Bank branch transformation is changing the physical make up of self-service and assisted-service devices as well as locations where multiple automated teller machines (ATMs) are deployed. Transaction authorization systems have to date assumed that a transaction will be authorized and fulfilled via the same device. This assumption prevents hardware disaggregation where a transaction may be initiated on one device or terminal and fulfilled or otherwise completed at another.
Various embodiments herein each include at least one of systems, terminals, methods, and software for disaggregated hardware platforms for joint transaction processing and fulfillment. Such embodiments enrich the transaction authorization process to capture and encrypt the authentication details at one device to transport the encrypted data to another device for fulfilment.
One method embodiment includes storing transaction data received from a first terminal via a network. The transaction data in such embodiments may include a customer identifier, personal identifying data encrypted with an encryption key of the first terminal, a terminal identifier of the first terminal, and data defining at least one transaction activity input at the first terminal. The method further includes transmitting the stored transaction data to a second terminal in response to a received request from the second terminal. In such embodiments, the second terminal is to submit, over the network, at least a portion of the transaction data and additional data to a transaction authorization process to obtain approval or denial for fulfillment of a transaction in accordance therewith by the second terminal.
Another method embodiment includes receiving customer identifying and authentication input at a transaction fulfillment terminal and retrieving, via a network, transaction data based on at least the customer identifying input from a transaction staging service. The transaction data may include a customer identifier, personal identifying data encrypted with an encryption key of a terminal utilized to stage the transaction data, a terminal identifier of the terminal utilized to stage the transaction data, and data defining at least one transaction activity to be performed. This method then submits a transaction request based on the retrieved transaction data from the transaction fulfillment terminal via the network to a transaction processor and the transaction fulfillment terminal then receives transaction fulfillment data including a command to perform the at least one transaction activity in response to the submitted transaction fulfillment request. The method then performs the at least one transaction activity by the transaction fulfillment terminal according to the transaction fulfillment data.
A system according to some embodiments includes a network interface device, a computer processor, and a memory device storing instructions executable by the processor to perform data processing activities. The data processing activities may include activities according to the methods above.
Various embodiments herein each include at least one of systems, terminals, methods, and software for disaggregated hardware platforms for joint transaction processing and fulfillment. Such embodiments enrich the transaction authorization process to capture and encrypt the authentication details at one device to transport the encrypted data to another device for fulfilment.
The various embodiments include and allow for independent collection of transaction authorization data for the fulfilment of a transaction allowing multiple devices to participate in the process of a transaction. At the same time, this the various embodiments minimize the impact to existing transaction authorization systems and processes by remaining compatible with most existing systems, processes, and protocols. An example of such a system may be an automated teller machine lobby. There may be, for example, two or more kiosks on which customers may start transactions and one or more fulfillment terminal where transactions are completed. Customers may begin at a kiosk by identifying themselves with their bank cards, mobile devices, or input account or identity information and also provide authentication input such as Personal Identification Numbers (PINs), biometric inputs, and the like. On the kiosks, customers define transactions such as withdrawals, deposits, purchases of valuable media such as postage stamps, parking vouchers, travel and admission tickets, and the like. Once the transactions have been defined, the user may close the session at the kiosk, the kiosk stores data of the defined transaction with a network service, and the customer may proceed to a fulfillment terminal to complete the transaction. The user may again identify themselves on the fulfillment device in the same manner as on the kiosk, provide a ticket with a code as may be provided by the kiosk, or other identification and authentication method. Once identified and authenticated, the fulfillment terminal retrieves the defined transaction from the network service, submits the transaction to a transaction processing service, and, when approved, completes the transaction by performing one or more activities of the transaction such as dispensing currency, dispensing valuable media, and receiving a deposit.
These and other embodiments are described herein with reference to the figures.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical, and electrical changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, herein by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
The functions or algorithms described herein are implemented in hardware, software or a combination of software and hardware in one embodiment. The software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, described functions may correspond to modules, which may be software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. The software is executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including network interconnection devices.
Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the exemplary process flow is applicable to software, firmware, and hardware implementations.
The method 200 includes storing 202 transaction data received from a first terminal via a network. The stored 202 transaction data, in some embodiments, includes a customer identifier, personal identifying data encrypted with an encryption key of the first terminal, a terminal identifier of the first terminal (e.g., a PDID), and data defining at least one transaction activity input at the first terminal. The method 200 further includes transmitting 204 the stored 202 transaction data to a second terminal in response to a received request from the second terminal. In such embodiments, the second terminal is to submit, over the network, at least a portion of the transaction data and additional data to a transaction authorization process to obtain approval or denial for fulfillment of a transaction in accordance therewith by the second terminal.
In some embodiments, the data defining the at least one transaction activity includes, for each transaction activity, a transaction type and a transaction amount. For example, the data for one transaction activity may provide “WITHDRAWAL, $200.”
In some embodiments of the method 200, the received transaction data is a transaction authorization request, such as for a withdrawal, a deposit, or a purchase. In another embodiment, the portion of the transaction data transmitted to the transaction authorization process includes the encrypted personal identifying data (e.g., an encrypted PIN) and the terminal identifier of the first terminal to identify the first terminal to the authorization process to select an appropriate decryption key to decrypt the encrypted personal identifying data.
In some embodiments, the customer identifier is at least one data item associated with an account holder of an account against which the transaction is to be performed. For example, the data item may be a data item encoded in a magnetic strip or radio frequency or contact chip of a customer card, a mobile wallet identifier, a biometric identifier, and the like
The method 300 includes receiving 302 customer identifying and authentication input at a transaction fulfillment terminal and retrieving 304, via a network, transaction data based on at least the customer identifying input from a transaction staging service. In some embodiments, the transaction data includes a customer identifier, personal identifying data encrypted with an encryption key of a terminal utilized to stage the transaction data, a terminal identifier of the terminal utilized to stage the transaction data, and data defining at least one transaction activity to be performed. The method 300 further includes submitting 306 a transaction request based on the retrieved transaction data from the transaction fulfillment terminal via the network to a transaction processor and subsequently receiving 308 transaction fulfillment data including a command to perform the at least one transaction activity in response to the submitted 306 request. The method 300 then performs 310 the at least one transaction activity by the transaction fulfillment terminal according to the transaction fulfillment data.
In some embodiments of the method 300, the transaction staging service receives transaction data from the terminal utilized to stage the transaction data. In such embodiments, the method 300 with regard to the transaction staging service further stores transaction data received from the terminal utilized to stage the transaction data via the network. The received transaction data in such embodiments includes the customer identifier, the personal identifying data encrypted with the encryption key of the terminal utilized to stage the transaction data, the terminal identifier of the terminal utilized to stage the transaction data, and data defining the at least one transaction activity input at the first terminal.
Computer-readable instructions stored on a computer-readable medium are executable by the processing unit 402 of the computer 410. A hard drive, CD-ROM, and RAM are some examples of articles including a non-transitory computer-readable medium. For example, the computer program 425 may be a program executable to perform one or more of the methods, or portions thereof, as illustrated and described herein.
It will be readily understood to those skilled in the art that various other changes in the details, material, and arrangements of the parts and method stages which have been described and illustrated in order to explain the nature of the inventive subject matter may be made without departing from the principles and scope of the inventive subject matter as expressed in the subjoined claims,