Automated teller machine with an encrypting card reader and an encrypting pin pad

ABSTRACT

A banking system operates responsive to data read from data bearing records. The system includes an automated banking machine comprising a card reader. The card reader includes a movable read head that can read card data along a magnetic stripe of a card that was inserted long-edge first. The card reader includes a card entry gate. The gate is opened for a card that is determined to be properly oriented for data reading. The card reader can encrypt card data, including account data. The machine also includes a PIN keypad. The card reader can send encrypted card data to the keypad. The keypad can decipher the encrypted card data. The keypad can encrypt both deciphered card data and a received user PIN. The card data and the PIN are usable by the machine to authorize a user to carry out a financial transfer involving the account.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/404,617, now U.S. Pat. No. 8,540,142 that claims the benefit of U.S.Provisional Applications 61/446,744 filed Feb. 25, 2011; 61/574,594filed Aug. 5, 2011; 61/628,513 filed Nov. 1, 2011; and 61/629,900 filedNov. 30, 2011.

The disclosures of each of these applications are herein incorporated byreference in their entirety.

TECHNICAL FIELD

This invention relates to apparatus controlled responsive to data readfrom data bearing records to cause financial transfers, which isclassifiable in U.S. class 235, subclass 379.

BACKGROUND OF INVENTION

Automated banking machines may include a card reader that operates toread data from a bearer record such as a user card. The automatedbanking machine may operate to cause the data read from the card to becompared with other computer stored data related to authorized bearersand/or financial accounts. The machine operates in response to thecomparison determining that the bearer is an authorized system user tocarry out at least one transaction which is operative to transfer valueto or from at least one account. A record of the transaction is alsocommonly printed through operation of the automated banking machine andprovided to the user. A common type of automated banking machine used byconsumers is an automated teller machine which enables customers tocarry out banking transactions. Banking transactions carried out mayinclude the dispensing of cash, the making of deposits, the transfer offunds between accounts and account balance inquiries. The types ofbanking transactions a customer can carry out are determined by thecapabilities of the particular banking machine and the programming ofthe institution operating the machine.

Other types of automated banking machines may be operated by merchantsto carry out commercial transactions. These transactions may include,for example, the acceptance of deposit bags, the receipt of checks orother financial instruments, the dispensing of roiled coin or othertransactions required by merchants. Still other types of automatedbanking machines may be used by service providers in a transactionenvironment such as at a bank to carry out financial transactions. Suchtransactions may include for example, the counting and storage ofcurrency notes or other financial instrument sheets, the dispensing ofnotes or other sheets, the imaging of checks or other financialinstruments, and other types of service provider transactions. Forpurposes of this disclosure an automated banking machine or an automatedteller machine (ATM) shall be deemed to include any machine that may beused to electronically carry out transactions involving transfers ofvalue.

Automated banking machines may benefit from improvements.

OBJECTS OF EXEMPLARY EMBODIMENTS

It is an object of an exemplary arrangement to provide an automatedbanking machine.

It is a further object of an exemplary arrangement to provide anautomated banking machine with an improved card data reader arrangement.

It is a further object of an exemplary arrangement to provideimprovements to card readers used in automated banking machines.

It is a further object of an exemplary arrangement to enable cardreaders to be readily installed in existing automated banking machinesto increase the machine's functionality.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a card data reader that requires lessservice.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a card data reader that requires lessfascia space.

It is a further object of an exemplary arrangement to provide anautomated banking machine that is capable of reading user card data in acontactless manner.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a contactless card data reader.

It is a further object of an exemplary arrangement to provide a methodof reading bank card data with an automated banking machine.

It is a further object of an exemplary arrangement to provide a methodfor upgrading an existing machine to provide for improved card datareading.

Further objects of exemplary arrangements will be made apparent in thefollowing Detailed Description of Exemplary Embodiments and the appendedclaims.

A popular brand of automated banking machine is manufactured by Diebold,Incorporated. Such automated banking machines are capable of receivingtherein a banking card from a user of the machine. The card can haveuser information such as an account number encoded in a magnetic stripeon the card. A machine card reader is capable of reading the magneticstripe. The information may correspond to a user's personalidentification number (PIN). The user generally can enter the PINthrough use of a machine keypad. The machine operates either by itselfor in conjunction with one or more connected systems to determinewhether the keypad-entered PIN corresponds to the card-entered data.Upon determination that the PIN and card data correspond, the user canbe authorized to carry out one or more transactions with the machine.Such a transaction may include dispensing cash such as currency notes tothe machine user.

Magnetic stripe cards can have the problem of wearing out. Magneticstripe cards are also susceptible to being duplicated or reproduced byunauthorized persons. The contact head of a contact type card reader canbe subject to excessive dirt accumulation or wear due to physicalcontact with cards. These conditions present the increased potential forfraud and/or requiring card reader maintenance which may place anautomated banking machine out of service. The location and spacerequired by a contact type card reader can also limit a machine frompresenting additional banking features to a user.

The foregoing objects can be accomplished in an exemplary arrangement byproviding an automated banking machine with a contactless card datareader. A contactless card reader may be installed in new automatedbanking machines or in existing machines without further substantialmodifications to the machines. Security risks may be reduced. As serviceissues could be reduced without the wear due to card reader head/cardcontact, use of a contactless card reader enables enhanced machinereliability at a modest cost.

A Radio Frequency Identification (RFID) card and RFID card readerarrangement can be used instead of, or as an adjunct to, a conventionalcard and contact type card reader arrangement. A card data image andimage reader arrangement can also be used.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a side schematic view of an automated banking machine.

FIG. 2 shows a front view of the automated banking machine of FIG. 1.

FIG. 3 shows an alternative fascia of an automated banking machine.

FIG. 4 shows a card including an RFID tag.

FIG. 5 shows an alternative RFID card.

FIG. 6 shows a side view of an automated banking machine drive-thruarrangement.

FIG. 7 shows a top view of an automated banking machine drive-thruarrangement.

FIG. 8 shows a facility having plural RFID tag reading devices.

FIG. 9 shows an automated banking machine having a dual use card readerslot.

FIG. 10 shows an RFID reader is positioned adjacent to a magnetic stripereader.

FIG. 11 shows an interior portion of an automated banking machine withcomponents arranged in wireless communication.

FIG. 12 shows an automated transaction machine and host arrangement,with the machine having card data image reading capabilities.

FIG. 13 shows a mobile device having image display capabilities, withthe image including card data.

FIG. 14 shows a relationship among a customer, an automated bankingmachine having electronic card data handling capability, and a host.

FIG. 15 shows the orientation of a magnetic stripe card that is beinginserted into a card slot of an exemplary card reader arrangement.

FIG. 16 shows the card of FIG. 15 inserted in the slot at a positionthat is adjacent to a movable magnetic read head of the exemplary cardreader arrangement.

FIG. 17 shows an alternative mounting arrangement for a movable magneticread head in an exemplary card reader arrangement.

FIG. 18 shows an angled view of a card in a card slot of an exemplaryuser fascia portion.

FIG. 19 shows a card reader housing located adjacent to the fasciaportion of FIG. 18.

FIG. 20 shows a smart card inserted into a card slot of another anexemplary card reader arrangement.

FIG. 21 shows a card reader arrangement having dual read heads.

FIG. 22 shows an exemplary embodiment of a card reader arrangement foran automated transaction machine.

FIG. 23 shows a front view of a portion taken along A-A of the cardreader arrangement in FIG. 22.

FIG. 24 shows a side view taken along B-B of the card reader arrangementin FIG. 22.

FIG. 25 shows an arrangement comprising a hermetically sealed read head.

FIG. 26 shows a read head associated with an impedance change detector.

FIG. 27 shows a transparent cover positioned above a card carrier.

FIG. 28 shows another exemplary card reader arrangement comprising asubstantially flat area on which a user card is to be placed so its carddata can be read.

FIG. 29 shows an unsecured card freely resting on the card supportingflat area.

FIG. 30 shows a card securely held by holding members in a card readingposition.

FIG. 31 shows the card holding member having a substantially L-shape.

FIG. 32 shows a card holding member having a substantially V-shapedentry slot.

FIG. 33 depicts side view movement of a card support door while the cardis held by card holding members.

FIG. 34 shows an arrangement for cleaning a read head.

FIG. 35 shows a side view of the arrangement in FIG. 34.

FIG. 36 shows a card reader wiper arrangement.

FIG. 37 shows the cleaning motion of a flexible wiper arm.

FIG. 38 shows an exemplary wiper comprising plural wiper arms.

FIG. 39 shows another a wiper arrangement which comprises rows of wiperarms supported by a common rack.

FIG. 40 shows a wiper that moves in a curved cleaning motion.

FIG. 41 shows spring loaded, movable read head assembly.

FIG. 42 shows a wiper having a plastic guide member.

FIG. 43 shows a wiper that includes a guide member and plural wiperarms.

FIG. 44 shows a wiper vibrator arrangement.

FIG. 45 shows a wiper arm that includes a test signal emitter.

FIG. 46 shows a card reader with a card entry slot which can be blockedby a shutter.

FIG. 46A shows an arrangement for sensing a card adjacent to a cardreader module.

FIG. 46B shows another card reader module arrangement for sensing acard.

FIG. 46C shows a further card reader module arrangement for sensing acard.

FIG. 46D shows a further arrangement for card sensing by a card readermodule.

FIG. 47 shows a user fascia with sensors adjacent a card entry slot.

FIG. 48 shows a movable read head assembly that includes a circuitboard.

FIG. 49 shows another arrangement of a movable read head assembly.

FIG. 50 shows an exemplary drive arrangement for a read head assembly.

FIG. 51 shows a driven arm moved a first distance by the arrangement ofFIG. 50.

FIG. 52 shows the driven arm of FIG. 51 moved a further distance by thedrive arrangement of FIG. 50.

FIG. 53 shows an exemplary communication path between a card reader andan encrypting/decrypting device, such as an encrypting PIN pad (EPP).

FIG. 54 shows another exemplary communication path between a card readerand EPP.

FIG. 55 shows a further exemplary communication path between a cardreader and EPP.

FIG. 56 is an automated banking machine arrangement that includes anencrypting card reader in operative connection with an encryptingkeypad.

FIG. 57 is a schematic bottom view of a card moving mechanism thatincludes rotatable balls.

FIG. 58 is a schematic sectional side view of the mechanism shown inFIG. 57.

FIG. 59 shows an exemplary machine arrangement in which a user card isproperly positioned to be both read by a read head assembly and viewedby a user of the machine.

FIG. 60 shows a top view of the card and stops that are shown in FIG.59.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1 there is showntherein an automated transaction machine (e.g., automated bankingmachine), generally indicated by numeral 10, used in connection withexemplary embodiments to carry out transactions. A banking system thatis controlled at least in part by data bearing records includes theautomated banking machine 10. The automated banking machine 10 can be aself-service machine, such as an automated teller machine (ATM). Theautomated banking machine can include one or more cash dispensers. Acash dispenser includes one or more mechanisms that operate toselectively dispense cash stored within the machine to users of themachine. The automated banking machine 10 includes a fascia 12 whichserves as a user interface (or a customer interface).

The automated banking machine 10 includes a housing 14 which housescertain components of the machine. The components of the machine caninclude input and output devices. The input devices may include a readerdevice schematically indicated 16. The reader device is operative toread data bearing records presented by machine users. Such records caninclude data corresponding to at least one of the associated user, oneor more user financial accounts, and/or other data. In an exemplaryarrangement the reader device 16 comprises a card reader that isoperative to read data included on a customer's card. An exemplary cardcan include information about the customer thereon or therein, such asthe customer's name, account number, and/or other data.

A card reader may comprise a magnetic stripe card reader which is ableto read data from magnetic stripes of cards. However, in an exemplaryembodiment the card reader is operative to read data from other types ofcards or records, such as contactless cards. For example, the cardreader 16 may comprise a contactless card reader. Such a card reader maybe operative to read data on RFID cards. Of course, these approaches areexemplary.

The fascia can include a keypad 18, function keys 20, display 22,receipt outlet slot 24, mini account statement outlet 26, document(e.g., cash) withdrawal opening 28, document deposit opening 30, and awriting shelf 32. It should be understood that these transactionfunction devices and features of the described automated banking machineuser interface are exemplary and in other embodiments the user interfacemay include different components and/or features and/or arrangements.

FIG. 2 shows a front view of the automated banking machine 10 of FIG. 1.The keypad 18 can include a plurality of input keys which may bemanually actuated by a customer to provide manual inputs to the machine.The function keys 20 can be used to permit a customer to respond toscreen prompts.

The display 22 is viewable by an operator of the machine. The displayenables outputs through a display screen. The display may also enableinputs through the display screen. Thus, the display can be a displaytype that enables both outputs and inputs. Therefore, the display can beboth an input device and an output device. For example, the display 22may be a touch screen display which enables outputs through displays onthe screen and enables customers to provide inputs by placing a fingeradjacent to areas of the screen. A combined input and output device,such as a touch screen display, can provide outputs to a user as well asreceiving inputs from the user. The display 22 may include an LCD,plasma, CRT or other display type that is capable of providing visibleindicia, such as still images or moving video, to a customer.

It should be understood that in various arrangements other types ofinput devices may be used, such as biometric readers that may beoperative to receive customer identifying inputs such as fingerprints,iris scans, retina scans, and face topography data that provide datathat is usable to identify a user. Combinations of devices (readers,sensors, detectors, etc.) can be used in identifying a machine userand/or authorizing a machine user to carry out a transaction (e.g., acash dispense transaction). One or more camera devices may also be usedto serve as input devices for biometric features and the like. Otherinput devices such as speech or voice recognition devices, facialrecognition arrangements, inductance type readers, IR type readers, andother types of devices which are capable of receiving information thatidentifies (or can be used to identify) a customer and/or their accountmay also be used. An example of an automated banking machine that usesbiometric input devices and other types of input devices is shown inU.S. Pat. No. 6,023,688, the disclosure of which is herein incorporatedby reference in its entirety.

Further output devices associated with the exemplary user interface caninclude a speaker. A headphone jack can also be used to serve as anoutput device. A headphone jack may be connected to a headphone providedby a user who is visually impaired to provide the user with voiceguidance in the operation of the machine. Alternatively, the machine 10may provide a headphone for a customer.

The automated banking machine 10 may also include a receipt printerwhich is operative to provide users of the machine with receiptsreflecting transactions conducted at the machine. A printer device canbe used that is operative to print receipts. Transaction receipts may beprovided to users through a receipt delivery slot extending through afascia portion. Exemplary receipt printers that may be used in someembodiments are shown in U.S. Pat. No. 5,729,379 and U.S. Pat. No.5,850,075. the disclosures of which are herein incorporated by referencein their entirety.

Exemplary embodiments may also include other types of printingmechanisms such as statement printer mechanisms, ticket printingmechanisms, check printing mechanisms, and other devices that operate toapply indicia to media in the course of performing transactions carriedout with the machine.

In other embodiments, output devices may include devices such as audiospeakers, IR transmitters, or other types of devices that are capable ofproviding outputs which may be perceived by a user either directly orthrough use of a computing device, article, or machine. Exemplaryautomated banking machine features and systems which may be used invarious embodiments are further shown in U.S. Pat. Nos. 6,705,517;6,682,068; 6,672,505; 6,598,023; 7,156,295; 7,306,142; 7,314,163;7,316,349; 7,322,481; 7,322,517; 7,333,954; and 7,337,955, thedisclosures of each of which are incorporated herein by reference intheir entirety.

The machine 10 can also include a deposit acceptance area. The depositacceptance area is an area through which deposits or deposit documents,such as deposit envelopes, to be deposited by users can be placed intothe machine. The deposit acceptance area can include the documentdeposit opening 30. The deposit opening 30 is in operative connectionwith a deposit accepting device positioned in a secure chest area of themachine. Exemplary types of deposit accepting devices are shown in U.S.Pat. No. 4,884,769 and U.S. Pat. No. 4,597,330, the disclosures of whichare herein incorporated by reference.

It should be understood that these input and output devices of the userinterface are exemplary and in other embodiments, other or differentinput and output devices may be used.

The automated banking machine 10 can include one or more internalcomputers, which may be alternatively referred to herein as controllers.These internal computers can include one or more processors. Theseprocessors may be in operative connection with one or more data stores.In some embodiments, processors can be located on certain devices withinthe automated banking machine so as to individually control theoperation thereof. Examples such as multi-tiered processor systems areshown in U.S. Pat. No. 6,264,101 and U.S. Pat. No. 6,131,809, thedisclosures of which are herein incorporated by reference.

In an exemplary arrangement to conduct transactions, the machine 10 cancommunicate with one or more computers remotely located from themachine. These remote computers are operative to exchange messages withthe machine. For example, the remote computers may be used to authorizeand record the occurrence of various transactions.

The machine 10 may communicate through a network with a transactionhost, such as a bank or financial transaction entity. The host has atleast one computer which is operative to exchange messages with themachine. For example, a bank may receive one or more messages from themachine requesting authorization to allow a customer to withdraw $200from the customer's account. A computer at the bank can operate todetermine that such a withdrawal is authorized. The computer, or anothercomputer affiliated therewith, can then return one or more messages tothe machine through the network authorizing the machine to allow thewithdrawal transaction.

In an exemplary embodiment, at least one processor in the machine 10 isoperative to cause the communication of data corresponding to data readfrom a user's card. The read card data can be sent from the machine to aremote (bank) computer as part of one or more messages. The machine mayalso communicate other data corresponding to user inputs to the remotecomputer, such as a personal identification number (PIN), a primaryaccount number (PAN), and/or transaction request data. The remotecomputer can operate to compare the data corresponding to card dataand/or PIN data to stored data, which corresponds to authorized users,in at least one data store associated with the remote computer.Responsive to the data corresponding to an authorized user and apermissible transaction request, the remote computer can communicate atleast one message to the machine which corresponds to authorization tocarry out the requested transaction.

After the machine 10 conducts the functions to accomplish a transaction,such as dispensing cash, the machine can send one or more messages backthrough the network to the bank indicating that the transaction wassuccessfully carried out. Of course, these message types are merelyexemplary and other transaction messages may be used.

It should be understood that in some embodiments the machine 10 maycommunicate with other entities and through various networks. Forexample, in an exemplary embodiment the machine can communicate withcomputers operated by machine service providers. Such service providersmay comprise entities which are to be notified of status conditions ormalfunctions of the machine, as well as entities who are to be notifiedof corrective actions. A service provider may be able to service amalfunctioning machine. An example of such a system for accomplishingthis is shown in U.S. Pat. No. 5,984,178, the disclosure of which isherein incorporated by reference.

Other third parties may also receive notifications from the machine 10.These other parties may include entities responsible for deliveringcurrency to the machine to ensure that the currency supplies in themachine do not become depleted. Further entities may be responsible forremoving deposited items from the machine.

Additional entities may be notified of actions at the machine. Theseadditional entities may include entities which hold marketing dataconcerning consumers and who provide messages which correspond tomarketing messages (e.g., advertisements) to be presented to consumers.These additional entities may also be able to communicate with themachine 10 to provide marketing messages to machine users.

Various types of messages may be provided to remote systems and entitiesby the machine depending on the capabilities of the machines in variousembodiments and the types of transactions being conducted. Furthermore,machine communication with the various entities can be separate andindependent of any machine communication with the transaction host. Thatis, communication may occur (directly) between the machine and a thirdparty without involving the transaction host. Thus, the machine 10 cankeep non financial transaction communication separated from financialtransaction communication. The two (or more) open communication pathscan also be operated independently simultaneously, with no pathcontingent on another.

In an exemplary embodiment discussed in more detail herein, an automatedbanking machine may use contactless reading devices or arrangements ortechniques to obtain information from or about a customer. Anon-contacting card reading device can be used. Unlike conventionalcontact type card reading which involves physical contact, the exemplaryembodiments permit card reading to occur without requiring physicalcontact between the card reading device and the card.

For example, a customer bank card may include an indicator member ordevice such as a non-contact transponder to communicate with theautomated banking machine. Radio frequency (e.g., radio waves) can beone manner in which to communicate in a non-contact relationship, e.g.,communication not based on physical contact. Radio frequency (RF) typereaders and/or RF transmitters can be used. Other types of remotecommunication may also be used.

A customer bank card can have one or more radio frequency identification(RFID) tags (or devices or indicator members). RFID tags may also bereferred to as “smart labels.” The tags can contain data indicative orreflective of customer information. RFID tags may operate on the RFbackscatter principle. Data communication can occur between an RFID tagand a card reader 16 of an automated banking machine. An RFID reader canbe arranged to interrogate the RFID tag to obtain information therefrom.RFID readers may also be referred to as “interrogators.”

In exemplary embodiments, an RFID tag may be of a type that does notneed a power source (e.g., battery), but operates based on RF energyprovided by a reader. A tag may also have an internal antenna embeddedin an RFID chip. An RFID reader can be equipped with the power necessaryto activate the chip and receive the stored information therefrom. TheRFID tags and readers discussed herein may have RFID Industry Standardsdeveloped by ANSI (American National Standards Institute) or theInternational Standards Organization (ISO) or other standard developingorganizations. For purposes of this disclosure, an RFID tag will beconsidered to include any device which provides data output via RFsignals, whether separate from or integral with another article, such asfor example, a card.

A customer bank card in an exemplary embodiment may include informationin non-contact RFID tags instead of or in addition to information inmagnetic stripes and/or information in a programmable memory of a smartcard. That is, magnetic stripe (or magnetic strip) cards and smart cardsmay further include customer RFID tags. One or more tags may beremovably attached or mounted to a card (e.g., thereon or therein).Alternatively, tags may be permanently affixed to a card, such asembedded in a (plastic) portion of a card.

In an exemplary embodiment, an RFID tag is operative to storeinformation therein representative of or corresponding to a customer,such as the customer's account number, PIN. name, primary bank,affiliated banks, and/or preferences. In an exemplary embodiment, tagscan contain much more customer-related data than can be represented by amagnetic stripe (or magnetic strip) type of arrangement. For example,tags may also contain information reflective of additional securityfeatures, customer profile data, card age, display preferences, etc. Atag may also carry a unique customer identification number of 32 bits orlonger. In the exemplary embodiment tags enable a card to store a cardto store more information in a smaller space in comparison to prior artmagnetic stripe cards.

RFID tags do not require physical contact (e.g., mechanical orelectrical contact) with a card reader component. In an exemplaryembodiment a customer can pass or wave their card adjacent to or over acard scanning area 36 associated with the card reader device 16 to havethe card data (and user information) remotely read. The scanning area 36can comprise a surface area of the automated banking machine fascia. Acard reader and an RFID card can be remotely (and wirelessly) separatedduring reading of the card. The contactless arrangement can preventdamage or deterioration (such as dirt accumulation, wear and tear) to acard reader, and may further reduce machine down time associated withmaintenance and service. In an exemplary embodiment RFID cards are moredifficult to counterfeit in comparison to prior art magnetic stripecards.

In exemplary embodiments, RFID tags can have read-only or rewritablememory for storage of customer information. RFID tags can have a memorywhich can be changed or modified by authorized personnel or devices. Thetag memory may be programmable. For example, an employee or machineassociated with a bank may have a device operative to communicate withan RFID tag to change and/or insert data contained therein. A hand-heldRFID tag communication device can be used. An automated banking machinecan incorporate a device for changing RFID data. For example,communication between an automated banking machine and a machine user'sRFID card may occur, such as during an automated banking machinetransaction (e.g., cash withdrawal transaction).

Alternatively, a tag may have unchangeable data. In such alternativesituations, a combination of plural read-only tags may need to beassigned or attached to a particular card to fully represent itsinformation content. A card may also have a combination of read-only andprogrammable tags.

An RFID reader device of an exemplary automated banking machine can beequipped to remotely read a user card. The reader is operative to readcard data while the card is not in physical contact relationship withthe machine. Thus, a card can be spaced from the card reader deviceduring card reading. For example, a card reader device can be arrangedto read RFID card data as a customer passes their card adjacent to acard scanning area associated with the card reader device. It followsthat communication between a bank card and an automated banking machinecard reader can occur without physical contact, which would occur withthe use of conventional contact type (e.g., magnetic stripe) cardreaders.

Because the physical aspects of a through-the-fascia portion of acontact type card reader interface can be avoided, the service and/orreliability issues for an RFID card reader compared to other contacttype readers can be reduced and/or eliminated. Also, the wear ofcomponents (e.g., contact read head, mechanical card transports, andcard sensors) associated with conventional contact type card readers canbe eliminated. Furthermore, wear to a user's card can also be reduced.

In an exemplary embodiment, when a card having an RFID tag is withinrange of an automated banking machine card reader, the reader devicecircuitry of the card reader can interrogate the tag to receiveinformation corresponding to the particular card/user. The readercircuitry may comprise a circuit card assembly. The informationexchanged between a card RFID tag and a card reader may be encrypted toprovide additional security. Thus, a card reader, RFID data from thecard, and/or an associated device may comprise a decoder in decodingcircuitry.

The use of RFID reader technology permits an automated banking machineto have a card reader located at a previously unacceptable position. Thephysical space of an RFID card reader and any RFID card reader interface(e.g., card scanning area) can be located at an area of the fasciadifferent from the area previously required for a contact type cardreader. Also, in some embodiments all or a portion of the RFID cardreader device can be remotely mounted adjacent to the automated bankingmachine. That is, an RFID card reader device need not be mounted on thefascia or the machine, but may be disposed from the machine. An RFIDcard reader device can be positioned so as to free up fascia space foradditional transaction devices, thus increasing a machine'sfunctionality. The freed up space allows other devices to be added tothe valuable customer access area. For example, the additional fasciaspace may be used for installation of a cash acceptor, a stampdispenser, check acceptor and/or an event ticket printer. Alternatively,in some embodiments the ability to eliminate the conventional cardreader on the fascia can be used to produce more compact machines and/oruser interfaces.

FIG. 3 shows an automated banking machine 40 similar to the automatedbanking machine of FIG. 1. However, the machine fascia 48 is shown withan RFID card reader 42, stamp dispenser 44, and a stamp dispenser outlet46. In comparing FIGS. 2 and 3, the fascia area previously assigned to acard reader (FIG. 2) is now allocated to a stamp dispenser (FIG. 3). Thecard reader location was allocated to a lower part of the fascia (FIG.3).

The ability to use an RFID card reader permits an additional transactiondevice (e.g., stamp dispenser) to be used at a valuable fascia locationinstead of a contact type card reader. That is, the space previouslyneeded for a contact type card reader can now be used by an additionaltransaction device, such as a stamp dispenser. Likewise, the ability torelocate an existing RFID card reader can, also permit use (orrelocation) of additional transaction devices. Thus, the use of anon-contact transaction device(s) (e.g., RFID card reader) enables awide assortment of transaction device arrangements to be implementedwith regard to user interface ergonomics.

FIG. 4 shows a card 50 having an RFID tag 52 embedded therein. The RFIDcard 50 may also contain conventional card markings and indicia (e.g.,raised numbers/letters) thereon. The card may be similar to aconventional automated banking machine banking card or other debit orcredit card, except having an RFID tag instead of or in addition to amagnetic stripe.

FIG. 5 shows an RFID card 60 having an RFID tag 62 thereon and a keyhole 64. In an exemplary embodiment, a user card only needs to be of asize large enough to hold an RFID data tag (or tags). In comparison toconventional automated banking machine cards, the size of an RFIDmachine card can be reduced. For example, an RFID card (as shown in FIG.5) may be of a size enabling its attachment to a key chain.

A card may have more than one RFID tag. The tags may be of differentsizes and include different information. A card may have one or moretags embedded therein and/or one or more tags thereon.

The exemplary RFID cards 50, 60 are usable with the automated bankingmachines 10, 40 having the RFID card reader devices 16, 42. In such usethere may be no need for a customer to insert their RFID card into anautomated banking machine. Nor does the machine need a card entry slot.Because the user card is not inserted into the machine, the card cannotbe “lost” in a fascia opening (e.g., card entry slot) or the machine.User stress related to fear that their card will not be returned by themachine can be eliminated. Potential users previously reluctant to usean automated banking machine because of such fear can now use such amachine without the worry of their card being lost in or captured by themachine. Thus, an automated banking machine using an RFID card/cardreader arrangement can be more user friendly. Because an automatedbanking machine card can remain with the user at all times, thearrangement can also reduce or eliminate fraudulent schemes to trap acard or skim card data. Thus, an automated banking machine using an RFIDcard/card reader arrangement can also provide enhanced security.

The use of an RFID tag arrangement can permit quicker automated bankingmachine response time. For example, an automated banking machine canautomatically read the tag information, process the information, andprompt the user by name to enter a PIN number. The time previouslynecessary for the user to correctly insert their card into the machineand have the card transported to/from the (contact type) card reader canbe eliminated. The use of an RFID tag and RFID tag reader arrangementcan reduce the average time a user spends at an automated bankingmachine. Thus, an automated banking machine equipped to read an RFIDdata tag can increase usage efficiency of the machine.

In other exemplary arrangements an automated banking machine card(banking card) can have an RFID tag with a programmable memory. The tagmemory is able to store data corresponding to one or more recent accounttransactions. The automated banking machines have a writer device forupdating the card's tag memory with the latest transaction data (e.g.,bank name, cash withdrawal amount, and date). The writer may be part ofa combined RFID tag reader/writer device. The transaction data can actas a transaction receipt or a series of receipts. The card owner mayhave a (personal) computer that can wirelessly read the RFID tag toobtain the transaction data from the card memory. The computer can havethe transaction data automatically downloaded into a home financialcomputer program, such as Quicken™. The financial program can apply thetransaction data to update the user's account. The machine writer devicecan supplement or overwrite the data stored in tag memory. If necessary,the card owner can erase the tag memory after reading the data throughoperation of their home computer.

In other arrangements which are described in more detail hereinafter,the transaction data in the RFID tag can be automatically read from adistance. For example. a card memory may be read without its removalfrom its stored location (e.g., a user's wallet or purse). A user mayhave a smart house in which the RFID memory data can be read by a tagreader and automatically delivered to the user's PC for input to afinancial computer program. The structure of a smart house may enablethe card memory data to be read upon the owner (with the card) enteringthe house, and then load the transaction data into the financialprogram. In alternative embodiments this can be done with a readerattached to the PC and the user bringing the card adjacent the reader atan appropriate time during operation of the financial program.

An automated banking machine RFID data tag may also be inserted onto (orcombined with) a typically non-automated banking machine card (e.g.,merchant charge card, ID card, drivers license, library card, etc.). Thehiding of automated banking machine information in a typicallynon-machine card can increase the level of user information security.

Other arrangements can have an automated banking machine RFID data tagon a multi-use card having plural distinct RFID tags. For example, thesame card may have several RFID tags, each only usable for a specificpurpose. One tag can be an automated banking machine tag which isreadable by a machine, whereas another tag is a fuel purchase tagreadable by a fuel pump, whereas a further tag is a credit card tag.Also, a multi-use card may have a generic RFID data tag which isreadable by a plurality of RFID reading devices. The generic RFID datatag can include information which can be used in conjunction with dataprovided by or stored in one or more other tags on the multi-use card.

In certain exemplary RFID card reader arrangements an RFID card can beremotely read without the need to wave or place the card adjacent to orin close proximity of a machine card reader. For example, an RFID cardreader can have an increased (e.g., in power) reading range capable ofreading an RFID card while the card is still in a wallet/purse.

In alternative arrangements the automated banking machine RFID data tagneed not be on/in a card, but may be associated. with a non-card item.For example, an RFID tag may be associated with a wallet or purse. Thetag could be embedded in the wallet. Other items such as eye glasses,keys, and clothing may also be used to hold (or hide) an RFID tag. Thetag may be positioned at any location associated with a customer thatenables its reading thereof by an RFID tag reader associated with anautomated banking machine.

A vehicle (e.g., an automobile) may also be equipped with an automatedbanking machine RFID data tag. The RFID tag may be positioned on theauto at any location enabling its reading by an appropriately placedRFID reading device of the machine. For example, an RFID reading devicemay be situated to read a tag positioned on a window, mirror (e.g., rearview mirror), or license plate of an auto. The machine can automaticallyread the tag information as the auto is approaching the user fascia,process the information, and prompt the user by name to enter a PINnumber. That is, the speed of one or more computers associated with anautomated banking machine may be able to present a welcome displayscreen to a particular named customer prior to (or simultaneously with)that customer actually arriving (or stopping or parking) at the machine.The use of a RFID data tag on an auto can enhance speed and efficiencyof drive-thru automated banking machine banking.

FIG. 6 shows a side view of an exemplary automated banking machinedrive-thru arrangement 70. An automated banking machine 74, RFID readingdevices 76, 78, and a wall 77 are also shown. FIG. 7 shows a top view ofthe arrangement of FIG. 6 with the addition of a vehicle 80 in adrive-thru lane 72. The vehicle 80 is approaching the machine 74. Thereading devices 76, 78 are operative to respectively read an RFID taglocated in a front or rear view of the vehicle. The reading device 76 ispositioned to read a tag from the rear of the vehicle, whereas thereading device 78 is positioned to read a tag from the front of thevehicle. The reading devices are in connection (e.g., wire or wirelessconnection) with the automated banking machine to provide informationthereto.

In other exemplary embodiments, an automated banking machine is able torecognize and prioritize a plurality of customers in a queue via(automatic) reading of their machine RFID tags. The automated bankingmachine can create a temporary memory list of users currently awaitingaccess to the machine. The memory can be stored in a first in first out(FIFO) method. The RFID reader of the machine can be equipped toautomatically read all machine RFID tags within a predetermined distanceof the reader/machine. For example, the reader may be arranged to obtain(and provide to an machine processor) information on all users in aqueue within ten (or twenty) feet of the machine.

This information can be used to determine personalized presentations tobe made to the particular user once they reach the automated bankingmachine. This may be done in a manner like that shown in U.S. Pat. No.7,039,600, the disclosure of which is incorporated herein. Alternativelyor in addition, the reader may be arranged to obtain information on apredetermined number of users. For example, machine memory may onlyconcurrently hold information on three users. An automated bankingmachine may also periodically scan for potential users to update theuser queue memory. A machine can be programmed to provide a specialdisplay message (e.g., apology, discount information) or dispense acoupon to a user who has waited a predetermined amount of time. Otheritems or services, either through machine display or through machinedispensing, may also be provided to customers that had a lengthy wait.Such other items or services may further include credits, rebates,tickets, refinance discount, free car wash, currency, special offer, orother form of benefit.

An automated banking machine may also have a user option of canceling a(wrong-named) user who has left the queue subsequent to the latest queueupdate. That is, if the welcome display screen (which can refer to aparticular user name) presented to a user corresponds to the wrong user(e.g., a user who has left the queue without detection by the machine),then the user who currently has access to machine can notify the machineof the situation. For example, the display screen may have an initialuser message welcoming a specific user along with a smaller message suchas “if you are not the named user then please press the exit button.” ifthe exit button is activated, then the automated banking machine is ableto quickly change the welcome screen to the user next listed in thequeue memory. In some embodiments the queue data may be rechecked by themachine scanning for signals of cards in proximity to the machine. Thus,if the RFID signal associated with a particular user is no longersensed, that user may be eliminated from the queue in machine memory.One or more machine computers in operative connection with one or moreRFID tag readers can maintain the queue data in real time.

The ability of an automated banking machine to recognize and prioritizea plurality of customers can permit a facility to offer additionalcustomer amenities. A prioritizing automated banking machine can beequipped with speakers and a speech program to enable the machine toannounce the name of the next customer granted access to the machine. Ofcourse other features may be used to anonymously identify the nextcustomer. For example, a customer may have the option of selecting apersonalized announcement number uniquely corresponding to their card.

A customer waiting area may be provided with seats (e.g., chairs) ortables enabling customers to sit and relax (or perform work) while theytemporarily wait. The waiting area may also have a wall mounted displayscreen that is viewable to the entire waiting area. The automatedbanking machine can display the name and/or picture of the next customeron the screen. Other methods of notifying the next machine user can alsobe used. For example, the machine (or the machine's network host) maynotify the user via a page or phone call to a cell phone. In otherarrangements the waiting area may have computers providing (free) accessto the Internet. The automated banking machine can proclaim the nextuser via the provided Internet computer. In still other arrangements themachine can notify the next user via their hand-held personal device(e.g., PDA, laptop computer, etc.). Alternative manners of prioritizingmachine usage may take into consideration other factors about thecustomer. For example, a machine (or host computer) affiliated with acasino may identify a customer as special (e.g., a “high roller”) andgrant priority access thereto over other casino customers.

In other exemplary embodiments a prioritizing automated banking machinemay be used in waiting facilities where many people are normallyexpected to simultaneously congregate and wait, such as doctors'offices, hair stylist centers, and motor vehicle registration centers(e.g., DMV, BMV). A prioritizing machine may also be provided in arestaurant, such as a fast-food facility. The prioritizing device(s) canbe operatively connected to one or more remote tag readers toautomatically read all RFID tags in a predetermined area of the waitingfacility. For example, the tag readers may be strategically positionedto generally surround the waiting area. FIG. 8 shows a waiting facility90 having RFID tag reading devices 82, 84, 86, 88 positioned in asurrounding relationship. The reading devices are operatively connectedto a prioritizing device (e.g., processor). The reading devices may besequentially or simultaneously operated.

In an exemplary embodiment, contactless (e.g., wireless) technology canalso be used by an automated banking machine to communicate not onlywith RFID tagged items (e.g., automated banking machine cards), but alsowith other user devices, such as smart cards, PDAs (personal dataassistant), cell phones, pagers, and laptop computers that utilize RFand/or RFID technology to send/receive data.

It should be understood that exemplary embodiments of automated bankingmachines may include a magnetic stripe reader in addition to RFIDreaders and/or writers. For example, an automated banking machine canhave both an RFID tag reader and a magnetic stripe reader. The RFID tagreader can be combined with or positioned adjacent to the magneticstripe reader. Such an arrangement enables two different types of cardsto be read at generally the same location. The ability of an automatedbanking machine to read data. from different types of data cards can bebeneficial to implement the capabilities of reading more types of cardsor during a transitional period of switching from magnetic stripe cardsto all RFID cards.

An automated banking machine can have a user card input slot (or cardreader inlet) for insertion therein of a card by a user of the machine.The card insertion slot is able to receive both magnetic stripe cardsand RFID cards. That is, the slot can be a dual use input opening. Theslot can be aligned with a magnetic stripe reading device. The magneticstripe reader can communicate with the slot via a pathway. The magneticstripe reading device can include a housing that is able to receive thecard therein. The slot can be a fascia opening and/or an entry into themagnetic stripe reader housing. The RFID tag reader can be positionedadjacent to the magnetic stripe reader, either in or out of the housing.

In an exemplary arrangement the RFID reader is positioned outside of themagnetic stripe reader housing. The housing can be of a structure (e.g.,open or slotted) and/or of a material (e.g., plastic) that enables theRFID tag to be read exterior of the housing. FIG. 9 shows an automatedbanking machine 100 having a user card insertion slot 102 into whichboth magnetic stripe and RFID user cards can be inserted for reading bythe machine. FIG. 10 shows cut away angled view of the card insertionslot 102 in relation to a magnetic stripe reader housing 104. An RFIDreader 106 is positioned adjacent to the magnetic stripe reader housing104 in the automated banking machine 100.

The card reading processes can be prioritized based on programmingassociated with one or more controllers in the automated bankingmachine. For example, the RFID tag reader can be controlled to operatefirst in attempting to read a card. Upon a successful read by the RFIDreader, the magnetic stripe reader is not active. However, if the RFIDreader's attempted read was unsuccessful, then the magnetic stripereader is operated in a second attempt to read the card. If the secondattempt is unsuccessful, then the card is returned to the user. Inanother reading program, the magnetic stripe reader can be operatedfirst and the RFID reader second. In other card reading processes themagnetic stripe reader and the RFID reader can both be simultaneouslyoperated to read a card.

In other exemplary embodiments the RFID reader may be positionedadjacent to the read head or other magnetic stripe reading device. Insuch embodiments the RFID tag and magnetic stripe data may be readgenerally simultaneously. Alternatively or in addition, the RFID datamay be read as data is read from a chip on a smart card. Theseapproaches are exemplary.

In some embodiments it may be advantageous to read the RFID data fromthe card while the card is within the machine. In such machines it maybe advisable to insulate the interior of the machine and/or the readerwith RF signal blocking materials (for example conductive elastomers),such that RFID signals read from the card cannot be intercepted byunauthorized reading devices attached to or near the machine. Likewisesuch capabilities may be used to prevent interception of data beingprogrammed onto an RFID tag. In addition or in the alternative, thefascia of the machine may include intrusion sensors adapted to senseradiation output by unauthorized RFID reading devices attached to theoutside of the machine. The controller of the machine may be programmedresponsive to detecting potential unauthorized RFID sensor signals toanalyze the nature of the signals to determine if they correspond tothose likely associated with an unauthorized reading device. The sensingof unauthorized reading devices, for example, is shown in U.S. Pat. No.7,240,827, the disclosure of which is incorporated herein by reference.

In response to determining that such signals correspond to anunauthorized reading device, the controller may cause the machine totake actions in accordance with its programming. Such actions mayinclude, for example, stopping operation of all or certain operations ofthe machine, such as cash dispensing operations. Actions may alsoinclude capturing a card from which data may have been intercepted.Actions may also include capturing image data from a camera. This may beaccomplished, for example, in the manner shown in U.S. patentapplication Ser. No. 09/991,748 filed Nov. 23, 2001, the disclosure ofwhich is incorporated herein by reference. Alternatively, such actionsmay include giving notice to a remote entity in a manner such as is donein U.S. Pat. No. 6,768,975, the disclosure of which is incorporatedherein by reference. The controller may also be operative to cause anemitter to output signals that are operative to jam, saturate or providefalse data to an unauthorized RFID reading device. Of course, theseactions are exemplary of actions that may be taken.

In some exemplary embodiments the data from an RFID tag may be used toauthenticate other data on a user card or other item or feature used tooperate an automated banking machine. For example, data recoverable frommemory on an RFID tag may be used to verify data recoverable fromanother source, such as a stripe or a chip on a card. For example, dataread as part of RFID data may have a corresponding or otherpredetermined relationship to all or portions of magnetic stripe data,chip data, and/or customer input data. The presence of such arelationship can be determined through programmed operation of one ormore controllers operating in the machine. The determination that therelationship is present for the particular card or transaction may beused to provide greater assurance that the card is genuine and/or thatdata on the card has not been tampered with.

In some embodiments RFID tags can be embedded in cards or other items.In other embodiments an RFID tag may be attached to items. For example,a customer may be provided with a thin RFID tag that includes selfadhesive material. The user may be provided by a card issuer, bank, orother entity with the RFID tag and given instructions to apply it to anassociated magnetic stripe or other card. Data readable from the RFIDtag can then be read by the automated banking machine when the card isused, and such data compared to magnetic stripe and/or customer inputdata, or portions or combinations thereof for a determined relationship.The existence of the relationship serves to reduce the risk that theinput card is genuine and is not a fraudulently produced duplicate card.The existence of the predetermined relationship can be required by thecontroller in accordance with its programming before machinetransactions, such as dispensing cash, can be conducted at the machine.

In some embodiments the card issuer may provide replacement oradditional self adhesive RFID tags to a card holder. The card holder mayremove the existing RFID tag from the card and replace it with the newtag. The new tag may have different or additional data that can beutilized at the machine controller to authenticate the card, the user,or other data, in another manner. Automated banking machines may beprogrammed such that if the original tag is not replaced with thereplacement tag, the card will no longer operate the machine.Alternatively, the additional tag may need to be applied to the cardwhile the first tag remains. The machine controller may use data fromboth tags in the determination that the card should be accepted and themachine operated to carry out one or more transaction functions.

Of course, these approaches are exemplary of approaches that may beused. Further, while the exemplary embodiment is used in conjunctionwith an automated banking machine, it should be understood that similarprinciples may be used in conjunction with other credit card terminals,debit card terminals, vending devices, and other devices that employsuch cards for operation.

In still other embodiments an issuer of a card may provide a user withan RFID tag or other item that is not attached to or connected with thecard. For example, the user may be provided with an item that includesan RFID tag that the user will always be expected to be carrying whenthe user conducts automated banking machine transactions. This mayinclude an item such as a card holding sleeve that the user can keep ina wallet, a tag that can be attached to a key ring, or a self adhesivelabel a user can attach to a key, watch, wallet, pen, jewelry or otheritem generally carried by the user. When the user conducts a transactionat the automated banking machine, a reader in or operatively connectedwith the automated banking machine reads RFID data from items inproximity to the machine. If the proper RFID data is not detected, themachine will not operate to perform at least some transactions. Thuseven if a user's card data, card, and/or PIN has been taken by acriminal, the criminal may be prevented from accessing the user'saccount if the user does not have the personal item bearing the RFIDdata. Of course this approach is exemplary and in some embodiments otherapproaches may be used.

Further in some embodiments RFID tag data may include data usable forverifying the origin and/or authenticity of data or messages. Forexample, RFID data may include digital signatures and/or digitalcertificates. Such digital signatures and digital certificates could beused to authenticate data input via a card or through an input device,and/or could be used to authenticate a message originating from anautomated banking machine or other device and/or to verify theauthenticity of data. Digital signatures and certificates can be used inways similar to those described in the incorporated disclosures toverify the source of messages, to encrypt and decrypt data, and toconfigure an automated banking machine. In some embodiments signatureand/or certificate data may be wholly stored in an RFID memory, while inothers only portions of such data, or data than can be used to resolvesuch signature or certificate data, can be stored in memory associatedwith an RFID source.

In other embodiments, data stored in connection with an RFID tag can beused to verify authenticity of a card and/or a user. For example, aspreviously discussed, a card issuer may provide a user with an RFID tagcontaining data. Such a tag may be a self adhesive tag to attach to thecard or otherwise. Such a tag may include data that can be used by acontroller in the machine to verify stripe or other card or user inputdata. (PIN, biometric input, or other input, for example). Alternativelyor in addition, the tag may have associated memory included therewiththat includes data that can be used by the automated banking machine toverify that the user is the authorized user of the card.

For example, the RFID tag may have stored thereon several items ofinformation that only the authorized user is likely to readily know.These might include, for example, the last digit of the user's SocialSecurity number, year of birth, first digit in residence address, firstletter of street on which the user lives, first letter of mother'smaiden name, first letter of mother's first name, first letter infather's first name, and other similar data. Automated banking machinesmay be programmed to ask a customer a random (or in a predeterminedorder) one of these questions when a transaction session is initiated orat another time in a transaction session at the machine. The input ofthe customer in response to the question is compared through operationof the controller in the machine to the data read from the RFID tag.Only if the input data corresponds is the customer permitted to conducta transaction or a selected transaction function.

In the exemplary approach, even if a customer's magnetic stripe data andPIN have been intercepted by a criminal, the criminal does not obtainsufficient information to use the card to conduct automated bankingmachine transactions. In addition, even if the user's input in responseto a question presented in response to one random question output by amachine is intercepted, it has no value unless the criminal has beenable to steal the card with the RFID tag or otherwise obtain theseparate tag. Further, even if the criminal has the original RFID tag,because the exemplary machine has a controller that is programmed tooutput the numerous questions randomly, the customer's response that acriminal has been able to observe is not likely to be the correctresponse when the criminal presents the card at a machine. Further,because the machine can be programmed to capture the card in response toa set number of incorrect responses by a user, there is a significantchance the card will be captured and invalidated by a machine before thecriminal may use it in carrying out a transaction.

Similar approaches may be used with programmable RFID tags. In anexemplary approach, rather than having numerous possible answers toquestions selected randomly stored in connection with the RFID tag, theRFID tag memory can be selectively programmed with data the customer mayinput through input devices on the automated banking machine. Forexample, the machine controller may be programmed to advise the customerthat the time after the next time (or at some other later time) when thecustomer uses the card the customer will be asked to input particulardata. This might be, for example, the first letter of the user's mothersfirst name. Data corresponding to the question and/or appropriateresponse would be input by the user to the machine and be stored on theRFID tag through operation of the controller and RFID tag writer device.In an exemplary embodiment, the user can provide the question, answer,and/or a code for storage on the RFID tag. Then when the card is used onthe corresponding subsequent occasion, the controller in the machinewould operate to present the question and verify the answer input by theuser based on the RFID data, and enable at least one transaction orfunction with the machine in response to receiving the correct input.Thus, even if a criminal stole the card, RFID tag (if separate from thecard), PIN and the response given by the user, the criminal could notconduct a transaction at the machine with the card, because the criminalwould not know the correct response to the question the machine wouldpose upon the next transaction (because it was input by the user duringa prior transaction the criminal did not observe). Of course, thisapproach is merely exemplary.

It should be mentioned that some of these exemplary embodiments forverifying a user and/or a card or other item may be carried out locallyat the automated banking machine. This may avoid the need to modify thenature of transaction messages transmitted to and from the machine in afinancial network to carry out transactions. Of course other embodimentsmay use remote communication to facilitate secure operation. Forexample, a remote computer (connected to a data store) may provide oneor more values or codes that are stored in RFID data. Such data (whichmay be in a card) may be looked for or used the next time the card isused, and its absence or variation identified to indicate a false orstolen card. Of course this approach is merely exemplary.

In alternative embodiments a user may be provided with a RFID tag that auser can install in or attach to an item such as a PDA with wirelesscommunication capabilities or a cell phone. The PDA or cell phoneassociated RFID data may be read to initiate a transaction or aparticular function at an automated banking machine. For example, theRFID data may include data usually found on a card that corresponds to auser or user's account.

The automated banking machine controller may be programmed to prompt theuser after reading the RFID data to provide an input through the PDA orcell phone. For example, the machine's display could prompt the cellphone user to call a number associated with the machine or a remotecomputer. The telephone connection could prompt the user to input theuser's PIN through the cell phone. This could be used to reduce the riskof interception. Alternatively, the user could be instructed to changethe user's usual PIN in a particular way for this transaction. Forexample, the user might be told via the phone connection to substitute aparticular digit or symbol for the usual first PIN digit. The user wouldthen input the modified PIN through the machine, and the machine wouldcarry out the transaction. If a PDA is used, communication could beconducted wirelessly between the PDA and machine such as throughBluetooth® or other wireless communication. As can be appreciated,because the acceptable PIN could be varied with each transaction, acriminal observer of the input PIN would not have the users actual PINand the ability to conduct a transaction at a machine.

Further, this exemplary approach could be combined with other approachespreviously described to provide enhanced security. Of course theseapproaches are exemplary of many approaches that may be used.

An exemplary automated banking machine also has the ability to readnon-card RFID devices. These RFID tags can be embedded in or associatedwith transaction items such as currency (e.g., bills and coins), checks,securities, account passbooks, certificates of deposit, tickets,coupons, gift certificates, etc. Documents such as present and nextgeneration currency (e.g., plastic bills and plastic coins) can containRFID tags. An RFID tag associated with a currency note can hold aplurality of information representative of the note, including but notlimited to the note's value (e.g., $50), serial number, and issue date.The automated banking machine can have an RFID tag reader that can readthe note's RFID tag information. The machine can also read the note'svalue, serial number, and issue date from one or more surfaces (faces)of the note. The machine can perform a note validation process based onthe read information. The note validation process can include checkingwhether the note face information read directly from the note matchesthe note face information read from the RFID tag. In alternativevalidation arrangements, the two sets of read note face information canbe transmitted from the machine to a machine network host where the notevalidation process can be carried out.

Furthermore, an automated banking machine, an machine host, one or moreremote computers, and/or networks can transmit bank note validationinformation to a central processor arranged outside of the bankingnetwork in order to have the note validation process performed. Thecentral processor can constitute one or more connected computers thatcomprise a main or central computer that maintains a data storecontaining data on all new (e.g., U.S.) currency bills. The data storeincludes note face information corresponding to particular RFID tag IDnumbers and/or other data. The main computer may be a government (e.g.,Treasury Department or Federal Reserve) computer.

In an example of a verification process, a bank note is received by anautomated banking machine in an attempted deposit transaction. The notehas an RFID tag that only includes a tag ID number. The RFID tag can benon-programmable. Thus, the ID number is permanently assigned to thatnote. The machine reads the note's face information. The machine uses anRFID document tag reader to read the tag's ID number. The machine givesthe ID number (along with the information read from the face of thenote) to the machine host. The host passes the ID number and the noteface information to the main computer. The main computer uses the IDnumber to obtain the note face information corresponding to thatparticular ID number from the data store. The main computer thencompares the two sets of note face information to determine whether thenote is valid. The main computer informs the machine's host on thedetermined validity of the particular note. The host can then instructthe machine on whether to deposit, hold as suspicious, or return thenote.

The use of RFID tags in currency permits tracking (or at least partialtracking) of currency. Tags can be used to track the flow of money intoand out of a banking network. For example, a banking network can useRFID tagged currency notes to monitor the activity of individualcurrency notes within the network. The monitoring can be used to enhancecash management. Cash can be reallocated to segments of the network inorder to maintain a proper balance or to prevent a cash shortagesituation. A network database can be used to store currency noteinventory data. The database can be used to track the currency notesreceived into the banking network (e.g., deposits into automated bankingmachines, etc.) and the currency notes that have been removed from thebanking network (e.g., cash withdrawals, etc.). The inventory trackingmay be carried out in real time. On a broader scale, the governmentalmain computer can be in communication with a plurality of bankingnetwork databases to access a real time inventory of cash over a widesegment of the banking industry. The main computer can be used by theFederal Reserve to reallocate cash throughout the different FederalReserve regions.

The main computer can also be used to track currency for research. Forexample, the main computer can attempt to follow a currency notethroughout its life cycle. The life of a currency note may include itscreation at a mint, distribution by the Federal Reserve, passage throughseveral banking systems, and multiple uses at several automated bankingmachines. The tracking can be used in note travel analysis.

The tracking can also be used in detecting counterfeit currency, such aswhen a non existing serial number is detected or when two of the sameserial numbers are detected in questionable, situations. For example, aserial number read on the Eastern coast of the U.S. two hours afterhaving been read on the Western coast would create a questionablesituation.

RFID tags in currency can also be used in statistical analysis tocalculate or create normal patterns of currency deposit/withdrawal. Apattern may include several factors, including a total deposit amountover a predetermined time period. A normal deposit pattern can beassigned to an individual automated banking machine, a specific numberof machines, and/or an entire network of machines. Patterns involvingsegments of an automated banking machine network may also overlap. Anormal deposit pattern can be created after performing a lengthy study(via RFID tags on currency) of deposits made to the machines assigned tothe pattern's particular coverage area. For example, the pattern factorcomprising the normal range of deposits per time period is calculatedand assigned to that particular pattern. A pattern can be continuallyadjusted to compensate for different business activities (e.g., newhousing) occurring within the pattern area.

The monitoring of deposit patterns (via RFID tags in currency) can beused to ascertain questionable deposit activity. The monitoring may becarried out in real time or near real time. In a pattern monitoringexample, the pattern of currency entering an automated banking machinenetwork is compared to the normal deposit pattern for that network. Adiscovery is made that the current deposit pattern differs from the normby an unacceptable range (e.g., 25%). The non normal pattern may be theresult of an unusually large amount of currency having been depositedinto several network automated banking machines within a relativelyshort period of time. Deposit patterns out of the norm are automaticallyflagged and may be investigated for illegal activity, such as moneylaundering. The previously discussed ability to use RFID tags to trackdeposited currency to a particular customer at a particular time can beused in the review of the flagged pattern to determine whether thedeposit transactions were legitimate.

Other uses of currency with an RFID tag may also be used in exemplaryembodiments. For example, an RFID tag with a programmable memory can beused to enhance the security of bank notes in an automated bankingmachine. The machine can operate an RFID writer to reprogram the RFIDtag to change the status of currency between first and second identifierstates (e.g., active and passive states). For example, a tag in apassive or non flagged state, may represent that the currency note waslegally dispensed and is valid for public usage. A tag in an active orflagged state represents that the currency note is (or should be) underthe jurisdiction (or current possession or ownership) of a particularentity or financial organization, such as a bank. An active note outsideof the bank's currency system is an indication that the note was takenwithout permission (e.g., stolen) from the bank, such as via breakinginto an automated banking machine or during transport. Currency can bedeactivated during its dispense from a machine. Currency can beactivated during its reception as a proper deposit. Active/passive(e.g., bank/public) in an RFID tag memory can be represented byidentifiers or codes (e.g, numbers, letters, etc.). Of course thisapproach is merely exemplary.

The use of active and passive tags can prevent the laundering of astolen note back into the banking system, such as via a deposit into anautomated banking machine. A machine of the banking system can read theRFID tag of a note that is trying to be deposited, identify the note asactive (suspicious or stolen), and notify the proper authorities of thesituation. Of course on a broader scale a banking system may be linkedwith other banking systems to share RFID tag information. Each bank mayhave a unique bank code that is represented in their active state of atag. Each bank system can recognize not only their own currency but alsothat currency belonging to other banks via reading the bank code. A notewithout a tag may not be accepted for deposit. The serial number of anon-tagged note may be checked via a data store to determine if the notepreviously had a tag. A non-tagged note may be an indication that thetag was purposely removed or the note is counterfeit. Such tags may alsobe used to identify the particular individuals associated with transfersof particular bills.

In other programmable RFID tag arrangements a tag can be embedded inspecialized currency. For example, programmable tags may be used innewly minted limited edition currency, large bills, or large securities.The tag can store an owner-chosen or other type data such as anencrypted PIN. The PIN may serve as an additional security feature toverify that the current possessor is the actual legal owner. Onlyspecific entities (e.g., banks, security dealers) may have access to theauthorized readers that are necessary to decrypt and read a PIN. Aprovided or entered PIN can be compared with the PIN stored in the RFIDtag of the bill or security. Upon ownership transfer of a security, thePIN can be changed by the new owner.

The capability of an automated banking machine to use an RFID tag torecognize an individual item and associate the particular item to aparticular customer/account can also be applied to financial checks. Acheck may include an RFID tag. The check's RFID tag can be programmable.A check's RFID tag can initially contain information representative ofthe maker's name, account number, and bank name. As previouslydiscussed, the machine can have an RFID tag reader/writer. The machinecan add information to the tag, modify the tag, or reprogram the tag.For example, additional information that may be added to the tag by themachine may include the check amount, date, payor, payee, transmittingbank, routing number, and/or bank account or other data or numbers. Themachine prepares the tag memory so that all the necessary information isavailable in the RFID tag to allow the Federal Reserve to read the tagand process (clear) the check.

In an exemplary embodiment the component modules/devices (e.g., inputand output devices) inside of an automated banking machine usecontactless (e.g., wireless) processes to communicate with each otherand/or to the machine's internal computer(s). The internal machinecontroller(s) can serve as a local host computer to each of thecomponents in the machine. It should also be understood that the localhost computer can also constitute a machine component. As previouslydiscussed, automated banking machine components may include (but are notlimited to) transaction function devices such as any of a card reader,keypad, function keys, display, receipt printer, journal printer,account statement printer, currency dispenser, and currency acceptor.Wireless communication can be used to make the individual componentsindependent of any hard-wired signal communication relying on wiring ordistribution hubs. That is, the components can have wirelesscommunication that is not dependent on any fixed hard wiring betweencomponents. interface hub wiring (e.g., USB hubs) for multiple deviceinterfaces can be reduced or eliminated.

A wireless communication arrangement frees up additional room inside ofa machine housing and makes component placement more flexible. Thus,additional functionality and/or more devices/components can be added toan automated banking machine. The number of module/device interfaces andlocations can be increased in the machine. The number of devices is notlimited by the number of individual hard-wired signal/communicationwires, distribution hubs, or their physical locations inside themachine. Some components that do not have to be located adjacent afascia opening may be randomly positioned in the machine, due to theirexact position being irrelevant. Troubleshooting, component/machinedowntime, and replacement of faulty hard wiring associated withcommunication wiring between the machine's internal computer and acomponent can also be reduced or eliminated. Power supply to devices canalso be provided in some embodiments by providing RF energy within thehousing from one or more emitters. Multiple transaction function devicesmay receive power from the RF emitter(s) as necessary for operationand/or communication.

A wireless communication arrangement may also be used to add anadditional layer of security to an automated banking machine by reducingthe opportunity to tamper with a machine and/or its components.Elimination of component hard-wiring removes the ability of a person tophysically alter wiring to provide unauthorized access to the machinebanking network and/or to control a machine component. With the absenceof wiring, then any capacity to bypass original hard wiring with falsewiring between a local host computer and the components for the purposeof overriding original programming has been eradicated.

Communication among the components and the host computer can utilizeencryption codes as an additional security layer. Likewise,communication involving an RFID device can be encrypted. The encryptioncodes can be utilized as an additional security layer in sensing,indicating, and/or reporting when suspected tampering is occurring.

A component's RFID device can be activated by another component (or anRFID device of that component) during an attempt to communicate. Whenactivated the RFID device can automatically power up its component inorder to receive data and/or transmit requested data. A component can bearranged such that it is only powered up (i.e., “on”) when its RFIDdevice is in an active state. An RFID device can also be used toautomatically power down its component upon an instruction (e.g.,deactivation signal) or during absence of activity. Power consumption ofa component can be reduced by installing a “sleep” mode in thecomponent.

The automated banking machine housing can be shielded with RF blockingmaterials to prevent interference, interception, or outside manipulationof the communications among the components and the host computer. Ashielding structure may include conductive elastomer.

FIG. 11 shows a rear view of components and a local host computer 94arranged in an interior portion of an automated banking machine 92. Thecomponents and local host computer are devoid of wired communicationwith each other, but can communicate with each other wirelessly.Components such as a card reader 95, display 96, currency dispenser 97,and currency acceptor 98 are shown.

As previously discussed, the use of RF can eliminate mechanical contactbetween cards and card readers. Of course the use of radio frequency isone example of non-contacting remote communication. It should beunderstood that other types of non-contacting information communicationmay be used in other exemplary embodiments instead of (or in additionalto) radio frequency or radio waves.

In another exemplary embodiment, a user card can be replaced by ahand-held mobile device. The user card data (or information) is storedelectronically within the mobile device. The process replaces user cardinsertion at an automated banking machine (e.g., a self-service machine,a self-service automated machine, etc.). The mobile device/machinerelational arrangement sets forth a secure mode of providing datanormally found on a user card to a machine. The user card data mayinclude any of a personal account number (PAN), a card verificationvalue (CVV), a customer name, a bank identifier number (BIN), etc. Themobile device (or portable device) may include a portable computingdevice. The mobile device can comprise a phone (e.g., a cell phone),personal digital assistant (PDA), notebook computer, Blackberry device,BlueTooth device, Ipod device, a mobile communication device, etc.

The card information can be used to carry out transactions at mobiledevice-compliant automated banking machines, including cash withdrawaltransactions and other services. The exemplary arrangement enables amachine user to provide card data needed to perform a transaction, yetwithout use of a tangible card. As a result, machine customers can beprotected from card-related machine frauds, such as card readerskimmers. The arrangement reduces the effectiveness of card skimmingdevices by allowing input of card data without card insertion.

In an exemplary arrangement, instead of inserting a card at an automatedbanking machine and using a conventional magnetic stripe card reader, acustomer can start a transaction by pressing an “Enter” key (or someother designated key or keys) located on a user interface of themachine. The machine (or machine host) includes a computer in which oneor more software applications are operative. The software can cause atime-variant random code (or random number) to be generated in responseto the designated key being activated. The random code is alternativelyreferred to herein as a random value.

It should be understood that a third, party random number generator orsome other remotely located entity computer can be used to generate andprovide a random code to an automated banking machine (or machine host).A random code provider can be placed in operative connection (such asvia the Internet) with the machine (or the machine's host) to supply themachine with generated codes. Although generation of random code at themachine level may be discussed in more detail herein for reasons ofbrevity, it should be understood that distinct suppliers of random codecan instead be used.

A random code may consist of plural digits, such as four digits. Thedigits can be numbers and/or letters. It should be understood that feweror greater digits than four may be used in forming a randomly generatedcode. The automated banking machine (or machine host) software can alsocause the machine to visibly display the randomly generated code on adisplay screen. The display enables the code to be viewed by a user ofthe machine (e.g., the user that pressed the designated key).

It should be understood that in some embodiments the random code may bepseudo random such as may be generated by a computer. In otherembodiments the code may not necessarily be random, but a value notpreviously known to the automated banking machine user and notpredictable in advance by entities not responsible for operation of thesystem. Of course these approaches are exemplary.

The exemplary mobile device includes a computer operating one or moresoftware applications. A registered user can download the software ontotheir mobile device from a secure web site. One of the applicationsincludes data encryption software, that enables a related datadecryption software application of the automated banking machine (ormachine host computer) to decipher the encrypted data.

The exemplary mobile device includes memory for storing card data (e.g.,PAN, CVV, BIN, user name) of several individual cards. The mobile devicecan also retrieve the card data from memory storage. The mobile devicecan function like an electronic wallet. A user can select from any ofthe cards to use its corresponding card data in a transaction with anautomated banking machine. For each card stored on the phone, theelectronic data provided to a machine can comprise the Track-2 datanormally found on the magnetic stripe of the physical card.

In an exemplary embodiment the user enters the random code displayed bythe automated banking machine into the mobile device and selects one ofthe stored cards. For example, the code can be manually entered througha phone keypad. In some embodiments the machine may provide one or moreoutputs that prompt a user to input the code into the mobile device. Themachine also operates to store the generated code for later verificationand analysis purposes. The mobile device software can operate togenerate an image including encrypted data that corresponds to both thecode data and the selected card's data (e.g., PAN, CVV).

The process of encrypting can be independent of the code. That is, thecode can be merely additional data that is encrypted in the process.Also, as discussed in more detail later, in alternative arrangements thecode can be left out of the encryption. Alternatively in someembodiments the code may be used to encrypt the account number data.Embodiments may operate using various encryption/decryption processesand arrangements.

The exemplary software program causes the mobile device to display theencrypted data as an image on its display screen. For example, theencrypted image can be displayed in the form of machine-readable data,such as a (two dimensional) bar code. Display screen types and formatsare well known, including LCD, plasma display, etc.

The exemplary automated banking machine includes a reader device thatcan read the encrypted image data. For example, the image reader maycomprise a bar code reader. The reader device is mounted in a positionthat enables a machine user to locate their mobile device adjacentthereto. The image reader may replace an existing magnetic stripe cardreader.

The automated banking machine may prompt the user (via a machine displayscreen) to place the displayed encrypted image near or in alignedrelation with the image reader. The machine may also prompt the user topress another designated machine key when the image is properlypositioned near the image reader. Upon detection of the key activation,the image reader is operated to scan for an encrypted image.Alternatively the reader may operate in conjunction with sensors orother devices suitable for sensing when a display screen of a mobiledevice is in position to be read.

The automated banking machine (or host) software executes instructionsthat are operative to analyze the read image data, enabling theencrypted image to be decrypted. The at least one computer may operateso bar code may be converted to a different data format prior todecryption. The encrypted image format or encrypted data format can beanalyzed to determine if it is genuine and/or valid (e.g., if it wascreated using a corresponding encryption software program). The analysismay include determining if the received data is readable, recognizable,or properly formatted. For example, expected fields in the encryptionmay be missing or contain values out of range, indicating invalidproperties that prevent proper decryption. As a result, the automatedbanking machine may again attempt to read and analyze the (expected) barcode image or void the transaction. Valid encrypted data enablesdecryption thereof.

It should be understood that the analysis of data may first occur afterdecryption. Alternatively, a decrypted data analysis can be performedfollowing an initial analysis of encrypted data.

In an exemplary embodiment, after obtaining valid decrypted data, thenthe random code can be checked by the automated banking machine (orhost) for verification. The machine (or host) has the code that wasgenerated, stored in memory and correlated with the current transactionsession. The decrypted code can be compared with the generated code. Ifthey do not match, then the transaction can be canceled or other actiontaken.

In other exemplary embodiments the account number and/or other databeing represented by the output through the display of the mobile devicemay be encrypted using the code. In such embodiments the at least onecomputer of the automated banking machine may operate to resolve theaccount number data from the image using the code. The successfulresolution of a value that corresponds to the account number may be thebasis for verifying proper code input. In other embodiments portions ofthe output code may cause encrypted data to be included in an image thatfurther verifies the input of the proper code and also verifies a properoutput from the mobile device. Of course these approaches are exemplary.

The exemplary time-variant random code has a finite useful life. Forexample, each generated code may be useable for only a predeterminedtime period (e.g., 1, 2, 3, 4, or 5 minutes) following creation, afterwhich period it expires. Alternatively, a generated code may becorrelated with a set time/date after which it is no longer valid.

In an exemplary embodiment the decrypted code and generated code match,then a further check can be made by the computer in the automatedbanking machine (or host) to determine if that code's life has expired.if a valid (matched) code is still active (alive), then the decryptedcard data (e.g., PAN, CVV) can be used to continue the transaction.Using a time-variant code ensures that the user is the currenttransaction user. A random number can be used to verify that the machineuser corresponds to the current transaction session. Thus a thief can beprevented from trying to fraudulently use data directed to a priortransaction session. Of course this approach is exemplary.

The encrypted image can be read at an automated banking machine, thedata in the image converted (decrypted) through operation of a computerinto a text format, and then the text written to a file. The Track-2data can be extracted from the file. The derived Track-2 data is copiedto (and updates) the machine's Track-2 (card data) buffer.

The arrangement enables an automated banking machine to receive usercard data in a more secure manner. In an exemplary embodiment, in theoperation of verifying the authority of a user to carry out atransaction with the machine, whether the card data was received via amobile device or via a magnetic stripe, the resulting content and formatof the data in the Track-2 buffer would be indistinguishable.

Upon having the needed card data, the exemplary machine transactionprocess can follow a path similar to that when data has been readdirectly from a card. That is, the machine is advanced to the next state(e.g., PIN entry) in the transaction. For example, a subsequent stage inthe transaction can include user PIN entry. The mobile device user can(manually) input their PIN at the machine's user interface. Aconventional PIN verification process can be carried out responsive tooperation of at least one computer in the machine. If the PIN is valid,then the transaction can be further continued.

The exemplary arrangement also enables user card data entry toconventionally occur prior to user PIN entry and verification. Thus, theexemplary arrangement does not interfere with the normal flow (order) ofan automated banking machine transaction or with a bank's existingautomated banking machine infrastructure.

FIG. 12 shows an automated transaction machine 110 (e.g., a cashdispensing automated banking machine). The machine 110 is one out of aplurality of an automated transaction machines, each in operativeconnection with a shared host computer 122. The host 122 can operativelycommunicate with other card account sources (e.g. Bank 1, Bank 2,MasterCard, and Visa) in carrying out a transaction involving themachine.

The machine 110 can include at least one keypad 112, function keys, atouch screen display device 118, and an image reader device 120. Thefunction keys can include a random number request key 114 and a readimage key 116. Alternatively, the random number request key 114 and theread image key 116 may be the same key. The machine can also have otherwell known input and output devices, including conventional automatedbanking machine devices.

For reasons of brevity, the machine 110 may be referred to herein as anautomated banking machine. The transaction machine 110 can compriseother devices, including a depository, check-accepting machine,check-cashing machine, kiosk terminal, self-service machine, vendingmachine, cash counting device, checkout terminal, gaming device, fueldispenser, laundry machine, entry access device, etc.

The random number key 114 is pressed to inform the machine that a newmachine user desires that a code such as a random number be generatedand displayed. This key can be activated at the start of (or to begin) anew transaction.

The display device 118 is shown displaying the random number 7245. Thisnumber was randomly generated by a random number software generationprogram. The program can be located in either the machine, the host, ora remote computer in communication with the host and/or machine. Eitherthe machine or host or remote computer can correlate the generatednumber with a time. Alternatively, the random number may have anexpiration time built therein or be reflective thereof.

FIG. 13 shows an exemplary mobile device 130 (e.g., a cell phone) havinginput keys 132, a display screen 134, and a camera 136. The phoneincludes a memory 138 where the card data of several cards (e.g., Bank1, Bank 2, MasterCard, and Visa) can be stored. As previously discussed,each stored card may be represented in memory by respective card datacomprising a PAN and a CVV.

The user selects a card stored in their phone by providing inputsthrough an input device of the phone. The user also inputs the displayedrandom number into the phone. The exemplary software program in thephone enables either card selection or random number entry to occurbefore the other. Next the phone p software causes both the selectedcard's data (e.g., PAN and CVV) and the random number to be used togenerate an image including encrypted data corresponding to both values.The exemplary software causes the encrypted data to appear as a singleimage of a two-dimensional bar code 140 on the phone's display screen134.

Next the user activates the read image key 116. This informs theautomated banking machine that the displayed bar code is ready to beread (or received) by the machine. The read image key 116 in anexemplary embodiment can be pressed either before or after the displayof the phone is positioned adjacent to the bar code reader 120. Themachine software can cause the bar code reader 120 to attempt to read abar code within a predetermined number of times (or within a preset timeperiod) before quitting. If a bar code cannot be read within the definedlimit, then the machine can prompt the user to make sure the phone isproperly positioned, and again attempt the reading. Alternatively, themachine may cancel the transaction.

In an exemplary embodiment, following a successful, reading of the barcode image from the phone, the automated banking machine decrypts theread random number. This decrypted number is then compared to thegenerated and displayed random number. If both, the numbers match andthe time allocated for the random number has not expired, then thedecrypted PAN and CVV are used to continue the transaction involving theselected card. For example, the next stages of the transaction mayinclude using the CVV to confirm the PAN, and using the PAN to determineif the PAN corresponds to an inputted PIN. The host can conventionallycommunicate with the issuer of the selected card and the bank affiliatedwith the automated banking machine to settle the accounts involved inthe transaction. Alternatively, in some embodiments the encrypted datamay be decrypted using the code to obtain the customer account data orother data used to carry out the transaction.

FIG. 14 schematically shows a relationship among a customer 150 (e.g.,an automated banking machine user), the machine 110, and the machinehost 122. The machine has installed therein an electronic card (E-card)system 142. The E-card system 142 includes an image reader 120 (e.g.,bar code reader device) and an E-card application 144. The E-cardapplication 144 includes software that can control operation of theimage reader 120 to read images. The software can also receive readencrypted data from the image reader 120, and carry out decryption ofthe encrypted data. The software can convert digitally imaged card datainto electronic card data. The E-card application 144 is also able tocommunicate with both the machine's transaction control system 146 andthe host 122 to exchange data.

The transaction control system 146 can include an machine controllercomputer. The automated banking machine can provide outputs to thecustomer, such as via the display device 118. The machine can alsoreceive inputs from the customer, such as via the keypad 112 and the barcode reader 120. The inputs and outputs can be necessary to carry out atransaction.

Other details, embodiments, relationships, and alternative arrangementsare within the scope of alternative embodiments. For example, eachstored card in a mobile device can be linked to an ID or phone number ofa customer for added transaction security. Triple DES encryption oftransaction data can be used. A mobile device may include a mobile phoneusing JAVA midp 2.0 or higher. Other data formats may be used.

As previously discussed, the random code can be manually entered intothe mobile device. In alternative embodiments, the code can bewirelessly received from the automated banking machine by the mobiledevice. For example, RF devices may be used to transmit (from themachine) and receive (at the mobile device) code information.

It should be understood that for purposes of definition, a “random”code/number as used does not necessarily have to be truly random. Arandom number generator, computer software program, or mathematicalalgorithm can be used. A created random code/number may be based on (ororiginate from) fixed factors, such as the machine serial number, and/orzip code, etc. Alternatively, a random code/number may be based onchanging variables, such as the current date and/or time, etc. Likewise,fixed and changing data may be used in combination in generating therandom code.

The mobile device software can use the code to generate an encryptedimage. For example, the software can take the code and use it as or useit to generate an encryption key. The key can be used to encrypt carddata (e.g., PAN, CVV) which corresponds to the selected card.Alternatively, the mobile device software can create an encrypted imagewithout needing the code to make an encryption key.

A digital signature may be used in providing the card data to theautomated banking machine. A hand shaking process may be used betweenthe machine and mobile device to transmit/receive encrypted card data.

As previously discussed, the image including the encrypted informationcan be in the form of a bar code. However, other alternative imageshapes and forms can be used and recognized by the automated bankingmachine. For example, a string of numbers and/or letters; colorpatterns; and fonts and/or shades may be used. Three-dimensional imagescan also be used, including their creation and reading. Imagerecognition software can be used.

In some arrangements an image (whether or not encrypted) displayed bythe mobile device that corresponds to the code and card data can also becaptured as a digital picture by camera of the mobile device. The mobiledevice can then wirelessly transmit the picture (e.g., via e-mail or aproprietary system) to the automated banking machine or the machine'shost.

If sent to the host, then the host can determine the code (which may ormay not include decryption) received from the mobile device. The hostcan compare the determined code to any pending active codes that werereceived from machines on the automated banking machine network. Thecomparison can identify the correct machine involved in the transaction(i.e., the machine that displayed the code to the customer). Thus, thecode can also act as a machine identifier. The host can then forward thecode and card data (whether or not encrypted) received from the mobiledevice to that identified machine. If necessary, the machine can thencarry out any needed decryption of received data.

In an alternative arrangement, the image displayed by the mobile devicecan be sans the code. Instead, the code displayed by the automatedbanking machine can be captured by the mobile device in another digitalpicture. A first photo file (which includes the card data) and a secondphoto file (which includes the code data) can then be sent together tothe machine or the machine host. If sent to the host, then necessarydata can be forwarded to the automated banking machine that iscorrelated with the code.

In other alternative arrangements an intermediate device or system canbe used between the mobile device and the automated transaction machine.That is, data (e.g., random number, account number, etc.) does not haveto be directly exchanged between the mobile device and the automatedtransaction machine. Rather, the data can first be passed through theintermediate device or system. The intermediate arrangement can also beused to generate the random number for use by the automated transactionmachine and/or store the account data for the mobile device.

In still other arrangements the mobile device may provide additionaloutputs to provide data for carrying out a transaction. This may includedata output through RF, infrared (IR) or sonic signals. Such data may insome embodiments provide portions of account number data or other datato carry out transactions. In other embodiments such data may be usedfor verification or security purposes. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In further exemplary embodiments, a cash dispensing automated bankingmachine includes a card entry slot that is aligned with a card readerdevice. The card reader is operable to read data from a magnetic stripeof a user card that has been inserted into the slot.

An exemplary card reader arrangement allows for use of a conventional.DIP card reader type of user motion (i.e., manually push card in thenpull card out type of motion) with which many card users are alreadyfamiliar. Once the card has reached full insertion, the card would beheld in place by a card retainer associated with the card readermechanism. A magnetic read head would be moved along the long axis ofthe magnetic stripe to read the encoded data. The movable read head canalso be used (if needed) to write magnetic data to the stripe tracks.Thus, the exemplary card reader arrangement creates the ability to writedata in a DIP reader type of assembly.

In an exemplary embodiment, the card holding mechanism includes holderscomprising rollers or belts positioned on each side of the card. Theholders are moved to pressingly engage and hold the card in asubstantially fixed position. In some embodiments, the holders operateto first move the engaged card into its final card reading positionbefore holding the card stationary. Another type of card holder cancomprise a scissors like mechanism that operates like ice tongs.

FIG. 15 shows a card 160 that includes a magnetic stripe 162. The card160 is substantially rectangular-shaped, with two short edges (sides)164, 165 of equal length and two long edges 166, 168 of equal length.The magnetic stripe 162 has a short width (or short axis) 172 and arelatively longer length (or long axis) 170. The magnetic stripe islocated closer to one of the long edges 166, and the (longer) stripelength 170 is also parallel to that long edge 166. The magnetic stripe162 contains several tracks (e.g., three) 174, 176, 178, of encodeddata. These tracks extend along (substantially parallel to) the length170 of the magnetic stripe 162.

In an exemplary card reader arrangement, the card 160 is moved into acard slot 180 in a direction that is perpendicular to the long axis 170of the encoded track data 174. The result causes the card 160 to beinserted into the card reader slot 180 oriented with the long edge 166(nearest to the stripe) achieving the furthest insertion (instead of themore common short edge first type of insertion used with conventionalcard readers). In an exemplary embodiment, a person (user) manuallypushes the card 160 all the way into the card reader. When fullyinserted, the trailing edge of the card 160 is substantially flush withthe card slot opening 180, as shown in FIG. 16. In some embodiments, itis desirable to prevent the user from being able to move or pull on thecard while it is being read. Thus, having the card flush with the slotreduces a fully inserted card's exposed area that can be gripped orgrabbed by the user.

In FIG. 15 the card entry slot 180 to the card reader is shown extendingin a front face portion of a user interface 182 that accepts magneticstripe cards. The opening to the slot forms a slot face. The cardinsertion direction is represented by arrow A. The user interfaceportion 182 can be part of a user fascia, such as the previouslydiscussed fascia 12 of FIG. 1. A machine fascia 12 can be equipped withanother (new) card slot 180 or modified to replace an existing card slotwith the sideways card slot 180.

As seen in FIG. 15, the card entry slot 180 is configured (sized) with aslot length 184 that is greater than the length of the long edges 166,168 of the card 160. Thus, the slot configuration allows it to receive along edge 166 of the card. That is, the slot 180 can first receive therespective long edge 166 (i.e., the card's magnetic stripe edge) that isclosest to the magnetic stripe 162. As can be seen, during insertion ofthe card 160 into the slot 180, the card is moving in a direction(represented by arrow A) that is substantially perpendicular(transverse) to the length 170 of the magnetic stripe 162. It followsthat the direction that the card is moved into and out of the slot isalso transverse to the direction that the data tracks extend.

As opposed to card readers which can only accept cards inserted shortside 164 first into a card slot, the novel card reader arrangement canaccept (and read) cards inserted long side 166 first. In comparison to aconventional card reader arrangement, the novel card reader arrangementcan receive (and then read) a card that was rotated 90 degrees before itwas inserted into the wider card slot 180.

The problem of card skimming is known. A card skimmer typically operatesby requiring longitudinal motion of the card along the axis of theencoded tracks of data in order to read the data. Because of theexemplary card reader arrangement, which allows the card 160 to beinserted into a card reader slot 180 in a direction perpendicular to themagnetic stripe's length 170, the likelihood of the card being skimmedis reduced. At best, a conventional card skimmer (which reads cardsinserted short edge 164 first) installed adjacent to the exemplary slot180 would only have access to a small portion of a card's magneticstripe 162 (instead of the entire stripe). Furthermore, this smallportion could only be read in the direction which crosses all of thetracks, i.e., the direction parallel to the short axis 172. Thus, anymagnetic stripe data that could be read by an illicit card readerinstalled next to the slot 80 of the exemplary embodiment would beessentially useless. Because of the exemplary card reader arrangement,which includes a change in the inserted orientation of a card's magneticstripe 162, a more secure form of card reading is provided.

The card slot 180 (as shown in the relative orientation of FIG. 15) canbe formed from a top wall 186, bottom wall 188, a back wall 190, andside walls 192. The back wall 190 (FIG. 16) can act as a card stop whichprevents any further card insertion movement after the card has beenfully inserted in the slot. The card stop 190 sets a maximum insertionlimit for the slot 180. In the exemplary card reading operation, thecard's magnetic stripe edge 166 is the first edge of the card 160 thatis inserted into the slot 180. When this magnetic stripe edge 166 islocated adjacent to the card stop 190 then the card is in a properposition that allows its magnetic stripe 162 to be read.

It should be understood that the exemplary card reader arrangement canbe used with many different types of devices or machines that require amagnetic stripe card reader. In an exemplary embodiment, the exemplarycard reader arrangement is used with an automated transaction machine.The card reader arrangement includes a magnetic stripe reader thatcomprises at least one transversely movable magnetic read head. The readhead is movable in a direction that is parallel to the magnetic stripelength 170 after the card 160 has been fully inserted (with the longedge first) into the exemplary (extended, wide) slot 180. The magneticread head would sweep sideways across the entire slot 180, in adirection along the length 170 of the stripe 162. The magnetic read headcan also be viewed as being transversely (perpendicularly) movablerelative to the short edges 164, 165 of the inserted card 160.

During operation of an exemplary card reader arrangement, the customercan always maintain access to their card. That is, the card is notconveyed automatically (e.g., by a motor) to the inside of the cardreader. Thus, as previously mentioned, the exemplary card reader can actas a DIP type of reader. However, unlike conventional DIP readers, theexemplary card reader also has the ability to both erase data from andwrite data to the card's magnetic stripe. The exemplary card reader canalso include an encrypted magnetic read head.

In a further exemplary embodiment, the magnetic read head in the cardreader arrangement is reversibly mountable. The magnetic read head canbe mounted either to read in an upward or downward reading direction.For example, if a magnetic stripe is to be inserted face down into theslot of FIG. 15, then the read head mounting would be arranged to causethe read head to move below the magnetic stripe. Alternatively, if themagnetic stripe is to be inserted face up into the slot, then the readhead would be mounted in a manner that causes the read head to moveabove the magnetic stripe.

It should be understood that the slot 180 can also be oriented (orrotated) 90 degrees from the (relatively horizontal) slot orientationshown in FIG. 15. That is, the slot can be vertically oriented. Withsuch a vertical slot orientation, the read head would likewise bemounted to allow it to move upwards/downwards along (and parallel to)the magnetic stripe while having a relatively sideways readingdirection. As can be seen, the exemplary magnetic stripe readingarrangement allows use with a slot 180 that has been rotated anywherefrom 0-360 degrees relative to the (substantially horizontal) slotorientation of FIG. 15.

FIG. 16 shows a sectional top view of an exemplary card readerarrangement 196. The card 160 (represented by broken lines) is shownfully inserted in the slot 180 in a slot position which is adjacent tothe card stop 190. The slot has a U-shape or horseshoe shapeconfiguration that allows for a user's thumb and finger(s) to stillgrasp the card while it is fully inserted. The U-shape configuration isalso represented in FIG. 15. For ease of understanding, the FIG. 16elements have been positioned in substantial alignment with thecorresponding elements of FIG. 15. For example, the card 160 in bothFigures is substantially aligned.

In FIG. 16 a magnetic read head 200 is movably mounted in a manner thatallows it to read data from the magnetic stripe 162 of the card 160. Theread head 200 is mounted in operatively supported connection with amount 202, such as a movable support carriage (or assembly). The mount202 is movable both ways in a direction that is parallel to the length170 of the inserted card's magnetic stripe 162. The position of the readhead 200 along the magnetic stripe 162 is changeable through operationof a read head positioning device 204 that is in operative connectionwith the mount 202. The drive device 204 can include any number ofmovement devices, such as a motor, solenoid, cylinder, shape memoryalloy element, piston, pulley, and/or another suitable element that isoperable to selectively move the read head 200 parallel relative to themagnetic stripe edge 166.

In FIG. 16 the read head 200 is shown a at an initial starting position206. During reading, the read head support carriage 202 is moved(pushed, pulled, slid, etc.) along carriage guides 208, 210, which cancomprise a pair of rods, tracks, apertures, etc. The shown outline 212of the read head carriage represents the read head's position 214 aftera completed reading of the magnetic stripe 162. The read head 200 can bereturned to its initial starting position 206 before the next readingbegins. Alternatively, in some embodiments the read head 200 can readboth ways along a magnetic stripe. That is, in an alternative embodimentthe read head can start from the (outline) position 214 when beginningthe next stripe reading.

FIG. 17 shows another exemplary movable mounting arrangement for amagnetic read head assembly. The read head 220 is positioned in aretainer 222. The retainer 222 includes a first projection 224 thatextends in and is movable in a first aperture 226. The retainer 222 alsoincludes a second projection 228 which is movable in a second aperture230. A retainer-holding tension spring 232 extends through a saddle area234 of the retainer housing 222. The saddle area 234 includes twoprojections 236, 238 which accept the spring 232 there between.

The read head 220 can read data from the magnetic stripe 240 of a card242 that has been inserted into the exemplary wide slot 244. The slot244 has (relatively) a top wall 246 and a bottom wall 248. The card 242is shown abutting a card stop 250. The read head 220 can move in adirection in and out of the Figure, which direction is parallel to thecard's long edge.

The exemplary biased (spring) mounting arrangement of FIG. 17 allows theread head 220 to float so that it can maintain nearness with a magneticstripe positioned adjacent thereto while also reducing risk of snagginga card portion as the read head moves along the magnetic stripe. Themovable character of the mounting allows for both angular and verticalmovement of the read head 220. Furthermore, the biased spring mountingcan be readily disengaged, which enables readily replacement of themagnetic read head 220. It should be understood that these describedapproaches (FIGS. 16 and 17) for mounting a movable magnetic read headto enable data to be read from a magnetic stripe of a card positioned ina wide slot are exemplary, and in other embodiments other read headmounting approaches or arrangements can be used.

One or more card detection sensors can be positioned adjacent to a cardslot. For example, as shown in FIG. 16 a position sensor 194 is locatedadjacent to the back wall stop 190 to detect when the card 160 is inproximity to the stop. Thus, a card that abuts or touches the stop 190would trigger its detection by the sensor(s) 194. The sensors areoperable to sense that the card 160 has been fully inserted into theslot 180, and is thus properly situated in a card reading position thatallows the magnetic read head 200 to read its magnetic stripe data 162.

The sensors 194 are in operative connection with at least one computer.The computer may (or may not be) located in the machine (e.g., anautomated transaction machine). The computer can receive signals fromthe sensors 194 which indicate that the card 160 has been fully insertedinto the card slot 180, and is thus ready to be read. The signals can bewirelessly transmitted by the sensors. In response to receiving thesignals, the computer can cause the positioning device 204 to move theread head 200 along the entire length of the magnetic stripe 162 of thestationary card 160 to read the tracks' magnetically encoded data.

FIG. 18 shows a card 260 in a card slot 262 of another exemplary userfascia portion (or bezel) 264. A portion of a read head assembly 266 isalso shown.

FIG. 19 shows another exemplary card reader arrangement 270. Thearrangement includes the bezel 264 in conjunction with a card readerhousing 272. The housing 272 can include a positioning device thatcauses the read head to be driven along the length of the magneticstripe of the card 260.

An exemplary card reading operation involving an automated transactionmachine will now be described with regard to FIG. 15 and FIG. 16. Amachine controlling computer prompts (e.g., through a machine display)the machine user to insert their card. The card holder inserts theircard 160 into the card slot 180. The side of the card that enters theslot first is the card's long edge 166 which is closest to the magneticstripe 170. In this reading operation the magnetic stripe 170 facesdownward. However, in other similar reading operations the magneticstripe can instead face upward. The U-shaped fascia portion 182 includesa centrally positioned indented finger area (also see FIG. 18) whichallows the user to grasp a fully inserted card after it has been read.The sensor(s) 194 detect when the card 160 has been fully inserted inthe slot 180. A card reader controlling computer (which controls thecard reader 196) acts in response to receiving signals from the sensor194 to cause the card to be held substantially stationary in the slot.The card reader controlling computer also acts to operate the drivedevice 204 to cause the read head carriage 202 to be driven along theguides 208, 210. This carriage movement causes the magnetic read head200 to be moved under, parallel to, and along the entire length of thedownward-facing magnetic stripe 170 while reading data from one or moretracks in the stripe 162. Thus, during card reading the carriage 202 ismoved from its initial position 206 to its end position 214. Thecarriage is then returned to its initial position 206. Following adetermination by a computer that the card was successfully read, thecard reader controlling computer causes the card to be released. Themachine controlling computer then prompts the user to remove their cardfrom the slot.

In another exemplary arrangement, the slot 180 can also be relativelyoversized for receiving cards. That is, the slot width (which extendsbetween the side walls 192) can be modified to be intentionally sized tobe much wider than the long edge 166 of a card 160. Because of the give(or play) that would exist between the card's short edges 164, 165 andthe slot's wider side walls 192, an inserted card could be in severaldifferent sideways positions relative to (and between) the slot's sidewalls 192. For example, an inserted card may have a short edge 164abutting a first slot side wall which causes a relatively large gap tooccur between the card's other short edge 165 and the other (second)slot side wall.

In an exemplary embodiment, the magnetic read head is operably mountedto sweep along the entire width of the oversized slot width. Thus, theinserted card's magnetic stripe can be read no matter where it might belocated relative to the wide slot's side walls 192. This card readerarrangement, with its excessively wider slot feature, makes it even moredifficult for criminals to intercept mag stripe data with anunauthorized reader device, because they don't know exactly where thecard will be positioned (between the slot's side walls) in the slot. Itshould be understood that the slot width could be very long, includingwidths greater than twice the length of a card's long edge. The extrawide card slot may cause an adjacently positioned unauthorized cardreading device to miss reading any part of a magnetic stripe because thestripe may be located outside of the range (width) of the unauthorizedreader device.

Also, because of the moving speed of the read head and the large readingarea covered by the read head, slight card movement (such by the carduser) of an inserted card due to the excess length of the exemplarywider slot usually would not hinder card data reading during the readingoperation. Nevertheless, in order to prevent sideways movement (and alsocard removal direction movement) of an inserted card during stripereading, the card can be held by an (additional) card holding devicethat operates to hold a card stationary during its reading. For example,an additional card holding device can include one or more movable armsthat extend downward through the slot's top wall 186 (or upward throughthe slot's bottom wall) to press the card against the slot's bottom (ortop) wall 188. Upon receiving signals from the card position sensors,the computer can cause operation of the card holding device toengagingly abut (and secure) a fully inserted card to prevent anyunwanted movement. After the card reading is completed, the computerwould then instruct the card holding device to release the card, whichenables the user (or a card ejection device) to move the card in adirection out of the slot.

In other exemplary embodiments of the card reader arrangement, themagnetic stripe reader device can operate ambidextrously with regard towhich way a magnetic stripe is facing in the slot. For example, themagnetic stripe reader device can include plural (e.g., top and bottom)movable magnetic read heads. The reader device can include a firstvertically positioned (upward reading) movable read head that isoperable to read a magnetic stripe that faces downward in the wide slot.The reader device can also include a separate second verticallypositioned (downward reading) movable read head that is operable to reada magnetic stripe that faces upward in the slot. One or more magneticsensors located adjacent the rear of the slot can detect when a magneticstripe is in proximity to a respective magnetic sensor, which is inoperative connection with the at least one computer. The computerreceives signals from the magnetic sensor(s) which it uses to determinewhether the magnetic stripe has been inserted downward or upward in theslot. Based on the determination, the computer then causes theappropriate read head (i.e., either the first or second read head) to bemoved laterally across the slot to read the magnetic stripe data.

In still other embodiments, both the top (first) and bottom (second)read heads can be simultaneously operated. For example, the first secondread heads can share a common movable mount. Each read head attempts toread a magnetic stripe as the mount sweeps parallel to the stripe. Fromthe two separate but simultaneous readings, the computer then determines(and uses) the magnetic track reading which best corresponds to validcard data.

An exemplary card reader arrangement can also read a computer chip on asmart card. In one exemplary embodiment, the card slot widthsubstantially corresponds to the same length of the card's long edge.Because of the similar length of the card's long edge and the slot'swidth, the chip location of a fully inserted card can be predetermined.This arrangement allows the chip to be engaged by card reader contactswhich are fixedly positioned relative to the card slot at a precisereading location.

FIG. 20 shows an alternative exemplary embodiment of a card readerarrangement which allows the previously discussed extra wide card slotfeature to also be used for reading data from the chip of a smart card.The card reader arrangement 280 permits the reading of an integratedchip 282 on the smart card 284 inserted in the extra wide slot 288.Again, the slot 288 has a much greater width than the length of thecard's long edge 286. Thus, the location of the chip in the slot may beinitially unknown to the reader.

A linear array of photo sensors 290 are positioned adjacent to the wideslot 288. These sensors are able to sense the card 284 (or its chip)position in the slot 288. A computer receives the information sensed bythe sensors 290. Based on this information, the computer determineswhere the card's chip 282 is positioned in the slot's grid.

In a manner previously discussed, a movable carriage assembly 294 isused to support the card reader's contacts. The carriage is movable inat least two perpendicular directions. Movement of the carriage iscontrolled by a computer. The computer causes the carriage 294 to bemoved to the determined chip position in the slot grid to cause thereader contacts to engage the smart card contacts 282. Therefore, thepreviously discussed wide slot feature (of an exemplary car readerarrangement) can be separately used with both a card reader that onlyreads magnetic stripe cards and another card reader that only readssmart chip cards. FIG. 20 also shows a substantially U-shaped userinterface bezel portion 292.

Furthermore, another exemplary card reader arrangement allows use of thesame long edge wide slot for a single card reader device that can readboth a magnetic stripe and/or a smart chip. For example, a combinationcard reader assembly can structurally include both the magnetic stripereading ability of FIG. 16 and the smart chip reading ability of FIG.20. Thus, the combination card reader assembly can read data fromwhichever type of card (stripe or chip) was inserted into the assembly'scommon (single) slot. The combination card reader assembly may also readdata from both a magnetic stripe and a smart chip of a same card. Thesame long edge wide slot may also be an extra wide slot, as previouslydiscussed.

In a further exemplary embodiment, the card reader arrangement does notuse a magnetic read head. Rather, the card reader arrangement usesliquid crystal display (LCD) technology to read the data from a magneticstripe of a card that was inserted long edge first into a card slot. Thecrystals include materials that are magnetic within the liquid material.A thin magnetic liquid crystal pane of clear material (e.g., glass)becomes placed adjacent to the magnetic stripe of an inserted card. Theliquid crystals produce images because of magnetic force variations inthe stripe adjacent the pane. The images are produced as an opticaloutput which corresponds to the magnetic flux reversals on the tracks ofthe magnetic stripe. An imaging sensor is then used to read the opticaloutput. The image reader reads optical data that represents the magneticdata on the card.

In the exemplary embodiment the imaging sensor may include one or moresensors that operate to produce data that corresponds to sensed images.In an exemplary arrangement, the imaging sensor is in operativeconnection with at least one processor. The at least one processorexecutes software instructions that are operative to analyze the imagedata and resolve the alphabetical and/or numerical charactersrepresented by the patterns produced in the liquid crystal material inresponse to the magnetic fields and the variations thereof in the tracksencoded on the magnetic stripe. The processor may operate in accordancewith its programming to resolve the data represented by each track suchas the card holder's name, the account number data and otherinformation. Such data may then be used through operation of one or moreprocessors in the machine in carrying out transactions.

In some example embodiments, the track data may be read by placing thecard flush against a surface which includes the liquid crystal materialwhich enables reading of the magnetic data. Such a surface may beincluded on an external surface of the automated banking machine ormight be internal to the machine. Such an approach may have an advantagein that the magnetic data is able to be read without card movement intoa slot or other orienting structure that might make interception of dataeasier. In some example embodiments, the surface and sensing arrangementmay allow the card to be read in any orientation in which the stripe isin adjacent relation with the sensing surface. The image sensors mayoperate to resolve the data regardless of where the lines of data areproduced in the liquid crystal material. This may further makeinterception of such card data difficult.

In still other example arrangements, a surface which includes materialfor sensing magnetic data in the stripe could be opposed by areas of themachine which include one or more other imaging sensors such as acamera. Such a camera or other imaging sensors may capture images of theside of the card that is opposite the side that includes the magneticstripe. Such a camera or sensors may be in operative connection with oneor more processors which operate to analyze the image data. Such one ormore processors may operate, for example, to locate the boundaries ofthe card. By locating the boundaries of the card, it may enable theprocessor analyzing image data from the opposite side of the card whichincludes the stripe, to more readily find the stripe data within theimages produced by the liquid crystal material so that the data may beresolved more quickly. Alternatively or in addition, in otherembodiments the camera or other sensors may analyze data included on theopposite side of the card which may include printed or embossed data.This may include, for example, printed or embossed data whichcorresponds to the card holder's name, account number or other data.Computer executable instructions such as character recognition softwaremay resolve data from the face of the card that does not include themagnetic stripe. Such data may, in some embodiments, be compared to thedata resolved from the stripe for purposes of assuring that the data hasbeen read from the stripe and/or the face of the card correctly.Further, in still other embodiments, correspondence between data readfrom the side of the card opposite the stripe may be required tocorrespond to stripe data before a transaction will be processed. Thismight be done, for example, to avoid a situation where a blank card hasbeen encoded with stolen data from a genuine user's card. Terminals may,for example, create counterfeit cards by encoding the customer data froma genuine card onto a blank card and attempting to use that to conduct atransaction at an automated banking machine. By determining that such acard with a blank face opposite the magnetic stripe surface is beingused, the machine may operate in accordance with its programming to denythe transaction.

In still other example embodiments, other data that is encoded, written,printed or otherwise on the face of a card opposite the magnetic stripemay be used for purposes of further helping to verify that a card isgenuine. This might include, for example, data about the nature of thefinancial institution card issuing entity, or other entity which isrepresented on the card. For example, cards may indicate the name of theparticular bank and/or the name of the particular card issuingorganization that has provided the card. This data may be resolved fromimages captured of the side of the card opposite the magnetic stripe.The magnetic stripe itself includes data representative of the financialinstitution and/or the card issuing organization. By making sure thatthe visible data corresponding to such an institution or organization ispresent on the card, and corresponds to the data read from the stripe,the risk that a counterfeit card produced by a criminal is being used toattempt to conduct a transaction, is reduced. Of course these approachesare exemplary, and in other embodiments other approaches may be used.

FIG. 21 shows an example of a card reader arrangement that has dual readheads. One read head 296 is operable to read data from a first side 297of a card 295. The other read head 298 is operable to read data from theother side 299 of the card 295. The respective read heads 296, 298 aremovable back and forth in the directions of the respective arrows. Thedual read heads allow for reading of either side of a card. The dualread heads also allow for simultaneous reading of data from both sidesof a same card. Each respective read head 296, 298 can be motorized tomove along one or more tracks that support the respective read head.

FIG. 22 shows another exemplary embodiment of a card reader arrangementfor an automated transaction machine. The card reader arrangement 300uses one or more movable read heads to read card data from a magneticstripe 302 of a card 304 that was inserted long edge first into the cardreader 300. The arrangement includes a card carrier 306. The arrangementcan also include at least one processor or computer (which may besingularly referred to herein as a processor).

FIG. 23 shows a front view of a portion of the card reader arrangement300 and the card 304 taken along A-A in FIG. 22. FIG. 24 shows a sideview of the card reader arrangement 300 and the card 304 taken along B-Bin FIG. 22.

The carrier 306 has sides 308 into which a customer's card is inserted.The carrier 306 also has a stop wall 310. In the exemplary embodiment,each carrier side 308 is substantially U-shaped to form a groove inwhich the card 304 can slide. One or more switches 312 are associatedwith each side 308. The switches 312 are positioned to be engaged by thecard 304. The switches 312 are in operative connection with theprocessor. The switches 312 are activated when the card 304 issubstantially fully inserted long edge first in the carrier 306. Theside switches 312 will not be activated (tripped) if the card 304 isincorrectly inserted short edge first.

The switches can be selectively positioned so as to be contacted by acard's top surface, bottom surface, or side edges. In an exemplaryembodiment, the switches 312 are engagingly pushed inward by the card304 to cause their activation (or be set/tripped on), in otherembodiments two or more side proximity sensors can be used as switches.In still other embodiments light beams (e.g., a laser) can be used asswitches to detect when a card is fully inserted in the carrier. Forexample, on a first side of the carrier a first beam would flow from atop transmitter to an opposite bottom receiver. On a second side of thecarrier a second beam would flow from a top transmitter to an oppositebottom receiver. A card can be inserted between the correspondingtransmitters and receivers to break the two beams. As a result of thetwo beams being broken, the card is deemed to be properly fully insertedin the carrier.

If only one switch 312 is tripped, then the processor of the card readerarrangement 300 can determine that the card was wrongly inserted shortedge first. Upon such a determination the customer can be notified (viaa display, etc.) of how to properly insert the card. The notificationcan include the blinking of lights adjacent to card slot 314 of the userfascia panel 316, which slot provides entry to the card carrier 306.Similarly, a customer can be notified (via a display, etc.) of aproperly inserted card.

In an exemplary embodiment, when both switches 312 are activated thenthe card 304 is held in the carrier 306 to prevent movement of the card304. For example, a mechanical latch or compress can be used to hold acard 304 when it is detected as being fully inserted in the carrier 306.The card holding mechanism can be controlled by the processor.

The card carrier 306 is movable a short distance in the card insertiondirection. A further manual pushing of the card 304 inward causes thecard to in turn further push the carrier 306 inward. When the carrier306 is fully pushed inward (fully inserted), then it is properlypositioned to enable the card 304 to be read by a movable read head. Thelength X-Y in FIG. 21 shows the distance the carrier can be furtherpushed inwardly relative to a front fascia panel 316. In an exemplaryembodiment the read head only operates when the card carrier 306 isfully inserted.

In an exemplary embodiment both switches 312 must be activated in orderto permit carrier 306 movement inwardly. Otherwise the carrier 306remains in a locked/held condition at its card insertion position. Thecarrier locking arrangement can involve mechanical, magnetic, and/orelectrical systems. A mechanical latch can be used to hold the carrierin its card insertion position. The carrier holding mechanism can becontrolled by the processor.

One of more sensors can be used to enable the processor to determinethat the carrier 306 is fully inserted, at which point the carrier 306can be held at its inserted (card reading) position. The holdingarrangement can involve mechanical, magnetic, and/or electrical systems.For example, a mechanical latch can be used to hold the carrier at itscard reading position. The carrier holding mechanism can be controlledby the processor. The carrier 306 can be automatically released (frombeing held) after the card 304 has been read. The carrier releasingmechanism can also be controlled by the processor.

The carrier 306 can be continually placed under a biasing force(provided by one or more biasing members) that acts to push the carrier306 toward its card insertion (initial) position. After the carrier 306is automatically released from being held in its card reading position,the biasing members 318 (e.g., springs) act to move the carrier 306outwardly to its card insertion position. The springs 318 return thecarrier 306 to its initial position for use by another customer. Thus,an inserted carrier 306 is auto ejected (by springs) following a cardreading. In an alternative embodiment, a drive device is used to drivethe carrier 306 back to its initial position. The carrier drive deviceis controlled by the processor.

The rear of the carrier 306 can be attached to one or more springs 318to provide the biasing force that pushes the carrier 306 toward its cardinsertion (outward) position and away from its card reading (inward)position. Manual force supplied by a customer can overcome this springloaded force to cause carrier 306 insertion.

In another exemplary embodiment, instead of being manually pushed/driveninward, the carrier 306 can be automatically driven inwardly to its cardreading position by a carrier drive device in response to activation ofthe switches. After card reading, the carrier 306 is again returned toits customer position by the biasing return force (or instead by thecarrier drive device operating in reverse).

Instead of the carrier 306 being automatically released (from beingheld) following a card reading, another exemplary arrangement requiresthe customer to manually push the carrier 306 inwardly a short distanceto release the carrier 306 from being held. For example, when amechanical latch is used to hold the carrier 306 at its card readingposition, then the further inward movement of the carrier 306 causes thelatch to be released from its latching position. This release allows thecarrier 306 to be spring-returned toward the customer. After their cardhas been read, then the customer can be notified to push against theircard (which in turn pushes against the carrier) to cause the card to bereturned to the customer. Again, to prevent a customer from prematurelyremoving an inserted card by pushing against the card, the carrier canbe locked in its reading position until the card has been read (or thetransaction canceled by a user).

In a further exemplary embodiment, the carrier's two sides (or arms)provide some play to allow for easier card insertion. One or both sidesare spring-loaded to allow the sides to be movable a small distanceoutward relative to each other. Thus, as the card is being manuallyinserted into the carrier 306, the sides can relatively expand outwardlysideways. This allows a card to be inserted at an angle that is notexactly ninety degrees (or at a ninety degree angle that is shiftedright or left). The carrier's sides then return to their initial(pre-card) position to cause the inserted card to be rotated(straightened) to the ninety degree angle, at which angle it is securelyheld by the carrier sides in the carrier 306.

In an exemplary embodiment, a magnetic read head of the card readerarrangement 300 has physical security, electrical security, and/orvisual security.

FIG. 25 shows a read head 320 being hermetically sealed, such as to amember 322 comprising a circuit card or a flexible circuit. This sealingdeters/prevents improper devices from being connected to the read head.For example, the sealing deters wiretaps. Thus, the read head 320 hasphysical security.

FIG. 26 shows the read head 320 is associated with an impedance changedetector 324. The detector 324 can comprise an amplified filterimpedance circuit. The detector 324 includes sensing circuitry that isconnected to wires 326 that come from the read head 320. A change in theimpedance on these wires 326 may indicate the presence of a wiretap. Thedetector 324 can be connected to a local processor 327. The impedancechange detector 324 is usable to detect when electrical connectors(e.g., added by criminals) have tapped into the electrical connectionsto the read head 320. Thus, the read head 320 has electrical security.The impedance change detector 324 can also have its own processor.

In the exemplary embodiment the read head 320 also has visual security.In the exemplary embodiment, a transparent cover is located above thecard carrier. This see-through cover allows the customer to see theirinserted card while it is being read by the read head. Customers can betrained to notice fraudulent devices associated with the reading of userdata.

FIG. 27 shows a transparent cover 328 that allows portions of a cardcarrier 330, carrier sides 331, 333, and switches 332 to be seen throughthe cover. The switches can be a type that gets slidingly pushed inwardinto a side wall 331, 333 by a card being inserted in the carrier.Likewise, a customer card when inserted into the carrier 330 can also beseen through the transparent cover 328. The transparent cover includes athumb hole 334 to allow a customer to easier grasp their card. Thetransparent cover can be part of a user fascia section 336 that includesa card slot 338.

FIG. 28 shows another exemplary card reader arrangement 340. Asubstantially flat section 342 of a user interface (or user fascia) ofan automated transaction machine includes a visible outline 344depicting a card. Instructions are provided for a customer to placetheir card onto the outline. These customer instructions can be placed(e.g., written) on the user interface (or some other part of themachine), output through a user display device, etc. For example,instruction may state “Place Card Here.”

FIG. 29 shows a card 346 properly positioned relative to the outline 344(and instructions). The card 346 can be placed into the shown positionby the customer prior to reading of the card data. The card can also bereleased to this position by the card reader arrangement 340 after areading of the card data, as explained in more detail later.

Outside of the outline area 344 are card retainers 350, 352, 354, 356.These card holding members (retainers) project (extend) upwards from theflat interface section 342 a distance greater than the thickness of thecard 346. Each card retaining arm 350, 352, 354, 356 is movable in atleast two directions, including directions toward and away from theoutline 344. They can slidingly move through respective slots (openings)in the user interface.

FIG. 29 shows each card retainer located in its non holding (open)position. FIG. 30 shows each card retainer located in its card holding(closed) position. The card holding members can act together to overlapand press against each side of the card 346 to cause the card to befirmly held (retained) in a fixed position. While in this held position,the card 346 is prevented from movement that would jeopardize the carddata reading operation. While the card is being held, it can be properlyread by one or more movable read heads.

FIG. 31 and FIG. 32 show a side views of examples of usable shapes ofcard retaining members. A set of four card retainers used can each havea similar shape. FIG. 31 shows the card holding member 350 having anL-shape. FIG. 32 shows a different card holding member 351 having aV-shape entry 353. For each arm a card can enter its V and then slidethere against. The four V shapes assist in providing horizontal (flat)alignment of a received card. It should be understood that other shapes(e.g., U-shape) may also be used. It should also be understood that aside retaining member may be comprised of a plurality of separated armsinstead of a continuous single arm.

While a first leg 348 of the L-shape is moved inward toward a positionthat engages the card 346, the second leg 358 is moved to a positionthat is above (overlies) the top surface of the card. Inward movement ofthe first leg 348 of each retaining arm causes a skewed card to besubstantially deskewed (aligned) relative to the outline 344. Theoverlying legs 358 prevent the card from being taken (e.g., lifted up)by the customer. The retaining arms 350, 352, 354, 356 are returned totheir open (released card) position (FIG. 29) after the card has beenread. The space between adjacent arms is configured to allow acustomer's finger to engage and lift a corner of a released card.Movement of the retaining arms is controlled by a processor associatedwith the card reader arrangement 340.

The retaining arms 350, 352, 354, 356 can be moved between a same hold(closed) position and a same release (open) position for every cardreceived. Alternatively, sensors can be used to adjust the arm movementtoward a secure hold for different sized cards. A first set of sensorscan measure fore between the arms 350 and 354. When a predeterminedforce level is reached, then the card is deemed securely held at thelong edges of the card. Likewise, a second set of sensors can measureforce between the arms 352 and 356. When a predetermined force level isreached, then the card is deemed securely held at the short edges of thecard. Contact sensors, which respectively sense contact of the four legswith the four sides of the card, can be used in lieu of force sensors.

In a further exemplary embodiment each card retainer arm 350, 352, 354,356 is also movable in upward and downward directions. After the legs348, 358 have been moved as previously described, then the respectivearm is moved downward to cause the legs 358 to engagingly clamp againstthe card. The legs 358 can be moved to a same clamping (closed) positionfor every card. Alternatively, for use with cards of differentthickness, sensors can be used to detect when a predetermined clampingforce has been reached, where the clamping force is sufficient to securethe card. Contact sensors can also be used.

In an exemplary embodiment a card is placed in the outlined area 344with the card data (e.g., magnetic stripe) facing downward. A door islocated below the outline 344. After the card is held fixed by theretainer arms 350, 352, 354, 356, the door is lowered and then slidsideways to an open position. FIG. 33 shows a side view of such movementof a door 360 while a card 362 remains held by opposite retainer arms364, 366 (which have been moved to their card holding position). Thedirection of the door movement is indicated by the shown arrows 370,372. The direction of the arms movement is indicated by arrows 374, 376.

A door can comprise a sliding door (e.g., door 360) or a swinging door.A sliding door gets moved in a horizontal direction (sliding movement).A swinging door gets moved in a pivoting direction. A swinging door cancomprise a single door that pivots about a hinge arrangement. A swingingdoor can also comprise a double door, with both doors pivoting about arespective hinge arrangement. Both doors would hang downward when open.

A read head is movably located below a held card. The read head issupported by a member that is both horizontally and vertically movable.The read head is vertically moved (upward) to contact the card. The readhead is then horizontally moved parallel (sideways) along the card data(e.g., magnetic stripe) to read the data.

In a further exemplary embodiment, a card reader arrangement uses liquidcrystal display technology to read data from a magnetic stripe of acard, as previously discussed. The crystals include materials that aremagnetic within the liquid material. A magnetic liquid crystal pane ofclear material (e.g., glass) is located adjacent to the magnetic stripeof a held card. The pane can be part of an outline area where a card isplaced by a customer. Alternatively, the pane may be moved flush with acard after the card is held by retaining arms. The liquid crystalsproduce images because of magnetic force variations in the magneticstripe. An image reader (e.g., a camera) is then used to read theoptical output (images), which represents the magnetic data on the card.The read data can then be used through operation of one or moreprocessors associated with the machine in carrying out transactions.

In another exemplary arrangement, a customer places their card on asubstantially flat outline area, as previously discussed. The outlinecan comprise a transparent panel (e.g., clear glass). The card is firstplaced with its visible data (front side of card) facing downward. Acamera situated below the transparent area operates to read the card'sfront side data (e.g., account number data). The customer is theninstructed to turn the card over so that its back side faces downward.The camera then operates to read the back side data (e.g., signature,name, code, etc.). Software analyzes the front side and back side imagesto resolve card data usable in a transaction. This arrangement can avoidneed for a card reader. In the arrangement the card may also be held ina secure position by retaining arms, in a manner as previouslydiscussed.

Unauthorized card readers are commonly associated with card slots. Theexemplary embodiments may have an advantage with respect to anti-fraudin that the card data is able to be read without use of a card slot orother orienting structure that might make interception of card dataeasier. Thus, the novel card reading arrangements described hereinassist in deterring use of unauthorized card readers because the flatinterface configurations employed, remove any need to insert a card intoa card slot.

Unfortunately, dirt and dust may collect on the read head during cardreading (and during rest). A cleaner is structurally and functionallyconfigured to clean a (magnetic) read head of a card reader. The cleaneris able to keep the read head (or sensor) free from dirt/dust, moisture,ink, etc. The cleaner structure can be in the form of a wiperarrangement (which may also be referred to herein as a wiper). A wipercan be mounted to a supporting structure which allows it to be quicklyand readily replaced. For example, a wiper can have an upper supportbase, which is mounted to a support in a card reader. The mounting cancomprise any of a plurality of well known fastening arrangements. Forexample, the upper support base can comprise hooks configured to engagein corresponding slots in a support in the reader. Alternatively, theupper support base can comprise slots configured to receive supporthooks. Other types of fasteners or connecting arrangements can be used,including pins, screws, bolts/nuts, magnetic, etc.

Each wiper can include a plurality of wiper components (wiper arms). Thewiper arms can be individually attached to the upper support base,enabling each wiper component to be individually replaced. A wiper armcan comprise one or more materials, including materials that are atleast one of smooth (e.g., a substantially even consistency), absorbent(e.g., able to soak up liquid), soft (e.g., not course or rough intexture), etc. For example, a wiper arm material can include a fabricthat is able to remove (e.g., pickup) unwanted material (e.g., dust)that may be on (attached to) the outer surface of a read head. A wipermay also be used as a chamois.

Also, different wiper arms of a wiper can be made of differentmaterials. For example, some arms may be made to collect dust, whereasother arms of the same wiper are made to collect fluids. Wiper arms(duster arms) directed to dusting can have a material that draws dust tothe arm. For example, a duster arm can have fibers that cause a smallelectrostatic charge to be produced when these fibers are moved relativeacross the read head. This charge may enhance dust collection. Thefibers may comprise nylon, polypropylene, etc.

In one exemplary embodiment the read head gets cleaned by moving throughone or more mounted wipers. For example, the wiper can be mounted onboth sides of the card reader. That is, at least one wiper is positionedat each end of read head travel. As a result, during a card readingoperation the read head starts off wiping across (engaging) a cleaningwiper located adjacent one side (of the card), then ends up wipingacross another cleaning wiper that is located adjacent the other side(of the card). This wiper positioning enables the read head to getcleaned at both the beginning of each read and at the end of each read.Thus, each reading operation can include both a pre-read cleaning (ofthe read head) followed by a post-read cleaning (of the same read head).

This wiper arrangement allows use of a magnetic read head that can movealong a magnetic stripe in either direction to read data from a card.That is, in order to read the card's magnetic stripe, the read head onlyhas to make one pass across the card. For example, the read head travelsfrom a first side to a second side, and then stays at the second side.To read the next card the read head travels from the second side back tothe first side, and then stays at the first side. As can be appreciated,the ability of the read head to read card data while moving in eitherdirection results in less wear on the read head and its transportmechanism.

The dual cleaning action caused by the side-positioned wipers maintainsthe ability of the read head to read cards effectively and efficiently.The wiper cleaning arrangement and its strategic positioning alsoimprove reading reliability of the read head, resulting in greater cardreader uptime.

FIG. 34 shows a front view of a read head cleaning arrangement. A card380 having a magnetic stripe 382 is in a position to be read by a readhead (or a read head assembly) 384. Wiper arrangements 386, 388 arerespectively located adjacent opposite sides of the card 380. The readhead 384 is movable in both directions along an axis 390, as representedby double ended arrow D. In operation, the read head 384 will move fromits initial position 392 adjacent to a first side of the card 380 towardthe wiper 386, then pass through the wiper 386, then read data from themagnetic stripe 382, then pass through the other wiper 388, and thenmove to a stop (end) position 394 adjacent to the second (opposite) sideof the card. The read head 384 will remain stationary at this stopposition 394 until a next reading of a magnetic stripe is needed. Afterthis next reading the read head will again be stopped at the initialposition 392 adjacent to the first side of the card 380.

FIG. 35 shows a side view taken along the direction A-A in FIG. 34.Again, the read head 384 is movable along the axis 390. As can be seen,the read head will first have to move (from the initial position 392)past the wiper 386 before reaching the magnetic stripe 382 of the card380. It should be understood that the wiper configuration can cause theentire top area of the read head to be wiped.

In other exemplary embodiments, wipers can be moved to clean a read headwhile it remains stationary. A wiper mounting structure causes movementof the wiper relative to the stationary head when the head is in anat-rest position. A wiper moving mechanism (or drive) causes the wipermovement. Moving the wiper over the head may provide additional cleaningin comparison to moving the head through the wiper.

FIG. 36 shows card reader wipers 400 and 402, a read head 404, and acard 406 having a magnetic stripe 408. The wiper 400 is movable (asrepresented by the double arrow) over an upper portion of the read head404. A drive device 407 can cause a wiper support 409 to be moved alonga path (e.g., a track) 410. As shown, the wiper 400 can be moved betweena first position (solid line) and a second position (broken line) whilecleaning the read head 404. During cleaning the read head 404 can remainstationary. When the read head is stopped at the other end of the card,then it can be cleaned by the other movable wiper 402.

In an exemplary embodiment both the read head and the wiper are movableto cause cleaning. For example, the read head is cleaned by movingagainst a (stationary) wiper on its way to reading card data. However,when the read head has been idle from reading for a lengthy period, thenthe wiper is moved over the read head to cause the cleaning. Thus, theread head can be kept clean.

In other embodiments the wiper's support can be rotated 90 degrees,which allows the same wiper to pass over the read head in perpendiculardirections. That is, the wiper from an initial position can travel in afirst direction across a read head, then return in a second (opposite)direction to the initial position, then be rotated, then travel in athird direction across the read head, then return in a fourth (opposite)direction, and then be rotated back to the initial position. Wipingagainst the read head in different directions may produce enhancedcleaning.

Still other embodiments can have wipers that are perpendicularlyarranged relative to each other. One wiper can move (e.g., east andwest) along a first cleaning path, whereas the other wiper can move(e.g., north and south) along a second cleaning path which isperpendicular to the first path. A controller can be programmed to causethe wiper drives to move in a predetermined sequence.

FIG. 37 shows a flexible wiper arm 412 passing over a read head 420 inthe direction of the arrow. The wiper 412 is shown in different phasesof its movement. In a first position 414 (solid line) the wiper 412 isin cleaning contact with the read head 420. In a second position 416(broken curved line) the wiper 412 is still cleaning. In a thirdposition 418 (broken straight line) the wiper 412 is out of contact withthe read head 420. From the third position 418 the wiper 412 is ready tobe moved back over the read head 420 in the opposite direction to itsnormal resting position.

FIG. 38 shows an exemplary embodiment of a wiper 422. The wiper 422 hasa unitary structural body 424 that comprises plural wiper arms 426. Thearms 426 can be formed by having vertical slits 428 in the lower portionof the body 424. Each slit 428 is between two adjacent arms 426. Theslits 428 can be produced by substantially parallel spaced cuttings tothe body 424.

FIG. 39 shows another exemplary embodiment of a wiper arrangement 430.The wiper 430 comprises plural rows 432, 434 of wiper arms 440. Asshown, a second row 434 is located behind a first row 432. The wiperarms 440 in the first row 432 are shown in solid lines, whereas thehidden parts of the wiper arms 440 in the second row 434 are shown inbroken lines. The second row 434 is laterally shifted from the first row432 in order to cover any gaps (spaces) that may exist between thelaterally adjacent arms 440 in the first row. This overlapping of rowshelps to prevent the occurrence of gaps in contact with the read headduring cleaning. As can be seen, both the first 432 and second 434 rowsare supported by a same wiper hanging rack 436. The wiper arms 440 inthe first row 432 are each removably attached to the first side 438 ofthe rack 436. The wiper arms 440 in the second row 434 are eachremovably attached to the second side 442 of the rack 436.

As previously discussed, the wiper arms can be supported by a rack by aplurality of different fastening techniques, including hooks, pins,screws, bolts/nuts, magnets, etc. In an exemplary embodiment the rackincludes hanging hooks.

In FIG. 39 the particular first row arm 444 is shown having a hanginghole (aperture, opening, slot) 446. During installation or replacement,this arm is supported on a hook 448 that extends through the hole 446.The hook 448 is fastened to (or an integral part of) the rack 436.

Again, a wiper may be comprised of one or more rows of wiper arms. Forease of understanding, only a single (first) row of wiper arms has beenshown in the wipers of FIGS. 34 and 35. Otherwise, the upper portion ofthe read head in FIG. 35 would be blocked out due to the gap preventingadditional rows of wiper arms located behind the shown first row.

FIG. 40 shows a further exemplary embodiment of a wiper 450 that ismovable over a read head 452. The wiper 450 can move on a track 454 thatcurves about the read head. That is, the curved track 454 follows thecontour of the outer upper surface of the read head 452. The track 454is positioned so that the wiper 450 moves in a direction that would besubstantially perpendicular to the magnetic stripe of an inserted card.The read head would move substantially parallel to the magnetic stripe.Thus, movement of the wiper 450 is perpendicular to movement of the readhead 452. With the exemplary arrangement, the track/wiper will notinterfere with the read head moving toward a card.

Furthermore, the track 454 over its length stays at substantially thesame distance from the read head 452. This allows the wiper 450 to exerta constant cleaning force against the read head over the entire cleaningpass. The wiper 450 can comprise a sponge material. Before making acleaning run, the sponge can receive a cleaning solution. Followingapplication of the solution from the sponge to the read head, thesolution can quickly dry or evaporate. Again, the wiper 450 can bereadily replaced, or cleansed from grime, pollutants, etc.

FIG. 41 shows a read head assembly 456 mounted in a spring loadedfashion to a movable support 458. A biasing component (e.g., spring) 460causes the read head assembly 456 to be pressed against a card 462during reading. The biasing force also causes the read head assembly 456to press against an engaging wiper during cleaning. Additionally, awiper can be configured so that its arms are bowed outward toward theread head assembly, so as to cause increased pressure against theassembly when it is (spring loaded) engaged with the wiper. Thisincreased force of contact between the read head assembly and the wiper(as a result of the resiliently biased assembly) can result in enhancedcleaning of the read head assembly.

It should be understood that although the cleaning of a read head hasbeen discussed in detail, one or more similar wipers can be used toclean the outer surface of an integrated chip of a debit/credit card.That is, some wipers may be configured to be used to clean both a readhead and a card. Alternatively, one or more wipers (cleaning components)may be solely designated to card cleaning. A card cleaning operation canbe conducted prior to a reading operation. Alternatively, a cardcleaning operation can be initiated following an inability by the readhead to read data from an unclean (dirty) card.

A wiper may also function to provide other services in addition tocleaning. For example, one or more wipers can be used to guide a cardinto its final card reading position. A wiper (or certain arms thereof)can include a substantially solid material (e.g., plastic. Teflon,etc.). The material can be attached to a wiper. Alternatively, thematerial may be coated onto an outer surface area of a wiper. Thematerial can function to guide an edge of a card that is being inserted.For example, a first edge of a card can engage and be guided by aplastic guide of a first wiper positioned (like in FIG. 34) adjacent toa first side of the final card reading position, whereas the oppositesecond edge of the card can be guided by a plastic guide of a secondwiper positioned (like in FIG. 34) adjacent to a second side of thefinal card reading position.

The plastic guides can also be configured and positioned so that theysmooth engagement of the wiper with both the card and the read head. Forexample, the plastic guides may have a smooth, curved surface at theirinward edge that will touch against the side of a card (e.g., due tomovement of the read head toward the card). Likewise, the plastic guidesmay have a smooth, tapered, rounded surface at their outward edge thatwill contact the read head. The plastic guide arrangement can preventthe read head from catching (snagging) as it moves off the wiper andonto the card.

FIG. 42 shows a wiper 466 that has a plastic guide member 468 attachedthereto. FIG. 43 shows a wiper arrangement 470 having a guide member472. In an exemplary embodiment, the plastic guides do not extend to thebottom edge of a wiper. Hence, wiper cleaning material located at thelowermost portion of the wiper can still contact to clean.

A vibratory mechanism may be associated with a wiper to impartadditional cleaning (scrubbing) action to a read head. The vibratingmechanism can be employed with both a stationary wiper and a movablewiper. For example, a vibrator can be used to cause vibration of theupper support base, which in turn imparts vibration (or movement) to thewiper arms. Alternatively, wiper arms may have a portion that iselectronically conductive. The portion may run the entire length of thearm. Applying alternating current to the conductive portion can causethe arm (or different segments thereof) to move back and forth in acleaning motion. A vibrator (or shaker) can also be a part of a wipermoving mechanism. A piezoelectric vibrator or a sonic vibrator can alsobe used.

The arrangement for moving a wiper can be configured (e.g., programmed)to periodically cause the wiper to move over a read head when the readhead is not being used. This periodic cleansing can maintain aninfrequently used read head in a clean state. The periodic cleansing canprevent the read head from becoming too dirty to be fully cleaned by thewiper.

FIG. 44 shows a top view of a wiper head support 474. A first vibratordevice 476 causes vibration of the support 474 in first horizontaldirection, as represented by arrow X. A second vibrator device 478vibrates the support 474 in second horizontal direction, as representedby arrow Y. The second direction is perpendicular to the firstdirection.

In review, the discussed wiper arrangements allow for in-operationcleaning of a read head. That is, in a first embodiment a read headmoves against a wiper (and toward a data reading position). Thediscussed wiper arrangements also allow for non-operation cleaning(pre-use cleaning) of a read head. That is, in a second embodiment awiper moves against a (stationary) read head. However, the wiperarrangements additionally allow for a third embodiment, which is acombination of the first and second embodiments. That is, both the readhead and the wiper are movable. For example, during a reading operationthe read head is moved against the wiper on its way to reading carddata, whereas the wiper is moved against the read head after lengthylulls between reading operations in order to make sure the stationaryread head is kept clean. As previously discussed, the wiper movement canbe either along the same path as head movement or perpendicular to thispath. Once a lull between readings has reached a predetermined timeperiod, then the wiper can be driven to refresh (clean) the read head. Acontroller for the wiper transport device can be programmed to inducewiper movement (and/or vibration) based on this time period.

FIG. 45 shows a wiper arm 480 having an embedded emitter 482. Thisexemplary embodiment allows for read head testing. The emitter device482 is used to provide test signals to a read head. The testing can helpdetermine whether the micr reading circuitry of the read head is workingproperly. A wiper arrangement can include (and carry) one or moreemitters. An emitter may be located within or on a wiper. A wiperarrangement may have all emitters on the same side of the wiper arms.The testing may be conducted during cleaning engagement between thewiper and the read head. In the exemplary embodiment, the testing can beconducted regardless of whether the read head (sensor) is moving orwhether the wiper is moving. In other embodiments the wiper may be movedat predetermined distances above (and over) the read head withouttouching it. Such analysis may assist in determining whether the readhead sensing range is degrading. Examples of magnetic read heads andtheir operation are shown in U.S. application Ser. No. 12/378,043 filedFeb. 10, 2009, now U.S. Pat. No. 8,091,784; and U.S. application Ser.No. 12/378,050 filed Feb. 10, 2009, now U.S. Pat. No. 8,083,136, whichare herein incorporated by reference in their entirety.

FIG. 46 shows a card reader module 490. The card reader has a card entryopening which can be blocked by a shutter (e.g., gate or door) 492. Theshutter 492 can be moved from a closed position (or a locked condition)to an open position (or an unlocked condition) to allow a user card toenter into the interior of the card reader 490. In an exemplaryembodiment the shutter 492 is normally locked in a closed position tokeep non card material out of the card reader. With the shutter 492unlocked during a card reading operation, a card entering the cardreader pushes against the biased shutter 492 causing it to be moved toan open position. For example, the shutter 492 can be pivoted upwardabout an upper hinge or axis. Upon exit of the card from the cardreader, the shutter 492 is automatically biased back to its closedposition where it can again be placed in a locked condition.

It should also be understood that other arrangements for opening/closinga shutter can also be used to cause the shutter to be moved (driven)from the closed position to an open position independent of cardinsertion. The shutter (gate) can be in operative connection with adrive, such as a motor, solenoid, cylinder, or other structure that canimpart movement to the gate. The drive arrangements can use devices thatinvolve movement induced by mechanical (springs, latches, etc.),electrical, and/or magnetic operation. In another embodiment, theshutter cannot be closed while a card is in the card reader. Thus, ashutter return drive (e.g., return springs) can be used to keep theshutter pressed against an inserted card, which helps hold the cardstationary during the card data reading process.

In an exemplary embodiment, opening of a card reader shutter is linkedto one or more sensors. One or more of the sensors can also be locatedat or on the card reader, such as on the card reader housing. Sensorscan be positioned upstream of the shutter, such as in a card input slotthat leads up to the shutter.

FIG. 46 additionally shows sensors 494, 496 attached to (and supportedby) the card reader module 490. For reasons discussed later, the sensorscan be laterally located adjacent opposite sides of the card reader.

FIG. 46A shows a card reader module 760 having a card entry slot 762leading to a shutter gate 764. As can be seen, the gate 764 is setinward a distance from the entrance to the slot 762. The card readermodule 760 is operative to read data from magnetic stripe cards that areproperly inserted long-edge first (LEF). Not only does a card have to beinserted LEF but its magnetic stripe also has to be properly positionedto enable its data to be read. In an exemplary embodiment the cardreader module 760 includes at least one sensor to sense a physicallocation (orientation) of a card and at least one sensor to sense acorrect location of a magnetic stripe.

Associated with the slot 762 are card sensors 766, 768, 770. Proximitysensors 766, 768 are operative to sense the presence of a card 772.These sensors can comprise photo sensors. The sensors are in operativeconnection with at least one processor of the card reader module 760. Ifthe processor determines that both sensors have detected a card, thenthe card 772 is properly oriented LEF relative to the card entry slot762. If both sensors do not detect a card, then the card is not properlyoriented LEF. For example, a card may be oriented short-edge first (SEF)relative to the card entry slot. A SEF card 774 is shown in brokenlines. Because of its short leading (front) edge 775, the card 774 wouldnot trigger both of the sensors. It should be understood that in otherembodiments more than two sensors can be used to determine whether acard is properly oriented.

Sensor 770 comprises a magnetic sensor. The magnetic sensor 770 isoperative to sense a magnetic feature of the card 772. The sensor isoperatively configured and positioned to sense the presence of themagnetic stripe 778 of the card 772 when the stripe is both near theleading edge 776 of the card and on a particular (e.g., bottom, top,right, left) side of the card. The sensor is not operative to sense amagnetic stripe that is at the trailing edge 780 of a card and/or thewrong side (face) of the card. The sensor 770 is in operative connectionwith the at least one processor of the card reader module. If the sensordetects a card's magnetic feature then the magnetic stripe is properlyoriented. However, if the sensor does not detect both a magnetic feature778 adjacent the leading edge 776 and on the correct side 782 of thecard, then the processor determines that the magnetic stripe (and card)is not properly positioned to allow the card data to be read by the cardreader. It should be understood that in other embodiments more than onesensor can be used to determine whether a magnetic stripe is properlyoriented. In an exemplary embodiment, a properly oriented card has themagnetic stripe located on the lower (bottom) side of the card adjacentthe leading edge. However, in other embodiments the magnetic stripe canbe located on a different side of the card and/or adjacent the trailingedge.

The processor is operative to cause the gate 764 to be opened based on apositive determination that both: the card 772 is properly oriented LEF;and the magnetic stripe 778 is properly oriented/positioned (e.g., onthe bottom side and near the leading edge 776). Thus, the gate can bepermitted to be opened based on at least three determined factors: along edge of the card is the leading edge; a magnetic feature is locatedadjacent the leading edge; and the same magnetic feature is located onthe correct side of the card. The processor can be programmed to make adetermination on the factors in any order and/or simultaneously.

FIG. 46B shows another embodiment of a card reader module 784 having acard entry slot 786 that leads to a gate 788. The card reader module isoperative to read a magnetic stripe 792 from a card 790 inserted LEF.The slot 786 is wider than the length of the two longest edges of acard. Thus, the card reader can receive a LEF card 790 at differentpositions through the slot 16. For example, as shown the card 790 may beinserted far to the left side of the slot 786 or far to the right sideof the slot 786. A sensor array 794 is used to detect whether a card isproperly positioned LEF. A card reader processor can determine from thesensor module 794 whether the leading edge 796 of a card 790 correspondsin length to a LEF inserted card. As previously discussed, the processorcan open the gate 788 responsive to determining that a card is orientedLEF and that the card's stripe is properly positioned.

In an exemplary embodiment, when the card 790 in fully inserted in itsreading position the trailing edge 798 of the card is still be visibleto the user. For example, the trailing edge may protrude outwardrelative to the gate 788 but remain in the slot 786. Alternatively, thetrailing edge 798 may protrude outward from the slot 786. However, in anexemplary embodiment the trailing edge 798 does not extend outward toofar so as to allow the user to (grab and) remove the card 790 from thecard reader. Thus, during the reading operation the card 790 can remainrelatively stationary, even though part of the card 790 is viewable bythe user.

FIG. 46C shows another embodiment of a card reader module 800 having aLEF card entry slot 802 that leads to a gate 804. Sensors 806 arepositioned at opposite sides of the slot 802. Based on the sensorsignals a processor is operative to decide if a card is being insertedLEF. The sensors 806 can comprise contact sensors, such as (photo)sensors that can detect the presence of a card portion. Alternatively,the sensors 806 can comprise mechanical contact switches that areoperated (e.g., triggered, pushed inward) responsive to physical contactpressure applied by the card. Having both switches activated is anindication that a card is properly positioned LEF.

FIG. 46D shows another exemplary embodiment for detecting a LEF card810. At least two magnetic sensors 812, 814 are used. The magneticsensors 812, 814 can be used by a processor to check all of the(processor determined) factors needed to allow gate opening. Aspreviously discussed, the positioning of sensors near the (left andright) sides of the slot enable verification that a (properly oriented)LEF card is located adjacent the slot. Thus, as shown, the magneticsensors 812, 814 are properly positioned to detect (the factor of)whether a long edge of the card 810 is the leading edge 816. As shown,the magnetic sensors 812, 814 are also positioned to detect (the factorof) whether a magnetic stripe 818 is near the leading edge 816 of thecard. The magnetic sensors 812, 814 are positioned to be on the sameside (e.g., bottom side) of the card entry slot. Thus, as shown, themagnetic sensors 812, 814 are also properly positioned to detect (thefactor of) whether a magnetic stripe 818 is located on the correct side820 (e.g., bottom side) of the card 810. As can be appreciated, theembodiment allows the processor to determine whether a card meets theproper criteria to cause an entry gate to be opened, based on signalsbeing received from only two sensors. In other embodiments more than twomagnetic sensors (and other sensors) can be used.

It should also be understood that the exemplary embodiments also allowfor a card reader module that can determine whether a (smart) cardincluding a chip (e.g., a contact type chip) is properly oriented (forgate opening) to be accepted for reading. For example, an imagingdevice/sensor (e.g., a camera or a CMOS) can be used to determine ifchip contacts are present with a card and also if they are in thecorrect position for the card to be read. If the camera shows the chipin the correct location, then the gate can be opened.

FIG. 47 shows sensors 502, 504, 506 attached to a bezel 508 which ispart of a user fascia 500. That is, card sensors can be part of a cardreader module or (alternatively) part of a user fascia structure. Thebezel 508 includes a card entry slot 510 that lays adjacent to a shutterof a card reader 512 (which is shown in broken lines behind the bezel).The sensors 502, 504, 506 are attached to the bezel 508 at a locationadjacent to the card entry slot 510. The sensors can sense whether anapproaching card is oriented properly to allow the reading of its databy the card reader 512. Further examples of card sensors positionedadjacent to (and linked to) card reader shutters can be found in U.S.application 61/629,900 filed Nov. 30, 2011, which is herein incorporatedby reference in its entirety.

The magnetic stripe of a card can be used to determine a magnetic stripecard's orientation. As previously discussed, in some exemplary cardreaders are configured to receive cards that are inserted long-edgefirst (LEF). These exemplary (sideways) card readers can be similar insize to known card readers that receive cards short-edge first (SEF). Asa result of the similar size, an exemplary LEF card reader can replace(supplant) a conventional SEF card reader. Thus, an automated bankingmachine can be modified (refitted, upgraded) to include an exemplary LEFcard reader without requiring additional space and/or additionalstructural changes to the machine.

in an exemplary process of retrofitting an automated banking machine (toexchange a SEF reader with a LEF reader) will now be discussed. Thefascia is unlocked and then (manually) opened (moved outward) to provideservicing access to the original (SEF) card reader. If the originalreader is supported on a rollout tray then the tray is (manually) movedoutward (out of the machine housing) to provide easier manual access tothe reader. The readers are manually exchanged by a service person.Particular cords, wires, fasteners, interfaces, and/or ports may have tobe connected to provide the proper power, communication, andsupport/fastening for the new card reader. The rollout tray can then beclosed (moved back into the machine housing). Alternatively, if theoriginal reader is supported by the fascia itself, then it can bereplaced from its support for the new LED reader by the service person.

The fascia includes a portion that comprises an original card readerbezel. This original bezel has a card entry slot that is sized toreceive cards that were inserted SEF. This card entry slot also alignedwith the card entrance opening of the original card reader when thefascia was closed. The service person manually replaces the originalbezel with a similarly sized (new) bezel. The new bezel has a (wider)card entry slot that is sized to receive cards that are inserted LEF.Further discussion of card reader bezels can be found in application61/628,513 filed Nov. 1, 2011, which has been incorporated herein byreference in its entirety. Following the bezel exchange, the fascia canthen be closed. The new card reader can be tested before the machine isreturned to (card reader) available usage by customers. Other bezelarrangements may allow bezel removal (and exchange) without requiringopening of the fascia. For example, a bezel may have a lock that ismanually accessible while the fascia is closed. Unlocking of the lockallows the bezel portion to bezel portion to be removed from theremainder of the closed fascia. Of course these process steps and/orapproaches are exemplary, and in other embodiments other approachesand/or orderings (sequences) of steps may be used.

If a magnetic property of the magnetic stripe can be sensed by thesensors, then it is determined (by one or more processors) that the cardis correctly oriented for insertion (entry) into the reader through theshutter slot. The sensors can be positioned so that they can only read amagnetic property from a properly oriented magnetic stripe, else thecard is not recognized as being correctly oriented. For example, thesensors can be positioned to detect a proper card orientation thatrequires a card to be inserted with its magnetic stripe both facingdownward and extending along the leading long edge of the card. Thus,the pre-insertion sensing arrangement allows for the determining that amagnetic stripe card being inserted long-edge first (sideways) isproperly oriented to have its data read by a magnetic read head. Itshould be understood that sensor positions are exemplary, and in otherembodiments other sensor positions can be used in determining whether acard is correctly pointed.

The sensors are in operative connection with at least one processor(e.g., controller). The processor operates according to programmedinstructions. Signals from the sensors can be received by the processor.These sensor signals may go through one or more interfaces before beingreceived by the processor. For example, a sensor may communicate withthe processor via a USB port, a wireless port, etc. Signals from theprocessor can cause operation of a shutter lock/unlock controllingdevice, which operation can change the locked/unlocked condition of acard reader shutter. Signals from the processor can also cause operationof shutter drive devices, which operation causes movement of the shutter(e.g., to an open position). A shutter drive arrangement can compriseone or more motors, solenoids, cylinders, etc. Other known actuatorsthat can cause shutter movement can also be used. Signals sent from theprocessor may pass through one or more interfaces before being receivedby the card reader or card reader devices. For example, a card readermay communicate with the processor via a USB port, a wireless port, etc.As can be seen, sensors can be used to control card entry access into acard reader.

In an exemplary embodiment, two disposed-apart magnetic sensors are usedto sense whether a magnetic stripe is positioned perpendicular(sideways) to the entry path into the shutter. In response to adetermination that a proper orientation was sensed, the shutter is thenpermitted to be opened. For example, the controller can cause theshutter to be placed into an unlocked state, which enables the card topush the shutter into an open position.

Another exemplary embodiment uses one or more infrared (IR) typepresence sensors and one or more magnetic sensors. The embodiment allowsa determination to be made whether a magnetic stripe card is beinginserted long-edge first. Two horizontally spaced IR sensor arrangementsare positioned so as to be blocked by the front outside portions of asideways (long-edge first) oriented card. If both IR sensors are notblocked then the card is being incorrectly inserted, such as short-edgefirst. A magnetic sensor is positioned to sense a magnetic stripe. Inoperation, if both IR sensors are blocked and the magnetic sensor sensesa stripe in the correct location (e.g., bottom side of the card at theleading long edge), then it can be decided that the card is properlyoriented.

A further exemplary embodiment includes use of a card reader which canread cards that do not have a magnetic stripe. For example, a card mayonly have a chip, such as a contact type chip. A card's chip may also beof a non-contact type chip, such as a wireless chip that uses near fieldcommunication (NFC) signals or radio frequency identification (RFID)signals. Other card data storage formats can include other smart cardchip features, bar codes, electronic ink, etc.

As previously discussed, a card reader's shutter gate can be unlocked(or opened) in response to detection of a properly oriented smart card.For example, two disposed presence sensors can be used to sense whetherthe card is properly oriented in a sideways (long-edge first) position.Without a magnetic stripe then the arrangements of contacts on a chipcard should only be in two possible orientations on a card side. As aresult, a CMOS or other type of imaging sensor can be used to determineif the chip contacts on a smart card are present and in the correctposition for the card to be accepted for reading. If the images show thechip in the correct location, then the shutter can be unlocked/opened.

Another exemplary embodiment arrangement includes a card reader that canread a card which has both a contact type chip and a magnetic stripe.Generally, for a card having both a magnetic stripe and a chip, the chipcontacts are on top face (upper surface) of the card generally in thecenter of the card toward one (long-edge) side, and the magnetic striperuns across the bottom of the card near the opposite (long-edge) side.As a result, if the presence sensors help determine that a properlyoriented (long-edge first) card is being presented, then the imagingsensor(s) would need to find the chip contacts on one (long-edge) sideof the card, while the magnetic sensor would need to find the presenceof a magnetic stripe on the opposite (long-edge) side of the card. Suchfindings would meet the conditions for opening the shutter to along-edge inserted card having both a magnetic stripe and a chip.

Yet another exemplary embodiment arrangement includes a card reader thatcan allow its shutter to be opened based on wireless detection of NFCsignals and/or RFID signals from a card. Any of the prior discussed cardreader arrangements can be integrated with a wireless-type arrangementthat checks (senses) for the presence of NFC/RFID signals in proximityto the shutter, and upon detection of such signals allows the shutter tobe opened.

Further arrangements and methods of sensing different card propertiesand determining card orientations are discussed in U.S. application61/629,900 filed Nov. 30, 2011, which has been incorporated herein byreference in its entirety.

It should be understood that while a card may be referred to herein asbeing “sideways” upon its entry into a card reader, the card reader doesnot have to read the card horizontally. The “sideways” terminologyrefers to the card being inserted long-edge first, as opposed to aconventional short-edge first insertion. Thus, a long-edge inserted cardcould be inserted horizontally or vertically (or any angle in between)into a card reader. A horizontally inserted card would be lying flat,with one face on top and the other face on bottom. A vertically insertedcard would have one short edge on top and the other short edge onbottom, with one face on the left side and the other face on the rightside. For example, a card reader in one orientation could receive ahorizontally inserted card, whereas rotation of the card reader 90degrees would allow it to receive a vertically inserted card. However,both cards would be received sideways (long-edge first). Also, a readhead may be configured to move in a horizontal direction and/or in avertical direction.

A card reader of an exemplary embodiment helps protect against cardskimming (e.g., unlawful reading of card data). As previously discussed,sideways (long-edge first) entry of a card makes fraudulent skimming ofcard data much more difficult. An unauthorized card reader is typicallyinstalled to read parallel along the magnetic stripe as the card isbeing moved in or out of the card reader. As can be appreciated, asideways inserted card would cause the typical unauthorized data readerto read in a direction that is perpendicular to the card's magneticstripe. That is, the unauthorized reader would read across the stripe'stracks instead of along a track.

Thus, because at best only a small amount of data could be ascertained,the arrangement provides improved resistance to fraud. Other examples ofproviding an automated banking machine with improved resistance to fraudcan be found in U.S. application Ser. No. 12/008,348 filed Jan. 10,2008; U.S. application Ser. No. 12/661,499 filed Mar. 18, 2010, now U.S.Pat. No. 8,028,899; and U.S. application Ser. No. 13/199,106 filed Aug.19, 2011, which are herein incorporated by reference in their entirety.

As a further security feature, an exemplary card reader is additionallyoperative to provide two-dimensional horizontal jitter to a card duringboth its entry and exit. The jitter moves (jerks, vibrates) a card backand forth in perpendicular directions so that a skimmer cannot get agood (accurate) reading of card data. That is, a card may be placed invarious skewed orientations as it is entering and/or exiting a cardreader. A jitter pattern can cause non cyclical or nonuniform cardjitter (e.g., irregular variation in direction/movement; directionalfluctuations). Various jitter patterns can be programmed in a computerthat controls the card drive mechanism. The use of different jitterprograms can make card-movement unpredictable, especially to a criminal.

Furthermore, the card reader can vary (fluctuate) the speed anddirection of card jitter while the card passes through the card reader'sentry slot (while the shutter is open). That is, card speed is variedwhile the card is moving in a direction in-and-out of the card reader.Card direction is also varied left-to-right while the card is movingin-and-out of the reader. The left-to-right movement of the card canlikewise vary in speed. Thus, while inducing card jitter the LEF cardreader is also able to simultaneously vary a card's jitter speed anddirection, both in-and-out and left-to-right, as the card is enteringand exiting the card reader.

A card mover (arrangement, mechanism, device) can include card movingcomponents (e.g., rollers, belts, balls, bearings, suction devices,etc.) that engagingly move a (contacted) card. One or more card moverscan be driven by one or more (card) drive devices to engagingly move aninserted card. A drive device can comprise one or more motors,solenoids, cylinders, etc. Other known actuators that can cause cardmover movement can also be used. The drive devices are in operativeconnection with at least one processor (e.g., machine controller). Theprocessor operates according to programmed instructions, which mayinclude one or more different card jitter patterns. The instructions canbe stored in one or more data stores, which the processor can access.Signals from the processor can cause operation of the drive devices,which in turn causes movement of the card movers. Of course signals sentfrom the processor may pass through one or more interfaces before beingreceived by the drive devices. In other embodiments, the card reader caninclude each of the contact components (rollers, balls, etc.) thatmovingly contact a card, the drive device (e.g., motor) which impartsdrive to the contact components, and the processor which controls thedrive device to follow one or more predetermined (programmed) jitterpatterns.

An in-and-out card jitter can be created by operating card drivedevices. For example, a card drive device can include rollers and/orbelts. The card drive device can engage the sides of a card and/or thetop and bottom of the card. The card drive device can be operated tovary the card's speed and direction as the card moves in and out of thecard reader. For example, as the card is being driven in (or out of) thecard reader, drive rollers can both change the card's travel direction(between forward and reverse) and change the card's speed of travel(between faster and slower). A card can be moved (jerked) back and forthwhile it is being moved in and out. Thus, prevention of card skimmingcan be enhanced. The card drive devices can be the same mechanisms thathold a card stationary while it is being read.

A left-to-right card jitter can also be created by operating a carddrive mechanism. In one embodiment, the drive mechanism itself ismovable in the left-right direction. The drive mechanism can includedrive rolls, rollers, and/or drive belts. In operation, a card may besecurely held by the drive mechanism, then moved as the drive mechanismmoves. Other embodiments can impart three-dimensional jitter to a cardmoving in and out of a card reader.

In one embodiment the card drive mechanism includes a driving roll thathas an hourglass shape at its center, which varies its effective outerdiameter relative to its axis of rotation. The driving roll engages aside edge of a card at an angle. Movement of the roll causes in or outmovement of the card. The roll movement simultaneously causes sideways(left or right) movement of the card. Another roll (or roller) locatedon the opposite side of the card could be spring loaded. As a result, asthe hourglass-shaped roll changed its driving direction (moving back andforth), the roll on the opposite side of the card would be moved backand forth.

In addition, instead of having a smooth (inclined ramped) hourglassshape, the drive roll could have various sized outer diameters near itscenter. These different diameters will create irregular (non ramped)side-to-side jitter. The various diameters make it more difficult for aperson to predict the roll's jitter-creating pattern.

In an exemplary embodiment, a ball transport mechanism is used toprovide card jitter. Rotatable balls of the transport can engage/grabthe top and bottom faces of a card. That is, a card can be sandwichedbetween a transport's top and bottom balls. The balls can rotate in anydirection. Thus, a held card can be moved by the transport in forward,reverse, left, and right directions. Simultaneous movements of balls indifferent directions can also cause a card to be moved in angled,circular, and/or oscillating motions. For example, rotatable drive ballsand rotatable idler balls can be adjacently positioned on opposed sidesof a card, which allows the card to be moved there between while beingengaged by both the rotatable drive balls and the rotatable idler balls.One or more of the rotatable transport balls can be housed in a housing.Ball bearings can be operatively positioned between the balls and aninner wall the housing (or enclosure). The bearings allow the balls tobe rotated in all directions (i.e., 360 degrees). Further discussion oftransport mechanisms that use rotatable engaging balls to move an itemcan be found in U.S. application Ser. No. 13/135,663 filed Jul. 12,2011, which is herein incorporated by reference in its entirety. Theincorporated transport mechanisms (comprising rotatable engaging ballsor other item moving structure and arrangements) can similarly be usedherein to move (and provide jitter to) a card entering and/or exiting acard reader.

FIG. 57 and FIG. 58 schematically show an exemplary embodiment of adocument transport mechanism 660. This mechanism 660 includes respectivesets of adjacent drive members 662, 664 and follower members 672, 674that are moved by drives 692, 694, 696 to move and align a document. Adocument (card, sheet, check, currency note, etc.) can be driven whileat least a part thereof is located between the drive and followermembers. The document is placed between an upper platen 682 and a lowerplaten 684. The drive members 662, 664 can be a roller, belt, ball, orother structure that can move the document. Likewise, each of thefollower members 672, 674 can be a roller, belt, ball, ball, or otherstructure that helps move the document.

In an exemplary embodiment, the transport mechanism 660 is a cardtransport mechanism 660 which is part of a card reader module.Furthermore, the document is a card, the drive members 662, 664 aretransport balls, and the follower members 672, 674 are idler balls. Eachof the transport and idler members may be formed in one piece. Thetransport balls 662, 664 are selectively moved by one or more drives.The drives can be a motor, solenoid, cylinder, or other structure thatcan impart movement. In the exemplary embodiment, the drives includeelectric motors. The card transport mechanism 660 can move a card intoand out of a card reader, positionally align the card for reading ofdata therefrom, and impart multi-directional jitter to the card while itis being moved into and out of the card reader. The multi-directionaljitter can include card jitter movement in at least two non paralleldirections. This can include two-dimensional horizontal (jitter)movement or motion (i.e., jitter along X and Y axes). In otherembodiments a card can receive three-dimensional jitter. That is, cardjitter can occur in three different (non parallel) directions (i.e.,jitter along X, Y, and Z axes). Still other embodiments allow fortwo-directional card jitter in both a horizontal axis and a verticalaxis, such as along the X/Z axes and the Y/Z axes. The arrangementallows for card jitter in angular directions. Of course card jittermotion can also be reversed, such as in a forward and backward motion.The card transport mechanism 660 can also cause both card movement andcard jitter to occur at different speeds.

In the exemplary embodiment, left and right transport balls 662, 664extend through apertures in the lower platen 684. The left transportball 662 is housed in a housing 668 that is operatively attached to thelower platen 684. The right transport ball 664 is also housed in ahousing 670 that is operatively attached to the lower platen 684. Leftand right idler balls 672, 674 are in supporting connection with theupper platen 682. The idler balls 672, 674 each extend in acorresponding opening in the upper platen 682.

It should be understood that although terms such as lower, upper, left,and right may be used herein for purposes of describing an embodiment ofa card transport mechanism, other directional orientations can also beused. For example, in other embodiments the idler balls can be insupporting connection with a lower platen (or a side platen). The cardtransport mechanism can also be arranged to move a card that is in avertical orientation, where the balls are respectively engage left andright faces of the card. That is, the card transport mechanism can beused with a vertically oriented card reader that is able to receive acard that is inserted having its lowermost (bottom) portion being ashort or long edge.

Each of the idler balls 672, 674 generally corresponds to the positionof a respective transport ball. Specifically, the left transport ball662 and the left idler ball 672 can be aligned together on a common axis698 that is perpendicular to the longitudinal axis of the upper platen682. Likewise, the right transport ball 664 and the right idler bail 674are aligned together on a common axis 699 that is perpendicular to thelongitudinal axis of the lower platen 684.

The left idler ball 672 is housed in a housing 678 that is operativelyattached to the upper platen 682. The right idler ball 674 is alsohoused in a housing 680 that is operatively attached to the upper platen682. A plurality of springs 688 (e.g., coil springs) are in operativeconnection with a support plate 746, which is connected to and supportedby the upper platen 682. The plurality of springs 688 extend upwardly toa drive carriage or other support structure. In the exemplary embodimentthe springs 688 bias the idler balls 672, 674 toward their correspondingtransport balls 662, 664 yet allow the idler balls 672, 674 to move awayfrom their corresponding transport balls 662, 664 along their commonaxes 698, 699 with their corresponding transport balls 662, 664. Thisbiasing allows a card to be inserted between the transport balls and theidler balls. The transport and idler balls are made of a suitablematerial for engaging cards therewith, such as a resilient material likerubber.

In the exemplary embodiment, bearings such as ball bearings 700 areoperatively positioned between the left transport ball 662 and an innerwall 706 of the ball enclosure 668. Bearings such as ball bearings 702are also operatively positioned between the right transport ball 664 andan inner wall 708 of the enclosure 670. Likewise, ball bearings 704 areprovided between the left idler ball 672 and an inner wall 710 of theenclosure 678. Ball bearings 712 are also provided between the rightidler ball 674 and an inner wall 714 of the enclosure 680. The ballbearings 700, 702, 704, 712, are held in their respective positions byraces or other structures that enable the ball bearing to rotate andfacilitate movement of the adjacent transport or idler member. It shouldbe understood that while in the exemplary embodiment bearings are usedto achieve relatively free movement, in other embodiments otherstructures to provide low friction movement can be used.

The exemplary mechanism 660 further includes the central drive motor 692for driving the transport balls 662, 664. The central motor 692 ispositioned between the transport balls 662, 664 along the longitudinalaxis of the lower platen 684. The central motor 692 includes a motorshaft 716 that rotates upon energization of the central motor 692. Theaxis 718 of rotation of the motor shaft 716 is perpendicular to thelongitudinal axis of the lower platen 684 and parallel to the plane ofthe transport path of the card along the lower platen 684. The motorshaft 716 extends through the center of an engagement member 720 and isfixed to the engagement member 720. The engagement member 720 isgenerally cylindrical and has a relatively small axial thickness. Theengagement member 720 extends radially outwardly with respect to theaxis 718 a distance that is larger than the diameter of the shaft 716.The exemplary engagement member 720 also has a tapered peripheralannular end 722.

The peripheral annular end 722 extends through openings in the housings668, 670 and engages outer surfaces of each of the transport balls 662,664. Rotation of the shaft 716 rotates the engagement member 720, whichin turn rotates the transport balls 662, 664 about axes 724, 726 whichextend parallel to the rotational axis 718 of the motor shaft 716 andthe engagement member 720. The rotation of the right and left transportballs 662, 664 in this manner moves a card positioned between thetransport and idler balls, in a direction parallel to the transport pathin the card reader. The central motor 692 is selectively controlledresponsive to operation of control circuitry and is reversible, and thuscan rotate each of the transport balls 662, 664 in opposite directionswhich in turn can selectively move the card both toward and away fromthe card inlet opening to the card reader. The motor 692 can be operatedat various speeds. Thus, the motor can cause the transport balls (andthus the card) to be moved at different speeds.

In the exemplary arrangement, the left motor 694 is operativelyassociated with the left transport ball 662. The left motor 694 includesa motor shaft 728 that rotates upon energization of the left motor. Theaxis 730 of rotation of the motor shaft 728 is parallel to thelongitudinal axis of the lower platen 684. The shaft 728 extends throughthe center of an engagement member 732 and is fixed to the engagementmember 732. The engagement member 732 is generally cylindrical and has arelatively small axial thickness. The engagement member 732 extendsradially outwardly a distance that is larger than the diameter of theshaft 728. The exemplary engagement member 732 has a tapered peripheralannular end 734. The peripheral end 734 extends through an opening (notseparately shown) in the housing 668 of the left transport ball 662, andengages the outer surface of the left transport ball 662. Engagementmember 732 extends a radial distance that is less than that of theengagement member 720 which is driven by the central motor 692.

The engagement member 732 engages the left transport ball 662 at alocation that is ninety degrees from the point of engagement of the lefttransport ball 662 and the engagement member 720 of the central motor692. Rotation of the shaft 728 rotates the engagement member 732, whichin turn rotates the left transport ball 662 about an axis 736 parallelto the rotational axis 730 of the motor shaft 728 and the engagementmember 732. The rotation of the left transport ball 662 in thisdirection moves a portion of a card, positioned between the transportand idler balls, in a direction transverse to the transport path in thecard reader. The left motor 694 is selectively controlled and isreversible, and thus can rotate the left transport ball 662 in oppositedirections which also can move the card both toward and away from card(alignment) sensors in the card reader.

In the exemplary embodiment the right motor 696 is associated with theright transport ball 664. The right motor 696 includes a motor shaft 738that rotates upon energization of the motor 696. The axis 740 ofrotation of the motor shaft 738 is parallel to the longitudinal axis ofthe lower platen 684. The shaft 738 extends through the center of anexemplary engagement member 742 and is fixed to the engagement member742. The engagement member 742 is generally cylindrical and has arelatively small axial thickness. The engagement member 742 extendsradially outwardly a distance that is larger than the diameter of theshaft 738. The engagement member 742 has a tapered peripheral annularend 744. The peripheral end 744 extends through an opening (notseparately shown) in the housing 670 of the right transport ball 664 andengages the outer surface of the right transport ball 664. Thisengagement member 742 extends a radial distance that is less than thatof the engagement member 742 which is driven by the central drive motor692. The engagement member 742 engages the right transport ball 664 at alocation that is ninety degrees from the point of engagement of theright transport ball 664 and the engagement member 720 of the centralmotor 692. Rotation of the shaft 738 rotates the engagement member 742,which in turn rotates the right transport ball 664 about the axis 736parallel to the rotational axis 740 of the motor shaft 738 and theengagement member 742. The rotation of the right transport ball 664 inthis direction moves a portion of a card between the right transport andidler balls, in a direction transverse to the transport path in the cardreader. The right motor 696 is selectively controlled reversible, andthus can rotate the right transport ball 664 in opposite directionswhich also can move the card both toward and away from card sensors inthe card reader.

The central, left, and right motors 692 can be operated at variousspeeds and in reverse. Thus, the motors can cause the transport balls toimpart both movement (including inward and outward movement) and jittermotion (including in left, right, forward, backward, and/or angulardirections, etc.) to a card at different speeds.

In operation of this exemplary embodiment, when a card is sensedentering the card reader the card moving mechanism 660 is positionedsuch that the transport balls 662, 664 are located in adjacent relationto the idler balls 672, 674. This position is shown in FIG. 58. Aportion of a card 750 is shown between the upper platen 682 and thelower platen 684, before the card is located between the transport andidler balls. The play allowed by the resilient springs 688 enablesseparation between the transport and idler balls. Thus, the resilientsprings 688 allow the card 750 to be moved (inserted) between thetransport and idler balls. The card is not necessary drawn to scalerelative to the card moving mechanism 660.

In response to sensing that a card 750 is being positioned in the cardinlet opening of the card reader (and other appropriate conditions), theat least one processor is operative responsive to its programming tocause the central motor 692 to rotate the transport balls 662, 664 torotate in operative engagement their corresponding idler balls 672, 674.If an improper card insertion is sensed, the first transport may not runor may run and then return the card to the user.

Moving the transport balls 662, 664 responsive to operation of motor 692causes the card 750 to be moved in engaged sandwiched relation betweenthe transport balls 662, 664 and the idler balls 672, 674. In thisposition, the card can be moved in engagement with the transport intothe card reading area. The card moving mechanism 660 assists in moving acard into the card reader. The motor 692 can also impart jitter to thecard while it is being moved inwardly.

As the card is moving inwardly along the longitudinal axis of the lowerplaten 684, the left and right motors 694, 696, which are operative tomove the transport balls in directions transverse (and at angles) to thelongitudinal axis of the platen, operate so as to move the card 750. Thecard is moved in an angular direction (e.g., transverse) relative to thedirection of the card movement caused by the central motor 692. The leftmotor 694 and the right motor 696 can be simultaneously operated atdifferent speeds to cause a turning (skewing) of a card while the cardis simultaneously being moved in a sideways (angular) direction by themotors 694, 696. Also, at certain times during a moving operation, onlyone of the motors 694, 696 may need to be operating. The processorprogramming is able to provide different movement/jitter motions foreach individual card. A card being moved toward its aligned readingposition can be quickly skewed (with jitter) and deskewed (realigned).

As can be appreciated, the card jitter mechanism 660 allows the card 750to be simultaneously moved for jitter both inwardly in a (path)direction along the longitudinal axis of the lower platen 684 and alsoin a (sideways) direction transverse to (at an angle relative to) thelongitudinal axis of the lower platen 684. The card 750 can be jitteredsideways (and in other directions) until its leading edge is finallyaligned with card alignment sensors in the card reader. In operation ofan exemplary embodiment, the card transport mechanism 660 allows a cardto be transported under continuous jitter movement while being moved invarious directions into an eventual aligned proper card readingposition. This can be accomplished without having to stop and thenrestart card movement.

The exemplary card transport mechanism 660 offers simultaneous distinctcard movements. A card can be moved in at least two different directions(in an angled direction) without requiring any stopping of the cardduring the card movement. That is, a card can be (simultaneously) movedin at least two different non parallel directions, which can includetwo-dimensional horizontal (jitter) movement.

The card reader has a substantially straight card transport pathextending from the card entry slot. The card transport mechanism 660 isoperable to simultaneously move a card both forward/backward (e.g.,parallel along) and sideways (e.g., perpendicular and/or angular)relative to this transport path. The rotatable transport balls 662, 664are each operative to impart to a card different drive angles that arein an angular range extending from a direction parallel (zero degrees)to the transport path to a direction 180 degrees (reverse) to thetransport path. Thus, the transport balls 662, 664 working together atthe same time can cause a card to be moved substantially straight at anydrive angle in the range from zero to 180 degrees relative to thetransport path. The transport bails 662, 664 working together at thesame time (simultaneously) at different drive angles can also cause acard (or a part thereof) to be rotationally oriented out of alignmentrelative to the transport path. All the while transport balls can impartjitter to the card.

As can be seen, a card can now be simultaneously jittered in differentdirections while it continues its movement toward its final readingposition (or toward its exit from the card reader). Thus, the exemplaryarrangement enables more jitter directions for cards, which results insafer transactions for customers of automated transaction machines.

Card alignment sensors in the card reader can be used to provide avirtual wall (or stop) against which to align the leading edge of thecard. The sensing of the card edge by the alignment sensors enablesprecise positioning/alignment of the card, which facilitates laterreading of data from the card. The precise alignment of a card edge alsoenables positioning of a LEF inserted card so as to be in position to beread by a movable read head. Of course in other embodiments other cardalignment approaches may be used.

Alternative embodiments may also use similar principles. For example,instead of the idler balls, a low friction platen may be fixed in anopposed contact position relative to the transport balls. Alternatively,the low friction platen may be positioned relative to the transportballs such that the transport balls are biased toward engagement withthe low friction platen by one or more springs. In another example, thedriving mechanism could be one motor that can rotate the balls in boththe parallel and transverse directions with respect to the longitudinalaxis of the platen. In another example, a differential drive could beoperatively connected between the transport balls. The differential mayhave rotation of its output shafts controlled by brakes or othermechanisms so that the transport balls can be moved different distancesand/or directions to impart jitter to the card. In some embodiments thetransport members and idler members may maintain a position where theyare biased toward engagement as a card is moved there between. In otherembodiments the transport or idler members may be disposed further awayfrom one another at certain times during card movement. Of course theseapproaches are merely exemplary.

As previously discussed, an exemplary card transport mechanism canprovide continuous jitter to a card that is entering and/or exiting acard reader. The card transport mechanism can also be used to move acard that is inserted long-edge first (LEF) into a card reader. The cardtransport mechanism can be part of a card reader module, such as areplaceable module located in an automated transaction machine. The cardreader module can have its own processors, drives (motors), sensors,etc. Alternatively, the card transport mechanism can be separate from acard reader, but be positioned adjacent to the card reader (such as inan automated transaction machine).

FIG. 59 shows a user card 600 inserted through a reader housing section(e.g., bezel) of a user fascia 602 of an automated banking machine. Thecard was inserted through a card slot 603 in the bezel. The card 600 isheld in a reading position against a stop member 604. The physicalmember 604 stops forward insertion (movement) of the card 600. Asdiscussed in more detail later, the stop member 604 can also assist inaligning the card 600 so that it is properly positioned to be read by amovable read head assembly 606 of a card reader.

Rotatable balls 608 of a card transport mechanism can be controlled by acomputer to cause the card to be moved into its proper (and aligned)reading position. The balls 608 can be rotated in various directions toalso impart jitter motion to the card 600 while moving the cardtoward/away from the reading position. Card-moving balls can be usedwhich operate similar to the item-moving rotatable balls discussed inU.S. application Ser. No. 13/135,663 filed Jul. 12, 2011, which has beenherein incorporated by reference in its entirety.

Some people prefer the security of being able to view their card duringits usage in a transaction. An exemplary security arrangement allows forat least a portion of a customer's card to be viewed by the customerwhile it is being read. A card viewing window is positioned above thecard reader. Light can be directed toward the face of the card. A lightpipe guides light from the face of the card to the window. Thus, theperson will be able to see their card at all times while it is in thecard reader. The light pipe can comprise a plastic piece.

FIG. 59 further shows a light source 610, a light guide assembly 612,and a card viewing window 614 in the user fascia 602. The light guideassembly 612 includes an opening (slot or slit) 616 that allows the(visible) light from the light source 610 to be emitted into the aninterior of the assembly. The assembly 612 can guide (or direct) theemitted light toward the properly positioned card 600.

The arrangement allows a machine user to look through (or into) the cardviewing window 614 to view at least a portion of the top of their card600 while it is in the machine. The user window 614 can comprise atransparent or clear material (e.g., plastic). The window 614 may alsohave a magnifying element (attached thereto or built therein) thatenlarges the view of the card for the user. The magnification featurecan also be a user-selectable option. For example, the window 614 mayalso function like a monocular that allows a user to control focusing ofthe card view. A knob, push button, or lever can be implemented toadjust the focus and/or magnification of the user's view of the card.

An interior chamber of the light guide assembly can be substantiallyclosed (e.g., sealed). That is, each of the user window 614, lightentrance 616, and a card end (lower) portion 618 of the assembly can beclosed to keep out dust and dirt. The assembly portions 616 and 618 canalso comprise a transparent window.

The light source 610 may be generated by electricity, radiation, etc.The light source can be automatically turned on based on one or moresensors sensing a card inside of the card reader. In other embodimentsthe light source can include (or consist solely of) ambient (outside)light. For example, based on sensing of a card, an interior shade (orgate) can be removed/opened to allow exterior natural light through theuser window 614 (or some other light entry point). A combination oflight sources can also be used. For example, ambient daylight could bereplaced by generated light at nighttime. The switch could be based onsensing of dusk/dawn sensors. Other triggers can also be used to providesufficient light to allow a user to see their inserted card. Forexample, the light source may involve a manual trigger. The light may beon as long as the user is manually pressing (with a finger) a (light on)button. In other embodiments the light source may simply be triggered bya sensor detecting the presence of a person adjacent the machine.

The user window 614 can also comprise a dual usage display, such as anelectronic ink display. For example, the window 614 can be used to bothprovide a customer message (prior to card insertion) and then becometransparent (clear) upon card insertion.

The light guide assembly 612 can be a component that is separate from acard reader. For example, the light guide assembly can be a part of acard reader bezel or part of the user fascia. Alternatively, the lightguide assembly can be an integral part of a card reader.

In another exemplary embodiment a user can indirectly view their cardwhile it is located in the card reader. For example, a view of the cardcan be electronically reconstructed and displayed to the user. The userwindow 614 can be a display screen. One or more cameras are positionedto capture at least one image of at least a portion of a card located inthe card reader. In one embodiment a camera captures the user name thatappears on the face of the card. The image of the user name is thenshown on the display screen (display window). Thus, a machine user canbe assured that their card is properly received by the machine's cardreader. In a further embodiment, the inability of a user to view theircard (or their name on the card) can be taken as an indication that thecard was not properly received by (or positioned in) the card was notproperly received by (or positioned in) the card reader.

The automated banking machine can be programmed to capture and store (ordestroy) a card. For example, data read from a card may be used todetermine that the card is stolen. In some embodiments (as discussedlater) a stop member may not be needed (or used) to position an insertedcard. However, in other embodiments that include use of a stop member,the forward location of the stop member may interfere with (or block) afraudulent card that needs to be moved from the card reader to a cardstorage area in the machine. As indicated by broken lines in FIG. 59,the physical stop member(s) 604 is movable (e.g., retractable downward)to allow an unauthorized card to be moved past the stop on its way to acard holding bin 620. In alternative embodiments a movable stop membermay be rotated or pivoted to a non-interfering location. For example, astop member can be pivoted 90 degrees from a card stopping (upright)position (at ninety degrees) to a card passing (laying down flat)position (at zero degrees).

FIG. 60 shows a top view of the card 600 and stops 604 that are alsoshown in (the side view of) FIG. 59. The card 600 is positionedlong-edge first in a card reader. The card 600 includes a magnetic datastripe 605. The stop members 604 are movable to allow the card 600 to bemoved onward (to the right in FIG. 60) to a card capture bin 620 (orsimilar card retaining structure) located in the machine, Rollers,balls, belts, etc. can be used to eject a card from the card reader andinto the card capture bin.

A further exemplary security arrangement involves a card reader'shousing. The arrangement can detect that the card reader housing hasbeen breached. The housing includes an encapsulated card reader module.The inside of the module's outer wall s have circuit traces running allover in different directions. A circuit mesh or net is made up of anetwork of conductive metal wires, fibers, threads, and/or strandsthrough which an electric current flows. The mesh can be in the form ofa fine screen, with perpendicular rows and columns. The screen mesh canbe attached to the module. The screen mesh may also be embedded in wallsof the module. The distance between adjacent mesh strands can be sosmall as to not allow a conventional drill bit to pass through the meshwithout the bit breaking a strand. A break in the circuit path can betaken as an indication of a breach attempt, which can trigger an alarm.The sensor mesh arrangement can detect (or sense) if the module is beingbreached by cutting a hole into it (via a drill, laser, etc.), or byother methods of trying to achieve unauthorized access to the interiorof the module. Thus, the sensor mesh arrangement can provide for atamper resistant card reader housing. For further security, a detectionof a breach attempt can automatically trigger a card reader processorhalt and/or a flash memory erase.

A further exemplary security arrangement causes the encryption of dataread by the card reader. In an automated banking machine, data lines cantransfer read card data from the card reader to another device (e.g.,controller) in the machine. Exemplary encryption embodiments preventsomeone from tapping into these data lines and capturing read card datathat is in the clear (not encrypted).

In a first embodiment, encryption of read magnetic stripe data can becarried out at the (movable) read head. This enables the card data to beencrypted at (or near) the point where it was read. For example, theencryption can occur right in the read head (or in its housing). Thedata encryption can be carried out by circuitry built into the readhead, where the read head holds (stores) changeable encryption keys. Inoperation, the read magnetic stripe data (or read card data stored inanother data storage format) is encrypted before it is output from thecard reader. Thus, even if this card data were somehow stolen, it wouldbe difficult to interpret (decrypt).

In another embodiment the encryption can be carried out in very closeproximity to the read head. As previously discussed, the card readerhousing can be securely encapsulated (e.g., via mesh strands) to preventthe internal workings of the card reader from being accessed. Thus, theread head can safely transmit its signals in the clear (non encrypted) ashort distance within its secure housing. Circuitry (located near theread head) within the card reader can carry out the encryption of thedata received in the read head signals. The circuitry can cause thesignals carrying the encrypted data to be amplified, followed by theirtransmission to a location outside of the card reader.

Because of the encapsulation features, if someone attempted todisassemble the card reader, then all the keys and other data stored inthe card reader would be erased. For example, EEPROM, flash memory, orother suitable technology can be used to automatically erase data storedin volatile memory if the card reader was breached.

In an exemplary embodiment a magnetic read head is associated with acircuit board. The circuitry comprises one or more microprocessors. Theread head is operative to read analog (magnetic) data. The circuitryincludes an A/D converter which can convert the read analog data intodigital (binary) data. This digital data can then be encrypted by acircuit board microprocessor.

FIG. 48 shows an exemplary embodiment of a movable read head assembly520. The assembly includes a circuit board 522. Part of the read headcomponent 524 is embedded in the circuit board 522. The assembly 520 ismovable (as represented by the dual arrow) in a manner which allows theread head 524 to be moved along (parallel to) the magnetic stripe of acard inserted (long-edge first) into the card reader. Lines 526 thattransfer that transfer the read analog card data to an A/D converter 528are located inside the circuit board 522. As can be seen, thearrangement makes it difficult for someone to tap into these hiddenanalog data lines 526. A data encrypter (e.g., microprocessor) 530 ofthe circuit board 522 then encrypts the converted digital data.Different encryption keys can be stored in a memory associated with theencrypter 530.

As can be seen, the encrypting device 530 is located adjacent to (abuts)the converter 528. As a result, read card data can be quickly encryptedprior to (upstream of) being carried, to other parts of the card reader.Thus, a criminal breach of the card reader housing, which exposes (forillegally tapping into) a visible downstream data line that carries thecard data, will not compromise the card data because it would havealready been encrypted upstream of the line tap.

FIG. 49 shows another exemplary embodiment of a movable read headassembly 532. The assembly comprises a secure housing 540 that encloseseach of a reading component (read head) 534, an A/D converter 536, and adata encrypter (e.g., microprocessor) 538. Within the movable read headhousing 540, card data can be each of read, converted, and encrypted.Thus, card data is encrypted in very close proximity to (or at) the readhead 534. A flexible data line 542 extends from the housing 540 to astationary component inside the card reader. This data line 542 is of alength which allows the housing 540 to amply travel (relative to thestationary component) back and forth along (parallel to) magneticstripes of cards that were inserted long-edge first into the cardreader. Following its encryption, the encrypted card data can besecurely sent (via the flexible data line) to other circuitry inside thecard reader housing. The encrypted card data can also be securely sentoutside of the card reader housing.

Another exemplary security arrangement allows for the encryption of datathat was read from a smart card chip. In one embodiment the card readerhas contacts that engage the chip. These contacts are associated with(outside) circuitry that includes an encryption key. This exteriorcircuitry can immediately encrypt the data at the point of reading. Inanother embodiment the reading contacts are attached to (inside)circuitry that is located within the encapsulated reader. This interiorcircuitry encrypts the data that was read by the contacts from the chip.The embodiments allow for a particular signal sequence to be deliveredto the smart card in order to have it deliver its data.

Although reading of data from a substantially straight magnetic stripehas been discussed, an exemplary LEF card reader can also read data froma curved magnetic stripe of a card. The exemplary card reader does notneed pre-knowledge of the curvature pattern of the stripe in order toread the data therefrom. The read head can be driven in two horizontaldirections (X and Y). The read head arrangement includes a magneticfield sensor (or detector) arrangement. A processor receives signalsfrom this sensor arrangement. By analyzing these signals the processorcan quickly (in real time) determine whether the read head is moving(correctly) along or (incorrectly) away from the curved or skewedstripe. The processor directs the read head drive to move the read headin the (non read) direction (X or Y) of the strongest magnetic sensing.That is, based on changes in the magnetic strength sensed, the processorcan continually direct the read head along the stripe. Thus, a cardreader processor can steer a read head to read data along the path of acurved or skewed magnetic stripe.

As previously discussed, even though a long-edge first (LEF) card reader(with a movable read head) will have a larger reading width, the LEFreader itself can still be sized to fit into substantially the samespace as an existing short-edge first card reader. In an exemplaryembodiment, an additional gear drive mechanism is arranged to assist adrive device (e.g., a motor) of a magnetic head assembly. The gear drivemechanism enables the read head assembly to obtain its full (reading)speed sooner. The arrangement imparts lost motion drive to the drivedevice (e.g., a motor), which helps the drive device start driving theread head assembly at a faster speed. In the exemplary operation, thedrive device (e.g., a motor) is able to build up speed before it impartsits drive to the read head assembly. This non-driving time periodenables the drive device to reach a higher drive speed before it beginsto move (impart its drive) the read head assembly. Because a fasterinitial drive speed is imparted to the read head assembly, less time andphysical space are needed in order for the read head assembly to reach(ramp up to) its proper reading speed. Thus, the exemplary arrangementhelps to reduce the interior spacial width that would otherwise beneeded to fully ramp up the travel (reading) speed of the magnetic readhead assembly.

FIG. 50 shows a card reader 570 that allows lost motion drive to beimparted to a read head assembly. A drive device (e.g., a motor) in thecard reader 570 is in operative connection with a drive wheel (or gearor disc) 572. The drive wheel 572 rotates about a drive shaft axis 574.A belt (or chain or pulley) 576 connects the drive wheel 572 to an idlerdisk (or wheel) 578. The driven disk (disc) 578 rotates about an axis582. An abutting push member 580 is attached. (or integral) with thedisc 578. Thus, the push member 580 rotates with the disc 578. The pushmember 580 can move into contacting engagement with a projection arm 590which is in operative connection with a support structure of a read headassembly.

In the operation shown in FIG. 50 the motor (or other drive device)causes the belt 576 to move, as shown by the straight arrows. The belt576 in turn causes the disc 578 to rotate in a first direction, as shownby the curved arrow. As can be seen, the push member 580 may notinitially be in contact with the arm 590. However, the push member 580and arm 590 are arranged relative to each other such that before thepush member 580 rotates one full turn it will contact the arm 590.Movement of the push member 580 while in contact with the arm 590imparts movement to the read head assembly.

FIG. 50 shows sequential rotational locations of the push member 580,including a first (initial) position 584, a second position 586, and athird position 588. At the third position 588 the push member 580 isready to engage the arm 590.

FIG. 51 shows the push member 580 in a fourth position 592. During itsmovement from the third position 588 to the fourth position 592, thepush member 580 was pushing the arm 590.

FIG. 52 shows the push member 580 in a fifth position 594. During itsmovement from the fourth position to the fifth position, the push member580 was pushing the arm 590. In this example, the fifth position 594corresponds to the third position 588. Thus, the push member 580 movedthe arm 590 one complete rotation.

In an exemplary card reader embodiment, one complete rotation of the arm590 equates to the travel distance needed by the read head assembly toread an entire magnetic stripe. However, in other card readerembodiments the arm 590 may need to rotate a greater or lesser distanceto enable the read head assembly to perform a complete reading of amagnetic stripe. A processor can be programmed to control the motor todrive the read head assembly a predetermined reading distance.

As shown in the embodiment of FIG. 50, following start of the motor thepush member 580 traveled substantially an entire rotation beforeengaging the arm 590. This travel distance gives the motor time to buildup speed before its drive is imparted (via the belt 576, disc 578, pushmember 580, and arm 590) to the read head assembly. In the exemplaryembodiment the motor achieves the (predetermined) reading speed of theread head assembly before the disk push portion 580 engages the arm 590.This allows the read head to immediately begin reading upon itsmovement. The motor can be set to output a predetermined maximum drivespeed that corresponds to the proper reading speed of the read head.During the reading operation, the motor can maintain a constant readingspeed for the read head assembly.

As previously discussed, in an exemplary embodiment the read head canread both ways along stripes. This causes the read head to be left atalternating ends after successive readings. As can be appreciated, theend of a reading operation causes the push member 580 to be leftadjacent (e.g., abutting, near) the arm 590. Thus, for the next readingoperation the processor causes the push member 580 to be driven in theopposite rotational direction (relative to the prior reading operation).That is, if the push member 580 was driven in a clockwise direction,then its next rotation will be in the counter clockwise direction (andvice versa). Regardless of which direction it starts rotating, the pushmember 580 can travel a substantial distance before engaging the arm590, during which distance drive speed can be built up before the readhead assembly is actually driven.

It should be understood that the lost motion drive arrangement shown isexemplary, and in other embodiments a lost motion drive arrangement mayinclude different component positions, different components, and/ordifferent features. For example, in an alternative embodiment theengaging functions of the push member 580 and the arm 590 can beswitched (or reversed). That is, the arm 590 (instead of the member 580)can be arranged to function as the driving member. The arm 590 can bedriven to engage and drive the disk portion 580. The disk portion 580can forward drive to a belt, gear, or shaft that moves the read head.That is, the read head moves based on a component (e.g., belt or gear)that moves responsive to rotation of the disk 578. The motor can bearranged in operative connection (e.g., via drive shaft 574) with thearm 590 so as to impart drive to the arm, either directly or indirectly.The rotational distance the arm 590 can travel before engaging the diskportion 580 allows it to reach the reading speed of the read head (priorto portion 580 contacting the member 580). This travel distance givesthe motor time to build up speed before its drive is imparted (via driveshaft 574, the arm 590, member 580, disk 578, and belt/gear) to the readhead assembly. In another alternative embodiment the motor can be partof a miniature multi-spindle machine that transmits drive via the arm590 (and one or more other operative connecters) to a read head.

An exemplary embodiment includes a LEF card reader that can also writedata to a card. To ensure proper reading and/or writing of data, thecard reader can first squarely align (deskew) an inserted card to afinal card reading/writing position. In one embodiment the card readerincludes an inner stop. The stop has a length that can be simultaneouslycontacted there along (engaged at plural contact points) by the leadingedge of the card. That is, the card's inner edge is driven to contactthe stop at at least two points along the length of the stop. Since thestop and the card edge are both straight, the abutting card is thenstraight. Abutment of the leading edge of the card against (and along)the stop ensures that the card is properly aligned (straight) forreading/writing operations. Thus, an inserted card can be properlypositioned through use of the stop. Sensors can be used to verify thatthe card is properly abutting the stop. The stop can be an integral unitor comprise plural components spaced along its length. A card can bemoved toward the stop by a drive mechanism that engages the card at atleast one of a card face, the opposite card face, a card short sideedge, and the opposite card short side edge. As previously discussed, adrive mechanism for a card can include rollers, belts, balls, etc.,which are driven by motors, solenoids, cylinders, etc., which arecontrolled by a processor(s). For example, a differential drivemechanism can be used that includes two spaced drive points to contactand straighten the card. Each drive point drives a different portion ofthe card toward the stop. A drive point will slip against the card whenit can't move the card any further. Sensed slippage of both drive pointsindicates to a processor that the card is fully aligned against thestop.

In another embodiment an inserted card can be properly positioned (forreading/writing) through use of the shutter (gate). The card readercauses the shutter to be closed (and locked) after card insertion.Following (forward) insertion, the card is moved (backward) intoengaging contact against the closed shutter. The inside wall of theclosed shutter is substantially flat and straight. Moving the card tocause its trailing (rear) long-edge side to abut against the shutterwall results in the card being properly aligned (straight) forreading/writing operations. The card can be read (and/or written to)while positioned in this (shutter-abutting) location. Alternatively, thecard (while remaining aligned) may first be moved forward against a stopbefore data is read from and/or written to the card. Since this stop isnot used for aligning the card, it can comprise a relatively shortcontact surface.

The exemplary embodiments allow for a card that is properly aligned inits reading and/or writing position to: have its trailing edge flushwith the card entry slot (e.g., with shutter gate open); or have itstrailing edge extend outward a little from the card entry slot (or thegate); or have its trailing edge engaged in contact with the inside ofthe closed gate; or have its leading edge engaged in contact with atleast one card stopping/aligning member. A card protruding a shortdistance from the gate (or the entry slot) will allow a customer toconstantly view their card while it is being read, but prevent thecustomer from moving (via pulling, grabbing, grasping, gripping) theircard during its reading. As previously discussed, still otherembodiments allow for a card to be properly aligned/positioned by cardmoving/holding members that engage the sides of the card. The sideengaging members can also be used in combination with a gate and/or astop for aligning and/or positioning the card.

For completion of a transaction, a card reader/writer may need to causenew data to be assigned and written to a card. However, the new data maybe encrypted when it was received by the card reader/writer. Thus, thecard reader may need to first decrypt the new data before it can bewritten to the card. Otherwise, the encrypted new data may be useless tothe card.

The card reader/writer circuitry that was used to encrypt data read froma smart card chip can also be used to decrypt data. Thus, the circuitrycan receive encrypted new data, cause encrypted new data to bedecrypted, and then cause the decrypted data to be stored in the smartcard chip.

Likewise, a magnetic stripe reader/writer may need to write data to themagnetic stripe of a card (e.g., track 3). Such data may be provided forsecurity and/or convenience purposes. This process can include the cardreader decrypting data before writing onto the magnetic stripe. Thus,the magnetic stripe reader/writer can have the dual capability to both(in a same transaction) encrypt data read from the magnetic stripe, and(later) decrypt received encrypted data that is to be written themagnetic stripe. The exemplary reader/writer is also operable to writeencrypted data to (and read encrypted data from) a magnetic stripe.

Again, the exemplary embodiments provide for both encrypting anddecrypting signals at a magnetic read head, at smart card readercontacts, or at a NFC reader interface board. Other types of wirelesssignals can also be encrypted/decrypted, including RFID signals. As canbe appreciated, the exemplary embodiments provide for more securereaders of data (e.g., card readers).

In some card reader encrypting embodiments the encryption key that isbeing used by the card reader (e.g., at the read head or contacts) canstay constant through multiple transactions. However, other card readerencrypting embodiments can provide more security. For example, theencryption key associated with the card data can be changed for everytransaction. Thus, even if a criminal inserted a card with known data,then somehow tapped into the encrypted data coming out of the cardreader, and then further somehow figured out (from comparison of data)what encryption key was used, the criminal still could not (because ofthe change of keys) decrypt the new-key encrypted card data being usedin the next transaction.

One or more encryption keys can be loaded or injected into the memory ofa card reader. These keys would be used to encrypt read data (e.g., readfrom a chip or magnetic stripe). The injection can be carried outthrough use of a separate device, such as a laptop. For example, thecard reader would be connected to the separate device, then the keyswould be loaded from the separate device into the card reader memory, ifa plurality of usable keys are in the memory, then the pattern (order)used for selecting different keys can be predetermined by a program orapplication. The program can prevent the same order of key usage frombeing repeated to further enhance security. Random selection of a keyfrom the plural stored keys can also be applied.

In an exemplary embodiment an automated banking machine includes atleast one secure encrypting device. The encrypting device is inoperative connection or communication with a machine controller (e.g.,machine controller). The machine controller may comprise one or morecomputers (processors). The encrypting device is operative to encryptand decrypt data (or signals) on behalf of the machine controller. Theencrypting device can include in storage (or have access to), aplurality of different keys for encrypting and decrypting data. Thetamper resistant encrypting device can have a housing that includes aprotective sensor mesh. The encrypting device (box) is designed suchthat an attempted breach thereof will cause its stored keys to berendered useless or destroyed. Thus, the interior keys are inaccessibleto criminals.

For ease of understanding, the encrypting device may be referred toherein as an encrypting PIN pad (EPP). In the exemplary embodiment theEPP can encrypt an inputted customer PIN. The EPP is operative toreceive user inputs through the keypad keys, and encrypt correspondingkey input signals within the keypad so that the output from the keypadis encrypted. The EPP can provide the encrypted PIN data to the machinecontroller. The machine controller can then cause the encrypted PIN datato be sent (in one or more messages) to the transaction host computer.Thus, from the time of its customer input the PIN data can remainencrypted during its entire transport to the host. Examples ofencryption/decryption of information being sent in messages between anautomated banking machine and a host system can be found in U.S. Pat.No. 7,159,114, which has been incorporated herein by reference in itsentirety.

A message being sent from the automated banking machine to a transactionhost (e.g., a server) may be sent in the clear (without encryption).Alternatively, the message being sent to the host may be encrypted, suchas via SSL or another available encryption layer. That is, enhancedsecurity can be provided at the network transport layer by providing(SSL) encrypted communications between the machine and the host. As aresult, the PIN data may be doubly encrypted. The host can decrypt a(SSL) message received from the machine. As discussed in more detaillater, the host can use the message's EPP-encrypted PIN data todetermine whether the customer inputted PIN corresponds to the correctuser account in authorizing the customer.

The message being sent from the automated banking machine to the hostcan include other data besides the PIN. This other data can includemagnetic stripe data and/or chip data that was read by a card reader.For example, read card data may correspond to an account number, etc.The card reader can encrypt this read card data using an encryption key(stored in card reader memory) in a manner as previously discussed.Because this card data is encrypted, it can be securely output from thecard reader. Thus, from the time of its reading, the card data canremain encrypted while inside the card reader. The exemplary arrangementprevents a criminal from obtaining by tapping into a card reader, nonencrypted (clear) card data that was read by the card reader.

FIG. 53 shows an automated transaction machine arrangement that allowscommunication between a card reader 550 and an encrypting/decryptingdevice (e.g., an EPP) 552, via a machine controller 554. Card dataencrypted by the card reader 550 can be sent from the card reader to themachine controller 554. In turn, the controller 554 sends the encryptedcard data to the EPP 552 for decryption. The EPP 552 has access to thedecryption key which allows the EPP to decrypt (or decipher) the carddata encrypted by the card reader 550. The EPP 552 sends the decryptedcard data back to the controller 554. As previously discussed, thecontroller 554 can then send the card data (along with the encrypted PINdata) in one or more messages to a remote computer, such as atransaction host. The host can use the received card data (e.g., accountnumber) to obtain PIN data that is correlated therewith in a data store.The host can then compare the PIN data received from the machine to thePIN data obtained from the data store. Correspondence between the twoPIN data can be used to validate the customer as an authorized user ofthe machine.

In a further embodiment, following the decryption of cardreader-encrypted card data by the encrypting/decrypting device (EPP),the EPP can then operate to re-encrypt the card data using a differentencryption key. The EPP can re-encrypt the card data using the same(private) encryption key (stored in EPP memory) that is used to encryptthe PIN data. This re-encrypted card data can then be sent to themachine controller. The controller can then cause the encrypted PIN dataand the encrypted card data to be communicated (via SSL) in at least onemessage to the host. As a result, the card data (like the PIN data) mayhave a dual layer of encryption. The message can include at least oneencipherment/decipherment certificate of the EPP. The host can decryptthe (SSL) message received from the automated transaction machine. Thehost (which may comprise one or more computers) can then decrypt theEPP-encrypted card data from the decrypted message.

In another alternative embodiment the EPP (or controller) sendsinstructional content along with the EPP-encrypted card data. Theinstructions are included in the message sent to the host. Theinstructions inform/instruct the host on how to decrypt the card data.For example, the instructions may include data that the host can thenprocess in a predetermined, time-dependent manner in order to resolveone or more keys. The resolved keys enable recovery of the card data.

In a further alternative embodiment the controller does not pass thereceived card reader-encrypted card data onto the EPP. Rather, thecontroller sends the reader-encrypted card data directly to the host.Instructional content for processing (deciphering) the encrypted carddata is also sent (along with the card reader-encrypted card dataitself) in a message to the host. The card reader (or the controller)can produce/provide the instructional content that gets included in themessage to the host.

It should be understood that an automated transaction machine controllercan include both the encrypted PIN data and the encrypted card data in asame message to the host. Alternatively, the machine controller mayindividually send the encrypted PIN data and the encrypted card data inseparate messages to the host. Again, the message(s) communicated fromthe machine to the host can be encrypted (e.g., via SSL, etc.) at themachine computer level. Furthermore, additional encryption/decryption ofthe message may be conventionally carried out by other network computersduring the communication process. As a result, during transport to thehost, both the PIN data and the card data may have multiple (e.g., dual)layers of encryption. The machine controller may be local with themachine (e.g., located within the machine housing) or remotely locatedfrom the machine. That is, the machine controller (e.g., one or morecomputers) may operate the machine (and cause operation of machinecomponents, transaction devices, etc.) from a location that is remote(e.g., distant) from the actual machine location.

Several communication arrangements can be used to provide securetransfer of data between the EPP and the card reader. In one embodimentthe EPP and the card reader operate to exchange (with each other) theirrespective public keys of a public/private key pair. A hand shakingprocess may be used between the EPP and the card reader totransmit/receive encrypted data. The EPP generates a random number. TheEPP then encrypts the random number using its private key. The EPP thensends this encrypted random number to the card reader. As previouslydiscussed, communication between the EPP and card reader may be via thecontroller. The card reader then uses the public key of the EPP todecrypt the random number. The card reader then encrypts the read carddata with the card reader's private key and the random number. The cardreader then sends the encrypted data to the EPP. The EPP then receivesthe encrypted data. The EPP first decrypts the received data using thecard reader's public key. Then using the random number that waspreviously sent to the card reader, the EPP resolves the card data inthe clear. As discussed, the card data is then included (either in theclear or encrypted) in a message sent to the host.

To make it harder to intercept read card data, the communicationexchange process between the EPP and card reader could be performed forevery transaction. That is, for every card reading transaction a newrandom number would be used in encrypting the card data.

Another exemplary approach has the card reader generating the randomnumber, which is then sent to the EPP. Alternatively, instead of using arandom number, the value that is used for a key could be a combinationof current or prior transaction data. The value can also be acombination of other static data, such as serial numbers of the EPP orthe card number. The value could also be based on digital certificatedata stored in either the card reader or the EPP. These approaches areexemplary, and other approaches can also be used.

In another embodiment the previously described roles of the card readerand EPP can be reversed. For example, the card reader can send the readcard data to the controller. The card reader can also receive the PINdata from the EPP. The card reader can forward the received PIN data tothe controller, which in turn sends the data (card data and PIN data) tothe host. Either one or both of the card data and PIN data can beencrypted. The card reader can also decrypt the received EPP-encryptedPIN data and then re-encrypt it before sending it to the controller. Insuch a reversed role the card reader could function as the mainencrypting and decrypting device for the machine (controller).

FIG. 54 shows an arrangement that allows direct communication between acard reader 556 and an EPP 558. This device-to-device directcommunication can be wireless or involve a dedicated (physical) dataline 560. In this embodiment the controller is bypassed. The EPP 558(instead of the controller) can be programmed to send the message (whichincludes PIN data and card data) to the host. Thus, the EPP 558 can acton behalf of (perform functions of) the controller. The controller canbe informed (e.g., receive a confirmation) that a message was sent.

Furthermore, in further embodiments the EPP may be programmed to controlall automated banking machine communications with the host. Thecontroller may be notified of messages sent and received. Thesenotifications can be from at least one of the EPP and the host. Aspreviously discussed, roles of the card reader and EPP can be reversed.With such a reversal, the card reader could likewise be the selecteddevice that is operated to carry out all machine communications with thehost.

FIG. 55 shows another exemplary communication arrangement. Thearrangement allows Internet communication 566 between a card reader 562and an EPP 564. Both the EPP and the card reader can have one or moreprocessors. That is, both the EPP and the card reader can be viewed asseparate and distinct computers. Thus, data communication between theEPP and the card reader can be carried out over a network (e.g., theInternet) that at least partly extends (through at least one remotecomputer located) outside of the automated banking machine. Thisindirect line of communication can likewise be encrypted. Communicationfeatures and arrangements can be used herein, like those discussed inU.S. application Ser. No. 13/066,272 filed Apr. 11, 2011, which isherein incorporated by reference in its entirety.

Although exemplary communication arrangements have been discussed whichcan provide secure (encrypted) transfer of data between a card readerand an EPP with regard to an automated banking machine, the novelfeatures, processes, and relationships are not limited to only securecard reader/EPP communication. Other embodiments allow for otherautomated banking machine transaction function devices to also securelycommunicate with the EPP (or another device used for encrypting datasent to the host).

For example, an automated banking machine can also include securecommunication between a check acceptor and an EPP. The secure checkacceptor/EPP communication can be conducted in a manner similar to anyof the different forms (arrangements) of card reader/EPP securecommunication previously discussed. The encrypting check acceptor can beconfigured to receive and scan financial checks. Thus, the checkacceptor can obtain check data (private/personal data, account data,amount data, etc.) from a check, encrypt this check data, then send theencrypted check data to the EPP. Likewise, the automated banking machinecan have secure (encrypted) communication of deposit data between a cashacceptor and the EPP. Furthermore, the machine can have encryptedcommunication of cash withdrawal data between a cash dispenser and theEPP. Likewise with touch screen display/EPP communication. As can beseen, an exemplary automated banking machine provides for secure(encrypted) transfer of data between any two of its transaction functiondevices that require communication therebetween.

FIG. 56 shows an encrypting PIN pad (EPP) 630. The keypad 630 includeskeys 632 through which an machine user can manually provide inputs. Thekeypad 630 includes at least one internal processor 634. The EPPprocessor 634 is in operative connection with at least one data store638. In an exemplary embodiment the data store includes digitalcertificates, at least one public key, and at least one private key. Thedata store 638 can also include other programmed instructions thatfacilitate maintaining the security of the keypad as well as themachine. The EPP 630 can include a visual indicator 636 thatcommunicates to a machine user that inputs to the keypad are secure.Exemplary embodiments of the EPP 630 may include features as describedin U.S. patent application Ser. No. 10/126,808 filed Apr. 19, 2002, thedisclosure of which is incorporated herein by reference in its entirety.

The EPP 630 can be in operative connection with at least one processor640 (e.g., machine controller), which may be an internal processor. Themachine processor 640 is in operative connection with at least one datastore 642. The processor 640 can also be in operative connection with aplurality of transaction function devices 650. The transaction functiondevices may include devices that operate in the machine responsive tothe processor 640. These devices may include for example a display, cardreader, cash dispenser, depository, check acceptor, and other devicesoperative in the machine to carry out transactions.

The processor 640 executes programmed instructions stored in the atleast one data store 642. The instructions are operative to cause themachine to carry out transactions. The processor 640 is operative tocommunicate through at least one appropriate interface in a network 652.The network 652 enables the machine to communicate with at least oneremote computer 654. The remote computer 654 can include for example, afinancial transaction computer (e.g., a transaction host computer) whichtransfers funds and keeps track of accounts held by users of themachine. In various embodiments the machine may communicate throughnumerous different networks and with numerous different remotecomputers. The configuration shown in FIG. 56 is merely schematic.

Principles like that applied in connection with the exemplary userkeypad 630 may also be applied through other machine transaction devicesthat are operative to receive sensitive user inputs, such as the cardreader 644. The card reader includes at least one internal processor.The card reader processor is in operative connection with at least onedata store.

In an exemplary embodiment the machine senses that a user has presenteda card to an opening 648 (e.g., card entry slot) associated with a cardreader. In response to this sensing, the computer instructions of theprocessor 640 cause the card reader 644 to be in a ready read state, inwhich data can be read from the card by the card reader 644. The cardreader processor can cause the card reader to provide encrypted outputswhich correspond to the data (e.g., account number) read from the card.That is, the card reader operates in accordance with its programming(and/or instructions from the at least one machine processor 640) toencrypt the read card data. The card reader 644 can also include avisual indicator 646 which indicates to a machine user that read carddata will be encrypted.

The card reader 644 can then operate in accordance with its programming(and/or instructions from the at least one machine processor 640) tocause the encrypted card data to be sent to the EPP 630. In an exemplaryembodiment the encrypted card data travels from the card reader 644 tothe machine processor 640 and then to the EPP 630. As previouslydiscussed, the EPP 630 can decipher the received encrypted card data,then encrypt the card data, and then send the newly encrypted card databack to the machine processor 640. The machine processor 640 can thencause the EPP-encrypted card data to be sent to a remote transactionhost computer.

Thus, the new and improved features and relationships achieve at leastone of the above stated objectives, eliminate difficulties encounteredin the use of prior devices and systems, solve problems, and attain thedesirable results described herein.

In the foregoing description certain terms have been used for brevity,clarity and understanding, however no unnecessary limitations are to beimplied therefrom because such terms are used for descriptive purposesand are intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and the invention is notlimited to the details shown and described.

In the following claims, any feature described as a means for performinga function shall be construed as encompassing any means known to thoseskilled in the art capable of performing the recited function, and shallnot be limited to the structures shown herein or mere equivalentsthereof.

The term “non-transitory” with regard to computer readable medium isintended to exclude only the subject matter of a transitory signal perse, where the medium itself is transitory. The term “non-transitory” isnot intended to exclude any other form of computer readable media,including media comprising data that is only temporarily stored orstored in a transitory fashion. Should the law change to allow computerreadable medium itself to be transitory, then this exclusion is nolonger valid or binding.

Having described the features, discoveries and principles of theinvention, the manner in which it is constructed and operated, and theadvantages ad useful results and useful results attained; the new anduseful structures, devices, elements, arrangements, parts, combinations,systems, equipment, operations, methods, processes, and relationshipsare set forth in the appended claims.

1. A non-transitory, tangible computer readable medium of instructionswith computer readable instructions stored thereon for execution by aprocessor, and when executed operable to: obtain data associated with afinancial account encrypted by a first key; decipher the data associatedwith the financial account encrypted by the first key; obtain datarepresentative of a personal identification number (PIN) associated withthe financial account; encrypt the data associated with the financialaccount and the PIN with a second key; and transmit the data associatedwith the financial account and the PIN encrypted that were encryptedwith the second key to a host computer.
 2. The computer readable mediumof claim 1, further operable to receive a request to dispense cash fromthe financial account; and transmit the request to dispense cash fromthe financial account to the host computer.
 3. The computer readablemedium set forth in claim 2, further operable to provide instructions toa cash dispenser to dispense cash responsive to obtaining authorizationfrom the host computer to dispense cash.
 4. The computer readable mediumset forth in claim 1, wherein the data associated with a financialaccount encrypted with a first key is obtained from a card reader; andthe instructions are further operable to compare data obtained from thecard reader with card information stored in a data store.
 5. Thecomputer readable medium set forth in claim 4, wherein the card readerobtains the data associated with the financial account from a magneticstripe of a card inserted into the card reader.
 6. The computer readablemedium set forth in claim 5, further operable to: obtain datarepresentative of encryption data used by the card reader to encrypt thedata associated with the financial account; and deciphering the dataassociated with the financial account employs the encryption data. 7.The computer readable medium set forth in claim 6, wherein theencryption data includes a random number.
 8. The computer readablemedium set forth in claim 7, wherein the instructions are furtheroperable to: generate the random number; and communicate the randomnumber to the card reader.
 9. The computer readable medium set forth inclaim 7, wherein the instructions are further operable to obtain therandom number from the card reader.
 10. The computer readable medium ofclaim set forth in claim 1, wherein the data associated with a financialaccount is determined from biometric data obtained from an associateduser.
 11. The computer readable medium of claim 1, wherein the firstencryption key differs from the second encryption key.
 12. A method,comprising: obtaining data associated with a financial account encryptedby a first key; decrypting data representative of a financial accountnumber from the data associated with the financial account encrypted bythe first key; obtaining data representative of a personalidentification number (PIN) associated with the financial account;encrypting the data representative of the financial account and the PINwith a second key; and transmitting the financial account number and thePIN that have been encrypted with the second key to a host computer. 13.The method of claim 12, further comprising: receiving a request todispense cash from the financial account; and transmitting the requestto dispense cash from the financial account to the host computer. 14.The method of claim 13, further comprising providing instructions to acash dispenser to dispense cash responsive to obtaining authorizationfrom the host computer to dispense cash.
 15. The method of claim 12,wherein the data associated with a financial account encrypted with afirst key is obtained from a card reader; the method further comprisescomparing data obtained from the card reader to be compared with cardinformation stored in a data store.
 16. The method of claim 15, whereinthe card reader is operable to encrypt an account number using the firstencryption key and encryption data; and wherein decrypting datarepresentative of a financial account number from the data associatedwith the financial account encrypted by the first key employs theencryption data to decipher the account number encrypted by the cardreader.
 17. The method of claim 16, wherein the encryption data includesa random number.
 18. The method of claim 17, further comprising:generating the random number; and communicating the random number to thecard reader.
 19. The method of claim 17, further comprising obtainingthe random number from the card reader.
 20. The method of claim 12,wherein the first encryption key differs from the second encryption key.