AUTOMATED TRANSACTION MACHINE WITH ASSOCIATED BEACON
20170344965 · 2017-11-30
Assignee
Inventors
- Devon WATSON (North Canton, OH, US)
- Douglas HARTUNG (Kingwood, TX, US)
- Vanessa GAGNON (Stow, OH, US)
- Gregory SHIMEK (Akron, OH, US)
- Gary A. GANGER (Uniontown, OH, US)
Cpc classification
G07C9/00182
PHYSICS
International classification
Abstract
An Automated Transaction Machine (ATM) is associated with a beacon. The beacon may communicate with an electronic device running a software application that is configured to detect the beacon. The software application may have a reaction based upon the detection of the beacon. The ATM or related systems may respond to data directly or indirectly from the software application to make a customization or take other action based there on.
Claims
1. A system comprising: a secure area with a secure entry; an automated transaction machine disposed within the secure area; and a beacon associated with the automated transaction machine, wherein the secure entry is responsive to a command generated at least in part due to an electronic device running a software application being in communication proximity with the beacon.
2. The system of claim 1 where the command is generated by a server receiving data from the electronic device.
3. The system of claim 2 where the data includes at least one of a unique identification of and location of the electronic device, the software application, a customer, the beacon, or the automated transaction machine.
4. The system of claim 1 where the secured are is a vestibule and the secure entry is a secure door.
5. The system of claim 4 where the command is generated by a server receiving data from the electronic device, where the data includes a request to access the vestibule, and where the command includes an instruction to unlock the secure door.
6. A system comprising: an automated transaction machine; a beacon associated with the automated transaction machine; a server responsive to data from an electronic device running a software application, where said data is sent to the server when the electronic device is within communication range of the beacon.
7. The system of claim 6 where the automated transaction machine includes a display, where the data includes user correlated data, and where in response to the server receiving the data the server causes the display to present information tailored to the user.
8. The system of claim 7, where the server is configured to cause the display to present information once the electronic device is determined to be within a predetermined distance from the beacon.
9. The system of claim 6 further comprising a secure area with a secure entry with the automated transaction machine disposed within the secure area; and where the server is operable to send an unlock instruction to the secure entry in response to the data received from the electronic device.
10. A system comprising: an automated transaction machine; a beacon associated with the automated transaction machine; and a server in operative communication with a database; wherein when an electronic device running a software application that is configured to detect the electronic device approaches the beacon, and the wireless device sends wireless data to the server including at least being with in a communication range of the beacon, the server updates the database based upon the data.
11. The system of claim 10 where the data includes a unique identifier correlated to at least one of the electronic device, the software application, or a user of the electronic device or software application.
12. The system of claim 11, where the automated transaction machine includes a display, and where the server is configured to send one or more of the group consisting of advertisement material and information based, at least in part, on the data, to the display.
13. The system of claim 11, where the server is configured to send one or more of the group consisting of advertisement material and information to a device selected from the group consisting of a tablet, a smart screen, a smart glass, or a smart device associated with the user, where the advertisement material or information is based, at least in part, on the data.
14. The system of claim 10, wherein, in response to the data, the server is configured to implement privacy enhancements that include making at least partially opaque at least a portion of one or more of the group consisting of a display, a tablet, a smart screen, or a smart glass associated with the automated transaction machine.
15. The system of claim 11, further comprising: an intelligent display device capable of receiving instructions from the server tailored to the user, and wherein the server is configured to change displayed content based, at least in part, on some of the data in the database.
16. The system of claim 12, wherein the server is configured to prompt the user with a message on the display of the automated transaction machine to determine where the customer desires having information to be sent to them, and where the server sends the information to at least one of the group consisting of the display, a tablet, a smart screen, a smart glass, a phone and the electronic device depending upon the selection of the user.
17. A system comprising: a geo-fencing system defining a geo-fenced area; an automated transaction machine inside the geo-fenced area; and a server responsive to communication from an electronic device that is configured to detect the geo-fenced area containing the automated transaction machine to send instructions to the automated transaction machine.
18. The system of claim 17 where the communication includes user identifying information.
19. A method of opening access to an area containing an automated transaction machine, the method comprising: providing a beacon associated with an automated transaction machine located in a secure area; receiving with a server, data from an electronic device within communication range of the beacon; sending from the server instruction to unlock a secured entry to the secured area.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021] Similar numerical identifiers are intended to refer to similar elements throughout the drawings.
DETAILED DESCRIPTION
[0022]
[0023] The system 100 further includes a beacon 1 and a server 9 that may be an access control server or another type of server. The beacon 1 is illustrated as separate from the ATM 11 and outside the secure area 12, although neither are recurred. For example, the beacon 1 may be coupled to or integrated with the ATM 11 and the beacon 1 may be within or without the secure area 12.
[0024] In the present example, the server 9 is in communication with the door 14. In one embodiment, the beacon 1 emits electromagnetic radiation of a desired frequency or frequencies and with a desired power. In other configurations, the beacon 1 may transmit coded information such as a unique number sequence on a modulated carrier and an electronic device 3, discussed below, may decode this signal to extract the number sequence to determine if beacon 1 is of interest to the customer using the electronic device 3. It must be appreciated that other types of beacons may be used in other embodiments and in some embodiments the beacon 1 and an access control server 9 may communicate with each other. For example, in at least one instance the beacon 1 maybe a passive beacon only responding to calls from a requesting device.
[0025] The server 9 may contain a processor 10 or other logic allowing the server 9 to execute tangible software instructions that are read from memory and to perform other functions. “Processor” and “Logic”, as used herein, includes but is not limited to hardware, firmware, software, and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. For example, based on a desired application or needs, logic and/or processor may include a software-controlled microprocessor, discrete logic, an application specific integrated circuit (ASIC), a programmed logic device, a memory device containing instructions or the like. Logic and/or processor may include one or more gates, combinations of gates, or other circuit components. Logic and/or a processor may also be fully embodied as software. Where multiple logics and/or processors are described, it may be possible to incorporate the multiple logics and/or processors into one physical logic (or processors). Similarly, where a single logic and/or processor is described, it may be possible to distribute that single logic and/or processor between multiple physical logics and/or processors.
[0026]
[0027] Generally describing an example configuration of the computer 200, the processor 202 may be a variety of various processors including dual microprocessor and other multi-processor architectures. The memory 204 may include volatile memory and/or non-volatile memory. Non-volatile memory may include, for example, ROM, PROM, EPROM, and EEPROM. Volatile memory may include, for example, RAM, synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), direct RAM bus RAM (DRRAM) and the like.
[0028] A disk 206 may be operably connected to the computer 200 via, for example, an input/output interface (e.g., card, device) 218 and an input/output port 210. Disk 206 may be, for example, a magnetic disk drive, a solid-state disk drive, a floppy disk drive, a tape drive, a Zip drive, a flash memory card, and/or a memory stick. Furthermore, the disk 206 may be a CD-ROM, a CD recordable drive (CD-R drive), a CD rewriteable drive (CD-RW drive), and/or a digital video ROM drive (DVD ROM). The memory 204 can store a process 214 and/or a data 216, for example. The disk 206 and/or the memory 204 can store an operating system that controls and allocates resources of the computer 200.
[0029] The bus 208 may be a single internal bus interconnect architecture and/or other bus or mesh architectures. While a single bus is illustrated, it is to be appreciated that the computer 200 may communicate with various devices, logics, and peripherals using other busses (e.g., PCIE, SATA, Infiniband, 1384, USB, Ethernet). The bus 208 can be types including, for example, a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus.
[0030] The computer 200 may interact with input/output devices via the input/output interfaces 218 and the input/output ports 210. Input/output devices may be, for example, a keyboard, a microphone, a pointing and selection device, cameras, video cards, displays, the disk 206, the network devices 220, and so on. The input/output ports 210 may include, for example, serial ports, parallel ports, USB ports, and the like.
[0031] The computer 200 can operate in a network environment and thus may be connected to network devices 220 via input/output interfaces 218, and/or the input/output ports 210. Through the network devices 220, the computer 200 may interact with a network. Through the network, the computer 200 may be logically connected to remote computers. Networks with which the computer 200 may interact include, but are not limited to, a local area network (LAN), a wide area network (WAN), and other networks. The networks may be wired and/or wireless networks.
[0032] Returning to
[0033] The system 100, described above, provides for exchanging unique identity information between the customer and the access control server 9 of the system 100. In one embodiment, a customer 7 (
[0034] The electronic device 3 in combination with its software 5 begins to detect the beacon 1 when it is close enough to the beacon 1, e.g. in communication range. As discussed above, the electronic device 3 may detect the beacon 1 by detecting a particular frequency or particular frequencies emitted by the beacon 1, detect an encoded/modulated number sequence that the electronic device 3 decodes in tandem with its software 5, or detects the beacon 1 in another way as desired.
[0035] After the beacon 1 has been detected and its signal decoded, the electronic device 3 with its software 5 may determine if it is of interest. For example, frequencies and/or data periodically transmitted by the beacon 1 may indicate that it is a beacon near the ATM 11. If the beacon 1 is of interest and there is a desire to access the ATM 11, for example, then the electronic device 3 in combination with the software application 5 will communicate a unique identification of the electronic device 3 to the server 9 and request access to the to the vestibule 12/ATM 11. This communication may include a phone ID and a beacon ID, or other identification data related to an electronic device, the software or the user.
[0036] In some embodiments, this communication may be wirelessly directly sent to the access control server 9 or the communication may first be sent to a local antenna (not illustrated) such as a wireless LAN base station antenna before it is then routed to the access control server 9. In another configuration, the electronic device 3 may transmit messages to the beacon 1 and these messages may then be forwarded to the server 9. The communication may be directly between the devices, or indirectly, such as through a series of relays, networks, the internet, or other suitable communications mechanism.
[0037] When the communications are received from the electronic device 3 at the server 9, the server 9 may check to be sure the unique identification is valid and matches the electronic device 3. Any suitable verification method may be used to validate the identification of the electronic device 3 at the server 9. For example, common cryptographic functions and methodologies may be used. Once the server 9 authenticates the electronic device, the server 9 causes data to be sent to a lock on the door 14 to unlock the door 14 when the unique identification indicates the customer with the electronic device (e.g., phone) is authorized to enter the vestibule 12.
[0038] In another configuration, the system 100 will not “automatically” unlock the door 14 of the vestibule 12 upon the electronic device 3 detecting the beacon 1. Instead, when the electronic device 3 detects the beacon 1, the electronic device 3 and its software 5 will first display a message on a screen of the electronic device 3 asking the customer/electronic device holder if they desire to “unlock the vestibule” door 14. If the customer decides to unlock the door then they may click a “yes” button, for example, and the door 14 will be unlocked as discussed above.
[0039] In another configuration, the system 100 of
[0040] Another embodiment is a system 101 that can tailor information and/or advertisements displayed on the ATM or other screens is illustrated in
[0041] In operation, a customer 7 carries the electronic device 3 (e.g., phone) in range of the beacon 1, as the beacon 1 transmits a wireless signal/electromagnetic waves 19 to the electronic device 3 running the software application 5. Upon detecting the wireless signal, the electronic device 3 sends an identity of the customer 7 who owns or is using the electronic device 3 to the access control server 9 so that identity of the customer can be verified and the door 14 may be unlocked as described above. The identity of the customer 7 may also be sent to the media control server 17 where upon verifying the identity is valid the media control server 17 is configured to send data to the monitor 8 (Arrow B) on the ATM to cause the monitor 8 to present information tailored to the customer based, at least in part, on identity of the customer and any prior know information retained about the customer. The media control server 17 may instead or in addition to the monitor 8 send information for display on the wall monitor 24 (Arrow C) and/or a display on the electronic device 3 (Arrow A). The information displayed on these devices may be periodically updated or changed based on how long the customer 7 is in the vestibule 12 or at the ATM 11. However, the updated information may still be personalized to the customer.
[0042]
[0043] Other embodiments of
[0044] In another configuration of the system 102 of
[0045]
[0046] In another configuration, the encounter server 25 may contain a list of appointments for customers scheduled to visit the commercial structure 15. As customers arrive for these appointments, the system 103 of
[0047] In another embodiment, the system 103 tracks the ATM transactional activity of multiple customers with electronic devices. Electronic devices 3 run software 5 to detect the beacon 1. As the electronic devices 3 are carried by customers move within range of the beacon 1, the electronic devices 3 are configured to detect the beacon. Upon detecting the beacon, the electronic devices 3 send a unique identifier to the access control server 9 identifying an electronic device 3 associated with one of the customers 7. Upon authenticating the unique identifiers, the encounter server 25 periodically collects analytical data related to ATM transactions from the electronic devices and/or the ATM and stores this data in the analytic server 23. The analytical data may be one or more of the duration of customer visits at an ATM, time at an ATM, ATM transactional information, and the like. The encounter server 25 generates an alert at the control terminal 27 when one or more of the analytical data fall outside of an acceptable range.
[0048]
[0049] In operation, a customer in possession of the electronic device 53 may roam from area A1 into area A2. Upon making this transition into area A2, the geo-fencing software 55 running in electronic device 53 determines that the electronic device is now in geo-fenced area A2 that also has the vestibule 62 in it. The electronic device 53 and its software 55 also determine that the ATM 61 is located in area A2. Upon detecting the ATM 61 is within geo-fencing area A2, the electronic device 53 sends a message to the server 59 indicating the electronic device 53 is in geo-fenced area A2 with the ATM 63 together with an identification of the electronic device 53. After verifying the identification of the electronic device 53 and its associate customer are permitted inside the vestibule 62, the server 59 causes data to be sent to a lock on the door 64 to unlock the door 64. Of course, in some embodiments the electronic device may prompt the customer via the electronic device after entering area A2 to inquire if they desire to enter the vestibule 62. Only if the customer replies that they do wish to enter the vestibule, the electronic device 53 send a message to the server 59 indicating the electronic device 53 is in geo-fenced area A2 with the ATM 61 together with an identification of the electronic device 53 and request access to the vestibule.
[0050] Example methods may be better appreciated with reference to flow diagrams. While for purposes of simplicity, explanation of the illustrated methodologies are shown and described as a series of blocks. It is to be appreciated that the methodologies are not limited by the order of the blocks, as some blocks can occur in different orders and/or concurrently with other blocks from that shown and described. Moreover, less than all the illustrated blocks may be required to implement an example methodology. Blocks may be combined or separated into multiple components. Furthermore, additional and/or alternative methodologies can employ additional, not illustrated blocks.
[0051]
[0052] While principles and modes of operation have been explained and illustrated with regard to particular embodiments, it must be understood, however, that this may be practiced otherwise than as specifically explained and illustrated without departing from its spirit or scope.