G07F19/211

Systems and methods for predicting performance

The present disclosure relates to system and methods for predicting performance caused by software code changes. For this purpose, an augmented machine learning model predicts a latency of software module with updated code executed in a production environment. In some aspects, the latency is predicted based on a change of deviation that is determined by comparing the latency of the software module with updated code and the latency of the software module without updated code, whereas the software modules are executed in environments different from the production environment.

Cash delivery application

Systems, methods, and apparatuses described herein relate to a method for delivering cash to a user. The method includes receiving a cash delivery request from a first user device of the user. The method includes generating a cash authentication code (CAC) for the cash delivery request to be verified by a cash dispenser machine. The method may include transmitting the cash delivery request and the CAC to a second user device of a driver. The method may include determining a route for the driver from a first location of the driver, to a second location of a cash dispenser machine, and to a third location of the customer to deliver the cash delivery request. The method may include instructing the cash dispenser machine to dispense cash in response to authenticating the second user device based on the CAC and determining that the first current location is at the second location.

Self-service modular drop safes with messenger access capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

Automated teller machines (ATMs) having offline functionality

A device may receive customer data, and store the customer data in a secure memory device of the device. The device may implement a backup mode in which the device utilizes the customer data to authorize requests based on determining that the device lacks a network connection. The device may receive, when the device is in the backup mode, a request for currency that includes authentication information. The device, while in the backup mode, may authorize the request for currency based on comparing the authentication information and the customer data. The device may dispense currency based on a result of comparing the authentication information and the customer data. The device may store transaction data associated with dispensing of the currency to permit the transaction data to be transmitted when the network connection is restored.

Map on a phone used to find and operate public multi-user devices
11537352 · 2022-12-27 ·

A phone display, shows an internet map. The map allows a user to search for, and operate, multiuser public devices, such as, a hydrogen car fuelling station. The user finds the device, by viewing the device's location, and the phone's location on the map. For example, the phone searches for, and finds elevators, which are shown on the map. The user finds an elevator, by using the map. The user touches the elevator's displayed menu, to receive the elevator's menu's control panel. The received control panel, is displayed on the phone. The user requests the elevator move to the 4 floor, by touch activating a floor 4 icon, on the phone elevator panel. The phone, and elevator computer communicate, over the internet wirelessly, or wirelessly. The user avoids bacteria, that may be on a store's self serve check out machine's physical touch screen, by operating it with the phone.

Wireless device for retrofitting ATMs
11521187 · 2022-12-06 · ·

A wireless device is provided for retrofitting ATMs. The wireless device including a memory; at least one hardware processor coupled to the memory; a hardware interface coupled to the least one hardware processor; and, at least one antenna coupled to the at least one hardware processor, where the at least one hardware processor is configured to: (i) receive over the at least one antenna an instruction to retrieve state data; (ii) receive the state data over the hardware interface from an ATM; and, (iii) transmit over a virtual private network (VPN) using the at least one antenna the state data, where the VPN is separate from a financial institution network the ATM communicates with to perform transactions.

Efficient propagation of user data across disparate systems

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for fluid blob tracking. One of the methods includes receiving from a user device, a request to change an address with a financial institution. The method includes accessing an electronic bill pay system of the financial institution. The method includes identifying an external party to notify of the change of address based on data in an electronic bill pay system. The method also includes notifying the external party of the change of address, wherein the external party is independent of the financial institution.

SYSTEMS AND METHODS FOR UPDATING AUTOMATIC TELLER MACHINES
20220374222 · 2022-11-24 ·

Disclosed herein are systems and methods for deploying and/or rolling back automatic teller machine (ATM) updates. Such methods can store a back-up system image of a client operating system on a virtual hard drive. When an update is deployed from a host operating system to the client operating system, the system update may fail to install properly, and the ATM may shut down. In response, the host operating system can execute instructions to the client operating system to boot from a bootable image on the virtual hard drive. Then, the virtual hard drive can emulate, by a boot loader on the back-up system image, the client operating system on the ATM from the virtual hard drive without loading the client operating system. Then, the virtual hard drive can install a rolled-back operating system on the ATM. The rolled-back operating system can comprise the back-up system image.

Systems and methods for processing preauthorized automated banking machine-related transactions

Embodiments of the disclosure enable a transaction to be preauthorized. A system receives a request for preauthorization of a transaction including a transaction amount and a cardholder identifier, identifies a cardholder account based on the cardholder identifier, determines a transaction timeframe and a machine identifier, and accesses the cardholder account to determine whether to process the transaction in accordance with a nonvisual communication program. On condition that the transaction is to be processed in accordance with the nonvisual communication program, the system generates an instruction to identify a capture time, determine whether the capture time satisfies the transaction timeframe, and dispense the transaction amount of cash in accordance with the nonvisual communication program on condition that the capture time satisfies the transaction timeframe. Aspects of the disclosure provide for preauthorizing the transaction in a secure and user-friendly manner.

Cluster-based security for network devices

A system may include a first automated teller machine (ATM) and a second ATM, wherein the first ATM and the second ATM are in communication via a local area network. The first ATM obtains a user input value, generate an encryption key based on the user input value, and generates encrypted authentication information based on the encryption key. The first ATM also obtains a first biometric reading, updates a user record based on the first biometric reading, and stores the encrypted authentication information at the first ATM in association with the user record. The second ATM obtains a second biometric reading and a duplicate value, retrieves the encrypted authentication information associated with the user record based on the second biometric reading, generates a decryption key based on the duplicate value, and decrypts the encrypted authentication information to retrieve the authentication information.