Automated banking machine with noncontact reading of card data

ABSTRACT

An automated banking machine operates responsive to data read from data bearing records. The data corresponds to user card data received from a cell phone. The machine generates and displays a random number correlated with a time period. The machine user inputs the displayed random number into their phone. A software application in the phone encrypts the selected card data along with the inputted random number. The phone then displays a bar code image containing the encrypted data. The machine includes a bar code reader to read the displayed image. The machine can decrypt the random number and the card data from the read image. The random number is used to verify the current banking transaction session. The process replaces physical insertion of a card yet allows secure input of card data.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.12/075,352 filed Mar. 11, 2008, which is a continuation-in-part of U.S.application Ser. No. 11/975,907 filed Oct. 22, 2007, which both claimsthe benefits of U.S. Provisional Application 60/918,453, 60/918,455, and60/918,458 each filed Mar. 16, 2007, and is a continuation-in-part ofU.S. application Ser. No. 11/093,741 filed Mar. 29, 2005, now U.S. Pat.No. 7,284,692, which claims the benefit of U.S. Provisional Application60/557,937 filed Mar. 31, 2004. The disclosures of each of theseapplications are herein incorporated by reference.

TECHNICAL FIELD

This invention relates to banking systems controlled by data bearingrecords, which is currently classified in U.S. Class 235, Subclass 379.Exemplary embodiments include card-activated automated banking machineapparatus, systems, and methods that provide improved security,reliability, and serviceability.

BACKGROUND OF INVENTION

Automated transaction machines include automated banking machines. Acommon type of automated banking machine is an automated teller machine(“ATM”). ATMs may be used to perform transactions such as dispensingcash, accepting deposits, making account balance inquiries, payingbills, and transferring funds between accounts. ATMs and other types ofautomated banking machines may be used to dispense media or documentssuch as currency, tickets, scrip, vouchers, checks, gaming materials,receipts, or other media. While many types of automated bankingmachines, including ATMs, are operated by consumers, other types ofautomated banking machines may be operated by service providers. Suchautomated banking machines may be used by service providers to providecash or other types of sheets or documents when performing transactions.For purposes of this disclosure, an automated banking machine or ATMshall be construed as any machine that is capable of carrying outtransactions which include transfers of value.

Automated banking machines may benefit from improvements.

OBJECTS OF EXEMPLARY EMBODIMENTS

It is an object of an exemplary arrangement to provide an automatedbanking machine.

It is a further object of an exemplary arrangement to provide anautomated banking machine with an improved card data reader arrangement.

It is a further object of an exemplary anangement to provideimprovements to card readers used in automated banking machines.

It is a further object of an exemplary arrangement to enable cardreaders to be readily installed in existing automated banking machinesto increase the machine's functionality.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a card data reader that requires lessservice.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a card data reader that requires lessfascia space.

It is a further object of an exemplary arrangement to provide anautomated banking machine that is capable of reading user card data in acontactless manner.

It is a further object of an exemplary arrangement to provide anautomated banking machine with a contactless card data reader.

It is a further object of an exemplary arrangement to provide a methodof reading bank card data with an automated banking machine.

It is a further object of an exemplary arrangement to provide a methodfor upgrading an existing machine to provide for improved card datareading.

Further objects of exemplary arrangements will be made apparent in thefollowing

Detailed Description of Exemplary Embodiments and the appended claims.

A popular brand of automated banking machine is manufactured by Diebold,Incorporated. Such automated banking machines are capable of receivingtherein a banking card from a user of the machine. The card can haveuser information such as an account number encoded in a magnetic stripeon the card. A machine card reader is capable of reading the magneticstripe. The information may correspond to a user's personalidentification number (PIN). The user generally can enter the PINthrough use of a machine keypad. The machine operates either by itselfor in conjunction with one or more connected systems to determinewhether the keypad-entered PIN corresponds to the card-entered data.Upon determination that the PIN and card data correspond, the user canbe authorized to carry out one or more transactions with the machine.Such a transaction may include dispensing cash such as currency notes tothe machine user.

Magnetic stripe cards can have the problem of wearing out. Magneticstripe cards are also susceptible to being duplicated or reproduced byunauthorized persons. The contact head of a contact type card reader canbe subject to excessive dirt accumulation or wear due to physicalcontact with cards. These conditions present the increased potential forfraud and/or requiring card reader maintenance which may place anautomated banking machine out of service. The location and spacerequired by a contact type card reader can also limit a machine frompresenting additional banking features to a user.

The foregoing objects can be accomplished in an exemplary arrangement byproviding an automated banking machine with a contactless card datareader. A contactless card reader may be installed in new automatedbanking machines or in existing machines without-further substantialmodifications to the machines. Security risks may be reduced. As serviceissues could be reduced without the wear due to card reader head/cardcontact, use of a contactless card reader enables enhanced machinereliability at a modest cost.

A Radio Frequency Identification (RFID) card and RFID card readerarrangement can be used instead of, or as an adjunct to, a conventionalcard and contact type card reader arrangement. A card data image andimage reader arrangement can also be used.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a side schematic view of an automated banking machine.

FIG. 2 shows a front view of the automated banking machine of FIG. 1.

FIG. 3 shows an alternative fascia of an automated banking machine.

FIG. 4 shows a card including an RFID tag.

FIG. 5 shows an alternative RFID card.

FIG. 6 shows a side view of an ATM drive-thru arrangement.

FIG. 7 shows a top view of an ATM drive-thru arrangement.

FIG. 8 shows a facility having plural RFID tag reading devices.

FIG. 9 shows an automated banking machine having a dual use card readerslot.

FIG. 10 shows an RFID reader is positioned adjacent to a magnetic stripereader.

FIG. 11 shows an interior portion of an automated banking machine withcomponents arranged in wireless communication.

FIG. 12 shows an automated transaction machine and host arrangement,with the machine having card data image reading capabilities.

FIG. 13 shows a mobile device having image display capabilities, withthe image including card data.

FIG. 14 shows a relationship among a customer, an ATM having electroniccard data handling capability, and a host.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1 there is showntherein an automated banking machine, generally indicated by numeral 10,used in connection with exemplary embodiments. A banking system that iscontrolled by data bearing records includes the automated bankingmachine 10. The automated banking machine 10 can be an automated tellermachine (ATM). The ATM can include one or more cash dispensers. A cashdispenser includes one or more mechanisms that operate to selectivelydispense cash stored within the machine to users of the machine. Theautomated banking machine 10 includes a fascia 12 which serves as a userinterface (or customer interface).

The automated banking machine 10 includes a housing 14 which housescertain components of the machine. The components of the machine caninclude input and output devices. The input devices may include a′readerdevice schematically indicated 16. The reader device is operative toread data bearing records presented by machine users. Such records caninclude data corresponding to at least one of the associated user, oneor more user financial accounts, and/or other data. In an exemplaryarrangement the reader device 16 comprises a card reader that isoperative to read data included on a customer's card. An exemplary cardcan include information about the customer thereon or therein, such asthe customer's name, account number, and/or other data.

A card reader may comprise a magnetic stripe card reader which is ableto read data from magnetic stripes of cards. However, in an exemplaryembodiment the card reader is operative to read data from other types ofcards or records, such as contactless cards. For example, the cardreader 16 may comprise a contactless card reader. Such a card reader maybe operative to read data on RFID cards. Of course, these approaches areexemplary.

The fascia can include a keypad 18, function keys 20, display 22,receipt outlet slot 24, mini account statement outlet 26, document(e.g., cash) withdrawal opening 28, document deposit opening 30, and awriting shelf 32. It should be understood that these transactionfunction devices and features of the described ATM user interface areexemplary and in other embodiments the user interface may includedifferent components and/or features and/or arrangements.

FIG. 2 shows a front view of the automated banking machine 10 of FIG. 1.The keypad 18 can include a plurality of input keys which may bemanually actuated by a customer to provide manual inputs to the machine.The function keys 20 can be used to permit a customer to respond toscreen prompts.

The display 22 is viewable by an operator of the machine. The displayenables outputs through a display screen. The display may also enableinputs through the display screen. Thus, the display can be a displaytype that enables both outputs and inputs. Therefore the display can beboth an input device and an output device. For example, the display 22may be a touch screen display which enables outputs through displays onthe screen and enables customers to provide inputs by placing a fingeradjacent to areas of the screen. A combined input and output device,such as a touch screen display, can provide outputs to a user as well asreceiving inputs from the user. The display 22 may include an LCD,plasma, CRT or other display type that is capable of providing visibleindicia, such as still images or moving video, to a customer.

It should be understood that in various arrangements other types ofinput devices may be used, such as biometric readers that may beoperative to receive customer identifying inputs such as fingerprints,iris scans, retina scans, and face topography data that provide datathat is usable to identify a user. One or more camera devices may alsobe used to serve as input devices for biometric features and the like.Other input devices such as speech or voice recognition devices, facialrecognition arrangements, inductance type readers, IR type readers, andother types of devices which are capable of receiving information thatidentifies (or can be used to identify) a customer and/or their accountmay also be used. An example of an ATM that uses biometric input devicesand other types of input devices is shown in U.S. Pat. No. 6,023,688,the disclosure of which is herein incorporated by reference in itsentirety.

Further output devices associated with the exemplary user interface caninclude a speaker. A headphone jack can also be used to serve as anoutput device. A headphone jack may be connected to a headphone providedby a user who is visually impaired to provide the user with voiceguidance in the operation of the machine. Alternatively, the machine 10may provide a headphone for a customer.

The automated banking machine 10 may also include a receipt printerwhich is operative to provide users of the machine with receiptsreflecting transactions conducted at the machine. A printer device canbe used that is operative to print receipts. Transaction receipts may beprovided to users through a receipt delivery slot extending through afascia portion. Exemplary receipt printers that may be used in someembodiments are shown in U.S. Pat. No. 5,729,379 and U.S. Pat. No.5,850,075, the disclosures of which are herein incorporated by referencein their entirety.

Exemplary embodiments may also include other types of printingmechanisms such as statement printer mechanisms, ticket printingmechanisms, check printing mechanisms, and other devices that operate toapply indicia to media in the course of performing transactions carriedout with the machine.

In other embodiments, output devices may include devices such as audiospeakers, IR transmitters, or other types of devices that are capable ofproviding outputs which may be perceived by a user either directly orthrough use of a computing device, article, or machine. Exemplaryautomated banking machine features and systems which may be used invarious embodiments are further shown in U.S. Pat. Nos. 6,705,517;6,682,068; 6,672,505; 6,598,023; 7,156,295; 7,306,142; 7,314,163;7,316,349; 7,322,481; 7,322,517; 7,333,954; and 7,337,955, thedisclosures of each of which are incorporated herein by reference intheir entirety.

The machine 10 can also include a deposit acceptance area. The depositacceptance area is an area through which deposits or deposit documents,such as deposit envelopes, to be deposited by users can be placed intothe machine. The deposit acceptance area can include the documentdeposit opening 30. The deposit opening 30 is in operative connectionwith a deposit accepting device positioned in a secure chest area of themachine. Exemplary types of deposit accepting devices are shown in U.S.Pat. No. 4,884,769 and U.S. Pat. No. 4,597,330, the disclosures of whichare herein incorporated by reference.

It should be understood that these input and output devices of the userinterface are exemplary and in other embodiments, other or differentinput and output devices may be used.

The automated banking machine 10 can include one or more internalcomputers, which may be alternatively referred to herein as controllers.These internal computers can include one or more processors. Theseprocessors may be in operative connection with one or more data stores.In some embodiments, processors can be located on certain devices withinthe ATM so as to individually control the operation thereof. Examplessuch as multi-tiered processor systems are shown in U.S. Pat. No.6,264,101 and U.S. Pat. No. 6,131,809, the disclosures of which areherein incorporated by reference.

In an exemplary arrangement to conduct transactions, the machine 10 cancommunicate with one or more computers remotely located from themachine. These remote computers are operative to exchange messages withthe machine. For example, the remote computers may be used to authorizeand record the occurrence of various transactions.

The machine 10 may communicate through a network with a transactionhost, such as a bank or financial transaction entity. The host has atleast one computer which is operative to exchange messages with themachine. For example, a bank may receive one or more messages from themachine requesting authorization to allow a customer to withdraw $200from the customer's account. A computer at the bank can operate todetermine that such a withdrawal is authorized. The computer, or anothercomputer affiliated therewith, can then return one or more messages tothe machine through the network authorizing the machine to allow thewithdrawal transaction.

In an exemplary embodiment, at least one processor in the machine 10 isoperative to cause the communication of data corresponding to data readfrom a user's card. The read card data can be sent from the machine to aremote (bank) computer as part of one or more messages. The machine mayalso communicate other data corresponding to user inputs to the remotecomputer, such as a personal identification number (PIN), a primaryaccount number (PAN), and/or transaction request data. The remotecomputer can operate to compare the data corresponding to card dataand/or PIN data to stored data, which corresponds to authorized users,in at least one data store associated with the remote computer.Responsive to the data corresponding to an authorized user and apermissible transaction request, the remote computer can communicate atleast one message to the machine which corresponds to authorization tocarry out the requested transaction.

After the machine 10 conducts the functions to accomplish a transaction,such as dispensing cash, the machine can send one or more messages backthrough the network to the bank indicating that the transaction wassuccessfully carried out. Of course, these message types are merelyexemplary and other transaction messages may be used.

It should be understood that in some embodiments the machine 10 maycommunicate with other entities and through various networks. Forexample, in an exemplary embodiment the machine can communicate withcomputers operated by machine service providers. Such service providersmay comprise entities which are to be notified of status conditions ormalfunctions of the machine, as well as entities who are to be notifiedof corrective actions. A service provider may be able to service amalfunctioning machine. An example of such a system for accomplishingthis is shown in U.S. Pat. No. 5,984,178, the disclosure of which isherein incorporated by reference.

Other third parties may also receive notifications from the machine 10.These other parties may include entities responsible for deliveringcurrency to the machine to ensure that the currency supplies in themachine do not become depleted. Further entities may be responsible forremoving deposited items from the machine.

Additional entities may be notified of actions at the machine. Theseadditional entities may include entities which hold marketing dataconcerning consumers and who provide messages which correspond tomarketing messages (e.g., advertisements) to be presented to consumers.These additional entities may also be able to communicate with themachine 10 to provide marketing messages to machine users.

Various types of messages may be provided to remote systems and entitiesby the machine depending on the capabilities of the machines in variousembodiments and the types of transactions being conducted. Furthermore,machine communication with the various entities can be separate andindependent of any machine communication with the transaction host. Thatis, communication may occur (directly) between the machine and a thirdparty without involving the transaction host. Thus, the machine 10 cankeep non financial transaction communication separated from financialtransaction communication. The two (or more) open communication pathscan also be operated independently simultaneously, with no pathcontingent on another.

In an exemplary embodiment discussed in more detail herein, an automatedbanking machine may use contactless reading devices or arrangements ortechniques to obtain information from or about a customer. Anon-contacting card reading device can be used. Unlike conventionalcontact type card reading which involves physical contact, the exemplaryembodiments permit card reading to occur without requiring physicalcontact between the card reading device and the card.

For example, a customer bank card may include an indicator member ordevice such as a non-contact transponder to communicate with theautomated banking machine. Radio frequency (e.g., radio waves) can beone manner in which to communicate in a non-contact relationship, e.g.,communication not based on physical contact. Radio frequency (RF) typereaders and/or RF transmitters can be used. Other types of remotecommunication may also be used.

A customer bank card can have one or more radio frequency identification(RFID) tags (or devices or indicator members). RFID tags may also bereferred to as “smart labels.” The tags can contain data indicative orreflective of customer information. RFID tags may operate on the RFbackscatter principle. Data communication can occur between an RFID tagand a card reader 16 of an automated banking machine. An RFID reader canbe arranged to interrogate the RFID tag to obtain information therefrom.RFID readers may also be referred to as “interrogators.”

In exemplary embodiments, an RFID tag may be of a type that does notneed a power source (e.g., battery), but operates based on RF energyprovided by a reader. A tag may also have an internal antenna embeddedin an RFID chip. An RFID reader can be equipped with the power necessaryto activate the chip and receive the stored information therefrom. TheRFID tags and readers discussed herein may have RFID Industry Standardsdeveloped by ANSI (American National Standards Institute) or theInternational Standards Organization (ISO) or other standard developingorganizations. For purposes of this disclosure, an RFID tag will beconsidered to include any device which provides data output via RFsignals, whether separate from or integral with another article, such asfor example, a card.

A customer bank card in an exemplary embodiment may include informationin non-contact RFID tags instead of or in addition to information inmagnetic stripes and/or information in a programmable memory of a smartcard. That is, magnetic stripe (or magnetic strip) cards and smart cardsmay further include customer RFID tags. One or more tags may beremovably attached or mounted to a card (e.g., thereon or therein).Alternatively, tags may be permanently affixed to a card, such asembedded in a (plastic) portion of a card.

In an exemplary embodiment, an RFID tag is operative to storeinformation therein representative of or corresponding to a customer,such as the customer's account number, PIN, name, primary bank,affiliated banks, and/or preferences. In an exemplary embodiment, tagscan contain much more customer-related data than can be represented by amagnetic stripe (or magnetic strip) type of arrangement. For example,tags may also contain information reflective of additional securityfeatures, customer profile data, card age, display preferences, etc. Atag may also carry a unique customer identification number of 32 bits orlonger. In the exemplary embodiment tags enable a card to store moreinformation in a smaller space in comparison to prior art magneticstripe cards.

RFID tags do not require physical contact (e.g., mechanical orelectrical contact) with a card reader component. In an exemplaryembodiment a customer can pass or wave their card adjacent to or over acard scanning area 36 associated with the card reader device 16 to havethe card data (and user information) remotely read. The scanning area 36can comprise a surface area of the ATM fascia. A card reader and an RFIDcard can be remotely (and wirelessly) separated during reading of thecard. The contactless arrangement can prevent damage or deterioration(such as dirt accumulation, wear and tear) to a card reader, and mayfurther reduce machine down time associated with maintenance andservice. In an exemplary embodiment RFID cards are more difficult tocounterfeit in comparison to prior art magnetic stripe cards.

In exemplary embodiments, RFID tags can have read-only or rewritablememory for storage of customer information. RFID tags can have a memorywhich can be changed or modified by authorized personnel or devices. Thetag memory may be programmable. For example, an employee or machineassociated with a bank may have a device operative to communicate withan RFID tag to change and/or insert data contained therein. A hand-heldRFID tag communication device can be used. An automated banking machine(e.g., ATM) can incorporate a device for changing RFID data. Forexample, communication between an ATM and a machine user's RFID card mayoccur, such as during an ATM transaction (e.g., cash withdrawaltransaction).

Alternatively, a tag may have unchangeable data. In such alternativesituations, a combination of plural read-only tags may need to beassigned or attached to a particular card to fully represent itsinformation content. A card may also have a combination of read-only andprogrammable tags.

An RFID reader device of an exemplary automated banking machine can beequipped to remotely read a user card. The reader is operative to readcard data while the card is not in physical contact relationship withthe machine. Thus, a card can be spaced from the card reader deviceduring card reading. For example, a card reader device can be arrangedto read RFID card data as a customer passes their card adjacent to acard scanning area associated with the card reader device. It followsthat communication between a bank card and an ATM card reader can occurwithout physical contact, which would occur with the use of conventionalcontact type (e.g., magnetic stripe) card readers.

Because the physical aspects of a through-the-fascia portion of acontact type card reader interface can be avoided, the service and/orreliability issues for an RFID card reader compared to other contacttype readers can be reduced and/or eliminated. Also, the wear ofcomponents (e.g., contact read head, mechanical card transports, andcard sensors) associated with conventional contact type card readers canbe eliminated. Furthermore, wear to a user's card can also be reduced.

In an exemplary embodiment, when a card having an RFID tag is withinrange of an ATM card reader, the reader device circuitry of the cardreader can interrogate the tag to receive information corresponding tothe particular card/user. The reader circuitry may comprise a circuitcard assembly. The information exchanged between a card RFID tag and acard reader may be encrypted to provide additional security. Thus, acard reader, RFID data from the card, and/or an associated device maycomprise a decoder in decoding circuitry.

The use of RFID reader technology permits an ATM to have a card readerlocated at a previously unacceptable position. The physical space of anRFID card reader and any RFID card reader interface (e.g., card scanningarea) can be located at an area of the fascia different from the areapreviously required for a contact type card reader. Also, in someembodiments all or a portion of the RFID card reader device can beremotely mounted adjacent to the ATM. That is, an RFID card readerdevice need not be mounted on the fascia or ATM, but may be disposedfrom the ATM. An RFID card reader device can be positioned so as to freeup fascia space for additional transaction devices, thus increasing anATM's functionality. The freed up space allows other devices to be addedto the valuable customer access area. For example, the additional fasciaspace may be used for installation of a cash acceptor, a stampdispenser, check acceptor and/or an event ticket printer. Alternatively,in some embodiments the ability to eliminate the conventional cardreader on the fascia can be used to produce more compact machines and/oruser interfaces.

FIG. 3 shows an automated banking machine 40 similar to the automatedbanking machine of FIG. 1. However, the machine fascia 48 is shown withan RFID card reader 42, stamp dispenser 44, and a stamp dispenser outlet46. In comparing FIGS. 2 and 3, the fascia area previously assigned to acard reader (FIG. 2) is now allocated to a stamp dispenser (FIG. 3). Thecard reader location was allocated to a lower part of the fascia (FIG.3).

The ability to use an RFID card reader permits an additional transactiondevice (e.g., stamp dispenser) to be used at a valuable fascia locationinstead of a contact type card reader. That is, the space previouslyneeded for a contact type card reader can now be used by an additionaltransaction device, such as a stamp dispenser. Likewise, the ability torelocate an existing RFID card reader can also permit use (orrelocation) of additional transaction devices. Thus, the use of anon-contact transaction device(s) (e.g., RFID card reader) enables awide assortment of transaction device arrangements to be implementedwith regard to user interface ergonomics.

FIG. 4 shows a card 50 having an RFID tag 52 embedded therein. The RFIDcard 50 may also contain conventional card markings and indicia (e.g.,raised numbers/letters) thereon. The card may be similar to aconventional ATM banking card or other debit or credit card, excepthaving an RFID tag instead of or in addition to a magnetic stripe.

FIG. 5 shows an RFID card 60 having an RFID tag 62 thereon and a keyhole 64. In an exemplary embodiment, a user card only needs to be of asize large enough to hold an RFID data tag (or tags). In comparison toconventional ATM cards, the size of an RFID ATM card can be reduced. Forexample, an RFID card (as shown in FIG. 5) may be of a size enabling itsattachment to a key chain.

A card may have more than one RFID tag. The tags may be of differentsizes and include different information. A card may have one or moretags embedded therein and/or one or more tags thereon.

The exemplary RFID cards 50, 60 are usable with the automated bankingmachines 10, 40 having the RFID card reader devices 16, 42. In such usethere may be no need for a customer to insert their RFID card into anATM machine. Nor does the machine need a card entry slot. Because theuser card is not inserted into the ATM, the card cannot be “lost” in afascia opening (e.g., card entry slot) or the machine. User stressrelated to fear that their card will not be returned by the machine canbe eliminated. Potential users previously reluctant to use an ATMbecause of such fear can use an ATM without the worry of their cardbeing lost in or captured by the machine. Thus, an ATM using an RFIDcard/card reader arrangement can be more user friendly. Because an ATMcard can remain with the user at all times, the arrangement can alsoreduce or eliminate fraudulent schemes to trap a card or skim card data.Thus, an ATM using an RFID card/card reader arrangement can also provideenhanced security.

The use of an RFID tag arrangement can permit quicker ATM response time.For example, an ATM can automatically read the tag information, processthe information, and prompt the user by name to enter a PIN number. Thetime previously necessary for the user to correctly insert their cardinto the ATM and have the card transported to/from the (contact type)card reader can be eliminated. The use of an RFID tag and RFID tagreader arrangement can reduce the average time a user spends at an ATM.Thus, an ATM equipped to read an RFID data tag can increase usageefficiency of the ATM.

In other exemplary arrangements an ATM card can have an RFID tag with aprogrammable memory. The tag memory is able to store data correspondingto one or more recent account transactions. The ATMs have a writerdevice for updating the card's tag memory with the latest transactiondata (e.g., bank name, cash withdrawal amount, and date). The writer maybe part of a combined RFID tag reader/writer device. The transactiondata can act as a transaction receipt or a series of receipts. The cardowner may have a (personal) computer that can wirelessly read the RFIDtag to obtain the transaction data from the card memory. The computercan have the transaction data automatically downloaded into a homefinancial computer program, such as Quicken™. The financial program canapply the transaction data to update the user's account. The ATM writerdevice can supplement or overwrite the data stored in tag memory. Ifnecessary, the card owner can erase the tag memory after reading thedata through operation of their home computer.

In other arrangements which are described in more detail hereinafter,the transaction data in the RFID tag can be automatically read from adistance. For example, a card memory may be read without its removalfrom its stored location (e.g., a user's wallet or purse). A user mayhave a smart house in which the RFID memory data can be read by a tagreader and automatically delivered to the user's PC for input to afinancial computer program. The structure of a smart house may enablethe card memory data to be read upon the owner (with the card) enteringthe house, and then load the transaction data into the financialprogram. In alternative embodiments this can be done with a readerattached to the PC and the user bringing the card adjacent the reader atan appropriate time during operation of the financial program.

An ATM RFID data tag may also be inserted onto (or combined with) atypically non-ATM card (e.g., merchant charge card, ID card, driverslicense, library card, etc.). The hiding of ATM information in atypically non-ATM card can increase the level of user informationsecurity.

Other arrangements can have an ATM RFID data tag on a multi-use cardhaving plural distinct RFID tags. For example, the same card may haveseveral RFID tags, each only usable for a specific purpose. One tag canbe an ATM tag which is readable by an ATM, whereas another tag is a fuelpurchase tag readable by a fuel pump, whereas a further tag is a creditcard tag. Also, a multi-use card may have a generic RFID data tag whichis readable by a plurality of RFID reading devices. The generic RFIDdata tag can include information which can be used in conjunction withdata provided by or stored in one or more other tags on the multi-usecard.

In certain exemplary RFID card reader arrangements an RFID card can beremotely read without the need to wave or place the card adjacent to orin close proximity of a (ATM) card reader. For example, an RFID cardreader can have an increased (e.g., in power) reading range capable ofreading an RFID card while the card is still in a wallet/purse.

In alternative arrangements the ATM RFID data tag need not be on/in acard, but may be associated with a non-card item. For example, an RFIDtag may be associated with a wallet or purse. The tag could be embeddedin the wallet. Other items such as eye glasses, keys, and clothing mayalso be used to hold (or hide) an RFID tag. The tag may be positioned atany location associated with a customer that enables its reading thereofby an RFID tag reader associated with an automated banking machine.

A vehicle (e.g., an automobile) may also be equipped with an ATM RFIDdata tag. The RFID tag may be positioned on the auto at any locationenabling its reading by an appropriately placed RFID reading device ofthe ATM. For example, an RFID reading device may be situated to read atag positioned on a window, mirror (e.g., rear view mirror), or licenseplate of an auto. The ATM can automatically read the tag information asthe auto is approaching the ATM fascia, process the information, andprompt the user by name to enter a PIN number. That is, the speed of oneor more computers associated with an ATM may be able to present awelcome display screen to a particular named customer prior to (orsimultaneously with) that customer actually arriving (or stopping orparking) at the ATM. The use of an ATM RFID data tag on an auto canenhance speed and efficiency of drive-thru ATM banking.

FIG. 6 shows a side view of an exemplary ATM drive-thru arrangement 70.An ATM 74, RFID reading devices 76, 78, and a wall 77 are also shown.FIG. 7 shows a top view of the arrangement of FIG. 6 with the additionof a vehicle 80 in a drive-thru lane 72. The vehicle 80 is approachingthe ATM 74. The reading devices 76, 78 are operative to respectivelyread an RFID tag located in a front or rear view of the vehicle. Thereading device 76 is positioned to read a tag from the rear of thevehicle, whereas the reading device 78 is positioned to read a tag fromthe front of the vehicle. The reading devices are in connection (e.g.,wire or wireless connection) with the ATM to provide informationthereto.

In other exemplary embodiments, an ATM is able to recognize andprioritize a plurality of customers in a queue via (automatic) readingof their ATM RFID tags. The ATM can create a temporary memory list ofusers currently awaiting access to the machine. The memory can be storedin a first in first out (FIFO) method. The RFID reader of the ATM can beequipped to automatically read all ATM RFID tags within a predetermineddistance of the reader/ATM. For example, the reader may be arranged toobtain (and provide to an ATM processor) information on all users in aqueue within ten feet of the ATM.

This information can be used to determine personalized presentations tobe made to the particular user once they reach the ATM. This may be donein a manner like that shown in U.S. Pat. No. 7,039,600, the disclosureof which is incorporated herein. Alternatively or in addition, thereader may be arranged to obtain information on a predetermined numberof users. For example, the ATM memory may only concurrently holdinformation on three users. An ATM may also periodically scan forpotential users to update the user queue memory. An ATM can beprogrammed to provide a special display message (e.g., apology, discountinformation) or dispense a coupon to a user who has waited apredetermined amount of time. Other items or services, either throughmachine display or through machine dispensing, may also be provided tocustomers that had a lengthy wait. Such other items or services mayfurther include credits, rebates, tickets, refinance discount, free carwash, currency, special offer, or other form of benefit.

An ATM may also have a user option of canceling a (wrong-named) user whohas left the queue subsequent to the latest queue update. That is, ifthe welcome display screen (which can refer to a particular user name)presented to a user corresponds to the wrong user (e.g., a user who hasleft the queue without detection by the machine), then the user whocurrently has access to machine can notify the machine of the situation.For example, the display screen may have an initial user messagewelcoming a specific user along with a smaller message such as “If youare not the named user then please press the exit button.” If the exitbutton is activated, then the ATM is able to quickly change the welcomescreen to the user next listed in the queue memory. In some embodimentsthe queue data may be rechecked by the ATM scanning for signals of cardsin proximity to the machine. Thus, if the RFID signal associated with aparticular user is no longer sensed, that user may be eliminated fromthe queue in ATM memory. One or more ATM computers in operativeconnection with one or more RFID tag readers can maintain the queue datain real time.

The ability of an automated banking machine (e.g., ATM) to recognize andprioritize a plurality of customers can permit a facility to offeradditional customer amenities. A prioritizing automated banking machinecan be equipped with speakers and a speech program to enable the machineto announce the name of the next customer granted access to the machine.Of course other features may be used to anonymously identify the nextcustomer. For example, a customer may have the option of selecting apersonalized announcement number uniquely corresponding to their card.

A customer waiting area may be provided with seats (e.g., chairs) ortables enabling customers to sit and relax (or perform work) while theytemporarily wait. The waiting area may also have a wall mounted displayscreen that is viewable to the entire waiting area. The automatedbanking machine can display the name and/or picture of the next customeron the screen. Other methods of notifying the next machine user can alsobe used. For example, the machine (or the machine's network host) maynotify the user via a page or phone call to a cell phone. In otherarrangements the waiting area may have computers providing (free) accessto the Internet. The ATM can proclaim the next user via the providedInternet computers. In still other arrangements the ATM can notify thenext user via their hand-held personal device (e.g., PDA, laptopcomputer, etc.). Alternative manners of prioritizing ATM usage may takeinto consideration other factors about the customer. For example, an ATM(or host computer) affiliated with a casino may identify a customer asspecial (e.g., a “high roller”) and grant priority access thereto overother casino customers.

In other exemplary embodiments a prioritizing automated banking machinemay be used in waiting facilities where many people are normallyexpected to simultaneously congregate and wait, such as doctors'offices, hair stylist centers, and motor vehicle registration centers(e.g., DMV, BMV). A prioritizing machine may also be provided in arestaurant, such as a fast-food facility. The prioritizing device(s) canbe operatively connected to one or more remote tag readers toautomatically read all RFID tags in a predetermined area of the waitingfacility. For example, the tag readers may be strategically positionedto generally surround the waiting area. FIG. 8 shows a waiting facility90 having RFID tag reading devices 82, 84, 86, 88 positioned in asurrounding relationship. The reading devices are operatively connectedto a prioritizing device (e.g., processor). The reading devices may besequentially or simultaneously operated.

In an exemplary embodiment, contactless (e.g., wireless) technology canalso be used by an automated banking machine to communicate not onlywith RFID tagged items (e.g., ATM cards), but also with other userdevices, such as smart cards, PDAs (personal data assistant), cellphones, pagers, and laptop computers that utilize RF and/or RFIDtechnology to send/receive data.

It should be understood that exemplary embodiments of automated bankingmachines may include a magnetic stripe reader in addition to RFIDreaders and/or writers. For example, an automated banking machine canhave both an RED tag reader and a magnetic stripe reader. The RFID tagreader can be combined with or positioned adjacent to the magneticstripe reader. Such an arrangement enables two different types of cardsto be read at generally the same location. The ability of an automatedbanking machine to read data from different types of data cards can bebeneficial to implement the capabilities of reading more types of cardsor during a transitional period of switching from magnetic stripe cardsto all RFID cards.

An ATM can have a user card input slot (or card reader inlet) forinsertion therein of an ATM card by a user of the ATM. The cardinsertion slot is able to receive both magnetic stripe cards and RFIDcards. That is, the slot can be a dual use input opening. The slot canbe aligned with a magnetic stripe reading device. The magnetic stripereader can communicate with the slot via a pathway. The magnetic stripereading device can include a housing that is able to receive the cardtherein. The slot can be a fascia opening and/or an entry into themagnetic stripe reader housing. The RFID tag reader can be positionedadjacent to the magnetic stripe reader, either in or out of the housing.

In an exemplary arrangement the RFID reader is positioned outside of themagnetic stripe reader housing. The housing can be of a structure (e.g.,open or slotted) and/or of a material (e.g., plastic) that enables theRFID tag to be read exterior of the housing. FIG. 9 shows an automatedbanking machine 100 having a user card insertion slot 102 into whichboth magnetic stripe and RFID user cards can be inserted for reading bythe machine. FIG. 10 shows cut away angled view of the card insertionslot 102 in relation to a magnetic stripe reader housing 104. An RFIDreader 106 is positioned adjacent to the magnetic stripe reader housing104 in the automated banking machine 100.

The card reading processes can be prioritized based on programmingassociated with one or more controllers in the automated bankingmachine. For example, the RFID tag reader can be controlled to operatefirst in attempting to read a card. Upon a successful read by the RFIDreader, the magnetic stripe reader is not active. However, if the RFIDreader's attempted read was unsuccessful, then the magnetic stripereader is operated in a second attempt to read the card. If the secondattempt is unsuccessful, then the card is returned to the user. Inanother reading program, the magnetic stripe reader can be operatedfirst and the RFID reader second. In other card reading processes themagnetic stripe reader and the RFID reader can both be simultaneouslyoperated to read a card.

In other exemplary embodiments the RFID reader may be positionedadjacent to the read head or other magnetic stripe reading device. Insuch embodiments the RFID tag and magnetic stripe data may be readgenerally simultaneously. Alternatively or in addition, the RFID datamay be read as data is read from a chip on a smart card. Of course,these approaches are exemplary.

In some embodiments it may be advantageous to read the RFID data fromthe card while the card is within the machine. In such machines it maybe advisable to insulate the interior of the machine and/or the readerwith RF signal blocking materials (for example conductive elastomers),such that RFID signals read from the card cannot be intercepted byunauthorized reading devices attached to or near the machine. Likewisesuch capabilities may be used to prevent interception of data beingprogrammed onto an RFID tag. In addition or in the alternative, thefascia of the machine may include intrusion sensors adapted to senseradiation output by unauthorized RFID reading devices attached to theoutside of the machine. The controller of the machine may be programmedresponsive to detecting potential unauthorized RFID sensor signals toanalyze the nature of the signals to determine if they correspond tothose likely associated with an unauthorized reading device. The sensingof unauthorized reading devices, for example, is shown in U.S. Pat. No.7,240,827, the disclosure of which is incorporated herein by reference.

In response to determining that such signals correspond to anunauthorized reading device, the controller may cause the machine totake actions in accordance with its programming. Such actions mayinclude, for example, stopping operation of all or certain operations ofthe machine, such as cash dispensing operations. Actions may alsoinclude capturing a card from which data may have been intercepted.Actions may also include capturing image data from a camera. This may beaccomplished, for example, in the manner shown in U.S. patentapplication Ser. No. 09/991,748 filed Nov. 23, 2001, the disclosure ofwhich is incorporated herein by reference. Alternatively, such actionsmay include giving notice to a remote entity in a manner such as is donein U.S. Pat. No. 6,768,975, the disclosure of which is incorporatedherein by reference. The controller may also be operative to cause anemitter to output signals that are operative to jam, saturate or providefalse data to an unauthorized RFID reading device. Of course, theseactions are exemplary of actions that may be taken.

In some exemplary embodiments the data from an RFID tag may be used toauthenticate other data on a user card or other item or feature used tooperate an ATM. For example, data recoverable from memory on an RFID tagmay be used to verify data recoverable from another source, such as astripe or a chip on a card. For example, data read as part of RFID datamay have a corresponding or other predetermined relationship to all orportions of magnetic stripe data, chip data, and/or customer input data.The presence of such a relationship can be determined through programmedoperation of one or more controllers operating in the ATM. Thedetermination that the relationship is present for the particular cardor transaction may be used to provide greater assurance that the card isgenuine and/or that data on the card has not been tampered with.

In some embodiments RFID tags can be embedded in cards or other items.In other embodiments an RFID tag may be attached to items. For example,a customer may be provided with a thin RFID tag that includes selfadhesive material. The user may be provided by a card issuer, bank, orother entity with the RFID tag and given instructions to apply it to anassociated magnetic stripe or other card. Data readable from the RFIDtag can then be read by the ATM when the card is used, and such datacompared to magnetic stripe and/or customer input data, or portions orcombinations thereof for a determined relationship. The existence of therelationship serves to reduce the risk that the input card is genuineand is not a fraudulently produced duplicate card. The existence of thepredetermined relationship can be required by the controller inaccordance with its programming before ATM transactions, such asdispensing cash, can be conducted at the ATM.

In some embodiments the card issuer may provide replacement oradditional self adhesive RFID tags to a card holder. The card holder mayremove the existing RFID tag from the card and replace it with the newtag. The new tag may have different or additional data that can beutilized at the ATM controller to authenticate the card, the user, orother data, in another manner. ATMs may be programmed such that if theoriginal tag is not replaced with the replacement tag, the card will nolonger operate the ATM. Alternatively, the additional tag may need to beapplied to the card while the first tag remains. The ATM controller mayuse data from both tags in the determination that the card should beaccepted and the ATM operated to carry out one or more transactionfunctions.

Of course, these approaches are exemplary of approaches that may beused. Further, while the exemplary embodiment is used in conjunctionwith an ATM, it should be understood that similar principles may be usedin conjunction with other credit card terminals, debit card terminals,vending devices, and other devices that employ such cards for operation.

In still other embodiments an issuer of a card may provide a user withan RFID tag or other item that is not attached to or connected with thecard. For example, the user may be provided with an item that includesan RFID tag that the user will always be expected to be carrying whenthe user conducts ATM transactions. This may include an item such as acard holding sleeve that the user can keep in a wallet, a tag that canbe attached to a key ring, or a self adhesive label a user can attach toa key, watch, wallet, pen, jewelry or other item generally carried bythe user. When the user conducts a transaction at the ATM, a reader inor operatively connected with the ATM reads RFID data from items inproximity to the ATM. If the proper RFID data is not detected, the ATMwill not operate to perform at least some transactions. Thus even if auser's card data, card, and/or PIN has been taken by a criminal, thecriminal may be prevented from accessing the user's account if the userdoes not have the personal item bearing the RFID data. Of course thisapproach is exemplary and in some embodiments other approaches may beused.

Further in some embodiments RFID tag data may include data usable forverifying the origin and/or authenticity of data or messages. Forexample, RFID data may include digital signatures and/or digitalcertificates. Such digital signatures and digital certificates could beused to authenticate data input via a card or through an input device,and/or could be used to authenticate a message originating from an ATMor other device and/or to verify the authenticity of data. Digitalsignatures and certificates can be used in ways similar to thosedescribed in the incorporated disclosures to verify the source ofmessages, to encrypt and decrypt data, and to configure an ATM. In someembodiments signature and/or certificate data may be wholly stored in anRFID memory, while in others only portions of such data, or data thancan be used to resolve such signature or certificate data, can be storedin memory associated with an RFID source.

In other embodiments, data stored in connection with an RFID tag can beused to verify authenticity of a card and/or a user. For example, aspreviously discussed, a card issuer may provide a user with an RFID tagcontaining data. Such a tag may be a self adhesive tag to attach to thecard or otherwise. Such a tag may include data that can be used by acontroller in the machine to verify stripe or other card or user inputdata (PIN, biometric input, or other input, for example). Alternativelyor in addition, the tag may have associated memory included therewiththat includes data that can be used by the ATM to verify that the useris the authorized user of the card.

For example, the RFID tag may have stored thereon several items ofinformation that only the authorized user is likely to readily know.These might include, for example, the last digit of the user's SocialSecurity number, year of birth, first digit in residence address, firstletter of street on which the user lives, first letter of mother'smaiden name, first letter of mother's first name, first letter infather's first name, and other similar data. ATMs may be programmed toask a customer a random (or in a predetermined order) one of thesequestions when a transaction session is initiated or at another time ina transaction session at the ATM. The input of the customer in responseto the question is compared through operation of the controller in theATM to the data read from the RFID tag. Only if the input datacorresponds is the customer permitted to conduct a transaction or aselected transaction function.

In the exemplary approach, even if a customer's magnetic stripe data andPIN have been intercepted by a criminal, the criminal does not obtainsufficient information to use the card to conduct ATM transactions. Inaddition, even if the user's input in response to a question presentedin response to one random question output by an ATM is intercepted, ithas no value unless the criminal has been able to steal the card withthe RFID tag or otherwise obtain the separate tag. Further, even if thecriminal has the original RFID tag, because the exemplary ATM has acontroller that is programmed to output the numerous questions randomly,the customer's response that a criminal has been able to observe is notlikely to be the correct response when the criminal presents the card atan ATM. Further, because the ATM can be programmed to capture the cardin response to a set number of incorrect responses by a user, there is asignificant chance the card will be captured and invalidated by an ATMbefore the criminal may use it in carrying out a transaction.

Similar approaches may be used with programmable RFID tags. In anexemplary approach, rather than having numerous possible answers toquestions selected randomly stored in connection with the RFID tag, theRFID tag memory can be selectively programmed with data the customer mayinput through input devices on the ATM. For example, the ATM controllermay be programmed to advise the customer that the time after the nexttime (or at some other later time) when the customer uses the card thecustomer will be asked to input particular data. This might be, forexample, the first letter of the user's mother's first name. Datacorresponding to the question and/or appropriate response would be inputby the user to the ATM and be stored on the RFID tag through operationof the controller and RFID tag writer device. In an exemplaryembodiment, the user can provide the question, answer, and/or a code forstorage on the RFID tag. Then when the card is used on the correspondingsubsequent occasion, the controller in the ATM would operate to presentthe question and verify the answer input by the user based on the RFIDdata, and enable at least one transaction or function with the ATM inresponse to receiving the correct input. Thus, even if a criminal stolethe card, RFID tag (if separate from the card), PIN and the responsegiven by the user, the criminal could not conduct a transaction at theATM with the card, because the criminal would not know the correctresponse to the question the ATM would pose upon the next transaction(because it was input by the user during a prior transaction thecriminal did not observe). Of course, this approach is merely exemplary.

It should be mentioned that some of these exemplary embodiments forverifying a user and/or a card or other item may be carried out locallyat the ATM. This may avoid the need to modify the nature of transactionmessages transmitted to and from the ATM in a financial network to carryout transactions. Of course other embodiments may use remotecommunication to facilitate secure operation. For example, a remotecomputer (connected to a data store) may provide one or more values orcodes that are stored in RFID data. Such data (which may be in a card)may be looked for or used the next time the card is used, and itsabsence or variation identified to indicate a false or stolen card. Ofcourse this approach is merely exemplary.

In alternative embodiments a user may be provided with a RFID tag that auser can install in or attach to an item such as a PDA with wirelesscommunication capabilities or a cell phone. The PDA or cell phoneassociated RFID data may be read to initiate a transaction or aparticular function at an ATM. For example, the RFID data may includedata usually found on a card that corresponds to a user or user'saccount.

The ATM controller may be programmed to prompt the user after readingthe RFID data to provide an input through the PDA or cell phone. Forexample, the ATM display could prompt the cell phone user to call anumber associated with the ATM or a remote computer. The telephoneconnection could prompt the user to input the user's PIN through thecell phone. This could be used to reduce the risk of interception.Alternatively, the user could be instructed to change the user's usualPIN in a particular way for this transaction. For example, the usermight be told via the phone connection to substitute a particular digitor symbol for the usual first PIN digit. The user would then input themodified PIN through the ATM, and the ATM would carry out thetransaction. If a PDA is used, communication could be conductedwirelessly between the PDA and ATM such as through Bluetooth® or otherwireless communication. As can be appreciated, because the acceptablePIN could be varied with each transaction, a criminal observer of theinput PIN would not have the user's actual PIN and the ability toconduct a transaction at an ATM.

Further, this exemplary approach could be combined with other approachespreviously described to provide enhanced security. Of course theseapproaches are exemplary of many approaches that may be used.

An exemplary automated banking machine also has the ability to readnon-card RFID devices. These RFID tags can be embedded in or associatedwith transaction items such as currency (e.g., bills and coins), checks,securities, account passbooks, certificates of deposit, tickets,coupons, gift certificates, etc. Documents such as present and nextgeneration currency (e.g., plastic bills and plastic coins) can containRFID tags. An RFID tag associated with a currency note can hold aplurality of information representative of the note, including but notlimited to the note's value (e.g., $50), serial number, and issue date.The ATM can have an RFID tag reader that can read the note's RFID taginformation. The ATM can also read the note's value, serial number, andissue date from one or more surfaces (faces) of the note. The ATM canperform a note validation process based on the read information. Thenote validation process can include checking whether the note faceinformation read directly from the note matches the note faceinformation read from the RFID tag. In alternative validationarrangements, the two sets of read note face information can betransmitted from the ATM to an ATM network host where the notevalidation process can be carried out.

Furthermore, the ATM or an ATM host or one or more remote computers ornetworks can transmit bank note validation information to a centralprocessor arranged outside of the banking network in order to have thenote validation process performed. The central processor can constituteone or more connected computers that comprise a main or central computerthat maintains a data store containing data on all new (e.g., U.S.)currency bills. The data store includes note face informationcorresponding to particular RFID tag ID numbers and/or other data. Themain computer may be a government (e.g., Treasury Department or FederalReserve) computer.

In an example of a verification process, a bank note is received by anATM in an attempted deposit transaction. The note has an RFID tag thatonly includes a tag ID number. The RFID tag can be non-programmable.Thus, the ID number is permanently assigned to that note. The ATM readsthe note's face information. The ATM uses an RFID document tag reader toread the tag's ID number. The ATM gives the ID number (along with theinformation read from the face of the note) to the ATM host. The hostpasses the ID number and the note face information to the main computer.The main computer uses the ID number to obtain the note face informationcorresponding to that particular ID number from the data store. The maincomputer then compares the two sets of note face information todetermine whether the note is valid. The main computer informs the ATMhost on the determined validity of the particular note. The host canthen instruct the ATM on whether to deposit, hold as suspicious, orreturn the note.

The use of RFID tags in currency permits tracking (or at least partialtracking) of currency. Tags can be used to track the flow of money intoand out of a banking network. For example, a banking network can useRFID tagged currency notes to monitor the activity of individualcurrency notes within the network. The monitoring can be used to enhancecash management. Cash can be reallocated to segments of the network inorder to maintain a proper balance or to prevent a cash shortagesituation. A network database can be used to store currency noteinventory data. The database can be used to track the currency notesreceived into the banking network (e.g., deposits into ATMs, etc.) andthe currency notes that have been removed from the banking network(e.g., ATM cash withdrawals, etc.). The inventory tracking may becarried out in real time. On a broader scale, the governmental maincomputer can be in communication with a plurality of banking networkdatabases to access a real time inventory of cash over a wide segment ofthe banking industry. The main computer can be used by the FederalReserve to reallocate cash throughout the different Federal Reserveregions.

The main computer can also be used to track currency for research. Forexample, the main computer can attempt to follow a currency notethroughout its life cycle. The life of a currency note may include itscreation at a mint, distribution by the Federal Reserve, passage throughseveral banking systems, and multiple uses at several ATMs. The trackingcan be used in note travel analysis.

The tracking can also be used in detecting counterfeit currency, such aswhen a non existing serial number is detected or when two of the sameserial numbers are detected in questionable situations. For example, aserial number read on the Eastern coast of the U.S. two hours afterhaving been read on the Western coast would create a questionablesituation.

RFID tags in currency can also be used in statistical analysis tocalculate or create normal patterns of currency deposit/withdrawal. Apattern may include several factors, including a total deposit amountover a predetermined time period. A normal deposit pattern can beassigned to an individual ATM, a specific number of ATMs, and/or anentire network of ATMs. Patterns involving segments of an ATM networkmay also overlap. A normal deposit pattern can be created afterperforming a lengthy study (via RFID tags on currency) of deposits madeto the ATMs assigned to the pattern's particular coverage area. Forexample, the pattern factor comprising the normal range of deposits pertime period is calculated and assigned to that particular pattern. Apattern can be continually adjusted to compensate for different businessactivities (e.g., new housing) occurring within the pattern area.

The monitoring of deposit patterns (via RFID tags in currency) can beused to ascertain questionable deposit activity. The monitoring may becarried out in real time or near real time. In a pattern monitoringexample, the pattern of currency entering an ATM network is compared tothe normal deposit pattern for that network. A discovery is made thatthe current deposit pattern differs from the norm by an unacceptablerange (e.g., 25%). The non normal pattern may be the result of anunusually large amount of currency having been deposited into severalnetwork ATMs within a relatively short period of time. Deposit patternsout of the norm are automatically flagged and may be investigated forillegal activity, such as money laundering. The previously discussedability to use RFID tags to track deposited currency to a particularcustomer at a particular time can be used in the review of the flaggedpattern to determine whether the deposit transactions were legitimate.

Other uses of currency with an RFID tag may also be used in exemplaryembodiments. For example, an RFID tag with a programmable memory can beused to enhance the security of bank notes in an ATM. The ATM canoperate an RFID writer to reprogram the RFID tag to change the status ofcurrency between first and second identifier states (e.g., active andpassive states). For example, a tag in a passive or non flagged statemay represent that the currency note was legally dispensed and is validfor public usage. A tag in an active or flagged state represents thatthe currency note is (or should be) under the jurisdiction (or currentpossession or ownership) of a particular entity or financialorganization, such as a bank. An active note outside of the bank'scurrency system is an indication that the note was taken withoutpermission (e.g., stolen) from the bank, such as via breaking into anATM or during transport. Currency can be deactivated during its dispensefrom an ATM. Currency can be activated during its reception as a properdeposit. Active/passive (e.g., bank/public) in an RFID tag memory can berepresented by identifiers or codes (e.g, numbers, letters, etc.). Ofcourse this approach is merely exemplary.

The use of active and passive tags can prevent the laundering of astolen note back into the banking system, such as via a deposit into anATM. An ATM of the banking system can read the RFID tag of a note thatis trying to be deposited, identify the note as active (suspicious orstolen), and notify the proper authorities of the situation. Of courseon a broader scale a banking system may be linked with other bankingsystems to share RFID tag information. Each bank may have a unique bankcode that is represented in their active state of a tag. Each banksystem can recognize not only their own currency but also that currencybelonging to other banks via reading the bank code. A note without a tagmay not be accepted for deposit. The serial number of a non-tagged notemay be checked via a data store to determine if the note previously hada tag. A non-tagged note may be an indication that the tag was purposelyremoved or the note is counterfeit. Such tags may also be used toidentify the particular individuals associated with transfers ofparticular bills.

In other programmable RFID tag arrangements a tag can be embedded inspecialized currency. For example, programmable tags may be used innewly minted limited edition currency, large bills, or large securities.The tag can store an owner-chosen or other type data such as anencrypted PIN. The PIN may serve as an additional security feature toverify that the current possessor is the actual legal owner. Onlyspecific entities (e.g., banks, security dealers) may have access to theauthorized readers that are necessary to decrypt and read a PIN. Aprovided or entered PIN can be compared with the PIN stored in the RFIDtag of the bill or security. Upon ownership transfer of a security, thePIN can be changed by the new owner.

The capability of an automated banking machine (e.g., ATM) to use anRFID tag to recognize an individual item and associate the particularitem to a particular customer/account can also be applied to financialchecks. A check may include an RFID tag. The check's RFID tag can beprogrammable. A check's RFID tag can initially contain informationrepresentative of the maker's name, account number, and bank name. Aspreviously discussed, the ATM can have an RFID tag reader/writer. TheATM can add information to the tag, modify the tag, or reprogram thetag. For example, additional information that may be added to the tag bythe ATM may include the check amount, date, payor, payee, transmittingbank, routing number, and/or bank account or other data or numbers. TheATM prepares the tag memory so that all the necessary information isavailable in the RFID tag to allow the Federal Reserve to read the tagand process (clear) the check.

In an exemplary embodiment the component modules/devices (e.g., inputand output devices) inside of an automated banking machine usecontactless (e.g., wireless) processes to communicate with each otherand/or to the machine's internal computer(s). The internal ATMcontroller(s) can serve as a local host computer to each of thecomponents in the machine. It should also be understood that the localhost computer can also constitute a machine component. As previouslydiscussed, automated banking machine components may include (but are notlimited to) transaction function devices such as any of a card reader,keypad, function keys, display, receipt printer, journal printer,account statement printer, currency dispenser, and currency acceptor.Wireless communication can be used to make the individual componentsindependent of any hard-wired signal communication relying on wiring ordistribution hubs. That is, the components can have wirelesscommunication that is not dependent on any fixed hard wiring betweencomponents. Interface hub wiring (e.g., USB hubs) for multiple deviceinterfaces can be reduced or eliminated.

A wireless communication arrangement frees up additional room inside ofa machine housing and makes component placement more flexible. Thus,additional functionality and/or more devices/components can be added toan ATM. The number of module/device interfaces and locations can beincreased in the ATM. The number of devices is not limited by the numberof individual hard-wired signal/communication wires, distribution hubs,or their physical locations inside the ATM. Some components that do nothave to be located adjacent a fascia opening may be randomly positionedin the machine, due to their exact position being irrelevant.Troubleshooting, component/machine downtime, and replacement of faultyhard wiring associated with communication wiring between the ATM'sinternal computer and a component can also be reduced or eliminated.Power supply to devices can also be provided in some embodiments byproviding RF energy within the housing from one or more emitters.Multiple transaction function devices may receive power from the RFemitter(s) as necessary for operation and/or communication.

A wireless communication arrangement may also be used to add anadditional layer of security to an ATM by reducing the opportunity totamper with an ATM and/or its components. Elimination of componenthard-wiring removes the ability of a person to physically alter wiringto provide unauthorized access to the ATM banking network and/or tocontrol an ATM component. With the absence of wiring, then any capacityto bypass original hard wiring with false wiring between a local hostcomputer and the components for the purpose of overriding originalprogramming has been eradicated.

Communication among the components and the host computer can utilizeencryption codes as an additional security layer. Likewise,communication involving an RFID device can be encrypted. The encryptioncodes can be utilized as an additional security layer in sensing,indicating, and/or reporting when suspected tampering is occurring.

A component's RFID device can be activated by another component (or anRFID device of that component) during an attempt to communicate. Whenactivated the RFID device can automatically power up its component inorder to receive data and/or transmit requested data. A component can bearranged such that it is only powered up (i.e., “on”) when its RFIDdevice is in an active state. An RFID device can also be used toautomatically power down its component upon an instruction (e.g.,deactivation signal) or during absence of activity. Power consumption ofa component can be reduced by installing a “sleep” mode in thecomponent.

The ATM housing can be shielded with RF blocking materials to preventinterference, interception, or outside manipulation of thecommunications among the components and the host computer. A shieldingstructure may include conductive elastomer.

FIG. 11 shows a rear view of components and a local host computer 94arranged in an interior portion of an ATM 92. The components and localhost computer are devoid of wired communication with each other, but cancommunicate with each other wirelessly. Components such as a card reader95, display 96, currency dispenser 97, and currency acceptor 98 areshown.

As previously discussed, the use of RF can eliminate mechanical contactbetween cards and card readers. Of course the use of radio frequency isone example of non-contacting remote communication. It should beunderstood that other types of non-contacting information communicationmay be used in other exemplary embodiments instead of (or in additionalto) radio frequency or radio waves.

In another exemplary embodiment, a user card can be replaced by ahand-held mobile device. The user card data (or information) is storedelectronically within the mobile device. The process replaces user cardinsertion at an automated banking machine (e.g., ATM, self-servicemachine, etc.). The mobile device/ATM relational arrangement sets fortha secure mode of providing data normally found on a user card to an ATM.The user card data may include any of a personal account number (PAN), acard verification value (CVV), a customer name, a bank identifier number(BIN), etc. The mobile device (or portable device) may include aportable computing device. The mobile device can comprise a phone (e.g.,a cell phone), personal digital assistant (PDA), notebook computer,Blackberry device, BlueTooth device, Ipod device, a mobile communicationdevice, etc.

The card information can be used to carry out transactions at mobiledevice-compliant ATMs, including cash withdrawal transactions and otherservices. The exemplary arrangement enables an ATM user to provide carddata needed to perform a transaction, yet without use of a tangiblecard. As a result, ATM customers can be protected from card-related ATMfrauds, such as card reader skimmers. The arrangement reduces theeffectiveness of card skimming devices by allowing input of card datawithout card insertion.

In an exemplary arrangement, instead of inserting a card at an ATM andusing a conventional magnetic stripe card reader, a customer can start atransaction by pressing an “Enter” key (or some other designated key orkeys) located on a user interface of the ATM. The ATM (or ATM host)includes a computer in which one or more software applications areoperative. The software can cause a time-variant random code (or randomnumber) to be generated in response to the designated key beingactivated. The random code is alternatively referred to herein as arandom value.

It should be understood that a third party random number generator orsome other remotely located entity computer can be used to generate andprovide a random code to an ATM (or ATM host). A random code providercan be placed in operative connection (such as via the Internet) withthe ATM (or the ATM's host) to supply the ATM with generated codes.Although generation of random code at the ATM level may be discussed inmore detail herein for reasons of brevity, it should be understood thatdistinct suppliers of random code can instead be used.

A random code may consist of plural digits, such as four digits. Thedigits can be numbers and/or letters. It should be understood that feweror greater digits than four may be used in forming a randomly generatedcode. The ATM (or ATM host) software can also cause the ATM to visiblydisplay the randomly generated code on a display screen. The displayenables the code to be viewed by a user of the ATM (e.g., the user thatpressed the designated key).

It should be understood that in some embodiments the random code may bepseudo random such as may be generated by a computer. In otherembodiments the code may not necessarily be random, but a value notpreviously known to the ATM user and not predictable in advance byentities not responsible for operation of the system. Of course theseapproaches are exemplary.

The exemplary mobile device includes a computer operating one or moresoftware applications. A registered user can download the software ontotheir mobile device from a secure web site. One of the applicationsincludes data encryption software that enables a related data decryptionsoftware application of the ATM (or ATM host computer) to decipher theencrypted data.

The exemplary mobile device includes memory for storing card data (e.g.,PAN, CVV, BIN, user name) of several individual cards. The mobile devicecan also retrieve the card data from memory storage. The mobile devicecan function like an electronic wallet. A user can select from any ofthe cards to use its corresponding card data in a transaction with anATM. For each card stored on the phone, the electronic data provided toan ATM can comprise the Track-2 data normally found on the magneticstripe of the physical card.

In an exemplary embodiment the user enters the random code displayed bythe ATM into the mobile device and selects one of the stored cards. Forexample, the code can be manually entered through a phone keypad. Insome embodiments the ATM may provide one or more outputs that prompt auser to input the code into the mobile device. The ATM also operates tostore the generated code for later verification and analysis purposes.The mobile device software can operate to generate an image includingencrypted data that corresponds to both the code data and the selectedcard's data (e.g., PAN, CVV).

The process of encrypting can be independent of the code. That is, thecode can be merely additional data that is encrypted in the process.Also, as discussed in more detail later, in alternative arrangements thecode can be left out of the encryption. Alternatively in someembodiments the code may be used to encrypt the account number data.Embodiments may operate using various encryption/decryption processesand arrangements.

The exemplary software program causes the mobile device to display theencrypted data as an image on its display screen. For example, theencrypted image can be displayed in the form of machine-readable data,such as a (two dimensional) bar code. Display screen types and formatsare well known, including LCD, plasma display, etc.

The exemplary ATM includes a reader device that can read the encryptedimage data. For example, the image reader may comprise a bar codereader. The reader device is mounted in a position that enables an ATMuser to locate their mobile device adjacent thereto. The image readermay replace an existing magnetic stripe card reader.

The ATM may prompt the user (via the ATM display screen) to place thedisplayed encrypted image near or in aligned relation with the imagereader. The ATM may also prompt the user to press another designated ATMkey when the image is properly positioned near the image reader. Upondetection of the key activation, the image reader is operated to scanfor an encrypted image. Alternatively the reader may operate inconjunction with sensors or other devices suitable for sensing when adisplay screen of a mobile device is in position to be read.

The ATM (or host) software executes instructions that are operative toanalyze the read image data, enabling the encrypted image to bedecrypted. The at least one computer may operate so bar code may beconverted to a different data format prior to decryption. The encryptedimage format or encrypted data format can be analyzed to determine if itis genuine and/or valid (e.g., if it was created using a correspondingencryption software program). The analysis may include determining ifthe received data is readable, recognizable, or properly formatted. Forexample, expected fields in the encryption may be missing or containvalues out of range, indicating invalid properties that prevent properdecryption. As a result, the ATM may again attempt to read and analyzethe (expected) bar code image or void the transaction. Valid encrypteddata enables decryption thereof.

It should be understood that the analysis of data may first occur afterdecryption. Alternatively, a decrypted data analysis can be performedfollowing an initial analysis of encrypted data.

In an exemplary embodiment, after obtaining valid decrypted data, thenthe random code can be checked by the ATM (or host) for verification.The ATM (or host) has the code that was generated, stored in memory andcorrelated with the current transaction session. The decrypted code canbe compared with the generated code. If they do not match, then thetransaction can be canceled or other action taken.

In other exemplary embodiments the account number and/or other databeing represented by the output through the display of the mobile devicemay be encrypted using the code. In such embodiments the at least onecomputer of the ATM may operate to resolve the account number data fromthe image using the code. The successful resolution of a value thatcorresponds to the account number may be the basis for verifying propercode input. In other embodiments portions of the output code may causeencrypted data to be included in an image that further verifies theinput of the proper code and also verifies a proper output from themobile device. Of course these approaches are exemplary.

The exemplary time-variant random code has a finite useful life. Forexample, each generated code may be useable for only a predeterminedtime period (e.g., 1, 2, 3, 4, or 5 minutes) following creation, afterwhich period it expires. Alternatively, a generated code may becorrelated with a set time/date after which it is no longer valid.

In an exemplary embodiment the decrypted code and generated code match,then a further check can be made by the computer in the ATM (or host) todetermine if that code's life has expired. If a valid (matched) code isstill active (alive), then the decrypted card data (e.g., PAN, CVV) canbe used to continue the transaction. Using a time-variant code ensuresthat the user is the current transaction user. A random number can beused to verify that the ATM user corresponds to the current transactionsession. Thus a thief can be prevented from trying to fraudently usedata directed to a prior transaction session. Of course this approach isexemplary.

The encrypted image can be read at an ATM, the data in the imageconverted (decrypted) through operation of a computer into a textformat, and then the text written to a file. The Track-2 data can beextracted from the file. The derived Track-2 data is copied to (andupdates) the ATM's Track-2 (card data) buffer.

The arrangement enables an ATM to receive user card data in a moresecure manner. In an exemplary embodiment, in the operation of verifyingthe authority of a user to carry out a transaction with the ATM, whetherthe card data was received via a mobile device or via a magnetic stripe,the resulting content and format of the data in the Track-2 buffer wouldbe indistinguishable.

Upon having the needed card data, the exemplary ATM transaction processcan follow a path similar to that when data has been read directly froma card. That is, the ATM is advanced to the next state (e.g., PIN entry)in the transaction. For example, a subsequent stage in the transactioncan include user PIN entry. The mobile device user can (manually) inputtheir PIN at the ATM's user interface. A conventional PIN verificationprocess can be carried out responsive to operation of at least onecomputer in the ATM. If the PIN is valid, then the transaction can befurther continued.

The exemplary arrangement also enables user card data entry toconventionally occur prior to user PIN entry and verification. Thus, theexemplary arrangement does not interfere with the normal flow (order) ofan ATM transaction or with a bank's existing ATM infrastructure.

FIG. 12 shows an automated transaction machine 110 (e.g., a cashdispensing ATM). The machine 110 is one out of a plurality of anautomated transaction machines, each in operative connection with ashared host computer 122. The host 122 can operatively communicate withother card account sources (e.g., Bank 1, Bank 2, MasterCard, and Visa)in carrying out a transaction involving the machine.

The machine 110 can include at least one keypad 112, function keys, atouch screen display device 118, and an image reader device 120. Thefunction keys can include a random number request key 114 and a readimage key 116. Alternatively, the random number request key 114 and theread image key 116 may be the same key. The machine can also have otherwell known input and output devices, including conventional ATM devices.

For reasons of brevity, the machine 110 will be referred to herein as anATM. However, it should be understood that the machine is not limited toan ATM. The transaction machine 110 can comprise other devices,including a depository, check-accepting machine, check-cashing machine,kiosk terminal, self-service machine, vending machine, cash countingdevice, checkout terminal, gaming device, fuel dispenser, laundrymachine, entry access device, etc.

The random number key 114 is pressed to inform the ATM that a new ATMuser desires that a code such as a random number be generated anddisplayed. This key can be activated at the start of (or to begin) a newtransaction.

The display device 118 is shown displaying the random number 7245. Thisnumber was randomly generated by a random number software generationprogram. The program can be located in either the ATM, the host, or aremote computer in communication with the host and/or ATM. Either theATM or host or remote computer can correlate the generated number with atime. Alternatively, the random number may have an expiration time builttherein or be reflective thereof.

FIG. 13 shows an exemplary mobile device 130 (e.g., a cell phone) havinginput keys 132, a display screen 134, and a camera 136. The phoneincludes a memory 138 where the card data of several cards (e.g., Bank1, Bank 2, MasterCard, and Visa) can be stored. As previously discussed,each stored card may be represented in memory by respective card datacomprising a PAN and a CVV.

The user selects a card stored in their phone by providing inputsthrough an input device of the phone. The user also inputs the displayedrandom number into the phone. The exemplary software program in thephone enables either card selection or random number entry to occurbefore the other. Next the phone software causes both the selectedcard's data (e.g., PAN and CVV) and the random number to be used togenerate an image including encrypted data corresponding to both values.The exemplary software causes the encrypted data to appear as a singleimage of a two-dimensional bar code 140 on the phone's display screen134.

Next the user activates the read image key 116. This informs the ATMthat the displayed bar code is ready to be read (or received) by theATM. The read image key 116 in an exemplary embodiment can be pressedeither before or after the display of the phone is positioned adjacentto the bar code reader 120. The ATM software can cause the bar codereader 120 to attempt to read a bar code within a predetermined numberof times (or within a preset time period) before quitting. If a bar codecannot be read within the defined limit, then the ATM can prompt theuser to make sure the phone is properly positioned, and again attemptthe reading. Alternatively, the ATM may cancel the transaction.

In an exemplary embodiment, following a successful reading of the barcode image from the phone, the ATM decrypts the read random number. Thisdecrypted number is then compared to the generated and displayed randomnumber. If both, the numbers match and the time allocated for the randomnumber has not expired, then the decrypted PAN and CVV are used tocontinue the transaction involving the selected card. For example, thenext stages of the transaction may include using the CVV to confirm thePAN, and using the PAN to determine if the PAN corresponds to aninputted PIN. The host can conventionally communicate with the issuer ofthe selected card and the bank affiliated with the ATM to settle theaccounts involved in the ATM transaction. Alternatively, in someembodiments the encrypted data may be decrypted using the code to obtainthe customer account data or other data used to carry out thetransaction.

FIG. 14 schematically shows a relationship among a customer 150 (e.g.,ATM user), the ATM 110, and the ATM host 122. The ATM has installedtherein an electronic card (E-card) system 142. The E-card system 142includes an image reader 120 (e.g., bar code reader device) and anE-card application 144. The E-card application 144 includes softwarethat can control operation of the image reader 120 to read images. Thesoftware can also receive read encrypted data from the image reader 120,and carry out decryption of the encrypted data. The software can convertdigitally imaged card data into electronic card data. The E-cardapplication 144 is also able to communicate with both the ATM'stransaction control system 146 and the host 122 to exchange data.

The transaction control system 146 can include an ATM controllercomputer. The ATM can provide outputs to the customer, such as via thedisplay device 118. The ATM can also receive inputs from the customer,such as via the keypad 112 and the bar code reader 120. The inputs andoutputs can be necessary to carry out a transaction.

Other details, embodiments, relationships, and alternative arrangementsare within the scope of alternative embodiments. For example, eachstored card in a mobile device can be linked to an ID or phone number ofa customer for added transaction security. Triple DES encryption oftransaction data can be used. A mobile device may include a mobile phoneusing JAVA midp 2.0 or higher. Other data formats may be used.

As previously discussed, the random code can be manually entered intothe mobile device. In alternative embodiments, the code can bewirelessly received from the ATM by the mobile device. For example, RFdevices may be used to transmit (from the ATM) and receive (at themobile device) code information.

It should be understood that for purposes of definition, a “random”code/number as used does not necessarily have to be truly random. Arandom number generator, computer software program, or mathematicalalgorithm can be used. A created random code/number may be based on (ororiginate from) fixed factors, such as the ATM serial number, and/or zipcode, etc. Alternatively, a random code/number may be based on changingvariables, such as the current date and/or time, etc. Likewise, fixedand changing data may be used in combination in generating the randomcode.

The mobile device software can use the code to generate an encryptedimage. For example, the software can take the code and use it as or useit to generate an encryption key. The key can be used to encrypt carddata (e.g., PAN, CVV) which corresponds to the selected card.Alternatively, the mobile device software can create an encrypted imagewithout needing the code to make an encryption key.

A digital signature may be used in providing the card data to the ATM. Ahand shaking process may be used between the ATM and mobile device totransmit/receive encrypted card data.

As previously discussed, the image including the encrypted informationcan be in the form of a bar code. However, other alternative imageshapes and forms can be used and recognized by the ATM. For example, astring of numbers and/or letters; color patterns; and fonts and/orshades may be used. Three-dimensional images can also be used, includingtheir creation and reading. Image recognition software can be used.

In some arrangements an image (whether or not encrypted) displayed bythe mobile device that corresponds to the code and card data can also becaptured as a digital picture by camera of the mobile device. The mobiledevice can then wirelessly transmit the picture (e.g., via e-mail or aproprietary system) to the ATM or the ATM's host.

If sent to the host, then the host can determine the code (which may ormay not include decryption) received from the mobile device. The hostcan compare the determined code to any pending active codes that werereceived from ATMs on the ATM network. The comparison can identify thecorrect ATM involved in the transaction (i.e., the ATM that displayedthe code to the customer). Thus, the code can also act as an ATMidentifier. The host can then forward the code and card data (whether ornot encrypted) received from the mobile device to that identified ATM.If necessary, the ATM can then carry out any needed decryption ofreceived data.

In an alternative arrangement, the image displayed by the mobile devicecan be sans the code. Instead, the displayed code displayed by the ATMcan be captured by the mobile device in another digital picture. A firstphoto file (which includes the card data) and a second photo file (whichincludes the code data) can then be sent together to the ATM or ATMhost. If sent to the host, then necessary data can be forwarded to theATM that is correlated with the code.

In other alternative arrangements an intermediate device or system canbe used between the mobile device and the automated transaction machine.That is, data (e.g., random number, account number, etc.) does not haveto be directly exchanged between the mobile device and the automatedtransaction machine. Rather, the data can first be passed through theintermediate device or system. The intermediate arrangement can also beused to generate the random number for use by the automated transactionmachine and/or store the account data for the mobile device.

In still other arrangements the mobile device may provide additionaloutputs to provide data for carrying out a transaction. This may includedata output through RF, infrared (IR) or sonic signals. Such data may insome embodiments provide portions of account number data or other datato carry out transactions. In other embodiments such data may be usedfor verification or security purposes. Of course these approaches areexemplary and in other embodiments other approaches may be used.

Thus, the new and improved features and relationships achieve at leastone of the above stated objectives, eliminate difficulties encounteredin the use of prior devices and systems, solve problems, and attain thedesirable results described herein.

In the foregoing description certain terms have been used for brevity,clarity and understanding, however no unnecessary limitations are to beimplied therefrom because such terms are used for descriptive purposesand are intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and the invention is notlimited to the details shown and described.

In the following claims any feature described as a means for performinga function shall be construed as encompassing any means known to thoseskilled in the art capable of performing the recited function, and shallnot be limited to the structures shown herein or mere equivalentsthereof.

Having described the features, discoveries and principles of theinvention, the manner in which it is constructed and operated, and theadvantages and useful results attained; the new and useful structures,devices, elements, arrangements, parts, combinations, systems,equipment, operations, methods, processes and relationships are setforth in the appended claims.

1. An apparatus comprising: an automated banking machine, wherein themachine includes an image reader, wherein the image reader is operableduring a user transaction session to read an image displayed on adisplay screen of a mobile device, wherein the image includes a code andencrypted data,  wherein the encrypted data includes encrypted customeraccount data, wherein the image reader is operable to read an image thatincludes data encrypted by the mobile device, wherein the machine isassociated with at least one computer, wherein the at least one computeris operable to cause the code to be provided to a user of the mobiledevice, wherein the at least one computer is operable to obtain theencrypted data from the image read by the image reader, wherein the atleast one computer is operable to then decrypt the encrypted dataobtained from the image,  wherein the at least one computer is operableto then obtain the customer account data from the decrypted data, wherein the at least one computer is operable to cause the machine incarrying out a financial transaction during the user transactionsession, to use an account which corresponds to the obtained customeraccount data.
 2. The apparatus according to claim 1 wherein the machineincludes the at least one computer.
 3. The apparatus according to claim1 wherein the mobile device comprises a mobile phone, wherein the imagereader is operable to read the image from a display screen of the mobilephone.
 4. The apparatus according to claim 1 wherein the machineincludes a display screen, wherein the at least one computer is operableto cause the code to be provided through the display screen.
 5. Theapparatus according to claim 1 wherein the at least one computer isoperable to cause the code to be wirelessly communicated to the mobiledevice.
 6. An apparatus comprising: an automated banking machine,wherein the machine includes an image reader, wherein the image readeris operable during a user transaction session to read an image displayedon a display screen of a mobile device, wherein the image includes acode and encrypted data,  wherein the encrypted data includes encryptedcustomer account data, wherein the image reader is operable to read animage that includes data encrypted by the mobile device, wherein themachine is associated with at least one computer, wherein the at leastone computer is operable to generate the code, wherein the at least onecomputer is operable to obtain the encrypted data from the image read bythe image reader, wherein the at least one computer is operable to thendecrypt the encrypted data obtained from the image,  wherein the atleast one computer is operable to then obtain the customer account datafrom the decrypted data,  wherein the at least one computer is operableto cause the machine in carrying out a financial transaction during theuser transaction session, to use an account which corresponds to theobtained customer account data.
 7. The apparatus according to claim 6wherein the machine includes the at least one computer.
 8. The apparatusaccording to claim 6 wherein the mobile device comprises a mobile phone,wherein the image reader is operable to read the image from a displayscreen of the mobile phone.
 9. The apparatus according to claim 6wherein the machine includes a display screen, wherein the at least onecomputer is operable to cause the code to be provided through thedisplay screen.
 10. The apparatus according to claim 6 wherein the atleast one computer is operable to cause the code to be wirelesslycommunicated to the mobile device.
 11. An apparatus comprising: anautomated banking machine, wherein the machine includes an image reader,wherein the image reader is operable during a user transaction sessionto read an image displayed on a display screen of a mobile device,wherein the image includes a code and encrypted data,  wherein theencrypted data includes customer account data encrypted using the code,wherein the image reader is operable to read an image that includes dataencrypted by the mobile device, wherein the machine is associated withat least one computer, wherein the at least one computer is operable toobtain the encrypted data from the image read by the image reader,wherein the at least one computer is operable using the code, to thendecrypt the encrypted data obtained from the image,  wherein the atleast one computer is operable to then obtain the customer account datafrom the decrypted data,  wherein the at least one computer is operableto cause the machine in carrying out a financial transaction during theuser transaction session, to use an account which corresponds to theobtained customer account data.
 12. The apparatus according to claim 11wherein the machine includes the at least one computer.
 13. Theapparatus according to claim 11 wherein the at least one computer isoperable to generate the code.
 14. The apparatus according to claim 11wherein the mobile device comprises a mobile phone, wherein the imagereader is operable to read the image from a display screen of the mobilephone.
 15. The apparatus according to claim 11 wherein the at least onecomputer is operable to cause the code to be provided to a user of themobile device.
 16. The apparatus according to claim 15 wherein themachine includes a display screen, wherein the at least one computer isoperable to cause the code to be provided through the display screen.17. The apparatus according to claim 15 wherein the at least onecomputer is operable to cause the code to be wirelessly communicated tothe mobile device.
 18. The apparatus according to claim 17 wherein theat least one computer is operable to cause the machine to wirelesslycommunicate the code to the mobile device.
 19. The apparatus accordingto claim 17 wherein the mobile device comprises a mobile phone, whereinthe at least one computer is operable to cause the code to be wirelesslycommunicated to the mobile phone via a phone call.
 20. The apparatusaccording to claim 11 wherein the machine comprises a self-serviceautomated banking machine, wherein the self-service automated bankingmachine includes a cash dispenser, wherein the machine is operable tocarry out a cash dispense transaction involving operation of the cashdispenser, using an account which corresponds to customer account datawhich was obtained from decryption of encrypted data, which encrypteddata was obtained from an image, which image was read by the imagereader from the display screen of the mobile device.