches with the one or more patterns of the user's daily route routine,at step 310. In one configuration, in response to the route taken beinga match with the one or more patterns of the user's daily route routine,data associated with unlocking the SRS is provided to the SRS. By yetanother approach, the method 300 may include, at step 312, determiningwhether a vehicle paired with the user device during a first time iswithin a threshold distance from the SRS. In one configuration, inresponse to the determination that the vehicle paired with the userdevice is within the threshold distance from the SRS, data associatedwith unlocking the SRS is provided to the SRS.

FIG. 4 illustrates a flow diagram of an exemplary method 400 forsecuring access to storage and retrieval systems using decentralizedbiometric authentication data. The exemplary method 400 may beimplemented in in the system 100 of FIG. 1. By one approach, one or moresteps of the method 400 may be implemented in at least one of the userinterface product 102, the control circuit 106 of FIG. 1, and/or theuser device 104. By another approach, the method 400 and/or one or moresteps of the method may optionally be included in and/or performed incooperation with the method 200 of FIG. 2 and/or the method 300 of FIG.3. The method 400 includes, at step 402, determining a firstidentification data associated with the user device. By one approach, asecond identification data associated with the user device may beinclude in a token received by the user device and/or a user interfaceproduct from a blockchain network. In one configuration, the method 400may include, at step 404, determining cooperatively with a controlcircuit whether the first identification data matches with the secondidentification data. In yet another configuration, the method 400 mayinclude providing to the SRS, via a transceiver and through theblockchain network, second data indicating that the first identificationdata matches with the second identification data, at step 406. In such aconfiguration, the second data associated with unlocking the SRS may beprovided to the SRS through the blockchain network.

Further, the circuits, circuitry, systems, devices, processes, methods,techniques, functionality, services, servers, sources and the likedescribed herein may be utilized, implemented and/or run on manydifferent types of devices and/or systems. FIG. 5 illustrates anexemplary system 500 that may be used for implementing any of thecomponents, circuits, circuitry, systems, functionality, apparatuses,processes, or devices of the system 100 of FIG. 1, the method 200 ofFIG. 2, the method 300 of FIG. 3, the method 400 of FIG. 4, and/or otherabove or below mentioned systems or devices, or parts of such circuits,circuitry, functionality, systems, apparatuses, processes, or devices.For example, the system 500 may be used to implement some or all of thesystem 100 for securing access to storage and retrieval systems usingdecentralized biometric authentication data through a blockchainnetwork, the user interface product 102, the computer readable storagemedium 114, the location sensors 110, the biometric sensors 108, thetransceiver 112, the control circuit 106, the user device 104, thewireless network 118, the second wireless network 134, the blockchainnetwork 116, the SRS 120, the receivers 124, the cover mechanism 126,the vehicle 130, the vehicle control system 132, and/or other suchcomponents, circuitry, functionality and/or devices. However, the use ofthe system 500 or any portion thereof is certainly not required.

By way of example, the system 500 may comprise a processor module (or acontrol circuit) 512, memory 514, and one or more communication links,paths, buses or the like 518. Some embodiments may include one or moreuser interfaces 516, and/or one or more internal and/or external powersources or supplies 540. The control circuit 512 can be implementedthrough one or more processors, microprocessors, central processingunit, logic, local digital storage, firmware, software, and/or othercontrol hardware and/or software, and may be used to execute or assistin executing the steps of the processes, methods, functionality andtechniques described herein, and control various communications,decisions, programs, content, listings, services, interfaces, logging,reporting, etc. Further, in some embodiments, the control circuit 512can be part of control circuitry and/or a control system 510, which maybe implemented through one or more processors with access to one or morememory 514 that can store instructions, code and the like that isimplemented by the control circuit and/or processors to implementintended functionality. In some applications, the control circuit and/ormemory may be distributed over a communications network (e.g., LAN, WAN,Internet) providing distributed and/or redundant processing andfunctionality. Again, the system 500 may be used to implement one ormore of the above or below, or parts of, components, circuits, systems,processes and the like. For example, the system 500 may implement thesystem for securing access to storage and retrieval systems usingdecentralized biometric authentication data with the user interfaceproduct 102 and/or the control circuit 106 being the control circuit512.

The user interface 516 can allow a user to interact with the system 500and receive information through the system. In some instances, the userinterface 516 includes a display 522 and/or one or more user inputs 524,such as buttons, touch screen, track ball, keyboard, mouse, etc., whichcan be part of or wired or wirelessly coupled with the system 500.Typically, the system 500 further includes one or more communicationinterfaces, ports, transceivers 520 and the like allowing the system 500to communicate over a communication bus, a distributed computer and/orcommunication network (e.g., a local area network (LAN), the Internet,wide area network (WAN), etc.), communication link 518, other networksor communication channels with other devices and/or other suchcommunications or combination of two or more of such communicationmethods. Further the transceiver 520 can be configured for wired,wireless, optical, fiber optical cable, satellite, or other suchcommunication configurations or combinations of two or more of suchcommunications. Some embodiments include one or more input/output (I/O)interface 534 that allow one or more devices to couple with the system500. The I/O interface can be substantially any relevant port orcombinations of ports, such as but not limited to USB, Ethernet, orother such ports. The I/O interface 534 can be configured to allow wiredand/or wireless communication coupling to external components. Forexample, the I/O interface can provide wired communication and/orwireless communication (e.g., Wi-Fi, Bluetooth, cellular, RF, and/orother such wireless communication), and in some instances may includeany known wired and/or wireless interfacing device, circuit and/orconnecting device, such as but not limited to one or more transmitters,receivers, transceivers, or combination of two or more of such devices.

In some embodiments, the system may include one or more sensors 526 toprovide information to the system and/or sensor information that iscommunicated to another component, such as the user interface product,the control circuit, the user device, the computer readable storagemedium, the SRS, the vehicle control system, etc. The sensors caninclude substantially any relevant sensor, such as temperature sensors,distance measurement sensors (e.g., optical units, sound/ultrasoundunits, etc.), optical based scanning sensors to sense and read opticalpatterns (e.g., bar codes), radio frequency identification (RFID) tagreader sensors capable of reading RFID tags in proximity to the sensor,and other such sensors. The foregoing examples are intended to beillustrative and are not intended to convey an exhaustive listing of allpossible sensors. Instead, it will be understood that these teachingswill accommodate sensing any of a wide variety of circumstances in agiven application setting.

The system 500 comprises an example of a control and/or processor-basedsystem with the control circuit 512. Again, the control circuit 512 canbe implemented through one or more processors, controllers, centralprocessing units, logic, software and the like. Further, in someimplementations the control circuit 512 may provide multiprocessorfunctionality.

The memory 514, which can be accessed by the control circuit 512,typically includes one or more processor readable and/or computerreadable media accessed by at least the control circuit 512, and caninclude volatile and/or nonvolatile media, such as RAM, ROM, EEPROM,flash memory and/or other memory technology. Further, the memory 514 isshown as internal to the control system 510; however, the memory 514 canbe internal, external or a combination of internal and external memory.Similarly, some or all of the memory 514 can be internal, external or acombination of internal and external memory of the control circuit 512.The external memory can be substantially any relevant memory such as,but not limited to, solid-state storage devices or drives, hard drive,one or more of universal serial bus (USB) stick or drive, flash memorysecure digital (SD) card, other memory cards, and other such memory orcombinations of two or more of such memory, and some or all of thememory may be distributed at multiple locations over the computernetwork. The memory 514 can store code, software, executables, scripts,data, content, lists, programming, programs, log or history data, userinformation, customer information, product information, and the like.While FIG. 5 illustrates the various components being coupled togethervia a bus, it is understood that the various components may actually becoupled to the control circuit and/or one or more other componentsdirectly.

Descriptions of some embodiments of blockchain technology are providedwith reference to FIG. 1-5 herein. In some embodiments of the inventiondescribed above, blockchain technology may be utilized to recordcustomer orders and/or to secure access to storage and retrieval systemsusing decentralized biometric authentication data through a blockchainnetwork. One or more of the system for securing access to storage andretrieval systems using decentralized biometric authentication datadescribed herein may comprise a node in a distributed blockchain systemstoring a copy of the blockchain record. Updates to the blockchain maycomprise transfer of items for delivery, customer orders for the items,transfer of chain of custody of the items, authentication to deliverand/or receive of the items and one or more nodes on the system may beconfigured to incorporate one or more updates into blocks to add to thedistributed database.

Distributed database and shared ledger database generally refer tomethods of peer-to-peer record keeping and authentication in whichrecords are kept at multiple nodes in the peer-to-peer network insteadof kept at a trusted party. A blockchain may generally refer to adistributed database that maintains a growing list of records in whicheach block contains a hash of some or all previous records in the chainto secure the record from tampering and unauthorized revision. A hashgenerally refers to a derivation of original data. In some embodiments,the hash in a block of a blockchain may comprise a cryptographic hashthat is difficult to reverse and/or a hash table. Blocks in a blockchainmay further be secured by a system involving one or more of adistributed timestamp server, cryptography, public/private keyauthentication and encryption, proof standard (e.g. proof-of-work,proof-of-stake, proof-of-space), and/or other security, consensus, andincentive features. In some embodiments, a block in a blockchain maycomprise one or more of a data hash of the previous block, a timestamp,a cryptographic nonce, a proof standard, and a data descriptor tosupport the security and/or incentive features of the system.

In some embodiments, a blockchain system comprises a distributedtimestamp server comprising a plurality of nodes configured to generatecomputational proof of record integrity and the chronological order ofits use for content, trade, and/or as a currency of exchange through apeer-to-peer network. In some embodiments, when a blockchain is updated,a node in the distributed timestamp server system takes a hash of ablock of items to be timestamped and broadcasts the hash to other nodeson the peer-to-peer network. The timestamp in the block serves to provethat the data existed at the time in order to get into the hash. In someembodiments, each block includes the previous timestamp in its hash,forming a chain, with each additional block reinforcing the ones beforeit. In some embodiments, the network of timestamp server nodes performsthe following steps to add a block to a chain: 1) new activities arebroadcasted to all nodes, 2) each node collects new activities into ablock, 3) each node works on finding a difficult proof-of-work for itsblock, 4) when a node finds a proof-of-work, it broadcasts the block toall nodes, 5) nodes accept the block only if activities are authorized,and 6) nodes express their acceptance of the block by working oncreating the next block in the chain, using the hash of the acceptedblock as the previous hash. In some embodiments, nodes may be configuredto consider the longest chain to be the correct one and work onextending it. A digital currency implemented on a blockchain system isdescribed by Satoshi Nakamoto in “Bitcoin: A Peer-to-Peer ElectronicCash System” (http://bitcoin.org/bitcoin. pdf), the entirety of which isincorporated herein by reference.

Now referring to FIG. 6, an illustration of a blockchain according tosome embodiments is shown. In some embodiments, a blockchain comprises ahash chain or a hash tree in which each block added in the chaincontains a hash of the previous block. In FIG. 6, block 0 600 representsa genesis block of the chain. Block 1 610 contains a hash of block 0600, block 2 620 contains a hash of block 1 610, block 3 630 contains ahash of block 2 620, and so forth. Continuing down the chain, block Ncontains a hash of block N−1. In some embodiments, the hash may comprisethe header of each block. Once a chain is formed, modifying or tamperingwith a block in the chain would cause detectable disparities between theblocks. For example, if block 1 is modified after being formed, block 1would no longer match the hash of block 1 in block 2. If the hash ofblock 1 in block 2 is also modified in an attempt to cover up the changein block 1, block 2 would not then match with the hash of block 2 inblock 3. In some embodiments, a proof standard (e.g. proof-of-work,proof-of-stake, proof-of-space, etc.) may be required by the system whena block is formed to increase the cost of generating or changing a blockthat could be authenticated by the consensus rules of the distributedsystem, making the tampering of records stored in a blockchaincomputationally costly and essentially impractical. In some embodiments,a blockchain may comprise a hash chain stored on multiple nodes as adistributed database and/or a shared ledger, such that modifications toany one copy of the chain would be detectable when the system attemptsto achieve consensus prior to adding a new block to the chain. In someembodiments, a block may generally contain any type of data and record.In some embodiments, each block may comprise a plurality of transactionand/or activity records.

In some embodiments, blocks may contain rules and data for authorizingdifferent types of actions and/or parties who can take action. In someembodiments, transaction and block forming rules may be part of thesoftware algorithm on each node. When a new block is being formed, anynode on the system can use the prior records in the blockchain to verifywhether the requested action is authorized. For example, a block maycontain a public key of an owner of an asset that allows the owner toshow possession and/or transfer the asset using a private key. Nodes mayverify that the owner is in possession of the asset and/or is authorizedto transfer the asset based on prior transaction records when a blockcontaining the transaction is being formed and/or verified. In someembodiments, rules themselves may be stored in the blockchain such thatthe rules are also resistant to tampering once created and hashed into ablock. In some embodiments, the blockchain system may further includeincentive features for nodes that provide resources to form blocks forthe chain. For example, in the Bitcoin system, “miners’ are nodes thatcompete to provide proof-of-work to form a new block, and the firstsuccessful miner of a new block earns Bitcoin currency in return.

Now referring to FIG. 7, an illustration of blockchain basedtransactions according to some embodiments is shown. In someembodiments, the blockchain illustrated in FIG. 7 comprises a hash chainprotected by private/public key encryption. Transaction A 710 representsa transaction recorded in a block of a blockchain showing that owner 1(recipient) obtained an asset from owner 0 (sender). Transaction A 710contains owner's 1 public key and owner 0's signature for thetransaction and a hash of a previous block. When owner 1 transfers theasset to owner 2, a block containing transaction B 720 is formed. Therecord of transaction B 720 comprises the public key of owner 2(recipient), a hash of the previous block, and owner 1's signature forthe transaction that is signed with the owner 1's private key 725 andverified using owner 1's public key in transaction A 710. When owner 2transfers the asset to owner 3, a block containing transaction C 730 isformed. The record of transaction C 730 comprises the public key ofowner 3 (recipient), a hash of the previous block, and owner 2'ssignature for the transaction that is signed by owner 2's private key735 and verified using owner 2's public key from transaction B 720. Insome embodiments, when each transaction record is created, the systemmay check previous transaction records and the current owner's privateand public key signature to determine whether the transaction is valid.In some embodiments, transactions are be broadcasted in the peer-to-peernetwork and each node on the system may verify that the transaction isvalid prior to adding the block containing the transaction to their copyof the blockchain. In some embodiments, nodes in the system may look forthe longest chain in the system to determine the most up-to-datetransaction record to prevent the current owner from double spending theasset. The transactions in FIG. 7 are shown as an example only. In someembodiments, a blockchain record and/or the software algorithm maycomprise any type of rules that regulate who and how the chain may beextended. In some embodiments, the rules in a blockchain may compriseclauses of a smart contract that is enforced by the peer-to-peernetwork.

Now referring to FIG. 8, a flow diagram according to some embodiments isshown. In some embodiments, the steps shown in FIG. 8 may be performedby a processor-based device, such as a computer system, a server, adistributed server, a timestamp server, a blockchain node, and the like.In some embodiments, the steps in FIG. 8 may be performed by one or moreof the nodes in a system using blockchain for record keeping.

In step 801, a node receives a new activity. The new activity maycomprise an update to the record being kept in the form of a blockchain.In some embodiments, for blockchain supported digital or physical assetrecord keeping, the new activity may comprise an asset transaction. Insome embodiments, the new activity may be broadcasted to a plurality ofnodes on the network prior to step 801. In step 802, the node works toform a block to update the blockchain. In some embodiments, a block maycomprise a plurality of activities or updates and a hash of one or moreprevious block in the blockchain. In some embodiments, the system maycomprise consensus rules for individual transactions and/or blocks andthe node may work to form a block that conforms to the consensus rulesof the system. In some embodiments, the consensus rules may be specifiedin the software program running on the node. For example, a node may berequired to provide a proof standard (e.g. proof of work, proof ofstake, etc.) which requires the node to solve a difficult mathematicalproblem for form a nonce in order to form a block. In some embodiments,the node may be configured to verify that the activity is authorizedprior to working to form the block. In some embodiments, whether theactivity is authorized may be determined based on records in the earlierblocks of the blockchain itself.

After step 802, if the node successfully forms a block in step 805 priorto receiving a block from another node, the node broadcasts the block toother nodes over the network in step 806. In some embodiments, in asystem with incentive features, the first node to form a block may bepermitted to add incentive payment to itself in the newly formed block.In step 820, the node then adds the block to its copy of the blockchain.In the event that the node receives a block formed by another node instep 803 prior to being able to form the block, the node works to verifythat the activity recorded in the received block is authorized in step804. In some embodiments, the node may further check the new blockagainst system consensus rules for blocks and activities to verifywhether the block is properly formed. If the new block is notauthorized, the node may reject the block update and return to step 802to continue to work to form the block. If the new block is verified bythe node, the node may express its approval by adding the received blockto its copy of the blockchain in step 820. After a block is added, thenode then returns to step 801 to form the next block using the newlyextended blockchain for the hash in the new block.

In some embodiments, in the event one or more blocks having the sameblock number is received after step 820, the node may verify the laterarriving blocks and temporarily store these block if they passverification. When a subsequent block is received from another node, thenode may then use the subsequent block to determine which of theplurality of received blocks is the correct/consensus block for theblockchain system on the distributed database and update its copy of theblockchain accordingly. In some embodiments, if a node goes offline fora time period, the node may retrieve the longest chain in thedistributed system, verify each new block added since it has beenoffline, and update its local copy of the blockchain prior to proceedingto step 801.

Now referring to FIG. 9, a process diagram of a blockchain updateaccording to some implementations is shown. In step 901, party Ainitiates the transfer of a digitized item to party B. In someembodiments, the digitized item may comprise a digital currency, adigital asset, a document, rights to a physical asset, etc. In someembodiments, Party A may prove that he has possession of the digitizeditem by signing the transaction with a private key that may be verifiedwith a public key in the previous transaction of the digitized item. Instep 902, the exchange initiated in step 901 is represented as a block.In some embodiments, the transaction may be compared with transactionrecords in the longest chain in the distributed system to verify partA's ownership. In some embodiments, a plurality of nodes in the networkmay compete to form the block containing the transaction record. In someembodiments, nodes may be required to satisfy proof-of-work by solving adifficult mathematical problem to form the block. In some embodiments,other methods of proof such as proof-of-stake, proof-of-space, etc. maybe used in the system. In some embodiments, the node that is first toform the block may earn a reward for the task as incentive. For example,in the Bitcoin system, the first node to provide prove of work to forblock the may earn a Bitcoin. In some embodiments, a block may compriseone or more transactions between different parties that are broadcastedto the nodes. In step 903, the block is broadcasted to parties in thenetwork. In step 904, nodes in the network approve the exchange byexamining the block that contains the exchange. In some embodiments, thenodes may check the solution provided as proof-of-work to approve theblock. In some embodiments, the nodes may check the transaction againstthe transaction record in the longest blockchain in the system to verifythat the transaction is valid (e.g. party A is in possession of theasset he/she s seeks to transfer). In some embodiments, a block may beapproved with consensus of the nodes in the network. After a block isapproved, the new block 906 representing the exchange is added to theexisting chain 905 comprising blocks that chronologically precede thenew block 906. The new block 906 may contain the transaction(s) and ahash of one or more blocks in the existing chain 905. In someembodiments, each node may then update their copy of the blockchain withthe new block and continue to work on extending the chain withadditional transactions. In step 907, when the chain is updated with thenew block, the digitized item is moved from party A to party B.

Now referring to FIG. 10, a diagram of a blockchain according to someembodiments in shown. FIG. 10 comprises an example of an implementationof a blockchain system for delivery service record keeping. The deliveryrecord 1000 comprises digital currency information, address information,transaction information, and a public key associated with one or more ofa sender, a courier, and a buyer. In some embodiments, nodes associatedthe sender, the courier, and the buyer may each store a copy of thedelivery record 1010, 1020, and 1030 respectively. In some embodiments,the delivery record 1000 comprises a public key that allows the sender,the courier, and/or the buyer to view and/or update the delivery record1000 using their private keys 1015, 1025, and the 1035 respectively. Forexample, when a package is transferred from a sender to the courier, thesender may use the sender's private key 1015 to authorize the transferof a digital asset representing the physical asset from the sender tothe courier and update the delivery record with the new transaction. Insome embodiments, the transfer from the seller to the courier mayrequire signatures from both the sender and the courier using theirrespective private keys. The new transaction may be broadcasted andverified by the sender, the courier, the buyer, and/or other nodes onthe system before being added to the distributed delivery recordblockchain. When the package is transferred from the courier to thebuyer, the courier may use the courier's private key 1025 to authorizethe transfer of the digital asset representing the physical asset fromthe courier to the buyer and update the delivery record with the newtransaction. In some embodiments, the transfer from the courier to thebuyer may require signatures from both the courier and the buyer usingtheir respective private keys. The new transaction may be broadcastedand verified by the sender, the courier, the buyer, and/or other nodeson the system before being added to the distributed delivery recordblockchain.

With the scheme shown in FIG. 10, the delivery record may be updated byone or more of the sender, courier, and the buyer to form a record ofthe transaction without a trusted third party while preventingunauthorized modifications to the record. In some embodiments, theblockchain based transactions may further function to include transfersof digital currency with the completion of the transfer of physicalasset. With the distributed database and peer-to-peer verification of ablockchain system, the sender, the courier, and the buyer can each haveconfidence in the authenticity and accuracy of the delivery recordstored in the form of a blockchain.

Now referring to FIG. 11, a system according to some embodiments isshown. A distributed blockchain system comprises a plurality of nodes1110 communicating over a network 1120. In some embodiments, the nodes1110 may be comprise a distributed blockchain server and/or adistributed timestamp server. In some embodiments, one or more nodes1110 may comprise or be similar to a “miner” device on the Bitcoinnetwork. Each node 1110 in the system comprises a network interface1111, a control circuit 1112, and a memory 1113.

The control circuit 1112 may comprise a processor, a microprocessor, andthe like and may be configured to execute computer readable instructionsstored on a computer readable storage memory 1113. The computer readablestorage memory may comprise volatile and/or nonvolatile memory and havestored upon it a set of computer readable instructions which, whenexecuted by the control circuit 1112, causes the node 1110 update theblockchain 1114 stored in the memory 1113 based on communications withother nodes 1110 over the network 1120. In some embodiments, the controlcircuit 1112 may further be configured to extend the blockchain 1114 byprocessing updates to form new blocks for the blockchain 1114.Generally, each node may store a version of the blockchain 1114, andtogether, may form a distributed database. In some embodiments, eachnode 1110 may be configured to perform one or more steps described withreference to FIGS. 8-9 herein.

The network interface 1111 may comprise one or more network devicesconfigured to allow the control circuit to receive and transmitinformation via the network 1120. In some embodiments, the networkinterface 1111 may comprise one or more of a network adapter, a modem, arouter, a data port, a transceiver, and the like. The network 1120 maycomprise a communication network configured to allow one or more nodes1110 to exchange data. In some embodiments, the network 1120 maycomprise one or more of the Internet, a local area network, a privatenetwork, a virtual private network, a home network, a wired network, awireless network, and the like. In some embodiments, the system does notinclude a central server and/or a trusted third party system. Each nodein the system may enter and leave the network at any time.

With the system and processes shown in, once a block is formed, theblock cannot be changed without redoing the work to satisfy census rulesthereby securing the block from tampering. A malicious attacker wouldneed to provide proof standard for each block subsequent to the onehe/she seeks to modify, race all other nodes, and overtake the majorityof the system to affect change to an earlier record in the blockchain.

In some embodiments, blockchain may be used to support a payment systembased on cryptographic proof instead of trust, allowing any two willingparties to transact directly with each other without the need for atrusted third party. Bitcoin is an example of a blockchain backedcurrency. A blockchain system uses a peer-to-peer distributed timestampserver to generate computational proof of the chronological order oftransactions. Generally, a blockchain system is secure as long as honestnodes collectively control more processing power than any cooperatinggroup of attacker nodes. With a blockchain, the transaction records arecomputationally impractical to reverse. As such, sellers are protectedfrom fraud and buyers are protected by the routine escrow mechanism.

In some embodiments, a blockchain may use to secure digital documentssuch as digital cash, intellectual property, private financial data,chain of title to one or more rights, real property, digital wallet,digital representation of rights including, for example, a license tointellectual property, digital representation of a contractualrelationship, medical records, security clearance rights, backgroundcheck information, passwords, access control information for physicaland/or virtual space, and combinations of one of more of the foregoingthat allows online interactions directly between two parties withoutgoing through an intermediary. With a blockchain, a trusted third partyis not required to prevent fraud. In some embodiments, a blockchain mayinclude peer-to-peer network timestamped records of actions such asaccessing documents, changing documents, copying documents, savingdocuments, moving documents, or other activities through which thedigital content is used for its content, as an item for trade, or as anitem for remuneration by hashing them into an ongoing chain ofhash-based proof-of-work to form a record that cannot be changed inaccord with that timestamp without redoing the proof-of-work.

In some embodiments, in the peer-to-peer network, the longest chainproves the sequence of events witnessed, proves that it came from thelargest pool of processing power, and that the integrity of the documenthas been maintained. In some embodiments, the network for supportingblockchain based record keeping requires minimal structure. In someembodiments, messages for updating the record are broadcast on abest-effort basis. Nodes can leave and rejoin the network at will andmay be configured to accept the longest proof-of-work chain as proof ofwhat happened while they were away.

In some embodiments, a blockchain based system allows content use,content exchange, and the use of content for remuneration based oncryptographic proof instead of trust, allowing any two willing partiesto employ the content without the need to trust each other and withoutthe need for a trusted third party. In some embodiments, a blockchainmay be used to ensure that a digital document was not altered after agiven timestamp, that alterations made can be followed to a traceablepoint of origin, that only people with authorized keys can access thedocument, that the document itself is the original and cannot beduplicated, that where duplication is allowed and the integrity of thecopy is maintained along with the original, that the document creatorwas authorized to create the document, and/or that the document holderwas authorized to transfer, alter, or otherwise act on the document.

As used herein, in some embodiments, the term blockchain may refer toone or more of a hash chain, a hash tree, a distributed database, and adistributed ledger. In some embodiments, blockchain may further refer tosystems that uses one or more of cryptography, private/public keyencryption, proof standard, distributed timestamp server, and inventiveschemes to regulate how new blocks may be added to the chain. In someembodiments, blockchain may refer to the technology that underlies theBitcoin system, a “sidechain” that uses the Bitcoin system forauthentication and/or verification, or an alternative blockchain(“altchain”) that is based on bitcoin concept and/or code but aregenerally independent of the Bitcoin system.

Descriptions of embodiments of blockchain technology are provided hereinas illustrations and examples only. The concepts of the blockchainsystem may be variously modified and adapted for different applications

Those skilled in the art will recognize that a wide variety of othermodifications, alterations, and combinations can also be made withrespect to the above described embodiments without departing from thescope of the invention, and that such modifications, alterations, andcombinations are to be viewed as being within the ambit of the inventiveconcept.

What is claimed is:
 1. A system for securing access to storage andretrieval systems using decentralized biometric authentication datathrough a blockchain network comprising: a user device coupled to ablockchain network and comprising one or more biometric sensors, atleast one location sensor, a transceiver, and a control circuitoperatively coupled to the user interface product; a user interfaceproduct operable on the user device and cooperatively coupled with thecontrol circuit, wherein the user interface product is adapted toenhance decentralized biometric authentication through the blockchainnetwork by being configured to: receive, at a first time, from the oneor more biometric sensors a first one or more biometric data of a userassociated with the user device; receive, at the first time, from the atleast one location sensor near real-time location data associated withthe first one or more biometric data; receive, via the transceiver, fromat least one computer server coupled to the blockchain network a tokencomprising a second one or more biometric data of the user; determinecooperatively with the control circuit, at the first time, whether thefirst one or more biometric data matches within a threshold with thesecond one or more biometric data; determine cooperatively with thecontrol circuit, at the first time, whether the first one or morebiometric data and the second one or more biometric data are associatedwith the user device; determine cooperatively with the control circuit,at the first time, whether the near real-time location data receivedfrom the at least one location sensor is within a threshold distancefrom a storage and retrieval system (SRS) associated with the user; andprovide, at the first time via the transceiver, data associated withunlocking the SRS based on the determination that: the first one or morebiometric data matches within the threshold with the second one or morebiometric data; the near real-time location data is within the thresholddistance from the SRS; and the first one or more biometric data and thesecond one or more biometric data are associated with the user device;and the SRS operatively coupled to the user device, the SRS comprisingan opening to a storage area adapted to receive one or more items fordelivery, a cover mechanism to prevent access to the opening, and areceiver configured to receive the data associated with unlocking theSRS via a release of the cover mechanism.
 2. The system of claim 1,wherein the data associated with unlocking the SRS is provided to theSRS through the blockchain network thereby validating authenticity ofthe data received by the SRS.
 3. The system of claim 1, wherein the dataassociated with unlocking the SRS is provided to the SRS through awireless network.
 4. The system of claim 3, wherein the wireless networkcomprises a Bluetooth wireless network.
 5. The system of claim 1,wherein the first one or more biometric data and the second one or morebiometric data comprise at least one of the user's particular strideposture, gait, subconscious movements, and mannerism.
 6. The system ofclaim 1, wherein the user interface product is further configured to:trigger, at the first time, the receipt of the first one or morebiometric data when the user initiates use of the user interfaceproduct; and trigger, at the first time, the receipt of the nearreal-time location data.
 7. The system of claim 1, wherein the userinterface product is further configured to: determine cooperatively withthe control circuit one or more patterns of the user's daily routeroutine based on historical location data received over time from the atleast one location sensor; determine cooperatively with the controlcircuit a route taken by the user prior to the first time at same daybased on captured location data received, prior to the first time at thesame day, from the at least one location sensor; and determinecooperatively with the control circuit whether the route taken matcheswith the one or more patterns of the user's daily route routine, whereinthe provided data associated with unlocking the SRS is further based onthe determination that the route taken matches with the one or morepatterns of the user's daily route routine.
 8. The system of claim 1,wherein the user interface product is further configured to: determinecooperatively with the control circuit whether a vehicle paired with theuser device during the first time is within a threshold distance fromthe SRS, wherein the provided data associated with unlocking the SRS isfurther based on the determination that the vehicle paired with the userdevice is within the threshold distance from the SRS.
 9. The system ofclaim 1, wherein the user interface product is further configured totrigger, at the first time, the receipt of the first one or morebiometric data in response to the determination that the near real-timelocation data received from the at least one location sensor is withinthe threshold distance from the SRS.
 10. The system of claim 1, whereinthe token further comprises a first identification data associated withthe user device, wherein the user interface product is furtherconfigured to: determine, at the first time, a second identificationdata associated with the user device; determine cooperatively with thecontrol circuit, at the first time, whether the first identificationdata matches with the second identification data; and provide, at thefirst time via the transceiver, second data indicating that the firstidentification data matches with the second identification data to theSRS, and wherein the release of the cover mechanism of the SRS is inresponse to the receipt of the data associated with unlocking the SRSand the second data.
 11. The system of claim 10, wherein the dataassociated with unlocking the SRS and the second data are provided tothe SRS through Bluetooth wireless network.
 12. A computer programproduct embodied on a computer readable storage medium for enhancingdecentralized biometric authentication through a blockchain networkcomprising: computer code for receiving from one or more biometricsensors a first one or more biometric data of a user associated with auser device, the user device includes the computer readable storagemedium; computer code for receiving from at least one location sensorassociated with the user device near real-time location data associatedwith the first one or more biometric data; computer code for receivingfrom at least one computer server coupled to a blockchain network atoken comprising a second one or more biometric data of the user;computer code for determining whether the first one or more biometricdata matches with the second one or more biometric data; computer codefor determining whether the first one or more biometric data and thesecond one or more biometric data are associated with the user device;computer code for determining whether the near real-time location datareceived from the at least one location sensor is within a thresholddistance from a storage and retrieval system (SRS) associated with theuser; computer code for determining that: the first one or morebiometric data matches with the second one or more biometric data; thenear real-time location data is within the threshold distance from theSRS; and the first one or more biometric data and the second one or morebiometric data are associated with the user device; and computer codefor providing data associated with unlocking the SRS based on thedetermination that: the first one or more biometric data matches withthe second one or more biometric data; the near real-time location datais within the threshold distance from the SRS; and the first one or morebiometric data and the second one or more biometric data are associatedwith the user device.
 13. The computer program product of claim 12,wherein the one or more biometric sensors that provides the first one ormore biometric data of the user is associated with the user device. 14.The computer program product of claim 12, wherein the data associatedwith unlocking the SRS is provided to the SRS through the blockchainnetwork.
 15. The computer program product of claim 12, wherein the dataassociated with unlocking the SRS is provided to the SRS through awireless network.
 16. The computer program product of claim 15, whereinthe wireless network comprises a Bluetooth wireless network.
 17. Thecomputer program product of claim 12, further comprising: computer codefor triggering the receiving of the first one or more biometric datawhen the user initiates use of a user interface product associated withthe computer program product; and computer code for triggering thereceiving of the near real-time location data.
 18. The computer programproduct of claim 12, further comprising: computer code for determiningone or more patterns of the user's daily route routine based onhistorical location data received over time from the at least onelocation sensor; computer code for determining a route taken by the userbased on captured location data received from the at least one locationsensor; and computer code for determining whether the route takenmatches with the one or more patterns of the user's daily route routine,wherein the provided data associated with unlocking the SRS is furtherbased on the determination that the route taken matches with the one ormore patterns of the user's daily route routine.
 19. The computerprogram product of claim 12, further comprising computer code fordetermining whether a vehicle paired with the user device during a firsttime is within a threshold distance from the SRS, wherein the provideddata associated with unlocking the SRS is further based on thedetermination that the vehicle paired with the user device is within thethreshold distance from the SRS.
 20. The computer program product ofclaim 12, further comprising: computer code for determining a firstidentification data associated with the user device, wherein the tokenfurther comprises a second identification data associated with the userdevice; computer code for determining cooperatively with a controlcircuit whether the first identification data matches with the secondidentification data; and computer code for providing to the SRS, via atransceiver and through the blockchain network, second data indicatingthat the first identification data matches with the secondidentification data, wherein the second data associated with unlockingthe SRS is provided to the SRS through the blockchain network.