G07F19/207

Linked transaction camera with cached video log
11611724 · 2023-03-21 · ·

A management terminal manages a plurality of Self-Service Terminals (SSTs) for customer-assistance, transaction overrides, theft determinations, and transaction security audits. One or more overhead cameras stream real-time video of the transactions being processed at the SSTs to a server. Transaction data produced in real time at the SSTs are also provided to the server. The video is correlated with the transaction data and evaluated for security events. The video is also cached on the server. An operator of the management terminal can access a video review interface based on events and/or information visually gleaned by the operator during the transactions. The interface permits the operator to view a configured cached portion of the video captured for any given transaction to provide context to the operator for determining whether to perform or whether not to perform a transaction audit.

Detecting unauthorized activity related to a computer peripheral device by monitoring voltage of the peripheral device

A system includes a motherboard configured to hold electronic devices and allow communication between one or more of the electronic devices, a power supply module configured to supply power to the one or more electronic devices, a peripheral device communicatively coupled to the motherboard using a peripheral port of the motherboard to perform at least one action related to an Automated Teller Machine (ATM), and a monitoring device communicatively coupled to the motherboard. The monitoring device is configured to monitor a voltage associated with the peripheral device and detect when the monitored voltage does not match an expected voltage associated with the peripheral device. In response to the detecting, the monitoring device determines that an unauthorized activity associated with the peripheral device has occurred.

AUTOMATED TELLER MACHINE (ATM) ONLOOKER DETECTION

An ATM system is provided. The system may include a back-end server, an ATM CPU that receives information relating to the ATM, an ATM dispenser configured to dispense a cash withdrawal amount in the event that the ATM CPU receives information relating to a selection of a cash withdrawal amount and a mobile computer. The mobile computer may include a CPU, a keypad, a touch screen having a diagonal dimension of between 9 inches and 17 inches, and an interface system that interfaces between the ATM CPU and MC CPU, wherein the back-end server is configured to format and transmit an API call to request information regarding an ATM session. The ATM may be configured to respond to the API call and the back-end server is configured to respond to an API call response. The back-end server response may be further configured for display on the touch screen.

CARD SKIMMING DETECTION

A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.

CARD SKIMMING DETECTION

A method includes: monitoring outputs of sensors in a machine that receives magnetic stripe cards; determining the outputs of sensors indicate normal usage of the machine or abnormal usage of the machine; in response to determining the outputs of the sensors indicate abnormal usage of the machine, initiating a security action; in response to determining the outputs of the sensors indicate normal usage of the machine, determining the machine is in use or not in use; in response to determining the machine is not in use, initiating the security action; in response to determining the machine is in use, determining whether the use ends within a predefined monitor time; in response to determining the use does not end within the predefined monitor time, initiating the security action; and in response to determining the use does end within the predefined monitor time, returning to monitoring the outputs of the sensors.

ATM with sensorized connectors for detecting removal thereof from the PC of the ATM with blocking of the delivery functions
11600157 · 2023-03-07 · ·

The proposed ATM comprises a microcontroller for controlling a banknote dispenser and a computer for managing the ATM, which are arranged inside and outside, respectively, a safe. The computer is provided with one or more ports for interfacing with it; all the ports are occupied by corresponding connectors. A motion sensor is associated with each single connector for detecting any tampering or movements indicative of its removal from the corresponding port; in this case, the dispensing of the banknotes is inhibited, for example, by interrupting an electrical power supply of the microcontroller and/or of the banknote dispenser. A corresponding operation method of the ATM is proposed. A program product for controlling the ATM are also proposed.

Fraud detection system and method
11475741 · 2022-10-18 · ·

A system and method for detecting a foreign object is disclosed. A transmit assembly has a transmit electrode, a ground plane, and a shield electrode positioned between the transmit electrode and the ground plane. Drive circuitry applies a predetermined fixed signal to the transmit electrode and to the shield electrode. A receive assembly is positioned adjacent to the transmit assembly and has a receive electrode. Detection circuitry is coupled to the receive electrode and generates a receive signal based the predetermined fixed signal applied to the transmit electrode. A controller monitors the receive signal to determine when a foreign object has been placed in proximity to the transmit assembly and/or the receive assembly.

Remotely Upgradable Automated Banking Machine
20220327896 · 2022-10-13 ·

In an example embodiment, there is disclosed herein a technique that allows the capabilities of an automated banking machine, such as an ATM, to be upgraded remotely. For example, the banking machine may be sold or leased with an initial configuration. It the customer desires to add additional features, the customer can pay for the features and the manufacturer or dealer can send a signal from a remote host to the automated banking machine with data representative of the upgrade. The banking machine then operates with the upgraded configuration.

Methods and systems for demonstrating a personalized automated teller machine (ATM) presentation

A computer-implemented method for demonstrating a personalized automated teller machine (ATM) presentation to a user may include: obtaining transaction data of the user via a device associated with the user; obtaining, via the one or more processors, geographic data of the user based on the transaction data; generating, via the one or more processors, ATM data based on the geographic data of the user; obtaining, via the one or more processors, user feedback data based on the ATM data, wherein the user feedback data comprises a selection of an ATM of the list of the ATMs; transmitting, to the selected ATM of the list of the ATMs, presentation data based on the transaction data and the user feedback data; and demonstrating, via the selected ATM of the list of the ATMs, the personalized ATM presentation to the user based on the presentation data.

Kiosk security system

Image processing techniques can be used to determine whether a person has installed an unauthorized device on or in a kiosk. For example, an image processing server can determine whether a person's hand(s) are engaging in abnormal behavior by obtaining recorded images of the person's hand(s) that extend towards the kiosk to perform an action, and by comparing the information in the recorded images with a set of previously known information about other persons' hands that are similarly extended towards the kiosk.