Method of evaluating checks deposited into a cash dispensing automated banking machine

ABSTRACT

An automated banking machine system and method includes ATMs which accept checks and dispense cash to users. The ATMs are operated to acquire image and magnetic data from deposited checks to determine the genuineness of checks and the authority of a user to receive cash for such checks. Cash may be dispensed to the user from the ATM in exchange for the deposited check. The ATMs dispense cash responsive to communications with a transaction host. The transaction host provides transaction identifying data to the ATM. The ATM sends the transaction identifying data and check images to an image and transaction data server for processing.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims benefit pursuant to 35 U.S.C. §119(e) ofProvisional Application No. 60/660,075 filed Mar. 9, 2005 andProvisional Application No. 60/659,990 filed Mar. 9, 2005. ThisApplication is also a Continuation-In-Part Application pursuant to 35U.S.C. §120 of co-pending application Ser. No. 10/944,578 filed Sep. 16,2004 which claims benefit pursuant to 35 U.S.C. §119(e) of ProvisionalApplication No. 60/504,776 filed Sep. 17, 2003; Provisional ApplicationNo. 60/504,282 filed Sep. 17, 2003; Provisional Application No.60/503,825 filed Sep. 22, 2003; Provisional Application No. 60/537,581filed Jan. 20, 2004; Provisional Application No. 60/537,795 filed Jan.20, 2004; Provisional application No. 60/537,788 filed Jan. 20, 2004;and Provisional Application No. 60/584,622 filed Jun. 29, 2004.Application Ser. No. 10/944,578 is a Continuation-In-Part Applicationpursuant to 35 U.S.C. §120 of co-pending application Ser. No. 09/723,304filed Nov. 27, 2000 which claims benefit pursuant to 35 U.S.C. §119(e)of Provisional Application No. 60/167,996 filed Nov. 30, 1999.

The disclosures of all of the foregoing Applications are herebyincorporated herein by reference as if fully rewritten herein.

TECHNICAL FIELD

This invention relates to automated banking machines such as ATMs.Specifically this invention relates to devices and systems which mayreceive deposits of individual sheets such as checks and/or otherinstruments, into an automated banking machine.

BACKGROUND ART

Automated banking machines are known in the prior art. Automated bankingmachines are commonly used to carry out transactions such as dispensingcash, checking account balances, paying bills and/or receiving depositsfrom users. Other types of automated banking machines may be used topurchase tickets, to issue coupons, to present checks, to print scripand/or to carry out other functions either for a consumer or a serviceprovider. For purposes of this description any device which is used forcarrying out transactions involving transfers of value shall be referredto as an automated banking machine.

Automated banking machines often have the capability of acceptingdeposits from users. Such deposits may include items such as envelopescontaining checks, credit slips, currency, coin or other items of value.Mechanisms have been developed for receiving such items from the userand transporting them into a secure compartment within the bankingmachine. Periodically a service provider may access the interior of themachine and remove the deposited items. The content and/or value of thedeposited items are verified so that a credit may be properly applied toan account of the user or other entity on whose behalf the deposit hasbeen made. Such depositories often include printing devices which arecapable of printing identifying information on the deposited item. Thisidentifying information enables the source of the item to be tracked andcredit for the item correlated with the proper account after the item isremoved from the machine.

Many automated banking machines accept deposits from users in envelopes.Because the contents of the envelope are not verified at the time ofdeposit, the user's account generally is not credited for the deposituntil the envelope is retrieved from the machine and the contentsthereof verified. Often this must be done by persons who work for afinancial institution. Delays in crediting a user's account may beexperienced due to delays in removing deposits from machines, as well asthe time it takes to review deposited items and enter appropriatecredits. If the deposited items include instruments such as checks,further delays may be experienced. This is because after the instrumentsare removed from the machine they must be presented for payment to theappropriate institution. If the instrument is not honored or invalid thedepositing customer's account cannot be credited for the deposit.Alternatively in situations where a credit has been made for a depositedinstrument that is subsequently dishonored, the user's account must becharged the amount of the credit previously given. In addition the usercommonly incurs a “bad check” fee due to the cost associated with theinstitution having to handle a dishonored deposit. All of thesecomplications may result in delays and inconvenience to the user.

Another risk associated with conventional depositories in automatedbanking machines is that deposited items may be misappropriated. Becausedeposited checks and other instruments are not cancelled at the time ofreceipt by the automated banking machine, they may be stolen from themachine and cashed by unauthorized persons. Criminals may attempt tobreak into the machine to obtain the items that have been stored in thedepository. Alternatively persons responsible for transporting itemsfrom the machine or persons responsible for verifying the items maymisappropriate deposited instruments and currency. Alternatively thehandling required for transporting and verifying the contents ofdeposits may result in deposited instruments being lost. Suchcircumstances can result in the user not receiving proper credit fordeposited items.

To reduce many of the drawbacks associated with conventionaldepositories which receive deposits in the form of envelopes or otheritems, automated devices that can read and cancel deposited instrumentshave been developed. An example of such a device is shown in U.S. Pat.No. 5,540,425 which is owned by a wholly owned subsidiary of theAssignee of the present invention. Such devices are capable of readingthe coding on checks or other deposited items. For example bank checksinclude magnetic ink coding commonly referred to as “MICR.” The MICRcoding on a check can be used to identify the institution upon which thecheck is drawn. The coding also identifies the account number of theuser and the check number. This coding commonly appears in one orseveral areas on the instrument. Reading this coding in the automatedbanking machine enables the machine operator to determine the source ofchecks or other instruments that have been presented.

Imaging devices may also be used in processing instruments. Such imagingdevices may be used to produce data corresponding to an image of theitem that has been deposited. This image may be reviewed to determinethe nature of the deposited item, and along with the information thatcan be obtained from the coding on the instrument allows processing ofthe credit to the user much more readily. Automated instrumentprocessing systems also may provide the capability of printing anindication that the check or other instrument has been deposited andcancelled after it has been received. This reduces the risk that theinstrument will subsequently be misappropriated and cashed byunauthorized persons.

While automated deposit accepting and processing devices provide manyadvantages and benefits, existing devices may also have drawbacks. Onedrawback is that instruments must often be precisely aligned forpurposes of reading MICR coding or other indicia which is included onthe instrument. This commonly requires special mechanisms to preciselyposition and align the instrument with the reading devices included inthe device. A further drawback associated with some existing devices isthat they are required to turn and reorient the deposited instrument.The mechanisms for doing this can be complex. Such complex mechanismsmay encounter reliability problems due to the precise tolerances thatmust be maintained. Further difficulty is added by the fact thatinstruments that are received may be creased, torn or soiled. Handlingsuch items may be difficult. Instruments becoming jammed in suchmechanisms may result in costly repairs and downtime.

A further drawback associated with some imaging systems in automatedbanking machines is that it is not practical to transmit an image of adeposited instrument for review and analysis at the time it is received.This is because the time and bandwidth necessary to capture and transmitan image of the deposited instrument may be longer than desirable.Extended transaction times may discourage the use of the machine. Afurther drawback is that even when images may be transmittedsufficiently quickly, the operator of the system is required to investin the resources necessary to analyze the transmitted image and make adetermination as to whether the deposited item should be accepted asvalid or not. Such capabilities may include employees who must reviewthe image and determine whether the item is genuine by comparison todata or other information such as examples of the customer's signature.Alternatively automated systems may be provided for analyzing the imageof the instrument or the data printed or typed thereon. Providing suchcapabilities may be costly for the systems operator. Advances inphotocopy technology also may make it difficult for operators of suchsystems to distinguish between genuine items and reproductions. As aresult even with carefully operated and administered systems there is arisk that deposited items which are not genuine may be accepted.

Certain standardized techniques have been developed for automatedbanking machine systems. The electronic message flows and formatscommonly used for ATMs for example do not include the capability oftransmitting a document image as part of the standard message whichrequests that a deposit transaction be authorized. As a result it hasbeen difficult to achieve real time check verification and cashing inwidely distributed systems. Further, in some systems it is difficult toreadily correlate an image file with the particular transaction withwhich the image file is associated.

A further drawback associated with some automated banking machinesystems is that they cannot be used by individuals who do not have bankaccounts. Generally automated banking machines require that depositeditems be credited to a user's existing account with a financialinstitution. The user generally has to wait several days before thedeposited item is verified and credited to the account. If the user doesnot have sufficient funds in the account to make a withdrawal, the usermust generally wait for the verification process to be completed beforethe money may be withdrawn. This makes the use of automated bankingmachines generally unsuitable for persons who do not have bank accountsand/or cannot wait several days for deposited items to be verified andcredited to their account.

A further drawback associated with some existing automated bankingmachine systems is that some operators of such systems may wish toretain the capability to accept deposits in the form of items such asenvelopes as well as checks and other instruments. Providing twoseparate depositories may add considerable cost and complexity to themachine. While mechanisms which can accept both single sheet-likeinstruments as well as envelopes have been developed, such mechanismsare often complex and sometimes have reliability issues. The capabilityof accepting both types of deposits is difficult to achieve becausedeposited instruments and envelopes may have varying thicknesses. Thethickness of deposited envelopes may also be nonuniform. This isparticularly true when such deposited envelopes may include items suchas folded sheets or coin. Such combined depositories may also sufferfrom having lower security capabilities than mechanisms which aredesigned to accept only one type of deposit.

There is also often a desire to accept other types of documents inautomated banking machines. Such documents may include for exampleutility bills or other items or instruments associated with value, or aparticular account with which the customer may associate value or aparticular payment. Such instruments may have thicknesses and propertieswhich correspond to neither conventional checks or deposit envelopes. Inaddition the two-dimensional size of such items may also vary. Thispresents challenges for reliably handling such items. It may also bedesirable in some circumstances to be able to image items andinstruments which are associated with a customer. For example in somecircumstances it may be desirable to receive a customer's driver'slicense, social security card, immigration card or other document toverify the identity of the user. Current depository mechanisms do nothave the capability of reliably handling or imaging such items.

Thus there exists a need for a deposit accepting apparatus and systemfor use in connection with automated banking machines that has thecapability of handling and imaging more types of items, which may do somore reliably and which can be used in connection with more types oftransactions and systems.

With items accepted for deposit in an automated banking machine such asa check, there exits the possibility that the check may be a forgery.Forged checks can be made by photocopying an original check. Inaddition, forged checks may be produced using magnetic toner or ink inthe copying device to produce magnetic features on the copy which aresimilar to the magnetic features found on the original check. Thus thereexits a need for an automated banking machine which is capable ofvalidating deposited checks and determining whether deposited checks arepotential forgeries.

DISCLOSURE OF INVENTION

It is an object of an example embodiment of the present invention toprovide an automated banking machine.

It is a further object of an example embodiment of the present inventionto provide an automated banking machine system and method that acceptsdeposits and provides cash to a user.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus for use in connection with anautomated banking machine.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus which can be used to accept,image and verify the authenticity of items.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus that accepts both sheets andenvelopes.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus that can be used in existingautomated banking machine systems.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus that has greater reliability.

It is a further object of an example embodiment of the present inventionto provide a deposit accepting apparatus that is more compact.

It is a further object of an example embodiment of the present inventionto provide methods of accepting deposited items.

It is a further object of an example embodiment of the present inventionto provide a method for verifying the authenticity of deposited items.

It is a further object of an example embodiment of the present inventionto provide a method for verifying the authenticity of deposited check.

It is a further object of an example embodiment of the present inventionto provide a method for handling and storing deposited items.

It is a further object of an example embodiment of the present inventionto provide an apparatus and method for correlating image and transactiondata to facilitate check processing.

Further objects of example embodiments of the present invention will bemade apparent in the following Best Modes For Carrying Out Invention andthe appended claims.

The foregoing objects are accomplished in an example embodiment by adeposit accepting apparatus and method used in connection with anautomated banking machine. The machine includes a housing with a depositaccepting apparatus therein. The example deposit accepting apparatusincludes a transport section. The transport section includes a transportwhich accepts items of variable thickness. Such items may includerelatively thin single sheet-like items and relatively thick irregularshaped items such as deposit envelopes. The transport section includes abiasing mechanism for reliably engaging deposited items with movingmechanisms such as belts or rollers in the transport section. Thedeposited items are reliably engaged with such moving members to assurethat the deposited item is moved through the transport section.

The example transport section further includes a variable force drivingsection. The variable force driving section engages deposited items. Thevariable force driving section enables limited slip engagement with adeposited item as it is being accepted into the transport section. Thisenables a user presenting a document to avoid damaging or tearing adocument if they fail to release it when it is first engaged by thevariable force transport section. Once a document or other depositeditem is sensed as having been moved sufficiently into the transport, theapparatus operates to cause the variable force transport section toengage the item more positively and in a nonslip fashion for purposes ofmoving it in the transport. In example embodiments an aligning devicemay work in conjunction with the variable slip drive to aid in aligningdocuments with a transport path.

The example transport section further includes an analysis moduleadjacent thereto. In the example embodiment the analysis module servesas an imaging device and is operative to analyze documents passingthrough the transport section. For purposes of this application animaging device includes any device that is operative to enable thegeneration of image data which corresponds to a visual image of at leasta portion of the document. In addition the analysis module is operativeto sense for features and characteristics of the document which may beused to identify the document type. Alternatively or in addition theanalysis module may operate to sense properties of a deposited documentwhich distinguish acceptable or genuine documents from unacceptabledocuments.

In the example embodiment the transport section of the deposit acceptingapparatus is connected to a deposit holding module. The deposit holdingmodule includes at least two compartments therein. In the exampleembodiment the deposit holding module operates to move the compartmentsrelative to the transport section and to selectively place an outletfrom the transport section in communication with a desired one of thecompartments. For example when an envelope type deposit is accepted inthe transport section, the deposit holding module operates so that theenvelope is moved through the transport and deposited into a compartmentwhich is adapted for holding envelopes. Alternatively when a check orother sheet-like deposit is moved through the transport section, thedeposit holding module operates so that the sheet moves from thetransport section into a compartment which is designated for holding theparticular type of sheet. Of course in alternative embodiments manytypes of holding areas may be provided for many types of documents.

In an example embodiment described herein, a deposit accepting apparatusand method is used in connection with an ATM. The ATM includes one ormore computers therein (alternatively referred to herein as processors)which operate to control the transaction function devices within the ATMincluding aspects of the deposit accepting apparatus. When a customer atthe ATM wishes to deposit an envelope or similar deposit containing itemin the machine, the controller enables the customer to place thedeposited envelope in the machine so that it may engage the transportsection. The computer also operates so that the deposit holding moduleplaces the compartment for holding deposited envelopes in communicationwith the transport section. The user is enabled to engage the depositenvelope with the variable force driving section which the computercauses to operate in a limited slip mode. Once the computer senses thatthe deposit envelope has been moved into the transport section thevariable force driving section may be controlled so that the envelope ismore positively engaged with the moving members in the transport. Thedeposit envelope is then moved through the transport past the analysismodule.

In the example embodiment as the deposit envelope passes through thetransport section the computer causes a printing mechanism to printidentifying information on the envelope. The example embodiment of theinvention includes a printing mechanism which senses that the envelopehas moved into proximity with the printing mechanism. In response tosensing this condition the computer causes the printing mechanism tomove relative to the envelope so that printing may be reliably conductedthereon. The movement of the printing mechanism provides greaterassurance that the envelope will not catch on or be damaged by theprinter mechanism. Once printing has been conducted, the computer causesthe printing mechanism to be returned to a standby condition.

Upon passing through the transport section the deposited envelope passesinto the designated compartment. The entrance to the designatedcompartment is aligned with the outlet from the transport sectionthrough operation of the deposit holding module. Once the depositedenvelope has passed into the compartment within the module it is heldtherein until accessed by authorized personnel. Suitable lockingmechanisms and security procedures are provided so that only authorizedpersonnel are enabled to access the deposit. The identifying informationthat is printed on the envelope enables the association of the depositeditems with the particular customer or user of the automated bankingmachine.

In the example embodiment when the user wishes to deposit an instrumentsuch as a check, the automated banking machine operates to verify theauthenticity of the check and to read data therefrom. In response to theuser first providing appropriate identifying inputs and information, thecomputer in the ATM operates to enable a deposited item to engage thetransport section of the apparatus. The computer operates such that thedeposited item is initially engaged in a limited slip manner by thevariable force driving section and once sensed as substantially withinthe transport, operates to move the check in a generally nonslip manner.

The deposited item is moved in the transport section in the exampleembodiment in a first direction past sensors which enable the computerto determine its length. Once the length of the deposited item isdetermined by moving it in the first direction, movement of thedeposited item is stopped and the item is transported in an opposeddirection past the analysis module. In the example embodiment movementof the check past the analysis module enables the collection of datacorresponding to an image of the check as well as the sensing ofmagnetic properties in areas thereof. The example embodiment does notrequire that the deposited check be perfectly aligned in the transportsection for reading the check.

In an example embodiment the computer operates responsive to inputsprovided by the customer or responsive to other actions to recall frommemory data representative of a template which shows the layout ofinformation included on the particular type of item being deposited. Thecomputer operates to adjust the image data gathered from the depositeditem and to place it in correspondence with the template. Characters arethen analyzed from at least one selected area of the image in accordancewith the template to determine if such characters can be accuratelyidentified. If the computer determines that these particular characterscannot be accurately identified, the image data is then moved relativeto a template and further attempts are made to determine if data fromthe area of the template can be recognized. In the example embodimentthe data corresponding to the image of the check may be moved 180°relative to the first attempt. In this way if the check is deposited infor example, a face up orientation, either of two possible orientationsfor the check may be quickly analyzed. Of course alternative approachesmay be used and if after a set number of attempts it is determined thatthe data from a particular area of the check cannot be analyzed with asufficient degree of accuracy, further attempts may be discontinued andthe deposited item returned to the customer.

Once data from at least one area of the deposited item is determinedwith a sufficient level of assurance, data from at least one other areaof the item as determined by the template may be analyzed. In the caseof a check the ATM is operative to determine the amount of the check aswritten in the courtesy amount area. The computer operates to analyzethe characters and determine if the amount can be determined with asufficient level of assurance. In the example embodiment the computeroperates to locate and identify the courtesy amount using certainlandmark rules which identify the landscape and layout of the courtesyamount area. If the computer decides that the characters in the courtesyamount area may be determined with a sufficient level of assurance,further processing of the check is enabled to be conducted. In thealternative if the amount cannot be read with a sufficient level ofassurance, the deposited check may be returned to the customer.

In the example embodiment the computer operates to analyze thecharacters in the MICR line on the check as well as the courtesy amount.This data provides both the data sufficient to identify the institutionon which the check is drawn as well as the account number of the entityon whose account the check is drawn. The MICR line also includes datarepresentative of the check number and other information. The courtesyamount which is analyzed in the example embodiment indicates the amountof the check which has been presented. This information is oftensufficient for a financial institution or other entity operating theautomated banking machine to charge the appropriate entity for theamount of the check presented. In alternative embodiments the computermay operate to analyze characters located in the area of the check inwhich the legal amount is written. The amount determined as the legalamount of the check may then be compared to the courtesy amount forpurposes of determining whether both amounts have been read properly.Alternatively or in addition, the MICR line on the check may includeamount data in the case of some checks. In these cases the computer mayoperate to conduct additional comparisons between the analyzed amountsto verify that the amounts correspond and therefore have been readaccurately, or to determine discrepancies that may indicate that a checkhas been tampered with or other conditions that may suggest that it isnot advisable for the machine to accept such a check.

In the example embodiment the depository apparatus is also operative tosense for the presence of magnetic coding in appropriate locations onthe check. For example the computer is operative to verify that the inkin the area which has been identified as including the MICR coding hasmagnetic properties. This may provide greater assurance that thedocument presented is in fact a genuine printed check and not aphotocopy of a check. The computer may operate in addition to sensemagnetic or other properties from various areas appropriate for thedeposited document depending on data stored in memory. Further in somealternative embodiments the computer may operate to look for magnetic orother properties in areas of the check where such properties would notbe appropriate. Such sensing may reduce the risk of the machineaccepting fraudulent checks. Other embodiments may include read heads orother devices for reading features on a check corresponding to MICR linecharacters or other features magnetically.

In some embodiments the machine may operate to capture a complete imageof one or both sides of each check or other instrument. In someembodiments image data may be stored in correlated relation with datarelated to the transaction at the machine. In some embodiments the imagedata, with or without associated transaction data, may be delivered bythe machine to appropriate computers so that check processing may beconducted using the electronic image of the check rather than paperdocuments. In some embodiments check images may be stored at the machineand later delivered to appropriate systems for check processing. Inother alternative embodiments check images may be transmitted to othercomputers during the transaction so that such computers may furtheranalyze the check image data.

In an example embodiment the computer operating in the ATM is operativeto include data representative of the check data corresponding toinformation which corresponds to indicia on the check such as amount andMICR line data, into an electronic message requesting authorization ofthe ATM transaction. This authorization message is transmitted to anappropriate host computer. The computer analyzes the data to verify thatthe user operating the ATM is authorized to conduct a deposit, checkcashing or other transaction. In addition the host computer may operateto verify that the check data corresponds to data input by the customer.The host computer may further operate to determine or communicate withother computers to verify that the account data corresponding to thecheck corresponds to a valid account, that the check is not subject to astop payment order and/or that there are sufficient funds in the accountupon which the presented check is drawn to provide payment therefor.

In response to the host computer determining that the requested checkcashing transaction is suitable to be carried forward, an authorizationmessage is returned from the host computer to the ATM. The ATM operatesresponsive to instruction data included in the authorization message tocause the check to be moved through the transport section past theprinting mechanism. The printing mechanism operates to print indicia onthe check. This printed indicia may indicate that the check has beencancelled as well as indicate the particular account of the user towhich the check has been credited. In an example embodiment the printingmechanism operates in the manner previously discussed to move intoposition in response to sensing the check adjacent thereto. This againminimizes the risk of damage to the printing mechanism or the check.

The computer also operates to control the deposit holding module suchthat the appropriate compartment therein accepts the deposited check. Inthe example system the deposit holding module moves the compartment forholding the check into alignment with the outlet of the transportsection. The deposited check is then held within the compartment untilit is accessed by authorized personnel. Further, in the exampleembodiment the deposit holding module is operative after receipt of thecheck into the appropriate compartment to move a tamping member in thecompartment. The tamping member operates to assure that the depositedcheck as well as other checks in the compartment are properly tampedinto position so as to reduce the likelihood of interference withacceptance of subsequent checks. The deposited check is then held in theappropriate compartment until removed by authorized personnel.

In some example embodiments the authorization message received from thehost computer by the ATM includes transaction identifying data. Suchtransaction identifying data may include information which facilitatesassociating the image or images of the check captured by the ATM withother data associated with the particular transaction. Such transactionidentifying data may include data that is sent by the ATM to the hostcomputer in the original request message as well as data that may begenerated and/or assigned by the ATM host to the transaction. Forexample in an example embodiment transaction identification dataincludes data which identifies the particular terminal at which thetransaction is being conducted. Such information corresponds to theterminal identification data that is included in the message received bythe ATM host from the terminal requesting the transaction. In additionin some alternative embodiments the transaction identification data mayinclude information correlated with a particular user, such as theuser's name and/or account information. Such information may also beincluded in the message received by the ATM host from the ATM. Furtherin example embodiments the transaction identification data may includeinformation such as the business date assigned by the ATM host to thetransaction, the entity responsible for operating the ATM such as aparticular institution or business establishment, transaction numberssuch as a sequence number as well as a pseudo number which can be usedfor correlating and/or verifying transaction data. Of course these itemsof transaction identification data are example and in other exampleembodiments other or different data may be used.

In an example embodiment the ATM is programmed to correlate thetransaction identification data with the image data related to theparticular check received in the transaction. At a time after the ATMhas generated data corresponding to an image of the check, an imagemessage is generated by the ATM and sent to a remote computer. In theexample embodiment the image message includes the transactionidentification data as well as the data representative of images of thefront and back sides of the check in a single message. In the exampleembodiment the image message is sent to a image server which isoperative to receive and process the image and transaction data. Theexample image server is operative to tabularize the transaction datarelated to machines operated by a particular entity and to make theinformation and images related to transactions conducted by ATMsassociated with that entity available to authorized individuals. Thismay be done through password protection, digital certificates or othersecurity methodologies. Further in other alternative embodiments theimage server or other connected computers may be operative to sendinformation included in the image message and/or image data to aclearing house or other institution for purposes of achieving settlementbetween an entity upon which the check is drawn and another entityholding an account for an entity to which the check is payable. Inalternative embodiments the image server may operate to modify imagedata as appropriate to indicate that the check is an electronicsubstitute check. Further the image data may be transmitted andprocessed in lieu of a paper check so as to return evidence related tothe proper cashing and cancellation of the check through the institutionon which the check is drawn, and eventually to the maker of the check.Of course these approaches are example and in other embodiments otherapproaches may be used.

While the example embodiment is used for accepting envelopes and checks,other embodiments of the invention may accept only checks or may processother types of instruments. These include for example utility bills,drivers' licenses, gaming materials, tax documents and other items. Suchitems may be analyzed by the analysis module described in the exampleembodiment for image and magnetic properties. Alternatively such itemsmay be analyzed for other properties which may be indicative of theirgenuineness and value. Further as can be appreciated, while the exampleembodiment accepts deposited items into the machine, other embodimentsmay accept items from a user, analyze them and return them to the user.This includes not only items which are considered unacceptable as isdiscussed in the example embodiment, but may also include items such asdrivers' licenses which are returned to the user after an image oranalysis is made thereof. Numerous types of systems and methods areencompassed within the scope of the present invention.

For example, an embodiment may include a method comprised of (a) movinga check across a magnetic sensor, wherein the magnetic sensor comprisesa plurality of sensor elements arranged consecutively along at least onecolumn. This described method may also include (b) acquiring magneticsignals from each sensor element as the check moves across the magneticsensor. Also this described method may include (c) through operation ofthe at least one processor in the automated banking machine, generatingat least one first matrix of sensor values, corresponding to a pluralityof portions of the magnetic signals acquired in (b) for locations on thecheck spanning the width and length of the check. In addition thismethod may include (d) carrying out through operation of at least oneprocessor in the machine at least one predetermined matrix modifyingcalculation with the first matrix to produce at least one modifiedmatrix. The at least one predetermined matrix modifying calculationincludes calculating for at least one value in the matrix, a modifiedvalue responsive to the at least one value and at least one value in thefirst matrix adjacent to the at least one value. Further this method mayinclude (e) through operation of the at least one processor, identifyinga plurality of sets of values in the modified matrix which respectivelycorrespond to different zones on the check. In addition, this method mayinclude (f) through operation of the at least one processor in theautomated banking machine, determining that the check is acceptable tobe deposited into the automated banking machine responsive to the setsof values identified in (e).

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an isometric view of an example automated banking machinewhich may be used in connection with a deposit accepting apparatus andmethod.

FIG. 2 is a schematic view of components included within an automatedbanking machine of the type shown in FIG. 1 and a system in which theautomated banking machine is used.

FIG. 3 is a schematic view of software components used in connectionwith the automated banking machine shown in FIG. 2.

FIG. 4 is a side view of a deposit accepting apparatus used inconnection with an example embodiment.

FIG. 5 is a schematic view of the deposit accepting apparatus shown inFIG. 4.

FIG. 6 is a top view of the deposit accepting apparatus shown in FIG. 4with the analysis module removed therefrom.

FIG. 7 is a side schematic view showing the transport portion of thedeposit accepting apparatus in a position in which it accepts checks andother sheets.

FIG. 8 is a view similar to FIG. 7 with the deposit accepting module inposition for accepting envelopes or other items.

FIG. 9 is a side schematic view of the variable force driving sectionincluded in the transport section of the deposit accepting apparatuswith the drive shown in condition for providing limited slip engagementwith deposited items.

FIG. 10 is a view similar to FIG. 9 but with the variable force drivingsection providing generally nonslip engagement with deposited items.

FIG. 11 is a side view of the deposit holding module of the transportapparatus shown in a position accepting a sheet into a sheet holdingcompartment.

FIG. 12 is a view similar to FIG. 11 but with the deposit holding modulein a condition for accepting an envelope deposit into an envelopeholding compartment.

FIG. 13 is an opposite side view of the deposit holding module from thatshown in FIG. 11 with a tamping member in a position for accepting entryof a sheet into the sheet holding compartment.

FIG. 14 is a view similar to FIG. 13 but with the tamping memberdisposed downward to tamp sheets held in the compartment.

FIG. 15 is a view similar to FIG. 14 but with an access door to thesheet holding compartment in an open position.

FIG. 16 is a view similar to FIG. 14 but with the tamping memberdisposed upward from the sheet holding compartment to enable a user toaccess sheets therein.

FIG. 17 is a side view of a printing mechanism used in connection withthe deposit accepting apparatus shown in FIG. 4 with the printer shownin a non-printing position.

FIG. 18 is a view similar to FIG. 17 but with the printing mechanismshown in a printing condition.

FIG. 19 is a schematic view of hardware and software components used inconnection with the deposit accepting apparatus and the automatedbanking machine of the example embodiment.

FIG. 20 is a schematic view of the interaction of components used inconnection with accepting documents in the deposit accepting mechanism.

FIGS. 21-25 are schematic views representing a series of steps executedthrough use of the deposit accepting apparatus in connection withaccepting a check in the machine.

FIG. 26 is a top schematic view of the example deposit acceptingapparatus showing a document accepted therein in a skewed position.

FIG. 27 is a schematic view of a check adjacent an analysis module inthe deposit accepting apparatus of the example embodiment and thedevices used for sensing magnetic properties thereof.

FIG. 28 is a schematic view of an example magnetic profile generated bythe document shown in FIG. 27.

FIG. 29 is an example logic flow executed by an automated bankingmachine in accepting an envelope deposit through the deposit acceptingapparatus.

FIGS. 30-33 describe an example embodiment of the logic flow executed byan automated banking machine in accepting a check through the depositaccepting apparatus.

FIG. 34 is a schematic view showing how data representative of an imageof a deposited instrument is modified and aligned in an exampleembodiment for purposes of analysis.

FIG. 35 is a schematic view of the application of a template for aparticular type of deposited instrument to image data for an instrumentdeposited to the deposit accepting apparatus of an example embodiment.

FIG. 36 is a top plan view of an alternative form of the variable forcedriving section included in the transport section of the depositaccepting apparatus which includes a document alignment device.

FIG. 37 is a side schematic view corresponding to FIG. 36 showing themechanism actuating the variable force driving section and documentalignment device.

FIG. 38 is a schematic view of an alternative system of an exampleembodiment including check accepting automated banking machines.

FIG. 39 is an example screen output provided from an administratorstation of the system shown in FIG. 38.

FIG. 40 is an example screen output from an administrator station,showing the status of automated banking machines.

FIG. 41 is an example screen output from an administration, showingstatus information related to a particular automated banking machine.

FIG. 42 is an example output from an administrator station which enablesan administrator to recover transaction information from the examplesystem.

FIG. 43 is an example output from an administrator station showing checkcashing transactions conducted by a particular customer.

FIG. 44 is an example screen output from an administrator stationshowing selections in an example system.

FIG. 45 is an example screen output from an administrator stationshowing available reports.

FIG. 46 is an example screen output from an administrator stationenabling an administrator to upload file information to the examplesystem.

FIG. 47 is an example output from an administrator station indicatingthe upload of files to the example system.

FIG. 48 is a schematic view of an example record relating to makers ofchecks whose checks are to be cashed in the example system.

FIG. 49 is an example output from an administrator work station showingfile conversion from the example system.

FIG. 50 is an example output from an administrator station which is usedby an administrator to edit customer records.

FIG. 51 is an example screen output produced by an administrator stationshowing customer authorization information.

FIG. 52 is an example screen output from an administrator stationshowing information regarding a particular attempted check cashingtransaction.

FIGS. 53 through 57 include a schematic representation of the logic flowexecuted by computers in the example system shown in FIG. 38.

FIGS. 58 through 60 are a table showing various criteria programmed inthe example system for the denial of transactions attempted at automatedbanking machines within the system.

FIG. 61 is a schematic view of an alternative system for processingcheck transaction data and image data related to checks received throughautomated banking machines.

FIG. 62 is a schematic view of the logic flow associated with a checkaccepting transaction conducted at an example automated banking machineused in connection with the system represented in FIG. 61.

FIG. 63 is a table showing example transaction identifying dataassociated with check images in an example embodiment.

FIG. 64 is a table showing example fields and the content thereof in animage message sent from an ATM to an image server in an exampleembodiment.

FIG. 65 is an example interface screen presented by an image server topersons who may be seeking to access transaction and image data in anexample embodiment.

FIG. 66 is an example interface screen presented by the image server torequire users to identify themselves as properly authorized to accesstransaction and image data.

FIG. 67 is an example output from the image server through which a useris enabled to access check transaction and image data.

FIG. 68 is an example interface output from the image server whichenables authorized users to recover transaction and image data relatedto transactions.

FIG. 69 is an example table of transaction data corresponding to checkcashing transactions conducted at ATMs associated with a particularentity operating ATMs.

FIG. 70 is an example output from the check image server representing animage of a check which is produced responsive to selecting an iconassociated with a corresponding transaction in the table shown in FIG.69.

FIG. 71 shows an example of a check which is shown divided up into fourzones for use with determining if the check may be a fraudulent copy.

FIG. 72 shows a visual representation of a magnetic image map for anANSI compliant check shown in FIG. 71.

FIG. 73 shows a visual representation of a magnetic image map for aphotocopy of a check made without magnetic toner.

FIG. 74 shows a visual representation of a magnetic image map for amagnetic photocopy of a check.

FIG. 75 shows an example embodiment of a magnetic sensor for the IDM.

FIG. 76 shows an example method of dividing a check into six zones(zones 1-6) for purposes of determining whether a check may be afraudulent copy.

FIG. 77 shows an example of scanning paths for the ten differentmagnetic sensing elements or channels of the example magnetic sensorsuperimposed on a check

FIG. 78 shows an example of a table used to classify a check as good ora potential fraudulent copy.

FIG. 79 shows an example of the U.S. standard MICR E-13B font charactersand their corresponding waveforms.

FIG. 80 shows an example of a table of the MICR E-13B characters (columnlabels) and their corresponding determined peak features which comprisetheir respective feature vector.

FIG. 81 shows a portion of an example detected waveform for a detectedMICR character with two peaks.

FIG. 82 shows shaded areas in a waveform which correspond to calculatedareas or weights determined for the peaks in the waveform.

FIG. 83 shows shaded areas in a waveform which correspond to calculatedcut areas or modified weights determined for the peaks in the waveform.

FIG. 84 shows an electrical circuit 800 coupled to the magnetic sensorof the IDM.

FIG. 85 shows an example block diagram of the cascaded gain stage of thecircuit.

FIG. 86 shows an example block diagram of a gain stage section of thecircuit

FIG. 87 shows an example of the MICR zone of a check.

FIG. 88 shows an example of a three dimensional graphical representationof magnetic patterns on a check.

BEST MODES FOR CARRYING OUT INVENTION

Referring now to the drawings and particularly to FIG. 1 and referringto U.S. Pat. No. 6,554,185, which is hereby incorporated herein byreference, there is shown therein an example embodiment of an automatedbanking machine 10 which includes an example deposit accepting apparatusand which performs at least one operation. Automated banking machine 10is an ATM. However it should be understood that the inventive conceptsdisclosed herein may be used in connection with various types ofautomated banking machines and devices of other types. Automated bankingmachine 10 includes a user interface generally indicated 12. Userinterface 12 includes input and output devices. In the exampleembodiment the input devices include a plurality of function buttons 14through which a user may provide inputs to the machine. The exampleinput devices further include a keypad 16 through which a user mayprovide numeric or other inputs. A further input device in this exampleembodiment includes a card reader schematically indicated 18. Cardreader 18 may be of the type used for reading magnetic stripe cards,smart cards, RFID tokens or other articles presented by a user. Anotherinput device on the example machine includes an image capture device 20.The image capture device may be a camera or other device for capturingthe image of a user or the surroundings of the machine. The exampleembodiment may include biometric reading devices. Such devices mayinclude an imaging or reading device such as a fingerprint reader, irisscan device, retina scan device or other biometric input. It should beunderstood that the camera mentioned may serve as a biometric readingdevice in some embodiments.

The user interface 12 also includes output devices. In the exampleembodiment shown in FIG. 1 the output devices include a display 22.Display 22 includes a visual output device such as a CRT or LCD forproviding messages and prompts to a user. These messages and prompts maybe responded to by inputs from the user through the function buttons 14adjacent to the display or by inputs through the keypad 16 or throughother inputs. A further output device in the example embodiment includesan audio output device schematically indicated 24. The audio outputdevice may be used to provide audible outputs to the user. A furtheroutput device in the example embodiment includes a printer. The printermay be used to provide outputs in the form of receipts or other items orinformation to the user. The printer is in connection with a printeroutlet in the user interface indicated 26 in FIG. 1.

It should be understood that the input and output devices shown areexamples and in other embodiments other types of input and outputdevices may be used. Such input and output devices commonly receiveinformation which is usable to identify the customer and/or theiraccounts. Such devices are also operative to provide information to auser and to receive instructions from a user concerning transactionswhich are to be carried out through use of the machine. Various forms ofuser interfaces and input and output devices may be used in connectionwith various embodiments.

In the described example embodiment ATM 10 includes a cash dispensingmechanism which is alternatively referred to herein as a cash dispenser.The cash dispensing mechanism is selectively operated to enable thedispensing of cash to authorized users of the machine. Cash is providedto the users through a cash outlet indicated 28. A further feature ofthe example embodiment of the invention is the ability to acceptdeposits through the ATM. The machine includes a deposit acceptingopening 30. In the example embodiment the ATM is enabled to acceptdeposits in the form of sheets, envelopes and other items as laterdiscussed. In some embodiments the ATM may have structural componentslike those shown in U.S. Pat. No. 6,010,065 the disclosure of which ishereby incorporated herein by reference.

FIG. 2 shows a schematic view of the computer architecture associatedwith ATM 10 and a first example system in which it is used. The ATMincludes one or more computers therein which computer or computers arealternatively referred to herein as a processor or processors. The oneor more computers in the example embodiment are schematicallyrepresented by a terminal processor 32. The terminal processor is inoperative connection with one or more data stores schematicallyrepresented 34. The terminal processor may comprise one or morecomputers that operate to control transaction function devices 36 whichare included in the ATM. These transaction function devices includedevices which operate in the ATM to carry out transactions. Transactionfunction devices may include, for example, currency dispensingmechanisms, currency presenters, currency acceptors, currencyvalidators, item dispensing devices, card readers, printers,depositories, other input and output devices and other devices.Transaction function devices may further include cameras, sensors, imagecapture devices and other items. Transaction function devices may alsoinclude one or more processors. The particular character of thetransaction function devices depends on the particular capabilities forcarrying out transactions to be provided by the ATM.

In the example embodiment ATM 10 exchanges messages through acommunication interface 38 with a communications network 40. Network 40may be one or more types of data communications networks, including aphone line, data line, lease line, frame relay, wireless network,telecommunications network, local area network, wide area network orother medium for communicating messages to and from the ATM 10. Thecommunications interface provided is suitable to work in connection withthe particular type of network(s) to which the machine is connected. Inthe example embodiment the ATM may be connected to a network whichcommunicates with a plurality of ATMs such as Cirrus® or Plus®, or otherdebit card network. Of course in other embodiments other suitablenetworks for processing credit, debit or other types of onlinetransactions may be used including the Internet.

As schematically represented in FIG. 2, network 40 is in operativeconnection with one or more host computers 42, also referred to hereinas host banking. Host computers 42 in the example embodiment areoperative to authorize transaction requests which are made by users atthe ATM 10. The ATM is operative to deliver to the host computer dataidentifying the user and/or their account and the particulartransactions that they wish to conduct. The request is routed throughthe network to a host computer that can evaluate and/or authorize therequest. The appropriate host computer receives and analyzes this dataand returns to the ATM a message which indicates whether the transactionrequested is authorized to be conducted at the machine. The messagereturned may also include one or more instructions that cause the ATM tocarry out one or more transaction functions. In response to receiving amessage indicating that the transaction should proceed, the processor inthe ATM operates the transaction function devices to carry out therequested transaction. If the transaction is not authorized, the user isso informed through the display or other output device and thetransaction is prevented. The ATM is also operative in the exampleembodiment to send to the host computer authorizing the transaction, acompletion message which includes data indicative of whether thetransaction was able to be carried out successfully. Upon receiving theinformation that the transaction was carried out, the host computer isoperative to take appropriate action such as to credit or debit a user'saccount. It should be understood that this system shown in FIG. 2 is anexample and in other embodiments other approaches to operating automatedbanking machines and authorizing transactions may be used.

In the described example embodiment the transaction function devicesinclude a deposit accepting apparatus. The example deposit acceptingapparatus is capable of accepting deposited items such as envelopes aswell as sheets and documents such as checks. This deposit acceptingapparatus in alternative embodiments may be capable of accepting andanalyzing other items such as papers, instruments, billing statements,invoices, vouchers, wagering slips, receipts, scrip, payment documents,driver's licenses, cards and items which may be moved in the depositaccepting device. Alternative embodiments of a deposit acceptingapparatus may accept only selected ones of deposit items. The exampledeposit accepting apparatus may alternatively be referred to herein asan “intelligent depository module,” “depository module” or “IDM.” Anexample embodiment of the IDM 44 is shown in FIG. 44 and examplemechanical components thereof are shown in FIGS. 4-18. It should beunderstood that for purposes of this application, a deposit acceptingapparatus or device encompasses any mechanism that accepts an item intoan ATM.

As shown in FIG. 4 IDM 44 includes a transport section 46. Transportsection 46 extends in generally a straight path from an inlet 48 to anoutlet 50. Inlet 48 is positioned adjacent to a deposit acceptingopening 30 through the body of the ATM 10. Access to the transportsection 46 from the outside of the ATM may be controlled by a gate 52 orother suitable blocking mechanism which operates under the control ofthe terminal processor 32. The terminal processor operates to open thegate only when an authorized user of the ATM is to provide items to orto receive items from the transport section of the IDM.

The transport section 46 of the IDM includes a plurality of belts orother moving members 54. Moving members 54 operate to engage itemsdeposited into the transport section and to move deposited items inengagement therewith. The moving members are moved in response to one ormore drives schematically indicated 56. In this example embodiment aninlet transport section 58 moves deposited items between upper and lowerbelt flights (see FIG. 5). Similarly, deposited items are also movedthrough an outlet transport section 60 in sandwiched relation betweenupper and lower belt flights. Between the inlet and outlet transportsections deposited items are moved past an analysis module 62. In thisexample embodiment deposited items are moved adjacent to the analysismodule in engagement with moving members that act on the lower side ofthe deposited item. In this way the deposited item moves in closeproximity to the analysis module and in sandwiched relation between alower face 64 of the analysis module and the upper face of the movingmembers. Of course it should be understood that this configuration is anexample. In other embodiments additional analysis modules may beprovided so that both sides of an item are analyzed. Analysis modules ordiscrete devices for activating indicia to facilitate sensing, as wellas for sensing indicia on items, may be provided as necessary to readindicia from items handled by the banking machine.

As represented in FIGS. 7 and 8, in the example embodiment the depositaccepting apparatus is enabled to accept both relatively thin articlessuch as sheets as well as relatively thick items such as depositenvelopes. As shown in FIG. 7 thin articles such as checks or othersheets are moved through the transport section with the upper and lowermoving members in close proximity. In the example embodiment, the upperportion of the transport section is movable relative to the lowersection and is biased adjacent thereto by gravity or other suitablebiasing mechanism. In this way a relatively thin deposited item isbiased to engage the moving members in the transport section. Relativelythin articles such as checks and other sheets are moved between theinlet 48 and the outlet 50 in the transport section with the transportin the configuration generally shown in FIG. 7. In this configurationthe moving members and analysis module in the upper portion of thetransport section are biased to maintain engagement with the sheet so asto enable selectively moving the sheet through the transport section.

It should be noted that in the example embodiment of the depositorymodule a single drive is used for moving the moving members in both theupper and lower transport sections. This is accomplished in the exampleembodiment through use of a connecting gear train 66 which serves as atransmission device which transmits movement between the lower beltflights and the upper belt flights. A connecting drive belt 68 is usedto transmit movement between the upper portions of the inlet and outlettransport sections 58, 60 respectively. The connecting drive beltextends adjacent to the analysis module 62. Of course this approach isexample and in other embodiments other arrangements of drives andtransmission devices may be used.

As represented in FIG. 8 when a relatively larger item is deposited intothe transport section, the upper and lower transport sections areenabled to separate to a degree sufficient to accommodate the thicknessof the particular item. The configuration of the gear train 66 enablesproviding moving force to the moving members in both upper and lowersections of the transport within a relatively wide range of thicknesses.The example structure further enables each end of the transport sectionto move both vertically and rotationally relative to one another whilestill continuing to reliably transport items therein. An inserteddeposited item overcomes the biasing force applied to the deposited itemby the transport sections to enable the item to move between the upperand lower moving members that bound the path 53 between the inlet 48 andoutlet 50. The biasing force further enables providing positiveengagement with the deposited item to reliably move the item along thepath. It should be understood however that this particular configurationfor the transport is example and in other embodiments of the inventionother approaches may be used.

In the example embodiment the inlet transport section 58 may be operatedresponsive to the terminal processor as a variable force drivingsection. This is achieved through use of the mechanism schematicallyrepresented in FIG. 9. As shown in FIG. 9 the inlet transport sectionincludes moving members comprising one or more upper belt flights 70 andone or more lower belt flights 72 in generally opposed facing relation.The number of upper and lower belt flights will depend on the particularconfiguration of the transport used. In certain embodiments the upperand lower belt flights may be in generally aligned facing relation ormay be transversely disposed from one another.

The upper belt flight 70 which serves as a moving member is supported onan upper roller 74. The lower belt flight 72 is supported on a lowerroller 76 which is generally disposed in opposed relation below roller74 and which serves as an opposed moving member. Upper roller 74 isjournaled on a supporting member 78. Supporting member 78 is supportedthrough and is rotatable about a pivot axis 79 which extends axiallythrough support shaft segments 80. An actuator 82 such as a solenoidselectively moves the supporting member between the position shown inFIG. 9 and the position shown in FIG. 10. This is done in response tooperation of the terminal processor 32 and enables the inlet transportsection to be selectively changed between a low drive position in whichlimited slip is provided between the belt flights 70 and 72 and adeposited item, and a high drive position in which generally no slipoccurs between the belt flights and the deposited item.

FIG. 9 shows the inlet transport section in the low drive position. Inthe example embodiment roller 74 is supported through roller shaftsegments 84. Shaft segments 84 are journaled in and movable in elongatedU-shaped slots 86 in connection with supporting member 78. Each slot 86is bounded by a U-shaped bounding surface 87. The slots are generallyradially aligned relative to pivot 79. A biasing spring schematicallyindicated 85 or other appropriate biasing mechanism is provided forurging roller shaft segments 84 toward a downward position in the slot.

In the position shown in FIG. 9 an item such as a check which is engagedbetween the belt flights 70 and 72 is enabled to slip therein responsiveto the limited biasing force which acts to push roller 74 downwards.This results because roller shaft segments 84 move relatively readily onthe vertically extending portions of the bounding surface as the upwarddirected reaction force caused by the inserted item is resisted only bydownward biasing force. This enables for example, a user who is placinga check into the transport section to hold the check for a period oftime while it engages between the belt flights. The limited slipminimizes the risk that the check will be torn if the user does notrelease it promptly. Such limited slip engagement further enables acheck or other inserted item to move angularly relative to movementalong the direction of transport. This may occur for example by theengagement of an outward end of the item with a user's hand as the itemis pulled into the machine and/or by one or more surfaces bounding theopening in the machine through which the item passes.

Upon sensing with one or more appropriate sensors schematicallyindicated 89 that the check is moved sufficiently into the transportpath, the terminal processor is operative to move the actuator 82 toplace the inlet transport in the high drive position shown in FIG. 10. Aconnecting member 88 moves the supporting member 78 about support shaftsegments 80. This change in orientation of the slots increases thedownward biasing force applied by the roller 74 onto the deposited item.This results in the example embodiment because the upwardly directedseparating force is now resisted by engagement of roller shaft segments84 with bounding surface 87. In addition the rotating shaft segments 84engage bounding surface 87 so that the roller shaft segments are furtherurged downward in the slot 86 towards an end portion 81 as shown in FIG.10. This causes the item to be more positively engaged between the beltflights and generally prevents slippage. This feature is useful as laterdiscussed in helping to measure the length of a deposited item forimaging purposes.

FIGS. 36 and 37 show an alternative form of an inlet transport sectiongenerally indicated 59. Inlet transport section 59 is generally similarto inlet transport section 58 except as described. Inlet transportsection 59 includes an upper roller 75 and a lower roller 77. In theexample embodiment the rollers have moveable members in the form of beltflights supported thereon. Of course it should be understood that inother embodiments, other types of wheels, rollers or other movingmembers may be used.

Upper roller 75 is enabled to provide a variable slip driving forcethrough movement of a supporting member 83. Supporting member 83 issimilar in the example embodiment to supporting member 78 and is movableresponsive to an actuator 91. The actuator 91 is operative toselectively change the orientation of the supporting member 83 toselectively change the degree of engagement between the belts moving onroller 75 and an item moving through the transport. A guide device 93 ispositioned in the inlet transport section 59. In the example embodimentguide device 93 includes a pair of moveable side rails 95. Side rails 95are biased in a downward direction as shown in FIG. 37 by a springmechanism 97. As indicated in FIGS. 36 and 37, the guide rails aretapered both vertically and transversely adjacent the end portionsthereof. This facilitates movement of documents adjacent to andunderneath the side rails and reduces the risk of items being caught onthe side rails.

As schematically represented in FIG. 37 in the example embodiment theside rails 95 are operatively connected with the actuator 91 through aconnecting mechanism 99. The connecting mechanism operates such thatwhen the drive is operated such that there is more slip between themoving member and an inserted item, the side rails 95 are biased in adownward direction. In this condition the rails are biased toward thetransport path in which the document moves with a relatively greaterforce than when the drive is in greater positive engagement with thedocument. In this way the guide device 93 acts to position skewed orotherwise misaligned documents more readily relative to the transportpath when the drive is in limited slip engagement. This may help toposition the document rotationally or in alignment with the transportpath through engagement of the deposited item with at least one of theside rails. It should further be understood that the spring biasedcharacter of the alignment device, enables the device to engage an uppersurface of a document without causing damage thereto or preventingmovement of the document along the transport path in response to theurging of the moving members. It should be further noted that theconfiguration of the example embodiment of the guide device facilitatesaligning of documents in the transport path when documents are movingeither in the inward or the outward direction.

As can be seen from FIG. 37, when the connecting mechanism moves toplace the drive in a more positive engagement with the document, thedownward biasing force of the side rails is reduced. This is donebecause once the drive is more positively engaged with the depositeditem, the item is not as readily reoriented relative to the transportpath. It should be noted that although in FIG. 37 this is represented asbeing done using a cam and follower arrangement, in other embodimentsthe biasing force on the guide device may be changed through othermechanisms. In addition it should be understood that the mechanism shownis example and in other embodiments the guide device may be moved awayfrom the deposited item rather than merely having the biasing forceacting on the item reduced.

In the operation of this example embodiment, the depository module inwhich the variable force inlet transport is used accepts both singlesheet-like items as well as larger items such as depository envelopes.In some other embodiments larger items consisting of multiple sheetssuch as passbooks may also be transported. In this example embodimentlarger items are generally transported through the inlet transportsection 59 without a need to engage the items more firmly than isaccomplished in the limited slip engagement condition of the transport.In such cases, the controller operating within the banking machine,operates in accordance with its programming and responsive to the atleast one input by the user concerning the type of item beingtransported, to operate the inlet transport in the limited slipconfiguration. The computer does not cause the transport to change tothe more positive engagement condition as such item passes through. Inthese circumstances the drive members as well as the guide device may bebiased away by the force of the item passing through the transport so asto enable the particular item to pass. Of course in some embodiments ifthe item is sensed as hung up in the inlet transport, the controlleroperating the ATM may attempt to more positively engage the item so asto move it through the transport. For single sheet items, such as checksor other documents, the inlet transport section 59 may operate inresponse to one or more user inputs concerning the type of item beingdeposited, to initially provide more limited slip between the depositedsheet and the moving members. During this more limited slip conditionthe biasing force on the guide device acts to position the guide devicemore firmly in the transport path. This helps to align the document withthe transport path during the period of limited slip engagement.Thereafter after the deposited item has moved further into the transportpath, the supporting member 83 may be moved to provide a more positiveengagement. As this is done the force applied by the guide device 93 isreduced as the more positive engagement between the moving members andthe deposited item will tend to move the item in its then currentorientation. Of course it should be understood that the guide device andthe mechanism shown are example and in other embodiments other types ofdevices and mechanisms may be used equivalently to accomplish thedescribed functions. In other example embodiments deposit acceptingdevices that only accept items having thicknesses within a narrow rangesuch as checks, vouchers, currency or other sheet items may be used.

The example embodiment further includes a deposit holding moduleschematically indicated 90 (see FIG. 4). In the example embodiment thedeposit holding module includes a plurality of compartments which aremoved relative to the outlet 50 of the transport section to enable itemsto be passed from the transport section into a selected compartment. Thedeposit holding module includes a drive 92 which is part of atranslation mechanism 94 of the screw type. The translation mechanismoperates to move the compartments in a generally vertical directionrelative to the outlet 50 in the transport section. The deposit holdingmodule further includes a tamping member 96 which is movable in thecompartment and operates to tamp sheets held in a sheet holdingcompartment so as to reduce the volume of sheets held therein until theitems may be removed.

The operation of the deposit holding module 90 in connection with theexample embodiment is represented in FIGS. 11 through 16. As shown inFIG. 11 a sheet holding compartment 98 in the deposit accepting module90 is adapted for holding sheets 100 of one type such as cancelledchecks or other items accepted in the machine. The sheet holdingcompartment 98 includes an opening 102 in an upper area thereofgenerally indicated 103. Opening 102 may be selectively moved responsiveto signals from the terminal processor and operation of drive 92, to bein communication with outlet 50. The tamping member 96 may also beselectively moved upward such that a sheet leaving the transport sectionthrough the outlet such as sheet 104, may be passed into the sheetholding compartment 98.

When deposit envelopes are to be accepted, the controller responsive toat least one input through the user interface indicating an envelopedeposit, may operate the drive 92 to move the position of thecompartments within the deposit holding module so that an envelopeholding compartment 106 is placed in communication with the outlet 50 ofthe transport section. This is accomplished as represented in FIG. 12 bybringing an opening 108 to compartment 106 into alignment with theoutlet 50. This enables an envelope deposit such as an envelopeschematically represented 110 in FIG. 12 to be moved into the envelopeholding compartment 106.

It should be noted that the movement of the compartments relative to theoutlet enable selectively aligning the openings to the variouscompartments with the outlet from the transport. This minimizes theamount of handling and manipulation of the deposits that is necessary tomove them through the deposit accepting mechanism. This increasesreliability and speed of the example embodiment. Further in the exampleembodiment the controller is enabled to selectively move the position ofthe tamping member 96 relative to the sheets in the sheet holdingcompartment 98. The tamping member is enabled to move about a non-fixedpivot 112 between positions such as those shown in FIGS. 11 and 12. Theability to downward dispose the tamping member relative to the sheetstack enables compressing the stack of sheets 100 that may be present inthe sheet holding compartment so as to reduce their volume. This enablesaccepting sheets more reliably and holding more sheets in the sheetholding compartment before the accumulated sheets need to be removed. Itshould be noted that the movement of the tamping member 96 is achievedthrough an operative interconnection with the translation mechanismwhich moves the compartments as shown in FIG. 4. Further the tampingmember is connected to the body of the deposit holding device throughthe nonfixed pivot connection so that the action of the tamping memberis enabled to accommodate various sized stacks of sheets within thesheet holding compartment.

FIG. 13 shows an opposite hand view of the sheet holding compartment 98and the tamping member 96. As shown in FIG. 13 the tamping member may bemoved upward to a position that enables sheets to enter the sheetholding compartment when the outlet of the transport section is movedadjacent to the opening to the sheet holding compartment. In the exampleembodiment the tamping member is moved responsive to a moving mechanismindicated 101. The example moving mechanism includes a member whichengages an aperture in a wall member. The wall member in the embodimentshown remains relatively stationary. Vertical movement of the module 90is operative to selectively move the tamping member. In the positionshown in FIG. 13 in which an item may be accepted into compartment 98,the tamping member is positioned so that the opening 102 is disposedbetween the tamping member and a closed end of the compartment generallyindicated 105.

FIG. 14 shows a similar view of the sheet holding compartment with thetamping member moved downward toward closed end 105 so as to facilitatethe tamping of sheets which may be stored therein. An example embodimentfurther includes the capability for authorized personnel to removeaccumulated sheets from the sheet holding compartment. As will beappreciated in some embodiments the deposit holding module is positionedwithin the interior of the ATM 10. Preferably the interior of the ATM 10includes a secure storage area or chest to which access is limited by asuitable locking mechanism. U.S. Pat. No. 5,970,890 which isincorporated herein by reference, shows such a chest and lockingmechanism. Only authorized personnel are enabled to access this areathrough use of an appropriate combination, key or other securetechnique.

Authorized personnel who have gained access to the interior of the ATMchest are enabled to remove accumulated sheets from the sheet storagearea through an access opening. This is done in the example embodimentby opening an access door 112 as represented in FIG. 15. In the exampleembodiment the access door is on an opposed side of the compartment fromthe inlet opening through which items enter the compartment, but inother embodiments other arrangements may be used. Door 112 in someembodiments may have in connection therewith an additional lockingmechanism. Such locking mechanisms may include key, combination,electronic, biometric or other opening types. Alternatively it may besufficient to enable door 112 to be opened by a user who has gainedaccess to the interior of the machine. Alternatively embodiments mayenable a user to operatively disengage the tamping member 96 from themechanism which normally controls its movement and to allow the tampingmember to be moved upwardly away from the sheet storage compartment 98.This is represented in FIG. 16. Such upward movement may enable anauthorized user to gain access to the sheet holding compartment forpurposes of removing sheets. In the embodiment shown both the capabilityof opening a door 112 and moving the tamping member to accessaccumulated sheets may be provided.

Likewise suitable mechanisms for accessing accumulated envelope depositsmay be provided. This may include for example access openings and/oraccess doors for accessing accumulated envelopes in the envelope holdingcompartment 106. Alternatively the envelope holding compartment may beprovided as a removable enclosure which may be removed entirely in alocked condition from the machine and replaced with a suitable emptydeposit holding container. Various approaches to removing depositeditems from various storage compartments may be used in alternativeembodiments.

In alternative embodiments provisions may be made for permanentlydefacing and/or destroying accepted items such as cancelled checks. Thismay be appropriate, for example, in situations where an electronic imageof the check has been captured and the electronic image serves as animage replacement document for the paper check. In such embodiments,after the check has been imaged either immediately or after a determinedholding period, the cancelled check may be suitably destroyed. Variousmethods for destruction may include, for example, shredding, chemicaltreatment, incineration or other approaches. Of course combinations ofsuch approaches may also be used. Further in some example embodimentsprovision may be made to transfer the remnants of destroyed checks outof the housing of the banking machine and into a suitable wastereceptacle. Such a waste receptacle may be provided, for example, at therear of the machine or other location that can be connected to anopening from the machine. Thus for example in one example embodimentchecks that have been imaged and cancelled may be treated with asuitable ink or other material to obliterate information on the check,and the check shredded by a suitable paper shredding mechanism.Thereafter the remnants of the check may be transported by rollers,belts, air pressure or other suitable means out through an opening ofthe machine into a waste receptacle. This example approach enables themachine to run for an extended period of time without having to removecancelled checks from the interior of the housing. Of course it shouldbe understood that this approach is merely example and in otherembodiments other approaches may be used.

Referring again to FIG. 4 the example embodiment of the IDM 44 includesa printing mechanism 114. Printing mechanism 114 which is shown ingreater detail in FIGS. 17 and 18 is operative to enable printingindicia on deposited items responsive to control of the terminalprocessor. Such printing may be used in the example embodiments to printidentifying indicia on deposited envelopes or documents. Alternativelysuch printing may be used to indicate the cancellation or acceptance ofitems placed into the machine by a user and which are stored in themachine or returned to the user from the machine. It should beunderstood that although in the example embodiment the printer is shownon a first side of the transport path, in other embodiments the printermay be positioned on an opposed side of the transport path.Alternatively printing devices of similar or different types may bepositioned on both sides of the transport path in some embodiments.

In the example embodiment the printer 114 is operative to minimize therisk that the printer will snag or damage deposited items that are movedadjacent to the printer in the transport section 46. Printer 114includes a suitable print head 116. Print head 116 is directed towardsitems which may pass the printer mechanism in the transport section. Aregistration platen 118 is positioned in opposed relation of the printhead on the upper section of the transport. As schematicallyrepresented, a sensor 120 is positioned adjacent to the print head sothat the presence of deposited items adjacent thereto may be sensed.

In the example form of the printer mechanism the print head 116 ismounted in supporting connection with a support plate 122. The supportplate is movably mounted relative to a frame of the IDM 44. An actuator124 is selectively operative responsive to signals from the terminalprocessor to move the support plate 122 and the print head 116selectively adjacent to or away from deposited items which move throughthe transport section. The actuator 124 accomplishes such movement ofthe print head by moving a bracket 126 in a generally horizontaldirection. Bracket 126 includes angled guide slots 128 therein. Pins 130extend in the angled slots and are operatively connected to supportplate 122. The movement of bracket 126 between the positions shown inFIGS. 17 and 18 are operative to cause the print head to move betweennonprinting and printing positions.

In the example embodiment one or more sensors represented schematicallyas a sensor 120 are used to indicate to the terminal processor that thedeposited item is moved adjacent to the printer. The terminal processoroperates to then move the printer into the printing position at a timewhen the leading edge of the deposited item has already moved to aposition beyond the print head 116. This reduces the risk that thedeposited item will snag on the print head and will be torn or otherwisedamaged by engagement therewith. It should be understood that printingmay be conducted with the items moving through the transport section 46in either direction adjacent to the print head. In this way indicia maybe printed on deposited items as they move either toward or away fromthe deposit holding module. This enables printing on items which areeither stored in the machine or which are accepted, marked or otherwiseprinted upon and then returned to the customer. It should further beunderstood that the particular configuration of the printing mechanismis example and in other embodiments of the invention, other types ofprinting mechanisms may be used.

In the example embodiment the analysis module 62 includes opticalscanning sensors schematically indicated 132 in FIG. 5. The analysismodule may serve as a check imaging device. Scanning sensors 132 areoperative to generate an image of documents that move adjacent to theanalysis module. In the example embodiment the scanning sensors scangenerally the entire transverse path through which documents may travelin the transport section. The scanner in the described embodimentgenerates radiation in the visible range and resolves images atapproximately 240 dots per lineal inch. The scanning sensor is alsooperative to have a focal length which corresponds to the distance thatthe scanned documents are disposed from the surface of the sensor asthey pass the analysis module. In the example embodiment the scanningsensor 132 has a focal length of about 4 millimeters. Of course in otherembodiments other types of scanning sensors may be used. Such othertypes of sensors may include emitters and sensors for sensing radiationat discrete frequencies in the visible or non-visible range. In additionmultiple sensor types may be used on one or both sides of documents.Various types of sensors may be used. The imaging device of the exampleembodiment is operative responsive to an associated processor to produceimage data, which comprises electronic data which corresponds to a fullor partial visual image corresponding to the visual appearance of thescanned check or other item.

The example analysis module further includes a magnetic sensor includingsensing elements 134. The magnetic sensing elements 134 are operative tosense the magnetic properties of documents which pass adjacent to theanalysis module. In the example embodiment the magnetic sensing elements134 include a plurality of discrete transversely spaced magneticsensors. The magnetic sensors generally each cover a relatively smallportion of the overall transport width. The sensors are arranged insufficient proximity so that substantially the entire transverse widthof the document path is sensed. The analysis module further includes amagnet 136. Magnet 136 may comprise a unitary or a plurality ofpermanent or temporary magnets. In the example embodiment permanentmagnets are used. The permanent magnets operate to activate magneticproperties of magnetic inks on documents passing adjacent to theanalysis module. These magnetic properties may then be more readilysensed by the magnetic sensing elements 134.

It should be understood that the particular sensors and devices inanalysis module 62 are example. Other embodiments may include only anoptical scanner or magnetic sensing elements, or different or additionaltypes of scanning and sensing elements. For example embodiments mayinclude scanners for reading bar code or other types of optical indicia.Other embodiments may include devices for reading magnetic fluxreversals that may be encoded in a magnetic media. Some embodiments mayinclude read heads for reading MICR characters or other magneticallysensible features. Other embodiments may include devices which areoperative to detect the presence of holograms or to read non-visibleradiation, fluorescent inks, or other types of coding. The particularactivating and sensing devices included in a particular analysis modulewill depend on the particular types of documents to be verified andanalyzed through operation of the invention.

FIG. 3 shows schematically the relationship of the IDM 44 with examplesoftware components which operate in the terminal processor 32. Theterminal processor 32 has operating therein an operating system layerschematically indicated 138. The operating system layer 138 may includeoperating systems such as OS/2® from IBM, Windows NT® or Windows XP®from Microsoft, Linux or other suitable operating system. The operatingsystem communicates with a terminal control software layer 140. Theterminal control layer in the example embodiment operates to controlnumerous aspects of the ATM functions including aspects of thetransaction function devices. As schematically represented in FIG. 3 theterminal control software sends messages to and receives messages fromdevices associated with the IDM 44. The messages are generally operativeto control mechanical components of the IDM as well as to receive inputsfrom sensors and other devices which operate in connection with thedeposit accepting function.

The example software architecture also includes a recognition subsystemsoftware layer 142. The recognition subsystem layer also communicateswith the operating system layer and the terminal control software layerto control and receive inputs from the IDM. The recognition subsystemlayer includes software which functions to control, manipulate andanalyze image data received from the IDM as schematically represented byimage control component 144. Another software component of the examplerecognition subsystem layer accomplishes character recognition. Thischaracter recognition component schematically represented 146 in theexample embodiment is operative to identify MICR coding and numericalcharacters. In the example embodiment the character recognition softwareincludes software that is commercially available from Carreker Corp.Other providers of character recognition software include Parascript,Mitek and A2iA. Of course other suitable recognition software may beused. The recognition subsystem 142 of the example embodiment alsoincludes a magnetic data control component schematically represented 145that is operative to analyze and to manipulate data received from themagnetic sensing elements and to check for correlation between themagnetic data that is sensed and the optical data which is obtained fromthe scanning activity. Of course these software functions are exampleand these functions may be programmed differently and other oradditional software components may be included in other embodiments.

FIG. 19 shows the example schematic components of the software ingreater detail. As can be appreciated the operating system 138 in theterminal processor is in operative connection with one or more datastores 34. The data store may include the data corresponding toinformation concerning programs, transactions, instructions and otherdata or program logic which are necessary to control the operation ofthe ATM. In addition the data store includes the data used in connectionwith analyzing and verifying documents. As later discussed the datastore may also include image data corresponding to the images ofdocuments that have been accepted by the system as well as transactionidentifying data. The software in connection with the example terminalprocessor also includes a communication subsystem layer 148. Thecommunication subsystem layer enables communication between the varioussoftware components of the system. The communication subsystem layeralso communicates with the various transaction function devices 36through appropriate interfaces or drivers. In addition communicationlayer 148 in the example embodiment also enables communication throughappropriate interfaces 38 to one or more communications networks 40 andthe host computers 42 which are operatively connected thereto. Of coursethis software architecture is merely example and in other embodimentsother approaches may be used.

In the example embodiment the IDM 44 includes an onboard computerprocessor which resides on a scanner card 150. The scanner card 150further receives and operates upon data from the optical scanningsensors 132 on the analysis module 62. The scanner card further hasincluded thereon a driver schematically indicated 152. The driver isoperative to communicate through a scanner interface 154 with theoperating system 138 and the data store 134. The driver 152 is alsooperative to control the scanning activity which is carried out by thescanner card 150. In the example embodiment the driver is also operativeto control the allocation of memory for use in the scanner operation.This assures that adequate memory is available in RAM to carry out thecapture, storage and analysis of the scanning data as required toanalyze and authenticate documents which may be input in the machine.

As represented in FIG. 20 in the example embodiment, when a document isto be scanned the terminal control software 140 causes the particulardocument to be moved as desired in the IDM 44. This is done bycontrolling the various devices which sense and move documents in andthrough the module. The terminal control software 140 operates inconjunction with the recognition subsystem 142 which provideinstructions to the scanner card 150 to scan documents using the opticalscanning sensors 132 during the appropriate time periods. The data fromthe scanning process and magnetic sensing operations is returned throughthe operating system to memory. The data is then recovered from memoryand manipulated responsive to the image control and characterrecognition features of the recognition subsystem 142. The results ofthe manipulation and analysis of the scanned data is then communicatedthrough the terminal control layer to a remote host 42. This is done inthis example embodiment using transaction request and authorizationmessages of a type that can be handled within the framework of ATMtransaction processing systems. However it should be understood that inother embodiments of the invention other approaches to authenticatingdocuments, verifying transactions and communicating with remotecomputers may be used.

The operation of an example embodiment will now be explained withreference to some example deposit transactions. A first deposittransaction to be described will be the deposit of an envelope typedeposit into the ATM 10. This is accomplished through the execution ofthe logic flow which is represented in FIG. 29.

In this example transaction the ATM first acts to receive identifyingdata from the customer. This may include for example the input of anarticle such as a credit or debit card which is read by a card reader inthe machine. Such cards commonly include information such as a user'sname and/or primary account number (“PAN”). This primary account numberincludes data which can be used to identify the user and/or the user'sinstitution and account number. Further when the user is operating theATM with a debit card the user is required to input further identifyingdata to verify that the user is authorized to access the account.Usually this verifying input includes a personal identification number(“PIN”). The PIN may be input through an input device such as a keypad.In alternative embodiments other types of identifying data may be input.This data may include for example biometric data such as iris scans,retina scans, thumbprints, facial features, voice prints or otherfeatures of a user or an article carried by the user that providesidentifying data.

At the second step in the logic flow of the example embodiment, themachine operates to receive from the user at least one input whichcorresponds to the transaction type that the user desires to conduct.Often this is done in response to the terminal processor presenting theuser with an output on the display which corresponds to varioustransaction options. The user is then enabled to select a transaction byproviding an input through one or more buttons or other input devices.In this example the user will indicate that the transaction type to beconducted is an envelope type deposit.

In a third step the ATM is operated to receive from the user an inputamount that is associated with the deposit transaction. Generally thiswill be provided as an input in numeric form to a keypad or other inputdevice on the machine. This numeric input which may be provided inresponse to a prompt on a display screen or other output device, willgenerally correspond to the value of the funds or other items includedin the envelope deposit.

The terminal processor operating the ATM acts in a fourth step to causean authorization request to be sent to the remote host computer. Thisauthorization request in the example embodiment includes datarepresentative of the identifying data, the transaction type and theamount involved. This authorization request is sent through one or morenetworks to the appropriate host computer which may authorize thetransaction. The host computer then operates in response to theauthorization request to determine if the identifying data validlycorresponds to an authorized user and/or account. The host computer alsodetermines if the customer is authorized to conduct the requestedtransaction. The host computer then operates to formulate a transactionresponse which is sent from the network back to the ATM.

The ATM receives the response from the host computer at a fifth step. Ifthe transaction is not authorized the instruction data included in theresponse message operates to cause the ATM to advise the customer thatthe transaction cannot be performed, and then the terminal processorperforms steps to close the transaction. In this example it will bepresumed that the response message returned includes instruction dataindicating that the transaction is authorized and may proceed. Inresponse to receiving the response message indicating that thetransaction may go forward, the terminal processor operates inaccordance with its programming to execute the steps necessary to causethe ATM to accept the envelope deposit. In a sixth transaction step theterminal processor is operative to cause the gate 52 to open at theinlet 48 to the transport section 46. This enables the user to accessthe transport section.

In a seventh step the terminal processor is operative to cause thedeposit holding module 70 to move so that the envelope holdingcompartment 106 is in alignment with the outlet 50 of the transportsection 46. The terminal processor is then operative to run thetransport of the IDM 44 such that the envelope may be accepted therein.As previously explained sensors may be provided adjacent to the inlet tothe transport such that the inlet transport section 58 provides limitedslip engagement initially with the deposited envelope. Upon sensing thatthe envelope is entered further so that the envelope is substantiallywithin the transport, the terminal processor may be operative to causethe envelope to be engaged more firmly with the moving members of thetransport. Alternatively the envelope may be fully transported inlimited slip mode.

The envelope is then moved between the moving members of a transportpast the analysis module 62. In response to the at least one customerinput which indicates that an envelope type item is being deposited theterminal processor of the example embodiment does not operate theanalysis module to read indicia on the envelope. The terminal processoroperates in accordance with its programming to formulate the indiciacomprising characters or other identifying data that will be printed onthe deposited envelope. This identifying data may be human languagecharacters or other data or character sets which are sufficient toidentify the deposit as associated with a particular transaction or theuser at the time of verifying the contents of the envelope. This datamay be derived from customer inputs, the ATM, the host computer, orcombinations thereof. It should be understood that when used herein, theterm characters includes digits, numerals, symbols, letters, signs andother types of interpretable indicia.

In a ninth step the envelope is sensed as in a position where it isadjacent to the printer mechanism 114. In the example embodiment theterminal processor operates in response to signals from sensor 120 thatindicate that the leading edge of the envelope has passed the print headand will not be caught thereon if the print head moves to the printposition. Upon sensing the envelope in the ninth step the terminalprocessor causes the printer to move into position adjacent the envelopeand to print the identifying indicia on the envelope. The terminalprocessor continues to run the moving members in the transport until theenvelope is sensed by appropriate sensors as having passed into theenvelope compartment.

The terminal processor then operates in accordance with its programmingto cause a transaction receipt to be printed and presented to thecustomer. The terminal processor in this example transaction thenoperates in a next step to provide an output screen to prompt the userto indicate whether they wish to conduct a further transaction. Forpurposes of this example it will be presumed that the user declines sucha further transaction.

In a fourteenth step the terminal processor operates in response to theuser input declining further transactions to close the transaction. Thismay include for example returning the customer's card, presenting a“thank you” screen, storing a record of the transaction in memory anddoing other things necessary to complete this transaction and to readythe machine to conduct another transaction. The terminal processor alsooperates in a fifteenth step to formulate and send a completion messageto the host computer. The completion message preferably indicateswhether the requested transaction was carried out successfully by themachine. The host computer in response will operate to include a recordin an associated data store that the customer has made a deposit in aparticular amount. Generally however such a deposit will not be creditedto a user's account until the content of the envelope is verified. Ofcourse this depends on the particular institution and their policies andpractices.

The operation of the ATM 10 will now be described with reference to anexample transaction involving the deposit of a check or similarinstrument. In this transaction the logic flow described in connectionwith FIGS. 30 through 33 is carried out.

In a first step shown in FIG. 30 the ATM operates to receive identifyingdata from the user in the manner previously discussed. In a second stepthe user identifies the particular transaction type to be associatedwith the transaction. In this case the user may indicate that they aredepositing a check or alternatively that they are cashing a check orother document. Because both types of transactions are related, theywill be described in connection with the example logic flow as thoughthe user had selected the option of cashing a particular check. Itshould be understood however that generally a user will be electingeither to apply the amount of the deposited check to their account, orto cash the check.

At a third step in the transaction flow shown in FIG. 30 the userprovides inputs corresponding to the amount associated with thetransaction they wish to conduct. As optionally indicated in the fourthstep, the institution operating the ATM machine may charge a checkcashing fee or similar fee for the convenience of cashing the check. Ifthis is the case, an appropriate message will be output to the userthrough the display of the ATM. The user may be requested to provide aninput to indicate their acceptance of the transaction fee. If the userindicates that they do not wish to accept the fee or the user does notprovide an input within a predetermined time period, the terminalprocessor may operate to close the transaction and return the machine toa ready state to conduct a transaction for another user. For purposes ofthis example it will be presumed that the user has indicated that theywish to proceed with the transaction.

In response to these inputs the terminal processor operates inaccordance with its programming to open the gate 52 adjacent the openingto the transport section 46 of the IDM 44. The terminal processor alsooperates as indicated a sixth step to move the depository holding module90 to a position in which an appropriate check holding compartment is incommunication with the outlet 50 of the transport section.

The terminal processor next operates to cause the running of the movingmembers in the transport section to receive the document therein. Asrepresented in FIG. 26 entry sensors 156 operate to sense an item, whichin this case is check 158 entering the transport section. The sensing ofthe entered item by sensors 156 may be operative as previously discussedto cause the inlet transport section 58 to first run in a mannerproviding limited slip. Thereafter when the item has cleared the entrysensors 156 or otherwise moved further or substantially into thetransport, the moving members more firmly engage the deposited item. Ascan be appreciated during the time of limited slip, the item may moveangularly relative to the direction of movement longitudinally along thetransport path as the result of the user holding the item or due to theguiding action of the walls bounding the opening or other guide devicestructure.

As represented in FIG. 26 the example embodiment includes at least onethroat sensor 160 adjacent to the analysis module 62. The terminalprocessor is operative in a ninth step to measure the document length.This is done for example based on the transport speed and the time thatthe document takes to pass the throat sensor 160. Because in the exampleembodiment it can be assumed that generally no slippage of the documentoccurs after it has firmly engaged the transport, the time that thedocument blocks the throat sensor generally provides a relativelyaccurate indication of document length. Of course in other embodimentsequivalent mechanisms such as encoders on driving members or otherdevices may be used. The document length is calculated in the exampleembodiment by the terminal control software. It should be understoodhowever that this technique is example and in other embodiments of theinvention other approaches may be used.

As schematically represented in FIG. 21, during the step of measuringthe document, the document is moved past the analysis module 62 to aposition intermediate of the analysis module and the deposit holdingmodule. This position of document 158 is represented in FIG. 22. Thedocument at this point is in a “ready to scan” position. The terminalprocessor next operates in accordance with the eleventh step in FIG. 30to move the document in the direction of the arrow shown in FIG. 22. Thedocument is then moved past the optical and magnetic sensors in theanalysis module 62 as represented in FIG. 23. As the document moves pastthe analysis module, the terminal control software and recognitionsubsystem software gather the image and profile data that is used toanalyze and/or produce an electronic image of the document. As the check158 passes the magnet 136 the magnetic ink thereon is magnetized. Thismagnetized ink is then sensed by the magnetic sensors 134 which providea profile of the area in which magnetic ink is present. This isrepresented in greater detail in FIGS. 27 and 28. For example in theexample embodiment as shown in FIG. 27, check 158 includes a line 162 ofMICR coding. This line of MICR coding (alternatively referred to hereinas the MICR line) causes signals to be produced by the magnetic sensingelements 134 as the characters pass such sensors. As represented in FIG.27 document 158 may be skewed relative to the transport section throughwhich it passes. However regardless of whether the document is straightor skewed it will produce a magnetic profile.

A magnetic profile associated with the document may be indicative thatthe document is genuine. This is because photocopies or other simulatedchecks generally would not include magnetic coding. Thus the sensing ofany magnetic coding on the document by the analysis module suggests thatthe document that has been inserted is a genuine printed check. Howeveras later discussed alternative embodiments may include approaches forreducing the risk that the check is a forgery that has been producedusing magnetic inks.

FIG. 28 indicates specifically the magnetic profile sensed as thedocument passes the magnetic sensors. This magnetic profile indicated164 includes data which indicates the magnetic areas on the check. Thismagnetic profile is correlated in the example embodiment by therecognition subsystem with the optical profile to further verify thatthe check is genuine. Of course this technique is example and in otherembodiments other approaches may be used.

As also represented in FIG. 23 movement of the document past thescanning sensors 132 causes image data to be produced which isindicative of the optical characteristics of the document passing in thetransport section. This image data corresponds to an electronic image ofthe check that is captured through operation of the scanner card andincluded in the data store associated with the ATM. The scanning processis continued as the check 158 moves past the analysis module 162 asshown in FIG. 4.

As indicated by the twelfth step in the logic flow in FIG. 30 theterminal processor next operates to apply the rules which are associatedwith the programs stored in memory concerning the particular type ofdocument associated with the transaction. Generally at least one inputby the customer indicating that they are making a check deposit may becorrelated with certain stored data or rules which indicate theparticular characteristics of the document that is to be received. Insome cases the inputs may correspond to a particular sized document.Alternatively the rules may correspond to particular configurations orother characteristics. In this example the rules stored in memory arealso indicative of “windows” or particular zones or areas in thedocument landscape in which data which should be analyzed on thedocument may be found.

In accordance with the example embodiment which operates to analyzecheck 158, the terminal processor operates in accordance with theapplicable rules recovered from memory as associated with a checkdeposit to deskew the data corresponding to the image and place it inregistration with an imposed coordinate system. This is done in theexample embodiment through use of a programmed series of steps whichfinds the boundaries of the image data. This is done by comparing thepixels which make up the image and generating at least two of the lineswhich bound the document. By identifying these lines, one or morecorners of the document may be identified. This process is representedin FIG. 34 by the skewed profile of check 158 which is shown in solidlines.

In the example embodiment, after finding the two leading corners of thedocument 166 and 168 and the most closely adjacent trailing corner to a“x” coordinate 170, the terminal processor operates in accordance withits programming to adjust the data corresponding to the image. Theexample terminal processor first operates to adjust the image byrotating the image data about corner 168. This causes the image to be“squared up” relative to the imposed coordinate system as represented bya phantom image 172. The computer next operates to shift the squared upimage data to a reference point of the coordinate system. This shiftingplaces the leading corner 168 at the origin of the imposed x and ycoordinate system. The leading corner 166 is placed along the “y” axiswhile the trailing corner 170 is placed along the x axis. It should beunderstood that all of the pixels which make up the image data arecorrespondingly adjusted through this process to produce the shiftedimage 174 which is shown in phantom in FIG. 34.

As represented by the fourteenth step shown in FIG. 31 the terminalprocessor next operates in accordance with its programming to applytemplate logic to the shifted image 174. The computer operates torecover from memory, data corresponding to at least one selectedtemplate. In example embodiments a plurality of templates may be storedin memory and the selected one is recovered responsive to customerinputs to the machine, indicia read from the document or other data. Inthis step the computer operates to apply a template over the shiftedimage to identify for analysis “windows” within the image that containdata that is of interest. This is represented schematically in FIG. 35.In FIG. 35 a template is schematically indicated 176. Template 176includes a first window 178 which generally corresponds to a zone or anarea in which a MICR line on a check may be located. Template 176further includes a second window 180. Window 180 corresponds to a zoneor an area of the landscape on the check where a courtesy amount whichrepresents the value of the deposited check may be located. It should beunderstood that these windows are example and in other embodiments otheror additional windows may be included. Such windows may include, forexample, a window for the so called legal amount which is the written ortyped amount of the check. A window may also be provided for an “amountnot to exceed” indicator, date, payee name, payor name or otherinformation that appears on the check. It should further be understoodthat these processes for identifying windowed zones or areas withinshifted data are carried out through operation of the at least oneprocessor and the computer executable instructions included in therecognition subsystem software, and that these graphic representationsshown in the Figures merely serve to explain the nature of an exampleform of the analysis that is carried out.

As represented in a fifteenth step shown in FIG. 41 the computeroperates to analyze the data in the window of the template whichcorresponds to the potential location of the MICR line. This isaccomplished by the image control component 144 of the softwareanalyzing data from the data store. It should be understood that thedata within the particular window may or may not correspond to the MICRline depending on the orientation of the document as well as whether thedocument itself is valid.

The computer then operates in accordance with a sixteenth steprepresented in FIG. 31 to pass the data extracted from the window 178.This character recognition software component is operative to apply thelogic used for optically reading MICR symbols. In the example embodimentthis is a logic associated with reading e-13B type characters. Thecharacter recognition software component 146 is operative to analyze thedata and make evaluations in looking for known characters of theparticular type. In the example embodiment the characters representedwhich are resolved are processed to derive ASCII values corresponding tothe characters.

In a next step as represented in FIG. 31, recognition subsystem 142 isoperative to check the returned data for the presence of particularcharacters, in this case routing and transfer characters. Generallyvalid MICR line data will include such characters and the detectedpresence thereof in the data analysis is an indicator that the MICR linedata has been properly found and read.

At a nineteenth step shown in FIG. 31 the recognition subsystem software142 operates to determine if the degree of assurance or confidence asindicated by the character recognition component for the valuesreturned, is above a threshold. The determination of the level ofassurance is based on one or more values delivered by the patternrecognition algorithms in the character recognition software componentused in the example embodiment. In the example embodiment the thresholdis generally set at about a 70 percent assurance level. As indicated inFIG. 31 the computer operates in response to its programming to proceedbased on whether the level of assurance is at or above, or below thethreshold. Of course this approach is example and in other embodimentsother approaches may be used.

As indicated in FIG. 31 if the level of assurance in the determined MICRvalues is indicated as below the threshold and/or if routing andtransfer characters are not found, the recognition subsystem throughoperation of the image control software component, operates to furthermanipulate the image. In the example transaction the computer operatesto manipulate the data to essentially transpose and flip the image 180degrees and to again read the data in the MICR line window. It should beunderstood that in other embodiments the data corresponding to the imagemay be manipulated in other ways in order to attempt to translate theimage so as to find appropriate data.

As indicated in the twenty-first step in FIG. 31 the translated imagedata now in the window 178 is again read and passed to the characterrecognition software component 146. This again causes the output ofASCII values based on the characters in the window. As indicated in thetwenty-fourth step these values are then checked for the presence ofrouting and transfer values. As indicated in step twenty-five in FIG.31, if the MICR values read have an associated level of assurance at orabove the threshold and routing and transfer characters are present therecognition subsystem is operative to proceed with further analysis ofthe image. However if the level of assurance remains below the thresholdand/or there are no routing or transfer characters, this may be anindication that the document is not valid. In some embodiments the ATMmay operate to further transpose the data and conduct additionalanalysis. This may be particularly appropriate in situations where bothsides of the document are being scanned and the document may be indifferent orientations. In this case the terminal processor causes theATM to operate to return the document to the customer and to close thetransaction.

As represented in the logic flow which continues in FIG. 32, if thecharacters in the MICR window are read with a level of assurance that isat or above the threshold and the routing and transfer characters arepresent, the terminal processor next operates to cause the courtesyamount data in the window 180 to be read. In the example embodiment therecognition subsystem operates in response to landmark rules associatedin memory with the document type to assist the analysis in finding thecourtesy amount within the window. These techniques may include forexample in the reading of a check, looking for the box or line on whichthe courtesy amount is written. In this case the value is a monetaryamount. The amount may be printed or cursive characters. It may alsolook for known characters such as the dollar sign, the fraction sign,decimal point or star characters which are commonly included in printedchecks to indicate places before the dollar amount. Of course it shouldbe understood that the particular templates and landmark rules used willdepend on the programming of the machine and the type of documentinvolved. The machine may have access to stored data corresponding to aplurality of templates and/or rules, and may apply them to documentsbased on data derived from customer inputs, the document, memory data orcombinations thereof.

As represented in a twenty-eighth step in FIG. 32 the terminal processorfurther operates responsive to the recognition subsystem to binarize thedata in the courtesy amount window which essentially can be thought ofas reducing the sensed data to black and white. This further assists inidentifying the characters. The character recognition component 146 thenapplies its logic in looking for U.S. dollar type numerical characterswithin the data, and as represented in a twenty-ninth step in FIG. 32,the recognition subsystem outputs and ASCII values indicative of thecourtesy amount. In some embodiments the level of assurance associatedwith the courtesy amount is also analyzed to determine if it is above athreshold to verify that the amount has been accurately read.Alternatively, or in addition, the derived courtesy amount may becompared to the data input by the customer concerning the amount of thecheck. In alternative embodiments the character recognition subsystemmay operate to read the characters in the legal amount field and comparethe legal amount to the courtesy amount. Alternatively or in addition,in some embodiments the MICR line may include indicia representative ofthe amount of the check or an amount which the check is not permitted toexceed. In such cases the encoded MICR data or the values to which itcorresponds may be compared to the courtesy and/or legal amounts.Further in some embodiments the check may include a field that indicatesa value which a check is not to exceed. This value may be read andcompared through operation of one or more computers to the amount datafound in the courtesy amount, legal amount, or MICR line. Suchcomparisons may enable the machine to identify situations where theamount data is not consistent, which is indicative of an inability toproperly read that check, and/or an unauthorized modification of thecheck data. If there is a discrepancy and/or the level of assurance isbelow the threshold the check may be returned and the transactionclosed.

The example recognition subsystem further operates in accordance withthe thirtieth step represented in FIG. 32 to check for the presence ofmagnetic ink on the document in the proper location. This is done in theexample embodiments by component 145 determining the length andconfiguration of the magnetic profile associated with the document. Thislength and orientation data may be normalized in the manner of the imagedata based on the imposed coordinate system, and compared therewith toverify that the magnetic areas correspond to the optical datacorresponding characters in the MICR line. In addition certain documentsmay also include magnetic characters in other areas of the document.These other characters which may not necessarily be included within theoptically analyzed data, may be further checked to provide an indicationof the genuineness of the document. Of course in alternative embodimentsas previously discussed, the mere presence of magnetic ink on thedocument may serve as a sufficient indication that the document isgenuine.

In some alternative embodiments at least one computer in the automatedbanking machine may be operative to further verify the genuineness of acheck presented to the machine by looking for evidence of magneticindicia within the image data corresponding to the check in appropriateplaces or locations which suggest that the check may have been producedfraudulently. In such embodiments the computer may be operative to lookfor evidence of magnetic ink within preprinted fields of one or moretemplates which would normally not include magnetic indicia. Thepresence of magnetic indicia in one or more of these fields may beindicative that the check may have been printed by a forger with aprinter that prints in magnetic ink. This may be indicated, for example,by the data in a maker field, date field, maker signature line or otherareas being presented in magnetic ink when no magnetic ink wouldnormally be found in such areas. In some embodiments, for example, therecognition subsystem or other computer in connection with the machinemay be operative to first locate the MICR line within the image data inthe manner previously discussed. Thereafter, the system may operate todisregard the magnetic indicia in the MICR line and analyze othermagnetic indicia and/or its location relative to the image data. Basedon programmed parameters such as, for example, finding magnetic indiciain other printing on the check may cause the machine to identify thecheck as a potential forgery. In such circumstances the check will notbe cashed by the machine. The check may be returned to the user oralternatively retained in the machine as a precaution to prevent thecheck being passed in another location. Of course these approaches areexample and in other embodiments other approaches may be used.

As indicated in the thirtieth step of the example embodiment representedin FIG. 32, if the magnetic data sensed does not properly correspond tothe document the terminal processor operates to identify the document assuspect. The example terminal processor then operates to return thedocument to the customer and to close the transaction. However, if thedocument has an appropriate magnetic profile the terminal processor nextmoves to a thirty-first step.

In the thirty-first step the terminal processor operates to configureand send an authorization message through the network to the host. Thisauthorization message will generally include the data appropriatelynecessary in an ATM transaction message for purposes of authorizing thetransaction. Such data may include customer identifying data such as PANand PIN related data, the transaction type and the amount input. Inaddition the transaction data may include data derived from thedocument, such as data representative of the data corresponding to thecharacters in the MICR line as well as the courtesy amount read from thecheck as determined by the recognition subsystem.

It should be appreciated that providing the data read from the check innumerical or other compatible format as part of an authorization messageis useful for facilitating processing of the data in some systemscompared to transmitting an entire image of a check to a host computerfor analysis and authorization. In example embodiments the check datamay be included in a field in a Diebold 91x type transaction message orin a selected field in an ISO 8583 message. A host computer may readilydetermine the data included in such messages and analyze it for purposesof deciding whether or not to authorize the transaction.

In this example transaction when the host receives the request messagefrom the ATM, it operates to determine if the customer data correspondsto an authorized user as well as whether the user is authorized toconduct the transaction requested. The operator of the host computer mayalso be enabled to apply certain rules, including preventing particularusers from cashing checks or limiting the amount of the deposited checkwhich can be cashed. Various types of rules may be selectively applieddepending on the particular user and the amount of the check. Inaddition the host computer may also analyze the account data on thecheck. This may include for example communicating with other systems ordata stores to determine if the account upon which the check is drawn isvalid and/or holds sufficient funds as represented by the courtesyamount on the check. The computer may also compare certain data such asthe courtesy amount read, to data input by the customer concerning thevalue of the check. The computer may also compare data corresponding tothe legal amount read from the check to the courtesy or amount or othermonetary amount data based on the MICR line or a maximum amount printedon the check. The computer may also analyze aspects of the data such asthe institution or the location thereof, upon which the check is drawnfor purposes of applying its programmed business rules and logic and indeciding whether to allow the user to deposit or cash the check. Ofcourse in some embodiments business rules may be applied by the one ormore computers operating in the ATM as well as through the operation ofone or more remote host computers.

In accordance with its rules and logic the host in the exampleembodiment returns a response message to the ATM. This is represented bya step 32. For purposes of this example it will be presumed that theuser is authorized to deposit or cash the check. Of course if the checkis not authorized to be deposited or cashed the response messageincludes data indicative thereof. The ATM will operate under control ofthe terminal processor in response to data indicative that thetransaction is not authorized to return the check to the user and toclose the transaction. Alternatively, if the check appears to befraudulent, the ATM may capture and store the check.

As indicated by the thirty-third step in the example embodiment the ATMoperates in accordance with its programming to display a graphic imageof the check deposited on its display 22. The terminal processor alsooperates in a thirty-fourth step in the sequence to store a copy of theimage file in a data store at the ATM. In some embodiments this imagefile may be later recovered for purposes of tracking and documentation.Such image files may be compressed for purposes of saving storage space.In one example embodiment the graphic image of the check is stored inmemory as a PCX file. Of course other file formats may be used. In otherembodiments the image file may also be accessed from or downloaded toremote computers connected to the system. As previously discussed, suchremote computers may be operative to process the check and to carry outsettlement related thereto, using the electronic image document as asubstitute for the paper check.

The computer next operates in accordance with a thirty-fifth step toprint a receipt for the customer. In the example embodiment because agraphic image of the check is available within the ATM, a graphicrepresentation of the check may be included on the receipt provided tothe customer. In addition the terminal may operate to print a similargraphic image on a journal printer or in other hard storage within themachine. Alternatively or in addition, in machines including a camera orother image capture device, an image of the user may be stored and/orprinted in correlated relation with the check data, including on thereceipt, on the check and/or on a journal.

After printing the receipt the ATM next operates under control of theterminal processor to cancel and store the check. This is representedgraphically in FIG. 24. As indicated by the thirty-sixth step in thesequence, the computer causes the transport section to again move check158 in the direction of the arrow. The check is moved towards thedeposit holding module. In addition the terminal processor operates toalign the appropriate document compartment so that its opening is incommunication with the outlet of the transport section.

As indicated in a thirty-seventh step the check 158 is moved until it issensed adjacent to the printer mechanism 114. Upon sensing the checkadjacent to the printer the terminal processor operates to printcancellation data on the check. This cancellation data is printed on thecheck as it moves in the transport. This may include for exampleinformation about the user and/or the transaction, including images. Asindicated in a thirty-ninth step in the sequence, the transportcontinues to move the check until it is sensed as having passed into thestorage compartment. Such activity may be sensed through sensors similarto those previously discussed positioned adjacent to the outlet 50 ofthe transport. This is schematically represented by sensors 182 shown inFIG. 26.

After moving the check into the document storage compartment theterminal processor operates the translation mechanism 94 associated withthe deposit holding module to tamp the documents in storage. This isaccomplished as indicated by the fortieth step by moving the tampingmember 96 downward. This serves to assure that the documents in storageare compacted to the extent possible and assures that a larger number ofdocuments may be accepted before the need for removal of documents fromthe storage compartment.

In some embodiments, the terminal may operate in accordance with itsprogrammed instructions to provide the user with an output asking ifthey have further checks to deposit. The user may respond with at leastone input, and if so a portion of the transaction sequence can berepeated beginning with step 2 in the transaction sequence for example,to accept another check or other document. In such situations the valueof the further check or other document may be added to the value of theprior items. In some embodiments items which are deposited may havedifferent properties. For example, in some embodiments the machine mayaccept items that do not include magnetic coding. Such items may includeother features such as verification codes, symbols or characters thatare a function of other values or indicia on the items. Such items mayinclude for example vouchers issued by the machine for a differencebetween an amount the user was entitled to receive and the value of cashdispensed that could not be dispensed in prior transactions. The machinein such embodiments is operative responsive to its programming to adjustthe verification sequence to suit the particular document type beingreceived. The particular document type being received may be based onthe at least one input to the machine in the second step, indicia readfrom the document type, and/or other inputs or data.

In embodiments where a plurality of types of documents are accepted, themachine may operate in accordance with its programming to conduct ananalysis of the indicia on the document that is appropriate to verifythe particular document type. The document storage module may alsoinclude compartments for each type of item that is to be accepted. Inthis way different item types may be segregated to facilitate removaland sorting.

In some embodiments the receipt of successive documents from one usermay continue for a plurality of checks, vouchers or other type items. Ifthe items are verifiable as genuine by the machine and redeemable forcash or credit, the machine may operate to aggregate the value of allsuch items. The transaction sequence may continue to repeat based oninstructions and inputs to the machine in the transaction sequence. Itshould be understood that for purposes of the example transactionsequence there has been only one item deposited, and only one exampletype analysis of a document which is a check has been described.

As indicated in the forty-first step if the customer has requested adeposit only transaction during the transaction selection step, theterminal processor causes the machine to go to the forty-fifth step inthe transaction sequence. However if the customer has requested todispense cash based on the value of a cashed check, the logic moves tothe forty-second step. If the dispense transaction has been authorized,the terminal processor operates the cash dispenser to dispense an amountof cash. In some embodiments the amount of cash which may be dispensedmay correspond exactly to the amount of the check (less transaction feesin some cases) that has been presented by the customer. This may be donefor example in an ATM which includes a cash dispenser with coindispensing capability. However in many embodiments the ATM may becapable of dispensing only certain denominations of currency. This maypreclude the customer from receiving the exact amount of change to whichthey are entitled.

In circumstances where the customer cannot receive exact change thecomputer may operate to cause a voucher to be printed for the customer.The voucher may include for example a printed coupon or other item thatcan be redeemed for the amount of the change. This may include forexample a coupon redeemable with a merchant for cash and/or services ormerchandise. The user may be prompted through operation of the computerto provide at least one input which serves to select from severalpossible merchants from whom available vouchers are redeemable and inresponse to the user making a selection of a merchant the voucher isprinted with the corresponding merchant name and amount. The system maythen operate to provide a credit to the account of the merchant for theamount of the voucher. Such a voucher may include an image of the userfor purposes of verification that the person presenting the item is theauthorized person.

Alternatively the computer may operate to print and provide a check orother type negotiable instrument to the user. This negotiable instrumentmay be cashed like a check at the machine or at another location by theuser. Such an instrument may be input by the customer to the machine ina subsequent transaction. For example the machine may operate in thesubsequent transaction as previously discussed to accept several checksincluding the negotiable instrument previously dispensed. The user mayelect to cash the amount of these checks or have them credited to anaccount.

The machine may include among its transaction function devices check orvoucher printer devices. These printer devices may be supplied with astock of check media with magnetic coding that may be similar to othertypes of checks. The coding may correspond to the account of theoperator of the machine or other entity whose account is to be chargedfor the amount of change received by a machine user. In such embodimentsthe check is completed by a printing device with the amount of changefor which the check may be redeemed. The check may be printed by themachine with the user's name as payee based on the transaction datareceived, or alternatively made out to cash. Images of the user may beprinted on the check for authorization purposes as previously discussed.

The check once completed with the appropriate data and/or images may bedispensed from the machine to the user. The user may cash the check atthe machine on the current session or in a subsequent transactionsession, or at another location that accepts checks. In some embodimentsthe check stock provided in the machine may prominently display astatement of maximum value above which a check would not be valid. Thismay be for example, the smallest denomination currency bill dispensed bythe machine. For example if the lowest denomination bill that themachine dispenses is a one dollar bill, the value of change would alwaysbe generally less than one dollar, and the statement of maximum value ofone dollar which would conspicuously indicate to anyone redeeming thecheck that if it is above this amount it has been tampered with. Ofcourse the maximum amount may vary depending on the machine and itscapabilities. Also having such limited value checks in the machinereduces the risk to the machine operator in the event the machine isbroken into and the check stock is otherwise stolen. Alternatively themaximum value statement on the check may in some embodiments be printedby the machine itself.

Checks issued by the machine on check stock may include MICR coding.Such checks may be verified by the machine in the same manner as otherchecks. Alternatively the machine may include a transaction functiondevice which provides vouchers, scrip or coupon material that isredeemable for cash, credit, services and/or merchandise. In someembodiments such items, which will be referred to as a voucher forpurposes of brevity, may have unique indicia or characteristics that areindicative of authenticity. Such indicia or characteristics may includeindicia readable by the machine. Such indicia may include a uniquemagnetic or visual characters and/or profile which is indicative thatthe voucher is genuine. Of course, such vouchers may in otherembodiments include visible or non-visible indicia including images ofthe user, which are capable of being read and used to verify theauthenticity of the voucher. As previously discussed, when such an itemis presented to the machine to be redeemed, the machine adjusts theverification steps in accordance with its programming as appropriate forthe particular type of document. This may be based on user inputs,information read from the document, or other data.

In alternative embodiments the machine need not use any special media orpaper to provide a voucher redeemable for cash (or credit and/ormerchandise). In such embodiments a printing device in the machine mayprint the voucher on non-unique media. This printer used for printingthe voucher may be a printer used for printing documents that are notredeemable for cash, such as the receipt printer. This may beaccomplished by printing on the voucher one or more numerical codesand/or characters or symbols that are usable to verify the genuinenessof the document. These may include for example numerical codes which area function of at least one value associated with the transaction. Forexample the voucher may include verification indicia which is determinedthrough use of an encryption function based on a transaction number,user ID, amount, machine ID, transaction time, other values, images, orcombinations thereof.

The voucher including the verification indicia may be presented at themachine (and in some embodiments at other machines or establishments) tobe redeemed. In the case of presentation of the item at the machine, theverification indicia may be read with other values from the voucher.Because in this example no magnetic coding is used, the programming ofthe machine would cause the machine to not reject the voucher for lackof magnetic coding. The machine would operate in accordance with itsprogramming to determine the validity of the verification indicia. Thiswould be done using the particular appropriate algorithms and data. Thismay include for example recovering data from one or more data stores.Such a data store may include for example, data concerning whether avoucher corresponding to the one presented has been previously redeemed.For example the machine may operate to store in one or more data storeswhen the voucher is issued, data indicative that the voucher has beenissued. Such data may include data about the amount, the user, theverification indicia or other data. Then when the voucher is redeemed,either at a machine (the same machine that issued the voucher or anothermachine) or at another location such as a merchant location, furtherdata is stored to indicate the voucher has been redeemed. Suchprocedures may help assure that reproductions of vouchers are notredeemed for cash. If the voucher is verified as genuine it is acceptedfor cash value in the manner previously discussed. Of course theseapproaches are merely example and other approaches may be used.

Alternative embodiments may also provide other ways for the user to takeor receive the benefit of an undispensed amount. This may include forexample the user returning the change to an account with an institution.Alternatively the user may choose to apply the change to the amount ofan existing credit card balance or loan that is held by the institution.In addition or in the alternative, the user may apply the undispensedamount to a particular charitable organization. The operator of themachine may track such donations over the year and send the user astatement for tax purposes. In addition the information may be used bythe charities to provide such tax documents directly, and/or to solicitfurther donations from the particular user. This is accomplished in anexample embodiment by the machine providing the user with one or moreoptions through output devices, and the user providing one or moreinputs through input devices to select one or more of the options forapplication of the difference. Numerous options may be provided by theuser in response to the programming associated with the terminalprocessor and other connected computers.

Alternatively in some embodiments one or more computers operating inconnection with the machine may provide the user cashing the check withthe closest amount that the ATM can dispense to the exact amount of thecheck. For example, if the ATM includes cash dispensers that dispensecoin and the cash dispenser for dispensing pennies is not availablebecause it is broken or is depleted, the machine may dispense an amountto the nearest next highest available currency denomination, which maybe a nickel. Likewise if the cash dispenser for dispensing nickels isnot available or depleted, (and the penny dispenser is not available)the machine may dispense to the nearest dime. These rules of roundingupwards may be applied in accordance with the programming associatedwith the machine to dispense the closest amount that the machine iscapable of dispensing above the amount of the check presented. Of coursein example embodiments the excess above the amount of the check that themachine will dispense is limited in accordance with the programming ofone or more computers within the machine. Thus, for example, theprogramming of the computer may establish the maximum additional amountthat the user may receive above the amount of the check as $2.99. Thusif the machine cannot dispense an amount that is within $2.99 above theamount of the check, the machine will indicate that it is unable toprocess the transaction and return the check to the user. Of course thisapproach is example and in other embodiments other approaches may beused.

It should be understood that in some example embodiments one or morecomputers in operative connection with the one or more cash dispensersin the ATM is programmed to control the dispense of currencydenominations in response to check cashing transactions. Such controlmay be operative to reduce the risk that the machine will run out ofcurrency. Thus, for example, the computer may be operative to cause theATM to dispense one denomination of currency as opposed to another inorder to enable the machine to continue running longer and/or tomaintain the capability of the ATM to fulfill check cashing transactionswithin the parameters which have been established by the system. Ofcourse these approaches are example and in other embodiments otherapproaches may be used.

As indicated at the forty-fourth step in the sequence the terminalprocessor operates to cause a receipt to be printed for the userindicating the amount of the cash dispensed. This receipt may alsoinclude other information including the amount of change that the userreceived and an indication of how the value associated with this changewas either applied or provided to the user. Of course as previouslydiscussed, in this printing step the terminal processor may also operateto print vouchers, coupons, negotiable instruments or other items thatthe user has requested to receive.

As indicated at the forty-fifth step the terminal processor nextoperates in accordance with its programming to prompt the user onwhether they wish to conduct another transaction. For purposes of thisexample it will be assumed that the user declines another transaction.The terminal processor next operates the machine to close thetransaction. This may include for example returning the card to thecustomer, outputting “thank you” messages or other appropriate stepsassociated with completing the transaction and/or readying the machinefor a next customer.

In the forty-seventh step the terminal processor operates to send acompletion message to the host. As previously discussed the completionmessage generally includes data indicative of whether the transactionwas successfully carried out. In addition in some embodiments, thecompletion message may also include data representative of any changethat was due to customer and how the customer chose to apply or receivethe amount of change. The confirmation data included in the returnmessage may also include data representative of the issuance of an itemand/or the identity of the merchant or other entity to whom a credit isrequired to be issued in consideration of vouchers or coupons that weredispensed to the customer. The completion data may also include atransaction number or data that can be used to identify or authenticatea check or voucher issued to a user. Likewise the message may includedata representative of loans, accounts or charities to whom the customermay have elected to apply their change balance. Other appropriate dataindicative of the completion of the transaction may be included. Thehost computer operates in response to this message to appropriatelyclose the transaction and to apply the funds accordingly and to storedata in one or more data stores in operative connection with the host.

As can be appreciated from the foregoing description, the example formof the deposit accepting apparatus and system and its methods ofoperation, may provide substantial advantages over prior art systems andmethods. The example system reduces the need to manipulate documents.This results in increased reliability by reducing the risk of documentjams or other malfunctions. The example embodiment further reduces theneed to achieve alignment of the document for purposes of reading oranalyzing the data thereon. Generally as long as the particular documentis presented in an appropriate transport direction the data may beanalyzed and manipulated so as to achieve authorization of the document.It should be understood that while the example embodiment shown analyzesindicia on only one side of a document, other embodiments may analyzeindicia on both sides of documents. This may be accomplished for exampleby having analysis modules on both sides of the document path. Sucharrangements in some embodiments may enable documents to be reliablyread and analyzed regardless of orientation.

It should be understood that while the example embodiment has beendescribed as reading checks and vouchers, other embodiments may be usedfor reading other document types. Such other document types may includefor example statements of charges such as deposit slips, utility bills,credit card bills and other statements of charges. Embodiments mayfurther be adapted to read other or additional types of coding such asone or two-dimensional bar codes, other character sets, alphabets ofvarious languages or other characters. Embodiments of the invention mayaccept only one type of item, or a plurality of types of items. Further,while the example embodiment accepts envelopes, other embodiments maynot accept such items, or may accept other types of items.

It should be understood that the architecture of the computers andsoftware described is example. Other embodiments may use differentcomputer and/or software architectures to accomplish the functions andmethods described. Further the one or more computers operating in anautomated banking machine may be programmed by reading through operationof one or more appropriate reading devices, machine readable articleswhich comprise media with computer executable instructions that areoperative to cause the one or more computers (alternatively referred toherein as processors) in the machine to carry out one or more of thefunctions and method steps described. Such machine readable media mayinclude for example one or more CDs, DVDs, magnetic discs, tapes, harddisk drives, PROMS, memory cards or other suitable types of media.

Some example embodiments further facilitate transaction processing bybeing able to verify and analyze document images within the ATM. Thismay avoid the need to transmit entire document images to a remotelocation for purposes of analysis. Further an example embodiment enablesthe application of processing rules which facilitates analyzing requireddata and moving forward with transactions only when such data is readwith a sufficient level of assurance that the data has been readaccurately.

A further advantage of the described example embodiment is the abilityof a single mechanism to reliably handle both sheet type materials andenvelopes. This avoids the need to include multiple depositories withina machine. In addition the embodiment also produces data representativeof graphic images of items that have been placed into the depository.Images may be analyzed at the machine or forwarded to another device forverification purposes. Embodiments may be used to conduct payor and/orpayee signature analysis including analysis for the presence ofsignatures and/or for the genuineness of cursive signatures.

Another advantage of the example embodiment is that items placed in thedeposit accepting apparatus may be read through imaging or other methodsand then returned to the customer. These may include items such asdrivers' licenses, identification cards, passports or other articlesthat generally will not be retained within the machine. The exampledeposit accepting device also has the capability of receiving documents,reading and/or capturing images and printing on them for purposes ofauthentication or cancellation and then returning them to the customer.This may prove advantageous for example in the case of customer bills orpayments where the customer is provided with a marking on the particularbill to indicate that payment has been made. In addition the exampleembodiment may handle numerous different types of items and documents inthis manner. For example embodiments may be used in applications such asissuing items such as drivers' licenses, license plate stickers, gamingmaterials, and other items. Embodiments may be used for redeeming itemsand issuing new or replacement items. Further advantages will beapparent, and those having skill in the relevant art may apply theprinciples of the claimed invention to numerous embodiments.

FIG. 38 shows an alternative example embodiment of a system generallyindicated 200, in which check cashing is provided through automatedbanking machines. The system includes automated banking machines 202which may be automated teller machines of the type previously discussed.ATMs 202 are connected through a network 204, to a host computer whichis alternatively referred to as a transaction server generally indicated206. Network 204 may comprise any of a number of public or privatenetworks suitable for communicating between host computer 206 and theATMs. As schematically represented in FIG. 38, host computer 206 is inoperative connection with at least one data store 208 which includesvarious types of instructions and stored data. Host 206 is also inoperative connection with a host interface terminal 210. As can beappreciated, data stores are also referred to herein as computermemories.

In the example embodiment system 200 includes at least one administratorstation 212. Administrator station 212 in the example embodiment is acomputer or server in operative connection with the network 204.Administrator station 212 is used by the operator of the ATMs 202 forpurposes of configuring the system and monitoring transactions whichoccur at the ATMs 202.

Example system 200 further includes a check image server 214. As shownschematically, the check image server 214 is in operative connectionwith a data store 216. Check image server 214 is connected to ATMs 202through a network 218. Network 218 may be the same or different networkthan network 204. Other servers 220 and 222 are connected to the network218. In the example embodiment check image server 214 is operative toreceive data corresponding to electronic images of checks that arereceived at the ATMs 202. The check image server 214 may be used toarchive data corresponding to such images and to accomplish settlementamong the various entities which hold accounts which must be creditedand debited in the conduct of a check cashing transaction.

In the example embodiment of system 200, ATMs 202 are specificallyoperated for purposes of providing check cashing services. Such checkcashing services may be provided for persons holding accounts with theoperator of the system such as a financial institution. Alternatively insome embodiments ATMs 202 may be specifically operated to provide checkcashing services for persons who do not hold accounts with the operatorof the system but who have a need to cash checks drawn by makers whohave accounts or other relationships with the operator of the system.This may be, for example, a situation where a particular entity hascontracted with the operator of the system to honor checks for which theentity is a maker and which are deposited in a machine. Alternatively,other embodiments may be operative to cash checks for which theparticular maker of the check has an account relationship with theoperator of the system. As later discussed, in some example embodimentschecks may be cashed at the ATMs 202 by users who are associated withthe makers of checks and who are correlated with data corresponding tosuch makers in one or more data stores operatively connected to thesystem. Of course these approaches are example and in other embodimentsother approaches may be used.

In the example embodiment shown, the operator of the system is enabledto configure system parameters through inputs at the administratorstation 212. Screen output 214 shown in FIG. 39 is representative of thetypes of information that a system operator may access through theadministrator station 212. Of course it should be appreciated thatbefore the user of the administrator station is able to access theseoptions the user is required to input a password or to satisfy othersuitable security requirements of the particular system.

In the example embodiment, administrator personnel are enabled to accessvarious functions of the system by selecting various options on thelist. These options include reviewing terminal status information,reviewing check transactions, downloading file information from the host206, uploading customer authorization files, editing customerauthorization files, and changing user access passwords. Of course,these options are example and in other embodiments other options may beprovided.

In the example embodiment, by selecting terminal status information fromscreen output 224 the administrator personnel are presented at theadministrator terminal with output screens showing the status of theATMs connected in the system, as represented in screen output 226 shownin FIG. 40. Example screen output 226 includes a listing of terminalsconnected in the system, their type, location and status information. Inthe example embodiment administrator personnel are enabled to change thestatus of each terminal between open and closed by selecting the linksshown in screen 226. In addition in the example embodiment administratorpersonnel are enabled to check detailed status information for anyselected one of the terminals by selecting the status option associatedtherewith on screen 226.

Selection of the status option for a particular terminal from screen 226enables an administrative user in the example embodiment to reviewdetailed status information for the particular terminal as representedby the terminal status screen output 228 shown in FIG. 41. Screen output228 provides detailed status information with regard to the terminal andthe devices included therein. As can be seen in screen 228, in theexample embodiment the system provides an administrative user withinformation concerning the status of various currency dispensersincluded within the unit as well as amounts of currency remainingtherein. Screen output 228 also includes in the example embodimentstatus information concerning transactions conducted at the terminal.Further in the example embodiment screen output 228 enables the customerto link to more detailed information about transactions conducted at theterminal as well as to obtain information on other terminals connectedin the system.

Referring again to screen output 224 shown in FIG. 39, an administrativeuser is also enabled to select the option of reviewing the check cashingtransactions that have been conducted in the system. Making thisselection in the example embodiment causes the system to produce thescreen output 230 shown in FIG. 42 at the administrator terminal. Screenoutput 230 provides various options for the administrative user toobtain data concerning various transactions that have been conducted inthe system. For example, as represented in FIG. 42, an administrativeuser is enabled to conduct the various searches by date, terminal,customer or other information. By setting these parameters, anadministrative user is enabled to output various reports related tocheck cashing transactions that have been conducted in the system. Inthe example embodiment various drop-down menus and populatable fieldsare provided within the screen output so as to facilitate the input ofdata and the making of selections related to searching customertransactions.

Screen output 232 in FIG. 43 represents an example report that may beoutput through the administrator terminal in response to a searchrequest input in response to screen 230. It should be understood thatFIG. 43 is intended only to show the format of search results and thedata therein. It is not necessarily complete or representative of datawhich would be recalled in conducting an actual search. Further asrepresented by the arrows in FIG. 43, the columns of data are arrangedhorizontally in the example output and are scrolled to by a user bymoving left to right. As can be appreciated from FIG. 43, numerous typesof searches can be conducted related to check cashing transactions andthe data related thereto displayed to an administrative user at theadministrator terminal.

Referring again to screen output 224 in FIG. 39, an administrative useris also enabled to select the option of downloading transaction filesfrom the system. In response to selecting this option, theadministrative user is provided in an example embodiment with screenoutput 234 shown in FIG. 44. Screen output 234 enables an administrativeuser to select to receive various types of data from the system. Forexample in the example embodiment, by selecting the availabletransaction files the user is enabled to receive a report which detailsall transactions that have been conducted at ATMs connected to thesystem during the current day and a set number of preceding days. Inaddition the administrative user is enabled to select various daily andmonthly report files that are available in the system. FIG. 45 includesa list 236 of such reports that are available in the example system.Such reports readily enable the administrator of the example system totrack activity related to check cashing that has occurred. In addition,such reports enable a system operator to determine the value of checksthat have been cashed by a particular maker and to facilitate assessingcharges against the maker or their account for checks that have beencashed. In addition, as can be appreciated, such reports also enable theuser to determine activity which has occurred at various terminals inthe system and to help assure that such systems remain stocked withadequate amounts of cash and supplies to accommodate the transactionvolumes. Of course it should be understood that the reports in list 236are example and in other embodiments other types of reports andfunctions may be provided.

Returning to the options provided in screen output 224 shown in FIG. 39,another administrator option that is provided in the example embodimentis to upload maker authorization files to the system. In an exampleembodiment checks drawn on particular check issuers, also referred to asmakers, are cashed at ATMs connected to the system. Informationconcerning the particular maker accounts is included in maker recordsthat are stored in the data store 208 in operative connection with thesystem. FIG. 48 schematically represents the data which is stored in anexample account record. As can be appreciated, in the example accountrecord is stored information on the maker's institution which holds themaker's account. This is indicated as the BIN number. In addition, foreach check maker a particular account type and account number arespecified in the record. In the example embodiment the account type ischaracterized as “other” and the maker's account is specificallydirected to cashing checks drawn on the maker's account. Also includedin the maker account record is account status information. This accountstatus information is enabled to be changed by the administrative userbetween open and closed. In the open account status, checks are enabledto be cashed that are drawn on the maker's account. The example makerrecord also includes a text description of the maker account.

In the example embodiment of the maker record, provision is made forspecifying a minimum time period between transactions. This delay periodis intended to prevent individuals cashing checks at the machine fromcashing checks more frequently than the specified delay period. Thishelps to reduce the risk that particular individuals will not presentchecks on a more frequent basis than is reasonable under thecircumstances and helps to reduce the risk of fraud.

A further aspect of the example maker record shown in FIG. 48 is thespecification of a maximum check amount. This data indicates the highestvalue of check issued by a particular maker that will be cashed at themachine. In addition, in the example embodiment the maker recordscreated at the administrator work station include a command which isutilized by the host computer 206 to determine how the maker record thatis delivered to it from the administrator station is to be treated. Forexample, those commands may include a change, deletion or the additionof a new file. It should be appreciated that the particular structure ofthe maker records are example and in other embodiments other ordifferent types of data may be included.

In the example embodiment, maker records are populated at theadministrator terminal and uploaded to the host. This is done in theexample embodiment by selecting the upload maker authorization fileoptions from the output screen 224. Selecting this option causes theadministrator station to produce the screen output 238 shown in FIG. 46.From this screen the administrative user is enabled to input the name ofthe file related to the accounts that the system is to upload to thehost. In the example embodiment, after inputting the account name theuser selects the verify authorization file option from screen output238, which causes the administrator station to output the authorizationfile conversion screen output 240 shown in FIG. 47. Screen output 240shows the content of the file to be uploaded. In this example situation,the file includes nine maker accounts that are to be applied to thehost. To forward this file to the host, the administrative user selectsthe apply authorization button shown in screen output 240. In theexample embodiment when the selected file has applied to the host and isstored in the database, the administrative station is operative toproduce the screen output 242 shown in FIG. 49. This screen output isoperative to indicate to the administrative user that the maker filesuploaded have been applied to the data store in operative connectionwith the host server.

A further option of the example embodiment for the administrative userfrom screen output 224 is to edit customer authorization files.Selecting this option in the example embodiment causes theadministrative terminal to produce the screen output 244 shown in FIG.50. Screen output 244 provides the administrative user with options forreviewing, editing, adding and deleting customers from the system. In anexample embodiment an administrative user is enabled to input a cardnumber associated with a check cashing user to recover record dataand/or to populate record data associated with the card number and theparticular user. For example, inputting a particular card number andselecting the get customer information button causes the administratorstation to output data in a customer authorization record represented byscreen output 246 in FIG. 51. The data in the customer authorizationrecord is enabled to be populated by the administrative user to indicateinformation related to the user. Further, the record information inscreen output 246 enables correlating in the database informationconcerning the user and specifically the user card number with aparticular maker account. Such correlation in the example embodimentcauses the authorization record information to be populated withinformation related to the particular maker, such as the delay periodwhich is referred to as “lock out days” as well as the maximum permittedcheck amount. Of course it should be understood that in some embodimentsmaximum amounts permitted to be cashed for particular users may behigher or lower than the maximum amount permitted to be cashed for aparticular maker. This will depend on the programming of the particularsystem and the logic employed. As can be appreciated, it may bedesirable for some users to set the maximum check amount lower than forothers, based on pay scales or other parameters.

In the example embodiment, from a screen output 246 an administrativeuser is enabled to review the particular customer's transaction historyby selecting the transaction history option. This causes theadministrator terminal to output data concerning transactions conductedby the user, as represented by a screen output 248 in FIG. 52. As can beappreciated, in the example embodiment each transaction that isconducted or attempted to be conducted by a user has correspondinginformation recorded in one or more data stores in operative connectionwith the system. This enables the system to calculate, for example,whether the specified delay period has passed before the user can cashanother check. In addition, this enables the system to monitortransactions and to uncover situations that may involve the theft orimproper presentation of checks. As shown in the example transactionhistory record in FIG. 52, data is recorded related to successful andunsuccessful transactions that have been made by the user. Theadministrative users are enabled to recover the data related to suchtransactions and review them at the administrator station. Of coursethese records are example and in other embodiments other records anddata may be provided.

In the example embodiment the host system is programmed to operate inaccordance with its configuration to allow check cashing transactions tobe conducted under selected appropriate circumstances. As a result,transactions which do not meet particular parameters are denied.Examples of programmed parameters which are bases for denyingtransactions in the example system are shown in the table 250 in FIGS.58 through 60. Of course it should be understood that these parametersare merely example and in other systems and embodiments other parametersand criteria may be used.

As shown in the example embodiment, transactions by users may be deniedif a check cashing transaction is conducted before the expiration of the“lock out” or delay period that is programmed in the system inconnection with the particular maker of checks with which a user isassociated.

In some embodiments where users are being enrolled to use the system itmay be advisable to enable a particular user to conduct a firsttransaction to cash a check at a machine without first being enrolled inthe system. This would be permitted, for example, if the maker on whoseaccount the check is drawn is a participant in the system and the makercheck that is presented is below the maximum amount and meets othercriteria for cashing of the check. In some example embodiments, one suchtransaction may be permitted by a consumer user who is not enrolled withthe system. However in such embodiments the record that such a firsttransaction has been conducted is stored in one or more data stores.Further transactions by such a user are denied until the user isproperly enrolled and a record corresponding to the user is added to thedatabase and made active. However in some example embodiments the systemmay operate to read the maker information on the first check input bythe user and to automatically correlate the user and maker data in thedatabase in response to cashing of the first check. This may have theadvantage that when the administrator personnel operate theadministrator station to modify the record data associated with theuser, the correlation between the user and the maker entity is alreadyestablished and the administrator personnel may verify this information.Of course this approach is example and in other embodiments otherapproaches may be used.

Also, as represented in FIG. 58, a further reason that a user may bedenied a transaction is that the user's card or other identifying datais not defined in the system. A user presenting such a card will not beallowed to conduct check cashing transactions. However, in someembodiments such a user may be permitted to conduct other types oftransactions. A further basis for a denial of transactions is that theaccount of the maker on which the check is drawn has been closed by theadministrator of the system. This may occur, for example, when thesystem administrator no longer is obligated to cash checks for thatparticular maker.

Also, as represented in FIG. 58, a check cashing transaction may bedenied by the system if the check amount exceeds the authorized amount.This may be the maximum check amount associated with the maker or theuser in cases where individual users have specified maximum checkamounts.

As further indicated in FIG. 59, the check cashing transaction may bedenied if a check is presented which is drawn on a maker that is notdefined in the system. This may occur, for example, when the entity thathas issued the check is not defined in the database as one for whichchecks are cashed. Similarly, the check cashing transaction may bedenied if an authorized user attempts to cash a check issued by a makerwhich, though identified in the system, is not the maker that isassociated with that particular user in the system.

As further represented in FIG. 59, check cashing transactions may bedenied due to machine malfunctions or the machine's inability to read avalid MICR line. This may occur, for example, if the check has beensubject to damage or if the check does not conform to one of thetemplates that is used to identify a valid check by the system.

A further feature of some example embodiments is the ability of theadministrator to identify certain user cards as no longer authorized.This may occur, for example, if a user reports their card stolen or ifthe user is suspected of cashing fraudulent checks. In suchcircumstances, the card may be listed by the administrator as a “hot”card. In such cases, the system may be programmed to have the ATM rejecttransactions and/or to capture such cards when they are presented at theATM.

As further represented in FIG. 59, check cashing transactions may bedenied in situations where the system is unable to deliver cash to theuser from the machine in an amount close enough to the amount that theuser is entitled to receive. This may occur, for example, if the ATMwhich the user is attempting to operate is out of various denominationsof currency and the closest amount that the machine can dispense abovethe amount of the check is in excess of the programmed limit.

Example embodiments of the system are adapted to require a user to inputa corresponding personal identification number (PIN) in order to operatethe ATM. A failure to input the proper PIN prevents the user fromconducting the transaction. Example forms of the system are programmedso that if a user presenting a card makes three consecutive unsuccessfulattempts to input a correct PIN the user card is captured.

Also as represented in FIG. 59, transactions may be denied if the systemhas a requirement that a particular maker be assigned to the card beforeit can be used. This might occur, for example, in systems that do notemploy the capability for automatically correlating a maker with a userand/or a card upon the cashing of a first check.

Also as shown in FIGS. 59 and 60, check cashing transactions may bedenied in situations where data corresponding to a check amount or amaximum check amount is encoded in the MICR line and the amount encodeddoes not correlate properly with the courtesy and/or legal amounts readfrom the check. Likewise, check cashing transactions may be denied insituations where the particular user card has been deactivated by anadministrator or has not been properly activated within the system.

It should be understood that these particular reasons for denying checkcashing transactions are example. In other embodiments and systems,additional or other reasons may be used for denying check cashingtransactions.

An example logic flow associated with a check cashing transaction isrepresented in FIGS. 53 through 56. It should be understood that thistransaction flow is schematic and does not show other or additionalsteps that may also occur in connection with the steps represented.

As represented in a step 252, the ATM receives from a user in a step 252the account and PIN number data that identifies the user. This is donein an example embodiment by the ATM reading the user's card andreceiving the input of the user's PIN through a keypad. Although notrepresented in FIG. 53, if the user's card number and PIN do notcorrespond, the user is prevented from conducting further steps withinthe system. Of course in other embodiments the user may be enabled toconduct transactions without a PIN or may provide other identifyinginputs, as previously discussed.

The ATM receives the check through the IDM and reads the account datafrom the MICR line. This is indicated schematically in a step 253.Thereafter the ATM is operative to receive the amount of the check asindicated in a step 256. As previously discussed, in some embodimentsreceiving the amount of the check may involve reading the courtesyamount and verifying through the operation of the system that the levelof assurance that the courtesy amount has been properly read is above aset level of confidence. In other embodiments, receiving the checkamount may include reading the legal amount along with or in lieu of thecourtesy amount. In other embodiments it may include reading dataencoded in the MICR line which corresponds to the check amount. In stillother embodiments, as previously discussed, the user may be requested toinput the amount of the check through an input device such as a keypad.In each case, one or more computers in operative connection with the ATMmay be operative to verify that the amount of the check has beenproperly received. Of course these approaches are example, and in otherembodiments other approaches may be used.

In the example logic shown in FIG. 53, at least one computer inoperative connection with the ATM operates to check in a step 258whether the card data which identifies the user is related in thedatabase. If so, the logic proceeds to a next step 260, where the statusof the card based on information in the database is determined. If thecard account is not in the database, the computer executes thetransaction denial logic shown in FIG. 57, which is later discussed.

After determining the card status in step 260, the system determines ifthe card status is such that no prior transactions have been conductedwith the valid card. This is determined in a step 262. If the system isprogrammed to allow a first use of valid cards without prior userenrollment, a next step 264 is executed in which it is determinedwhether a prior transaction has been performed with the particular card.In the example embodiment, if such a prior transaction has beenperformed with the card, the transaction is rejected. If, however, noprior transaction has been performed, the system moves ahead in thelogic flow as indicated.

From step 262, if the card has not been set to a first use but the cardnonetheless is a valid card, the system executes a step 266 in which itis determined whether the card status is indicated as active in thedatabase. If not, the transaction is rejected. However, if the card isactive, a determination is then made in a step 268 as to whether thedata that has been read from the check corresponds to a maker identifiedin the database as one for whom checks are to be accepted. It will benoted from FIG. 54 that this is also the next step that is executed fromstep 264 when a first use of a card is allowed without enrollment and nofirst use has yet been performed.

In step 268 if it is determined that the check is drawn on a maker forwhom the system allows the cashing of checks, the system operates torecover information on the maximum check value for which a check will becashed. This is done in a step 270. Of course, as previously discussed,in some embodiments the system may also include maximum amounts forparticular users, and the system may include rules as to which amountcontrols. In such cases the determination as to the maximum amount ofthe check that can be accepted may be determined at this point in thelogic flow.

After determining the maximum value of a check that may be cashed underthe circumstances of the transaction, the system next determines in astep 272 whether the amount of the check being presented is in excess ofthe maximum permitted amount. If the check amount is greater than themaximum amount permitted, the transaction is rejected. However, if thecheck is below the maximum, the transaction proceeds.

In a step 274 the system reviews the records related to the particularuser and determines the time of the last prior check cashing event bythe particular user. The system then calculates the period since thecashing of the last check. In a step 276 the time that has passed sincethe user's last check cashing transaction is compared to the delayperiod that is associated with the particular maker of the check thatthe user is seeking to cash. If the time that has elapsed is beyond thedelay period, the transaction proceeds. However if the delay period hasnot expired the transaction is rejected.

In some embodiments, particular users of the system may be entitled toan incentive payment. Such incentive payments may be provided toencourage users to cash their checks through ATMs, or for other reasons.Information about users who are entitled to receive incentives may beincluded in one or more data stores in the system. Alternatively in someembodiments, particular users may be required to pay a service charge orother fees associated with check cashing transactions. This may depend,for example, on the relationship between the administrator of the systemand the particular maker whose checks are to be cashed. As representedin a step 268, one or more computers connected in the system areoperative to determine if a particular user is subject to a servicecharge or is entitled to receive an incentive. In the exampleembodiment, the system determines if the customer is to be assessed aservice charge in a step 280. Thereafter in the example embodiment theATM that the customer is operating prompts the user to indicate whetherthey accept the service charge in a step 282. If the user declines toaccept the service charge, the transaction is rejected.

If the user accepts the service charge in step 282 or if no servicecharge is applicable, one or more computers in the example systemcalculate the amount due to the user in a step 284. This may include insome example embodiments not only the amount of the check but also anyincentive payments to which the user may be entitled. After calculatingthe amount due the user, the system operates to determine the mix ofcurrencies which will be dispensed to the user from the particular ATM.This is represented in a step 286. As previously mentioned, in someexample embodiments the system is provided to provide the user with thepayment to the exact amount or to an amount which the machine candispense which is above the exact amount which the user is entitled toreceive, provided that the amount dispensed does not exceed a particularlimit. Further in example embodiments, one or more computers in thesystem are operative to determine the mix of bills and coins that willbe dispensed to the user. This will be done so as to enable the systemto continue to cash checks for as long as possible without the need toreplenish the denominations in the ATMs. The message sent from the hostmay include data corresponding to the number and type of each coin andbill to be dispensed. Alternatively the ATM resident computer maycalculate the coin and bill mix. Of course, these approaches are exampleand in other embodiments other approaches may be used.

In the example embodiment after determining the mix of bills and coinsto be dispensed to the user, the host computer sends one or moremessages to the ATM being operated by the user, instructing the ATM todispense currency having a particular value to the user. This isrepresented in a step 288. In response to these instructions, the ATM isoperative to dispense cash value to the user. After dispensing the cashvalue, the ATM is operative to return a message to the host computerindicating whether or not it was able to accomplish the requesteddispense successfully. The system then determines if the dispense wassuccessfully carried out in a step 290. If the dispense could not besuccessfully carried out, the transaction is rejected.

In the example embodiment, if the ATM has successfully dispensed thecash value, one or more computers in the system is thereafter operativeto store the information in one or more data stores concerning the checkcashing transaction. This is represented in step 290 in FIG. 56. Inaddition, the ATM status data is also updated, as represented in a step292. In addition, in example embodiments the ATM may be operative toimage the check and to store data representative thereof and/or toprovide the image data at a point proximate in time or at a later timeto a remote computer such as check image server 214 shown in FIG. 38. Inaddition, the ATM may be operative to conduct printing on the check orto otherwise cancel and/or store the check. This is represented in FIG.56 by a step 294.

Thereafter, the ATM is operative to close the transaction for the user.This may include, for example, returning the user's card and printingand providing the user with a receipt for the transaction. This isrepresented in a step 296. Of course in other embodiments additionalsteps may be taken. Thereafter, as represented in the exampletransaction flow, the check cashing ATM is ready to conduct anothercheck cashing transaction.

As represented in FIG. 57, if in the example transaction sequence it isdetermined that the check cashing transaction cannot be conducted, theuser is advised through the ATM that the check that they have presentedcannot be accepted. This is represented in a step 298. As represented ina step 300, the system then operates to have the check returned to theuser by the ATM. It should be understood, however, that in someembodiments where the system determines that the check appears to befraudulent, the ATM may operate to capture the check to prevent itspresentation to other entities.

As represented in a step 302, the example form of the system isoperative to record in the database, information concerning theattempted transaction and the reasons for its denial. This isrepresented in a step 302. Finally, as represented in a step 304, thesystem operates to close the transaction. Generally this will includereturning to the customer their card and indicating reasons through theATM why the transaction could not be conducted. In some embodiments,however, as previously discussed, if the system determines that it isnot appropriate to return the card to the user the card may be retainedin the ATM.

It should be understood that the transaction flow shown in FIGS. 53through 57 is merely example, and other or additional steps may be used.These additional steps may include, without limitation, logic flowassociated with determining additional reasons for denying transactionsas described in connection with FIGS. 58 through 60. Further in someembodiments additional business logic may be applied in makingdeterminations as to whether the system should cash a particular check.

An alternative embodiment of a system for cashing checks through ATMsand delivering images of such checks for further processing isrepresented by a system generally indicated 350 in FIG. 61. System 350includes a plurality of ATMs 352 which communicate through one or morenetworks 354 with one or more remote computers represented as an ATMhost 356. ATM host 356 communicates with the ATMs to conducttransactions generally in the manner previously described. In theexample embodiment the ATM transaction host can communicate with theATMs 352 for purposes of carrying out a plurality of transactions. Thesemay include cash dispensing transactions that do not involve receipt ofa check, deposit accepting transactions which involve receipt of deposititems such as checks, balance inquiries, account transfers and/or otheror different transactions depending on the ATM type used and theprogramming by the operator of the system.

The example system 350 differs from the systems previously described inthat image data corresponding to electronic images of both the front andthe back of each check presented at the machine is delivered remotelyfrom the machine for purposes of further processing. Further processingis facilitated in the example embodiment by the ATM providing image datawith transaction identifying data which can be used to facilitate thefurther processing of the transaction. In the example embodiment thetransaction identifying data is provided by the ATM host in the messagethat the host sends to the ATM authorizing the acceptance of the check.This transaction identifying data may include the information that isneeded for further processing of a settlement of the check. In someembodiments this enables the image messages which are delivered by theATM, to be used to process the check electronically as a substitute forthe paper document. This may also avoid the need to recover someadditional transaction data from other sources or systems because suchdata has been associated by the ATM with the image as part of the imagemessage. Of course this approach is example and in other embodimentsother approaches may be used.

In the example embodiment a check cashing transaction or othertransaction including presentation of a check conducted at one of theATMs 352 proceeds in accordance with the logic schematically representedin FIG. 62. The transaction logic as represented begins at a step 358 inwhich a user inserts their card. This may include for example a debitcard of the user which includes the user's name, primary account numberor other identifying information. In addition it should be understoodthat although in the schematic representation the user is not indicatedas being required to input a PIN or other identifying data such as abiometric input, the input of such data may be required in someembodiments.

After the user has input identifying information to input devices of theuser interface of the ATM at which a transaction is being conducted, thelogic proceeds to a step 360 in which the user selects a checkacceptance transaction. This is generally done in response to outputsthrough one or more output devices of the ATM such as the displayscreen. In the example embodiment the option for having checks acceptedin the machine is one of several transaction options available to usersof the machine.

After the user has selected a check transaction in step 360 the logicflow proceeds to a step 362. In this step the example machine isoperative to prompt the user as to whether they wish to receive cash inexchange for the input check or whether they wish to have the value ofthe check credited to their account. From this step 362 if the userprovides one or more inputs to indicate that they wish to receive cashin exchange for the check, the machine executes a step represented in364 and the terminal processor operates to include in the message anindication that the user is not only seeking to deposit a check but alsoto make a withdrawal as part of the transaction. In step 364 theterminal processor of the example embodiment is also operative toarrange for the inclusion of appropriate data in messages that areeventually sent to the ATM host so as to indicate the customer'sselections.

Once the customer has indicated that they wish to receive cash inexchange for the check or a customer declines to receive such cash andindicates they wish to deposit the amount of the check in their account,the logic next proceeds to a step 366. In step 366 the customer insertsthe check into the machine and the check is processed by the IDM in theexample embodiment. The check is also imaged by the check imaging deviceincluded in the IDM so as to generate image data corresponding to thevisual appearance of the check.

In the example embodiment electronic images representing both the frontand the rear of the check are produced. In addition in the exampleembodiment in step 366 the terminal processor is operative to analyzethe image data by reading the indicia on the check. This includesanalyzing the indicia which corresponds to the MICR line and producingthe data which corresponds thereto which can be included in an ATMtransaction request message. Further in the example embodiment in step366 the terminal processor is operative to determine an amountassociated with the check which can be done in the manner previouslydiscussed such as by using character recognition software to determinethe amount of the check based on the courtesy amount, the legal amountor other amounts on the check. Embodiments may also analyze image datafor other information to evaluate whether the check is a valid check.This may include checking for a payee name, a payor endorsement, a payeeendorsement, a bank name or other data. In some embodiments the qualityof the image data may be analyzed for features such as contrast, lineboundaries, overlap of indicia or other features which indicate that theimage data will not produce a suitable legible image. Of course theseapproaches are example and in other embodiments other approaches may beused.

In the example embodiment after the check has been inserted in step 366the terminal processor is operative to prompt the user to input theamount of the check in a step 368. This may serve to assure that thecharacter recognition software has analyzed the amount of the checkcorrectly. As previously discussed, in some embodiments an image of theface of the check may be displayed to the user through an output deviceon the ATM at the time the request is input so that the user can reviewthe amount as they are providing the input rather than having toremember the exact amount of the check. Of course various approaches maybe used.

The transaction logic next proceeds to a step 370 in which a transactionrequest message is sent to the ATM host 356. This may be done in themanner previously discussed by sending one or more messages to the ATMhost. Generally such messages will include an indication of the identityof the customer and/or their account, encrypted verification data suchas a PIN number or biometric identifier, an indication of the nature ofthe transaction that the customer wishes to conduct and the amountinvolved. Further in the example embodiment the message sent to the ATMhost includes data corresponding to at least a portion of the charactersincluded in the MICR line, the amount of the check and the terminalidentifier associated with the ATM at which the customer is conductingthe transaction. Of course in alternative embodiments additionalinformation may also be included in the one or more messages.

In response to receiving the one or more messages in step 370 the ATMhost 356 is operative to determine whether the transaction should bepermitted and to generate a response message. The response message inthe example embodiment generally includes instruction data which isoperative to cause devices in the ATM to operate appropriately asdetermined by the ATM transaction host. This may include for example inthe case of a check cashing transaction, accepting the check into astorage area in the machine and if appropriate dispensing cash from themachine to the user. Alternatively the instruction data may includeinformation indicating that the check will not be accepted, and theinstruction data may cause the machine to indicate to the customer thatthe transaction is denied and in appropriate cases the check may becaptured by the machine or returned to the customer. The receipt of theresponse message from the ATM host by the ATM is represented in a step372.

In the example embodiment the ATM host 356 is operative to include inthe responsive message sent to the ATM, transaction identifying data.The transaction identifying data in the example embodiment isrepresented in the table 374 shown in FIG. 63. The transactionidentifying data includes data representative of information that isuseful by being correlated with an electronic image of the check forpurposes of further processing the check image. In the exampleembodiment the transaction identifying data includes five fields. Ofcourse in other embodiments greater or lesser amounts or other types oftransaction identifying data may be included. In the example embodimentthe transaction identifying data includes a pseudo number. The pseudonumber in the example embodiment is an identifier which is useable bythe operator of the system to identify particular aspects of thetransaction. In the example embodiment the pseudo number isrepresentative of the particular entity which is the owner or otherwiseresponsible for the ATM at which the check is being cashed by the user.The transaction identifying data further includes a field which is acustomer number corresponding to the customer of the entity providingthe service. In some cases the customer number may correspond to thesame entity as the pseudo number in that the customer of the service isthe same entity as the entity responsible for the ATM. However, in manysituations the customer number is the particular entity that offers theservice related to cashing the check but is not the entity who owns theATM. For example the check cashing ATM may be located at a conveniencestore and the pseudo number may be associated with the conveniencestore. The check cashing service may be offered by a particularfinancial institution such as a bank, credit union, insurance company orother entity that has decided to offer check cashing services. In theexample embodiment this entity may be represented by the customernumber. Of course this approach is example and in other embodimentsother approaches may be used.

The transaction identifying data in the example embodiment includes ahost business date. The host business date of the example embodimentincludes time and date data at the location of the ATM host and reflectsthe time at which the transaction request was received. Exampletransaction data also includes a sequence number. The sequence number isa number assigned by the ATM host to uniquely identify the particulartransaction. Of course as can be appreciated, numerical identifiers havea practical limit as to size and in example embodiments sequenceidentifiers may eventually be reused because the sequence number isassociated with other identifying data such as the time and date data.

The example transaction identifying data further includes a terminalidentifier associated with the ATM at which the transaction isconducted. As previously mentioned, in the example embodiment themessage received by the ATM host from the ATM includes datacorresponding to the particular ATM. In the example embodiment this datacorresponding to that received from the ATM is sent back to the ATM aspart of the transaction identifying data.

As can be appreciated additional or other data may be used astransaction identifying data in alternative embodiments. This mayinclude data that was included in the transaction request messagereceived from the ATM. Such data may include information such as thecustomer, account number data, amount data, certain data from the MICRline that identifies the institution on which the account is drawn, datacorresponding to how the processor in the ATM is to modify or processthe image data and/or other data that may be useful in terms ofprocessing the check image or the settlement of the transaction. Ofcourse the transaction identifying data may vary in some embodiments dueto the needs of the particular system operator and the systemconfiguration.

It should also be understood that in some embodiments the ATM processormay operate to produce or populate directly some or all of thetransaction identifying data. For example in some embodimentsinformation that is included in the transaction request message may bepopulated in one or more records or files at the ATM and be associatedwith image data along with data that is received from the host.Alternatively all image associated data may be generated by the ATMbased on ATM programming independently of information received from thehost. Of course various approaches may be used in various embodiments.

Returning to the discussion of the example logic represented in FIG. 62,it will be assumed for purposes of this example that in step 372 the ATMhost authorizes the transaction. In response thereto the ATM proceeds toa step 376. In step 376 the ATM terminal processor causes the ATM tooperate in accordance with the instruction data. This may include forexample cancelling the check and accepting it for storage in the ATM.Alternatively or in addition if the customer has requested to receivecash in exchange for the check the processor in the ATM causes ATMoperation in accordance with the instructions included in the messagereceived from the host, to cause the cash dispenser in the ATM tooperate to dispense to the user an appropriate amount of cash.

Although it is not shown in the example logic flow, in the exampleembodiment part of the activities conducted as part of step 376 tocomplete the transaction is for the ATM to indicate back to the ATM hostthrough one or more messages whether the transaction was able to becompleted successfully. In the example embodiment the ATM sends one ormore messages to the ATM host indicating whether the ATM was able tocarry out the transaction successfully responsive to the instructiondata. In situations where the ATM is not able to carry out thetransaction, appropriate measures are taken by the ATM host and/or theATM depending on the nature of the failure. This may include for examplenot crediting the user's account in cases where the check is returned tothe user, or crediting a user's account for the check in a case wherecash is not dispensed. Of course this is example of many steps that maybe taken in response to a malfunction.

In the example embodiment once the ATM has received the transactionidentifying data, the ATM is operative to send data corresponding to anelectronic image of the front and back of the check as well as thetransaction identifying data to a remote computer. The ATM taking thisaction is represented in a step 378. In the example embodiment the ATMis operative to send an image message including the electronic image(s)and transaction identifying data to an image and transaction serverrepresented 380 in FIG. 61. In the example embodiment the image andtransaction server 380 is a different computer than the ATM host. Alsoin some alternative embodiments the ATM may operate to modify the imagedata before it is sent to the image and transaction server. This mayinclude for example, modifying such as by changing or supplementing datacorresponding to the MICR line. Alternatively indicia such astransaction data in human or machine readable form may be included inthe image data. Of course in other embodiments other approaches may beused.

In carrying out step 378 the ATM is operative to send to the server 380an image message including the data represented in table 382 shown inFIG. 64. In the example embodiment the image message sent by the ATM toserver 380 includes data corresponding to each of the items oftransaction identifying data received by the ATM in step 372. Althoughin the example embodiment all of the transaction identifying data ispart of the image message, in other embodiments only the portions of thedata may be included or additional or other forms of data may beincluded. Further in alternative embodiments the data may be deliveredin multiple messages.

In the example image message there is also included data correspondingto the indicia in the MICR line of the check. This may include analphanumeric or other character representation as determined by thecharacter recognition software operating in the ATM, of the indiciaincluded in the MICR line portion of the image on the check. Alsoincluded in the image message is data representative of the length ofthe images of the front and back of the check. In addition the exampleimage message includes the image data for the front and the back of thecheck. In the example embodiment the image data is provided in themessage in a bitmap format, and in some embodiments may be provided as aTIFF file. Of course as previously discussed other or additionalinformation may be included in the image message. Further although inthe example embodiment the image message is sent as a single message, inother embodiments the necessary data may be provided as multiplemessages. Further in the example embodiment while it is shown that theimage message is dispatched to a single image server, in alternativeembodiments messages may be dispatched to multiple servers or differentmessages may be sent to different remote servers depending on the natureof the processing to be done with regard to the check.

In the example embodiment the ATM is operative to contact the imageserver which operates to listen for a socket connection from the ATM.The image server operates in response to establishing a socketconnection with the ATM to spawn a new image socket thread to handle thecheck image message and for the transaction identifying data to bereceived. The example image socket thread operates to parse the imagemessage into its individual fields and to check the parsed fields forappropriate syntax and validity. The example socket thread furthercreates the directory structure for the transmitted check images andsaves the front and back electronic images as part of this process. Theimage server operates in accordance with this programming to change thefront and back images of the check from the bitmap format to a differentformat. In the example embodiment the image data is converted to a JPEGfile which compresses the image data and which may facilitate its useand transmission to other connected computers. Of course this approachis example and in other embodiments other approaches may be used.

In addition the server is operative to create a new entry in thedatabase with the fields parsed from the check, which enables theproduction of tabularized data which can be accessed and utilized in amanner later discussed. The example image socket thread is furtheroperative to acknowledge receipt of the message to the ATM to close thesocket connection and to the image socket thread.

The activity by the image and transaction server 380 in processing thedata through the image socket thread is represented in a step 384 inFIG. 62. The activity executed by the software which produces the threadin sending an acknowledgment back to the ATM, is also represented inFIG. 62 by a step 386. Of course it should be understood that theseprocesses and steps are example and in other embodiments otherapproaches may be used.

In some embodiments the image and transaction server may includesoftware operating therein. The software may operate to cause the atleast one processor operating in the server, to modify the image datacorresponding to the check images stored in the data store. Suchmodification may include changing data corresponding to characters (oradding characters) in the MICR line. This may facilitate furtherprocessing of the electronic image as a substitute check. Alternativelyor in addition, data corresponding to the image may be changed to addadditional indicia corresponding to the transaction. Such indicia may beof a type that when provided through an output device is human readableand/or machine readable such as bar code. Alternatively or in addition,image data may be modified to eliminate, encrypt or obscure certain datain the check image for privacy or security reasons. Alternatively or inaddition the ATM and/or image server may apply and/or verifyauthenticity features such as digital watermarks, verification codes orother features in the image data to detect any unauthorized tamperingwith the image data. Of course these approaches are merely example offeatures and functions that may be carried out through operation of oneor more servers.

The example image and transaction server is operative to store in itsconnected data store, data corresponding to transaction identifying dataand image data for each check cashing transaction carried out at an ATMto which the server is operatively connected. The example image andtransaction server also operates to selectively provide the image andtransaction data to other connected computers.

The image and transaction server 380 of the example embodiment operatesto provide authorized users with access to transaction data and imagesrelated to check cashing transactions that are conducted at ATMs. Thismay be done in a manner similar to that previously discussed inconnection with the cashing of checks that are drawn on particularaccounts. Specifically in some embodiments users that have contractedfor processing services are enabled to find information concerningtransactions that have been conducted, analyze transactions and conductother activities as may be appropriate for purposes of managing theirbusiness activities and/or the ATMs for which they may be responsible.As represented in FIG. 61 access to data which is resident on the imageand transaction server 380, may be authorized to remote computersoperated by authorized users represented 388, 390 and 392. Clientcomputers 388, 390 and 392 are enabled to communicate with imagingtransaction server 380 through a network 394. Network 394 may constitutea variety of different types of public or private networks. It shouldfurther be understood that in some cases, such as when a public networksuch as the Internet is used to access server 380, security measures inaddition to those specifically discussed herein may be appropriate toassure the privacy and integrity of the data.

In the example embodiment of the system 350 the ATM host and image andtransaction server are operated by Diebold Transaction Services, Inc.(DTS), a wholly owned subsidiary of the assignee of the presentinvention. In the example embodiment the DTS services include operatinga service bureau environment for driving ATMs and processingtransactions for third parties. Authorized individuals at such thirdparties are enabled to access the data from the server 380. It should beunderstood that numerous types of data may be processed and presented,and that the nature of the data discussed herein is example thediscussion and is generally limited to transaction data associated withcheck processing transactions. It should be understood that additionaltypes of transactions may be conducted and that other or additionaltypes of data may be accessed and utilized by individuals who requiresuch services.

FIG. 65 shows an example output screen 396 of a type which can beaccessed by a user at a remote client computer through a network 394.Screen 396 explains information about the entity operating the imageserver and provides options for users to select.

In response to selecting customer access from the screen 396, the imageserver 380 is operative to present to the user a login screen 398represented in FIG. 66. Screen 398 requires the user to input name andpassword information so as to verify that they are an authorized user.Of course this approach is example and as discussed other or additionalprocedures may be implemented to assure that any authorized persons mayreview the data.

In response to an input by an authorized user, the image server 380 isoperative to present to the user a screen which includes the data whichthe user is authorized to access. In the case of a user who isauthorized to access data regarding check cashing transactions, a screen400 shown in FIG. 67 is presented. Example screen 400 is operative todisplay a summary of check cashing transactions associated with theuser's institution, to provide the user with a number of selections thatmay be made in order to obtain information about the transactions aswell as to change certain parameters, to update information, to find outinformation about the status of ATM terminals for which they areresponsible, and to conduct other activities. Of course these selectionsare example and in other embodiments other approaches may be used.

From screen 400 if the customer selects to review transactioninformation and the imaging transaction server is operative to cause theuser to be presented with a screen 402 shown in FIG. 68. Screen 402 issimilar to screen 230 previously discussed. Screen 402 enables thecustomer to sort through transactions and to locate transactions ofinterest for which data is available on server 380.

Responsive to customer inputs placed in the fields represented in screen402, server 380 is operative to process data stored in one or more datastores and to provide an output in a tabularized format to the userresponsive to the data requested. An example output is table 404 shownin FIG. 69. Table 404 is somewhat similar in format to the table shownin FIG. 43 previously discussed and includes some of the same types ofdata. In the example embodiment however table 404 also includes icons406. Icons 406 are associated with the data for transactions in whichelectronic check images are available through server 380. Icons 406 ofthe example embodiment comprise a graphic representation of a face ofthe check. This conveys to the user that a check image for thetransaction is available. Of course this approach is example and inother embodiments other approaches may be used.

In the example embodiment an authorized user accessing the tabularizeddata in table 404 may review check images by selecting the icon 406associated with a particular transaction. Selecting such an icon for atransaction is operative to cause the server 380 to provide data whichcauses a client computer to produce an output including the check imageassociated with that transaction. This is represented in FIG. 70 by animage 408. Check image 408 in the example embodiment comprises agraphical representation produced on the output device of a clientcomputer showing visual representations of the front and back of theassociated check. This enables an authorized user to review the check inconjunction with the transaction data so as to facilitate furtherprocessing or other related transaction activities.

As can be appreciated authorized users may wish to download transactiondata and check image data for purposes of processing transactions. Insome situations authorized users may employ the check image data as asubstitute for the paper check for purposes of achieving settlement. Forexample if the authorized user is the drawer institution which holds theaccount on which the check is drawn, the drawer institution may operateto archive the check image along with the other transaction data. Thedrawer institution may utilize the data associated with the check and/orinformation received through communication with the ATM host, forpurposes of making the appropriate debits and credits to the respectiveaccounts. The institution may also make the electronic image of thecheck available as a substitute for the paper document to the particularentity which is the maker of the check. This will enable the maker tohave a record of payment. Of course these activities are example of manythat may be conducted.

In addition as represented in FIG. 61, in some embodiments or situationsthe entity operating the ATM receives checks that are drawn on accountsfor which the entity is not responsible. In such cases the checks mayneed to be processed through a clearing house. Such a clearing houseprocesses the transactions to assure that the institutions areappropriately credited and debited with regard to check transactions.This is represented in FIG. 61 by a clearing house 410. In some exampleembodiments the data available through the image server which includesthe transaction data and the associated check images may be sentpursuant to the direction of an authorized user or automatically to anappropriate clearing house in an electronic format. The data associatedwith the check images may enable the clearing house to utilize the datato accomplish settlement electronically between the particularinstitution upon which the check has been drawn, schematicallyrepresented 412, and an institution holding the account of the entity towhich the check is payable. This is represented by an institution 414.This may be done electronically through communications by the clearinghouse through one or more networks schematically represented 416.

In addition the clearing house may be operative to forwardelectronically to the institution upon which the check is drawn, theelectronic representation of the check which may serve as an electronicreplacement document. The data corresponding to the electronicrepresentation of the check may be accompanied by one or more records,such as markup language documents that include data relating to thetransaction. In some embodiments the images and record data maycorrespond to a plurality of transactions. This data may be processed byone or more computers to facilitate transaction settlement. The drawerinstitution in some embodiments may further provide the electronicreplacement document comprising the image of the check to its customereither in hard copy or electronic format for purposes of enabling themaker of the check to balance their accounts.

Of course it should be understood that the system represented in FIG. 61is example and represented schematically. However, it will beappreciated that the example embodiment of the system enables the datacorresponding to an image of the check to be captured at the ATM andassociated with appropriate transaction identifying data whichfacilitates the further processing of the check. Further in the exampleembodiment, because the image data is associated by the ATM with thenecessary transaction data for processing, the image messages whichinclude such data can be more readily processed and forwarded to theappropriate entities which may utilize them to complete the transactionsand to accomplish the necessary settlement functions.

As discussed previously and as discussed in U.S. Pat. No. 6,554,185 andU.S. Application No. 60/584,622 filed Jun. 20, 2004, which are herebyincorporated herein by reference, example embodiments of an IDM mayinclude an analysis module with magnetic sensing elements capable ofdetecting magnetic properties of checks. The presence or absence ofmagnetic features in different areas of the check may be evaluated todetermine whether the check is authentic or a fraudulent copy. In anexample embodiment, movement of the check across the magnetic sensor ofthe analysis module is operative to generate a magnetic image map of themagnetic ink printed on the check. Signals generated by the sensor whichare representative of the presence of magnetic material may be processedto derive a two dimensional array of pixels, where each pixel representsa level or strength of magnetic material for the particular area on thecheck for which the pixel was measured.

Different areas or zones of the magnetic image of the check may beevaluated for the presence or absence of magnetic ink based on thevalues of the pixels in the magnetic image. For example the image map ofa check may be partitioned into a plurality of zones. FIG. 71 shows anexample of a check 500 which is shown divided up into four zones(indicated with dashed lines). These zones include the previouslydescribed Magnetic Ink Character Recognition (“MICR”) zone 502, aleading blank zone 504, a trailing blank zone 506, and a background zone508.

In an example embodiment, these zones may vary in location depending onthe size and the orientation of the check as the check passes across themagnetic sensor. Therefore, as discussed previously, the optical imagescan captured by the optical sensor of the IDM may be evaluated todetermine the corresponding areas of the magnetic scan which correspondto these four zones. Also in alternative example embodiments additionalzones may be evaluated including zones associated with different areasof the background zone including zones corresponding to the payeeinformation, payee bank information, payor information, legal amount,courtesy amount, check number, signature line and memo field.

The ANSI standards (e.g. ANSI X9.27-2000) for magnetic ink on checksrequires a MICR line 510 to be printed with magnetic ink. The ANSIstandard also specifies that a clear band around the MICR line be freeof magnetic material. The MICR zone corresponds to the area whichincludes the MICR line and the surrounding clear band around the MICRline. For example, as shown in FIG. 87, the MICR zone of a check mayhave a height of about ⅝ inches which is comprised of a ¼ inch in heightMICR line 510 (vertically centered) which is surrounded by 3/16 inch inheight clear bands 507, 509 above and below the MICR line 510. For theremaining portions of the check, outside the MICR zone, either magneticor non-magnetic inks may be used.

FIG. 72 shows a visual representation of a magnetic image map 520 for anANSI compliant check 500 shown in FIG. 71 and scanned with an exampleembodiment of the IDM. Here the gray areas 522-530 represent thepresence of magnetic ink on the check, with the darker areasrepresenting a stronger magnetic flux intensity. The white areasrepresent areas of the check in which the measured magnetic intensity isbelow a threshold value.

In this example, the MICR line 528 is represented as a gray band at thebottom of the magnetic image map. The other gray areas 522, 524, 530,526 correspond to text on the check which is printed with magnetic inkin the background zone. For example, the gray area associated withreference numeral 522 in FIG. 72 corresponds to the printed name andaddress of the payor which is also depicted with reference numeral 542in FIG. 71.

One possible method to produce a fraudulent check is to photocopy thecheck with a standard photocopier which does not include magnetic toner.The resulting copy may optically look like the original check 500 shownin FIG. 71. However, the ANSI standard requires the MICR line to beprinted with magnetic ink or toner. Thus a magnetic image map of such aphotocopy as produced by an example embodiment of the IDM will show theabsence of magnetic ink or other material on the check. FIG. 73 shows avisual representation 550 of a magnetic image map for a photocopy of acheck made without magnetic ink or toner. Here the visual representationof the magnetic image map lacks the gray areas shown in thecorresponding visual representation of the magnetic image map 520 inFIG. 71 for an original or authentic check. Example embodiments of theprocessor of the IDM and/or ATM is operative to evaluate the magneticimage map acquired by the IDM for a photocopy of a check. Based on theabsence of magnetic material in the MICR zone 552 (FIG. 73), theprocessor may be operative to classify the check as being a possibleforgery for which the check maybe returned to the user, confiscated,marked and/or flagged as being suspect.

Another possible method to produce a fraudulent check is to photocopythe check with a photocopier which includes magnetic toner. Theresulting photocopy may optically look like the original check 500 shownin FIG. 71. However, all of the text, graphics or other indicia on thecheck may be magnetic. FIG. 74 shows a visual representation 560 of amagnetic image map for a magnetic photocopy of such a check. Here thevisual representation of the magnetic image map includes substantiallymore gray areas compared to visual representation of the magnetic imagemap 520 shown in FIG. 71 for an original or authentic check.

Based on statistics, authentic checks often do not include magneticmaterial in the trailing and leading blank zones 504, 506 (FIG. 71).However, as shown in FIG. 74, a magnetic image map of a magneticphotocopy of this check, may show the presence of magnetic material inthe trailing and leading blank zones. For example, this may be caused bythe cosmetic border 566, shown in FIG. 71 on the original check beingreproduced in the magnetic photocopy with magnetic toner. Referring backto FIG. 74, responsive to the detection of magnetic material in theleading blank zone 562 and/or the trailing blank zone 564, the processormay be operative to classify the check as being a possible forgery forwhich the check may be returned to the user, confiscated, marked and/orflagged as being suspect.

The method of forging a check has been described with respect to the useof a photocopier. In addition, forgeries may also be made using acomputer scanner to scan the original check. A computer printer whichincludes magnetic ink, toner, or other marking material may then be usedto print out the scanned copy of the check. However, regardless of howthe potential forgery is made, example embodiments of the IDM may beoperative to evaluate the magnetic scan of the check to assist isdetermining whether the check is a potential forgery. Also as usedherein, the term magnetic ink or magnetic toner are used interchangeablyto correspond to any magnetic material capable of being deposited on acheck surface in the form of letters, numbers, graphics or other indiciaassociated with the visual appearance of a check. Also in this describedexample embodiment, the processor or processors which evaluate amagnetic image map may be located in the IDM or may correspond to aprocessor or processors of a computer of the ATM which controls theoperation of the ATM. Thus in embodiments where the processor of the IDMis described as performing an operation, it is to be understood that inalternative embodiments, all or portions of the operation may beperformed by one or more processors located in the IDM, the ATM or evenin a server located remotely from the ATM.

As will be discussed in more detail below, other characteristics such asoptical characteristics of the check may be evaluated in addition to themagnetic image map when validating a check. Also, the exampleembodiments of the IDM may be configurable as to the degree ofsensitivity for which checks are evaluated. For example one configurablesetting associated with the IDM may cause the method of classifyingchecks to be less sensitive by evaluating only a limited number offeatures or characteristics of the check, while a more sensitiveconfigurable setting may cause more features or characteristics of thecheck to be evaluated. Configurable sensitivity settings enable theowner or operator of the ATM which includes the IDM to configure the IDMto their preferred level of risk for accepting check deposits. Forexample a less sensitive setting of the IDM, may be more likely toaccept authentic checks which do not comply with the ANSI standards orstatistically normal checks, at the expense of increasing the risk thatfraudulent checks will be accepted. Whereas, a relatively more sensitivesetting of the IDM may have a lower risk of accepting fraudulent checks,at the expense of rejecting a relatively higher percentage of authenticchecks.

For example, a relatively less sensitive setting of the IDM, may causethe processor of the IDM to only validate whether any magnetic ink ispresent on the check, while a relatively higher sensitivity setting mayvalidate whether the MICR line is magnetic. In addition a furtherrelatively higher sensitivity setting of the IDM may cause the processorof the IDM to evaluate both the presence of magnetic ink and the absenceof magnetic ink in one or more zones of the check when determiningwhether to reject a check. For example for a check to be determined asvalid or acceptable to deposit, the processor of the IDM may validatethat the magnetic material is present in the MICR zone, absent from theMICR clear band(s), and absent from the leading and/or trailing blankzones of the check.

In example embodiments of the IDM, the data acquired from the magneticsensor may need to be processed in order to acquire information whichaccurately reflects the location of magnetic material on the check. Forexample, the physical transport of the check across the magnetic sensormay produce a significant amount of vibration in the check and/ormagnetic sensor. The vibrations may be caused by a motor, a roller,and/or the impact of the check hitting and leaving the sensors in theIDM. Such vibrations may interfere with the ability of the sensor toaccurately acquire data representative of the magnetic properties acrossthe surface of the check. In addition, different authentic checks mayhave magnetic ink printed thereon which have significantly differentlevels of magnetic flux as measured by the magnetic sensor of the IDM.

In example embodiments, these variations in the magnetic properties ofthe check and the variation in sensor sensitivity caused by thevibration of the check may decrease the accuracy of the IDM unless thedata acquired from the sensor is processed appropriately. The followingexample describes an example embodiment for a method of processing thedata acquired by the magnetic sensor to enable the IDM to moreaccurately evaluate the magnetic image scans of a check.

FIG. 75 shows an example embodiment of a magnetic sensor 600. Here thesensor includes a plurality of sensor elements 602 arranged in twovertically offset columns. As the IDM transport moves a check 610 acrossthe magnetic sensor 600, a circuit associated with the magnetic sensoris operative to measure signals representative of the level of magneticflux detected by each sensor element during the time period the checktransverses the sensor. The circuit is operative to performanalog/digital conversion of the signals to produce a plurality of datasets representative of magnetic levels. For each sensor element (e.g.element 620), the data sets correspond to relative levels of magneticflux for a horizontal band (e.g. band 622) that spans the width of thecheck from at least the leading edge 612 to the trailing edge 614 of thecheck.

In example embodiments, an example magnetic sensor may have ahalf-bridge structure with (strong) permanent magnet backing (bias). Themagnetic sensor may be a differential sensor with an output (voltage)proportional to the magnetic difference under the two magneto-resistivesections from the half-bridge. In an example embodiment the sensor mayhave ten sensor elements (also referred to herein as channels) eachbeing 10 mm wide and covering a total width of 100 mm. Thus along acenterline of the sensor 604 there may be no gap between consecutivesensing channels. As shown in FIG. 75, the odd and even channelsalternate across the centerline. This zigzagged offset may require asoftware correction when piecing together a magnetic image scan and/orperforming noise reductions algorithms on the sensor data.

In this described example embodiment of the sensor, the sensor elements602 in combination, span a vertical distance (e.g. 100 mm) which is morethan sufficient to span the height of standard personal or businesschecks. As shown in FIG. 84, an electrical circuit 800 coupled to themagnetic sensor (600) of the IDM may be comprised of: cascaded(band-pass) gains stages 606 (one for each sensor element/channel); amultiplexer 607, and A/D converter 608, and associated circuits (such aspower supply, decoupling filters). The digitized A/D data stream may bebuffered and packeted by the firmware/processor associated with the IDMand sent to a processor of a computer of the ATM through a USB 2.0interface or other communication device for further processing. Althoughin this described example embodiment, the processor associated with thecomputer of the ATM may be used to further process and evaluate the A/Ddata acquired from the magnetic scanner, as discussed previously, inalternative example embodiments, the processor of the IDM may performall or portions of the processing and evaluation of the A/D data.

In the example embodiment, the sampling rate may be set to 25 kHz (perchannel). A small RC low pass filter, consisting of a 100 Ohm resistorsand 0.01 Microfarad capacitor may be inserted before the multiplexer foreach channel to minimize the disturbance to the high gain stage duringmultiplexer switching. For example, this may be accomplished by having amuch larger capacitor (0.01 Microfarad) than the charged (discharged) on(off) capacitance (e.g. less than 100 picofarad) of the multiplexor.

In an example embodiment, the gain stage may have a relatively highvoltage gain (over 80 dB) and the circuit sensitivity may a have aminimum of about 2 μV per count (middle of the pass-band, assuming 8-bitA/D converter with a unipolar input range from 0 to 5V). At a giventransport speed of 500 mm/sec, or 0.05 mm/ms, the finest interval on aCMC7 check (with a minimum short interval of 0.24 mm) may determine thehigh side cutoff frequency: 0.5/0.24≈2.08 kHz. The high side cutofffrequency may be determined by the cascaded low-pass filter stages (6thorder modified Butterworth low-pass filter with two sections, eachcontaining a second order MFB inverting stage and a non-inverting firstorder stage). The low side cutoff frequency may be so selected that thedrooping is limited to an acceptable level. Two first order AC coupling(high-pass filter) stages may determine the low side cutoff frequency.

The cascaded gain stage may contain two identical sections. Each sectionmay be comprised of a second order (modified Butterworth) MFB low-passinverting (low) gains amplifier and a first order non-inverting (high)gain amplifier. An example block diagram of the cascaded gain stage inshown if FIG. 85. In this described example, the gain section forms athird order (modified) Butterworth low-pass filter with voltage gain (inthe middle of its pass-band) of about 42.3 dB. The cascaded gain stagewill therefore have a total gain of about 84.6 dB. Each gain section inthe cascaded gain stage may be comprised of a second order (modifiedButterworth) MFB low-pass inverting (low) gain amplifier and a firstorder non-inverting (high) gain amplifier, as shown in FIG. 86.

The AC coupling serves as a first order high-pass filter, which may notonly set the low cutoff frequency but may also help to break up thedirect DC coupling between stages (and sections) so that the offsetvoltage (drift) will not push the last gain stage into saturation.

In an example embodiment, the A/D conversion may produce a series of14,000 samples for each sensor element as the check passes across thesensor. The resulting data may be expressed as a 10 by 14,000 matrix ofsensor signal data. This matrix may correspond to a two dimensional areawhich is larger than the two dimensional surface area of a check. Forexample in an example embodiment the matrix may correspond to an area ofabout 10 cm by 28 cm (Height by Width). Because a standard sized checkmay have a much smaller size (e.g. 7 cm by 19 cm), one or more edges ofthe matrix may include data values captured when no portion of the checkwas adjacent the sensor.

Because of Op Amp offset (and drift), a baseline correction (or offsetremoval) calculation may be performed for each element in the matrix. Inthis described embodiment, each sensor element (or channel) may beassociated with a different Op Amp and thus a different offset value(μ). Thus for each row in the matrix, a different offset valueassociated with that row may be subtracted from and/or added to each ofthe 14000 data values in the row. In this described example embodimentan offset value for each of the ten rows may be determined bycalculating the average or mean of all of the data values in the row. Inan example embodiment, the matrix after, offset removal and/or othercalculations may be comprised of non-negative values which range from 0to 128.

In this described example embodiment, the matrix may be horizontallycontracted to produce a relatively smaller matrix with 280 data elements(referred to herein as pixels) in each of the ten rows. For example eachset of 50 consecutive data elements in a given row of the matrix may beaveraged to produce a value for a pixel. After contraction, the originalmatrix is reduced from 10 by 1400 data elements to 10 by 280 pixels.

Given the physical dimensions of the sensor, the transport speed of thecheck and the sample rate of the circuit which acquires data values fromthe sensor elements, in this described example embodiment, a pixel maycorrespond to an area on the check with magnetic presence of 1 by 10 mm²(orientated 10 mm in vertical height and 1 mm in horizontal length withrespect to the check shown in FIG. 71). For example, a check with a 72mm vertical height and 152 mm horizontal width may be represented by 7by 152 pixels. The maximum capacity of the described 10 by 280 pixelmatrix may accommodate a check as large as 100 mm by 280 mm. However, inother configurations of the IDM, other sizes of the pixels and or sensormay be used. In this described example embodiment, the contractions ofthe matrix introduces low-pass filtering due to the averaging of the 50data elements per pixel.

As discussed previously, the mechanical vibration caused by thetransport of the check across the magnetic sensor may introduceconsiderable noise. However, this vibration generally effects theplurality of sensor elements of the magnetic sensor in the same manner.As a result the vibration waveform which introduces noise into thesensor element signals is substantially similar for each sensor element.Therefore as used herein such vibration induced noise present in each ofthe 10 rows of the above described magnetic image map matrix is refereedto as a common mode noise.

The true magnetic signals corresponding to the magnetic ink on the checkare in general riding on top of the common mode noise and have asignificantly higher amplitude than the noise floor.

An example embodiment of the IDM is operative to take advantage of thesecharacteristics of the vibration induced noise in the magnetic signalsto further process the corrected matrix described above to remove commonmode noise. For example the above described contracted magnetic imagemap matrix may have a form as represented in Equation 1:

$\begin{matrix}{X = \begin{bmatrix}X_{1,1} & X_{1,2} & \ldots & X_{1,280} \\X_{2,1} & X_{2,2} & \ldots & X_{2,280} \\\vdots & \vdots & \; & \vdots \\X_{10,1} & X_{10,2} & \ldots & X_{10,280}\end{bmatrix}} & {EQ1}\end{matrix}$The example embodiment may derive an estimate for a common mode noisefloor (F) from the average of each column vector in the matrix (X). Forexample, the processor may calculate for each column of the matrix (X) acommon mode noise floor value (F) according to Equation 2 as follows:

$\begin{matrix}{F_{j} = {\frac{1}{10}{\sum\limits_{i = 1}^{10}\; m_{i,j}}}} & {EQ2}\end{matrix}$Here the subscript (i) represents rows 1-10 of the matrix (M) and thesubscript (j) represents the 1-280 columns of the matrix (X). Accordingto Equation 2, the common mode noise floor value (F) for each column (j)corresponds to the average or mean of the ten pixels values (m) in thecolumn.

Then for each pixel (m) in the matrix, the value of the pixel minus thecorresponding common mode noise floor value (F) for the column (j) inwhich the pixel resides may be compared to a common mode noisehysteresis threshold value (T_(h)) as shown in Equation 3:

$\begin{matrix}{X_{i,j} = \begin{Bmatrix}{{{m_{i,j} \times G_{L}\mspace{14mu}{if}\mspace{14mu} m_{i,j}} - F_{j}} < T_{H}} \\{{{m_{i,j} \times G_{H}\mspace{14mu}{if}\mspace{14mu} m_{i,j}} - F_{j}}\underset{\_}{>}T_{H}}\end{Bmatrix}} & {EQ3}\end{matrix}$

Here, if the difference between each pixel value and the correspondingcommon mode noise floor value (F) for the corresponding column is lessthen the hysteresis threshold value (T_(H)) then the pixel value in thematrix (X) is set to a new value corresponding to the pixel multipliedby a low gain parameter (G_(L)). However, if the difference is equal toor greater than the hysteresis threshold value (T_(H)) then the pixelvalue is set to a new value corresponding to the pixel multiplied by ahigh gain parameter (G_(H)). In this described example embodiment thehysteresis threshold value, low gain parameter (G_(L)), and high gainparameter (G_(H)) are configurable parameters in the IDM. Example valuesfor these parameters may include: T_(H)=4.0; G_(L)=0.0; and G_(H)=1.0.

The above described method with respect to Equations 1-3 correspond to acommon mode rejection algorithm which may be used to minimize theeffects of vibration so as to more accurately determine which pixels inthe image map generally correspond to the location of magnetic ink onthe check The above description is but one example of a calculation thatmay be performed on the magnetic sensor signals to remove common modenoise. In alternative example embodiments other methods may be used tofilter out noise in the magnetic sensor signals caused by mechanicalvibrations.

In example embodiments after the magnetic image scan matrix has beenprocessed to minimize the effects of common mode noise, calculationsinvolving passing the matrix through a zero-phase low pass filter may beperformed. In this described example embodiment, the filter may beapplied to each of the ten rows of the matrix (X) to produce anothermatrix (Y) according to Equations 4-6 as follows:

$\begin{matrix}{Y = \begin{bmatrix}Y_{1,1} & Y_{1,2} & \ldots & Y_{1,280} \\Y_{2,1} & Y_{2,2} & \ldots & Y_{2,280} \\\vdots & \vdots & \; & \vdots \\Y_{10,1} & Y_{10,2} & \ldots & Y_{10,280}\end{bmatrix}} & {EQ4}\end{matrix}$

$\begin{matrix}{Y_{i,j} = {{\frac{1}{{2w} + 1}{\sum\limits_{k = {j - w}}^{j + w}\;{X_{i,k}\mspace{14mu}{for}\mspace{14mu} j}}} > {{w\mspace{14mu}{or}\mspace{14mu} 280} - j} > w}} & {EQ5}\end{matrix}$

$\begin{matrix}{{Y_{i,j} = {{\frac{1}{{2\delta} + 1}{\sum\limits_{k = {j - \delta}}^{j + \delta}\;{X_{i,k}\mspace{14mu}{for}\mspace{14mu}\delta}}} = {w - j}}},{{j\underset{\_}{<}{w\mspace{14mu}{or}\mspace{14mu}\delta}} = {280 - j}},{{280 - j}\underset{\_}{<}w}} & {EQ6}\end{matrix}$

Here the subscript (i) represents rows 1-10 of the matrix (Y) and thesubscript (k) represents the 1-280 columns of the matrix (Y). Thesecalculations represent a moving average with a window of length 2*w+1,where w is the half window width. The average is calculated by addingthe current pixel (at X_(i,j)) and a predetermined number (w) of pixelsbefore and a predetermined number (w) of pixels after the current pixel.This sum is then divided by the sum of: 2w+1. However as shown inEquation 6, when the current pixel is equal to or less than thepredetermined number of pixels (w) from the edges of the matrix, thewindow width shrinks in size according to 2δ+1. In the described exampleembodiment the half window width number may be a configurable number ofpixels in the IDM (e.g. w=3).

FIG. 76 shows a further example method of dividing a check 630 into sixzones (zones 1-6) for purposes of determining whether a check is validor potentially fraudulent. Here at least zone 2 and in some embodiments,the combination of zones 1, 2 and 3 correspond to the MICR zone 632. Inthis described example embodiment the processor may identify the area ofthe check which falls within 16 mm or some other predefined distancefrom the bottom edge 642 of the check as the MICR zone. The other zones4, 5, and 6 form the check body or non-MICR zone with its height beingthe check height less 16 mm or other predetermined length for the MICRsection.

In addition the combination of zones 5 and 3 may correspond to a leadingblank zone (634) and the combination of zones 4 and 1 may correspond toa trailing blank zone (636). In this described example embodiment theprocessor may identify the area of the check which falls within 5 mm orsome other predefined distance from of the leading edge 638 of the checkas the leading blank zone. Likewise, the processor may identify the areaof the check which falls within 5 mm or some other predefined distancefrom the trailing edge 640 of the check as the trailing blank zone.

In this described example embodiment, for a valid check the processormay be operative to determine that the MICR characters have a magneticpresence as detected in the magnetic image scan matrix which falls inzone 2 (e.g within 16 mm of the bottom edge). Also, the processor may beoperative to determine that a check is potentially a fraudulent copy bydetermining that the magnetic image scan matrix shows the presence of amagnetic signal in the leading and/or trailing blank zones (e.g. within5 mm of the leading and/or trailing edges).

In addition an example embodiment may include a fuzzy logic like rulefor weighing the relevance of pixels in the leading and trailing blankzones. For example, pixels in columns of the matrix corresponding toportions of the check closest to the trailing and leading edges of thecheck may be assigned greater significance than pixels in columns of thematrix corresponding to portions of the check adjacent the interfaces(645, 647) between the leading and trailing blank zones and zone 6.

For example, in one example embodiment, the columns of the magneticimage scan matrix which correspond to the leading and trailing blankzones may be identified by the processor and the corresponding pixels inthose columns may be multiplied by weighing factors depending on theirrespective distance from the corresponding leading or trailing edges ofthe check. In an example embodiment of the IDM with a check transportspeed of about 0.5 mm/ms, the leading and trailing blank zones mayinclude about five matrix columns each. In one example, the weighingfactors may correspond to: 1, 1, 1, 0.5, 0.25. These five factors aremultiplied by the pixels in the corresponding five columns for each ofthe leading and trailing zones in the order shown progressing from highto low values respectively for the corresponding columns which progressinwardly from the edge of the check to adjacent zone 6.

By having the processor of the IDM assign (through weighing factors)less significance to pixels in the leading and trailing blank zonesadjacent zone 6, the accuracy of the IDM may be increased in cases wherevalid checks include stray magnetic ink near the leading and trailingblank zones. In alternative example embodiments, more than 5 pixels ineach row adjacent the edges of the check may be used. For example infurther example embodiments, eight pixels in from each edge of the checkmay be multiplied by weighing factors such as (1, 1, 1, 1, 0.5, 0.25,0.125, 0.0625).

In the example embodiment, the processor is operative to compare pixelsin the matrix to a magnetic presence threshold (T_(P)). If the pixelvalue is at or above the magnetic presence threshold (T_(P)), the pixelmay be regarded as being “dirty” or as having a magnetic presence. Ifthe pixel value is below the magnetic presence threshold (T_(P)), thepixel may be regarded as being “clean” or as not having a magneticpresence. An example magnetic presence threshold (T_(P)) used todetermine whether pixels are dirty or clean may correspond to a value ofT_(P)=10. Thus pixels with values 10 or greater may be considered dirtyand pixels with values lower than 10 may be considered clean. In theexample embodiment, the magnetic presence threshold (T_(P)) may beconfigurable in the IDM. When weighing factors are used, the weighingfactors may be multiplied by the pixel values before the pixel valuesare compared to the magnetic presence threshold (T_(P)).

In an example embodiment, when a zone has a total number of dirty pixelswhich is at or greater than a predetermined threshold for that zone,then the entire zone for that check may be considered as being dirty.For example with respect to the leading and trailing blank zones(referred together as the blank zone), if the blank zone has a totalnumber of dirty pixels at or above a blank zone threshold (T_(BD)), thenthe blank zone is considered to be dirty. If the total number of dirtypixels is below the blank zone threshold (T_(BD)), then the blank zoneis considered to be clean.

In an example embodiment, the blank zone threshold (T_(BD)) may be aconfigurable parameter. In addition, the blank zone threshold (T_(BD))may also vary depending on the size of the check detected by the IDM.For example, for a relatively larger business check (vertical heightgreater than 68 mm for example) the processor may use a blank zonethreshold such as T_(BD)=18. However for a relatively smaller personalcheck (vertical height less than or equal to 68 mm for example) theprocessor may use a relatively smaller blank zone threshold such asT_(BD)=15.

In addition to the leading and trailing blank zones, the processor mayalso classify the pixels in zone 6 or the background zone as havingeither dirty or clean pixels by comparing the pixels to the magneticpresence threshold (T_(P)) value. Here if zone 6 has a total number ofdirty pixels at or above a zone 6 threshold (T_(Z6D)), then zone 6 isconsidered to be dirty. If the total number of dirty pixels is below thezone 6 threshold (T_(Z6D)), then zone 6 is considered to be clean. In anexample embodiment, zone 6 threshold (T_(Z6D)) may be a configurableparameter with a default value such as T_(Z6D)=25.

In example embodiments, the classification of zone 6 as dirty does notnecessarily indicate that the check is a copy. As discussed previously,a valid check may also include magnetic ink in zone 6 of a check.However, the presence of magnetic material in zone 6 may indicate thatthe current check has a relatively higher probability of being a copy,which among other factors evaluated by the processor may cumulativelyresult in the check being classified as a potentially fraudulent copy.

As discussed preciously, the IDM is operative to determine if the MICRzone includes a magnetic presence. This determination may also be madeby determining the number of pixels in the MICR zone which are at orabove the magnetic presence threshold (T_(P)). FIG. 77 shows an exampleof scanning paths for the ten different magnetic sensing elements orchannels 670 of the example magnetic sensor superimposed on a check 672.Each of the ten sensor channels correspond to the 10 rows of the abovedescribed magnetic image scan matrix. The pixels in the first twochannels 674, 676 (or rows) adjacent the bottom edge of the check areused to determine if the MICR line includes a magnetic presence andwhether or not the MICR zone is dirty or clean.

As shown in Equation 7, the processor is operative to calculate for eachcolumn of the matrix, the mean square sum (S) of pairs of pixels (P1)and (P2) in the column which are from the first and second channels(674, 676) respectively of the sensor (or rows of the matrix).S=√{square root over (P ₁ ² +P ₂ ²)}  EQ7Here S corresponds to the combined MICR pixel for the two rows orchannels adjacent the MICR zone. If the pixel for a given row from thesecond channel (P₂) has a value of zero and the combined MICR pixel (S)for the row is greater than the presence threshold (T_(P)), then thecombined pixel is considered to be a dirty pixel and is not used todetermine if the MICR line is present. However, if the value of thepixel in the second channel (P₂) is not equal to zero and the combinedMICR pixel (S) for the given row is greater than the presence thresholdT_(P), then the combined pixel (S) is considered to indicate that MICRis present.

If the total number of combined pixels in the MICR zone which indicatethat MICR is present is equal to or greater than a MICR presencethreshold (T_(MP)) than the MICR line may be classified as beingpresent. Whereas if the total of the MICR present pixels is less thanthe MICR presence threshold (T_(MP)) than the MICR line may beconsidered absent. In an example embodiment, the MICR presence threshold(T_(MP)) may be a configurable parameter of the IDM with a default valuesuch as T_(MP)=40.

A determination that the MICR line is present may weigh in favor of thecheck being valid. However, in addition to determining whether the MICRline is present, the processor may also determine whether the MICR zoneis dirty. For example if the total number of dirty pixels in the MICRzone is greater than or equal to a MICR dirty threshold (T_(MD)), thenthe MICR zone is considered to be dirty. A dirty MICR zone is a strongindicator that the check is a copy. In an example embodiment, MICR dirtythreshold (T_(MD)) may be a configurable parameter with a default valuesuch as T_(MD)=5. In this described example embodiment, a determinationas to whether MICR pixels are clean or dirty may only be performed onMICR right checks. All MICR pixels may be considered to be clean forMICR left checks.

In an example embodiment, the processor may classify a check as good ora potential fraudulent copy responsive to a table or set of rules whichdefine whether the MICR line is present or absent and defines for eachzone whether the zone includes dirty or clean pixels. FIG. 78 shows anexample of such a table 650.

In further example embodiments, the processor may be operative toevaluate the presence or absence of dirty or clean pixels in each of thezones, and other characteristics of the pixels in the magnetic imagescan matrix to derive a confidence level for the check ranging from highto low. Here a high confidence level indicates a high probability thatthe check is valid and a low confidence level indicates a lowprobability that the check is valid. For example as shown in the tablein FIG. 78 (at the row referenced with reference numeral 651), a checkwith: a MICR line present in the MICR zone, clean pixels in the leadingand trailing zones, and a clean zone 6 may correspond to a highconfidence level that the check is good. As a result the processor mayclassify the check as being good. However, if such a check has even onedirty pixel in the zone 6, the confidence level may drop to a mediumlevel (as shown in the row referenced with reference numeral 652).Depending on the sensitivity setting of the IDM, such characteristicsmay still result in the check being classified as being good as long asthe blank zone and MICR zone have clean pixels and the a MICR line ispresent in the MICR zone.

However, in further example embodiments, the processor may be operativeto evaluate other characteristics of the pixels in zone 6 or elsewhereto determine a confidence level for a check. For example, if themajority of zone 6 includes dirty pixels, whereas valid checksstatistically have a reactively lower number of dirty pixels or lowerintensity dirty pixels, then the processor may be operative to assign alow confidence level to the check even though magnetic ink is allowed inzone 6 of valid checks.

In example embodiments, the rules in the table 650 shown in FIG. 78 oralternative sets of rules for different and/or additional types of zonesof the check may be used by the processor to calculate the confidencelevel. The IDM may then include a configurable sensitivity setting whichis compared to a determined confidence level for a check to determinewhether the check is good or is a copy. Also, in further exampleembodiments, information obtained regarding the magnetic image map maybe combined with magnetic character recognition of the MICR linecharacters, optical features of the check, optical character recognition(OCR) information obtained from the check, and/or other informationobtained from the check for use with determining a confidence level forthe check.

Examples of optical check features which the example processor may beadapted to evaluate for an optical image scan of a check may includewhether all or portions of the check are undersized or oversizedrelative statistically normal checks. Also features evaluated mayinclude whether portions of the check are too light or too dark. Furtherfeatures evaluated may include whether printed text, lines, and graphicsare oriented at skewed angles which are not sufficiently close to beingparallel or normal to the bottom edge of the check as would be expectedfor similar features with statistically normal checks.

In addition the optical check image may be evaluated for the presence ofhorizontal or vertical streaks, excessive spot noise, folded corners,torn corners, clipped corners, folded or torn edges, text or otherprinted features which are blurry. Also, the scans of the front and backof the check may be compared to determine if features such as theendorsement lines are located adjacent on the wrong side of the checkwith respect to the orientation of printed features on the front of thecheck.

In further example embodiments, the quality, usability, presence, and/oruse of different portions of the check may be evaluated such as sectionsof the check associated with the payor name, payor bank, date, payee,courtesy amount, legal amount, memo, signature, MICR, payee endorsement,bank of depositor endorsement, transit endorsement.

In an example embodiment one or more of the above described evaluationsor tests of the check may be performed. The results of the tests may beconsidered as failed or passed with a passed test representing the casewhere the results of the test correspond to the results expected for astatistically normal check. In further example embodiments, each testmay correspond to a range of confidence values representing the level ofconfidence for which the results from the test corresponds to astatistically normal check. A total confidence level for the opticalscan may then be determined responsive to each of the individual testsperformed. The confidence levels associated with the optical image scanand magnetic image scan may then individually or in combination beevaluated and/or compared to a sensitivity setting of the IDM todetermine if the check is a good or a copy.

In further example embodiments, the IDM may be configurable so as toenable one or more of the tests to be flagged as requiring a passingresult. Thus for each check if any one of the flagged tests whichrequire a passing result evaluates to a failed result, then the entirecheck will be classified as being a copy and/or will be rejected fordeposit.

In example embodiments, the IDM may transfer optical scans (front andback) of the check to a server remote from the ATM. The IDM may initialgenerate grayscale images of the front and back of the check. However,the server which receives electronic images of the check, may prefer theimages to be saved in a black and white format which may have a smallerfile size. As a result, the processor may be operative to convert eachgrayscale image to a black and white equivalent. In an exampleembodiment, the above described tests of the optical image scan may beperformed on the grayscale image, the black and white image, or bothtypes of images.

In one example embodiment, the processor may be operative to generate aplurality of different black and white images from each scannedgrayscale image. Each black and white image may be generated responsiveto a different threshold value for determining whether to convert agrayscale pixel to either a white or black pixel. Each of thesedifferent black and white images may be evaluated based on one or moreof the previously described tests. The processor may then select theblack and white image which has the highest relative confidence level totransfer to a server associated with the ATM.

In example embodiments, the IDM may be operative to detect the locationof the magnetic MICR line (whether on top or bottom of a document and/orwhether adjacent an upper or lower edge of document). Responsive to thisdetermined location of the MICR line, the IDM may be operative to setthe likely orientation of the check for purposes evaluating opticalcharacteristics of the check as described previously. However, indocuments without known or consistent magnetic features such as a MICRline, the orientation of the document may not be determinable based on amagnetic scan. In such cases, the IDM may be operative to determine theorientation of the document by evaluating a specific field (e.g. accountnumber field) on the document with characters of a particular font type.The processor may use a template to define a window on the image wherethe given field is expected to be located. The template may also definethe font type expected to be present in the window, a minimum/maximumnumber and/or specific types of characters (e.g. “:” or “<” characters)expected to be present in the window, and/or other characteristics ortests used to determine a confidence level for the field beingevaluated.

In this described embodiment, both a top and a bottom of the documentare optically scanned. The field in one of the scanned images (e.g. thetop scan) of the document may be evaluated assuming the document was ina first orientation when scanned. Such an assumed orientation maycorrespond to the side of the document containing the field to beevaluated being orientated face up and rotated in a particular manner.For the assumed first orientation, if the determined confidence levelfor the field is above a predetermined threshold and/or one or moreother tests are consistent with the field having characters specified bythe template, then the processor is operative to processes the images asdescribed previously based on the document being determined to be in thefirst orientation.

However, if a determined confidence level for the field is below apredetermined threshold and/or one or more other tests are inconsistentwith the field having characters specified by the template, theprocessor may be operative to reevaluate the field in the previouslyevaluated scanned image (e.g. top scan) assuming the document was in asecond orientation such as being rotated 180° with respect to the firstorientation. For the second orientation if a determined confidence levelfor the field is still below a predetermined threshold and/or one ormore other tests are inconsistent with the field having charactersspecified by the template, the processor may be operative to reevaluatethe field in the other one of the scanned images (e.g. bottom scan)assuming the document was in a third orientation such as when thedocument is oriented face down. For the third orientation if adetermined confidence level for the field is still below a predeterminedthreshold and/or one or more other tests are inconsistent with the fieldhaving characters specified by the template, the processor may beoperative to reevaluate the field in the previously evaluated scan image(e.g. bottom scan) assuming the document was in a fourth orientationsuch as when the document is face down and rotated 180° with respect tothe third orientation. For each of these different orientations, if thedetermined confidence level is below a predetermined threshold and/orone or more other tests are inconsistent with the field havingcharacters specified by the template, the document may be rejected andreturned to the customer.

In this described embodiment, the processor is operative to detect whena predetermined number of documents being scanned are consistentlyor/are predominantly in the second or other orientation rather then thefirst orientation. In response to this detection, the processor may beoperative to begin testing subsequent images assuming the documentsbeing scanned are initially in the second or other orientation ratherthan the first orientation.

In example embodiments, the magnetic sensor may be used to read thenumeric characters and/or other symbols which are present in the MICRline. In one example embodiment, as each character of the check moveshorizontally across the sensor, a wave form is detected by the sensorwhich varies responsive to the variation in density of magnetic ink fromthe leading edge of the character to the trailing edge of the character.FIG. 79 shows an example of different numeric symbols (0 through 9) andnon-numeric symbols (Transit, Amount, On-Us, and Dash) for the U.S.standard MICR E-13B font and their corresponding waveforms as generatedby an example embodiment of the magnetic sensor.

In one example embodiment, to magnetically recognize the MICRcharacters, each detected waveform for the MICR characters may beevaluated to identify peaks in the waveform. Characteristics of each ofthe peak positions (as described below) may be determined to form afeature vector (V). Each detected character will have a set of peaks andthus a different feature vector. The feature vector for the detectedcharacter may be correlated to the feature vector for each of thefourteen standard MICR E-13B characters. The standard E-13B characterwhich has the highest correlation to the detected wave form isidentified as the recognized character for the detected waveform. FIG.80 shows an example of a table of the MICR E-13B characters (columnlabels) and their corresponding determined peak features which comprisetheir respective feature vector. Here the values associated with thepeaks for each character are shown in order of their detection in timefrom the top of the table to the bottom in each column of the table.

In an example embodiment, the peak detection may begin by identifyingthe amplitude and its associated time along the waveform for allpotential minimum and maximum peaks in the wave form for a detectedcharacter. FIG. 81 shows a portion of an example detected waveform for adetected MICR character with two peaks (722, 724).

Detected waveforms may include thin spikes which may be recognized aspeaks but are actually the result of transient noise (spikes). Thepresence of such peaks may distort the feature vector for a charactermaking it difficult to accurately recognize the character. However, truepeaks may have a substantial area under the curve of the peak comparedto transient noise spikes. Thus the example embodiment is operative todetermine a weight value for each peak which corresponds to an areaunder the curve of the peak. Only peaks which have a weight above apredetermined threshold may be classified as true peaks for purposes ofdetermining the values of the feature vector for a detected MICRcharacter.

In an example embodiment, the weight for each peak may be calculated byintegrating the portion of the waveform which corresponds to the peak.Equation 8 shows an example of the calculation used to determine theweight (w) of a peak found at time (x) for the detected waveform of aMICR character on a check.

$\begin{matrix}{{w(x)} = {\int_{x - h}^{x + h}{{f(t)}\ {\mathbb{d}t}}}} & {EQ8}\end{matrix}$Here f(t) is the detected waveform and h is a half window width. Theshaded areas shown in FIG. 82 show an example of the calculated areas orweights determined for the peaks 722, 824

Although the weight of a peak may be used to distinguish true peaks fromtransient noise spikes, the weight of a peak may be very sensitive tobaseline (offset) drift from the magnetic sensor. As a result arelatively “flat” peak due to baseline drift could have a significantweight value, while a true peak with low amplitude (like the fifth peakin E13B symbol “7” (generally shown with reference numeral 700 in FIG.79) may have a very small weight.

In example embodiments a cut function may be calculated whichcorresponds to a modified area under the wave form curve which may beused to more accurately distinguish smaller true peaks from peaksproduced by baseline drift. An example of a cut function c(x) is shownin Equation 9.c(x)=w(x)−h[f(x−h)+f(x+h)]  EQ9The shaded areas shown in FIG. 83 show an example of the cut areas c(x)or modified weights determined for the peaks 722, 824. In an exampleembodiment, cut area values above a predetermined threshold may used todetermine which peaks in a detected wave form curve are to be used toform a feature vector for the MICR character.

As discussed previously, in an example embodiment a correlationcalculation may be performed between the determined feature vector of adetected waveform and each of the feature vectors for the standard E-13BMICR characters. In an example embodiment a Pearson correlation may beused to produce a correlation coefficient which is a quantity that givesthe quality of a least squares fitting to the original data. A higherPearson correlation coefficient indicates a higher correlation betweendata sets, while a relatively lower Pearson correlation coefficientindicates a lower correlation between data sets. In an exampleembodiment, a correlation value of 1.0 corresponds to an exact matchbetween the detected feature vector and the feature vector of a standardE-13B character. In practice an exact match may be rare; however, asdiscussed previously, correlation coefficients which are closer to avalue of 1.0 correspond to a relatively higher correlation between datasets than correlation coefficients that are relatively smaller in value.Thus, of the fourteen standard E-13B characters the detected waveform isbeing correlated against, the character which produces the highestcorrelation coefficient with respect to the detected character may bedetermined by a processor as the correct match for the detectedcharacter.

It is to be understood, that although a Pearson correlation has beendescribed in the above example embodiments, in alternative exampleembodiments, other types of correlation calculations may be used todetermine which of the fourteen standard E-13B characters most closelymatches a MICR line character on a check. Further, although the abovedescribed example method discusses characters on a check in the E-13Bfont, in other example embodiments, the above described detection methodmay be used to magnetically detect characters printed on checks in othertypes of fonts (e.g. CMC7 font) in the MICR line or elsewhere.

Also, in further example embodiments, different MICR fonts may bedetected using different circuits connected in parallel to the magneticsensor. Each of the different circuits may be tuned to more accuratelycapture waveforms which properly distinguish the characters in thedifferent respective MICR fonts.

FIG. 88 shows an example of a three-dimensional graphical representation900 of magnetic patterns on a check as detected by an example embodimentof the IDM. The grayscale features 902 projecting from a surface 904representation of the check correspond to the levels of the magneticsignals detected at the corresponding locations on the check. Thevertically higher the grayscale feature, the relatively stronger themagnetic signal for that location. The absence of grayscale features onportions 906 of the check indicates that magnetic signals were eithernot detected or were below a minimum threshold for those portions on thecheck. In an embodiment a diagnostic software application may be adaptedto generate such a three-dimensional graphical representation of themagnetic patterns on documents responsive to magnetic scans produced byembodiments of the IDM. Such graphical representations 900 produced bythe software for a given document may be used to aid a user inidentifying magnetic features useful for identifying the type or othercharacteristics of the document. Information about the identifiedmagnetic features may then be incorporated into the programming of anIDM

For example, an embodiment of the invention may include a method ofgenerating such three dimensional graphs through operation of a computerand displaying such graphs through a display device. The graphs may begenerated from magnetic scans directly received from an operating IDM,or the graphs may be generated from magmatic scans previously generatedby an IDM and stored in a data store.

In this described example embodiment, the method may also include a useridentifying two dimensional areas or zones on the check which may and/ormay not be associated with magnetic signals of particular levels. Themethod may also include storing through operation of a processor theidentified areas and levels in a data store in operative connection withthe IDM. The method may also include configuring and/or programming theIDM so that the processor in the IDM is responsive to the stored datawhen evaluating documents processed by the IDM.

Computer software instructions used in operating the automated bankingmachines and connected computers may be loaded from computer readablemedia or articles of various types into the respective computers. Suchcomputer software may be included on and loaded from one or morearticles such as diskettes, compact disks, CDs, DVDs, tapes, flashmemory device, hard drives and/or other internal or portable storagedevices placed in operative connection with the automated bankingmachine. Other articles which include data representative of theinstructions for operating computers in the manner described herein aresuitable for use in achieving operation of automated banking machinesand systems in accordance with example embodiments.

The example embodiments of the automated banking machines and systemsdescribed herein have been described with reference to particularsoftware components and features. Other embodiments of the invention mayinclude other or different software components which provide similarfunctionality.

Thus the deposit accepting apparatus and system of the exampleembodiments achieve at least some of the above stated objectives,eliminate difficulties encountered in the use of prior devices andsystems, and attain the useful results described herein.

In the foregoing description certain terms have been described asexample embodiments for purposes of brevity, clarity and understanding.However no unnecessary limitations are to be implied therefrom becausesuch terms are used for descriptive purposes and are intended to bebroadly construed. Moreover the descriptions and illustrations hereinare by way of examples and the invention is not limited to the featuresshown or described.

Further, in the following claims any feature described as a means forperforming a function shall be construed as encompassing any means knownto those skilled in the art as being capable of carrying out the recitedfunction, and shall not be deemed limited to the particular means shownor described for performing the recited function in the foregoingdescription, or mere equivalents thereof.

Having described the features, discoveries and principles of theinvention, the manner in which it is constructed and operated, any ofthe advantages and useful results attained; the new and usefulstructures, devices, elements, arrangements, parts, combinations,systems, equipment, operations, methods, processes and relationships areset forth in the appended claims.

1. A method comprising: a) moving a check across a magnetic sensor in acash dispensing automated banking machine, wherein the check has awidth, wherein the check has a length in a first direction, wherein themagnetic sensor comprises a plurality of sensor elements arranged alongat least one column extending generally transverse of the firstdirection, wherein the automated banking machine includes at least oneprocessor; b) acquiring magnetic signals from each sensor element as thecheck moves across the magnetic sensor, wherein the magnetic signals areacquired from a plurality of locations generally spanning the width andthe length of the check; c) through operation of the at least oneprocessor in the automated banking machine, generating at least onefirst matrix, wherein the first matrix comprises a plurality of sensorvalues included in a plurality of rows and columns, wherein theplurality of sensor values correspond to a plurality of portions of themagnetic signals acquired in (b); d) carrying out through operation ofthe at least one processor in the automated banking machine at least onepredetermined matrix modifying calculation with the first matrix, toproduce at least one modified matrix that includes a plurality ofmodified matrix values, wherein the at least one predetermined matrixmodifying calculation includes calculating a modified matrix value forthe at least one modified matrix that corresponds to a value in thefirst matrix, wherein the modified matrix value is calculated with theat least one predetermined matrix modifying calculation responsive tothe value in the first matrix and at least one other value in the firstmatrix adjacent to the value in the first matrix; e) through operationof the at least one processor, identifying a plurality of sets ofmodified matrix values in the modified matrix, wherein each setrespectively corresponds to a different zone on the check; f) throughoperation of the at least one processor in the automated bankingmachine, determining that the check is acceptable to be deposited intothe automated banking machine responsive to the plurality of sets ofmodified matrix values identified in (e) for the respective differentzones on the check.
 2. The method according to claim 1, wherein in (c)the values in each row in the first matrix correspond to a plurality ofsensor values acquired from a respective one of the sensor elements ofthe magnetic sensor.
 3. The method according to claim 2, wherein in (d)the at least one predetermined matrix modifying calculation is operativeto modify values in the first matrix to offset relative differences insignal output characteristics of the sensor elements.
 4. The methodaccording to claim 2, wherein in (d) the at least one predeterminedmatrix modifying calculation includes: i) calculating for each row inthe first matrix an offset value generated responsive to values in eachrespective row; and ii) subtracting each respective offset value fromvalues in each respective row from which the respective offset value wascalculated in (i).
 5. The method according to claim 4, wherein eachrespective offset value for each respective row substantiallycorresponds to the mean of the values in the respective row.
 6. Themethod according to claim 1, wherein in (d) the at least one modifiedmatrix is produced with a lower total number of columns than the firstmatrix.
 7. The method according to claim 6, wherein the first matrixincludes a plurality of consecutive sets of columns, wherein each set ofcolumns in the first matrix is comprised of a plurality of consecutivecolumns, wherein the at least one matrix modifying calculation includesgenerating values in each sequential column in the at least one modifiedmatrix responsive to the values in each respective sequential set ofcolumns in the first matrix, wherein each value in each row in eachrespective column in the modified matrix substantially corresponds tothe average of values in the first matrix for the respective row in theplurality of consecutive columns in the respective set of columns fromwhich each value in the modified matrix is generated.
 8. The methodaccording to claim 1, wherein the at least one matrix modifyingcalculation includes modifying at least a portion of the values of thefirst matrix to minimize the effects of common mode noise on the valuesin the first matrix caused from mechanical vibration of the magneticsensor.
 9. The method according to claim 1, wherein the at least onematrix modifying calculation includes: i) calculating for each column acalculated value generated responsive to values in each respectivecolumn in the first matrix; ii) for respective values in respectivecolumns in the first matrix, determining at least one respectiverelationship between at least one threshold value and the differencebetween each respective calculated value and the respective value in therespective column from which the respective calculated value wascalculated in (i); iii) producing respective values for the at least onemodified matrix responsive to the respective relationship determined in(ii) for the respective value.
 10. The method according to claim 9,wherein in (i) each calculated value for each respective columnsubstantially corresponds to the mean of values in the respectivecolumn.
 11. The method according to claim 10, wherein in (ii) when therespective relationship corresponds to the difference between arespective calculated value and a respective value in the respectivecolumn from which the respective calculated value was calculated in (i)being less than the at least one threshold value, then the respectivevalue produced in (iii) is produced responsive to a first predeterminedvalue.
 12. The method according to claim 1, wherein the at least onematrix modifying calculation includes modifying at least a portion ofthe values in the first matrix responsive to a zero-phase low passfilter.
 13. The method according to claim 1, wherein the at least onematrix modifying calculation includes: i) for respective values in eachrespective row of the first matrix, generating a new respective value inthe at least one modified matrix corresponding to an average of a set ofvalues in the respective row of the first matrix, wherein each setincludes the respective value of the first matrix, and values in therespective row within a predetermined number of consecutive columnsadjacent at least one side of the column that includes the respectivevalue in the first matrix.
 14. The method according to claim 1, whereinat least one zone on the check includes a border with at least one otherzone, wherein (f) includes reducing at least one value in the modifiedmatrix corresponding to a location on the check adjacent the borderresponsive to at least one weighing factor, wherein the determination in(f) is made responsive to the reduced at least one value.
 15. The methodaccording to claim 1, wherein in (d) the first matrix is modified tocorrespond to the at least one modified matrix.
 16. The method accordingto claim 1, wherein the automated banking machine includes at least onetransport and a storage area, further comprising through operation ofthe at least one processor responsive to (f), causing the at least onetransport in the automated banking machine to move the check to thestorage area in the automated banking machine.
 17. Computer readablemedia bearing computer executable instructions operative to cause atleast one processor in a cash dispensing automated banking machine tocause the automated banking machine to carry out a method comprising: a)moving a check across a magnetic sensor in the cash dispensing automatedbanking machine, wherein the check has a width, wherein the check has alength in a first direction, wherein the magnetic sensor comprises aplurality of sensor elements arranged along at least one columnextending generally transverse of the first direction; b) acquiringmagnetic signals from each sensor element as the check moves across themagnetic sensor, wherein the magnetic signals are acquired from aplurality of locations generally spanning the width and the length ofthe check; c) through operation of the at least one processor in theautomated banking machine, generating at least one first matrix, whereinthe first matrix comprises a plurality of sensor values included in aplurality of rows and columns, wherein the plurality of sensor valuescorrespond to a plurality of portions of the magnetic signals acquiredin (b); d) carrying out through operation of the at least one processorin the automated banking machine at least one predetermined matrixmodifying calculation with the first matrix, to produce at least onemodified matrix that includes a plurality of modified matrix values,wherein the at least one predetermined matrix modifying calculationincludes calculating a modified matrix value for in the at least onemodified matrix that corresponds to a value in the first matrix, whereinthe modified matrix value is calculated with the at least onepredetermined matrix modifying calculation responsive to the value inthe first matrix and at least one other value in the first matrixadjacent to the value in the first matrix; e) through operation of theat least one processor, identifying a plurality of sets of modifiedmatrix values in the modified matrix, wherein each set respectivelycorresponds to a different zone on the check; f) through operation ofthe at least one processor in the automated banking machine, determiningthat the check is acceptable to be deposited into the automated bankingmachine responsive to the plurality of sets of modified matrix valuesidentified in (e) for the respective different zones on the check. 18.The method according to claim 1, wherein the plurality of sets ofmodified matrix values identified in (d) correspond to respectivedifferent identified zones on the check corresponding to a magnetic inkcharacter recognition (“MICR”) zone that includes MICR characterstherein and at least one zone on the check that does not include MICRcharacters therein, wherein (f) includes determining that the check isacceptable to be deposited into the automated banking machine responsiveto predetermined rules regarding data representative of a level ofmagnetic signals in the respective identified zones.
 19. A methodcomprising: a) moving a check across a magnetic sensor in an automatedbanking machine, wherein the check has a width, wherein the check has alength in a first direction, wherein the magnetic sensor comprises aplurality of sensor elements arranged along at least one columnextending generally transverse of the first direction, wherein theautomated banking machine includes at least one processor; b) acquiringmagnetic signals from each sensor element as the check moves across themagnetic sensor, wherein the magnetic signals are acquired from aplurality of locations generally spanning the width and the length ofthe check; c) through operation of the at least one processor in theautomated banking machine, generating data corresponding to at least onefirst matrix, wherein the first matrix comprises data corresponding to aplurality of sensor values included in a plurality of rows and columns,wherein the plurality of sensor values correspond to a plurality ofportions of the magnetic signals acquired in (b); d) carrying outthrough operation of the at least one processor in the automated bankingmachine at least one predetermined matrix modifying calculation with thefirst matrix, to produce data corresponding to at least one modifiedmatrix that includes a plurality of modified matrix values, wherein theat least one predetermined matrix modifying calculation includescalculating a modified matrix value for the at least one modified matrixthat corresponds to a value in the first matrix, responsive at least inpart to the value in the first matrix and at least one other value inthe first matrix adjacent to the value in the first matrix, e) throughoperation of the at least one processor in the automated bankingmachine, identifying a plurality of sets of modified matrix values inthe modified matrix, wherein each set respectively corresponds to one ofa plurality of different zones on the check, wherein the different zoneson the check include a magnetic ink character recognition (“MICR”) zonethat includes MICR characters therein, and at least one zone on thecheck that does not include MICR characters therein; f) throughoperation of the at least one processor in the automated bankingmachine, determining that the check is acceptable to be deposited intothe automated banking machine responsive at least in part to theplurality of sets of modified matrix values identified in (e) for theplurality of different zones on the check and data corresponding topredetermined rules regarding data representative of a level of magneticsignals in the respective different zones on the check.