Variable deposits maximums for a digital cash deposit digitization service

ABSTRACT

A system and method are disclosed in which cash deposits may be made at merchant locations who support such deposits. Using a mobile phone or other hand-held device, a bank customer requests a cash deposit from a banking app, receives a barcode on the mobile device, the barcode containing embedded information indicating the cash deposit amount, and presents the barcode to the merchant, along with the cash to be deposited. Once the transaction with the merchant is complete, the account of the bank customer&#39;s account is credited with the cash amount. The bank uses behavioral and historical data of the bank customer to customize a cash deposit limit for the customer.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/678,200, filed on Nov. 8, 2019, which is a continuation of U.S.patent application Ser. No. 16/515,004, filed on Jul. 17, 2019, now U.S.Pat. No. 10,510,069. The contents of the aforementioned U.S. patent andpatent applications are incorporated herein by reference.

BACKGROUND

Bank customers like the convenience of Automated Teller Machines (ATMs).ATMs allow customers to obtain information about their bank account,such as account balances, and also enable cash deposits and withdrawalsto be made 24-hours a day. ATMs may be located inside a bank or on itspremises, in convenience and grocery stores, and in malls, airports, andsports arenas. Free-standing ATMs not associated with any one businessmay also be found in some locations.

In some communities, though, ATMs are difficult to find. Because theyare often associated with businesses, ATMs are harder to find in somesuburban communities in which there is not much commerce. Those livingin rural communities may have to travel far to find an ATM. For thosecustomers, ATMs are not so convenient.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing aspects and many of the attendant advantages of thisdocument will become more readily appreciated as the same becomes betterunderstood by reference to the following detailed description, whentaken in conjunction with the accompanying drawings, wherein likereference numerals refer to like parts throughout the various views,unless otherwise specified.

FIG. 1 is a simplified block diagram of a cash deposit digitizationsystem, according to some embodiments.

FIG. 2 is a simplified block diagram of a cash deposit digitizationmethod, according to some embodiments.

FIG. 3 is a flow diagram illustrating how machine learning is used todetermine a cash deposit limit for the bank customer in real-time by thecash deposit digitization of FIGS. 1 and 2, according to someembodiments.

FIG. 4 is a flow diagram showing the cash deposit digitization from thecustomer perspective, according to some embodiments.

FIG. 5 is a flow diagram showing the cash deposit digitizationoperations from the bank perspective, according to some embodiments.

FIG. 6 is an illustration of an exemplary computing architecture forimplementing the cash deposit digitization of FIGS. 1 and 2, accordingto some embodiments.

DETAILED DESCRIPTION

In accordance with the embodiments described herein, a system and methodare disclosed in which cash deposits may be made at merchant locationswho support such deposits. Using a mobile phone or other hand-helddevice, a bank customer requests a cash deposit from a banking app,receives a barcode on the mobile device, the barcode containing embeddedinformation indicating the cash deposit, and presents the barcode to themerchant premises, along with the cash to be deposited. Once thetransaction with the merchant is complete, the account of the bankcustomer's account is credited with the cash amount. The bank usesbehavioral and historical data of the bank customer to customize a cashdeposit limit for the customer.

Evolution of the Banking Relationship

Banks and other financial institutions provide a number of differentservices involving finances, most notably, a checking or savingsaccount. Hereinafter, a reference to a “bank” is meant to encompassother financial institutions, including, but not limited to creditunions, savings and loan institutions, financial services providers, andso forth. Initially, a customer of a bank would rely on a passbook, abooklet issued by the bank, enabling the accountholder to personallyrecord how much money had been deposited or withdrawn from the account.More recently, an accountholder would receive a statement, usuallymonthly, in the mail.

With the advent of personal computers, banks began providing accountstatements by electronic mail for those users who selected the feature,such as being part of the institution's “paperless” option. Today, manybanks enable customers to access their account information by way of apersonal computer, laptop, tablet, notebook, pad, personal digitalassistant, or other devices that have access to the Internet. Byaccessing a web page and providing a username and password asauthentication, the user is able to receive a wealth of informationabout the bank account, including recent purchases and deposits,transaction entities, bank statements, and so on. These web accessesalso enable transactions to take place, known colloquially as “onlinebanking” in which automatic payments may be scheduled and money may betransferred between different accounts of the user, to a third-partyaccount within the same bank, and even to third-party accounts withanother bank. Relying on this Internet-based access, today'saccountholder may view the current balance of an account twenty-fourhours a day, seven days a week.

With the proliferation of hand-held device technology, such as smartphones, many banks have made applications (known colloquially as “apps”)available to their customers. As long as the smartphone is able toaccess the Internet, the bank may provide a downloadable app foraccessing a customer's bank account from the smartphone. Similar to theweb page, the app, once selected, will generally request a username andpassword to authenticate the user. Alternatively, some apps enableaccess using a fingerprint or voiceprint to authenticate the user. Onceauthenticated, the user is able to review the account, such as to obtainbalance information, scroll through transactions, make transfers toanother account, deposit checks, and so on. These apps are intended toenhance the convenience for the accountholder. So, in addition to beingable to access one's checking account by accessing a web page, a usermay similarly access the account by enabling the app on a smartphone orother hand-held device.

Cash Deposit Digitization

FIG. 1 is a simplified block diagram of a cash deposit digitizationsystem 100, according to some embodiments. The cash deposit digitizationsystem 100 consists of a mobile device, such as a cellphone, smartphone,or tablet, which is in communication with a bank server 108, and whichis used to invoke a cash deposit at a cash deposit merchant 118. Thecash deposit merchant 118, as used herein, is neither the bankaffiliated with the bank server nor an ATM affiliated with any bank.Instead, the cash deposit merchant 118 is a store, examples of whichinclude, but are not limited to, a drugstore, a grocery store, aconvenience store, or any other business in which members of the publicare invited to shop for goods or services offered by the business. Themobile device 102 communicates wirelessly with the bank server 108 byway of a bank app 104. The wireless communication may take place via theInternet, a local area network (LAN), a wide-area network (WAN), awireless LAN (WLAN), a wireless WAN (WWAN), a proprietary network, andso on. The bank app 104 may be the same app used by a customer of thebank (and owner of the mobile device 102) to access the bank's web page.The customer (not shown) may also be referred to herein as bankcustomer, accountholder, and user.

The cash deposit digitization system 100 is digitizing the cash depositby converting paper currency (the dollar bills being deposited) intoavailable funds in the customer's bank account, which is displayed onthe customer's mobile app or web login. The cash deposit, once digitizedinto an updated bank account balance, is further usable by digitalbanking features such as Automated Clearing House (ACH), wire transfers,Payee-to-Payee (P2P) payments, Bill Pay, and so on. A customer depositof currency into an ATM is thus a digitization of the deposit.

The bank server 108, which may actually be more than one server, iscontrolled by a bank (not shown) and is communicatively coupled with thebank app 104 of the mobile device 102. The bank server 108 is acomputing system of the bank, which may be on the premises of the bank,may be a cloud server, or may be a combination of on-premises andcloud-based computing. The bank server 108 includes software executed bya processor, the software including at least an authentication unit 110,a deposit limit calculator 112, and an account management unit 116. Uponlogging into the bank app 104 by the customer, the authentication unit110 confirms the credentials of the customer. At a minimum, theauthentication unit 110 confirms the username and password as beingcorrect. The authentication unit 110 further may include sending aone-time personal identification number (PIN) to a short messagingservice (SMS), colloquially known as text messaging, of the customer'smobile device, or the one-time PIN may be sent to the customer's emailaddress.

In some embodiments, the cash deposit digitization system 100 determinesa bank customer's cash deposit limit in real-time and per customer.Thus, the deposit limit calculator 112 determines whether the cashdeposit request made by the bank customer is within the cash depositlimit of the customer's bank account at the time the request is made. Insome embodiments, the customer-specific cash deposit limit is obtainedusing machine learning 114 and based in part on behavioral andhistorical data 124 about the bank customer. The bank server 108 alsoincludes account management 116, which credits the account of bankcustomer once the cash deposit is made.

With some limitations described in more detail below, upon requesting acash deposit at the merchant 118, the bank app 104 displays a barcode106, which contains embedded information that tells a barcode reader thecash deposit amount, allowing the bank customer to enter the merchantpremises and complete the cash deposit transaction. The cash depositmerchant 118 includes a point-of-sale (POS) device 126, including atleast a barcode scanner/reader 120 and a receipt generator 122, as wellas software to interpret the barcode and cause issuance of the receipt.Optionally, the POS device 126 may also include a display or be coupledto a display. POS devices 126 are part of the cash registers of manymerchant businesses. Once the barcode 106 is positioned in proximity tothe POS device 126, the barcode scanner/reader 120 scans the barcode.Subsequently, an indication is made visible to the cashier, a humanbeing, possibly via a display on the cash register or on the POS device126, the amount of the deposit to be received from the bank customer.The cashier thus knows how much cash to accept from the bank customer tocomplete the deposit transaction.

In another example, the cash deposit merchant 118 includes aself-checkout POS device in which no human cashier interacts with thebank customer to complete the deposit. Instead, the barcodescanner/reader 120 of the POS device 126 scans the barcode, and theself-checkout POS device prompts the bank customer, such as via adisplay, to deposit the cash amount embedded in the barcode. In thisexample, the POS device may include a mechanism known as a cashvalidator for receiving the cash. The cash validator includes atreadmill-like path that pulls the bills in, one by one, and verifieseach bill using an optical scanner and authentication software. Vendingmachines and Automated Teller Machines (ATMs) are among the devices thatinclude cash validators. Thus, the cash deposit digitization system 100and method 200 may operate with a human cashier or with a cash validatorinstead of a cashier.

The cash deposit merchant 118 is able to support the cash depositdigitization system 100 without adding new hardware or capability. Fromthe merchant perspective, the cash deposit transaction of the bankcustomer will be similar to other transactions, such as loading moneyonto a gift card, at the merchant business. The cash depositdigitization system 100 may be used in virtually any modern businesshaving a POS device with both a barcode reader/scanner and somemechanism to generate a receipt, whether printed on paper or transmittedelectronically.

The cash deposit merchant 118 selection is controlled by the bank. Insome embodiments, the bank will select the merchants based on factorssuch as whether there is a relationship between that bank and themerchant. For example, some banks are found inside grocery stores. Themerchant grocery store may thus be a good candidate to operate as a cashdeposit merchant. In some embodiments, the bank will select the merchantbased on the commercial characteristics of a geographic region. Forexample, suppose there are three Walgreens in a small town in which alarge percentage of the town's residents are customers of the bank. Inthat case, certifying the three Walgreens as merchants supporting cashdeposits may be a popular choice. As another example, if a Walmart isthe center of commerce in a rural community, allowing cash deposits atthe Walmart may be well received by customers of a bank. A merchant thatis capable of integrating quickly with a bank, has the ability to acceptcash, generate a barcode for the customer to use, and provide enoughinformation about the deposit to credit the customer's account quicklymay also be a good candidate from the bank's perspective.

There are other reasons why the bank may select a particular merchant.In some embodiments, the bank will select the merchant based on thenumber of its customers working in the service industry in a particulargeographic area. Or the bank may select merchants in regions of limitedcommerce, such as “food deserts”. Regions with considerable 24-hour andweekend activity, such as near casinos and hotels, may benefit fromjudicious selection of cash deposit merchants. Regions where the bankhas a large number of customers based on the home or business addressesknown to the bank may also prompt the bank to select merchants in thoseregions. Or the bank may have a Locations Services feature on the bankcustomers' mobile apps, which indicate regions frequently visited by thecustomers. Such regions may also prompt the bank to select merchants inthose regions. Regions where utilization of cash is high, such asrestaurants, laundromats, and taxi services, may drive the bank'smerchant selection. Analysis of the bank's business customer databasemay, for example, provide information about cash-driven businesses.

The cash deposit digitization system 100 is useful for bank customerswho regularly obtain cash but have limited access to ATMs or banks.Individuals in the service industry, such as waiters and bartenders, aresometimes paid in cash and may be paid frequently, such as every day orevery other day. By enabling bank customers to deposit cash quickly andconveniently to their bank account, the risks associated with carryingcash may be reduced.

FIG. 2 is a simplified block diagram of a cash deposit digitizationmethod 200, according to some embodiments. The mobile device 102, bankserver 108, and merchant supporting cash deposits 118 from the system100 (FIG. 1) are shown, as is a bank customer 206 who has a relationshipwith the bank controlling the server. The operations of the cash depositdigitization method 200 are indicated numerically. The bank app 104shows a “cash load” feature, but before the feature is invoked by thebank customer 206, the bank customer logs into the banking app on hermobile device 102. At the bank server 108, the authentication unit 110authenticates the bank customer, by confirming the username and passwordand, optionally, by sending a one-time PIN, as described above (1).

Once authenticated, the bank customer 206 is able to initiate the cashdeposit request (2) from her mobile device 102. This request is receivedat the bank server 108 and the deposit limit calculator 110 performs itanalysis of whether the cash deposit amount is acceptable for this bankcustomer (3). This process is described in more detail in the flowdiagram of FIG. 3, below. Once the deposit limit calculator 110determines that the cash deposit request does not exceed the customer'sdeposit limit, a barcode 202 is issued (4), which will appear on the app104 of the mobile device 102. In some embodiments, the bank customer ismade aware of the real-time customer-specific deposit limit, as thelimit also appears on the app, either along with the barcode or on aseparate screen.

Once the bank customer 206 receives the barcode 202, she knows she maymake a cash deposit at a supported merchant. So, she enters the premisesof a merchant supporting cash deposits 118 with her barcode displayed onthe mobile device (5). The merchant 118 reads the barcode 106 byscanning the barcode using the barcode scanner/reader 120 of the POSdevice 126 (6). In this manner, the cashier knows the amount of cash toaccept from the customer. In other words, the cash is transferred fromthe custody of the bank customer 206 to the custody of the cashier atthis point in the transaction (7). In another example, the cash istransferred, without the use of a cashier, to a device that receives,authenticates, and counts the cash, such as a cash validator.

Once the cash is received at the merchant premises, the POS device 126,using the receipt generator 122, generates a receipt 204 for thetransaction (8). The receipt 204 may be in printed or electronic form,with the option to choose being electable by the bank customer in someexamples. In electronic form, the receipt 204 may be sent to the mobiledevice 102 of the bank customer 206 or may be sent to an email addressspecified by the customer, as two examples. The bank customer 206accepts the receipt 204 as proof of the transaction (9), whether printedon paper or in electronic form. The merchant then issues the receipt204, in electronic form, to the bank server 108 (10), at which time thebank credits the bank customer's account with the amount of the cashdeposit (11). Optionally, the bank app 104 may post a “depositcompleted” notification (12) to the bank customer's mobile device, asfurther confirmation of transaction success.

In the cash deposit digitization method 200, the bank customer 206 isusing a mobile device, such as a smartphone, and is initiating the cashdeposit transaction from the mobile app loaded on the device. In someembodiments, the barcode may be opened on the mobile device oncegenerated from the bank app on that same device. Further, the barcode ismade available to the mobile device only after the customer has beenauthenticated through the username and password verification, followedby issuance of a one-time PIN, as described above. The bank may initiateadditional authentication steps, depending on the customer relationshipwith the bank, the location of the customer when making the deposit, andso forth, so that the bank is satisfied that the cash deposit is notfraudulent.

In some embodiments, once the bank customer makes the cash depositrequest from the mobile device, the mobile app obfuscates the barcodesuch that the barcode is not readable by a barcode reader. The mobileapp includes an option, such as a selectable button on the mobile appinterface screen, that enables the barcode to be revealed. Theselectable button may, for example, say, “reveal barcode”. The bankcustomer thus makes this selection once she is in the presence of themerchant with which the cash deposit is to be made. The idea is to avoidallowing a nefarious third party to take a photo of the barcode and thenuse the barcode for fraudulent purposes. Further, in some embodiments,the barcode is automatically rotated every predetermined time period(e.g., 30 seconds) or every time the bank customer selects the “revealbarcode” option as well as once the barcode is scanned by the merchant.In some embodiments, the barcode is automatically invalidated if ascreenshot is taken of the barcode. Again, this is to prevent thebarcode from being sent to a nefarious actor. Other actions to preventthe barcode from being duplicated in any way may also be taken by thebank.

Recall that the machine learning 114 is performed at the bank server 108and includes behavioral and historical information 124 about the bankcustomer (FIG. 1). In some embodiments, behavioral and historicalinformation 124 includes device location and location history, useraccount size, user deposit history, upcoming bills. As used herein,upcoming bills are bills due to be paid from the bank account within apredetermined time period. In some embodiments, the predetermined timeperiod is less than two weeks. For example, an upcoming bill for $4,000may cause the deposit limit calculator 110 to allow a deposit limit ofgreater than $4,000 if the account was deemed safe based on deposithistory or funds availability. As another example, a user with $250,000in deposits and regular deposit behavior of $5,000 in cash on Fridays at5 PM may result in the deposit limit calculator 110 allowing a depositthreshold of $5,000 at that time at a certain deposit location insteadof a default deposit threshold $1,000 that the bank applies.

In some embodiments, the predetermined time period is customer-specific,and based on behavior known to the bank. So, for example, if a bankcustomer is known to always pay bills exactly one day before they aredue, that customer's predetermined time period would be set by the bankas one day. If a second bank customer always pays bills three weeksbefore they are due, the second bank customer would have a predeterminedtime period set to three weeks.

In some embodiments, for bank customers with satisfactory accounthistory, deposit limits are proactively raised based on incoming paymentdates and balance amounts, especially for auto loans and credit cardbills. In some embodiments, these factors are fed into the machinelearning unit 114, consisting of both micro- and macro-machine learningalgorithms. Micro-machine learning involves analysis of the behavior ofeach customer individually. Thus, the predetermined time period exampleabove is an example of micro-machine learning. Macro-machine learninginvolves an aggregate analysis of all customer behavior. The machinelearning 114 then determines, on a user and collective basis,appropriate and distinct deposit limits for each bank customer.

FIG. 3 is a flow diagram 300 illustrating how machine learning is usedto determine a cash deposit limit for the bank customer in real-time bythe cash deposit digitization system 100 and method 200, according tosome embodiments. The operations 300 are performed by the deposit limitcalculator 112, specifically, the machine learning unit 114 (FIG. 1).The cash deposit amount is specified by the bank customer (block 302).Next, different types of behavioral and historical information 124 ofthe bank customer are gathered. At the bank server, the bank reviews thelocation of the bank customer's mobile device as well as any informationthe bank has about where the mobile device has been in the past (block304). The bank's Location Services feature of their mobile bank appwould facilitate this review. Other sensors may be available to the bankas well, such as facial recognition at some locations, card scannersthat are used in work locations, and even implanted in individuals. Thebank may want to limit large cash deposits made from some locationsabroad, for example, especially if the bank customer is not known by thebank have before engaged in transactions abroad.

In some embodiments, the bank also reviews the size of the bankcustomer's account and the deposit history on the account that are knownto the bank (block 306). While the cash deposit history of a customer isinteresting to the bank, a customer's total history may also berelevant. A bank customer with a long relationship with the bank and abetter risk model score may be rewarded with higher daily depositlimits, for example, as would one who maintains a sizeable account, sayof $100,000 or more. The bank also determines whether the customer hasupcoming bills due (block 308). Once some or all of the behavioral andhistorical information 124 known to the bank are obtained, the data isfed into a machine learning algorithm 310 (block 310). Based on theresults of the machine learning, the cash deposit limit for the bankcustomer is determined (block 312). Thus, the bank customer is given areal-time deposit limit, which controls whether the customer willproceed with the cash deposit.

FIG. 4 is a flow diagram 400 showing the cash deposit digitizationoperations from the customer perspective, according to some embodiments.The bank customer logs into the bank app on a hand-held device, such asa smartphone or tablet having Internet access (block 402). The customerselects an option to deposit cash at a qualifying merchant, known as“cash load”, and specifies the amount of the deposit (block 404). Oncethe cash deposit amount is specified, the bank server will becalculating the cash deposit limit for the bank customer. If the cashdeposit amount exceeds the real-time customer limit (block 406), thecustomer is so notified (block 408), such as an indicator on the bankapp of her hand-held device. The bank customer then has the option tochange the cash deposit amount (block 410). Since the bank has informedthe customer of her new cash deposit limit, she will likely specify acash deposit amount within her limit.

Once the cash deposit amount meets the threshold, the customer is ableto enter the premises of a bank-approved merchant supporting cashdeposits and present the barcode on her mobile device to the cashier(block 412), which the cashier will scan. The bank customer also givesthe cashier the cash to be deposited into her bank account, with theamount given being the same as the amount indicated when scanning thebarcode (block 414). Upon receipt of both the barcode and the cash, thecashier will provide the bank customer with a receipt, whether inelectronic or paper form, indicating the amount of the deposit (block416).

At some point, the customer will be able to review her bank accountinformation and see the cash deposit as a credit to her account. If thedeposit is not indicated after a certain time, she has the cash receiptthat she may provide to her bank, so that she may recover those funds.

FIG. 5 is a flow diagram 500 showing the cash deposit digitizationoperations from the bank perspective, according to some embodiments. Theoperations of the bank commence once the customer logs into the bank appon the mobile device (block 502). The bank confirms that the usernameand password entered are correct, and also optionally sends a one-timepin to the customer for further verification (block 504). Once the bankcustomer is authenticated, the user will have specified in the bank appa request to deposit cash at a bank-approved merchant supporting cashdeposits, the amount of which is received by the bank (block 506). Thebank employs machine learning, which includes customer behavioral andhistorical data, to determine a customer-specific and at-the-moment cashdeposit limit (block 508). If the cash deposit request exceeds the cashdeposit limit (block 510), the bank customer will be so informed by thebank (block 512).

At this point, it is presumed that the bank customer changes the cashdeposit request to meet the cash deposit threshold, receives the barcodefor the transaction, enters the merchant premises, and makes the cashdeposit. The bank receives a receipt for the cash deposit transactionfrom the merchant (block 516). Finally, the bank updates the bankcustomer's account to reflect the cash deposit as a credit (block 518).The operations 500 to enable a bank customer to make a cash deposit at abank-approved merchant, where the cash deposit will be made into thebank customer's account, are thus complete.

FIG. 6 illustrates an embodiment of an exemplary computing architecture600 comprising a computing system 602 that may be suitable forimplementing various embodiments as previously described. In variousembodiments, the computing architecture 600 may comprise or beimplemented as part of an electronic device. In some embodiments, thecomputing architecture 600 may be representative, for example, of asystem that implements one or more components of the cash depositdigitization system 100 and method 200. In some embodiments, computingsystem 602 may be representative, for example, of the mobile devicesused in implementing the cash deposit digitization system 100 and method200. The embodiments are not limited in this context. More generally,the computing architecture 600 is configured to implement all logic,applications, systems, methods, apparatuses, and functionality describedherein.

As used in this application, the terms “system” and “component” and“module” are intended to refer to a computer-related entity, eitherhardware, a combination of hardware and software, software, or softwarein execution, examples of which are provided by the exemplary computingarchitecture 600. For example, a component may be, but is not limited tobeing, a process running on a computer processor, a computer processor,a hard disk drive, multiple storage drives (of optical and/or magneticstorage medium), an object, an executable, a thread of execution, aprogram, and/or a computer. By way of illustration, both an applicationrunning on a server and the server may be a component. One or morecomponents may reside within a process and/or thread of execution, and acomponent may be localized on one computer and/or distributed betweentwo or more computers. Further, components may be communicativelycoupled to each other by various types of communications media tocoordinate operations. The coordination may involve the uni-directionalor bi-directional exchange of information. For instance, the componentsmay communicate information in the form of signals communicated over thecommunications media. The information may be implemented as signalsallocated to various signal lines. In such allocations, each message isa signal. Further embodiments, however, may alternatively employ datamessages. Such data messages may be sent across various connections.Exemplary connections include parallel interfaces, serial interfaces,and bus interfaces.

The computing system 602 includes various common computing elements,such as one or more processors, multi-core processors, co-processors,memory units, chipsets, controllers, peripherals, interfaces,oscillators, timing devices, video cards, audio cards, multimediainput/output (I/O) components, power supplies, and so forth. Theembodiments, however, are not limited to implementation by the computingsystem 602.

As shown in FIG. 6, the computing system 602 comprises a processor 604,a system memory 606 and a system bus 608. The processor 604 may be anyof various commercially available computer processors, including withoutlimitation an AMD® Athlon®, Duron® and Opteron® processors; ARM®application, embedded and secure processors; IBM® and Motorola®DragonBall® and PowerPC® processors; IBM and Sony® Cell processors;Intel® Celeron®, Core®, Core (2) Duo®, Itanium®, Pentium®, Xeon®, andXScale® processors; and similar processors. Dual microprocessors,multi-core processors, and other multi-processor architectures may alsobe employed as the processor 604.

The system bus 608 provides an interface for system componentsincluding, but not limited to, the system memory 606 to the processor604. The system bus 608 may be any of several types of bus structurethat may further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. Interface adapters may connectto the system bus 608 via a slot architecture. Example slotarchitectures may include without limitation Accelerated Graphics Port(AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA),Micro Channel Architecture (MCA), NuBus, Peripheral ComponentInterconnect (Extended) (PCI(X)), PCI Express, Personal Computer MemoryCard International Association (PCMCIA), and the like.

The system memory 606 is not a propagating signal divorced from theunderlying hardware of the computing system 602 and is thusnon-transitory. The system memory 606 may include various types ofcomputer-readable storage media in the form of one or more higher speedmemory units, such as read-only memory (ROM), random-access memory(RAM), dynamic RAM (DRAM), Double-Data-Rate DRAM (DDRAM), synchronousDRAM (SDRAM), static RAM (SRAM), programmable ROM (PROM), erasableprogrammable ROM (EPROM), electrically erasable programmable ROM(EEPROM), flash memory (e.g., one or more flash arrays), polymer memorysuch as ferroelectric polymer memory, ovonic memory, phase change orferroelectric memory, silicon-oxide-nitride-oxide-silicon (SONOS)memory, magnetic or optical cards, an array of devices such as RedundantArray of Independent Disks (RAID) drives, solid state memory devices(e.g., USB memory, solid state drives (SSD) and any other type ofstorage media suitable for storing information. In the illustratedembodiment shown in FIG. 6, the system memory 606 may includenon-volatile memory 610 and/or volatile memory 612. A basic input/outputsystem (BIOS) may be stored in the non-volatile memory 610.

The computing system 602 may include various types of computer-readablestorage media in the form of one or more lower speed memory units,including an internal (or external) hard disk drive (HDD) 614, amagnetic floppy disk drive (FDD) 616 to read from or write to aremovable magnetic disk 618, and an optical disk drive 620 to read fromor write to a removable optical disk 622 (e.g., a CD-ROM or DVD). TheHDD 614, FDD 616 and optical disk drive 620 may be connected to thesystem bus 608 by an HDD interface 624, an FDD interface 626 and anoptical drive interface 628, respectively. The HDD interface 624 forexternal drive implementations may include at least one or both ofUniversal Serial Bus (USB) and IEEE 1394 interface technologies. Thecomputing system 602 is generally is configured to implement all logic,systems, methods, apparatuses, and functionality described herein withreference to FIGS. 1-5.

The drives and associated computer-readable media provide volatileand/or nonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For example, a number of program modules maybe stored in the drives and memory units 610, 612, including anoperating system 630, one or more application programs 632, otherprogram modules 634, and program data 636. In one embodiment, the one ormore application programs 632, other program modules 634, and programdata 636 may include, for example, the various applications and/orcomponents of the cash deposit digitization system 100, e.g., the bankapp 104.

A user may enter commands and information into the computing system 602through one or more wire/wireless input devices, for example, a keyboard638 and a pointing device, such as a mouse 640. Other input devices mayinclude microphones, infra-red (IR) remote controls, radio-frequency(RF) remote controls, game pads, stylus pens, card readers, dongles,finger print readers, gloves, graphics tablets, joysticks, keyboards,retina readers, touch screens (e.g., capacitive, resistive, etc.),trackballs, trackpads, sensors, styluses, and the like. These and otherinput devices are often connected to the processor 604 through an inputdevice interface 642 that is coupled to the system bus 608, but may beconnected by other interfaces such as a parallel port, IEEE 1394 serialport, a game port, a USB port, an IR interface, and so forth.

A monitor 644 or other type of display device is also connected to thesystem bus 608 via an interface, such as a video adaptor 646. Themonitor 644 may be internal or external to the computing system 602. Inaddition to the monitor 644, a computer typically includes otherperipheral output devices, such as speakers, printers, and so forth.

The computing system 602 may operate in a networked environment usinglogical connections via wire and/or wireless communications to one ormore remote computers, such as a remote computer 648. The remotecomputer 648 may be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computingsystem 602, although, for purposes of brevity, only a memory/storagedevice 650 is illustrated. The logical connections depicted includewire/wireless connectivity to a local area network (LAN) 652 and/orlarger networks, for example, a wide area network (WAN) 654. Such LANand WAN networking environments are commonplace in offices andcompanies, and facilitate enterprise-wide computer networks, such asintranets, all of which may connect to a global communications network,for example, the Internet.

When used in a LAN networking environment, the computing system 602 isconnected to the LAN 652 through a wire and/or wireless communicationnetwork interface or adaptor 656. The adaptor 656 may facilitate wireand/or wireless communications to the LAN 652, which may also include awireless access point disposed thereon for communicating with thewireless functionality of the adaptor 656.

When used in a WAN networking environment, the computing system 602 mayinclude a modem 658, or is connected to a communications server on theWAN 654 or has other means for establishing communications over the WAN654, such as by way of the Internet. The modem 658, which may beinternal or external and a wire and/or wireless device, connects to thesystem bus 608 via the input device interface 642. In a networkedenvironment, program modules depicted relative to the computing system602, or portions thereof, may be stored in the remote memory/storagedevice 650. It will be appreciated that the network connections shownare exemplary and other means of establishing a communications linkbetween the computers may be used.

The computing system 602 is operable to communicate with wired andwireless devices or entities using the IEEE 802 family of standards,such as wireless devices operatively disposed in wireless communication(e.g., IEEE 802.16 over-the-air modulation techniques). This includes atleast Wi-Fi (or Wireless Fidelity), WiMax, and Bluetooth™ wirelesstechnologies, among others. Thus, the communication may be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices. Wi-Fi networks use radiotechnologies called IEEE 802.11x (a, b, g, n, etc.) to provide secure,reliable, fast wireless connectivity. A Wi-Fi network may be used toconnect computers to each other, to the Internet, and to wire networks(which use IEEE 802.3-related media and functions).

Various embodiments may be implemented using hardware elements, softwareelements, or a combination of both. Examples of hardware elements mayinclude processors, microprocessors, circuits, circuit elements (e.g.,transistors, resistors, capacitors, inductors, and so forth), integratedcircuits, application specific integrated circuits (ASIC), programmablelogic devices (PLD), digital signal processors (DSP), field programmablegate array (FPGA), logic gates, registers, semiconductor device, chips,microchips, chip sets, and so forth. Examples of software may includesoftware components, programs, applications, computer programs,application programs, system programs, machine programs, operatingsystem software, middleware, firmware, software modules, routines,subroutines, functions, methods, procedures, software interfaces,application program interfaces (API), instruction sets, computing code,computer code, code segments, computer code segments, words, values,symbols, or any combination thereof. Determining whether an embodimentis implemented using hardware elements and/or software elements may varyin accordance with any number of factors, such as desired computationalrate, power levels, heat tolerances, processing cycle budget, input datarates, output data rates, memory resources, data bus speeds and otherdesign or performance constraints.

One or more aspects of at least one embodiment may be implemented byrepresentative instructions stored on a machine-readable medium whichrepresents various logic within the processor, which when read by amachine causes the machine to fabricate logic to perform the techniquesdescribed herein. Such representations, known as “IP cores” may bestored on a tangible, machine readable medium and supplied to variouscustomers or manufacturing facilities to load into the fabricationmachines that make the logic or processor. Some embodiments may beimplemented, for example, using a machine-readable medium or articlewhich may store an instruction or a set of instructions that, ifexecuted by a machine, may cause the machine to perform a method and/oroperation in accordance with the embodiments. Such a machine mayinclude, for example, any suitable processing platform, computingplatform, computing device, processing device, computing system,processing system, computer, processor, or the like, and may beimplemented using any suitable combination of hardware and/or software.The machine-readable medium or article may include, for example, anysuitable type of memory unit, memory device, memory article, memorymedium, storage device, storage article, storage medium and/or storageunit, for example, memory, removable or non-removable media, erasable ornon-erasable media, writeable or re-writeable media, digital or analogmedia, hard disk, floppy disk, Compact Disk Read Only Memory (CD-ROM),Compact Disk Recordable (CD-R), Compact Disk Rewriteable (CD-RW),optical disk, magnetic media, magneto-optical media, removable memorycards or disks, various types of Digital Versatile Disk (DVD), a tape, acassette, or the like. The instructions may include any suitable type ofcode, such as source code, compiled code, interpreted code, executablecode, static code, dynamic code, encrypted code, and the like,implemented using any suitable high-level, low-level, object-oriented,visual, compiled and/or interpreted programming language.

The foregoing description of example embodiments has been presented forthe purposes of illustration and description. It is not intended to beexhaustive or to limit the present disclosure to the precise formsdisclosed. Many modifications and variations are possible in light ofthis disclosure. It is intended that the scope of the present disclosurebe limited not by this detailed description, but rather by the claimsappended hereto. Future filed applications claiming priority to thisapplication may claim the disclosed subject matter in a different mannerand may generally include any set of one or more limitations asvariously disclosed or otherwise demonstrated herein.

What is claimed is:
 1. A mobile device, comprising: a processor; and amemory coupled to the processor, the memory comprising instructionsthat, when executed by the processor, cause the processor to: receive anamount of a cash deposit for an account; analyze behavioral andhistorical data associated with the account to determine a cash limitfor the account; and in response to the amount not exceeding the cashlimit, generate a scannable barcode to be displayed on the mobiledevice, wherein the amount is embedded in the scannable barcode.
 2. Themobile device of claim 1, the memory comprising instructions that, whenexecuted by the processor, cause the processor to: authenticate ausername and a password received for the account.
 3. The mobile deviceof claim 1, the memory comprising instructions that, when executed bythe processor, cause the processor to: obfuscate the barcode displayedon the mobile device; and reveal the barcode responsive to receivinginput specifying to reveal the barcode.
 4. The mobile device of claim 1,the memory comprising instructions that, when executed by the processor,cause the processor to: determine that a screenshot of the mobile deviceis captured during display of the barcode; and invalidate the barcodebased on the determination that the screenshot of the mobile device wascaptured during display of the barcode.
 5. The mobile device of claim 1,wherein a machine learning algorithm determines the cash limit based onthe behavioral and historical data associated with the account.
 6. Themobile device of claim 1, the memory comprising instructions that, whenexecuted by the processor, cause the processor to: receive a secondamount of a second cash deposit for the account; analyze the behavioraland historical data associated with the account to determine an updatedcash limit for the account; and in response to the second amountexceeding the updated cash limit, display a message indicating that thesecond amount exceeds the updated cash limit.
 7. The mobile device ofclaim 1, the memory comprising instructions that, when executed by theprocessor, cause the processor to: receive a receipt indicating that thecash deposit was made at a merchant premises based on a scan of thebarcode by a scanning device at the merchant premises.
 8. Anon-transitory computer-readable storage medium comprising instructionsthat, when executed by a processor, cause the processor to: receive anamount of a cash deposit for an account; analyze behavioral andhistorical data associated with the account to determine a cash limitfor the account; and in response to the amount not exceeding the cashlimit, generate a scannable barcode to be displayed on a display coupledto the processor, wherein the amount is embedded in the scannablebarcode.
 9. The computer-readable storage medium of claim 8, comprisinginstructions that, when executed by the processor, cause the processorto: authenticate a username and a password received for the account. 10.The computer-readable storage medium of claim 8, comprising instructionsthat, when executed by the processor, cause the processor to: obfuscatethe barcode displayed on the display; and reveal the barcode responsiveto receiving input specifying to reveal the barcode.
 11. Thecomputer-readable storage medium of claim 8, comprising instructionsthat, when executed by the processor, cause the processor to: determinethat a screenshot depicting the barcode has been captured; andinvalidate the barcode based on the determination that the screenshotwas captured.
 12. The computer-readable storage medium of claim 8,wherein a machine learning algorithm determines the cash limit based onthe behavioral and historical data associated with the account.
 13. Thecomputer-readable storage medium of claim 8, comprising instructionsthat, when executed by the processor, cause the processor to: receive asecond amount of a second cash deposit for the account; analyze thebehavioral and historical data associated with the account to determinean updated cash limit for the account; and in response to the secondamount exceeding the updated cash limit, display a message indicatingthat the second amount exceeds the updated cash limit.
 14. Thecomputer-readable storage medium of claim 8, comprising instructionsthat, when executed by the processor, cause the processor to: receive areceipt indicating that the cash deposit was made at a merchant premisesbased on a scan of the barcode by a scanning device at the merchantpremises.
 15. A method, comprising: receiving, by an applicationexecuting on a processor of a mobile device, an amount of a cash depositfor an account; analyzing, by the application, behavioral and historicaldata associated with the account to determine a cash limit for theaccount; and in response to the amount not exceeding the cash limit,generating, by the application, a scannable barcode to be displayed onthe mobile device, wherein the amount is embedded in the scannablebarcode.
 16. The method of claim 15, wherein a machine learningalgorithm determines the cash limit based on the behavioral andhistorical data associated with the account, the method furthercomprising: authenticating, by the application, a username and apassword received for the account.
 17. The method of claim 15, furthercomprising: obfuscating, by the application. the barcode displayed onthe mobile device; and revealing the barcode by the applicationresponsive to receiving input specifying to reveal the barcode.
 18. Themethod of claim 15, further comprising: determining, by the application,that a screenshot of the mobile device is captured during display of thebarcode; and invalidating, by the application, the barcode based on thedetermination that the screenshot of the mobile device was capturedduring display of the barcode.
 19. The method of claim 15, furthercomprising: receiving, by the application, a second amount of a secondcash deposit for the account; analyzing, by the application, thebehavioral and historical data associated with the account to determinean updated cash limit for the account; and in response to the secondamount exceeding the updated cash limit, displaying, by the application,a message indicating that the second amount exceeds the updated cashlimit.
 20. The method of claim 15, further comprising: receiving, by theapplication, a receipt indicating that the cash deposit was made at amerchant premises based on a scan of the barcode by a scanning device atthe merchant premises.