G07F19/209

INTELLIGENT ASSET MANAGEMENT
20230032308 · 2023-02-02 ·

A code associated with a managed device is scanned by a mobile device operated by service personnel. The code at least comprises an identifier for managed device. A current geographical location of the mobile device and the code are provided to a cloud/server. The location is associated with the managed device and updated or added to a shared private blockchain ledger. The shared private blockchain ledger shared between one or more enterprises and one or more service organizations. In an embodiment, the managed device dynamically generates the code and presents the code on a display associated with the managed device for scanning by the mobile device.

Automated Transaction Machine

An automated transaction machine includes upper and lower units. The lower unit has a chest with a main body. The main body of the lower unit forms a cavity and has interior and exterior walls, made of metal, metal alloys or composite metallic material. There is a non-metallic material layer disposed therebetween. There is opening for passage of documents or other items between the upper and lower units. The upper unit has a housing with a main body. The main body forms a cavity. The main body of the upper unit has an interior and an exterior wall. A transport system may be disposed in the housing to transport documents between the upper and lower units.

ELECTRONIC SYSTEM FOR PREDICTING, DETECTING, AND PREVENTING UNAUTHORIZED ACCESS EVENTS ASSOCIATED WITH ELECTRONIC SYSTEMS

Systems, computer program products, and methods are described herein for predicting, detecting, and preventing unauthorized access events associated with electronic systems. The present invention may be configured to receive, from a first automated teller machine, an alert message including information associated with a first unauthorized access event occurring at the first automated teller machine and determine, based on the information in the alert message, a location of the first automated teller machine. The present invention may be configured to identify a second automated teller machine proximate the location of the first automated teller machine and provide, to the second automated teller machine, one or more commands to be executed by the second automated teller machine to prevent a second unauthorized access event from occurring at the second automated teller machine.

Detecting unauthorized activity related to a computer peripheral device by monitoring voltage of the peripheral device

A system includes a motherboard configured to hold electronic devices and allow communication between one or more of the electronic devices, a power supply module configured to supply power to the one or more electronic devices, a peripheral device communicatively coupled to the motherboard using a peripheral port of the motherboard to perform at least one action related to an Automated Teller Machine (ATM), and a monitoring device communicatively coupled to the motherboard. The monitoring device is configured to monitor a voltage associated with the peripheral device and detect when the monitored voltage does not match an expected voltage associated with the peripheral device. In response to the detecting, the monitoring device determines that an unauthorized activity associated with the peripheral device has occurred.

SMART GLASS ORCHESTRATION ON CLOSE PROXIMITY ATMS
20230078916 · 2023-03-16 ·

This disclosure relates to an intelligent smart glasses that may be worn by a customer. The smart glasses may sense cash information on automated teller machine (“ATM”). The smart glasses may accordingly split up a cash transaction across various ATM units in close to proximity to the customer. The smart glasses may split a requested cash transactions among various ATMs so that if the desired amount/denomination of cash is not available at an ATM to the customer, the customer is seamlessly directed to one or more other ATMs that are capable of dispensing the desired amount of cash.

INTELLIGENT ASSET MANAGEMENT
20220335238 · 2022-10-20 ·

A code associated with a managed device is scanned by a mobile device operated by service personnel. The code at least comprises an identifier for managed device. A current geographical location of the mobile device and the code are provided to a cloud/server. The location is associated with the managed device and updated or added to a shared private blockchain ledger. The shared private blockchain ledger shared between one or more enterprises and one or more service organizations. In an embodiment, the managed device dynamically generates the code and presents the code on a display associated with the managed device for scanning by the mobile device.

CARD SKIMMING DETECTION

A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.

CARD SKIMMING DETECTION

A method includes: monitoring outputs of sensors in a machine that receives magnetic stripe cards; determining the outputs of sensors indicate normal usage of the machine or abnormal usage of the machine; in response to determining the outputs of the sensors indicate abnormal usage of the machine, initiating a security action; in response to determining the outputs of the sensors indicate normal usage of the machine, determining the machine is in use or not in use; in response to determining the machine is not in use, initiating the security action; in response to determining the machine is in use, determining whether the use ends within a predefined monitor time; in response to determining the use does not end within the predefined monitor time, initiating the security action; and in response to determining the use does end within the predefined monitor time, returning to monitoring the outputs of the sensors.

ATM with sensorized connectors for detecting removal thereof from the PC of the ATM with blocking of the delivery functions
11600157 · 2023-03-07 · ·

The proposed ATM comprises a microcontroller for controlling a banknote dispenser and a computer for managing the ATM, which are arranged inside and outside, respectively, a safe. The computer is provided with one or more ports for interfacing with it; all the ports are occupied by corresponding connectors. A motion sensor is associated with each single connector for detecting any tampering or movements indicative of its removal from the corresponding port; in this case, the dispensing of the banknotes is inhibited, for example, by interrupting an electrical power supply of the microcontroller and/or of the banknote dispenser. A corresponding operation method of the ATM is proposed. A program product for controlling the ATM are also proposed.

Automatic teller machine with pre-registration
11600151 · 2023-03-07 · ·

An ATM pre-registration tool allows a user to request an amount of cash from an ATM before traveling to that ATM. The pre-registration tool receivers a user's request and determines whether a specified ATM contains the requested cash. If the ATM does not contain the requested cash, the pre-registration tool informs the user that the ATM does not contain sufficient funds to fulfill the user's request. If the ATM contains the requested cash, the pre-registration tool instructs the ATM to reserve that cash for the user.