Immediate release of resource for data transfer

ABSTRACT

In an aspect, the present application describes a computer system. The computer system includes a communications module and a processor coupled to the communications module. The computer system include a memory coupled to the processor storing instructions that, when executed by the computer system, cause the computer system to: receive, from an automated teller machine (ATM) and via the communications module, an indication of a deposit of a value instrument; save, in the memory, a retention instruction including an associated temporal period, the retention instruction preventing withdrawal of value instruments corresponding to an amount of the deposit; receive, via the communications module, an instruction to process a data transfer to a recipient, the data transfer to the recipient accessing at least a portion of the deposit; and process the data transfer to the recipient during the temporal period using at least a portion of the deposit.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/381,321 entitled “Immediate Release of Resource for Data Transfer”,filed on Jul. 21, 2021, which is a continuation of U.S. patentapplication Ser. No. 16/431,796 entitled “Immediate Release of Resourcefor Data Transfer”, filed on Jun. 5, 2019, which issued as U.S. Pat. No.11,100,480, the contents of each of which is herein incorporated byreference.

FIELD

The present application relates to systems which use automated tellermachines for receiving value instruments and, more particularly, tosystems for controlling resources.

BACKGROUND

Automated teller machines (ATMs) or automated banking machines (ABMs)allow certain banking activities to be performed without resort to ahuman teller. For example, withdrawals can be made and fulfilled byvalue instruments (in many cases, banknotes) dispensed by the machine.In another example, deposits can be made with value instruments insertedinto the machine.

While ATMs provide convenience for users, they can introduce problemsthat do not exist with human tellers. For example, while a human tellermay be able to quickly discern whether a deposited value instrument isvalid (e.g., not counterfeit), the ATM may have more difficulty indetecting counterfeits. For example, even an ATM equipped withcounterfeit detection technology may, in some instances, be defeated bynew counterfeiting techniques. Counterfeit detection technology on ATMsmay be difficult to update in response to new counterfeiting techniques.Due to the limitations of counterfeit detection technology on ATMs, ahold may be applied to deposits made at ATMs, including cash deposits.The hold may, for example, provide time for a human to review the cashdeposits. In contrast, since human tellers are able to review non-ATMcash deposits at the time of deposit, holds may not apply to cashdeposits made directly with human tellers. Such holds may createproblems for some customers, making such customers less likely to useATMs and more likely to rely on human tellers.

Additionally, ATMs may be of little use to individuals that do not havea bank (i.e., who are “unbanked”) or that do not have a bank in closeproximity (i.e., who are “underbanked”). A sizable number of householdsare either unbanked or underbanked and may, therefore, not benefit fromthe use of ATMs.

Thus, there is a need for improvements in systems that rely upon ATMs.However, such improvements may be complicated by the existence ofexisting infrastructure. It may be desirable to provide improvements insystems that rely upon ATMs without having to replace all existing ATMinfrastructure.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are described in detail below, with reference to thefollowing drawings:

FIG. 1 is a schematic operation diagram illustrating an operatingenvironment of an example embodiment;

FIG. 2 is a simplified diagram showing components of an exampleautomated teller machine;

FIG. 3 is a logical block diagram of the example automated tellermachine of FIG. 2 ;

FIG. 4 is a high-level operation diagram of an example computing device;

FIG. 5 depicts an example simplified software organization of theexample computing device of FIG. 4 ;

FIG. 6 provides a flowchart depicting example operations performed forprocessing a data transfer;

FIG. 7 provides a flowchart depicting example operations performed forprocessing a data transfer; and

FIG. 8 provides a flowchart depicting example operations performed forprocessing a data transfer.

Like reference numerals are used in the drawings to denote like elementsand features.

DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS

According to the subject matter of the present application, there may beprovided a computer system. The computer system may be a server system.The computer system may include a communications module, a processorcoupled to the communications module and a memory. The memory may becoupled to the processor and may store instructions that, when executedby the computer system, cause the computer system to: receive, from anautomated teller machine (ATM) and via the communications module, anindication of a deposit of a value instrument; save, in the memory, aretention instruction including an associated temporal period, theretention instruction preventing withdrawal of value instrumentscorresponding to an amount of the deposit; receive, via thecommunications module, an instruction to process a data transfer to arecipient, the data transfer to the recipient accessing at least theportion of the deposit; and process the data transfer to the recipientduring the temporal period using at least a portion of the deposit.

In another aspect, there is described a computer-implemented methodincluding: receiving, from an automated teller machine (ATM) anindication of a deposit of a value instrument; saving a retentioninstruction including an associated temporal period, the retentioninstruction preventing withdrawal of value instruments corresponding toan amount of the deposit; receiving an instruction to process a datatransfer to a recipient, the data transfer to the recipient accessing atleast a portion of the deposit; and processing the data transfer to therecipient during the temporal period using at least the portion of thedeposit.

In some implementations, the deposit of the value instrument may beprovided by a user that does not maintain a bank account accessible tothe computer system.

In some implementations, the ATM may be configured to require the userto input one or more configuration parameters prior to depositing thevalue instrument.

In some implementations, the instructions may further cause the computersystem to: provide, to a client device associated with the user, a datatransfer interface and initiate a data transfer configuration session;and associate the data transfer configuration session with an ATMsession during which the deposit of the value instrument was made basedon a credential. The instruction to process the data transfer to therecipient may be received from the client device during the datatransfer configuration session.

In some implementations, the credential may be provided to the clientdevice during the data transfer configuration session and input to theATM during the ATM session.

In some implementations, at least a portion of the credential may beoutput by the ATM during the ATM session and the credential may be inputat the client device during the data transfer configuration session. Insome implementations, the at least a portion of the credential isprinted on a deposit slip by the ATM.

In some implementations, the instructions may further cause the computersystem to: receive an indication of input of an identification documentat the ATM; and initiate an ATM session for a non-customer at the ATM,the ATM session enabling the ATM to receive the deposit of the valueinstrument.

In some implementations, the ATM may include a first cassette forreceiving deposits of value instruments and a second cassette fordispensing value instruments and the retention instruction may preventwithdrawal of the deposit at the ATM.

According to the subject matter of the present application, there may beprovided a non-transitory computer-readable storage medium storinginstructions that, when executed by a processor of a computer system,cause the computer system to perform the above-described method.

In a particular example, there may be provided non-transitorycomputer-readable storage medium storing instructions that, whenexecuted by a processor of a computer system, cause the computer systemto: receive, from an automated teller machine (ATM) an indication of adeposit of a value instrument; save a retention instruction including anassociated temporal period, the retention instruction preventingwithdrawal of value instruments corresponding to an amount of thedeposit; receive, via the communications module, an instruction toprocess a data transfer to a recipient, the data transfer to therecipient accessing at least a portion of the deposit; and process thedata transfer to the recipient during the temporal period using at leasta portion of the deposit.

Accordingly to at least some examples described herein, valueinstruments (e.g., cash) received by the automated teller machine may beprevented from being withdrawn immediately but may be used, for example,for a data transfer. The systems described herein may, for example, beuseful with ATMs that have different cassettes for dispensing andreceiving value instruments. For example, the systems and methodsdescribed herein may prevent a user from depositing a value instrumentin a first cassette and then attempting to withdraw a value instrumentof equal or lesser value from a second cassette. This may, for example,allow non-customers to use ATMs for data transfers, such as billpayments, without enabling the swapping of counterfeit value instrumentsfor valid value instruments.

At least some techniques described herein may be used, for example, withexisting ATM infrastructure. For example, at least some embodimentsdescribed herein may allow a non-customer to use the ATM in order toprocess a data transfer without the need to update the hardware ofexisting ATMs. For example, a non-customer may rely on a client deviceassociated with the non-customer (such as a smartphone, computer, etc.)to configure a data transfer through session association techniquesdescribed herein.

Further, at least some of the techniques described herein may solvetechnical problems related to deposits received at ATMs bynon-customers. For example, orphaned deposits could occur if an ATMhaving separate cassettes for receiving deposits of value transferinstruments and for dispensing value transfer instruments are configuredto accept value transfer instruments from non-customers. For example, ifsuch an ATM were to accept a deposit from a non-customer in order toallow the non-customer to make a data transfer involving a depositedvalue transfer instrument, but the non-customer elected to not proceedwith the data transfer, then the ATM could either: 1) attempt to returnthe value transfer instrument; or 2) prevent the return of the valuetransfer instrument. If the ATM attempted to return the value transferinstrument, then it may do so using the cassette for dispensing valueinstruments, which would be dispensing different value transferinstruments than those received at the ATM by the non-customer. Thiscould create an opportunity for unscrupulous individuals to exchangecounterfeit value instruments for valid value instruments, since thereturned value transfers instruments would not be the same valueinstruments deposited (due to the separation of the cassettes and thesingle function associated with each cassette). If, instead, the ATMprevented the return of a value instrument to prevent such exchanges,the value transfer instrument could be orphaned. For example, since theindividual that deposited the value transfer instrument may not have anaccount with a financial institution operating the ATM, returning thevalue transfer instrument to that individual (when the individual electsto not complete a data transfer) after the instrument has, for example,been subject to further scrutiny, may prove difficult or impossible. Atleast some techniques described herein may, therefore, address one ormore such problems or other problems as will be understood based on thepresent description.

The value instruments described herein may include a banknote.Alternatively, or additionally, the value instruments may include acoin.

Other aspects and features of the present application will be understoodby those of ordinary skill in the art from a review of the followingdescription of examples in conjunction with the accompanying figures.

In the present application, the term “and/or” is intended to cover allpossible combinations and sub-combinations of the listed elements,including any one of the listed elements alone, any sub-combination, orall of the elements, and without necessarily excluding additionalelements.

In the present application, the phrase “at least one of . . . or . . . ”is intended to cover any one or more of the listed elements, includingany one of the listed elements alone, any sub-combination, or all of theelements, without necessarily excluding any additional elements, andwithout necessarily requiring all of the elements.

FIG. 1 is a schematic operation diagram illustrating an operatingenvironment of an example embodiment.

As illustrated, an automated teller machine (ATM) 100 and a serversystem 110 communicate via a network 120.

A client device 140 may also communicate with the server system 110 viaa network 120. In the example illustrated, the network 120 that connectsthe automated teller machine 100 to the server system 110 is the samenetwork that connects the client device 140 to the server system 110.However, in other embodiments, these networks may be different networks.For example, the network connecting the automated teller machine 100 andthe server system 110 may be largely comprised of a private networkwhereas the network connecting the client device 140 to the serversystem 110 may be largely comprised of a public network, such as theInternet.

The automated teller machine 100, the client device 140, and the serversystem 110 may be in geographically disparate locations. Putdifferently, the automated teller machine 100 and/or the client device140 may be remote from the server system 110 and the client device 140may be remote from the automated teller machine 100.

As further explained below, the automated teller machine 100, the clientdevice 140 and the server system 110 are computer systems.

The automated teller machine 100 is adapted to provide access to bankingservices such as, for example, withdrawals and deposits. As furtherexplained below, the automated teller machine 100 is configured tofacilitate data transfers such as, for example, bill payments.

The server system 110 is a server that provides one or more back-officeservices to a financial institution including, for example, maintenanceof accounts, payment processing, fraud detection and the like. Theserver system 110 may, for example, be or include a mainframe computer,a minicomputer, or the like. In some embodiments, the server system 110may be formed of or may include one or more computing devices. Forexample, the server system 110 may include and/or may communicate withmultiple computing devices such as, for example, database servers,compute servers, and the like. Multiple computing devices such as thesemay be in communication using a computer network. For example, suchcomputing devices may communicate using a local-area network (LAN). Insome embodiments, the server system 110 may include multiple computingdevices organized in a tiered arrangement. For example, the serversystem 110 may include middle tier and back-end computing devices. Insome embodiments, the server system 110 may be a cluster formed of aplurality of interoperating computing devices.

The client device 140 may be or include various types of computersystems including, for example, a smartphone, a personal computer, atablet computer, a laptop computer, a wearable device such as a smartwatch or glasses, an in-home appliance, a smart speaker, a vehicle,and/or a gaming console. The client device 140 may include or beconnected to an input interface such as a keyboard, mouse, touchscreeninterface, microphone, etc. The client device 140 may include or beconnected to an output interface such as a display, speaker, etc. Theinput interface and output interface may provide a user interface thatallows the client device to receive input at an input interface based onoutput provided at an output interface. The client device 140 may, forexample, be configured to provide a data transfer user interface basedon data received from the server system 110. The data transfer interfacemay, for example, allow the client device 140 to be used to configure adata transfer, based on a value instrument received at the ATM 100, to arecipient. For example, the client device 140 may be used to inputconfiguration parameters for a bill payment in which value associatedwith a deposited value instrument may be transferred to a recipient.

The network 120 is a computer network. In some embodiments, the network120 may be an internetwork such as may be formed of one or moreinterconnected computer networks. For example, the network 120 may be ormay include an Ethernet network, an asynchronous transfer mode (ATM)network, a wireless network, and/or the like. Additionally oralternatively, one or more devices may communicate with the computernetwork by way of a plain-old telephone service (POTS) line such asusing a modem. In a particular example, the automated teller machine 100may communicate with the server system 110, directly or indirectly, byway of a POTS line.

Example components of the automated teller machine 100 will now bedescribed with reference to FIG. 2 .

FIG. 2 is a simplified diagram showing the automated teller machine 100with an access panel 200 opened to reveal certain internal components.

As illustrated, the automated teller machine 100 may include acontroller 210, a display 220, a keypad 230, an item receiver/dispenser240, cassettes 250, and a card reader 260.

As further described below, the controller 210 is a computing device.For example, the controller 210 may include a processor that executesinstructions retrieved from a computer-readable medium thereby causingthe automated teller machine 100 to perform operations for providingaccess to banking services including handling deposits of valueinstruments which may then be recycled.

The display 220 may, for example, be a liquid-crystal display (LCD), acathode-ray tube (CRT), or the like. The display 220 is for presentinginformation such as to a user of the automated teller machine 100. Thedisplay 220 may present information under control of the controller 210.

The keypad 230 is an input device allowing input to be provided to theautomated teller machine 100. Input received via the keypad 230 may beconveyed to the controller 210. The keypad 230 may be used by a user toprovide a personal identification number (PIN) to the automated tellermachine 100 as a part of authenticating to the automated teller machine100. In some embodiments, the keypad 230 may be used to input acredential which may be used to associate an ATM session with a datatransfer configuration session on the client device 140.

The item receiver/dispenser 240 is a mechanical device allowing valueinstruments to be obtained by and dispensed by the automated tellermachine 100. For example, it may be that the item receiver/dispenser 240provides a single slot through which value instruments are received anddispensed. Additionally or alternatively, the item receiver/dispenser240 may provide multiple slots such as, for example, one or more slotsfor receiving value instruments and one or more slots for dispensingvalue instruments. In some embodiments, the item receiver/dispenser 240may consist of multiple mechanical units. Each such mechanical unit maybe in communication with a respective slot of the automated tellermachine 100. Additionally or alternatively, one or more of themechanical units may communicate with the same slot—i.e., a shared slot.It may be that components or units of the item receiver/dispenser 240are specialized to a particular type or types of value instrument. Forexample, a particular component or unit of the item receiver/dispenser240 may be adapted to receiving and/or dispensing banknotes of onedenomination, while another component or unit may be adapted toreceiving and/or dispensing banknotes of another denomination.Alternatively, it may be that the item receiver/dispenser 240 is amonolithic unit that handles all manner of value instruments.

The item receiver/dispenser 240 is in communication with the cassettes250. Each of the cassettes 250 may be adapted to receive or dispensevalue instruments. For example, a deposit cassette of the cassettes 250may be adapted to receive value instruments that are provided fordeposit. A deposit cassette may be or may include a bin. In anotherexample, a cash cassette of the cassettes 250 may be loaded with banknotes that can be dispensed to satisfy withdrawals. In at least someembodiments, deposit cassettes and dispensing cassettes aresingle-direction cassettes. That is, any one cassette may either receivedeposits or dispense withdrawals but not both.

The card reader 260 allows data to be read from a card such as, forexample, a common ISO-sized ATM or cheque card. For example, the cardreader 260 may allow data to be read from magnetic stripe cards and/orchip cards. In some embodiments, the card reader 260 may require a cardto be swiped through it to be read (a so-called “swipe reader”) and/orit may allow a card to be inserted into it for reading (a so-called “dipreader”). In some embodiments, the card reader 260 may be adapted toallow inserted cards to be retained by the automated teller machine 100indefinitely (such as if fraud is suspected) and/or for the period of asession.

In at least some embodiments, the ATM 100 may include an identitydocument scanner 310 (FIG. 3 ). The identity document scanner may beused, for example, to scan an identification document for a user (whichmay also be referred to herein as an identity document). Theidentification document is a document apart from an ATM or cheque card(i.e., it is not a bank card) which is used to uniquely identify theuser. The identification document may be a government issued document.The identification document may be or include: a driver's license, ahealth card, a passport, a social insurance number, a birth certificate,a social security card, or an identification document of another type.The identity document scanner may take various forms including, forexample, a camera or a scanner. In at least some embodiments, theidentity document scanner may be provided by the card reader 260. Forexample, the card reader 260 may be configured to both read cards fromcustomers, such as bank card, and identity cards for non-customers.

FIG. 3 is a logical block diagram of the automated teller machine 100.As described above, the automated teller machine 100 may include acontroller 210, a display 220, a keypad 230, an item receiver/dispenser240, cassettes 250, and a card reader 260 as described above.Additionally, as shown in FIG. 3 , the automated teller machine 100 mayinclude an identity document scanner 310 and a communications module320.

As noted in the discussion of FIG. 2 above, the identity documentscanner 310 is adapted to scan an identity document. The identitydocument scanner 310 may use one or more of a variety of scanningtechnologies. For example, the identity document scanner 310 may be ormay employ a contact image sensor (CIS), a charge-coupled device (CCD),and/or the like.

FIG. 4 is a high-level operation diagram of an example computing device400. In some embodiments, the example computing device 400 may beexemplary of one or more of the ATM 100 (FIG. 1 ), the controller 210(FIG. 2 ), the client device 140 (FIG. 1 ) and the server system 110(FIG. 1 ). As will be discussed in greater detail below, each of theautomated teller machine 100 (FIG. 1 ) (and, potentially, the controller210 in particular), the client device 140 and the server system 110includes software that adapts it to perform a particular function.

The example computing device 400 includes a variety of modules. Forexample, as illustrated, the example computing device 400 may include aprocessor 410, a memory 420, a communications module 425 and aninput/output (I/O) module 430. As illustrated, the foregoing examplemodules of the example computing device 400 are in communication over abus 440.

The processor 410 is a hardware processor. The processor 410 may, forexample, be one or more ARM, Intel x86, PowerPC processors or the like.

The memory 420 allows data to be stored and retrieved. The memory 420may include, for example, random access memory, read-only memory, andpersistent storage. Persistent storage may be, for example, flashmemory, a solid-state drive or the like. Read-only memory and persistentstorage are each a non-transitory computer-readable storage medium. Acomputer-readable medium may be organized using a file system such asmay be administered by an operating system governing overall operationof the example computing device 400.

The I/O module 430 allows the example computing device 400 to interactwith devices such as, for example, peripherals to send and receive data.The I/O module 430 may, for example, allow the example computing device400 to interface with input devices such as, for example, keypads,keyboards, pointing devices, and the like. In another example, the I/Omodule 430 may, for example, allow the example computing device 400 tointerface with output devices such as, for example, displays, printers,and the like. In a particular example, where the example computingdevice 400 forms a part of the automated teller machine 100 (FIG. 1 )such as, for example, if the example computing device 400 is or forms apart of the controller 210 (FIG. 2 ) of the automated teller machine100, the I/O module 430 may allow the example computing device 400 tointerface with one or more of the display 220, the keypad 230, the itemreceiver/dispenser 240, the card reader 260, and/or the identitydocument scanner 310.

Software comprising instructions is executed by the processor 410 from acomputer-readable medium. For example, software may be loaded intorandom-access memory from persistent storage of the memory 420.Additionally or alternatively, instructions may be executed by theprocessor 410 directly from read-only memory of the memory 420.

The communications module 425 allows the automated teller machine 100 tocommunicate with other computing devices and/or various communicationsnetworks such as, for example, the network 120. In other words, thecommunications module 425 may allow the automated teller machine 100,the client device 140 or the server system 110 as the case may be tosend or receive communications signals. Communications signals may besent or received according to one or more protocols or according to oneor more standards. For example, the communications module 425 may allowthe computing device 400 to communicate via an Ethernet network, an ATMnetwork, a telephone network, and/or via cellular data network, such asfor example, according to one or more standards such as, for example,Global System for Mobile Communications (GSM), Code Division MultipleAccess (CDMA), Evolution Data Optimized (EVDO), Long-term Evolution(LTE) or the like. Additionally or alternatively, the communicationsmodule 425 may allow the computing device 400 to communicate usingnear-field communication (NFC), via Wi-Fi™, using Bluetooth™ or via somecombination of one or more networks or protocols.

FIG. 5 depicts a simplified organization of software components storedin the memory 420 of the example computing device 400. As illustratedthese software components include an operating system 500 andapplication software 510.

The operating system 500 is software. The operating system 500 allowsthe application software 510 to access the processor 410, the memory420, and the I/O module 430. The operating system 500 may be, forexample, UNIX™, Linux™, Microsoft™ Windows™, Apple OSX™ or the like.

The application software 510 adapts the example computing device 400, incombination with the operating system 500, to operate as a deviceperforming a particular function. For example, the application software510 may cooperate with the operating system 500 to adapt a suitableembodiment of the example computing device 400 to operate as thecontroller 210 (FIG. 2 ) of the automated teller machine 100 (FIGS. 1, 2and 3 ) or as the client device 140 (FIG. 1 ) or as the server system110 (FIG. 1 ).

Operations performed by the automated teller machine 100, the clientdevice 140 and/or the server system 110 will be described below withreference to FIG. 6 .

FIG. 6 provides a flowchart of a method 600 depicting example operationsperformed in processing a data transfer. Operations 601 and onward areperformed by one or more processors of one or more computing devices,such as, for example, the processor 410 (FIG. 4 ) of one or moresuitably configured instances of the example computing device 400 (FIG.4 ), executing software such as, for example, a suitable instance of theapplication software 510 (FIG. 5 ). In a particular example, one or moreof the operations 601 and onward may be performed by a processor of acomputer system such as the server system 110.

The method 600 may include, an operation 601 of initiating an ATMsession. ATM sessions may be initiated in various ways and the manner ofinitiation may, in at least some embodiments, depend on the nature ofthe user. For example, users having a bank account managed or maintainedby the server system 110 (such users may generally be referred to hereinas “customers”) may initiate an ATM session in a different way thanusers that do not have such an account (such users may generally bereferred to herein as “non-customers”). A user having an account that ismanaged or maintained by the server system 110 may initiate an ATMsession through insertion of a card in a card reader 260 of the ATM andthrough input of an associated credential at the ATM, such as input of aPIN via a keypad 230 of the ATM. The server system 110 may receive arepresentation of the credential from the ATM via a communicationsmodule and may also receive an indication of data received at the ATMfrom the card and may authenticate the user by determining that thecredential is valid for the card. Other authentication techniques arealso possible.

When an ATM session is initiated for a customer, the server system 110may identify an existing account associated with the customer. Theserver system may, for example, provide data to the ATM that is based onaccount data for the customer. By way of example, a balance may beprovided to the ATM.

For a non-customer (i.e., for a user not having a bank account managedor maintained by the server system 110), the ATM session may beinitiated without requiring input of the card and/or authentication. Byway of example, in some embodiments, an identity document scanner 310may be provided by the ATM 100 and initiating an ATM session may involvea user scanning an identity document using the document scanner 310.Types of identity documents are described above and identity documentsmay, for example, include government issued identity documents. The ATM100 may then send an indication of input of the identification documentat the ATM to the server system. The indication may, for example,include a photograph or scan of the identity document and/or dataextracted from the identity document. In response to receiving theindication of the input of the identification document at the ATM, theserver system may initiate an ATM session for the non-customer at theATM.

In at least some embodiments, for a non-customer, the server system 110may automatically create a temporary account for the non-customer. Thetemporary account may be created based on data obtained from theidentity document, for example. By way of example, a name, address,and/or other identifying information may be identified from the identitydocument by the server system using, for example, optical characterrecognition (OCR). In some embodiments, the information obtained fromthe identity document may be supplemented with other information aboutthe user by using the obtained information to request other associatedinformation from another server having such other associatedinformation. By way of example, a driver's license number may beextracted and used in an application programming interface (API) call toanother server which may then provide other data that is associated withthat driver's license number. The temporary account may include atemporary account balance which may be initialized with zero.

The ATM session may be initiated in other manners in other embodiments.For example, the server system and the ATM may allow deposits to be madeanonymously or semi-anonymously. Accordingly, in at least someembodiments, an ATM session may be initiated for a non-customer withoutrequiring the non-customer to scan an identification document. For ananonymous or semi-anonymous user, a temporary account may be created andmay be associated with a unique identifier. The unique identifier may,for example, be a credential such as a unique number that may begenerated by the server system using, for example, a random orpseudo-random number generator.

The ATM session, once initiated, allows the ATM to receive a deposit ofa value instrument. That is, the deposit of a value instrument may bemade by a user (which may be a customer or a non-customer as the casemay be) at the ATM 100 (FIG. 1 ). The deposit may be made throughinsertion of the value instrument(s) in an item receiver 240 of the ATM100. The ATM 100 may include a first cassette for receiving deposits ofvalue instruments and the first cassette may be coupled to the itemreceiver 240 such that the value instrument is received in the firstcassette.

The ATM may, after receiving the deposit, provide an indication of thedeposit of the value instrument to the server system 110. Accordingly,at operation 602, the server system 110 may receive, from the automatedteller machine (ATM) and via a communications module, an indication of adeposit of a value instrument.

The indication may, for example, include an image of the valueinstrument(s) and/or an indication of a deposit amount. The indicationof the deposit amount may be automatically determined (e.g., byperforming image-based or other scanning operations on the valueinstruments) by the ATM and/or may be based on user input. For example,a user may be required, as part of the deposit process, to input,through an input interface of the ATM such as the keypad 230, an amountof the deposit and the ATM may include the inputted amount in theindication.

After receiving the indication of the deposit, at operation 604, theserver system 110 saves, in memory, a retention instruction. Theretention instruction includes an associated temporal period and theretention instruction prevents withdrawal of value instrumentscorresponding to an amount of the deposit during the temporal period.The temporal period may, for example, be a hold period. The hold periodmay, in at least some embodiments, be a predetermined number of days,which may, for example, represent business days. The number of days may,for example, be sufficiently long to allow the value instruments to besubjected to further scrutiny. The number of days may be five businessdays, for example.

The retention instruction may, for example, be used to prevent theswapping of invalid currency for valid currency. For example, as notedabove, the ATM 100 may include a first cassette for receiving depositsof value instruments and a second cassette for dispensing valueinstruments. The retention instruction may, for example, preventwithdrawal of the deposit at the ATM which may, for example, prevent auser from submitting value instruments into the first cassette and thenwithdrawing other value instruments from the second cassette.

The retention instruction may be saved in association with the accountfor the user, which may be an existing account (e.g., an account for acustomer) or a temporary account (e.g., an account generated on-the-flyfor a non-customer).

In some embodiments, the server system 110 may credit an accountassociated with the user in an amount that is equal to the depositedamount. For example, an account balance associated with the user may beincreased by an amount that is equal to the amount of the deposit of thevalue instruments. The account may be the existing account in the caseof a customer or a temporary account in the case of a non-customer.

While the account may be credited based on the deposit, the retentioninstruction may act to prevent withdrawal of the deposited amount duringthe temporal period. The retention instruction may prevent a cashwithdrawal of the value instrument at any ATM and not only at the ATMwhere the deposit was made.

At operation 606, the server system 110 receives an instruction toprocess a data transfer to a recipient. The instruction to process thedata transfer to the recipient may be received at the server system 110through the communications module. The instruction to process the datatransfer to the recipient may, in at least some embodiments, be receivedfrom the ATM. For example, the ATM may provide a user interface thatallows for input of one or more configuration parameters for the datatransfer. The configuration parameters may include, for example, anidentifier of a recipient (e.g., a name or other identifier), an accountnumber or other identifier for the user with the recipient (e.g., anidentifier that is used to allow the recipient to determine the sourceof the data transfer), an amount of the data transfer and/or otherconfiguration parameters.

The configuration parameters may be configured through an inputinterface of the ATM, for example. By way of example, the ATM maycooperate with the server system to allow for selection by the user ofany one of a plurality of pre-configured recipients. That is, the serversystem may maintain a list of supported recipients and the ATM mayretrieve and display the list or a portion thereof. For example, a usermay input one or more characters describing the intended recipient andthe server system and/or the ATM may perform a search of the list ofsupported recipients based on such input and may display matches forselection by the user.

In at least some embodiments, the amount of the data transfer may notneed to be defined—the amount may be automatically configured by theserver system to the amount of the deposit. That is, if the user hasdeposited twenty dollars, then the amount of the data transfer may betwenty dollars.

The data transfer may, in at least some embodiments and for at leastsome users, represent a bill payment. The data transfer to the recipientmay access at least a portion of the deposit. That is, the data transferto the recipient may transfer value that relies upon the valueinstrument represented by the indication received at operation 602.

In at least some embodiments, non-customers may be required to inputcontact information that may be used in case of a data transfer error.The contact information may, for example, include an email address or amessaging address of another type, a telephone number, etc. If, forexample, the server system is unable to complete the data transfer forany reason, the contact information may be used to facilitate return ofthe value instruments.

At operation 608, the server system processes the data transfer to therecipient. The data transfer uses at least a portion of the deposit. Inat least some embodiments, the data transfer uses all of the deposit.The data transfer may be processed so that the data transfer to therecipient occurs during the temporal period. That is, the hold does notrestrict the data transfer in the same way that it restrictswithdrawals. Data transfers to supported recipients are permitted duringthe hold period but withdrawals are not.

In at least some embodiments, the data transfer may be configured to beperformed immediately. That is, the data transfer may be configured sothat it is performed without delay so that a recipient's account will becredited with value based on the deposit without delay. In doing so,value represented in the existing or temporary account may betransferred to an account associated with the recipient. For example,the existing or temporary account may be debited by the amount of thedata transfer and the recipient account may be credited by the sameamount (less any transaction fees). Non-customers may be required totransfer the full amount of the deposit so that the balance of thetemporary account becomes zero.

After a transfer from a temporary account is completed, the temporaryaccount may be deleted and/or disabled. In at least some embodiments,determined information, such as contact information, may be retained forat least a determined period of time following completion for use, forexample, in the case of any disputes.

The supported data transfer recipients may be required to maintainidentification data for their customers. In at least some embodiments, aserver associated with the recipient may, in response to detecting thedata transfer, identify an account to which the data transfer is to beapplied. This server may then be required to provide identification dataretrieved from the identified account to the server system. The serversystem may then store such data in association with the temporaryaccount for use in case the value instruments deposited are subsequentlyfound to be invalid.

In some instances, it may be that a data transfer is not completed aftervalue instruments have been deposited. That is, operations 602 and 604may be performed, but operation 608 may not be performed or completed.This may occur due to any one of a number of factors. For example, auser may not input configuration parameters in order to configure thedata transfer (e.g., operation 606 may not be performed). In anotherexample, the data transfer may fail because one of the configurationparameters was improperly input. In such a scenario, the user may wishto withdraw the deposit. The user may not do so immediately, since theretention instruction prevents such withdrawal. That is, the serversystem acts to prevent the withdrawal during the hold period. Instead,the user must wait until expiration of the temporal period associatedwith the retention instruction.

In some instances, when a data transfer is not completed, the serversystem may configure the ATM to print a deposit slip which includes anyone or a combination of: an address portion of a credential; a valuerepresented by the deposit; and an indication of the temporal period.For example, the deposit slip may indicate the amount deposited (e.g.,$20), the address portion of the credential (e.g., user143) and the holdperiod (e.g., “You can claim your deposit at an ATM in 5 days” or “Youcan claim your deposit at an ATM after Jan. 23, 2020”). A non-customerwishing to withdraw the deposit may use their credential (e.g., theaddress portion of the credential and the secret portion of thecredential) to authenticate themselves to an ATM (which may be the ATMon which they made the deposit or another ATM associated with the serversystem). The credential associates the user with the temporary accountand they may then withdraw the deposit after expiration of the temporalperiod.

A customer may withdraw the deposit after expiration of the temporalperiod using their card (e.g., bank card) and associated credential(e.g., PIN).

The method and process 600 described above with reference to FIG. 6 iscapable of variation. For example, in at least some embodiments, atexample of which will now be described with reference to FIG. 1 , theserver system may be configured to further prevent or attempt to preventorphaned deposits. In order to do so, in at least some embodiments, theATM may be configured to require a user to input configurationparameters for a data transfer prior to depositing the value instrument.That is, the ATM and/or the server system may be configured to onlyaccept a deposit from a non-customer if the non-customer has firstconfigured parameters for a data transfer.

Operations performed by the automated teller machine 100, the clientdevice 140 and/or the server system 110 will be described below withreference to FIG. 7 .

FIG. 7 provides a flowchart of a method 700 depicting example operationsperformed in processing a data transfer. Operations 701 and onward areperformed by one or more processors of one or more computing devices,such as, for example, the processor 410 (FIG. 4 ) of one or moresuitably configured instances of the example computing device 400 (FIG.4 ), executing software such as, for example, a suitable instance of theapplication software 510 (FIG. 5 ). In a particular example, one or moreof the operations 701 and onward may be performed by a processor of acomputer system such as the server system 110. In at least someembodiments, the operations of the method 700 may be performed by theserver system 110 in cooperation with the ATM 100.

At operation 701, the method 700 includes, initiating an ATM session.Operation 701 may be performed in the manner described above withreference to operation 601 of the method 600 of FIG. 6 .

Once the ATM session is initiated for a non-customer, the ATM mayrequire a user to configure a data transfer prior to receiving adeposit. For example, an item receiver 240 may be disabled until thenon-customer configures the data transfer.

Accordingly, at operation 702, the method may include receiving aninstruction to process a data transfer. Operation 702 may be performedin the manner described above with reference to the operation 606 of themethod 600 of FIG. 6 . For example, configuration parameters may bereceived from the ATM 100 in the manner described with reference tooperation 606.

After the instruction to process the data transfer is received, theserver system and/or the ATM may then enable the item receiver 240 atthe ATM. Then, at operation 704, the server system may receive anindication of a deposit and may optionally, at operation 706 store aretention instruction. Operations 704 and 706 may be the same or similarto operations 602 and 604 of the method 600 of FIG. 6 respectively.

At operation 708, the server system 110 may process the data transfer inthe manner described above with reference to operation 608 of the method600 of FIG. 6 .

It may be noted that, according to the method 700 of FIG. 7 , since theATM will not accept the deposit unless the data transfer has beenpreviously configured, operation 706 may have less importance than withthe method 600 of FIG. 6 . It may, however, be useful in circumstancesin which the data transfer at operation 708 fails. This may occur, forexample, if data transfer configuration parameters are inputincorrectly. In such circumstances, the retention instruction mayprevent withdrawal until after expiration of the temporal period definedby the retention instruction. As noted in the discussion of FIG. 6above, for the case of a non-customer, the credentials may be used tofacilitate such withdrawal. Customers can withdraw the value transferinstruments using their associated card (e.g., bank card) and acredential (e.g., PIN) after expiration of the temporal period.

Reference will now be made to FIG. 8 which illustrates a flowchart of afurther example method 800 depicting example operations performed inprocessing a data transfer. The method 800 of FIG. 8 is a furthervariation of the methods 600, 700 described above. According to themethod of FIG. 8 , data transfer configuration functions are separatedfrom depositing functions. For example, an ATM may be used fordepositing functions but not for data transfer configuration. Instead,data transfer configuration may be performed on a client device, such asa smartphone associated with a user. Notably, separating data transferconfiguration from deposit receipt may, for example, allow the method tobe performed with existing ATM infrastructure which may not include datatransfer configuration functionality.

Operations 802 and onward are performed by one or more processors of oneor more computing devices, such as, for example, the processor 410 (FIG.4 ) of one or more suitably configured instances of the examplecomputing device 400 (FIG. 4 ), executing software such as, for example,a suitable instance of the application software 510 (FIG. 5 ). In aparticular example, one or more of the operations 802 and onward may beperformed by a processor of a computer system such as the server system110. In at least some embodiments, the operations of the method 800 maybe performed by the server system 110 in cooperation with the ATM 100.

At operation 802, the method includes establishing a credential at ATM.The credential may be established in various ways. For example, in atleast some embodiments, the credential may be generated by the serversystem and sent to the ATM for output through an output interfaceassociated with the ATM. The credential may, in at least someembodiments, include randomly or pseudo-randomly data that may begenerated by a random number generator or pseudo-random number generatorat the ATM.

In some embodiments, the credential may include identification data forthe user. For example, an identification document may be scanned usingthe identity document scanner 310 and the identification data may beextracted or otherwise determined based on the identification document.For example, a name of the user may be used as a portion of acredential.

In some embodiments, the server system may deterministically obtain thecredential or a portion thereof based on determined data, such as datathat may be obtained from the identification document. By way ofexample, a hash may be performed based on certain identification data,such as a user's name.

In at least some embodiments, the server system may establish thecredential or a portion of the credential based on user input receivedat the ATM. For example, a user may input a PIN, passcode or other inputthrough an input interface of the ATM, such as the keypad 230, and theinputted data may be included in the credential.

The credential includes at least some uniquely identifying data that isnot used for other accounts (whether temporary or existing). Moreparticularly, an address portion of the credential may be required to beunique. The address portion of the credential may be a username,identifier, etc.

The server system may, in order to ensure uniqueness, evaluate a portionof a credential (such as a username, identifier, etc.) against anamespace for the server system. When that portion of the credential isdetermined to not be unique, the server system may automaticallydetermine a new proposed credential portion until settling on a uniqueportion.

In at least some embodiments, the credential may be a multi-partcredential. For example, the credential may include an address portion,which is the unique portion of the credential, and a secret portion. Theserver system may, for example, automatically generate the addressportion but allow a user to self-define the secret portion. The secretportion may be, for example, a passcode or PIN.

The server system may, in establishing the credential, output thecredential or a portion of the credential on an output interface of theATM. For example, an address portion of the credential may be displayedon the display 220 of the ATM and/or may be output to a printer of theATM (e.g., included on a deposit slip which may be generated afteroperation 804, which will be discussed below).

The server system may also create a temporary account for the user andassociate the credential with the temporary account. As noted in thediscussion of FIG. 6 above, temporary accounts may be initialized with abalance of zero which may then be adjusted to account for deposits madein subsequent operations of the method 800.

At operation 804, the server system receives an indication of a depositat the ATM and, at operation 806, stores a retention instruction.Operations 804 and 806 may be performed as described above with respectto the operations 602 and 604 respectively of the method 600.

In at least some embodiments, after operation 804, the ATM may print adeposit slip. The deposit slip may, for example, include arepresentation of the total value of the value instruments deposited atoperation 804. The deposit slip may also include the credential or aportion thereof. For example, an address portion of the credential maybe included. In at least some embodiments, a secret portion of thecredential (such as a user-defined PIN) may not be included.

In some embodiments, the deposit slip may include a machine-readablecode, such as a barcode. For example, a deposit slip may (afteroperation 804) be printed to include a quick response (QR) code. The QRcode may include, represent and/or be based on the credential or aportion thereof. For example, the address portion of the credential maybe included in the QR code and, in at least some embodiments, the QRcode may include, represent and/or be based on a link to a webpage orapplication that may provide a data transfer interface that may be usedto initiate a data transfer. For example, in at least some embodiments,the QR code may be scanned by a client device (e.g., using a camera) andthe QR code may cause the client device to navigate to the webpage or todownload or open the application. In at least some embodiments, thecredential may be obtained by the client device from the QR code and maybe used so that the user does not have to manually input the credentialinto the client device. For example, the link included or represented bythe QR code may pass, to the server system, the credential. The serversystem may then, for example, provide a user interface such as a webpagethat requests input of the secret portion of the credential.

The QR code may, in at least some embodiments, be displayed on a displayof the ATM instead of or in addition to being printed on the depositslip.

In other embodiments, the address portion of the credential may bemanually input to a client device. For example, the deposit slip maylist a webpage address that a user is to navigate to (e.g.,www.anonymouspay.com). The webpage address may point to a webpage thatis served by the server system. The webpage may request input of thecredential, including the address portion. The server system may thenreceive the credential and authenticate the credential (e.g., determinethat the address portion of the credential is valid and/or that thesecret portion is correct for the address portion).

Accordingly, the credential is received at the client device at anoperation 808 and is sent to the server system where it is received. Theserver system may then associate a data transfer configuration sessionwith the ATM session during which the deposit of the value instrumentwas made. The server system makes such an association based on thecredential.

Next, at an operation 810, the server system may provide, to the clientdevice (which is effectively determined to be a client device associatedwith the user having made the deposit due to the matching credentials),a data transfer interface and may initiate the data transferconfiguration session. The data transfer interface may prompt the userto input the configuration parameters for the data transfer, such as therecipient, amount, etc. Configuration parameters are discussed ingreater detail above with reference to FIG. 6 .

In at least some embodiments, the data transfer interface mayautomatically configure a data transfer amount to be equal to the totalvalue of the value instruments deposited.

Next, at an operation 812, an instruction to process a data transfer isreceived through the data transfer interface. The instruction receivedat operation 812 may be the same or similar to that received atoperation 606 of the method 600 of FIG. 6 , except that it is receivedfrom the client device, through the data transfer interface, during thedata transfer configuration session.

Next, at an operation 814, the server system processes the datatransfer. Operation 814 may be the same or similar to operation 608 ofthe method 600 of FIG. 6 .

FIG. 8 generally illustrates the operations involving the ATM asoccurring prior to the operations involving the client device. That is,at least a portion of the credential is displayed or otherwise output bythe ATM during the ATM session and input at the client device during thedata transfer configuration session. However, in other embodiments, thedata transfer configuration session may occur prior to the ATM session.That is, the credential may be established during the data transferconfiguration session (e.g., it may be determined by the server systemand provided to the client device during the data transfer configurationsession) and input to the ATM during the ATM session. It may be notedthat such an order of operations may prevent or ameliorate the orphaneddeposit problem described herein. For example, the ATM could beconfigured to only accept deposits from non-customers if they havepreviously configured a data transfer on a client device.

Example embodiments of the present application are not limited to anyparticular operating system, system architecture, mobile devicearchitecture, server architecture, or computer programming language.

It will be understood that the applications, modules, routines,processes, threads, or other software components implementing thedescribed method/process may be realized using standard computerprogramming techniques and languages. The present application is notlimited to particular processors, computer languages, computerprogramming conventions, data structures, or other such implementationdetails. Those skilled in the art will recognize that the describedprocesses may be implemented as a part of computer-executable codestored in volatile or non-volatile memory, as part of anapplication-specific integrated chip (ASIC), etc.

As noted, certain adaptations and modifications of the describedembodiments can be made. Therefore, the above discussed embodiments areconsidered to be illustrative and not restrictive.

What is claimed is:
 1. A computer system comprising: a communicationsmodule; a processor coupled to the communications module; and a memorycoupled to the processor storing instructions that, when executed by thecomputer system, cause the computer system to: receive, withoutauthentication with a user and from a computing device and via thecommunications module, an indication of a deposit by the user; save, inthe memory, a retention instruction including an associated temporalperiod, the retention instruction preventing withdrawal corresponding toan amount of the deposit; receive, via the communications module, aninstruction to process a payment to a recipient, the payment to therecipient accessing at least a portion of the deposit; and process thepayment to the recipient during the temporal period using at least theportion of the deposit.
 2. The computer system of claim 1, wherein thedeposit is provided by a user that does not maintain a bank accountaccessible to the computer system.
 3. The computer system of claim 2,wherein the computing device is configured to require the user to inputone or more configuration parameters prior to providing the deposit. 4.The computer system of claim 1, wherein the instructions further causethe computer system to: provide, to a client device associated with auser, a payment interface and initiate a payment configuration session;and associate the payment configuration session with a computing devicesession during which the deposit was made based on a credential, whereinthe instruction to process the payment to the recipient is received fromthe client device during the payment configuration session.
 5. Thecomputer system of claim 4, wherein the credential is provided to theclient device during the payment configuration session and input to thecomputing device during the computing device session.
 6. The computersystem of claim 4, wherein at least a portion of the credential isoutput by the computing device during the computing device session andwherein the credential is input at the client device during the paymentconfiguration session.
 7. The computer system of claim 6, wherein the atleast a portion of the credential is printed on a deposit slip by thecomputing device.
 8. The computer system of claim 1, wherein theinstructions further cause the computer system to: receive an indicationof input of an identification document at the computing device; andinitiate a computing device session for a non-customer at the computingdevice, the computing device session enabling the computing device toreceive the deposit.
 9. The computer system of claim 1, wherein thecomputing device includes a first cassette for receiving deposits ofvalue instruments and a second cassette for dispensing value instrumentsand wherein the retention instruction prevents withdrawal of the depositat the computing device.
 10. The computer system of claim 1, wherein thetemporal period is a hold period.
 11. A computer-implemented methodcomprising: receiving, without authentication with a user and from acomputing device, an indication of a deposit by the user; saving aretention instruction including an associated temporal period, theretention instruction preventing withdrawal corresponding to an amountof the deposit; receiving an instruction to process a payment to arecipient, the payment to the recipient accessing at least a portion ofthe deposit; and processing the payment to the recipient during thetemporal period using at least the portion of the deposit.
 12. Themethod of claim 11, wherein the deposit is provided by a user that doesnot maintain a bank account accessible to a computer system implementingthe method.
 13. The method of claim 12, wherein the computing device isconfigured to require the user to input one or more configurationparameters prior to providing the deposit.
 14. The method of claim 11,further comprising: providing, to a client device associated with auser, a payment interface and initiating a payment configurationsession; and associating the payment configuration session with acomputing device session during which the deposit was made based on acredential, wherein the instruction to process the payment to therecipient is received from the client device during the paymentconfiguration session.
 15. The method of claim 14, wherein thecredential is provided to the client device during the paymentconfiguration session and input to the computing device during thecomputing device session.
 16. The method of claim 14, wherein at least aportion of the credential is output by the computing device during thecomputing device session and wherein the credential is input at theclient device during the payment configuration session.
 17. The methodof claim 16, wherein the at least a portion of the credential is printedon a deposit slip by the computing device.
 18. The method of claim 11,further comprising: receiving an indication of input of anidentification document at the computing device; and initiating acomputing device session for a non-customer at the computing device, thecomputing device session enabling the computing device to receive thedeposit.
 19. The method of claim 11, wherein the computing deviceincludes a first cassette for receiving deposits of value instrumentsand a second cassette for dispensing value instruments and wherein theretention instruction prevents withdrawal of the deposit at thecomputing device.
 20. A non-transitory computer-readable storage mediumstoring instructions that when executed by a processor of a computersystem cause the computer system to: receive, without authenticationwith a user and from a computing device, an indication of a deposit bythe user; save a retention instruction including an associated temporalperiod, the retention instruction preventing withdrawal corresponding toan amount of the deposit; receive an instruction to process a payment toa recipient, the payment to the recipient accessing at least a portionof the deposit; and process the payment to the recipient during thetemporal period using at least the portion of the deposit.