Aspects of the disclosure relate to providing apparatus and methods for improving self-service devices such as Automatic Teller Machines (“ATMs”), cash recyclers, and self-service kiosks.
Self-service devices such as Automatic Teller Machines (“ATMs”), cash recyclers, and self-service kiosks are typically operated by a user in a two-step method. First, the user inserts a banking card, transaction card or other object (referred to collectively herein as a “bank card”) that contains information identifying a user account. Then, the user enters a typically four-digit Personal Identification Number (“PIN”). The self-service device then compares the identification information on the bank card or other object to the received PIN. If the PIN corresponds to a predetermined secure code associated with the identification information, such as a PIN offset value, the user is provided full access to his or her accounts.
One drawback associated with the aforementioned, substantially ubiquitous, system is that the system is susceptible to fraud. For example, if a thief watches a user enter his or her four-digit PIN, and then manages to misappropriate the user's bank card, the user's entire bank account(s) may be exposed to trespass by the thief.
It would be desirable, therefore, to provide apparatus and methods that allow a user to access his or her accounts without exposing substantial the entire scope of his or her financial accounts to trespass.
An electronic self-service device is provided. The self-service device includes a receiver module configured to receive an input. The input includes information including a personal identification number (“PIN”). The self-service device also includes a processor module configured to determine whether predetermined limited access information corresponds to the received PIN. The self-service device includes a transmitter module. When the limited access information corresponds to the received PIN, the transmitter module is configured to communicate the limited access information to a central server. The receiver is configured to receive limited access instructions from the central server. The limited access instructions provide access to a predetermined portion of a user's accounts. The predetermined portion is less than the entirety of the user's accounts.
The objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
Apparatus and methods for improving fraud protection in self-service devices such as Automatic Teller Machines (“ATMs”), cash recyclers, and self-service kiosks are provided. Fraud protection according to the invention may include reducing user account exposure to fraud, conversion, theft or any other misappropriation.
An ATM for use with apparatus and methods according to the invention may be made up of one or more of the following devices or other suitable devices: a CPU (which may control user interface mechanisms, transaction devices, and communication with a central server), a magnetic card reader (to identify the card being used), a PIN pad, a cryptoprocessor, a display, function keys (usually in close proximity to the display) and/or a touchscreen, a printer (to provide a transaction record to a customer), a vault (to store portions of the machinery requiring restricted access), and a housing. In certain ATMs, a smart card reader (that reads a chip instead of a magnetic strip) and bill validation technology may also be implemented. A further feature of an ATM for use with systems and methods according to the invention may include printing each transaction to a roll paper journal that is stored inside the ATM.
The apparatus and methods may be scalable, for example, to cover all or a portion of the fleet of ATMs that run on a platform such as that available under the trademark APTRA platform, which is available from the NCR Corporation, Dayton, Ohio.
A limited access PIN according to the invention may preferably allow different, and preferably custom, functionality and/or limits, etc. from a conventional PIN. For example, whereas a conventional PIN provides access to the totality of a user's accounts with a bank or other financial institution, a limited access PIN according to the invention preferably provides some predetermined quantum of access less than full access.
The quantum may be expressed in terms of a limitation on the amount of funds available to a user, as determined by a user-defined and/or system-set parameter that corresponds to the PIN. The quantum may be expressed in terms of a time limitation on the PIN—i.e., the PIN may only provide access for a certain predetermined duration and expire thereafter. The quantum may be expressed in terms of a geographic limitation—i.e., the PIN may only provide access in a predetermined region. The quantum also may be expressed in terms of a time-based use limitation—i.e., the PIN may be valid for a predetermined time following the first use of the PIN—or some other suitably determined time factor.
It should be noted that systems and methods according to the invention may require various software and/or hardware PIN authentication enhancements. Such enhancements may preferably obtain different software responses which correspond to the entered PIN. Accordingly, when a predetermined PIN is entered following a card swipe, systems and methods according to the invention may send one or more different software and/or hardware responses. Such systems and methods may require that multiple offset values be stored on the bank card.
In alternative embodiments of the invention, the self-service device itself may include multiple PIN decoding algorithms in order to match a PIN with predetermined limited access information. Preferably, systems and methods according to the invention may be implemented such that communication with a central server does not include actual PIN information but rather some value that corresponds to the limited access associated with the limited access PIN.
Certain embodiments of the invention may involve a “panic” PIN. Such a PIN may send a message to a central server that a user senses danger and requires immediate assistance. Such a server may include software/hardware that is sensitive to the entry of such a PIN. Such software/hardware may be stored and/or co-located with other authorization software/hardware.
In other embodiments of the invention, a “security violation alert” PIN may also be used. Upon receipt and identification of such a security violation alert PIN, a self-service device may send a communication to appropriate authorities with an embedded message that identifies the present user as a fraud. In one exemplary circumstance, a rightful bank card owner is robbed and forced to disclose his or her PIN information. The rightful owner discloses his security violation alert PIN to the assailant. Then the robber swipes the card at a self-service device and enters the security violation alert PIN.
Thereafter, in one embodiment of the invention, the self-service device may provide limited bank account access to the robber—e.g., the robber may be allowed to withdraw a limited sum. Following receipt of the security violation alert PIN, the self-service device may be configured to substantially simultaneously send an alert message to the appropriate authorities. In some embodiments of the invention, the self-service may invoke a timing device that serves to slow down the actions of the self-service device in order to allow additional time for the travel and arrival of the appropriate authorities.
In certain embodiments of the invention, each member of a predetermined group—e.g., employees of a business and/or members of a family—may be issued an individual PIN. In such embodiments, systems and methods can track bank card activity, and the usage of accounts corresponding thereto, by person because each person is identifiable by his or her uniquely-issued PIN.
In some embodiments of the invention, online banking portals may include various levels of access. Such access may depend upon which PIN may be entered. Accordingly, certain members of a group may be allowed full access. Others may be allowed limited access. The level of access of a user may correspond to the user's preferably uniquely-issued PIN. In similar embodiments, the PIN may combined with a bank card such that, when a user attempts to use his or her bank card at an ATM, and enters his uniquely-issued PIN, a limited access banking portal may be provided to the user. In certain embodiments, a user may be notified of updates to certain PINs on a periodic basis. Such PINs may include various types of limited access PINs as described herein.
In certain embodiments of the invention that utilize a funds-limitation quantum, certain, preferably preselected, members of a group may be able to limit use of a bank card for certain other members of the group. For example, a parent may be able to give his or her bank card to a child and provide the child with a PIN that will limit the ability of the child to withdraw funds. Such a limitation may be funds-based—e.g., the child may be able to use the PIN to withdraw only some amount less than two hundred dollars.
In some embodiments of the invention, a PIN may be provided that is “disposable” —i.e. following a predetermined number of uses, the PIN ceases to validate access into the user's account(s). It should be noted that this embodiment, as well as any of the other embodiments of the invention described herein, may be combined with one or more of the other embodiments. For example, a disposable PIN may be combined with a funds-limited PIN such that a single PIN may provide only one-time access for a limited amount of funds—e.g., two hundred dollars.
Apparatus and methods that are used to determine and transmit the various parameters of limited PIN access may utilize Base24—a software application available from ACI Worldwide Corp., Omaha, Nebr. under the trademark BASE24—that runs on the server and that is typically used for ATM connectivity—or any other application that runs on a server that communicates with the ATMs.
Many self-service devices are networked with other self-service devices. A group of networked self-service devices may be served by one or more servers. Apparatus and methods according to the invention may preferably be applicable to numerous self-service devices across a communications network. Accordingly, if a PIN access is limited by a predetermined quantum stored at a central server or limited in some other fashion, then the PIN should preferably be limited at each of the self-service devices that utilize the information in the server.
Illustrative embodiments of apparatus and methods in accordance with the principles of the invention will now be described with reference to the accompanying drawings, which form a part hereof. It is to be understood that other embodiments may be utilized and structural, functional and procedural modifications may be made without departing from the scope and spirit of the present invention.
As will be appreciated by one of skill in the art, the invention described herein may be embodied in whole or in part as a method, a data processing system, or a computer program product. Accordingly, the invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software, hardware and any other suitable approach or apparatus.
Furthermore, such aspects may take the form of a computer program product stored by one or more computer-readable storage media having computer-readable program code, or instructions, embodied in or on the storage media. Any suitable computer readable storage media may be utilized, including hard disks, CD-ROMs, optical storage devices, magnetic storage devices, and/or any combination thereof. In addition, various signals representing data or events as described herein may be transferred between a source and a destination in the form of electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, and/or wireless transmission media (e.g., air and/or space).
Input/output (“I/O”) module 109 may include a microphone, keypad, touch screen, and/or stylus through which a user of device 101 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output. Software may be stored within memory 125 and/or storage to provide instructions to processor 103 for enabling server 101 to perform various functions. For example, memory 125 may store software used by server 101, such as an operating system 117, application programs 119, and an associated database 121. Alternatively, some or all of server 101 computer executable instructions may be embodied in hardware or firmware (not shown).
Server 101 may operate in a networked environment supporting connections to one or more remote computers, such as terminals 141 and 151. Terminals 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to server 101. The network connections depicted in
Additionally, application program 119, which may be used by server 101, may include computer executable instructions for invoking user functionality related to communication.
Computing device 101 and/or terminals 141 or 151 may also be mobile terminals including various other components, such as a battery, speaker, and antennas (not shown).
Terminal 151 and/or terminal 141 may be portable devices such as a laptop, cell phone, Blackberry™, or any other suitable device for storing, transmitting and/or transporting relevant information.
Any information described above in connection with database 121, and any other suitable information, may be stored in memory 125.
One or more of applications 119 may include one or more algorithms that may be used to receive and parse limited access PINs, panic PINs, security violation alert PINs and/or any other suitable tasks related to limited access self-service device PIN implementation.
The invention may be operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, mobile phones and/or other personal digital assistants (“PDAs”), multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Monitor 202 may exchange visual and or audio information with a customer. Keypad 204 may include alphanumeric keys 214 for the customer to enter numerical and textual data. Keypad 204 may include control keys 216. In some embodiments, control keys 216 may be used to communicate control information, such as instructions, to self-service device 200. Keypad 204 may include soft keys. Soft keys 218 may have functions that are dictated by programming and are presented to the customer using information that may be displayed on monitor 202.
Card reader port 206 may be the front end of any suitable card reader. The card reader may read magnetically encoded information on transaction instruments such as bank cards. In some embodiments, self-service device 200 may include a contactless chip reader, a wireless transceiver or any other suitable interface for exchanging transaction information with a transaction instrument. The transaction instrument may be a chip, an RFID tag, a smart card, a PDA, a telephone or any other suitable device.
In some embodiments, self-service device 200 may include a biometric sensor (not shown). The biometric sensor may identify a customer based on a feature, such as an anatomical feature, of the customer. For example, the biometric sensor may be configured to identify the customer based on all or part of a face, a fingerprint, an iris, a retina a hand or any other suitable anatomical feature. The biometric sensor may identify the customer based on a behavioral feature such as a signature, a voice, a gait or any other suitable behavioral feature.
In some embodiments of the invention, the biometric sensor may be used alone, or in combination with a PIN and/or bank card, as a limited access device. In such embodiments, the biometric sensor may act to identify a user such that limited access features according to the invention may be implemented. Further, such a device may be used in combination with some or all of the other embodiments described in this application.
Document acceptor 208 may accept any suitable documents. For example, document acceptor 208 may accept envelopes, deposit forms, bills, checks or any other suitable documents. In some embodiments, document acceptor 208 may feed into a scanner that digitizes the documents for image-based transaction processing.
It should be noted that a limited access PIN according to the invention may or may not limit the ability of a user to deposit documents in self-service device 200. In certain embodiments, a limited access PIN may limit certain types of document deposits but not others. In other embodiments, a limited access PIN may prevent any deposits and only allow withdrawals.
Item dispenser 210 may dispense items. For example, item dispenser 210 may dispense bills. In some embodiments of the invention, dispenser 210 may be limited to dispensing certain amounts of funds, and/or certain sizes of bills. Such limitations may be user-defined and/or system set. In other embodiments, the limited access pin may set local limits on dispensing funds, as described elsewhere in this specification.
Security screen 212 may visually screen a surveillance device (not shown). The surveillance device may provide video information about individuals that are present near the self-service device and the conditions there.
Item handling mechanism 306 may include item counter 314. Item counter 314 may count items prior to dispensing by dispenser 308.
Self-service device 300 may include LCD display 316 and a keypad (not shown) for customer interaction. Card reader 318 may be present for receiving transaction information from the customer via a suitable transaction instrument. Self-service device 300 may include receipt printer and dispenser module 320. Receipt printer and dispenser module 320 may provide the customer with a record of a transaction. CPU 320 may control customer I/O, dispensing processes, which may include initialization, actuation, dispensing and any other suitable processes, receipt printing and dispensing, transaction channel communications and any other suitable processes. The transaction channel communications may be performed using modem 324, which may be any suitable communication device. Modem 324 may communicate with a local or regional network router (not shown). Service monitor 326 may be provided for a service technician to exchange information and instructions with CPU 322.
In certain embodiments of the invention, CPU 402 may receive transaction information from keypad 408 and/or card reader 410 that corresponds to a limited access PIN according to the invention. In such circumstances, CPU 402 may preferably communicate such information to network N via modem 404, which is in communication with router R.
It should be noted that prior to communicating with the network via router R, CPU 402 typically verifies the PIN received from the user with a PIN offset value stored on the magnetic stripe, or other storage mechanism, on the bank card. The PIN offset value typically corresponds to the input user PIN but is “offset” by some predetermined value (or using a predetermined algorithm) in order to prevent fraudulent use of the bank card by a third party. Thus, if a third party were to obtain the bank card, the third party could not obtain the user PIN number without knowing a code that the self-service device used to match the PIN and the PIN offset value.
In systems and methods according to the invention, a bank card according to the invention may preferably store multiple offset values. Each of the offset values may preferably correspond to a predetermined limited access PIN. In addition, at least one of the offset values may correspond to a full access PIN.
When the self-service device matches an input PIN with one of the limited access PINs, the self-service device may preferably communicate, to a self-service device operations module, that the limited access PIN information had been received at the self-service device. In response to receipt of the limited access PIN information, the module may use the information to transmit limited access instructions to the self-service device. In such embodiments, it can be understood that the bank card may preferably store multiple offset values.
In other embodiments of the invention, a CPU, such as CPU 402 may be in communication with a memory (not shown) on the self-service device 400. Such a memory may store multiple codes for matching the PIN with an offset value on the bank card.
Self-service devices such as ATMs 504 may communicate via electronic communication network 502 with self-service device operations module 506. Self-service device operations module 506 may include one or more devices shown in
Command lines in transactional information from ATM 602 may be executed at line handler protocol layer 606. Device handler 608 may handle routing decisions based on transactional information requirements for authorization, settlement, clearance, transactional networks and issuing financial institutions.
In certain implementations according to the invention, such authorization may include limited access PIN authorization. Such limited PIN authorization may also be executed at line handler protocol layer 606.
Authorization requests may then be processed by auth-process module 610. Auth-process module 610 may then provide transactional information to host interface 612 for communication with platform 604. In limited access PIN embodiments according to the invention, such transaction information may be further processed by host interface 612 and communicated to main frame 604.
Supervisory module 614 may receive diagnostic data from line handler 606, device handler 608, auth-process module 610, or any other suitable source. The diagnostic data may be used to manage ATM 602. The diagnostic data may be provided to a self-service operations module such as 506 (shown in
Processes in accordance with the principles of the invention may include one or more features of the process illustrated in
The network accessibility 704 of device 702 preferably requires a secure network connection and further requires user authentication. Such network accessibility 704 may provide a connection to remote central self service device data storage 706.
Such accessibility, together with ATM data transmission, may preferably be used to implement embodiments of limited access PIN information.
Limited access PIN information transferred to self-service device 706 may set forth guidelines for the current transaction. Such guidelines may control the accessibility and release of data from self-service device 702. Such unique guidelines and/or instructions may preferably correspond to limited access PIN information 706.
In certain embodiments of the invention, each of the limited access PINs may also include a limited access class identifier. Such an identifier may preferably include information relating to the quantum of limitation on the access of the card and/or parameters of limitation. Such an identifier may include information regarding the level of restriction of funds accessible using such card.
As described above, the limited access PIN may be identified by matching one of a plurality of offset values stored on the card, and then sending the information based on the matched PIN to an electronic communications network (“ECN”).
In these or other methods, a limited access identifier may be transmitted to the appropriate location, whether a self-service device operations module, a main frame, or some other suitable location, via the ECN.
Step 808 shows transmitting selected PIN information to a self-service device operations module and/or main frame via an ECN (see
Step 904 shows receiving limited access PIN information. Step 906 shows authenticating the PIN information—i.e., matching PIN information to one of a plurality of algorithms to determine whether the PIN is a limited access PINs. Such a method may be implemented by testing various algorithmic decoding mechanisms. In such an embodiment, the PIN may be associated with a particular limited-access quantum via the identification of the algorithmic decoding mechanism that converted the PIN information to a predetermined PIN offset value.
Once the algorithmic decoding mechanism is obtained, the algorithmic decoding mechanism information, which is referred to as “selected PIN information” in step 908, may be transmitted to a self-service device operations module or main frame via an ECN, as shown in step 908, in order to identify the limited access characteristics associated with the PIN.
Finally, in response to transmission of algorithmic decoding mechanism information, the self-service device may receive access information from the ECN and/or the main frame, as shown in step 908. Preferably, in the scenarios implemented by the invention, PIN information is typically not transmitted outside of the self service device.
One of ordinary skill in the art will appreciate that the elements shown and described herein may be performed in other than the recited order and that one or more elements illustrated may be optional. The methods of the above-referenced embodiments may involve the use of any suitable elements, elements, computer-executable instructions, or computer-readable data structures. In this regard, other embodiments are disclosed herein as well that can be partially or wholly implemented on a computer-readable medium, for example, by storing computer-executable instructions or modules or by utilizing computer-readable data structures.
Thus, a self-service terminal with mechanism(s) for making deposits and for permitting withdrawals as well as methods for operating said terminal in response to receipt of a limited access PIN have been provided. Persons skilled in the art will appreciate that the present invention can be practiced by other than the described embodiments, which are presented for purposes of illustration rather than of limitation. The present invention is limited only by the claims that follow.
Number | Name | Date | Kind |
---|---|---|---|
5354974 | Eisenberg | Oct 1994 | A |
5731575 | Zingher et al. | Mar 1998 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6052675 | Checchio | Apr 2000 | A |
6095416 | Grant et al. | Aug 2000 | A |
6163771 | Walker et al. | Dec 2000 | A |
6257486 | Teicher et al. | Jul 2001 | B1 |
6339766 | Gephart | Jan 2002 | B1 |
6437692 | Petite et al. | Aug 2002 | B1 |
6636833 | Flitcroft et al. | Oct 2003 | B1 |
6679422 | Brown et al. | Jan 2004 | B2 |
6775398 | Schaeck et al. | Aug 2004 | B1 |
6796497 | Benkert et al. | Sep 2004 | B2 |
6871288 | Russikoff | Mar 2005 | B2 |
6948077 | Pitale | Sep 2005 | B1 |
6976622 | Trelawney et al. | Dec 2005 | B1 |
7004385 | Douglass | Feb 2006 | B1 |
7053767 | Petite et al. | May 2006 | B2 |
7090122 | Warren et al. | Aug 2006 | B1 |
7100821 | Rasti | Sep 2006 | B2 |
7136835 | Flitcroft et al. | Nov 2006 | B1 |
7140539 | Crews et al. | Nov 2006 | B1 |
7163144 | Trelawney et al. | Jan 2007 | B1 |
7175073 | Kelley et al. | Feb 2007 | B2 |
7177835 | Walker et al. | Feb 2007 | B1 |
7210622 | Lambert et al. | May 2007 | B2 |
7216801 | Crews et al. | May 2007 | B1 |
7219833 | Cantini et al. | May 2007 | B2 |
7249092 | Dunn et al. | Jul 2007 | B2 |
7284692 | Douglass | Oct 2007 | B1 |
7284695 | Warren et al. | Oct 2007 | B1 |
7287009 | Liebermann | Oct 2007 | B1 |
7295993 | Meek et al. | Nov 2007 | B1 |
7314163 | Crews et al. | Jan 2008 | B1 |
7314166 | Anderson et al. | Jan 2008 | B2 |
7328839 | Keohane et al. | Feb 2008 | B2 |
7331515 | Blackson et al. | Feb 2008 | B1 |
7337144 | Blinn et al. | Feb 2008 | B1 |
7377425 | Ma et al. | May 2008 | B1 |
7395242 | Blinn et al. | Jul 2008 | B2 |
7398250 | Blinn et al. | Jul 2008 | B2 |
7419093 | Blackson et al. | Sep 2008 | B1 |
7428984 | Crews et al. | Sep 2008 | B1 |
7438219 | Crews et al. | Oct 2008 | B1 |
7441697 | Fletcher | Oct 2008 | B2 |
7441706 | Schuessler et al. | Oct 2008 | B1 |
7448538 | Fletcher | Nov 2008 | B2 |
7467744 | Crews et al. | Dec 2008 | B1 |
7469824 | Crews et al. | Dec 2008 | B1 |
7472827 | Fletcher | Jan 2009 | B2 |
7472829 | Brown | Jan 2009 | B2 |
7497371 | Sparks | Mar 2009 | B1 |
7516886 | Gangi | Apr 2009 | B2 |
7567934 | Flitcroft et al. | Jul 2009 | B2 |
7568631 | Gibbs et al. | Aug 2009 | B2 |
7571142 | Flitcroft et al. | Aug 2009 | B1 |
7577614 | Warren et al. | Aug 2009 | B1 |
7584885 | Douglass | Sep 2009 | B1 |
7611048 | Warren et al. | Nov 2009 | B1 |
7630927 | Canard et al. | Dec 2009 | B2 |
7636694 | Wankmueller et al. | Dec 2009 | B1 |
7690561 | Blackson et al. | Apr 2010 | B1 |
7698221 | Blinn et al. | Apr 2010 | B2 |
7707108 | Brown et al. | Apr 2010 | B2 |
7712657 | Block et al. | May 2010 | B1 |
7735721 | Ma et al. | Jun 2010 | B1 |
7739194 | Blinn et al. | Jun 2010 | B2 |
7780074 | Crews et al. | Aug 2010 | B1 |
7780077 | Warren et al. | Aug 2010 | B1 |
7819309 | Warren et al. | Oct 2010 | B1 |
7822666 | Bursch | Oct 2010 | B1 |
7835960 | Breck et al. | Nov 2010 | B2 |
7840485 | Warren et al. | Nov 2010 | B1 |
7844550 | Walker et al. | Nov 2010 | B2 |
7853529 | Walker et al. | Dec 2010 | B1 |
7899742 | Benkert et al. | Mar 2011 | B2 |
7954704 | Gephart et al. | Jun 2011 | B1 |
7980464 | Sarris et al. | Jul 2011 | B1 |
7996288 | Stolfo | Aug 2011 | B1 |
8019658 | Sines et al. | Sep 2011 | B2 |
8047429 | Warren et al. | Nov 2011 | B1 |
8052045 | Warren et al. | Nov 2011 | B1 |
8127982 | Casey et al. | Mar 2012 | B1 |
8145522 | Warren et al. | Mar 2012 | B2 |
8152059 | Sparks | Apr 2012 | B2 |
8157163 | Crews et al. | Apr 2012 | B1 |
8170954 | Keresman et al. | May 2012 | B2 |
20010034720 | Armes | Oct 2001 | A1 |
20010047330 | Gephart et al. | Nov 2001 | A1 |
20020038818 | Zingher et al. | Apr 2002 | A1 |
20020099635 | Guiragosian | Jul 2002 | A1 |
20020125998 | Petite et al. | Sep 2002 | A1 |
20020169720 | Wilson et al. | Nov 2002 | A1 |
20020170954 | Zingher et al. | Nov 2002 | A1 |
20030028481 | Flitcroft et al. | Feb 2003 | A1 |
20030066876 | Goldman et al. | Apr 2003 | A1 |
20030144952 | Brown et al. | Jul 2003 | A1 |
20030197058 | Benkert et al. | Oct 2003 | A1 |
20040015450 | Zingher et al. | Jan 2004 | A1 |
20040078325 | O'Connor | Apr 2004 | A1 |
20040143527 | Benkert et al. | Jul 2004 | A1 |
20040168067 | Russikoff | Aug 2004 | A1 |
20040178263 | Jones et al. | Sep 2004 | A1 |
20040249753 | Blinn et al. | Dec 2004 | A1 |
20040260647 | Blinn et al. | Dec 2004 | A1 |
20050065885 | Gordon | Mar 2005 | A1 |
20050080730 | Sorrentino | Apr 2005 | A1 |
20050252961 | Rasti | Nov 2005 | A1 |
20060076400 | Fletcher | Apr 2006 | A1 |
20060122931 | Walker et al. | Jun 2006 | A1 |
20060157553 | Kelley et al. | Jul 2006 | A1 |
20060163343 | Changryeol | Jul 2006 | A1 |
20060181406 | Petite et al. | Aug 2006 | A1 |
20060213979 | Geller et al. | Sep 2006 | A1 |
20060278697 | Lovett | Dec 2006 | A1 |
20070078760 | Conaty et al. | Apr 2007 | A1 |
20070081540 | Crowell et al. | Apr 2007 | A1 |
20070083466 | Crowell et al. | Apr 2007 | A1 |
20070114274 | Gibbs et al. | May 2007 | A1 |
20070136197 | Morris | Jun 2007 | A1 |
20070203835 | Cai | Aug 2007 | A1 |
20070228161 | Fletcher | Oct 2007 | A1 |
20070284434 | Fletcher | Dec 2007 | A1 |
20080010220 | Hobson et al. | Jan 2008 | A1 |
20080033879 | Blinn et al. | Feb 2008 | A1 |
20080052227 | Canard et al. | Feb 2008 | A1 |
20080075235 | Russikoff | Mar 2008 | A1 |
20080120238 | Flitcroft et al. | May 2008 | A1 |
20080121692 | MacPhail et al. | May 2008 | A1 |
20080235135 | Blinn et al. | Sep 2008 | A1 |
20080283594 | Unbehagen | Nov 2008 | A1 |
20080301047 | Fish et al. | Dec 2008 | A1 |
20090037333 | Flitcroft et al. | Feb 2009 | A1 |
20090055269 | Baron | Feb 2009 | A1 |
20090114716 | Ramachandran | May 2009 | A1 |
20090132417 | Scipioni et al. | May 2009 | A1 |
20090164373 | Blythe | Jun 2009 | A1 |
20090222367 | Jenkins et al. | Sep 2009 | A1 |
20090276347 | Kargman | Nov 2009 | A1 |
20090289105 | Block et al. | Nov 2009 | A1 |
20100063906 | Nelsen et al. | Mar 2010 | A1 |
20100076833 | Nelsen | Mar 2010 | A1 |
20100082487 | Nelsen | Apr 2010 | A1 |
20100268645 | Martino et al. | Oct 2010 | A1 |
20100312709 | Maddocks | Dec 2010 | A1 |
20110102141 | Wu | May 2011 | A1 |
20110153437 | Archer et al. | Jun 2011 | A1 |
Number | Date | Country |
---|---|---|
961246 | Oct 2008 | EP |
WO 01351900 | May 2001 | WO |
WO 2004044800 | May 2004 | WO |
Entry |
---|
http://www.ncr.com/documents/aptra—advance—ndc—uk—ds.pdf retrieved on Feb. 1, 2010. |
http://www.gasper-corp.com/Solution—Exchange.asp retrieved on Feb. 1, 2010. |
http://www.aciworldwide.com/igsbase/igstemplate.cfm/SRC=MD021/SRCN=lookupdetails/GnavID=103/SnavID=/TnavID=/LookupCatID=30/CATsearch=1 Retreived on Feb. 1, 2010. |