G07F19/206

Automated banking machine firmware flow control

Described in example embodiments herein are techniques for implementing an automated banking machine such as an ATM. An example embodiments, tracks the flow of a note through an ATM. Another embodiment corrects errors detected during a note flow. Some embodiments are in the form of security protocols for communications or other communication protocols, or techniques for monitoring devices operating in the ATM. Yet another example embodiment is directed to security of a currency cassette. Still yet another embodiment is directed to detecting tampering of the ATM's gate and/or shuttle. Yet still another embodiment determines if notes in a shuttle were delivered.

SYSTEMS AND METHODS FOR CARD-HANDLING BY POINT OF SALE DEVICES
20230092463 · 2023-03-23 ·

A computer vision card reader and/or point of sale device is described. The device is configured to sense when a user inserts a card into a card reader and to determine when a user departs or is about to depart from the device without retrieving the card. The device may issue an audible or visible alert to the user, reminding the user to retrieve the card. The device may additionally send a notification to a mobile device associated with the user that reminds the user that he has left a card at the point of sale. In some embodiments, message sent to the user contains a code and, upon entry of the code, the point of sale or card reader device returns the card to the user.

ELECTRONIC SYSTEM FOR PREDICTING, DETECTING, AND PREVENTING UNAUTHORIZED ACCESS EVENTS ASSOCIATED WITH ELECTRONIC SYSTEMS

Systems, computer program products, and methods are described herein for predicting, detecting, and preventing unauthorized access events associated with electronic systems. The present invention may be configured to receive, from a first automated teller machine, an alert message including information associated with a first unauthorized access event occurring at the first automated teller machine and determine, based on the information in the alert message, a location of the first automated teller machine. The present invention may be configured to identify a second automated teller machine proximate the location of the first automated teller machine and provide, to the second automated teller machine, one or more commands to be executed by the second automated teller machine to prevent a second unauthorized access event from occurring at the second automated teller machine.

Videoconferencing with a customer device
11610189 · 2023-03-21 · ·

In an example embodiment, there is described herein an automated banking machine with a user interface that enables a customer perform a financial transaction. The automated banking machine also comprises a first interface for communicating with a remote service provide and a second interface that can communicate with a customer service device. Upon receiving an input from the customer requesting assistance, the automated banking machine establishes a communication link between the remote service provider and the customer device. The communication link enables audio, video, or a combination of audio and video data to be sent between the customer device and the remote service provider.

Linked transaction camera with cached video log
11611724 · 2023-03-21 · ·

A management terminal manages a plurality of Self-Service Terminals (SSTs) for customer-assistance, transaction overrides, theft determinations, and transaction security audits. One or more overhead cameras stream real-time video of the transactions being processed at the SSTs to a server. Transaction data produced in real time at the SSTs are also provided to the server. The video is correlated with the transaction data and evaluated for security events. The video is also cached on the server. An operator of the management terminal can access a video review interface based on events and/or information visually gleaned by the operator during the transactions. The interface permits the operator to view a configured cached portion of the video captured for any given transaction to provide context to the operator for determining whether to perform or whether not to perform a transaction audit.

Machine learning based detection of fraudulent acquirer transactions

Examples described herein relate to apparatuses and methods of detecting fraudulent activity at an automated teller machine (ATM) using a machine learning model. A method includes receiving ATM activity data indicative of one or more withdrawal transactions at one or more ATMs using a transaction card, receiving transaction data and ATM data, ingesting the transaction data and the ATM data, analyzing the ingested transaction data and the ingested ATM data using a machine learning model, determining that the ingested transaction data and the ingested ATM data indicate a likelihood of fraudulent activity using the machine learning model, and performing, using the machine learning model, one or more remedial actions based on the determined likelihood of fraudulent activity.

Modular automated transaction machine

A modular ATM can include a cabinet module and a head module. The cabinet module can include an outer housing, a chest positioned in the outer housing to store notes of value, a transport mechanism to move the notes of value out of the chest, a base receiving section, and a first electrical connector forming an electrical connection to the transport mechanism. The head module can be removably engageable with the cabinet module and include a computing device, at least one user-interface device controlled by the computing device, a main structure supporting the at least one user-interface device and the computing device, a rear shroud connected to the main structure, a base supporting the main structure and the rear shroud, and a second electrical connector mounted in the base and forming an electrical connection to the computing device.

SYSTEMS AND METHODS FOR PROCESSING PREAUTHORIZED AUTOMATED BANKING MACHINE-RELATED TRANSACTIONS

A method for facilitating payment transactions includes receiving a transaction request for a payment transaction initiated at a payment terminal device using a transaction card of a user. A predefined category of the user is identified based on the transaction request and a service application is remotely activated in a first operation mode on a user device of the user such that the first operation mode is associated with the identified predefined category. Payment transaction messages associated with the payment transaction are communicated to the activated service application, which translates the payment transaction messages to a predefined message format. In response to the payment transaction messages, first authentication information is received from the activated service application such that the first authentication information is entered by the user in the predefined message format. The payment transaction is processed based on successful authentication of the user.

SYSTEM AND METHOD FOR REMOTE ACCESS
20230119429 · 2023-04-20 ·

A technique for remote access via a computing device is discussed. In one embodiment, a computing device receives data indicative of a card number associated with a bank-issued debit card. The debit card is associated with a bank account at a bank that issued the bank-issued debit card. The computing device also receives data indicative of an amount of cash to be deposited into the account based on an amount of cash provided at the computing device location. Encrypted data indicative of the card number and the data indicative of the amount of cash is routed to a gateway vendor server and is further routed to a payment network server for deposit of an amount corresponding to the data indicative of the amount of cash into the bank account associated with the card number.

INTEROPERABLE MOBILE-INITIATED TRANSACTIONS WITH DYNAMIC AUTHENTICATION
20230117833 · 2023-04-20 ·

A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.