Automated transaction machine with associated beacon

ABSTRACT

An Automated Transaction Machine (ATM) is associated with a beacon. The beacon may communicate with an electronic device running a software application that is configured to detect the beacon. The software application may have a reaction based upon the detection of the beacon. The ATM or related systems may respond to data directly or indirectly from the software application to make a customization or take other action based there on.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to and the benefit of U.S. ProvisionalPatent Application 62/340,631, filed May 24, 2016.

BACKGROUND

This relates in general to Automated Transaction Machines (ATMs) andrelated technology.

ATMs are generally known. One type of ATM is the Automated BankingMachine (ABM). ABMs are generally used in a banking environment to allowbanking customers to perform automated banking transactions, such asdeposit, withdraw, or otherwise move funds electronically from oneaccount to another.

Other ATMs are often used in other environments. For example, some ATMsmay be used to dispense tickets at sporting events, musical events andthe like. Some other ATMs may be used to dispense gambling tokens or toaccept gambling tokens to be converted back into cash. Further exampleof ATMs are known.

SUMMARY

This relates more specifically to an ATM with an associated beacon, tovarious configurations thereof, and to apparatuses, systems, and methodsrelated to the same.

In one example, an ATM may use a beacon to sense a customer, via acustomer's device, approaching an ATM. In another example, a customer'sdevice may sense an approaching ATM via the beacon.

In at least one embodiment, a system may operate for controllingsecurity to an ATM, such as for unlocking a vestibule door. The systemmay include a vestibule with a secure door, a server, an ATM inside thevestibule, and a beacon. An electronic device running a softwareapplication may detect the beacon. After detecting the beacon, thesoftware application may communicate with the server that a uniqueidentification of the electronic device is requesting access to thevestibule. The server is configured to cause data to be sent to a lockon the door to unlock the door whereby a customer associated with theunique identification is authorized to enter the vestibule.

In at least one other embodiment, a system may deliver information to acustomer at an ATM based on the identification of a unique customerbased on their device and the signal delivered from the beacon. Thesystem may include a server and a beacon. The beacon may be configuredto transmit a wireless signal to an electronic device running a softwareapplication to be received by the electronic device as a customer withthe electronic device approaches the beacon. Upon detecting the wirelesssignal, the electronic device may send an identity of the customerowning the electronic device to the server. After optionally verifyingthat the identity is valid, the server may send data to the ATM to causethe display to present information tailored to the customer.

In at least one other embodiment, a system for collecting and storinginformation about a customer using an electronic device may include aserver, an ATM with a display, a database that communicates with theserver, and a beacon. The electronic device, running a softwareapplication, may detect the beacon as the electronic device approachesthe beacon. The electronic device may send wireless data to the serverindicating a unique identity of the electronic device and/or the beacondetected. Upon optionally verifying the identity, the server may causecollecting of data from the electronic device associated with thecustomer and storing the data in the database. The server may analyzethis data and if values of this data fall outside predetermined rangesthen the server generates an alarm notification so corrective action maybe taken. In some additional embodiments, the server may send media,such as advertisement material, based on the collected data to thecustomer, either via the electronic device or via the display of theATM. The presentation of this media may be initiated once the customeris a predetermined distance from the display. Further, this media may besent to any appropriate device associated with the user or ATM such asan associated display, a tablet, a smart screen, a smart glass, a phone,other electronic device and/or another device associated with the ATM oruser.

In at least another embodiment, a system may be configured to monitorthe flow of customers and other data in a commercial environment, suchas a banking area. The system may generates one or more alerts whencertain parameters are above or below certain thresholds. The system mayinclude at least one ATM in a commercial environment, a server, adatabase in communication with the server, and a beacon associated withthe server. Electronic devices running software to detect the beacon maybe carried (or moved) by customers or other users. As these devices movewithin range of the beacon, they may detect the beacon. Upon detectingthe beacon, the electronic devices may send a unique identifier to theserver identifying an electronic device associated with one of thecustomers and the beacon identified. Upon optionally authenticatingunique identifiers, the server may collect data from the electronicdevices. The data may include one or more of: duration of customervisits, times of visits, and locations the customer visited, dwell timeat an ATM, location of the ATM and the customer, and ATM transactionalinformation. The server may generate an alert when one or more of thedata fall outside of a predetermined threshold.

In at least yet another embodiment, a system may detect a customer ofinterest is near a beacon and may send a message to someone who may wishto be alerted to the presence of the potential customer, for example, togreet the potential customer. The system may include a server and abeacon. An electronic device that is carried (or moved) by a user, suchas the potential customer may run software to detect the beacon when theelectronic device moves within range of the beacon. Upon detecting thebeacon, the electronic device may send a unique identifier to the serveridentifying the electronic device associated with the potential customerand/or the identify the beacon or data related to the beacon. Uponoptionally verifying the unique identifier, the server may cause a datamessage to be sent to a person or related device who desired is to bealerted when the user or customer associated with the electronic devicewas at a location near the beacon.

In at least one additional embodiment, a system may use geo-fencing toallow access into a secured area, such as a vestibule. The system mayinclude a secured area, such as a vestibule with a secure door or otherenclosed area with selective entry, a server, a geo-fencing system, andan ATM within the secured area. A location of the ATM may be beenpre-located by the geo-fencing system. A customer or other user may becarrying an electronic device, such as a smartphone. The server mayreceive a message from a geo-fencing software application running on theelectronic device that the electronic device is within a predetermineddistance of the ATM. The server may then cause data to be sent to allowaccess to the secured area, such as a command to unlock a door, when theidentity of the customer is authorized by the server to enter thesecured area. For further example, in the specific case of a vestibulewith an ATM therein, a system for unlocking the vestibule door mayinclude a vestibule with a secure door, a server, an ATM inside thevestibule, and a beacon associated with at least one of the ATM or thevestibule. After detecting the beacon, a software application maycommunicate with the server to requesting access to the vestibule. Theserver may be configured to cause data to be sent to the lock on thedoor to unlock the door when authorization to enter the vestibule isgranted.

Various aspects will become apparent to those skilled in the art fromthe following detailed description and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic illustration of a system including an ATM and anassociated beacon according to a first embodiment.

FIG. 2 is a schematic diagram of a computer system with a beacondetection logic for use with the system of FIG. 1.

FIG. 3 is a schematic illustration of a system including an ATM and anassociated beacon according to a second embodiment.

FIG. 4 is a schematic illustration of a system including an ATM and anassociated beacon according to a third embodiment.

FIG. 5 is a schematic illustration of a system including an ATM and anassociated beacon according to a fourth embodiment.

FIG. 6 is a schematic illustration of a system including an ATM and arelated geo-fencing system.

FIG. 7 is a flowchart illustrating a method of accessing a secured area.

Similar numerical identifiers are intended to refer to similar elementsthroughout the drawings.

DETAILED DESCRIPTION

FIG. 1 illustrates one embodiment of a system 100 that unlocks a secureentry, exterior access door 14 to a secure area, vestibule 12. Anoptional interior door 13 separates the vestibule 12 from an optionalcommercial structure 15. The vestibule 12, in some embodiments, mayinclude an automated transaction machine (ATM) 11 that may include amonitor 8 for displaying menu options, images, videos such asadvertisement video and the like. The ATM 11 may be a traditionalbanking ATM such as one that accepts deposits and/or dispenses cash, itcould also be an ATM at which issues tickets to sporting events may bepurchased or may be another type of transaction machine. The vestibule12 includes the exterior access door 14 such that a customer may use toaccess the ATM 11 inside the vestibule 12 when the optional commercialstructure 15 and the interior door 13 are closed/locked.

The system 100 further includes a beacon 1 and a server 9 that may be anaccess control server or another type of server. The beacon 1 isillustrated as separate from the ATM 11 and outside the secure area 12,although neither are recurred. For example, the beacon 1 may be coupledto or integrated with the ATM 11 and the beacon 1 may be within orwithout the secure area 12.

In the present example, the server 9 is in communication with the door14. In one embodiment, the beacon 1 emits electromagnetic radiation of adesired frequency or frequencies and with a desired power. In otherconfigurations, the beacon 1 may transmit coded information such as aunique number sequence on a modulated carrier and an electronic device3, discussed below, may decode this signal to extract the numbersequence to determine if beacon 1 is of interest to the customer usingthe electronic device 3. It must be appreciated that other types ofbeacons may be used in other embodiments and in some embodiments thebeacon 1 and an access control server 9 may communicate with each other.For example, in at least one instance the beacon 1 maybe a passivebeacon only responding to calls from a requesting device.

The server 9 may contain a processor 10 or other logic allowing theserver 9 to execute tangible software instructions that are read frommemory and to perform other functions. “Processor” and “Logic”, as usedherein, includes but is not limited to hardware, firmware, software,and/or combinations of each to perform a function(s) or an action(s),and/or to cause a function or action from another logic, method, and/orsystem. For example, based on a desired application or needs, logicand/or processor may include a software-controlled microprocessor,discrete logic, an application specific integrated circuit (ASIC), aprogrammed logic device, a memory device containing instructions or thelike. Logic and/or processor may include one or more gates, combinationsof gates, or other circuit components. Logic and/or a processor may alsobe fully embodied as software. Where multiple logics and/or processorsare described, it may be possible to incorporate the multiple logicsand/or processors into one physical logic (or processors). Similarly,where a single logic and/or processor is described, it may be possibleto distribute that single logic and/or processor between multiplephysical logics and/or processors.

FIG. 2 illustrates one example architecture of how the server 9 (e.g., acomputer) may be organized. Thus, FIG. 2 illustrates one examplecomputing device (e.g., server 9) in which at least portions of examplesystems and methods described herein, and equivalents, may operate. Theexample computing device may be a computer 200 that includes a processor202, a memory 204, and input/output ports 210 operably connected by abus 208. In one example, the computer 200 may include a beacon detectionlogic 230 configured to look for periodic beacon signals transmitted bya beacon or relayed from another device or for signals from anotherdevice indicative of that device having received a signal from a beacon.In different examples, the beacon detection logic 230 may be implementedin hardware, software, firmware, and/or combinations thereof. Thus, thebeacon detect logic 230 may provide means (e.g., hardware, software,firmware) for searching for one or more beacon signals. While the beacondetect logic 230 is illustrated as a hardware component attached to thebus 208, it is to be appreciated that in one example, the beacon detectlogic 230 could be implemented in the processor 202.

Generally describing an example configuration of the computer 200, theprocessor 202 may be a variety of various processors including dualmicroprocessor and other multi-processor architectures. The memory 204may include volatile memory and/or non-volatile memory. Non-volatilememory may include, for example, ROM, PROM, EPROM, and EEPROM. Volatilememory may include, for example, RAM, synchronous RAM (SRAM), dynamicRAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), direct RAM bus RAM (DRRAM) and the like.

A disk 206 may be operably connected to the computer 200 via, forexample, an input/output interface (e.g., card, device) 218 and aninput/output port 210. Disk 206 may be, for example, a magnetic diskdrive, a solid-state disk drive, a floppy disk drive, a tape drive, aZip drive, a flash memory card, and/or a memory stick. Furthermore, thedisk 206 may be a CD-ROM, a CD recordable drive (CD-R drive), a CDrewriteable drive (CD-RW drive), and/or a digital video ROM drive (DVDROM). The memory 204 can store a process 214 and/or a data 216, forexample. The disk 206 and/or the memory 204 can store an operatingsystem that controls and allocates resources of the computer 200.

The bus 208 may be a single internal bus interconnect architectureand/or other bus or mesh architectures. While a single bus isillustrated, it is to be appreciated that the computer 200 maycommunicate with various devices, logics, and peripherals using otherbusses (e.g., PCIE, SATA, Infiniband, 1384, USB, Ethernet). The bus 208can be types including, for example, a memory bus, a memory controller,a peripheral bus, an external bus, a crossbar switch, and/or a localbus.

The computer 200 may interact with input/output devices via theinput/output interfaces 218 and the input/output ports 210. Input/outputdevices may be, for example, a keyboard, a microphone, a pointing andselection device, cameras, video cards, displays, the disk 206, thenetwork devices 220, and so on. The input/output ports 210 may include,for example, serial ports, parallel ports, USB ports, and the like.

The computer 200 can operate in a network environment and thus may beconnected to network devices 220 via input/output interfaces 218, and/orthe input/output ports 210. Through the network devices 220, thecomputer 200 may interact with a network. Through the network, thecomputer 200 may be logically connected to remote computers. Networkswith which the computer 200 may interact include, but are not limitedto, a local area network (LAN), a wide area network (WAN), and othernetworks. The networks may be wired and/or wireless networks.

Returning to FIG. 1, while not required to be part of part of the system100, the system 100 may be activated by a customer 7 transporting theelectronic device 3 running a software program 5 in proximity of thebeacon 1. As mentioned earlier, the system 100, in one embodimentincludes a secured vestibule area 12 with an ATM 11 located inside thevestibule area 12. Often after hours, for example, the optionalcommercial structure 15 and its interior door 13 will be locked so thatthe only way to access the vestibule 12 is through its exterior door 14.

The system 100, described above, provides for exchanging unique identityinformation between the customer and the access control server 9 of thesystem 100. In one embodiment, a customer 7 (FIG. 1) approaches thebeacon 1 with his/her electronic device 3 running a software application5. In one example, the electronic device 3 may be a mobile cellphone orsmartphone. However, the electronic device 3 may be an iPad, tabletcomputer, laptop computer, or other suitable device to communicate withthe beacon 1 and server 9.

The electronic device 3 in combination with its software 5 begins todetect the beacon 1 when it is close enough to the beacon 1, e.g. incommunication range. As discussed above, the electronic device 3 maydetect the beacon 1 by detecting a particular frequency or particularfrequencies emitted by the beacon 1, detect an encoded/modulated numbersequence that the electronic device 3 decodes in tandem with itssoftware 5, or detects the beacon 1 in another way as desired. FIG. 1illustrates signals emitted by the beacon 1 as electromagnetic waves 19for illustrative purposes.

After the beacon 1 has been detected and its signal decoded, theelectronic device 3 with its software 5 may determine if it is ofinterest. For example, frequencies and/or data periodically transmittedby the beacon 1 may indicate that it is a beacon near the ATM 11. If thebeacon 1 is of interest and there is a desire to access the ATM 11, forexample, then the electronic device 3 in combination with the softwareapplication 5 will communicate a unique identification of the electronicdevice 3 to the server 9 and request access to the to the vestibule12/ATM 11. This communication may include a phone ID and a beacon ID, orother identification data related to an electronic device, the softwareor the user.

In some embodiments, this communication may be wirelessly directly sentto the access control server 9 or the communication may first be sent toa local antenna (not illustrated) such as a wireless LAN base stationantenna before it is then routed to the access control server 9. Inanother configuration, the electronic device 3 may transmit messages tothe beacon 1 and these messages may then be forwarded to the server 9.The communication may be directly between the devices, or indirectly,such as through a series of relays, networks, the internet, or othersuitable communications mechanism.

When the communications are received from the electronic device 3 at theserver 9, the server 9 may check to be sure the unique identification isvalid and matches the electronic device 3. Any suitable verificationmethod may be used to validate the identification of the electronicdevice 3 at the server 9. For example, common cryptographic functionsand methodologies may be used. Once the server 9 authenticates theelectronic device, the server 9 causes data to be sent to a lock on thedoor 14 to unlock the door 14 when the unique identification indicatesthe customer with the electronic device (e.g., phone) is authorized toenter the vestibule 12.

In another configuration, the system 100 will not “automatically” unlockthe door 14 of the vestibule 12 upon the electronic device 3 detectingthe beacon 1. Instead, when the electronic device 3 detects the beacon1, the electronic device 3 and its software 5 will first display amessage on a screen of the electronic device 3 asking thecustomer/electronic device holder if they desire to “unlock thevestibule” door 14. If the customer decides to unlock the door then theymay click a “yes” button, for example, and the door 14 will be unlockedas discussed above.

In another configuration, the system 100 of FIG. 1 determines when acustomer approaching the beacon 1 is to be greeted by someone, forexample, banking personnel. In this embodiment, an electronic device 3that is carried by a customer 7 is running software 5 to detect thebeacon 1 when the electronic device 3 moves within range of the beacon 1detects the beacon 1. Upon detecting the beacon 1, the electronic device3 sends a unique identifier to the server 9 identifying the electronicdevice 3 associated with the customer 7. Upon verifying the uniqueidentifier is associated with the customer, the server 9 may cause adata message to be sent to a person or to another system that is to bealerted when the customer 7 in possession of or associated with theelectronic device 3 arrives at a location near the beacon 1. This mayallow for, in the case of a bank, banking personnel or systems, toprovide select service to select users.

Another embodiment is a system 101 that can tailor information and/oradvertisements displayed on the ATM or other screens is illustrated inFIG. 3. Similar to the system 100 of FIG. 1, the system 101 of FIG. 3includes a beacon 1, a server 9, a vestibule 12, an ATM 11 with amonitor 8, a door 14 providing external access to the vestibule 12, adoor 13 providing internal access to the vestibule 12 and an optionalcommercial structure 15 adjacent the vestibule 12. This system 101further includes a wall mounted monitor 24 that may be a televisionmonitor as well as a media control server 17. In some embodiments, themedia control server 17 may be merged together with or included in theaccess control server 9.

In operation, a customer 7 carries the electronic device 3 (e.g., phone)in range of the beacon 1, as the beacon 1 transmits a wirelesssignal/electromagnetic waves 19 to the electronic device 3 running thesoftware application 5. Upon detecting the wireless signal, theelectronic device 3 sends an identity of the customer 7 who owns or isusing the electronic device 3 to the access control server 9 so thatidentity of the customer can be verified and the door 14 may be unlockedas described above. The identity of the customer 7 may also be sent tothe media control server 17 where upon verifying the identity is validthe media control server 17 is configured to send data to the monitor 8(Arrow B) on the ATM to cause the monitor 8 to present informationtailored to the customer based, at least in part, on identity of thecustomer and any prior know information retained about the customer. Themedia control server 17 may instead or in addition to the monitor 8 sendinformation for display on the wall monitor 24 (Arrow C) and/or adisplay on the electronic device 3 (Arrow A). The information displayedon these devices may be periodically updated or changed based on howlong the customer 7 is in the vestibule 12 or at the ATM 11. However,the updated information may still be personalized to the customer.

FIG. 4 illustrates a system 102 similar to the system 100 of FIG. 1additionally includes a media control server 17 and an analytics server23 that may operate as a database. In the embodiment of FIG. 4, theelectronic device 3 running a software application 5 detects the beacon1, as discuss earlier, as a customer 7 with the electronic device 3approaches the beacon 1. The electronic device 3 sends wireless data tothe access control server 9 indicating a unique identity the electronicdevice 3. The access control server 9 causes periodic collecting of datafrom the electronic device 3 associated with the customer 7 and thenstoring the data in the analytics server 23 (e.g., database). In someembodiments, the electronic device 3 (or more accurately an applicationrunning on the device) may keep track of recently visit web pages andwhat types of web pages the customer 7 visits on the electronic device3, what products the customer purchased through the electronic device,and other data as understood by those of ordinary skill in the art. Whenauthorized by the user of the electronic device 3, the electronic devicemay directly or indirectly periodically provide some or all of thisinformation to the analytics server 23 or another server.

Other embodiments of FIG. 4 include a network connected to the ATM 11and an intelligent display device capable of connecting to the networkto receive data and display data tailored to the customer 3 from themedia control server 17. In other configurations, this data may bedisplayed on the screen 8 of the electronic device 3 or other monitorsin the vestibule. The data is tailored to the customer based on datastored in the database 23. The media control server 17 may change thedisplayed content based on data stored in the database 23 while usingthe data in the database 23 to ensure the new information is stilltailored to the customer 7 using the electronic device 3. In someconfigurations, the media control server 17 or other servers may attimes display “private” commands that others are not intended to view.In these configurations, if the media control server 17 or anotherservers sees more than a fixed number of electronic devicesauthenticated/logged into the vestibule 12 then the media control servermay blur ATM screen and offer to continue or stop transactions to theATM 11 monitor 8 and/or other monitors in the vestibule.

In another configuration of the system 102 of FIG. 4, the media controlserver 17 prompts the customer with a message on the monitor 8 (e.g.,display) of the ATM 11 if the customer desires an advertisement to besent to the customer. If so, the advertisement is then sent to theelectronic device 3 for later viewing.

FIG. 5 illustrates an example system 103 that tracks the activity ofmultiple customers with electronic devices. Similar to the system 102 ofFIG. 4, the system 103 has a beacon 1, a server 9, a vestibule 12 (alsocalled a banking area in this embodiment), an ATM 11 with a monitor 8, adoor 14 providing external access to the vestibule 12, an interioraccess door 13, a media control server 17, an analytics server 23 and anoptional commercial structure 15 adjacent the vestibule 12. This system103 further includes an encounter server 25 and a control terminal 27.In this embodiment, two or more electronic devices running softwaredetect the beacon 1 as customers carry the electronic devices 3 movewithin range of the beacon 1. As the electronic devices 3 detect thebeacon 1 the electronic devices 3 send unique identifiers to the accesscontrol server 9 that identify each of the electronic devices 3 asassociated with one of the customers. Upon verifying a uniqueidentifier, the server 9 is configured to periodically collect data fromthat single electronic device associated with one single uniqueidentifier and stores this data in the analytic server 23. The encounterserver 25 is configured to, based on the periodically collected data, toperform one or more of tracking flow patterns of customers in thebanking area, schedule appointments with customers, log duration ofcustomer visits, log which customer 7 was at what location at what timeand for how long and generate an alert at the control terminal 27 whenthe data is not within predetermined range of values so that correctiveaction may be taken.

In another configuration, the encounter server 25 may contain a list ofappointments for customers scheduled to visit the commercial structure15. As customers arrive for these appointments, the system 103 of FIG. 5may detect them via the beacon and as discussed above, banking (orother) personnel may approach and greet these prescheduled customers, orother automated systems may prepare for their arrival.

In another embodiment, the system 103 tracks the ATM transactionalactivity of multiple customers with electronic devices. Electronicdevices 3 run software 5 to detect the beacon 1. As the electronicdevices 3 are carried by customers move within range of the beacon 1,the electronic devices 3 are configured to detect the beacon. Upondetecting the beacon, the electronic devices 3 send a unique identifierto the access control server 9 identifying an electronic device 3associated with one of the customers 7. Upon authenticating the uniqueidentifiers, the encounter server 25 periodically collects analyticaldata related to ATM transactions from the electronic devices and/or theATM and stores this data in the analytic server 23. The analytical datamay be one or more of the duration of customer visits at an ATM, time atan ATM, ATM transactional information, and the like. The encounterserver 25 generates an alert at the control terminal 27 when one or moreof the analytical data fall outside of an acceptable range.

FIG. 6 illustrates an example system 104 that uses geo-fencing to locatean ATM. The system 104 includes an access control server 59 with aprocessor 60 and other logic. The system 104 further includes avestibule 62 housing an ATM 61 having a monitor 58. The vestibule 62 hasexterior doors 64 and interior door(s) 63 that lead into an optionalcommercial structure 65, as illustrated. In this embodiment, FIG. 6illustrates that a geo-fencing system has partitioned the areas aroundthe vestibule 62 into three different areas including area A1, area A2and area A3, as illustrated. Areas A1-3 may also be call “cells”. Theseareas A1-3 may be bound by global positioning satellite (GPS)coordinates, cell tower/antenna coordinates or in another way asunderstood by one of ordinary skill in the art. Notice that thegeo-fencing system has pre-designated the vestibule 62 and ATM 61 to bein area A2 (or cell A2).

In operation, a customer in possession of the electronic device 53 mayroam from area A1 into area A2. Upon making this transition into areaA2, the geo-fencing software 55 running in electronic device 53determines that the electronic device is now in geo-fenced area A2 thatalso has the vestibule 62 in it. The electronic device 53 and itssoftware 55 also determine that the ATM 61 is located in area A2. Upondetecting the ATM 61 is within geo-fencing area A2, the electronicdevice 53 sends a message to the server 59 indicating the electronicdevice 53 is in geo-fenced area A2 with the ATM 63 together with anidentification of the electronic device 53. After verifying theidentification of the electronic device 53 and its associate customerare permitted inside the vestibule 62, the server 59 causes data to besent to a lock on the door 64 to unlock the door 64. Of course, in someembodiments the electronic device may prompt the customer via theelectronic device after entering area A2 to inquire if they desire toenter the vestibule 62. Only if the customer replies that they do wishto enter the vestibule, the electronic device 53 send a message to theserver 59 indicating the electronic device 53 is in geo-fenced area A2with the ATM 61 together with an identification of the electronic device53 and request access to the vestibule.

Example methods may be better appreciated with reference to flowdiagrams. While for purposes of simplicity, explanation of theillustrated methodologies are shown and described as a series of blocks.It is to be appreciated that the methodologies are not limited by theorder of the blocks, as some blocks can occur in different orders and/orconcurrently with other blocks from that shown and described. Moreover,less than all the illustrated blocks may be required to implement anexample methodology. Blocks may be combined or separated into multiplecomponents. Furthermore, additional and/or alternative methodologies canemploy additional, not illustrated blocks.

FIG. 7 illustrates a method 700 of opening a vestibule door. The method700 begins by moving an electronic device within range of a beacon, at702, to detect the beacon with the electronic device. The beacon isassociated with an ATM inside the vestibule and may be detected by theelectronic device as discussed above. A customer carrying the electronicdevice is prompted, at 704, if they desire to enter the vestibule anduse the ATM. When the customer desires to enter the vestibule, acommunication is sent to a server, at 706, with an identification of thecustomer and a request to enter the vestibule. When the customer isauthenticated to enter the vestibule, a message is sent from the serverto an outside door on the vestibule to unlock the outside door, at 708,allowing access inside the vestibule.

While principles and modes of operation have been explained andillustrated with regard to particular embodiments, it must beunderstood, however, that this may be practiced otherwise than asspecifically explained and illustrated without departing from its spiritor scope.

What is claimed is:
 1. A system comprising: a secure area with a secureentry; an automated transaction machine disposed within the secure area;and a beacon associated with the automated transaction machine, whereinthe secure entry is responsive to a command generated at least in partdue to an electronic device running a software application being incommunication proximity with the beacon.
 2. The system of claim 1 wherethe command is generated by a server receiving data from the electronicdevice.
 3. The system of claim 2 where the data includes at least one ofa unique identification of and location of the electronic device, thesoftware application, a customer, the beacon, or the automatedtransaction machine.
 4. The system of claim 1 where the secured are is avestibule and the secure entry is a secure door.
 5. The system of claim4 where the command is generated by a server receiving data from theelectronic device, where the data includes a request to access thevestibule, and where the command includes an instruction to unlock thesecure door.
 6. A system comprising: an automated transaction machine; abeacon associated with the automated transaction machine; a serverresponsive to data from an electronic device running a softwareapplication, where said data is sent to the server when the electronicdevice is within communication range of the beacon.
 7. The system ofclaim 6 where the automated transaction machine includes a display,where the data includes user correlated data, and where in response tothe server receiving the data the server causes the display to presentinformation tailored to the user.
 8. The system of claim 7, where theserver is configured to cause the display to present information oncethe electronic device is determined to be within a predetermineddistance from the beacon.
 9. The system of claim 6 further comprising asecure area with a secure entry with the automated transaction machinedisposed within the secure area; and where the server is operable tosend an unlock instruction to the secure entry in response to the datareceived from the electronic device.
 10. A system comprising: anautomated transaction machine; a beacon associated with the automatedtransaction machine; and a server in operative communication with adatabase; wherein when an electronic device running a softwareapplication that is configured to detect the electronic deviceapproaches the beacon, and the wireless device sends wireless data tothe server including at least being with in a communication range of thebeacon, the server updates the database based upon the data.
 11. Thesystem of claim 10 where the data includes a unique identifiercorrelated to at least one of the electronic device, the softwareapplication, or a user of the electronic device or software application.12. The system of claim 11, where the automated transaction machineincludes a display, and where the server is configured to send one ormore of the group consisting of advertisement material and informationbased, at least in part, on the data, to the display.
 13. The system ofclaim 11, where the server is configured to send one or more of thegroup consisting of advertisement material and information to a deviceselected from the group consisting of a tablet, a smart screen, a smartglass, or a smart device associated with the user, where theadvertisement material or information is based, at least in part, on thedata.
 14. The system of claim 10, wherein, in response to the data, theserver is configured to implement privacy enhancements that includemaking at least partially opaque at least a portion of one or more ofthe group consisting of a display, a tablet, a smart screen, or a smartglass associated with the automated transaction machine.
 15. The systemof claim 11, further comprising: an intelligent display device capableof receiving instructions from the server tailored to the user, andwherein the server is configured to change displayed content based, atleast in part, on some of the data in the database.
 16. The system ofclaim 12, wherein the server is configured to prompt the user with amessage on the display of the automated transaction machine to determinewhere the customer desires having information to be sent to them, andwhere the server sends the information to at least one of the groupconsisting of the display, a tablet, a smart screen, a smart glass, aphone and the electronic device depending upon the selection of theuser.
 17. A system comprising: a geo-fencing system defining ageo-fenced area; an automated transaction machine inside the geo-fencedarea; and a server responsive to communication from an electronic devicethat is configured to detect the geo-fenced area containing theautomated transaction machine to send instructions to the automatedtransaction machine.
 18. The system of claim 17 where the communicationincludes user identifying information.
 19. A method of opening access toan area containing an automated transaction machine, the methodcomprising: providing a beacon associated with an automated transactionmachine located in a secure area; receiving with a server, data from anelectronic device within communication range of the beacon; sending fromthe server instruction to unlock a secured entry to the secured area.