Aspects of the disclosure relate to electrical computers, systems, and devices for detecting tampering at a self-service kiosk based on augmented reality.
As unauthorized actors become more sophisticated, it is important for users to ensure safety and security of their personal information, data, and the like. Unauthorized users often use skimming devices attached to a card reader, keypad, or the like, at a self-service kiosk to obtain user payment or other information without user permission. These skimming devices can be difficult for a user to identify based on appearance. Accordingly, aspects described herein use augmented reality to provide real-time or near real-time determination of whether tampering has occurred at a self-service kiosk.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosure. The summary is not an extensive overview of the disclosure. It is neither intended to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure. The following summary merely presents some concepts of the disclosure in a simplified form as a prelude to the description below.
Aspects of the disclosure provide effective, efficient, scalable, and convenient technical solutions that address and overcome the technical issues associated with detecting tampering at a self-service kiosk.
In some aspects, a computing platform may receive image data from an augmented reality computing device. The image data may include images (e.g., still images, video streams, or the like) of a self-service kiosk located proximal to the augmented reality computing device. The image data may be analyzed to identify an identifier of the self-service kiosk (e.g., make, model, or the like). The identifier may then be used to retrieve pre-stored physical specification data of the self-service kiosk (e.g., overall dimensions, and the like).
In some examples, the image data may be further analyzed to determine current physical specifications of the self-service kiosk (e.g., based on the images). The current physical specifications may be compared to the pre-stored physical specifications to determine whether an anomaly exists. If an anomaly exists, a mitigating action may be generated or identified and sent to the self-service kiosk for execution.
If an anomaly is not identified, a notification may be generated and transmitted to the augmented reality computing device.
These features, along with many others, are discussed in greater detail below.
The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized, and structural and functional modifications may be made, without departing from the scope of the present disclosure.
It is noted that various connections between elements are discussed in the following description. It is noted that these connections are general and, unless specified otherwise, may be direct or indirect, wired or wireless, and that the specification is not intended to be limiting in this respect.
As discussed above, unauthorized actors are becoming more sophisticated and aggressive in techniques to acquire user information. The use of card skimmers (e.g., a device connected to or installed on a card reader to capture user card numbers that may later be used by unauthorized users), keypad skimmers (e.g., a device connected to or installed on a key pad to capture user input such as personal identification number that may later be used by unauthorized users), and the like, can be difficult for users to detect during the course of a transaction. Accordingly, aspects described herein use augmented reality to evaluate self-service kiosks to identify tampering.
For instance, if a card skimmer or keypad skimmer is attached to a self-service kiosk, it will alter the physical specifications of the self-service kiosk (e.g., a card skimmer may protrude outward from a surface of the self-service kiosk more than the actual card reader, a keypad skimmer may modify a depth of the keypad from the surface of the self-service kiosk, and the like). Accordingly, as discussed more fully herein, current physical specifications of a self-service kiosk may be captured using an augmented reality device and compared to pre-stored, expected physical specifications of the self-service kiosk (e.g., as received from the manufacturer, as determined prior to commissioning, or the like). If an anomaly is identified, mitigating actions may be identified and executed to mitigate risk associated with the skimming devices.
These and various other arrangements will be discussed more fully below.
Aspects described herein may be implemented using one or more computing devices operating in a computing environment. For instance,
Tampering detection computing platform 110 may be or include one or more computing devices (e.g., servers, server blades, or the like) and/or one or more computing components (e.g., memory, processor, and the like) and may be configured to provide dynamic, efficient tampering detection for self-service kiosks. In some examples, tampering detection functions described herein may be performed in real-time or near real-time. Further, while tampering detection computing platform 110 is shown as a separate device in
Tampering detection computing platform 110 may be configured to receive image data (e.g., still images, video streams, or the like) of a self-service kiosk 120 and captured using augmented reality computing device 160 and/or augmented reality computing device 165. In some examples, the image data may include a scan of a machine-readable code (e.g., quick response (QR) code, bar code, or the like) visible on the self-service kiosk 120. Based on the image data, tampering detection computing platform 110 may identify a make, model, or the like, of the self-service kiosk 120 (e.g., based on branding data visible in the image data, based on location of the self-service kiosk 120 as determined from global positioning system (GPS) data from the augmented reality computing device 160, 165, or the like). In some examples, the make, model or the like may be determined from the scanned machine-readable code data.
Tampering detection computing platform 110 may retrieve (e.g., from a database) specifications of the self-service kiosk 120. For instance, tampering detection computing platform 110 may retrieve physical specifications associated with size, shape, position of a deposit slot, position of a card reader slot, position of a keypad, depth of keypad from a surface of the self-service kiosk, and the like may be retrieved from the database. Tampering detection computing platform 110 may use one or more image analysis tools (e.g., optical character recognition, object recognition, and the like) to determine corresponding specifications of the self-service kiosk 120 as shown in the image data. Tampering detection computing platform 110 may then compare the determined specifications to the retrieved specifications and, if an anomaly is detected, may identify and execute one or more mitigating actions.
Self-service kiosk 120 and/or self-service kiosk 125 may be or include one or more computing devices (e.g., servers, server blades, or the like) and/or one or more computing components (e.g., memory, processor, and the like) and may be configured to receive and process transaction requests (e.g., cash withdrawals, balance transfers, deposits, or the like). Self-service kiosk 120 and/or self-service kiosk 125 may include automated teller machines (ATMs), automated teller assistants (ATAs), self-service point-of-sale systems, or the like. Self-service kiosk 120 and/or self-service kiosk 125 may be configured to display one or more user interfaces, each user interface including a plurality of selectable options associated with various functionality of the self-service kiosk 120, 125. In some examples, self-service kiosk 120 and/or self-service kiosk 125 may include short-range wireless communication capabilities, such as near field communication, Bluetooth LE, and the like. Self-service kiosk 120 and/or self-service kiosk 125 may be configured to connect (e.g., via a short-range wireless communication protocol) to augmented reality computing device 160 and/or augmented reality computing device 165 when one or more of augmented reality computing device 160 and/or augmented reality computing device is within a predetermined distance or range from the self-service kiosk 120 and/or self-service kiosk 125, to enable communication between self-service kiosk 120 and/or self-service kiosk 120 and augmented reality computing device 160 and/or augmented reality computing device 165.
Augmented reality computing device 160 and/or augmented reality computing device 165 may be or include one or more mobile computing devices, such as a smart phone or other smart device, wearable device (e.g., augmented reality glasses or the like), laptop computer, tablet computer, or the like. Augmented reality computing device 160 and/or augmented reality computing device 165 may receive (e.g., via download) an augmented reality application and execute the augmented reality application. Augmented reality computing device 160 and/or augmented reality computing device 165 may include a display (e.g., eye covering portion of augmented reality glasses, display of a smart phone, or the like) configured to display augmented reality images of the self-service kiosk 120, 125 in order to identify any anomalies in the specifications (e.g., physical specifications) of the self-service kiosk 120, 125. Augmented reality computing device 160 and/or augmented reality computing device 165 may also include an image capture device (e.g., camera, or the like) configured to capture image data (e.g., still images, video streams, or the like) of self-service kiosk 120, 125 that may be used to identify current specifications of the self-service kiosk 120, 125 for comparison to retrieved or expected specifications.
As mentioned above, computing environment 100 also may include one or more networks, which may interconnect one or more of tampering detection computing platform 110, self-service kiosk 120, self-service kiosk 125, augmented reality computing device 160 and/or augmented reality computing device 165. For example, computing environment 100 may include private network 190 and public network 195. Private network 190 and/or public network 195 may include one or more sub-networks (e.g., Local Area Networks (LANs), Wide Area Networks (WANs), or the like). Private network 190 may be associated with a particular organization (e.g., a corporation, financial institution, educational institution, governmental institution, or the like) and may interconnect one or more computing devices associated with the organization. For example, tampering detection computing platform 110, self-service kiosk 120, and/or self-service kiosk 125, may be associated with an enterprise organization (e.g., a financial institution), and private network 190 may be associated with and/or operated by the organization, and may include one or more networks (e.g., LANs, WANs, virtual private networks (VPNs), or the like) that interconnect tampering detection computing platform 110, self-service kiosk 120, and/or self-service kiosk 125, and one or more other computing devices and/or computer systems that are used by, operated by, and/or otherwise associated with the organization. Public network 195 may connect private network 190 and/or one or more computing devices connected thereto (e.g., tampering detection computing platform 110, self-service kiosk 120, and/or self-service kiosk 125) with one or more networks and/or computing devices that are not associated with the organization. For example, augmented reality computing device 160 and/or augmented reality computing device 165 might not be associated with an organization that operates private network 190 (e.g., because augmented reality computing device 160 and/or augmented reality computing device 165 may be owned, operated, and/or serviced by one or more entities different from the organization that operates private network 190, one or more customers of the organization, one or more employees of the organization, public or government entities, and/or vendors of the organization, rather than being owned and/or operated by the organization itself), and public network 195 may include one or more networks (e.g., the internet) that connect augmented reality computing device 160 and/or augmented reality computing device 165 to private network 190 and/or one or more computing devices connected thereto (e.g., tampering detection computing platform 110, self-service kiosk 120, and/or self-service kiosk 125).
Referring to
For example, memory 112 may have, store and/or include registration module 112a. Registration module 112a may store instructions and/or data that may cause or enable the tampering detection computing platform 110 to receive a user request to register a device (e.g., augmented reality computing device 160, augmented reality computing device 165, or the like). The request may include device identifying data, user identifying data, and the like. The registration data may be stored in database 112e. In some examples, registering the device or user may cause an augmented reality application to be downloaded to the device (e.g., if the application or other augmented reality capabilities are not available on the device).
Tampering detection computing platform 110 may further have, store and/or include self-service kiosk identification module 112b. Self-service kiosk identification module 112b may store instructions and/or data that may cause or enable the tampering detection computing platform 110 to receive image data, machine-readable code data, or the like, and identify, based on the received data, a make, model, serial number, or the like, of the self-service kiosk being imaged. In some examples, optical character recognition, or the like, may be used to identify the self-service kiosk being imaged.
Tampering detection computing platform 110 may further have, store and/or include self-service kiosk specification module 112c. Self-service kiosk specification module 112c may store instructions and/or data that may cause or enable the tampering detection computing platform 110 to analyze received image data to identify one or more physical specifications associated with the self-service kiosk being imaged. For instance, self-service kiosk specification module 112c may analyze the received images (e.g., still images, video streams, or the like) to determine (e.g., using object recognition or other image analysis techniques) physical specifications of the self-service kiosk being imaged (e.g., an overall side, a depth of a card reader slot, a depth of a keypad from a surface of the self-service kiosk, or the like). Self-service kiosk specification module 112c may also store instructions to retrieve, from database 112e, pre-stored or expected specifications for the identified self-service kiosk make, model, or the like. Self-service kiosk specification module 112c may compare the retrieved specifications with the determined specifications to identify any anomalies.
Tampering detection computing platform 110 may further have, store and/or include notification module 112d. Notification module 112d may store instructions and/or data that may cause or enable the tampering detection computing platform 110 to generate one or more notifications based on whether any anomalies were detected between the retrieved specification data and the determined specification data. For instance, notification module 112d may generate a notification identifying any anomalies detected, transmit the notification to the self-service kiosk and/or the augmented reality computing device, and the like. In some examples, the notification may include instructions causing modification to an augmented reality image displayed on the augmented reality computing device to display where the anomaly was detected.
Tampering detection computing platform 110 may further have, store and/or include database 112e. Database 112e may store specification data, such as physical specification data, for a plurality of makes, models, and the like, of self-service kiosks, as well as other data that enables performance of the aspects described herein by the tampering detection database.
With reference to
At step 202, an augmented reality device, such as augmented reality computing device 160, may capture image data of a self-service kiosk 120. In some examples, augmented reality computing device 160 may capture one or more still images, video streams, and the like, of the self-service kiosk 120, or portions thereof. For instance, augmented reality computing device 160 may capture images of the overall self-service kiosk, of portions of the self-service kiosk prone to tampering such as a card reader slot (e.g., where a skimmer may be attached), keypad (e.g., where a keypad skimming device may be attached) or the like.
At step 203, augmented reality computing device 160 may establish a connection with the tampering detection computing platform 110. For instance, a first wireless connection may be established between the augmented reality computing device 160 and the tampering detection computing platform 110. Upon establishing the first wireless connection, a communication session may be initiated between augmented reality computing device 160 and the tampering detection computing platform 110.
At step 204, augmented reality computing device 160 may transmit or send a request for tampering detection to the tampering detection computing platform 110. For instance, augmented reality computing device 160 may transmit or send the captured image data with a request to evaluate the self-service kiosk 120 for tampering. In some examples, the request for tampering detection may include data captured from a machine-readable code provided on the self-service kiosk 120 that may include identifying information for the self-service kiosk 120 (e.g., make, model, or the like) and/or specification data for the self-service kiosk 120. In some examples, the request may be sent during the communication session initiated upon establishing the first wireless connection.
At step 205, tampering detection computing platform 110 may receive the request for tampering detection and may process the request.
With reference to
Based on the identified make, model, or the like, at step 207, tampering detection computing platform 110 may retrieve specifications for the identified make, model, or the like, of the self-service kiosk 120. For instance, tampering detection computing platform 110 may query database 112e using the make, model, or the like, as inputs, to retrieve physical specification data associated with the self-service kiosk 120. Additionally or alternatively, tampering detection computing platform 110 may parse data received from the machine-readable code to identify physical specifications of the self-service kiosk 120.
At step 208, tampering detection computing platform 110 may analyze the received image data to determine current or real-time specifications of the self-service kiosk 120. For instance, the image data may be analyzed (e.g., using object recognition, or the like) to determine one or more physical specifications of the self-service kiosk 120, such as overall dimensions, side of card reader slot, distance from card reader slot to surface of the self-service kiosk 120, depth of keypad relative to surface of the self-service kiosk 120, or the like).
At step 209, the determined current or real-time specifications may be compared to the retrieved specifications to detect any differences in the current specifications from the expected specifications retrieved from the pre-stored data.
At step 210, based on the comparing, a determination may be made as to whether any anomalies exist in the current specifications of the self-service kiosk 120. If an anomaly exists, the process may continue at step 211 in
At step 211, tampering detection computing platform 110 may generate or identify a mitigating action. For instance, based on detection of an anomaly or discrepancy between the physical specifications determined from the received image data and the retrieved physical specifications of the self-service kiosk 120, tampering detection computing platform 110 may generate or identify one or more actions to mitigate risk associated with the detected anomaly. For instance, tampering detection computing platform 110 may identify or generate an action to modify functionality of the self-service kiosk 120 (e.g., if a card skimmer is detected, prevent use of card swipe to initiate transaction, shut down or prevent access to the self-service kiosk 120, or the like). Additionally or alternatively, an alert may be generated and transmitted to one or more administrative computing devices, service technicians, or the like. The alert may include an indication of the detected anomaly, identification of the self-service kiosk, and the like.
At step 212, tampering detection computing platform 110 may establish a connection with the self-service kiosk 120. For instance, a second wireless connection may be established between the tampering detection computing platform 110 and the self-service kiosk 120. Upon establishing the second wireless connection, a communication session may be initiated between the tampering detection computing platform 110 and the self-service kiosk 120.
At step 213, tampering detection computing platform 110 may send the generated or identified mitigating action to the self-service kiosk 120. For instance, the mitigating action may be transmitted or sent during the communication session initiated upon establishing the second wireless connection. In some examples, transmitting or sending the mitigating action may cause the self-service kiosk 120 to execute the mitigating action (e.g., modify functionality, display recommendation, or the like).
At step 214, self-service kiosk 120 may execute the mitigating action. Accordingly, self-service kiosk may modify functionality (e.g., disable card swipe to initiate transactions, or the like), display a recommendation or warning, shut down completely (e.g., prevent access to the self-service kiosk 120), or the like.
At step 215, tampering detection computing platform 110 may generate a notification indicating an anomaly was detected.
With reference to
At step 217, augmented reality computing device 160 may receive and display the notification or other indication of the anomaly. For instance, the augmented reality device may display a notification indicating that an anomaly was detected, where the anomaly was detected, or the like.
Additionally or alternatively,
At step 218, if no anomaly has been detected, tampering detection computing platform 110 may generate a notification indicating that there is no anomaly.
At step 219, the tampering detection computing platform 110 may transmit or send the notification to the augmented reality computing device 160. In some examples, transmitting or sending the notification to the augmented reality computing device 160 may cause the augmented reality computing device 160 to display the notification.
At step 220, the augmented reality computing device 160 may receive and display the generated notification. For instance,
At step 300, a computing platform may receive, from an augmented reality computing device, image data of a self-service kiosk. For instance, the augmented reality computing device may include an image capture device that may be used to capture image data (e.g., still images, video streams, or the like) of a self-service kiosk proximal to the augmented reality computing device.
At step 302, the received image data may be analyzed to identify at least one of a make or model of the self-service kiosk. For instance, identifying information, such as a make or model of the self-service kiosk may be extracted from the image data (e.g., using optical character recognition, object recognition, or the like).
At step 304, the identified make and/or model may be used to retrieve expected physical specifications of the self-service kiosk. For instance, the make and/or model may be used as inputs in a database query to retrieve pre-stored physical specification data of the self-service kiosk. The pre-stored physical specification data may include expected physical specifications of the self-service kiosk (e.g., based on manufacturer data, pre-commissioning data, or the like).
At step 306, the image data may be further analyzed to identify current physical specifications of the self-service kiosk. For instance, the images may be analyzed (e.g., using object recognition techniques) to determine current physical specifications of the self-service kiosk.
At step 308, the current physical specifications may be compared to the expected physical specifications to determine whether an anomaly exists.
At step 310, a determination may be made as to whether an anomaly exists. If not, at step 312, a first notification indicating that no anomaly exists may be generated. At step 314, the first notification may be transmitted to sent to the augmented reality computing device. In some examples, transmitting or sending the first notification may cause the augmented reality computing device to display the first notification.
If, at step 310, an anomaly does exist, at step 316, a mitigating action may be generated or identified. For instance, a mitigating action that may modify functionality of the self-service kiosk, render the self-service kiosk inaccessible to users, or the like, may be generated or identified.
At step 318, the mitigating action may be sent to the self-service kiosk. In some examples, sending the mitigating action may cause the self-service kiosk to execute the mitigating action.
In some examples, when it is determined that an anomaly exists (e.g., 310: YES), the computing platform may generate a second notification identifying the anomaly. In some examples, the second notification may be transmitted to the augmented reality computing device. In some arrangements, sending the second notification to the augmented reality computing device may cause the augmented reality computing device to display the second notification. In some arrangements, the second notification may include an augmented reality indication including an augmented reality indicator identifying a location of the anomaly on the self-service kiosk (e.g., an augmented reality indicator overlaying a view (e.g., image or view through lens of augmented reality glasses) of the self-service kiosk.
As discussed, aspects described herein provide tampering detection for self-service kiosks based on augmented reality. By capturing, in real-time or near real-time, current images of the self-service kiosk and determined, from the images, current physical specifications of the self-service kiosk, anomalies in the physical specifications may be detected and addressed promptly.
As discussed herein, the augmented reality aspects described may be provided via an application executing on the augmented reality computing device. For instance, the application may be provided by an enterprise organization associated with the self-service kiosk, such as a mobile banking application, or the like. The application may be configured to capture data, recognize data, and the like. Further, the application may be frequently updated to quickly and efficiently adapt to new technology or strategies being used by unauthorized users.
As discussed herein, by comparing the expected physical specifications of the self-service kiosk with the current physical specifications identified or determined from the image data, the system may detect anomalies in the current physical specifications of the self-service kiosk. For instance, if a card reader protrudes a few millimeters (e.g., 2 mm, 3 mm, 4 mm, or the like) from an expected position, the system may detect an anomaly (e.g., potential card skimmer attached to the card reader).
While aspects described herein are described in the context of a customer or user requesting tampering detection, the arrangements described herein may be used by service technicians, administrators, or the like, to identify tampering on the self-service kiosk, identify a location of an anomaly, execute removal of a skimming device (e.g., remove a card or keypad skimmer), or the like. In some examples, augmented reality may be used to guide the technician (or user) through areas of the self-service kiosk to evaluate for tampering.
As discussed herein, self-service kiosk identifying information may be extracted from the captured image data or may be retrieved using a machine-readable code displayed on the self-service kiosk. In some examples, the machine-readable code may be dynamically generated and displayed on a display screen upon user request (e.g., rather than hard printed on the self-service kiosk, which may be tampered with), as a user is detected near the self-service kiosk (e.g., via short range wireless communications), or the like. Accordingly, the user may scan the machine-readable code to obtain self-service kiosk identifying information, specification information, and the like. In some examples, specification information received based on the machine-readable code may be stored in the database for future user.
While several aspects described herein are directed to tampering via a card reader to keypad area of a self-service kiosk, in some examples, all areas of the self-service kiosk may be imaged and evaluated for tampering. For instance, a camera, display, and the like, may also be imaged and evaluated for potential tampering.
Further, as discussed herein, in some examples, information may be conveyed to the user by overlaying augmented reality indicators or elements over a view (e.g., an image or view through augmented reality glasses) of the self-service kiosk. As discussed, an overlay may include indications of potential tampering. Further, in some examples, the overlay may include instructions for operating the particular self-service kiosk (e.g., after capturing an identifier of the self-service kiosk). These arrangements may be used, in some examples, in regions where a user may speak a different language than the one presented on the self-service kiosk. Accordingly, the augmented reality overlays may include user prompts, instructions, or the like, in a preferred language of the user.
The augmented reality aspects described herein may also be used to project a virtual keypad that may be used instead of the keypad associated with the self-service kiosk (e.g., in case the keypad is compromised). For instance, the augmented reality device may connect to the self-service kiosk (e.g., via short range wireless communication protocols such as near field communication, Bluetooth™, or the like). The augmented reality device may the project a keypad onto, for instance, a touch screen display of the self-service kiosk (e.g., in arrangements in which the self-service kiosk includes a touch screen display in addition to a keypad that may be compromised). The user may then input a personal identification number or other authenticating data via the projected keypad on the touchscreen display, rather than using the potentially compromised keypad.
Additionally or alternatively, in arrangements in which the augmented reality device is a smart phone or similar device, the user may connect the augmented reality device to the self-service kiosk (e.g., via short range wireless communications) and the self-service kiosk may display, e.g., on a touchscreen display or other display, an image of twelve buttons available for selection. However, each button might not include a label. The augmented reality device may then display twelve buttons with each button including a label but in a non-traditional configuration. The user may select a number on the blank keypad on the self-service kiosk that corresponds to the desired number on the scrambled keypad on the augmented reality device. Accordingly, the user may select a desired digit but using a button in an unexpected or non-traditional position, which may reduce the likelihood of skimmers or unauthorized users capturing accurate data.
Further, while aspects described herein are generally directed to users requesting tampering evaluation, in some examples, camera image data associated with the self-service kiosk may be used to continuously or on a periodic or aperiodic basis capture current image data of the self-service kiosk for tampering evaluation. For instance, a self-service kiosk may have a camera (e.g., a high-resolution camera) facing the self-service kiosk (e.g., in a lobby of a financial institution, or the like). The camera may continuously or periodically capture image data of the self-service kiosk that may then be evaluated using the arrangements described herein. Accordingly, the system may proactively evaluate a self-service kiosk for potential tampering without a user request. In some examples, the images may be time stamped and may be used to identify an unauthorized actor who tampered with the self-service kiosk.
In some examples, aspects described herein may be used to pre-stage one or more transactions at the self-service kiosk. For instance, a user may initiate a transaction via the application on the augmented reality device. Once the transaction is pre-staged, a confirmation code may be generated that may be input to the self-service kiosk to validate the user and complete the transaction (e.g., without requiring the user to input a physical card or PIN).
Computing system environment 800 may include tampering detection computing device 801 having processor 803 for controlling overall operation of tampering detection computing device 801 and its associated components, including Random Access Memory (RAM) 805, Read-Only Memory (ROM) 807, communications module 809, and memory 815. Tampering detection computing device 801 may include a variety of computer readable media. Computer readable media may be any available media that may be accessed by tampering detection computing device 801, may be non-transitory, and may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, object code, data structures, program modules, or other data. Examples of computer readable media may include Random Access Memory (RAM), Read Only Memory (ROM), Electronically Erasable Programmable Read-Only Memory (EEPROM), flash memory or other memory technology, Compact Disk Read-Only Memory (CD-ROM), Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by tampering detection computing device 801.
Although not required, various aspects described herein may be embodied as a method, a data transfer system, or as a computer-readable medium storing computer-executable instructions. For example, a computer-readable medium storing instructions to cause a processor to perform steps of a method in accordance with aspects of the disclosed embodiments is contemplated. For example, aspects of method steps disclosed herein may be executed on a processor on tampering detection computing device 801. Such a processor may execute computer-executable instructions stored on a computer-readable medium.
Software may be stored within memory 815 and/or storage to provide instructions to processor 803 for enabling tampering detection computing device 801 to perform various functions as discussed herein. For example, memory 815 may store software used by tampering detection computing device 801, such as operating system 817, application programs 819, and associated database 821. Also, some or all of the computer executable instructions for tampering detection computing device 801 may be embodied in hardware or firmware. Although not shown, RAM 805 may include one or more applications representing the application data stored in RAM 805 while tampering detection computing device 801 is on and corresponding software applications (e.g., software tasks) are running on tampering detection computing device 801.
Communications module 809 may include a microphone, keypad, touch screen, and/or stylus through which a user of tampering detection computing device 801 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output. Computing system environment 800 may also include optical scanners (not shown).
Tampering detection computing device 801 may operate in a networked environment supporting connections to one or more other computing devices, such as computing device 841 and 851. Computing devices 841 and 851 may be personal computing devices or servers that include any or all of the elements described above relative to tampering detection computing device 801.
The network connections depicted in
The disclosure is operational with numerous other computing system environments or configurations. Examples of computing systems, environments, and/or configurations that may be suitable for use with the disclosed embodiments include, but are not limited to, personal computers (PCs), server computers, hand-held or laptop devices, smart phones, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like that are configured to perform the functions described herein.
One or more aspects of the disclosure may be embodied in computer-usable data or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices to perform the operations described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types when executed by one or more processors in a computer or other data processing device. The computer-executable instructions may be stored as computer-readable instructions on a computer-readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. The functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents, such as integrated circuits, Application-Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects of the disclosure, and such data structures are contemplated to be within the scope of computer executable instructions and computer-usable data described herein.
Various aspects described herein may be embodied as a method, an apparatus, or as one or more computer-readable media storing computer-executable instructions. Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment, an entirely firmware embodiment, or an embodiment combining software, hardware, and firmware aspects in any combination. In addition, various signals representing data or events as described herein may be transferred between a source and a destination in the form of light or electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, or wireless transmission media (e.g., air or space). In general, the one or more computer-readable media may be and/or include one or more non-transitory computer-readable media.
As described herein, the various methods and acts may be operative across one or more computing servers and one or more networks. The functionality may be distributed in any manner, or may be located in a single computing device (e.g., a server, a client computer, and the like). For example, in alternative embodiments, one or more of the computing platforms discussed above may be combined into a single computing platform, and the various functions of each computing platform may be performed by the single computing platform. In such arrangements, any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the single computing platform. Additionally or alternatively, one or more of the computing platforms discussed above may be implemented in one or more virtual machines that are provided by one or more physical computing devices. In such arrangements, the various functions of each computing platform may be performed by the one or more virtual machines, and any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the one or more virtual machines.
Aspects of the disclosure have been described in terms of illustrative embodiments thereof. Numerous other embodiments, modifications, and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure. For example, one or more of the steps depicted in the illustrative figures may be performed in other than the recited order, one or more steps described with respect to one figure may be used in combination with one or more steps described with respect to another figure, and/or one or more depicted steps may be optional in accordance with aspects of the disclosure.