MIRRORING AUTOMATED TELLER MACHINE USER INTERFACE
20220058601 · 2022-02-24
Inventors
- Raziq Yaqub (Stewartsville, NJ, US)
- Ramanathan RAMANATHAN (Bellevue, WA, US)
- Abhijit RAO (Irvine, CA, US)
Cpc classification
International classification
G06Q20/10
PHYSICS
Abstract
The innovation discloses systems and methods of mirroring a User Interface (UI) of an Automatic Teller Machine (ATM) on a Display screen in a Vehicle (DIV) or mobile Device in Vehicle (DIV) of an occupant of a vehicle which stops in close proximity to the ATM for a financial transaction. The innovation can employ an App (or application) installed in the DIV, smart software installed in the ATM, and Service Support Servers (SSS) in a cloud or bank network. A Device Management Server (DMS) manages the SSS and acts as a gateway between the ATM and SSS. A multi-level (e.g., three level) authentication/authorization can be employed whereby 1) the DIV and ATM are verified and connected to a secure network, 2) the user is verified, and 3) the dispersal of funds into the cabin of the vehicle is authorized.
Claims
1. A method for utilizing an automated teller machine (ATM), comprising: detecting a computing device comprising a display in a vehicle within a predetermined range of an ATM; mirroring a user interface of the ATM on a display of the computing device, wherein mirroring employs a protocol to facilitate a secure financial transaction from the vehicle as follows: authenticating the ATM and computing device based on corresponding credentials; establishing a secure connection between the ATM and the computing device by way of a device management server (DMS); and authorizing mirroring of the user interface over the secure connection; authenticating a user by way of a first user credential; authorizing an account operation by the user; receiving input via the user interface of the computing device requesting a disbursement of assets as per the account operation; reauthenticating the user by way of the a second user credential; and dispensing the assets from the ATM.
2. The method of claim 1, further comprising: connecting the computing device and ATM on a common network with a public key infrastructure (PKI); exchanging a session key between the computing device and ATM via the connection; and authorizing the computing device to mirror the ATM based on the session key.
3. The method of claim 2, further comprising: receiving ATM card information of the user, wherein the ATM card information is the first user credential; sending the ATM card information of the user to an authentication server via a secure network; collecting the second user credential; and comparing the ATM card information and the second user credential to previously verified user information.
4. The method of claim 3, further comprising: collecting at least a third user credential from the user; authorizing disbursement of funds from the ATM, as per user instructions made over the computing device; and comparing the third user credential to previously verified user information, wherein the computing device accepts commands from the user via voice command or graffiti on touchscreen.
5. The method of claim 1, wherein the assets are dispensed directly into a cabin of the vehicle via a robotic arm, the arm being operative to alert authorities via a silent alarm upon actuation by the user.
6. The method of claim 1, further comprising: terminating the connection between the computing device and ATM after funds are disbursed; and destroying session data.
7. The method of claim 1, wherein the method employs a software application stored in the computing device, a smart software client installed in the ATM, or service supporting servers in a cloud or financial industry network, wherein, caching, machine learning, and password retention are provided.
8. A system for delivering automated teller machine (ATM) service into a motor vehicle, the system comprising: an ATM operative to: detect a computing device within a motor vehicle within a predetermined range of the ATM, wherein the computing device comprises a display on to which a user interface of the ATM can be mirrored and interacted with to request disbursement of assets, establish a communication protocol with the computing device before regarding a connection secure such that after a connection is established between the ATM and the computing device, the ATM receives a negotiation request from the computing device, the negotiation request including a data packet that informs the ATM of a communication protocol supported by the computing device, deem the connection as secure when the ATM and the computing device support the communication protocol identified in a negotiation message, utilize an earlier version of the communication protocol when the ATM is not configured to support the communication protocol specified in the negotiation message and limit information from the computing device, and receive account information from a secure store in the computing device; a device management server (DMS) that authenticates the computing device and a user of the computing device to provide access to the ATM; and a robotic arm operative to dispense the assets to the user.
9. The system of claim 8, wherein the system further comprises: a software application stored in the computing device, executed by at least one processor contained therein, a smart software client installed in the ATM, executed by at least one processor contained therein, and at least one service supporting server (SSS), including at least an authentication server.
10. The system of claim 9, wherein the DMS manages SSS necessary for system operations, and acts as a gateway between the ATM and SSS.
11. The system of claim 10, wherein the DMS: connects the computing device and ATM on a common network with a public key infrastructure (PKI); facilitates exchange of a session key between the computing device and ATM via the connection; and authorizes the computing device to mirror the ATM based on the session key.
12. The system of claim 11, wherein: the authentication server receives ATM card information of the user over a secure network, wherein the ATM card information is a first authentication credential; the computing device provides the ATM at least a second authentication credential; the ATM forwards account information and the second authentication credential to the authentication server; and the authentication server compares the account information and the first authentication credential and the second authentication credential to previously verified user information, and if the information matches, the authentication server sends an approval code to the ATM through the DMS.
13. The system of claim 12, wherein: the computing device provides the ATM at least a third authentication credential; the ATM forwards the third authentication credential to the authentication server; the authentication server compares the third authentication credential to previously verified user information, and if the information matches, the authentication server sends a first approval code to the ATM through the DMS; the authentication server sends a second approval code to the robotic arm; and the robotic arm, upon receipt of the second approval code, dispenses assets to user.
14-20. (canceled)
21. A method, comprising: executing, on a processor, instructions that cause the processor to perform operations comprising: detecting presence of a computing device within a predetermined range of an automated teller machine, wherein the computing device comprises a display and forms part of or is present inside a vehicle; authenticating the automated teller machine and the computing device based on provider credentials; establishing a secure communication channel between the automated teller machine and the computing device after successfully authenticating the automated teller machine and the computing device; authorizing mirroring of a user interface of the automated teller machine on the display of the computing device by way of the secure communication channel; authenticating a user of the computing device by way of a first user credential; authorizing an account operation by a user of the user computing device by way of the user interface mirrored on the display of the computing device after successful user authentication, wherein the account operation corresponds to asset disbursement; reauthenticating the user by way of a second user credential; and triggering disbursement of an asset to the user after successful reauthentication.
22. The method of claim 21, wherein triggering disbursement causes a robotic arm to extend into a cabin of the vehicle through an open window.
23. The method of claim 22, wherein the operations further comprise reauthenticating the user based on the second user credential provided through the robotic arm.
24. The method of claim 23, wherein the second user credential is a personal identification number entered on a keypad connected to the robotic arm.
25. The method of claim 21, wherein the operations further comprise terminating the secure communication channel after the asset is dispersed.
26. The method of claim 21, wherein the operations further comprise establishing the secure communication channel between the automated teller machine and the computing device by way of a server.
27. The method of claim 26, wherein the operations further comprise authorizing mirroring the user interface of a third-party automated teller machine to the display of the computing device based on communication between the server and a third-party server.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] Aspects of the disclosure are understood from the following detailed description when read with the accompanying drawings. It will be appreciated that elements, structures, etc. of the drawings are not necessarily drawn to scale. Accordingly, the dimensions of the same may be arbitrarily increased or reduced for clarity of discussion, for example.
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
DETAILED DESCRIPTION
[0017] The innovation is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the innovation can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the innovation.
[0018] As used in this application, the terms “component”, “module,” “system”, “interface”, and the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components residing within a process or thread of execution and a component may be localized on one computer or distributed between two or more computers.
[0019] Furthermore, the claimed subject matter can be implemented as a method, apparatus, or article of manufacture using standard programming or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
[0020]
[0021] In aspects, either, or both, the ATM 110 or the DIV 130 (or device outside a vehicle (e.g., smartphone in a walkup scenario) can listen or otherwise actively monitor for an opportunity to pair or otherwise connect. As will be understood, most any communication or network protocol can be used in aspects including, but not limited to, Bluetooth, NFC (near field communication), wireless, cellular, or the like.
[0022] While aspects described herein are related to mirroring or replicating functionality and/or GUIs within a vehicle, it is to be understood that alternative aspects can include mirroring and/or replicating ATM functionality upon most any electronic device. By way of example and not limitation, functionality replication can be conveyed or transferred to most any mobile device (e.g., smartphone, tablet, smartwatch, etc.) without departing from the spirit and/or scope of the innovation and claims appended hereto. Similarly, while traditional ATM communication is effected via buttons/keypads, the innovation herein contemplates alternative inputs including, but not limited to voice commands, graffiti on touch screen, or the like. It will be appreciated that, in examples, a user will have more privacy within the cabin a vehicle thereby enhancing the ability to use alternative input modalities. These alternative aspects are to be included within the scope of the innovation and claims appended hereto.
[0023]
[0024] To perform the mirroring operation, in an aspect, the system 200 can utilize a software application stored in the DIV 130, a smart software client installed in the ATM and service supporting servers (SSS) in a cloud or financial industry network. The DMS 230 manages the SSS for system operations, and can perform as a gateway between the ATM 110 and the SSS. In aspects, the system can also include a robotic arm (not shown in
[0028] While the mirroring operation has been described above with reference to a secure banking network, other available networks, such as a mobile network associated with the DIV 130 may also be used without departing from the spirt and/or scope of the innovation and claims appended hereto. While the described illustrations depict a proximity connection between the ATM 110 and DIV 130, it is to be appreciated that data exchange may also take place through a remote (e.g., cloud-based) server. In alternate embodiments, through caching, machine learning, password retention, etc., multiple authentication steps can be simplified and future mirroring can be facilitated with less user input. These and other contemplated aspects are to be included within the spirit and scope of the innovation and claims appended hereto.
[0029] The ATM 110 and DIV 130 may implement a packet manager which securely handles the information exchange between the ATM 110 and DIV 130. As will be appreciated, the transmission of sensitive information can be processed in accordance with known protocols.
[0030] Regarding Authentication for Financial Transaction [0031] In some embodiments, the ATM card (or account) information can be securely saved in the DIV in a hashed/encrypted form. In these embodiments, the card can be referred to as a Virtual ATM Card, or V-ATM Card. As will be understood, a V-ATM card enhances convenience and reduces the risk of theft (or misplacement) of a physical ATM card. Alternatively, the DIV may be retrofit to accept a virtual card, for instance, with an off-the-shelf card reader or chip reader. The card reader will allow the user to swipe his or her ATM card. [0032] In another embodiment, the DIV may send ATM card (or account) information to the authentication server 205 on a secure channel, not established through the ATM network, but provided by the mobile network of a mobile network service provider. [0033] In yet another embodiment, a combination of both channels (ATM network and mobile network) could be used to augment authenticity and security. [0034] For enhanced security, it is appreciated that complete recognition of the user and card (virtual or physical), may request the user to input further credentials including, but not limited to, a Personal Identification Number (PIN), biometric data and/or the like. [0035] In an embodiment, a digital wallet of the user can be employed for the financial transaction. For instance, the digital wallet will reside either on the mobile device of the user or on the DIV.
[0036] Upon delivery of services/property in the cabin of the vehicle, the secure channel between the ATM 110 and the DIV 130 is decoupled and, in some aspects, all session data is destroyed.
[0037] In yet other aspects, the innovation allows for seamless roaming. Roaming in this context refers to when a user utilizes a third-party ATM, locally or in a foreign country. In such an instance, the DMS of the third-party institution passes the ID identification to the DMS 230 of the user for verification. Upon verification, the third-party ATM allows mirroring.
[0038]
[0045]
[0053]
[0054] The retractable robotic arm 510 can be fitted with an emergency button 550, exposed while the arm is deployed, that, when actuated by the ATM patron, will notify authorities via a silent alarm. In other aspects, voice or other audible commands can be employed.
[0055] Additionally, the retractable robotic arm 510 is fitted with precision sensors 560 that sense the proximity of the arm 510 to the vehicle of the patron, as well as other objects or persons, so as to avoid accidental collisions. The precision sensors 560 also guide the retractable robotic arm 510 to a vehicle window.
[0056] The retractable robotic arm 510 can be coupled to the ATM via a soft rubber coupling 570. In aspects, the retractable robotic arm 510 is programmed to knock at the vehicle window in the event the window is closed.
[0057] Dedicated sensors 580 reside within the housing. The dedicated sensors 580 scan the retractable robotic arm 510 for skimmers, infections and other malicious programs when it retracts after dispensing funds. The dedicated sensors 580 mitigate most any threats found during scanning.
[0058] With reference to
[0059]
[0060] At 620, the ATM and electronic device establish a secure connection (e.g., a proximate connection or a connection made via a server). After the secure connection is established, the electronic device receives authorization to mirror the GUI of the ATM.
[0061] At 630, an identity of the user is established. The identity is established by collecting at least one credential (e.g. ATM or Virtual ATM information and/or a PIN). The credentials are compared to information stored on the secure financial network associated with the ATM. In some embodiments, the user provides at least two credentials. If the identity of the user is verified (e.g., via PIN, biometrics, etc.), the user receives authorization to access the financial account of the user for financial transactions.
[0062] At 640, the ATM collects at least one additional credential. The at least one additional credential is compared to information stored on the secure financial network associated with the ATM. If the additional credential is verified, disbursement of service/property (e.g., cash, gift card, etc.) from the ATM is authorized.
[0063] At 650, a dispensing means (e.g., a pneumatic tube, a robotic arm, a standard ATM cash-disbursement aperture, etc.) delivers service/property to the user.
[0064] At 660, the ATM and electronic device are unpaired and the financial transaction is concluded.
[0065] It is appreciated that mirroring features, functionalities and benefits can be employed and realized in aspects of other businesses/industries, including but not limited to, Fueling Stations, Drive-Through Pharmacies, Fast Food Restaurants, among others. Adapting mirroring techniques substantially similar to the functionality described above for such Business to Business (B2B) transactions is contemplated by the innovation.
[0066] Embodiments can involve a computer-readable medium comprising processor-executable instructions configured to implement one or more embodiments of the techniques presented herein. An embodiment of a computer-readable medium or a computer-readable device that is devised in these ways is illustrated in
[0067] Generally, embodiments are described in the general context of “computer readable instructions” being executed by one or more computing devices. Computer readable instructions are distributed via computer readable media as will be discussed below. Computer readable instructions can be implemented as program modules, such as functions, objects, Application Programming Interfaces (APIs), data structures, and the like, that perform particular tasks or implement particular abstract data types. Typically, the functionality of the computer readable instructions can be combined or distributed as desired in various environments.
[0068] The term “computer readable media” includes communication media. Communication media typically embodies computer readable instructions or other data in a “modulated data signal” such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” includes a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
[0069] What has been described above includes examples of the innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject innovation, but one of ordinary skill in the art may recognize that many further combinations and permutations of the innovation are possible. Accordingly, the innovation is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.