G07D11/26

Performing secure maintenance processing on an automated machine

A system for performing secure maintenance on automated machines may include a maintenance management apparatus and an automated machine. The maintenance management apparatus is configured for scheduling the maintenance appointment for the automated machine, in response to scheduling the maintenance appointment and creating and communicating a maintenance security code to the automated machine. The automated machine is configured for receiving a request from a maintenance provider to initiate the maintenance appointment, validating the maintenance provider using the maintenance security code and providing access to a secure item storage unit, determining that the maintenance provider has completed the maintenance appointment, and communicating information associated with the maintenance appointment to the maintenance management apparatus and/or a computing device of the maintenance provider.

Performing secure maintenance processing on an automated machine

A system for performing secure maintenance on automated machines may include a maintenance management apparatus and an automated machine. The maintenance management apparatus is configured for scheduling the maintenance appointment for the automated machine, in response to scheduling the maintenance appointment and creating and communicating a maintenance security code to the automated machine. The automated machine is configured for receiving a request from a maintenance provider to initiate the maintenance appointment, validating the maintenance provider using the maintenance security code and providing access to a secure item storage unit, determining that the maintenance provider has completed the maintenance appointment, and communicating information associated with the maintenance appointment to the maintenance management apparatus and/or a computing device of the maintenance provider.

MEDIUM PROCESSING DEVICE AND MEDIUM TRANSACTION DEVICE

A medium processing device includes: a drum that is rotatably supported, that rotates around a rotation axis, and that winds a medium around a peripheral side surface thereof; a first tape that winds the medium sandwiched between the peripheral side surface and the first tape, accompanying rotation of the drum; a movable guide that is movable following a drum diameter of the drum, which changes depending on a winding amount of the medium, and that guides the medium; and a first static electricity elimination section that is provided at the movable guide, that abuts the first tape, and that performs static electricity elimination of an electric charge of the charged first tape.

MEDIUM PROCESSING DEVICE AND MEDIUM TRANSACTION DEVICE

A medium processing device includes: a drum that is rotatably supported, that rotates around a rotation axis, and that winds a medium around a peripheral side surface thereof; a first tape that winds the medium sandwiched between the peripheral side surface and the first tape, accompanying rotation of the drum; a movable guide that is movable following a drum diameter of the drum, which changes depending on a winding amount of the medium, and that guides the medium; and a first static electricity elimination section that is provided at the movable guide, that abuts the first tape, and that performs static electricity elimination of an electric charge of the charged first tape.

Automated machine with self-reconciliation of resources

A system for performing secure maintenance on automated machines may include a maintenance management apparatus and an automated machine. The maintenance management apparatus is configured for scheduling the maintenance appointment for the automated machine, in response to scheduling the maintenance appointment and creating and communicating a maintenance security code to the automated machine. The automated machine is configured for receiving a request from a maintenance provider to initiate the maintenance appointment, validating the maintenance provider using the maintenance security code and providing access to a secure item storage unit, determining that the maintenance provider has completed the maintenance appointment, and communicating information associated with the maintenance appointment to the maintenance management apparatus and/or a computing device of the maintenance provider.

Automated machine with self-reconciliation of resources

A system for performing secure maintenance on automated machines may include a maintenance management apparatus and an automated machine. The maintenance management apparatus is configured for scheduling the maintenance appointment for the automated machine, in response to scheduling the maintenance appointment and creating and communicating a maintenance security code to the automated machine. The automated machine is configured for receiving a request from a maintenance provider to initiate the maintenance appointment, validating the maintenance provider using the maintenance security code and providing access to a secure item storage unit, determining that the maintenance provider has completed the maintenance appointment, and communicating information associated with the maintenance appointment to the maintenance management apparatus and/or a computing device of the maintenance provider.

SYSTEMS AND METHODS FOR IMPROVING CASH MANAGEMENT SYSTEM OPERATION

Implementations described and claimed herein provide systems and methods for improving cash management system operation. In one implementation, a method for improving cash management system operation includes detecting an intervention event in connection with user activity of a user involving a cash management system. The method determines whether the intervention event meets an intervention threshold. A customized intervention particular to the intervention event and a the user is generated when the intervention event meets the intervention threshold. The customized intervention is output for presentation to the user. The customized intervention improves the user activity involving the cash management system.

SYSTEMS AND METHODS FOR IMPROVING CASH MANAGEMENT SYSTEM OPERATION

Implementations described and claimed herein provide systems and methods for improving cash management system operation. In one implementation, a method for improving cash management system operation includes detecting an intervention event in connection with user activity of a user involving a cash management system. The method determines whether the intervention event meets an intervention threshold. A customized intervention particular to the intervention event and a the user is generated when the intervention event meets the intervention threshold. The customized intervention is output for presentation to the user. The customized intervention improves the user activity involving the cash management system.

COMPUTER-BASED SYSTEMS CONFIGURED TO DETECT FRAUDULENT ACTIVITIES RELATED TO CARD-TRANSACTING DEVICES AND METHODS OF USE THEREOF
20210334715 · 2021-10-28 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.

COMPUTER-BASED SYSTEMS CONFIGURED TO DETECT FRAUDULENT ACTIVITIES RELATED TO CARD-TRANSACTING DEVICES AND METHODS OF USE THEREOF
20210334715 · 2021-10-28 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.