US 12,073,673 B2
Utilizing a short-range wireless communication device to provide keyless access to a safe deposit box
Joshua Edwards, Philadelphia, PA (US); Abdelkadar M'Hamed Benkreira, Washington, DC (US); and Michael Mossoba, Arlington, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Aug. 2, 2023, as Appl. No. 18/364,178.
Application 18/364,178 is a continuation of application No. 17/446,624, filed on Sep. 1, 2021, granted, now 11,749,035.
Application 17/446,624 is a continuation of application No. 16/656,802, filed on Oct. 18, 2019, granted, now 11,113,907, issued on Sep. 7, 2021.
Application 16/656,802 is a continuation of application No. 16/425,109, filed on May 29, 2019, granted, now 10,453,287, issued on Oct. 22, 2019.
Prior Publication US 2023/0377393 A1, Nov. 23, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G07C 9/00 (2020.01); G07C 9/22 (2020.01); G07F 19/00 (2006.01); H04W 4/80 (2018.01)
CPC G07C 9/00309 (2013.01) [G07C 9/22 (2020.01); G07F 19/202 (2013.01); H04W 4/80 (2018.02); G07C 2009/00325 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a first device and from a second device associated with a secured location, first data identifying a first user;
providing, by the first device and to the second device, first authorization data indicating whether access to the secured location is authorized based on the first data;
starting, by the first device and based on the first authorization data indicating that access to the secured location is authorized, a timer;
receiving, by the first device and from the second device, second data associated with a second user;
providing, by the first device, to the second device, and based on starting the timer, second authorization data indicating whether access to the secured location is authorized based on the second data;
determining, by the first device, based on the first authorization data, and based on the second authorization data, whether access to the secured location is authorized; and
causing, by the first device and based on determining whether access to the secured location is authorized, an action to be performed associated with the secured location.