Various configurations of the current invention relate generally to apparatus, systems, and methods allowing a customer to store information related to banking. More particularly, the apparatus, systems and methods relate to allowing customers to store banking information from a banking card into a secured banking environment.
At most modern cash machines, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip that contains a unique card number and some security information such as an expiration date and a code verification value (CVV). Authentication is often provided by the customer entering a personal identification number (PIN).
Using a cash machine, customers can access their bank deposit or credit accounts in order to make a variety of transactions such as cash withdrawals, check balances, or credit mobile phones. In some instances, if the currency being withdrawn from the cash machine is different from that in which the bank account is denominated the money will be converted at an official exchange rate so that ATMs often provide the best possible exchange rates for foreign travelers. There remains a need for better ATM transactions and related systems and methods.
One embodiment is a system for onboarding banking-account information to be used in future transactions. The system includes a banking-device terminal with a card-reading device to receive a banking card and to read banking-account information from the banking card. The banking-device terminal has other input device(s) for receiving a verification input associating the banking card with a banking customer, and to receive a request for an onboarding transaction. One or more secure bank computing devices receive the banking-account information and the verification input and verify the banking-account information corresponds with the verification input to authorize the onboarding transaction. Alternatively, the secure bank computing device(s) will not authorize the onboarding transaction when the banking-account information does not correspond with the verification input. When the onboarding transaction is authorized, the secure bank computing device(s) request a customer-device identification of a mobile-customer device to be used for future-banking transactions. To complete the onboarding process, the secure bank computing device(s) receive the customer-device identification and store account data associated with the customer-device identification, the banking-account information and/or the verification input so that they may be used for the future-banking transactions.
Another embodiment is a method of onboarding financial data. The method begins by reading banking-account information from a banking card. This is preferably performed on an ATM or a point of sale (POS) device located in a secure location such as a bank or at a retail establishment. A verification input is also read that associates the banking card with a banking customer. The verification input is used to verify on a secure-banking system that the banking-account information corresponds with the verification input. If the verification is successful, a request is made for a customer-device identification of a mobile-customer device. For example, the customer-device identification may be a phone number of a mobile phone. After the onboarding, the customer device may be used for future-banking transactions without requiring the banking card's presence. The customer-device identification is stored in a secured portion of a banking system with at least portions of the banking-account information and the verification input. This stored data may later be used for the future-banking transactions based on a banking account associated with the banking card without requiring the banking card.
Another embodiment is a system for performing onboarding of data associated with a customer-banking account. The system includes a banking device that may be an exemplary ATM or POS. The banking device has a first input device for reading banking-account information associated with the customer-banking account from a banking card issued to a banking customer. A second input device on banking device is configured to receive verification data that the banking customer is associated with the banking card. The secured-banking system receives and verifies the banking-account information matches the verification data. When there is a valid verification, the banking device requests device identification information that identifies a personal device the banking customer will use to request future transactions using the customer-banking account. The secured-banking system stores account information corresponding to the banking-account information, the verification data and/or the device identification information so that the stored account information may be later retrieved to perform future transactions without using the banking card.
One or more preferred embodiments that illustrate the best mode(s) are set forth in the drawings and in the following description. The appended claims particularly and distinctly point out and set forth the invention.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various example methods and other example embodiments of various aspects of the invention. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. One of ordinary skill in the art will appreciate that in some examples, one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.
Details are set forth in the following description and in
Additionally, functionality of components of the systems described below may be implemented with one or more processors executing software instructions and/or be implemented with other hardware logic. “Processor” and “Logic”, as used herein, includes but is not limited to hardware, firmware, software and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. For example, based on a desired application or needs, logic and/or processor may include a software-controlled microprocessor, discrete logic, an application specific integrated circuit (ASIC), a programmed logic device, a memory device containing instructions or the like. Logic and/or processor may include one or more gates, combinations of gates, or other circuit components. Logic and/or a processor may also be fully embodied as software. Where multiple logics and/or processors are described, it may be possible to incorporate the multiple logics and/or processors into one physical logic (or processors). Similarly, where a single logic and/or processor is described, it may be possible to distribute that single logic and/or processor between multiple physical logics and/or processors.
In essence, onboarding provides a way of moving existing security credentials from the banking card 3 to the secure bank computing device 7 (e.g., server) and a mobile-customer device 13 (discussed below) such as a cell phone that is carried by a banking customer. For example, in the future, the owner of the credit card 3 may return to the banking-device terminal (e.g., ATM) or a different terminal and conduct a financial transaction with an account linked to the banking card 3 without needing to use or have the banking card present. The mobile security device 13 of the customer provides security credentials linked to the onboarded account information stored in the secure bank computing device 7 to authorize transactions to the corresponding bank account without requiring use of the banking card 3.
The banking card 3 may be a bank issued card associated with a savings account, a checking account with a bank or another type of account. In some embodiments, banking card 3 may be a credit card, debit card or another type of card. Banking-device terminal 5 may be an automatic transaction machine (ATM), a point of sale (POS), a bill pay terminal or another type of device as understood by those of ordinary skill in the art. In some embodiments, preferably the banking-device terminal 5 is located in an at least a partially secure area such as at a bank or inside a retail establishment to provide a customer using the terminal 5 a sense of security so that they will feel free to upload their data from their card 3 as well other data or personal data to the secure bank computing device 7. Of course, the banking-device terminal 5 may be connected to one or more networks 8, including the internet so that signals traveling between the bank computing device 7 and the banking-device terminal 5 will travel through those networks 8 before reaching the bank computing device 7.
In some configurations, the banking-device terminal 5 includes a card-reading device 9 for receiving the banking card 3 and reading banking-account information 4 from the banking card 3. The banking-device terminal 5 further has at-least-one input device for receiving a verification input that associates the banking card with a banking customer. For example, the input device may include a keypad 11 allowing a customer to input a personal identification number (PIN), iris scan, fingerprint and/or another item that is unique to that customer. This provides a level of security to ensure that the person onboarding (uploading) a bank account to the banking-device terminal 5 is the actual owner of the banking card 3. The input device may also be used for receiving a request for an onboarding transaction that indicates to the banking-device terminal 5 that the customer of the banking card 3 desires to upload (onboard) data from their card 3 to the bank computing device 7.
Upon verifying that the customer is an authorized user of the banking card 3 and has permission to onboard their banking information to 4 the secure bank computing device 7, the onboarding transaction is authorized. When authorized, the secure bank computing device 7 is configured to request a customer-device identification 12 of the mobile-customer device 13 to be used for future-banking transactions. This request is generated and activated by any way as understood by those in ordinary skill in the art. For example, the request for the customer-device identification 12 may be generated by processor logic in the banking-device terminal 5 and displayed on a display 15 on the terminal 5. For example, the customer-device identification 12 may be a numeric phone number that the customer enters into the keypad 11. The banking-device terminal 5 receives the customer-device identification 12 and begins the process of transmitting and storing account data 4 associated with a banking account being onboarded to the secure bank computing device 7. Having collected and stored account information 4 associated with the banking card 3 and the customer-device identification 12, allows this information to later be used for future-banking transactions without requiring the presence of the banking card 3.
In other embodiments, data collected at the banking-device terminal 5 and stored at the secure bank computing device(s) 7 may be referred to as a “mobile wallet dataset”. The mobile wallet dataset includes a personal banking card data set and a personal information data set that may also be collected and onboarded to the secure bank computing devices(s) 7. The personal banking card data set may correspond to a bank card, credit card or a debit card and may include information such as an account information number, a card verification value CVV, and expiration data, and the like with the personal information data including such things as card holder's name, address, phone number(s) and/or social security number and the like.
In some configurations, after a customer has onboarded an account associated with a first banking account from a banking card, they may be prompted at the secure banking terminal 5 if they desire to upload a second banking account associated with another banking card. Having already entered their verification input (e.g., PIN) and customer-device identification 12 (e.g., phone number) for their mobile-customer device (e.g., cellular phone), they would not need to reenter this information because they have already been authenticated as the owner of the first banking card. They would simply be required to have the banking-device terminal 5 read their second banking account read from the second banking card and confirm that they desire to onboard that data to the secure bank computing device(s) 7.
In other configurations and as illustrated in
The example embodiment of
The functionality of the example system of
Block 402 (
In another embodiment, personal computing device 47 sends mobile-wallet data set 37 to server 39 that executes an algorithm on at least a portion of mobile-wallet data set 37 and thereby determines the appropriate host-server destination for mobile-wallet data set 37. In response to reaching this algorithm-driven-host-server-destination determination, mobile-wallet data set 37 is then forwarded from server 39 to the identified host-server destination from amongst a plurality of host servers. In an embodiment, server 39 may have a plurality of host-server destinations to select from, where the host-server destinations are specific as to the type of mobile-wallet data set 37 that they each respectively host. For example, each host-server destination (i.e., host server) may respectively host different types of mobile-wallet data set(s) 37. Mobile-wallet data set 37 may include data that the algorithm (performed on server 39) determines is associated with a specific banking institution, and in response to reaching this determination, causes mobile-wallet data set 37 to be forwarded from server 39 to the dedicated host server for that specific bank or bank data. As an illustrative example, mobile-wallet data set 37 relating to ABC bank is sent from server 39 to a host server dedicated to hosting ABC-bank mobile-wallet data sets; mobile-wallet data set 37 relating to DEF bank is sent from server 39 to a host server dedicated to hosting DEF-bank mobile-wallet data sets. Likewise, a mobile-wallet data set 37 relating to GHI bank is sent from server 39 to a host server dedicated to hosting GHI-bank mobile-wallet data sets, and so on.
Generally describing an example configuration of computer 600, processor 602 may be a variety of various processors including dual microprocessor and other multi-processor architectures. Memory 604 may include volatile memory and/or non-volatile memory. Non-volatile memory may include, for example, ROM, PROM, EPROM, and EEPROM. Volatile memory may include, for example, RAM, synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), direct RAM bus RAM (DRRAM) and the like.
A disk 606 may be operably connected to computer 600 via, for example, an input/output interface (e.g., card, device) 618 and an input/output port 610. Disk 606 may be, for example, a magnetic disk drive, a solid state disk drive, a floppy disk drive, a tape drive, a Zip drive, a flash memory card, and/or a memory stick. Furthermore, disk 606 may be a CD-ROM, a CD recordable drive (CD-R drive), a CD rewriteable drive (CD-RW drive), and/or a digital video ROM drive (DVD ROM). Memory 604 can store a process 614 and/or a data 616, for example. Disk 606 and/or memory 604 can store an operating system that controls and allocates resources of computer 600.
Bus 608 may be a single internal bus interconnect architecture and/or other bus or mesh architectures. While a single bus is illustrated, it is to be appreciated that computer 600 may communicate with various devices, logics, and peripherals using other busses (e.g., PCIE, SATA, Infiniband, 1384, USB, Ethernet). Bus 608 can be types including, for example, a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus.
Computer 600 may interact with input/output devices via input/output interfaces 618 and input/output ports 610. Input/output devices may be, for example, a keyboard, a microphone, a pointing and selection device, cameras, video cards, displays, the disk 606, the network devices 620, and so on. The input/output ports 610 may include, for example, serial ports, parallel ports, USB ports and the like.
The computer 600 can operate in a network environment and thus may be connected to network devices 620 via input/output interfaces 618, and/or the input/output ports 610. Through network devices 620, computer 600 may interact with a network. Through the network, computer 600 may be logically connected to remote computers. Networks with which computer 600 may interact include, but are not limited to, a local area network (LAN), a wide area network (WAN), and other networks. The networks may be wired and/or wireless networks.
In the foregoing description, certain terms have been used for brevity, clearness, and understanding. No unnecessary limitations are to be implied therefrom beyond the requirement of the prior art because such terms are used for descriptive purposes and are intended to be broadly construed. Therefore, the invention is not limited to the specific details, the representative embodiments, and illustrative examples shown and described. Thus, this application is intended to embrace alterations, modifications, and variations that fall within the scope of the appended claims.
Moreover, the description and illustration of the invention is an example and the invention is not limited to the exact details shown or described. References to “the preferred embodiment”, “an embodiment”, “one example”, “an example” and so on, indicate that the embodiment(s) or example(s) so described may include a particular feature, structure, characteristic, property, element, or limitation, but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element, or limitation.
This patent application claims priority to U.S. provisional patent application Ser. No. 62/151,770 filed on Apr. 23, 2015, and its subject matter is hereby incorporated by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2016/028930 | 4/22/2016 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62151770 | Apr 2015 | US |