Increased automation in ATM (Automated Teller Machine) banking is desirable for a number of reasons. With increased automation comes a use for more modern graphical user interfaces (GUIs) for customers and updated account security measures. This change is driven, in part, by technological advances in the market place. For example, some anticipate that the proliferation of self-driving cars will require ATMs, as a practical matter, to be robotic. In keeping with such developments, large touch-screens in vehicle dashboards are increasingly prevalent.
Today, equipment malfunctions, inclement weather, etc. can create inconveniences for customers using walk-up or drive-up ATMs. For example, workarounds or contingency plans are needed when a patron forgets a bank card at the ATM, or when a bank card is trapped in the machine due to mechanical malfunctions.
Enhanced security is needed against claw-like devices inserted into ATM slots to snatch money from inside dispenser before it is released, skimmers (gadgets mounted to the front of the normal ATM card slot that read the ATM card number and transmits it to unauthorized individuals), wireless cameras disguised to look like a leaflet holder and mounted in a position to view ATM PIN (Personal Identification Number) entries, and similar modern security threats were not completely appreciated when ATMs were created.
Embodiments of the innovation described herein address conventional shortcomings and/or achieve other advantages. The following presents a simplified summary of the innovation in order to provide a basic understanding of some aspects of the innovation. This summary is not an extensive overview of the innovation. It is not intended to identify key/critical elements of the innovation or to delineate the scope of the innovation. Its sole purpose is to present some concepts of the innovation in a simplified form as a prelude to the more detailed description that is presented later.
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of mirroring or otherwise replicating (e.g., functionally) the Graphical User Interface (GUI) of an Automatic Teller Machine (ATM) onto a display screen in a vehicle or via a mobile Device in Vehicle (DIV). In aspects, the mirroring operation can employ a three level authentication/authorization to facilitate a secure financial transaction from within a vehicle. The level 1 authentication establishes connectivity to mirror the ATM user interface on DIV. The level 2 authentication authorizes the user to utilize the ATM to perform financial transactions. The level 3 authentication authorizes depositing or transfer of funds in the cabin of the vehicle.
An example system of the innovation can include an ATM, a DIV, applicable system servers and a robotic arm. The ATM senses a DIV equipped with a software application that facilities ATM-mirroring when the DIV and associated equipment enter a specified communication range. After the ATM identifies a properly equipped DIV, the ATM and DIV establish a network connection. The user inputs user data (e.g., personal identification numbers (PINs)) via the DIV. The network servers act to verify the identity of the user and grant the ATM permission to access the account of the user and, subsequently, instruct a robotic arm to deliver service/property (e.g., cash, gift card, etc.) inside the cabin of the vehicle.
In aspects, the subject innovation provides substantial benefits in terms of convenience and security. One advantage for users of the subject innovation is the users may interact with the ATM/machine and subsequently collect (or submit) funds without leaving their vehicles, or, in the case of automated vehicles, even operating their vehicles. Another advantage for users is that by avoiding the need to physically use their arms external to the vehicle to complete a transaction, convenience and security is enhanced.
To the accomplishment of the foregoing and related ends, certain illustrative aspects of the innovation are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the innovation can be employed and the subject innovation is intended to include all such aspects and their equivalents. Other advantages and novel features of the innovation will become apparent from the following detailed description of the innovation when considered in conjunction with the drawings.
Aspects of the disclosure are understood from the following detailed description when read with the accompanying drawings. It will be appreciated that elements, structures, etc. of the drawings are not necessarily drawn to scale. Accordingly, the dimensions of the same may be arbitrarily increased or reduced for clarity of discussion, for example.
The innovation is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the innovation can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the innovation.
As used in this application, the terms “component”, “module,” “system”, “interface”, and the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components residing within a process or thread of execution and a component may be localized on one computer or distributed between two or more computers.
Furthermore, the claimed subject matter can be implemented as a method, apparatus, or article of manufacture using standard programming or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
In aspects, either, or both, the ATM 110 or the DIV 130 (or device outside a vehicle (e.g., smartphone in a walkup scenario) can listen or otherwise actively monitor for an opportunity to pair or otherwise connect. As will be understood, most any communication or network protocol can be used in aspects including, but not limited to, Bluetooth, NFC (near field communication), wireless, cellular, or the like.
While aspects described herein are related to mirroring or replicating functionality and/or GUIs within a vehicle, it is to be understood that alternative aspects can include mirroring and/or replicating ATM functionality upon most any electronic device. By way of example and not limitation, functionality replication can be conveyed or transferred to most any mobile device (e.g., smartphone, tablet, smartwatch, etc.) without departing from the spirit and/or scope of the innovation and claims appended hereto. Similarly, while traditional ATM communication is effected via buttons/keypads, the innovation herein contemplates alternative inputs including, but not limited to voice commands, graffiti on touch screen, or the like. It will be appreciated that, in examples, a user will have more privacy within the cabin a vehicle thereby enhancing the ability to use alternative input modalities. These alternative aspects are to be included within the scope of the innovation and claims appended hereto.
To perform the mirroring operation, in an aspect, the system 200 can utilize a software application stored in the DIV 130, a smart software client installed in the ATM and service supporting servers (SSS) in a cloud or financial industry network. The DMS 230 manages the SSS for system operations, and can perform as a gateway between the ATM 110 and the SSS. In aspects, the system can also include a robotic arm (not shown in
While the mirroring operation has been described above with reference to a secure banking network, other available networks, such as a mobile network associated with the DIV 130 may also be used without departing from the spirt and/or scope of the innovation and claims appended hereto. While the described illustrations depict a proximity connection between the ATM 110 and DIV 130, it is to be appreciated that data exchange may also take place through a remote (e.g., cloud-based) server. In alternate embodiments, through caching, machine learning, password retention, etc., multiple authentication steps can be simplified and future mirroring can be facilitated with less user input. These and other contemplated aspects are to be included within the spirit and scope of the innovation and claims appended hereto.
The ATM 110 and DIV 130 may implement a packet manager which securely handles the information exchange between the ATM 110 and DIV 130. As will be appreciated, the transmission of sensitive information can be processed in accordance with known protocols.
Regarding Authentication for Financial Transaction
Upon delivery of services/property in the cabin of the vehicle, the secure channel between the ATM 110 and the DIV 130 is decoupled and, in some aspects, all session data is destroyed.
In yet other aspects, the innovation allows for seamless roaming. Roaming in this context refers to when a user utilizes a third-party ATM, locally or in a foreign country. In such an instance, the DMS of the third-party institution passes the ID identification to the DMS 230 of the user for verification. Upon verification, the third-party ATM allows mirroring.
The retractable robotic arm 510 can be fitted with an emergency button 550, exposed while the arm is deployed, that, when actuated by the ATM patron, will notify authorities via a silent alarm. In other aspects, voice or other audible commands can be employed.
Additionally, the retractable robotic arm 510 is fitted with precision sensors 560 that sense the proximity of the arm 510 to the vehicle of the patron, as well as other objects or persons, so as to avoid accidental collisions. The precision sensors 560 also guide the retractable robotic arm 510 to a vehicle window.
The retractable robotic arm 510 can be coupled to the ATM via a soft rubber coupling 570. In aspects, the retractable robotic arm 510 is programmed to knock at the vehicle window in the event the window is closed.
Dedicated sensors 580 reside within the housing. The dedicated sensors 580 scan the retractable robotic arm 510 for skimmers, infections and other malicious programs when it retracts after dispensing funds. The dedicated sensors 580 mitigate most any threats found during scanning.
With reference to
At 620, the ATM and electronic device establish a secure connection (e.g., a proximate connection or a connection made via a server). After the secure connection is established, the electronic device receives authorization to mirror the GUI of the ATM.
At 630, an identity of the user is established. The identity is established by collecting at least one credential (e.g. ATM or Virtual ATM information and/or a PIN). The credentials are compared to information stored on the secure financial network associated with the ATM. In some embodiments, the user provides at least two credentials. If the identity of the user is verified (e.g., via PIN, biometrics, etc.), the user receives authorization to access the financial account of the user for financial transactions.
At 640, the ATM collects at least one additional credential. The at least one additional credential is compared to information stored on the secure financial network associated with the ATM. If the additional credential is verified, disbursement of service/property (e.g., cash, gift card, etc.) from the ATM is authorized.
At 650, a dispensing means (e.g., a pneumatic tube, a robotic arm, a standard ATM cash-disbursement aperture, etc.) delivers service/property to the user.
At 660, the ATM and electronic device are unpaired and the financial transaction is concluded.
It is appreciated that mirroring features, functionalities and benefits can be employed and realized in aspects of other businesses/industries, including but not limited to, Fueling Stations, Drive-Through Pharmacies, Fast Food Restaurants, among others. Adapting mirroring techniques substantially similar to the functionality described above for such Business to Business (B2B) transactions is contemplated by the innovation.
Embodiments can involve a computer-readable medium comprising processor-executable instructions configured to implement one or more embodiments of the techniques presented herein. An embodiment of a computer-readable medium or a computer-readable device that is devised in these ways is illustrated in
Generally, embodiments are described in the general context of “computer readable instructions” being executed by one or more computing devices. Computer readable instructions are distributed via computer readable media as will be discussed below. Computer readable instructions can be implemented as program modules, such as functions, objects, Application Programming Interfaces (APIs), data structures, and the like, that perform particular tasks or implement particular abstract data types. Typically, the functionality of the computer readable instructions can be combined or distributed as desired in various environments.
The term “computer readable media” includes communication media. Communication media typically embodies computer readable instructions or other data in a “modulated data signal” such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” includes a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
What has been described above includes examples of the innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject innovation, but one of ordinary skill in the art may recognize that many further combinations and permutations of the innovation are possible. Accordingly, the innovation is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.