Utilizing a short-range wireless communication device to provide keyless access to a safe deposit box

ABSTRACT

A device receives, from a short-range wireless communication device associated with a safe deposit box, first data identifying a first transaction card, and identifies a bank employee associated with the first data. The device determines whether the bank employee is authorized to access the safe deposit box, and starts a timer when the bank employee is authorized to access the safe deposit box. The device receives, from the short-range wireless communication device, second data identifying a second transaction card, and determines whether the second data is received prior to an expiration of the timer. The device identifies a customer associated with the second data when the second data is received prior to the expiration of the timer, and determines whether the customer is authorized to access the safe deposit box. The device causes the safe deposit box to be unlocked when the customer is authorized.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/446,624, filed Sep. 1, 2021, which is a continuation of U.S. patentapplication Ser. No. 16/656,802, filed Oct. 18, 2019 (now U.S. Pat. No.11,113,907), which is a continuation of U.S. patent application Ser. No.16/425,109, filed May 29, 2019 (now U.S. Pat. No. 10,453,287), which areincorporated herein by reference in their entireties.

BACKGROUND

A safe deposit box, also known as a safety deposit box, is anindividually secured container, usually held within a larger safe orbank vault. Safe deposit boxes are generally located in banks, postoffices, or other institutions. Safe deposit boxes are used to storevaluable possessions, such as gemstones, precious metals, currency,marketable securities, luxury goods, important documents (e.g., wills,property deeds, or birth certificates), computer data that needprotection from theft, fire, flood, tampering, or other perils, and/orthe like.

SUMMARY

According to some implementations, a method may include receiving, froma short-range wireless communication device associated with a safedeposit box, first data identifying a first transaction card, andidentifying a bank employee associated with the first data. The methodmay include determining whether the bank employee is authorized toaccess the safe deposit box, and starting a timer when the bank employeeis authorized to access the safe deposit box. The method may includereceiving, from the short-range wireless communication device, seconddata identifying a second transaction card, and determining whether thesecond data is received prior to an expiration of the timer. The methodmay include identifying a customer associated with the second data whenthe second data is received prior to the expiration of the timer, anddetermining whether the customer is authorized to access the safedeposit box. The method may include causing the safe deposit box to beunlocked when the customer is authorized to access the safe deposit box.

According to some implementations, a device may include one or morememories, and one or more processors, communicatively coupled to the oneor more memories, to receive, from a short-range wireless communicationdevice associated with a safe deposit box, first data identifying afirst user device, and identify a first user associated with the firstdata. The one or more processors may determine whether the first user isauthorized to access the safe deposit box, and may start a timer whenthe first user is authorized to access the safe deposit box. The one ormore processors may receive, from the short-range wireless communicationdevice, second data identifying a second user device, and may determinewhether the second data is received prior to an expiration of the timer.The one or more processors may identify a second user associated withthe second data when the second data is received prior to the expirationof the timer, and may determine whether the second user is authorized toaccess the safe deposit box. The one or more processors may cause thesafe deposit box to be unlocked when the second user is authorized toaccess the safe deposit box.

According to some implementations, a non-transitory computer-readablemedium may store instructions that include one or more instructionsthat, when executed by one or more processors of a device, cause the oneor more processors to receive, from a short-range wireless communicationdevice associated with a safe deposit box, first data identifying afirst transaction card or a first user device, and identify a first userassociated with the first data. The one or more instructions may causethe one or more processors to determine whether the first user isauthorized to access the safe deposit box, and start a timer when thefirst user is authorized to access the safe deposit box. The one or moreinstructions may cause the one or more processors to receive, from theshort-range wireless communication device, second data identifying asecond transaction card or a second user device, and determine whetherthe second data is received prior to an expiration of the timer. The oneor more instructions may cause the one or more processors to identify asecond user associated with the second data when the second data isreceived prior to the expiration of the timer, and determine whether thesecond user is authorized to access the safe deposit box. The one ormore instructions may cause the one or more processors to cause the safedeposit box to be unlocked when the second user is authorized to accessthe safe deposit box.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1F are diagrams of one or more example implementationsdescribed herein.

FIG. 2 is a diagram of an example environment in which systems and/ormethods described herein may be implemented.

FIG. 3 is a diagram of example components of one or more devices of FIG.2 .

FIGS. 4-6 are flow charts of example processes for utilizing ashort-range wireless communication device to provide keyless access to asafe deposit box.

DETAILED DESCRIPTION

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

In order to access a safe deposit box, an owner of the safe deposit box(e.g., a customer of a bank) may request a bank employee to assist thecustomer. The bank employee typically needs to open a bank vaultcontaining the safe deposit box and sign a ledger before attempting toaccess the safe deposit box. The safe deposit box includes a first lockto be unlocked with a key possessed by the customer and a second lock tobe unlocked with a key possessed by the bank employee. Thus, thecustomer and the bank employee need to utilize their respective keys tounlock the first lock and the second lock. Once the safe deposit box isunlocked, the customer may access the contents of the safe deposit box.

Accessing a safe deposit box is time consuming and inconvenient for thecustomer and the bank employee. Both need to ensure they possess theirrespective keys to unlock the safe deposit box, which may require timeand effort to locate the keys. Furthermore, the bank employee is takenaway from other tasks to assist in opening the safe deposit box. Thismay require the bank employee to repeatedly start and stop tasks, whichmay waste computing resources (e.g., processing resources, memoryresources, and/or the like) and/or network resources associated withperforming the tasks.

Some implementations described herein provide a verification platformthat utilizes a short-range wireless communication device to providekeyless access to a safe deposit box. For example, the verificationplatform may receive, from a short-range wireless communication deviceassociated with a safe deposit box, first data identifying a firsttransaction card, and may identify a bank employee associated with thefirst data. The verification platform may determine whether the bankemployee is authorized to access the safe deposit box, and may start atimer when the bank employee is authorized to access the safe depositbox. The verification platform may receive, from the short-rangewireless communication device, second data identifying a secondtransaction card, and may determine whether the second data is receivedprior to an expiration of the timer. The verification platform mayidentify a customer associated with the second data when the second datais received prior to the expiration of the timer, and may determinewhether the customer is authorized to access the safe deposit box. Theverification platform may cause the safe deposit box to be unlocked whenthe customer is authorized to access the safe deposit box.

In this way, the verification platform enables a customer and a bankemployee to access a safe deposit box with an item (e.g., a transactioncard, a user device, and/or the like) that is always available to thecustomer and the bank employee. This reduces the time required to accessthe safe deposit box and provides a more convenient experience for thecustomer and the bank employee. Furthermore, the bank employee does notrepeatedly start and stop tasks, which conserves computing resources(e.g., processing resources, memory resources, and/or the like) and/ornetwork resources that would otherwise be wasted with starting andstopping the tasks.

FIGS. 1A-1F are diagrams of one or more example implementations 100described herein. As shown in FIG. 1A, a first user device (e.g., userdevice 1) may be associated with a safe deposit box, a verificationplatform, a first user (e.g., a bank employee), and a first transactioncard (e.g., transaction card 1). As further shown, the safe deposit boxmay include a locking mechanism and a short-range wireless communicationdevice. In some implementations, the locking mechanism may include anelectromagnetic lock, an electronically-controlled mechanical lock,and/or the like. In some implementations, the short-range wirelesscommunication device may include a near-field communication (NFC)device, a Bluetooth device, an infrared device, an ultraband device, aZigbee device, and/or the like. In some implementations, the short-rangewireless communication device may be embedded within the safe depositbox, may be within a vicinity of the safe deposit box, may communicateeither wirelessly or through a wire, and/or the like. In someimplementations, the first transaction card may include a cardauthorizing the first user to access one or more safe deposit boxeslocated at a bank employing the first user. In some implementations, thefirst user device may include an application authorizing the first userto access the one or more safe deposit boxes located at the bank.

The first user may utilize the first transaction card or the first userdevice to communicate with the short-range wireless communication deviceof the safe deposit box. In some implementations, when the first usergets close enough to the safe deposit box (e.g., within communicationrange of the short-range wireless communication device associated withthe safe deposit box), the first transaction card or the first userdevice may communicate with the short-range wireless communicationdevice associated with the safe deposit box. When the first transactioncard or the first user device communicates with the short-range wirelesscommunication device, the short-range wireless communication device mayprovide, to the verification platform, first data identifying the firsttransaction card or the first user device.

As further shown in FIG. 1A, and by reference number 105, theverification platform may receive, from the short-range wirelesscommunication device of the safe deposit box, the first data identifyingthe first transaction card or the first user device. In someimplementations, the first data may include data identifying the firsttransaction card (e.g., an identification number of the firsttransaction card); the first user (e.g., a name, an employee identifier,etc. of the first user); the one or more safe deposit boxes the firstuser is permitted to access (e.g., identification numbers of the safedeposit boxes, such as “1008” as shown in FIG. 1A); the first userdevice (e.g., a telephone number of the first user device, deviceidentifier, etc.); and/or the like.

As further shown in FIG. 1A, and by reference number 110, theverification platform may identify a bank employee (e.g., the firstuser) associated with the first data. In some implementations, theverification platform may store, in a data structure (e.g., a database,a table, a list, and/or the like) associated with the verificationplatform, information identifying bank employees that are employed bythe bank, transactions cards associated with the bank employees, userdevices associated with the bank employees, and/or the like. Theverification platform may compare the first data and the informationidentifying the bank employees, the transaction cards, and the userdevices to identify the first user associated with the first data (e.g.,based on matching the first data identifying the first transaction cardor the first user device with a transaction card or a user deviceincluded in the information identifying the bank employees, thetransaction cards, and the user devices).

As further shown in FIG. 1A, and by reference number 115, theverification platform may determine whether the bank employee (e.g., thefirst user) is authorized to access the safe deposit box. In someimplementations, the verification platform may store, in the datastructure, information identifying bank employees that are employed bythe bank and safe deposit boxes the bank employees are authorized toaccess. The verification platform may compare information identifyingthe bank employee (e.g., the first user) and the information identifyingthe bank employees and the safe deposit boxes to determine whether thefirst user is authorized to access the safe deposit box (e.g., based onmatching the information identifying first user with informationidentifying the safe deposit box).

In some implementations, the verification platform may determine thatthe first user (e.g., the bank employee) is not authorized to access thesafe deposit box when the data structure does not include informationindicating that the first user is authorized to access the safe depositbox. In such implementations, and as shown by reference number 120 inFIG. 1B, the verification platform may provide a rejection notificationto the first user device and/or to the short-range wirelesscommunication device of the safe deposit box when the bank employee(e.g., the first user) is not authorized to access the safe deposit box.In some implementations, the rejection notification may indicate thatthe bank employee is not authorized to access the safe deposit box. Insome implementations, the first user device may display the rejectionnotification to the first user. In some implementations, the safedeposit box may include a display component and the short-range wirelesscommunication device may cause the display component to display therejection notification. The first user may then request another bankemployee (e.g., authorized to access the safe deposit box) to handleaccessing the safe deposit box.

In some implementations, the verification platform may determine thatthe first user (e.g., the bank employee) is authorized to access thesafe deposit box when the data structure includes information indicatingthat the first user is authorized to access the safe deposit box. Insuch implementations, and as shown by reference number 125 in FIG. 1B,the verification platform may start a timer when the bank employee(e.g., the first user) is authorized to access the safe deposit box. Thetimer may be associated with determining when a second user (e.g., acustomer and an owner of the safe deposit box) causes a secondtransaction card or a second user device to communicate with theshort-range wireless communication device (e.g., the second user shouldcause the communication prior to expiration of the timer), as describedbelow.

As shown in FIG. 1C, a second user device (e.g., user device 2) may beassociated with the safe deposit box, the verification platform, asecond user (e.g., a customer and the owner of the safe deposit box),and a second transaction card (e.g., transaction card 2). In someimplementations, the second transaction card may include a credit card,a debit card, a gift card, an automated teller machine (ATM) card, arewards card, a client loyalty card, a card authorizing the second userto access the safe deposit box, and/or the like. In someimplementations, the second user device may include an applicationassociated with the second transaction card, authorizing the second userto access the safe deposit box, and/or the like.

The second user may utilize the second transaction card or the seconduser device to communicate with the short-range wireless communicationdevice of the safe deposit box. In some implementations, when the seconduser gets close enough to the safe deposit box (e.g., withincommunication range of the short-range wireless communication deviceassociated with the safe deposit box), the second transaction card orthe second user device may communicate with the short-range wirelesscommunication device associated with the safe deposit box. When thesecond transaction card or the second user device communicates with theshort-range wireless communication device, the short-range wirelesscommunication device may provide, to the verification platform, seconddata identifying the second transaction card or the second user device.

In some implementations, and as further shown by reference number 130 inFIG. 1C, the verification platform may receive, from the short-rangewireless communication device of the safe deposit box and afterexpiration of the timer (e.g., in seconds, minutes, etc.), the seconddata identifying the second transaction card or the second user device.In some implementations, the second data may include data identifyingthe second transaction card (e.g., an identification number of thesecond transaction card); the second user (e.g., a name, an account,etc. of the second user); the safe deposit box the second user ispermitted to access (e.g., the identification number of the safe depositbox, such as “1008”); the second user device (e.g., a telephone numberof the second user device, device identifier, etc.); and/or the like.

As further shown in FIG. 1C, and by reference number 135, theverification platform may provide, to the second user device, theshort-range wireless communication device, and/or the first user device(not shown), a notification indicating the expiration of the timer andrequesting the first data again. In some implementations, thenotification may indicate that the customer did not cause thecommunication between the short-range wireless communication device andthe second transaction card and/or the second user device within apredetermined time period (e.g., in seconds, minutes, etc.) and mayrequest that the first user provide the first data again. In someimplementations, the first user device may display the notification tothe first user and the second user device may display the notificationto the second user. In some implementations, the short-range wirelesscommunication device may cause the display component of the safe depositbox to display the notification. The first user may then repeat theprocess described above in connection with FIG. 1A.

In some implementations, and as shown by reference number 140 in FIG.1D, the verification platform may receive, from the short-range wirelesscommunication device of the safe deposit box and before the expirationof the timer, the second data identifying the second transaction card orthe second user device. As further shown in FIG. 1D, and by referencenumber 145, the verification platform may identify a customer (e.g., thesecond user) associated with the second data. In some implementations,the verification platform may store, in the data structure associatedwith the verification platform, information identifying customers thatare associated with safe deposit boxes at the bank, transactions cardsassociated with the customers, user devices associated with thecustomers, and/or the like. The verification platform may compare thesecond data and the information identifying the customers, thetransaction cards, and the user devices to identify the second userassociated with the second data (e.g., based on matching the second dataidentifying the second transaction card or the second user device with atransaction card or a user device included in the informationidentifying the customers, the transaction cards, and the user devices).

As further shown in FIG. 1D, and by reference number 150, theverification platform may determine whether the customer (e.g., thesecond user) is authorized to access the safe deposit box. In someimplementations, the verification platform may store, in the datastructure, information identifying customers that are associated withsafe deposit boxes at the bank and safe deposit boxes the customers areauthorized to access. The verification platform may compare informationidentifying the customer (e.g., the second user) and the informationidentifying the customers and the safe deposit boxes to determinewhether the second user is authorized to access the safe deposit box(e.g., based on matching the information identifying second user withinformation identifying the safe deposit box).

In some implementations, the verification platform may determine thatthe second user (e.g., the customer) is not authorized to access thesafe deposit box when the data structure does not include informationindicating that the second user is authorized to access the safe depositbox. In such implementations, and as shown by reference number 155 inFIG. 1E, the verification platform may provide a rejection notificationto the first user device (not shown), the second user device, and/or tothe short-range wireless communication device of the safe deposit boxwhen the customer (e.g., the second user) is not authorized to accessthe safe deposit box. In some implementations, the rejectionnotification may indicate that the customer is not authorized to accessthe safe deposit box. In some implementations, the first user device maydisplay the rejection notification to the first user and the second userdevice may display the rejection notification to the second user. Insome implementations, the short-range wireless communication device maycause the display component of the safe deposit box to display therejection notification. The first user may then prevent the second userfrom attempting to further access the safe deposit box or may requestthat the second user reperform the process described above in connectionwith FIG. 1D.

In some implementations, the verification platform may determine thatthe second user (e.g., the customer) is authorized to access the safedeposit box when the data structure includes information indicating thatthe second user is authorized to access the safe deposit box. In suchimplementations, and as shown by reference number 160 in FIG. 1F, theverification platform may cause the safe deposit box to be unlocked whenthe customer is authorized to access the safe deposit box. In someimplementations, the verification platform may provide, to theshort-range wireless communication device, an instruction instructingthe short-range wireless communication device to cause the lockingmechanism (e.g., the electromagnetic lock, the electronically-controlledmechanical lock, and/or the like) to be unlocked. The short-rangewireless communication device may cause the locking mechanism to beunlocked based on the instruction. The second user may open the safedeposit box and access contents of the safe deposit box.

As further shown in FIG. 1F, and by reference number 165, theverification platform may provide, to a user device associated with ajoint customer (e.g., another customer authorized to access the safedeposit box, such as, for example, a sibling, a husband, a wife, etc.)of the customer, a notification indicating that the safe deposit box isbeing accessed by the customer. In some implementations, theverification platform may require the joint customer to approve theaccess of the safe deposit box before unlocking the safe deposit box forthe customer.

In some implementations, the verification platform may determine, basedon causing the safe deposit box to be unlocked, whether one or moreadditional customers are associated with the safe deposit box, and mayobtain, from the data structure and when the one or more additionalcustomers are determined to be associated with the safe deposit box,information identifying the one or more additional customers. Theverification platform may identify one or more additional customersbased on information identifying the safe deposit box. The verificationplatform may identify, in the data structure and based on identifyingthe one or more additional customers, one or more user devicesassociated with the one or more additional customers, and may provide,to each user device of the one or more user devices associated with theone or more additional customers, a notification indicating that thecustomer is accessing the safe deposit box.

In some implementations, the verification platform may determine, basedon determining that the customer is authorized to access the safedeposit box and before causing the safe deposit box to be unlocked,whether one or more additional customers are associated with the safedeposit box. The verification platform may obtain, from the datastructure and when the one or more additional customers are determinedto be associated with the safe deposit box, information identifying theone or more additional customers. The verification platform may identifythe one or more additional customers based on information identifyingthe safe deposit box. The verification platform may identify, in thedata structure and based on identifying the one or more additionalcustomers, one or more user devices associated with the one or moreadditional customers, and may provide, to each user device of the one ormore user devices associated with the one or more additional customers,a request to permit the customer to access the safe deposit box. In suchimplementations, the verification may cause the safe deposit box to beunlocked based on determining that the customer is authorized to accessthe safe deposit box, and receiving permission, from each user device ofthe one or more user devices associated with the one or more additionalcustomers, for the customer to access the safe deposit box.

Although implementations are described herein in connection with a safedeposit box, the techniques described herein may be utilized with othersecure devices, secure areas, and/or the like. For example,implementations described herein may be utilized with a bank safe, ahome safe, a safe area in a building (e.g., classified areas of abuilding or a location), and any other locations where access may berestricted (e.g., to access a classified room may require an employeetransaction card and a supervisor transaction card).

In this way, several different stages of the process for utilizing ashort-range wireless communication device to provide keyless access to asafe deposit box may be automated, which may improve speed andefficiency of the process and conserve computing resources (e.g.,processing resources, memory resources, and/or the like). Furthermore,implementations described herein integrate technology into a safedeposit box to increase security relating to accessing the safe depositbox. Further, a process for utilizing a short-range wirelesscommunication device to provide keyless access to a safe deposit boxconserves computing resources (e.g., processing resources, memoryresources, and/or the like) that would otherwise be wasted by bankemployees repeatedly starting and stopping tasks to manage access tosafe deposit boxes.

As indicated above, FIGS. 1A-1F are provided merely as examples. Otherexamples may differ from what is described with regard to FIGS. 1A-1F.

FIG. 2 is a diagram of an example environment 200 in which systemsand/or methods, described herein, may be implemented. As shown in FIG. 2, environment 200 may include a user device 210, a verification platform220, and a network 230. Devices of environment 200 may interconnect viawired connections, wireless connections, or a combination of wired andwireless connections.

User device 210 includes one or more devices capable of receiving,generating, storing, processing, and/or providing information, such asinformation described herein. For example, user device 210 may include amobile phone (e.g., a smart phone, a radiotelephone, etc.), a laptopcomputer, a tablet computer, a desktop computer, a handheld computer, agaming device, a wearable communication device (e.g., a smartwristwatch, a pair of smart eyeglasses, etc.), or a similar type ofdevice. In some implementations, user device 210 may receive informationfrom and/or transmit information to verification platform 220.

Verification platform 220 includes one or more devices that may utilizea short-range wireless communication device to provide keyless access toa safe deposit box. In some implementations, verification platform 220may be modular such that certain software components may be swapped inor out depending on a particular need. As such, verification platform220 may be easily and/or quickly reconfigured for different uses. Insome implementations, verification platform 220 may receive informationfrom and/or transmit information to one or more user devices 210.

In some implementations, as shown, verification platform 220 may behosted in a cloud computing environment 222. Notably, whileimplementations described herein describe verification platform 220 asbeing hosted in cloud computing environment 222, in someimplementations, verification platform 220 may be non-cloud-based (i.e.,may be implemented outside of a cloud computing environment) or may bepartially cloud-based.

Cloud computing environment 222 includes an environment that may hostverification platform 220. Cloud computing environment 222 may providecomputation, software, data access, storage, etc. services that do notrequire end-user knowledge of a physical location and configuration ofsystem(s) and/or device(s) that host verification platform 220. Asshown, cloud computing environment 222 may include a group of computingresources 224 (referred to collectively as “computing resources 224” andindividually as “computing resource 224”).

Computing resource 224 includes one or more personal computers,workstation computers, server devices, or other types of computationand/or communication devices. In some implementations, computingresource 224 may host verification platform 220. The cloud resources mayinclude compute instances executing in computing resource 224, storagedevices provided in computing resource 224, data transfer devicesprovided by computing resource 224, etc. In some implementations,computing resource 224 may communicate with other computing resources224 via wired connections, wireless connections, or a combination ofwired and wireless connections.

As further shown in FIG. 2 , computing resource 224 includes a group ofcloud resources, such as one or more applications (“APPs”) 224-1, one ormore virtual machines (“VMs”) 224-2, virtualized storage (“VSs”) 224-3,one or more hypervisors (“HYPs”) 224-4, and/or the like.

Application 224-1 includes one or more software applications that may beprovided to or accessed by user device 210. Application 224-1 mayeliminate a need to install and execute the software applications onuser device 210. For example, application 224-1 may include softwareassociated with verification platform 220 and/or any other softwarecapable of being provided via cloud computing environment 222. In someimplementations, one application 224-1 may send/receive informationto/from one or more other applications 224-1, via virtual machine 224-2.

Virtual machine 224-2 includes a software implementation of a machine(e.g., a computer) that executes programs like a physical machine.Virtual machine 224-2 may be either a system virtual machine or aprocess virtual machine, depending upon use and degree of correspondenceto any real machine by virtual machine 224-2. A system virtual machinemay provide a complete system platform that supports execution of acomplete operating system (“OS”). A process virtual machine may executea single program and may support a single process. In someimplementations, virtual machine 224-2 may execute on behalf of a user(e.g., a user of user device 210 or an operator of verification platform220), and may manage infrastructure of cloud computing environment 222,such as data management, synchronization, or long-duration datatransfers.

Virtualized storage 224-3 includes one or more storage systems and/orone or more devices that use virtualization techniques within thestorage systems or devices of computing resource 224. In someimplementations, within the context of a storage system, types ofvirtualizations may include block virtualization and filevirtualization. Block virtualization may refer to abstraction (orseparation) of logical storage from physical storage so that the storagesystem may be accessed without regard to physical storage orheterogeneous structure. The separation may provide administrators ofthe storage system with flexibility in how the administrators managestorage for end users. File virtualization may eliminate dependenciesbetween data accessed at a file level and a location where files arephysically stored. This may enable optimization of storage use, serverconsolidation, and/or performance of non-disruptive file migrations.

Hypervisor 224-4 may provide hardware virtualization techniques thatallow multiple operating systems (e.g., “guest operating systems”) toexecute concurrently on a host computer, such as computing resource 224.Hypervisor 224-4 may present a virtual operating platform to the guestoperating systems and may manage the execution of the guest operatingsystems. Multiple instances of a variety of operating systems may sharevirtualized hardware resources.

Network 230 includes one or more wired and/or wireless networks. Forexample, network 230 may include a cellular network (e.g., a fifthgeneration (5G) network, a long-term evolution (LTE) network, a thirdgeneration (3G) network, a code division multiple access (CDMA) network,etc.), a public land mobile network (PLMN), a local area network (LAN),a wide area network (WAN), a metropolitan area network (MAN), atelephone network (e.g., the Public Switched Telephone Network (PSTN)),a private network, an ad hoc network, an intranet, the Internet, a fiberoptic-based network, and/or the like, and/or a combination of these orother types of networks.

The number and arrangement of devices and networks shown in FIG. 2 areprovided as an example. In practice, there may be additional devicesand/or networks, fewer devices and/or networks, different devices and/ornetworks, or differently arranged devices and/or networks than thoseshown in FIG. 2 . Furthermore, two or more devices shown in FIG. 2 maybe implemented within a single device and/or a single device shown inFIG. 2 may be implemented as multiple, distributed devices.Additionally, or alternatively, a set of devices (e.g., one or moredevices) of environment 200 may perform one or more functions describedas being performed by another set of devices of environment 200.

FIG. 3 is a diagram of example components of a device 300. Device 300may correspond to user device 210, verification platform 220, and/orcomputing resource 224. In some implementations, user device 210,verification platform 220, and/or computing resource 224 may include oneor more devices 300 and/or one or more components of device 300. Asshown in FIG. 3 , device 300 may include a bus 310, a processor 320, amemory 330, a storage component 340, an input component 350, an outputcomponent 360, and/or a communication interface 370.

Bus 310 includes a component that permits communication among thecomponents of device 300. Processor 320 is implemented in hardware,firmware, or a combination of hardware and software. Processor 320 is acentral processing unit (CPU), a graphics processing unit (GPU), anaccelerated processing unit (APU), a microprocessor, a microcontroller,a digital signal processor (DSP), a field-programmable gate array(FPGA), an application-specific integrated circuit (ASIC), or anothertype of processing component. In some implementations, processor 320includes one or more processors capable of being programmed to perform afunction. Memory 330 includes a random-access memory (RAM), a read onlymemory (ROM), and/or another type of dynamic or static storage device(e.g., a flash memory, a magnetic memory, and/or an optical memory) thatstores information and/or instructions for use by processor 320.

Storage component 340 stores information and/or software related to theoperation and use of device 300. For example, storage component 340 mayinclude a hard disk (e.g., a magnetic disk, an optical disk, amagneto-optic disk, and/or a solid-state disk), a compact disc (CD), adigital versatile disc (DVD), a floppy disk, a cartridge, a magnetictape, and/or another type of non-transitory computer-readable medium,along with a corresponding drive.

Input component 350 includes a component that permits device 300 toreceive information, such as via user input (e.g., a touch screendisplay, a keyboard, a keypad, a mouse, a button, a switch, and/or amicrophone). Additionally, or alternatively, input component 350 mayinclude a sensor for sensing information (e.g., a global positioningsystem (GPS) component, an accelerometer, a gyroscope, and/or anactuator). Output component 360 includes a component that providesoutput information from device 300 (e.g., a display, a speaker, and/orone or more light-emitting diodes (LEDs)).

Communication interface 370 includes a transceiver-like component (e.g.,a transceiver and/or a separate receiver and transmitter) that enablesdevice 300 to communicate with other devices, such as via a wiredconnection, a wireless connection, or a combination of wired andwireless connections. Communication interface 370 may permit device 300to receive information from another device and/or provide information toanother device. For example, communication interface 370 may include anEthernet interface, an optical interface, a coaxial interface, aninfrared interface, a radio frequency (RF) interface, a universal serialbus (USB) interface, a Wi-Fi interface, a cellular network interface,and/or the like.

Device 300 may perform one or more processes described herein. Device300 may perform these processes based on processor 320 executingsoftware instructions stored by a non-transitory computer-readablemedium, such as memory 330 and/or storage component 340. Acomputer-readable medium is defined herein as a non-transitory memorydevice. A memory device includes memory space within a single physicalstorage device or memory space spread across multiple physical storagedevices.

Software instructions may be read into memory 330 and/or storagecomponent 340 from another computer-readable medium or from anotherdevice via communication interface 370. When executed, softwareinstructions stored in memory 330 and/or storage component 340 may causeprocessor 320 to perform one or more processes described herein.Additionally, or alternatively, hardwired circuitry may be used in placeof or in combination with software instructions to perform one or moreprocesses described herein. Thus, implementations described herein arenot limited to any specific combination of hardware circuitry andsoftware.

The number and arrangement of components shown in FIG. 3 are provided asan example. In practice, device 300 may include additional components,fewer components, different components, or differently arrangedcomponents than those shown in FIG. 3 . Additionally, or alternatively,a set of components (e.g., one or more components) of device 300 mayperform one or more functions described as being performed by anotherset of components of device 300.

FIG. 4 is a flow chart of an example process 400 for utilizing ashort-range wireless communication device to provide keyless access to asafe deposit box. In some implementations, one or more process blocks ofFIG. 4 may be performed by a verification platform (e.g., verificationplatform 220). In some implementations, one or more process blocks ofFIG. 4 may be performed by another device or a group of devices separatefrom or including the verification platform, such as a user device(e.g., user device 210).

As shown in FIG. 4 , process 400 may include receiving, from ashort-range wireless communication device associated with a safe depositbox, first data identifying a first transaction card (block 410). Forexample, the verification platform (e.g., using computing resource 224,processor 320, communication interface 370, and/or the like) mayreceive, from a short-range wireless communication device associatedwith a safe deposit box, first data identifying a first transactioncard, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include identifying a bankemployee associated with the first data (block 420). For example, theverification platform (e.g., using computing resource 224, processor320, memory 330, and/or the like) may identify a bank employeeassociated with the first data, as described above in connection withFIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include determining whetherthe bank employee is authorized to access the safe deposit box (block430). For example, the verification platform (e.g., using computingresource 224, processor 320, storage component 340, and/or the like) maydetermine whether the bank employee is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include starting a timerwhen the bank employee is authorized to access the safe deposit box(block 440). For example, the verification platform (e.g., usingcomputing resource 224, processor 320, memory 330, and/or the like) maystart a timer when the bank employee is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include receiving, from theshort-range wireless communication device, second data identifying asecond transaction card (block 450). For example, the verificationplatform (e.g., using computing resource 224, processor 320,communication interface 370, and/or the like) may receive, from theshort-range wireless communication device, second data identifying asecond transaction card, as described above in connection with FIGS.1A-2 .

As further shown in FIG. 4 , process 400 may include determining whetherthe second data is received prior to an expiration of the timer (block460). For example, the verification platform (e.g., using computingresource 224, processor 320, memory 330, communication interface 370,and/or the like) may determine whether the second data is received priorto an expiration of the timer, as described above in connection withFIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include identifying acustomer associated with the second data when the second data isreceived prior to the expiration of the timer (block 470). For example,the verification platform (e.g., using computing resource 224, processor320, storage component 340, and/or the like) may identify a customerassociated with the second data when the second data is received priorto the expiration of the timer, as described above in connection withFIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include determining whetherthe customer is authorized to access the safe deposit box (block 480).For example, the verification platform (e.g., using computing resource224, processor 320, memory 330, and/or the like) may determine whetherthe customer is authorized to access the safe deposit box, as describedabove in connection with FIGS. 1A-2 .

As further shown in FIG. 4 , process 400 may include causing the safedeposit box to be unlocked when the customer is authorized to access thesafe deposit box (block 490). For example, the verification platform(e.g., using computing resource 224, processor 320, memory 330,communication interface 370, and/or the like) may cause the safe depositbox to be unlocked when the customer is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

Process 400 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or described with regard to any other process described herein.

In some implementations, the verification platform may provide arejection notification to a user device associated with a supervisor ofthe bank employee when the bank employee is not authorized to access thesafe deposit box. In some implementations, the verification platform mayprovide, to user devices associated with the customer and the bankemployee, a notification indicating the expiration of the timer andrequesting the first data again, where the notification is provided whenthe second data is received after the expiration of the timer.

In some implementations, the verification platform may determine, basedon causing the safe deposit box to be unlocked, whether one or moreadditional customers are associated with the safe deposit box, and mayobtain, when the one or more additional customers are determined to beassociated with the safe deposit box, information identifying the one ormore additional customers, the one or more additional customers beingidentified based on information identifying the safe deposit box.Additionally, the verification platform may identify, based onidentifying the one or more additional customers associated with thesafe deposit box, one or more user devices associated with the one ormore additional customers, and may provide, to each user device of theone or more user devices associated with the one or more additionalcustomers, a notification indicating that the customer is accessing thesafe deposit box.

In some implementations, the verification platform may determine, basedon determining that the customer is authorized to access the safedeposit box and before causing the safe deposit box to be unlocked,whether one or more additional customers are associated with the safedeposit box, and may obtain, when the one or more additional customersare determined to be associated with the safe deposit box, informationidentifying the one or more additional customers, the one or moreadditional customers being identified based on information identifyingthe safe deposit box. Additionally, the verification platform mayidentify, based on identifying the one or more additional customersassociated with the safe deposit box, one or more user devicesassociated with the one or more additional customers, and may provide,to each user device of the one or more user devices associated with theone or more additional customers, a request to permit the customer toaccess the safe deposit box. Additionally, when causing the safe depositbox to be unlocked, the verification platform may cause the safe depositbox to be unlocked based on: determining that the customer is authorizedto access the safe deposit box, and receiving permission, from each userdevice of the one or more user devices associated with the one or moreadditional customers, for the customer to access the safe deposit box.

In some implementations, the short-range wireless communication devicemay include a near-field communication (NFC) device. In someimplementations, the safe deposit box may include one of anelectromagnetic lock or an electronically-controlled mechanical lock,and, when causing the safe deposit box to be unlocked, the verificationplatform may cause the electromagnetic lock or theelectronically-controlled mechanical lock to be disengaged.

Although FIG. 4 shows example blocks of process 400, in someimplementations, process 400 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 4 . Additionally, or alternatively, two or more of theblocks of process 400 may be performed in parallel.

FIG. 5 is a flow chart of an example process 500 for utilizing ashort-range wireless communication device to provide keyless access to asafe deposit box. In some implementations, one or more process blocks ofFIG. 5 may be performed by a verification platform (e.g., verificationplatform 220). In some implementations, one or more process blocks ofFIG. 5 may be performed by another device or a group of devices separatefrom or including the verification platform, such as a user device(e.g., user device 210).

As shown in FIG. 5 , process 500 may include receiving, from ashort-range wireless communication device associated with a safe depositbox, first data identifying a first user device (block 510). Forexample, the verification platform (e.g., using computing resource 224,processor 320, communication interface 370, and/or the like) mayreceive, from a short-range wireless communication device associatedwith a safe deposit box, first data identifying a first user device, asdescribed above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include identifying a firstuser associated with the first data (block 520). For example, theverification platform (e.g., using computing resource 224, processor320, memory 330, and/or the like) may identify a first user associatedwith the first data, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include determining whetherthe first user is authorized to access the safe deposit box (block 530).For example, the verification platform (e.g., using computing resource224, processor 320, storage component 340, and/or the like) maydetermine whether the first user is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include starting a timerwhen the first user is authorized to access the safe deposit box (block540). For example, the verification platform (e.g., using computingresource 224, processor 320, memory 330, and/or the like) may start atimer when the first user is authorized to access the safe deposit box,as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include receiving, from theshort-range wireless communication device, second data identifying asecond user device (block 550). For example, the verification platform(e.g., using computing resource 224, processor 320, communicationinterface 370, and/or the like) may receive, from the short-rangewireless communication device, second data identifying a second userdevice, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include determining whetherthe second data is received prior to an expiration of the timer (block560). For example, the verification platform (e.g., using computingresource 224, processor 320, storage component 340, and/or the like) maydetermine whether the second data is received prior to an expiration ofthe timer, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include identifying asecond user associated with the second data when the second data isreceived prior to the expiration of the timer (block 570). For example,the verification platform (e.g., using computing resource 224, processor320, memory 330, and/or the like) may identify a second user associatedwith the second data when the second data is received prior to theexpiration of the timer, as described above in connection with FIGS.1A-2 .

As further shown in FIG. 5 , process 500 may include determining whetherthe second user is authorized to access the safe deposit box (block580). For example, the verification platform (e.g., using computingresource 224, processor 320, storage component 340, and/or the like) maydetermine whether the second user is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 5 , process 500 may include causing the safedeposit box to be unlocked when the second user is authorized to accessthe safe deposit box (block 590). For example, the verification platform(e.g., using computing resource 224, processor 320, communicationinterface 370, and/or the like) may cause the safe deposit box to beunlocked when the second user is authorized to access the safe depositbox, as described above in connection with FIGS. 1A-2 .

Process 500 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or described with regard to any other process described herein.

In some implementations, the verification platform may provide arejection notification to a third user device associated with asupervisor of the first user when the first user is not authorized toaccess the safe deposit box. In some implementations, the verificationplatform may provide, to the first user device associated with the firstuser and the second user device associated with the second user, anotification indicating the expiration of the timer and requesting thefirst data again, where the notification is provided when the seconddata is received after the expiration of the timer.

In some implementations, the verification platform may determine, basedon causing the safe deposit box to be unlocked, whether one or moreadditional users are associated with the safe deposit box, and mayobtain, when the one or more additional users are determined to beassociated with the safe deposit box, information identifying the one ormore additional users, the one or more additional users being identifiedbased on information identifying the safe deposit box. Additionally, theverification platform may identify, based on identifying the one or moreadditional users associated with the safe deposit box, one or more userdevices associated with the one or more additional users, and mayprovide, to each user device of the one or more user devices associatedwith the one or more additional users, a notification indicating thatthe second user is accessing the safe deposit box.

In some implementations, the verification platform may determine, basedon determining that the second user is authorized to access the safedeposit box and before causing the safe deposit box to be unlocked,whether one or more additional users are associated with the safedeposit box, and may obtain, when the one or more additional users aredetermined to be associated with the safe deposit box, informationidentifying the one or more additional users, the one or more additionalusers being identified based on information identifying the safe depositbox. Additionally, the verification platform may identify, based onidentifying the one or more additional users associated with the safedeposit box, one or more user devices associated with the one or moreadditional users, and may provide, to each user device of the one ormore user devices associated with the one or more additional users, arequest to permit the second user to access the safe deposit box.Additionally, when causing the safe deposit box to be unlocked, theverification platform may cause the safe deposit box to be unlockedbased on: determining that the second user is authorized to access thesafe deposit box, and receiving permission, from each user device of theone or more user devices associated with the one or more additionalusers, for the second user to access the safe deposit box.

In some implementations, the short-range wireless communication devicemay include a near-field communication (NFC) device, a Bluetooth device,an infrared device, an ultraband device, or a Zigbee device. In someimplementations, the safe deposit box may include one of anelectromagnetic lock or an electronically-controlled mechanical lock,and, when causing the safe deposit box to be unlocked, the verificationplatform may cause the electromagnetic lock or theelectronically-controlled mechanical lock to be disengaged.

Although FIG. 5 shows example blocks of process 500, in someimplementations, process 500 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 5 . Additionally, or alternatively, two or more of theblocks of process 500 may be performed in parallel.

FIG. 6 is a flow chart of an example process 600 for utilizing ashort-range wireless communication device to provide keyless access to asafe deposit box. In some implementations, one or more process blocks ofFIG. 6 may be performed by a verification platform (e.g., verificationplatform 220). In some implementations, one or more process blocks ofFIG. 6 may be performed by another device or a group of devices separatefrom or including the verification platform, such as a user device(e.g., user device 210).

As shown in FIG. 6 , process 600 may include receiving, from ashort-range wireless communication device associated with a safe depositbox, first data identifying a first transaction card or a first userdevice (block 610). For example, the verification platform (e.g., usingcomputing resource 224, processor 320, communication interface 370,and/or the like) may receive, from a short-range wireless communicationdevice associated with a safe deposit box, first data identifying afirst transaction card or a first user device, as described above inconnection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include identifying a firstuser associated with the first data (block 620). For example, theverification platform (e.g., using computing resource 224, processor320, memory 330, and/or the like) may identify a first user associatedwith the first data, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include determining whetherthe first user is authorized to access the safe deposit box (block 630).For example, the verification platform (e.g., using computing resource224, processor 320, storage component 340, and/or the like) maydetermine whether the first user is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include starting a timerwhen the first user is authorized to access the safe deposit box (block640). For example, the verification platform (e.g., using computingresource 224, processor 320, memory 330, and/or the like) may start atimer when the first user is authorized to access the safe deposit box,as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include receiving, from theshort-range wireless communication device, second data identifying asecond transaction card or a second user device (block 650). Forexample, the verification platform (e.g., using computing resource 224,processor 320, communication interface 370, and/or the like) mayreceive, from the short-range wireless communication device, second dataidentifying a second transaction card or a second user device, asdescribed above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include determining whetherthe second data is received prior to an expiration of the timer (block660). For example, the verification platform (e.g., using computingresource 224, processor 320, storage component 340, and/or the like) maydetermine whether the second data is received prior to an expiration ofthe timer, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include identifying asecond user associated with the second data when the second data isreceived prior to the expiration of the timer (block 670). For example,the verification platform (e.g., using computing resource 224, processor320, memory 330, and/or the like) may identify a second user associatedwith the second data when the second data is received prior to theexpiration of the timer, as described above in connection with FIGS.1A-2 .

As further shown in FIG. 6 , process 600 may include determining whetherthe second user is authorized to access the safe deposit box (block680). For example, the verification platform (e.g., using computingresource 224, processor 320, storage component 340, and/or the like) maydetermine whether the second user is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

As further shown in FIG. 6 , process 600 may include causing the safedeposit box to be unlocked when the second user is authorized to accessthe safe deposit box (block 690). For example, the verification platform(e.g., using computing resource 224, processor 320, memory 330,communication interface 370, and/or the like) may cause the safe depositbox to be unlocked when the second user is authorized to access the safedeposit box, as described above in connection with FIGS. 1A-2 .

Process 600 may include additional implementations, such as any singleimplementation or any combination of implementations described belowand/or described with regard to any other process described herein.

In some implementations, the verification platform may provide arejection notification to a third user device and/or to the short-rangewireless communication device when the first user is not authorized toaccess the safe deposit box, where the third user device is associatedwith a supervisor of the first user.

In some implementations, the verification platform may provide, to thefirst user device associated with the first user and the second userdevice associated with the second user, a notification indicating theexpiration of the timer and requesting the first data again, where thenotification is provided when the second data is received after theexpiration of the timer.

In some implementations, the verification platform may determine, basedon causing the safe deposit box to be unlocked, whether one or moreadditional users are associated with the safe deposit box, and mayobtain, when the one or more additional users are determined to beassociated with the safe deposit box, information identifying the one ormore additional users, the one or more additional users being identifiedbased on information identifying the safe deposit box. Additionally, theverification platform may identify, based on identifying the one or moreadditional users associated with the safe deposit box, one or more userdevices associated with the one or more additional users, and mayprovide, to each user device of the one or more user devices associatedwith the one or more additional users, a notification indicating thatthe second user is accessing the safe deposit box.

In some implementations, the verification platform may determine, basedon determining that the second user is authorized to access the safedeposit box and before causing the safe deposit box to be unlocked,whether one or more additional users are associated with the safedeposit box, and may obtain, when the one or more additional users aredetermined to be associated with the safe deposit box, informationidentifying the one or more additional users, the one or more additionalusers being identified based on information identifying the safe depositbox. Additionally, the verification platform may identify, based onidentifying the one or more additional users associated with the safedeposit box, one or more user devices associated with the one or moreadditional users, and may provide, to each user device of the one ormore user devices associated with the one or more additional users, arequest to permit the second user to access the safe deposit box.Additionally, when causing the safe deposit box to be unlocked, theverification platform may cause the safe deposit box to be unlockedbased on: determining that the second user is authorized to access thesafe deposit box, and receiving permission, from one or more of the oneor more user devices associated with the one or more additional users,for the second user to access the safe deposit box. In someimplementations, the safe deposit box may include one of anelectromagnetic lock or an electronically-controlled mechanical lock.

Although FIG. 6 shows example blocks of process 600, in someimplementations, process 600 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 6 . Additionally, or alternatively, two or more of theblocks of process 600 may be performed in parallel.

The foregoing disclosure provides illustration and description, but isnot intended to be exhaustive or to limit the implementations to theprecise forms disclosed. Modifications and variations may be made inlight of the above disclosure or may be acquired from practice of theimplementations.

As used herein, the term “component” is intended to be broadly construedas hardware, firmware, and/or a combination of hardware and software.

It will be apparent that systems and/or methods, described herein, maybe implemented in different forms of hardware, firmware, or acombination of hardware and software. The actual specialized controlhardware or software code used to implement these systems and/or methodsis not limiting of the implementations. Thus, the operation and behaviorof the systems and/or methods were described herein without reference tospecific software code—it being understood that software and hardwaremay be designed to implement the systems and/or methods based on thedescription herein.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of various implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of various implementations includes each dependent claim incombination with every other claim in the claim set.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems, and may be used interchangeably with “one or more.” Furthermore,as used herein, the term “set” is intended to include one or more items(e.g., related items, unrelated items, a combination of related andunrelated items, etc.), and may be used interchangeably with “one ormore.” Where only one item is intended, the term “only one” or similarlanguage is used. Also, as used herein, the terms “has,” “have,”“having,” or the like are intended to be open-ended terms. Further, thephrase “based on” is intended to mean “based, at least in part, on”unless explicitly stated otherwise.

What is claimed is:
 1. A method comprising: receiving, by a first deviceand from a second device associated with a secured location, first dataidentifying a first user; providing, by the first device and to thesecond device, first authorization data indicating whether access to thesecured location is authorized based on the first data; starting, by thefirst device and based on the first authorization data indicating thataccess to the secured location is authorized, a timer; receiving, by thefirst device and from the second device, second data associated with asecond user; providing, by the first device, to the second device, andbased on starting the timer, second authorization data indicatingwhether access to the secured location is authorized based on the seconddata; determining, by the first device, based on the first authorizationdata, and based on the second authorization data, whether access to thesecured location is authorized; and causing, by the first device andbased on determining whether access to the secured location isauthorized, an action to be performed associated with the securedlocation.
 2. The method of claim 1, further comprising: determining oneor more third users that are associated with the secured location; andrequesting, to one or more third devices associated with the one or morethird users, at least one of: an approval of accessing the securedlocation, or an approval for the second user to access the securedlocation.
 3. The method of claim 1, wherein determining whether accessto the secured location is authorized further comprises: causing thesecured location to be unlocked based on: determining that the seconduser is authorized to access the secured location, and receivingapproval from one or more third devices associated with one or morethird users.
 4. The method of claim 1, wherein causing the action to beperformed associated with the secured location further comprises:causing the secured location to be unlocked based on determining that:the second data is received prior to expiration of the timer, and thesecond user is authorized to access the secured location.
 5. The methodof claim 1, further comprising: providing, to one or more third devicesassociated with one or more third users related to the secured location,a notification, wherein the notification indicates at least one of: thesecured location is being accessed, or the second user is accessing thesecured location.
 6. The method of claim 1, wherein causing the actionto be performed associated with the secured location further comprises:providing a notification to at least one of: one or more third devicesassociated with at least one of the first user or the second user, orthe second device.
 7. The method of claim 6, wherein the notificationindicates at least one of: a rejection, when access to the securedlocation is not authorized, an expiration of the timer, or a request forthe first data.
 8. A device comprising: one or more memories; and one ormore processors, coupled to the one or more memories, configured to:receive, from a second device associated with a secured location, firstdata identifying a first user; provide, to the second device, firstauthorization data indicating whether access to the secured location isauthorized based on the first data; initiate, based on the firstauthorization data indicating that access to the secured location isauthorized, a timer; receive, from the second device, second dataassociated with a second user; provide, to the second device, and basedon initiating the timer, second authorization data indicating whetheraccess to the secured location is authorized based on the second data;determine, based on the first authorization data, and based on thesecond authorization data, whether access to the secured location isauthorized; and cause, based on determining whether access to thesecured location is authorized, an action to be performed associatedwith the secured location.
 9. The device of claim 8, wherein the one ormore processors are further configured to: determine one or more thirdusers that are associated with the secured location; and request to oneor more third devices associated with the one or more third users, atleast one of: an approval of accessing the secured location, or anapproval for the second user to access the secured location.
 10. Thedevice of claim 8, wherein the one or more processors, to determinewhether access to the secured location is authorized, are configured to:cause the secured location to be unlocked based on: determining that thesecond user is authorized to access the secured location, and receivingapproval from one or more third devices associated with one or morethird users.
 11. The device of claim 8, wherein the one or moreprocessors, to cause the action to be performed associated with thesecured location, are configured to: cause the secured location to beunlocked based on determining that: the second data is received prior toexpiration of the timer, and the second user is authorized to access thesecured location.
 12. The device of claim 8, wherein the one or moreprocessors are further configured to: provide, to one or more thirddevices associated with one or more third users related to the securedlocation, a notification, wherein the notification indicates at leastone of: the secured location is being accessed, or the second user isaccessing the secured location.
 13. The device of claim 8, wherein theone or more processors, to cause the action to be performed associatedwith the secured location, are configured to: provide a notification toat least one of: one or more third devices associated with at least oneof the first user or the second user, or the second device.
 14. Thedevice of claim 13, wherein the notification indicates at least one of:a rejection, when access to the secured location is not authorized, anexpiration of the timer, or a request for the first data.
 15. Anon-transitory computer-readable medium storing a set of instructions,the set of instructions comprising: one or more instructions that, whenexecuted by one or more processors of a device, cause the device to:receive, from a second device associated with a secured location, firstdata identifying a first user; provide, to the second device, firstauthorization data indicating whether access to the secured location isauthorized based on the first data; initiate, based on the firstauthorization data indicating that access to the secured location isauthorized, a timer; receive, from the second device, second dataassociated with a second user; provide, to the second device, and basedon initiating the timer, second authorization data indicating whetheraccess to the secured location is authorized based on the second data;determine, based on the first authorization data, and based on thesecond authorization data, whether access to the secured location isauthorized; and cause, based on determining whether access to thesecured location is authorized, an action to be performed associatedwith the secured location.
 16. The non-transitory computer-readablemedium of claim 15, wherein the one or more instructions, when executedby the one or more processors, further cause the device to: determineone or more third users that are associated with the secured location;and request to one or more third devices associated with the one or morethird users, at least one of: an approval of accessing the securedlocation, or an approval for the second user to access the securedlocation.
 17. The non-transitory computer-readable medium of claim 15,wherein the one or more instructions, that cause the device to determinewhether access to the secured location is authorized, cause the deviceto: cause the secured location to be unlocked based on: determining thatthe second user is authorized to access the secured location, andreceiving approval from one or more third devices associated with one ormore third users.
 18. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, that cause the device tocause the action to be performed associated with the secured location,cause the device to: cause the secured location to be unlocked based ondetermining that: the second data is received prior to expiration of thetimer, and the second user is authorized to access the secured location.19. The non-transitory computer-readable medium of claim 15, wherein theone or more instructions, when executed by the one or more processors,further cause the device to: provide, to one or more third devicesassociated with one or more third users related to the secured location,a notification, wherein the notification indicates at least one of: thesecured location is being accessed, or the second user is accessing thesecured location.
 20. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, that cause the device tocause the action to be performed associated with the secured location,cause the device to: provide a notification to at least one of: one ormore third devices associated with at least one of the first user or thesecond user, or the second device.