G07F19/207

Artificial Intelligence (AI)-Based Security Systems for Monitoring and Securing Physical Locations

Various aspects of the disclosure relate to monitoring a physical location to determine and/or predict anomalous activities. One or more machine learning algorithms may be used to analyze inputs from one or more sensors, cameras, audio recording equipment, and/or any other types of sensors to detect anomalous measurements/patterns. Notifications may be sent one or more devices in a network based on the detection.

SELF-SERVICE TERMINAL AND METHOD FOR PROVIDING SECURITY AT A SELF-SERVICE TERMINAL
20220406092 · 2022-12-22 ·

A self-service terminal and a method for providing security at a self-service terminal are disclosed, wherein the self-service terminal comprises: an imaging device, configured for providing at least one digital image; at least one processor, configured for applying a facial recognition method to the at least one digital image; and for controlling the self-service terminal using a facial recognition criterion depending on the result of the facial recognition method.

Mobile cash deposit system and method

An electronic cash deposit system includes a processor that receives a user-generated request for a deposit of cash into an account, receive data generated from a scan of a machine-readable image on a receptacle that receives the cash, perform a validation of the deposit of the cash based on a correlation between the data generated from the scan and a transaction key, generate confirmation of the deposit of the cash when the validation is confirmed, and send a notification to a banking system to update the account to reflect the deposit of the cash in response to the confirmation being generated.

Using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM
11521188 · 2022-12-06 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Systems and methods for monitoring components of and detecting an intrusion into an automated teller machine

The disclosed embodiments provide systems, methods, and articles of manufacture for detecting an intrusion of a product (e.g., an ATM) via an electronic tattletale. The disclosed embodiments may provide an ATM comprising a housing comprising an interior surface and a substance adhered to the interior surface, the substance comprising a piezoelectric element. The ATM may further comprise a detection circuit coupled to the substance, which may be configured to receive a first response signal generated by the substance and generate an indication of an intrusion into the housing, based on a comparison of the received first response signal to a predefined second response signal.

Systems and methods for a night drop system

Systems and methods relating to a lockbox bank for currency drop-offs are provided. A lockbox bank includes one or more lockboxes, a safe coupled to the one or more lockboxes, and a terminal of a lockbox computing system. Each lockbox includes a receptacle configured to receive a currency drop-off and a locking mechanism. The terminal includes a network interface, a display device, one or more input/output devices, and a processing circuit including a processor and a memory. The memory is structured to store instructions that are executable by the processor and cause the processing circuit to receive a request from the customer to use a lockbox for a currency drop-off, receive access credentials, verify the access credentials, in response to successful verification, grant the customer access to a lockbox, and in response to determining that the drop-off has been completed, move the drop-off from the receptacle to the safe.

ANTI-PEEP SYSTEM AND AUTOMATED TELLER MACHINE WITH ANTI-PEEP MECHANISM
20230054605 · 2023-02-23 ·

An anti-peep system applicable to an automated teller machine (ATM), which includes a main body and a display screen mounted on the main body. The anti-peep system includes a sensor and an anti-peep unit. The sensor includes a housing and a sensing element set in the housing; the housing is provided on the main body of the ATM, and the sensing element is used to sense whether there is an object located in an area in front of the display screen. The anti-peep unit is integrated into the display screen and electrically connected to the sensing element of the sensor. The anti-peep unit is enabled or disabled according to a sensing result of the sensing element to selectively shield the display screen.

Sustained authentication of a customer in a physical environment
11587411 · 2023-02-21 · ·

A system for use in allowing a user to conduct one or more transactions at one or more touchpoints in a business facility includes an authentication component, a tracking component, and a control component. The authentication component is configured to authenticate the user as a person allowed to conduct the one or more transactions. The tracking component is configured to track the user's location within the facility as the user moves through the facility. The control component is configured (a) to receive authentication information from the authentication component, (b) to receive location information from the tracking component, (c) to use the location information to recognize that the user has moved into position to engage one of the touchpoints, and (d) to deliver a message to the touchpoint authorizing the touchpoint to engage in one or more transactions with the user.

Transaction terminal fraud processing

Image analysis is performed on a user at a transaction terminal. Based on behaviors, expressions, and activities of the user, fraud or potential fraud is flagged. When fraud is flagged, the transaction terminal stops processing an active transaction on behalf of the user and alerts are sent. When potential fraud is flagged, images/video associated with the active transaction are sent for review and the active transaction may be suspended or permitted to proceed at the transaction terminal. In an embodiment, a same user conducting multiple transactions with different accounts at a same transaction terminal or multiple different transaction terminals within a configured period of time is automatically identified as fraud based on a fraud rule.

CASINO CAGE CASHOUT SYSTEM WITH INTEGRATED CHIP VALIDATION AND TRANSACTION RECORD GENERATION
20230042875 · 2023-02-09 ·

A casino cage cashout system includes integrated chip validation and transaction record generation. The system includes an interface to a chip reader. An output of the chip reader is used to generate chip information, including chip value, such as for causing an automated cash dispenser to dispense cash in an amount equal to the value of the chips being redeemed. The cage cashout system is also integrated with an anti-money laundering (AML) system, wherein the cage cashout system automatically generates a transaction report which include information regarding the chip cashout and transmits that report to the AML system.