Automated banking machine system that operates to make cash available to a mobile device user

ABSTRACT

A user who desires to receive cash or other value, operates a mobile device to communicate data corresponding to a user account, an amount and a current location to a remote transaction system. In response the mobile device receives a transaction identifier and data corresponding to a plurality of automated banking machine fulfillment points in proximity to the user&#39;s current location. The mobile device outputs information on each of the fulfillment points and the user selects the one desired. The mobile device outputs directions to the fulfillment point. The machine at the selected fulfillment point wirelessly receives the transaction identifier and the identifying data, and the mobile device wirelessly receives a fulfillment point identifier corresponding to the machine. The mobile device sends data corresponding to the fulfillment point identifier and current location data to the transaction system and the cash is made available in response to the user&#39;s current location corresponding to the location of the machine associated with the fulfillment point identifier.

TECHNICAL FIELD

This invention pertains to machines that are controlled responsive todata read from data bearing records such as user cards to causefinancial transfers and which may be classified in U.S. Class 235,Subclass 379.

BACKGROUND

Automated banking machines may include a card reader that operates toread data from a bearer record such as a user card. The automatedbanking machine may operate to cause the data read from the card to becompared with other computer stored data related to authorized users.The machine operates in response to the comparison determining that thebearer card corresponds to an authorized system user to carry out atleast one transaction which is operative to transfer value to or from atleast one account. A record of the transaction is also commonly printedthrough operation of the automated banking machine and provided to theuser. A common type of automated banking machine used by consumers is anautomated teller machine which enables consumers to carry out bankingtransactions. Banking transactions carried out may include thedispensing of cash, the making of deposits, the transfer of fundsbetween accounts, and account balance inquiries. Such machines mayadditionally receive, optically scan and resolve data from documentssuch as financial checks. The types of transactions a customer may carryout with an automated banking machine are determined by the capabilitiesof the particular machine and the programming associated with operatingthe machine.

Other types of automated banking machines may be operated by merchantsto carry out commercial transactions. These transactions may include,for example, the acceptance of deposit bags, the receipt of checks orother financial instruments, the dispensing of rolled coin or othertransactions that are required by merchants. Still other types ofautomated banking machines may be used by service providers in atransaction environment such as at a bank to carry out financialtransactions. Such transactions may include, for example, the countingand storage of currency notes or other financial instrument sheets, thedispensing of notes or other sheets, the imaging of checks or otherfinancial instruments and other types of service provider transactions.For purposes of this disclosure, an automated banking machine, anautomated transaction machine, an automated teller machine, or an ATMshall be deemed to include any machine that may be used toelectronically carry out transactions involving automated transfers ofvalue.

Automated banking machines may benefit from improvements.

SUMMARY OF DISCLOSURE

An automated banking machine that operates responsive at least in partto data read from data bearing records operates to cause financialtransfers to or from financial accounts of machine users. The exemplarymachines and systems provide enhanced security to assure that risks offraudulent transactions are reduced. Other exemplary arrangementsprovide for improved user interfaces for operation of automated bankingmachines. These include improved user interfaces for persons to operatethe machine utilizing mobile devices. Other example arrangements provideuser interfaces that enable users that are blind or have impaired visionto operate the machine more conveniently and readily.

Other exemplary arrangements provide capabilities for enabling users toachieve a more sanitary operating environment in connection with itemsthat are provided by the machine. Other example arrangements provide forthe capability of dispensing articles which are produced and/orconfigured through operation of the machine, to include datarepresentative of value and which can be used or redeemed for goods orservices.

Further exemplary embodiments will be made apparent in the followingdescription of exemplary embodiments and the appended claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic view of a system of an exemplary arrangementincluding automated banking machines that are operated in response todata read from data bearing records.

FIG. 2 is a schematic view of the components of an exemplary automatedbanking machine.

FIG. 3 is a schematic view of steps carried out in operation of at leastone remote computer in connection with an exemplary banking machinesystem.

FIG. 4 is an alternative schematic view of steps executed by at leastone computer in connection with an automated banking machine system ofan exemplary arrangement.

FIG. 5 is an isometric view of an exemplary user wearable mobilewireless device.

FIG. 6 is a schematic view showing components of the wearable mobilewireless device operating in connection with components of an automatedbanking machine system.

FIG. 7 is a schematic view of components of an alternative exemplaryautomated banking machine that has the capability of producing orconfiguring an article for a user.

FIG. 8 is a schematic view of a 3D printer operated in connection witharticles dispensed from an exemplary automated banking machine.

FIG. 9 is a schematic view of an alternative arrangement of an automatedbanking machine that provides the capability for disinfecting itemsdispensed from the machine.

FIG. 10 is a schematic view of software architecture used in connectionwith an exemplary arrangement of an automated banking machine.

FIG. 11 is a schematic view of a controller and devices used in anexemplary automated banking machine.

FIG. 12 is a schematic view of components included in an exemplaryalternative automated banking machine that has a user interface thatfacilitates operation by blind or sight impaired users.

FIGS. 13-15 show different alternative user interface arrangements foran automated banking machine of the type shown in FIG. 12.

FIG. 16 is a schematic view showing a system that operates to identifyactivities that may correspond to installation of a card skimming deviceon an automated banking machine.

FIG. 17 is a schematic representation of program logic carried out by atleast one processor identifying possible installation of a skimmingdevice.

FIG. 18 is a schematic representation of program logic carried out by anautomated banking machine that issues financial checks.

FIG. 19 are a schematic view of program logic carried out in connectionwith a transaction that involves a wearable computer.

FIGS. 20-25 are a schematic representation of program logic carried outin one or more computers in connection with delivering cash or otheritems to a user.

FIG. 26 is a schematic view of an automated banking machine whichcommunicates with mobile user devices.

FIG. 27 is a schematic view of an automated banking machine and systemthat provides displays for mobile computers and carries out multipletransaction types.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1, there is showntherein an exemplary system 10. System 10 includes a plurality ofautomated banking machines 12, 14 and 16. Each of the automated bankingmachines of the exemplary system is operative to cause financialtransfers at least one of to or from user financial accounts responsiveat least in part to data read from data bearing records. It should beunderstood that these automated banking machines are exemplary and inother arrangements other types of automated banking machines may beused.

The components of the exemplary automated banking machine 12 are shownschematically in FIG. 2. Automated banking machine 12 includes aplurality of transaction function devices 18. The exemplary transactionfunction devices in automated banking machine 12 include a card reader20. Card reader 20 is operative to read data from bearer records such asuser cards. The data read through operation of the card reader is usableto identify at least one financial account on which transactions at themachine are to be conducted. The exemplary arrangements may includemagnetic stripe card readers, chip type card readers, wireless type cardreaders or other types of contact or non-contact devices for readingarticles which include data that corresponds to financial accounts. Insome exemplary arrangements the automated banking machine may includecard readers and other features like those described in U.S. Pat. Nos.7,004,385; 7,284,692; 7,992,776; 7,992,778; and 8,540,142 thedisclosures of each of which are incorporated herein by reference intheir entirety.

The exemplary automated banking machine further includes a keypad 22.The exemplary machine includes a keypad having a plurality of manuallyactuatable keys that may be used by machine users to provide inputs.Inputs provided may include alphanumerical inputs or other types ofinputs as appropriate to be provided by users for operation of themachine. In exemplary embodiments the keypad may include an encryptingkeypad (alternatively referred to herein as an encrypting PIN pad orEPP) which includes internal circuitry that is operative to encryptinputs that are provided through the keys. Some exemplary arrangementsmay include features like those shown in U.S. Pat. Nos. 8,540,146;8,517,262; 7,904,713; 7,896,228; and/or 7,418,592 the disclosures ofeach of which are incorporated herein by reference in their entirety.

The exemplary automated banking machine 12 further includes a printer24. Printer 24 of the exemplary arrangement is operative to print paperdocuments for users of the machine. In some exemplary arrangements thepaper documents may include receipts for transactions conducted at themachine. In other exemplary arrangements the printer may be operative toprint other documents such as vouchers, scrip, checks, postage or otherfinancial instruments. Some exemplary arrangements may include featureslike those shown in U.S. Pat. No. 8,424,755 the disclosure of which isincorporated herein by reference in its entirety. Various types ofprinters may be used in exemplary arrangements such as impact printers,dot matrix printers, laser printers, thermal printers or other suitabletypes of printers for producing the documents desired to be produced bythe machine. It should be understood that some exemplary arrangementsmay include multiple different types of printers, each of which producedifferent types of documents that are provided to machine users.

The exemplary automated banking machine further includes a display 26.Display 26 is operative to provide visual outputs to users of themachine. The visual outputs in the exemplary embodiment includeinstructions to users concerning the operation of the machine. Displaysin some exemplary embodiments may include liquid crystal displays, CRTdisplays, OLED displays or other types of displays that are suitable forproviding visual outputs to users.

The exemplary automated banking machine 12 further includes a cashdispenser 28. In some exemplary arrangements the cash dispenser includesone or more mechanisms that are operative to make cash such as currencybills, coin or other currency items stored within the machineselectively available to users of the machine during the course oftransactions. In some exemplary arrangements cash dispensers may includemechanisms that operate to provide currency bills to users. For examplein some arrangements the cash dispenser and automated banking machinemay include features like those described in U.S. Pat. Nos. 8,128,083;7,261,236; 7,144,006; 6,981,638; and/or 6,945,526 the disclosures ofeach of which are incorporated herein by reference in their entirety.

Further in other arrangements the cash dispenser 28 may include acurrency recycling device. Such currency recycling devices may includefor example devices that enable a machine to receive currency bills fromusers, to validate the received currency bills as genuine, and storesuch bills within the machine for later dispense to other authorizedusers. For example some automated banking machines of exemplaryarrangements may include features like those shown in U.S. Pat. Nos.8,251,281; 8,191,771; 8,132,718; 7,992,775; 7,748,615; 7,891,554;7,971,781; 7,934,642; 6,682,068; 6,131,809; and/or 6,331,000 thedisclosures of each of which are incorporated herein by reference intheir entirety.

The exemplary automated banking machine further includes a plurality ofmanually actuatable function keys 30. In some exemplary embodiments thefunction keys may be disposed at locations adjacent to the display so asto enable users to manually actuate selected keys to make selectionsoutput through the display and to provide inputs to the machine.Alternatively other exemplary embodiments may include other types ofkeys for receiving inputs from users. Such keys may include otherarrangements for manually actuatable keys such as a keyboard or otherkey arrangement. Further in some exemplary arrangements the display mayinclude a touch screen type input device which may include visualrepresentations of keys which can be selected by authorized users toprovide inputs to the machine. Of course these types of keys areexemplary of input devices through which users may provide inputs to themachine.

The exemplary automated banking machine 12 further includes an inputdevice 32. Input device 32 in some embodiments includes a wirelessportal that is suitable for receiving and communicating wirelesssignals. This may include for example communicating signals via radiofrequency, infrared, Bluetooth™ or other signals that may be receivedfrom or communicated with portable wireless devices such as smartphones, portable tablet devices, wearable computers or other items.Further in other exemplary arrangements other types of communicationsdevices may be utilized for receiving inputs and providing outputs fromthe machine. Of course it should be understood that these transactionfunction devices 18 are exemplary and in other arrangements, other oradditional devices may be used.

The exemplary automated banking machine 12 includes at least onecontroller 34. The exemplary controller 34 includes one or more circuitswhich are operative to communicate electrical signals with and controlthe operation of transaction function devices 18. In the exemplaryarrangement the at least one controller 34 includes at least oneprocessor schematically indicated 36 and at least one data storeschematically indicated 38. In exemplary arrangements the processor mayinclude a processor suitable for carrying out computer executableinstructions that are stored in the one or more associated data stores.The processor includes or is in connection with a non-volatile storagemedium including instructions that include a basic input/output system(BIOS). For example, the processors may correspond to one or more or acombination of a CPU, FPGA, ASIC or any other integrated circuit orother type of circuit that is capable of processing data. The datastores may correspond to one or more of volatile or non-volatilememories such as random access memory, flash memory, magnetic memory,optical memory, solid state memory or other devices that are operativeto store computer executable instructions and data. Computer executableinstructions may include instructions in any of a plurality ofprogramming languages and formats including, without limitation,routines, subroutines, programs, threads of execution, objects,methodologies and functions which carry out the actions such as thosedescribed herein. Structures for processors may include, correspond toand utilize the principles described in the textbook entitledMicroprocessor Architecture, Programming, and Applications with the 8085by Ramesh S. Gaonker (Prentiss Hall, 2002), which is incorporated hereinby reference in its entirety. The exemplary arrangements may include,for example, processors produced by Intel Corporation such as IntelPentium processors or Intel iCore series processors. Of course it shouldbe understood that these processors are exemplary of many types ofprocessors that may be used.

The exemplary data stores used in connection with exemplary embodimentsmay include any one or more of several types of mediums suitable forholding computer executable instructions. This may include, for example,magnetic media, optical media, solid state media or other types of mediasuch as RAM, ROM, PROMs, flash memory, computer hard drives or any otherform of media suitable for holding data and computer executableinstructions. Some exemplary embodiments may include features like thosedescribed in U.S. Pat. No. 8,474,698 the disclosure of which isincorporated herein by reference in its entirety. Exemplary controllersmay include other components such as hardware and/or software interfacesfor communication with the transaction function devices.

The exemplary automated banking machine 12 further includes at least oneinterface 40. Interface 40 may include, for example, a suitable networkinterface that enables communication between the at least one controller34 in the banking machine and one or more networks schematicallyindicated 42. Interface 40 may include one or more circuits whichinclude electrical components suitable to communicate with wired,optical or wireless networks as appropriate for purposes of providingcommunications with the machine.

As shown in FIGS. 1 and 2 automated banking machine 12 may communicatethrough one or more networks 42 with one or more host computersschematically indicated 44. First computer 44 includes at least oneprocessor schematically represented 46 which is in operative connectionwith at least one data store schematically indicated 48. The processorsand data stores associated with host computer 44 is operative to carryout computer executable instructions that are stored in at least onedata store.

As represented in FIG. 1 in the exemplary arrangement, host computer 44is in operative communication through one or more networks 50 withfinancial transaction servers 52, 54 and 56. Each of servers 52, 54 and56 each include at least one processor and at least one associated datastore as schematically shown.

In the exemplary arrangement the system further includes at least oneremote computer 58. In the exemplary arrangement at least one remotecomputer 58 is in operative communication with the system throughnetwork 50. Remote computer 58 includes at least one processor and atleast one data store as schematically shown. Further in the exemplaryarrangement remote computer 58 is also in operative connection withother networks such as network 60 that is schematically shown, as wellas other servers 62. Further in the exemplary arrangement the at leastone remote computer 58 may be in operative connection with wirelesscommunication networks as schematically indicated 64 as well as othertypes of public or private networks. The configuration of the particularsystem will depend on the nature of the system and the types oftransactions to be conducted.

In operation of the exemplary arrangement a user at an automated bankingmachine such as automated banking machine 12 is enabled to carry outtransactions involving a user's financial account. This is accomplishedin the exemplary arrangement by a user providing to the card reader ofthe machine, a suitable card such as a credit or debit card thatincludes card data that is usable to identify the financial accountassociated with the user. The controller 34 of the exemplary automatedbanking machine is operative in accordance with its programming to causethe card reader to read the data from the user card. The controllerfurther operates to cause the display to output indicia that prompts auser to input other identifying data to the machine such as a personalidentification number (PIN) through the keypad 22 of the machine. Thecontroller then operates to cause the user input PIN or otheridentifying data to be received through the keypad. Alternatively insome arrangements other or additional identifying data may be received.Such data may include biometric data such as a fingerprint input throughan input device such as a fingerprint reader. Other identifying data mayinclude a facial recognition scan, an iris scan, a retina scan, voicerecognition or other suitable identifying data that may be input via aninput device which can receive such inputs. For purposes hereof each ofsuch types of user identifying input data will be referred to as a PIN.

In the exemplary arrangement the controller 34 operates in accordancewith its associated programming to cause the display to output messagesto the user which ask the user to select the type of transaction thatthey wish to conduct through operation of the machine. For purposes ofthis example, the user will select a cash dispense transaction which theuser indicates by providing inputs by pressing the appropriate keys 30of the machine. In the exemplary arrangement, in response to the userselecting a cash dispense transaction, the at least one controller 34operates to provide outputs through the display to the user promptingthe user to input the amount of cash they wish to have dispensed inconnection with the transaction. The controller then operates to causethe user input amount to be received through operation of the keypad 22or other user input device of the machine.

In response to receiving these items of information from the machineuser, the exemplary controller 34 operates in accordance with itsprogramming to cause one or more messages to be sent to the host 44. Themessages sent to the host 44 are transmitted through the networkinterface 40 and through the one or more networks 42 to the host 44. Themessages sent by the automated banking machine to the host include datacorresponding to the inputs provided by the user to the machine.

In the exemplary arrangement the host 44 operates in accordance with itsprogramming to determine if the data read from the user card correspondsto a user financial account that is authorized to conduct a transactionat the machine. This is accomplished in the exemplary arrangement by theprocessor 46 of the host 44 determining if the card data corresponds todata stored in the one or more data stores 48 associated with the host.In this exemplary arrangement if the data read from the user cardcorresponds to an account that is authorized to conduct a transactionthrough operation of the machine, the host then determines if thecustomer input PIN corresponds to user identifying data associated withthat particular account. This is accomplished by comparing datacorresponding to the input PIN to data stored in the at least one datastore 48. Thereafter if the PIN data that is input corresponds to thePIN associated with the account, the host computer then operates inaccordance with its programming to determine if the financial account ofthe machine user includes a balance that is at least equal to the amountthat the user has requested to be dispensed from the automated bankingmachine. The host computer does this by comparing the financial accountdata stored in one or more data stores regarding the balance in theaccount to the amount requested by the machine user.

If the host computer determines that the card data and PIN data areauthorized and that the user's account has sufficient funds to enablethe user to withdraw the amount requested, the host then operates inaccordance with its programming to send one or more messages to theautomated banking machine. The messages sent by the host computer areindicative that the transaction requested by the user is authorized tobe carried out. Of course it should be understood that in the event thatthe card data does not correspond to the account of a user authorized toconduct a transaction at the machine or if the PIN data is notappropriate for that account, then the host computer will send one ormore messages to the machine that indicate that the transaction is notauthorized. Likewise if the host computer determines that the user doesnot have a suitable balance in their account to cover the requested cashwithdrawal, the host computer will likewise send one or more messagesindicating that the transaction is not authorized. In cases where it isindicated that the transaction is not authorized, the at least onecontroller 34 operates in accordance with its programming to provide oneor more outputs through the display 26 to indicate to the user that thetransaction is declined. The exemplary controller further operates inaccordance with its programming to return the user's card to the userthrough operation of the card reader. Thereafter the machine returns tothe waiting state to conduct another transaction that will start withthe input of another card.

In the exemplary arrangement if the one or more messages sent by thehost to the automated banking machine indicate that the transaction isauthorized, the at least one controller 34 operates in accordance withits programming to cause the cash dispenser to operate. The cashdispenser is operated to make available to the user of the machine, cashcorresponding to the amount of cash that the user has requested. Theexemplary controller also operates in accordance with its programming tocause the printer 24 of the machine to operate to produce a receipt forthe user which indicates the details of the transaction including thevalue of the cash dispensed.

In the exemplary arrangement the controller 34 also includes one or morerecords in its data store 38 regarding the carrying out of thetransaction and the fact that the cash was dispensed. Further thecontroller operates in accordance with its programming to send one ormore messages to the host computer 44 to indicate that the cash dispensewas successfully carried out for the user. In response to the receipt ofsuch messages, the exemplary host operates in accordance with itsprogramming to assess a charge to the user's account corresponding tothe value of the cash dispensed.

Of course the process described is utilized for authorizing transactionsin situations where host 44 has access to the data necessary toauthorize financial transfers for the particular user at the machine. Insome exemplary transactions, the host 44 may not have direct access tothe data associated with the particular user's account that issufficient to authorize the user's requested transaction. In sucharrangements when the host 44 receives the data related to the requestedtransaction, the host 44 will operate in accordance with its programmingto determine that it does not have the capability to determine whetherthe transaction requested should be authorized. In such arrangements thehost 44 operates in accordance with its programming to route thetransaction data in one or more messages to the appropriate network suchas network 50 which includes the remote server such as server 52, 54 or56 that can determine whether the transaction should be authorized.

In the exemplary arrangements the transaction data routed to theappropriate remote server is then analyzed in a manner like thatpreviously described in connection with host 44 to determine if the carddata corresponds to an account that is authorized to conduct atransaction through operation of the machine. Further the appropriateremote server operates in accordance with its programming to determineif the customer input PIN corresponds to an authorized user of theaccount and whether the user account has sufficient funds to cover therequested cash withdrawal. The remote server then operates in accordancewith its programming to communicate through the network 50 to the host44, messages which include information on whether the transactionrequested is to be authorized or denied. The host 44 then communicatesthe appropriate messages to the machine. If the transaction isauthorized, the machine communicates that it successfully carried outthe transaction to the host 44. The host 44 then communicates thisinformation through the one or more networks 50 to the appropriateremote server. The server then causes the user's account to be assessedan amount corresponding to the value of the cash dispensed.

It should be understood that the approaches described are exemplary. Inaddition other types of transactions such as deposits, account balanceinquiries, check deposit transactions, check cashing transactions,converting electronic value stored on a mobile device to cash or viceversa, cash accepting transactions, or other types of transactions maybe conducted in other exemplary embodiments. Further exemplary systemsmay include features like those described in the following U.S. Patents,the disclosures of which are incorporated herein by reference in theirentirety: U.S. Pat. Nos. 8,365,985; 8,376,219; 7,934,644; 7,857,208;7,844,512; 7,819,309; 7,689,509; 7,653,601; 7,582,944; 7,533,805; and6,966,487.

In some exemplary embodiments the at least one remote computer 58operates to identify situations where fraudulent transactions may beoccurring. For example in some situations where card data and PIN datafor a financial account has been stolen by criminals, numerousfraudulent cards may be produced by criminals in different parts of thecountry or in various countries of the world. These criminals mayconduct numerous frequent transactions on the account until the accountbalance is depleted. Often these transactions may be occurring atnumerous different automated banking machines or at other types ofterminals where value is given, such as at a point of sale or service indiverse locations. The fact that numerous transactions are occurring inrapid succession on a given account may not be realized until after thecriminals have successfully depleted a significant portion of the fundsin the account for which the card and/or PIN data or other authorizeduser data that enables carrying out transactions has been stolen.

In the exemplary arrangement at least one remote computer 58 is operatedto identify situations where transactions are occurring on a particularaccount and to provide an alert message in the event a particularaccount is having an abnormally high number of transactions attemptedthereon. By determining that a particular account is experiencing anabnormally high level of activity, the remote computer can provide thealert message so as to enable the entity which holds the account to takeappropriate action such as to suspend all further transaction activity.Further in the exemplary arrangement the at least one remote computerdoes not have the capability to identify the account number or otherdata for the particular account. Rather the remote computer receivesencrypted or other data which is unique to each account but which cannotbe utilized to determine the actual account number. Thus the at leastone remote computer does not have the associated security risks thatwould be associated with having such actual account data transmittedthereto over wide area networks, or even public networks, which may beaccessed by unauthorized persons.

In the exemplary arrangement the host computer 44 as well as each of theremote servers, for example servers 52, 54 and 56, each have associatedprogramming that operates to produce encrypted data that corresponds tothe account number data for each transaction that is requested at anautomated banking machine. In exemplary arrangements the encrypted datamay correspond to a one-way hash or other algorithmic result that isproduced from the account number data either alone or in combinationwith other data. The algorithmic result that is produced results inencrypted data that in the exemplary embodiment is unique to theparticular account number, but that may not be used to resolve theaccount number except by the particular computer that produced theencrypted data. In some exemplary arrangements the encrypted data may beused directly for purposes of comparison while in other arrangements theencrypted data may need to be mathematically manipulated using othervalues in order to resolve data that may be compared to other data toidentify a common account. Further in the exemplary arrangements thehost computer 44 and other servers may operate to provide securecommunication through the one or more networks 50 with the at least oneremote computer 58. Such secure remote communication may include variousapproaches such as secure socket layer communications or public keycryptography that ensures that the encrypted data sent from theoriginating computer is multiply encrypted and can only deliver theencrypted data to the at least one remote computer 58. Of course theseapproaches are exemplary and in other arrangements other approaches maybe used.

Logic carried out by the at least one remote computer 58 is representedschematically in FIG. 3. In the exemplary arrangement the at least oneremote computer operates to receive the encrypted data from the hostcomputer or server that has received a transaction request related to anaccount. This is represented by a step 66. The at least one computerthen operates in accordance with its programming to review the receivedencrypted data and to calculate the number of other transactions inwhich the same or corresponding encrypted data that corresponds to thesame account has been received within a prior time period. This mayinclude, for example, a time period which is a rolling window, such asthe previous one hour. This is represented by a step 68. Of course itshould be understood that this approach is exemplary and in otherarrangements other calculations may be made, such as a total number oftransactions that have been conducted on the particular account, theelapsed time since the last transaction or the number of transactionsthat were conducted within a fixed time window. Various approaches maybe taken depending on the particular analysis to be conducted toidentify an abnormal situation which represents a possible circumstanceinvolving stolen card data.

In the exemplary arrangement the at least one remote computer 58operates in accordance with its programming to determine based on thecalculated number of transactions, whether the transaction count hasexceeded a programmed threshold. This is represented in a step 70. Ifthe number of occurrences of receipt of the encrypted data whichrepresents the number of transactions carried out on a particularaccount, does not exceed the threshold based on the receipt of the mostrecent occurrence, the computer operates in accordance with itsprogramming to defer any action. However, in the event that the numberof transactions has exceeded the programmed threshold within the setrolling time window, the at least one computer operates to generate oneor more messages or statuses which comprise an alert. This isrepresented by a step 72. In some exemplary arrangements the at leastone computer may be operated to respond promptly to the receivedencrypted data so as to indicate to the server or host computergenerating the encrypted data that there is a possible problem. Thisreceived data is usable by the server or host computer to cause a denialof the then pending transaction and/or further transactions which arerequested on the account. In alternative arrangements other analysis inaccordance with the programming of the remote computer 58 may beconducted. This may include for example evaluating the timing betweensuccessive transactions. In this case the computer determines iftransactions are happening more quickly than a threshold, and if so,generates a signal corresponding to an alert. In some embodiments thecomputer may monitor and evaluate multiple factors in determiningwhether to generate an alert.

Further in the exemplary arrangement responsive to the generation of thealert, the at least one remote computer 58 is operative to send the datacorresponding to the encrypted data to other computers operativelyconnected in the system that might receive transaction requests relatedto the account. The sending of this encrypted data to the computerscauses the computers to operate in accordance with their programming tostore in their associated data stores the encrypted data or other datathat is produced when a transaction on that account is requested. Thusby holding the data corresponding to the encrypted data or data that canbe used to identify a transaction requested on the same account in theone or more data stores associated with the servers 52, 54 and 56 aswell as host 44, such systems may immediately take appropriate steps inaccordance with their programming, such as to deny a transactionwhenever a transaction on an account is requested and the mathematicalmanipulation of that account data to produce encrypted data correspondsto the encrypted data for which the alert has been generated. Further insome exemplary systems the receipt of the alert message and encrypteddata which can be used to identify transactions which may be suspect,may be utilized by the hosts, servers and remote computer to take stepsto try to minimize loss associated with the possible fraudulenttransactions. This may include, for example, notifying authorities ofthe particular transactions which were conducted recently on the accountand/or the locations where such transactions occurred. It may alsoinclude storing and/or transmitting video surveillance data or takingother appropriate steps that may be useful to identify and apprehendcriminals who may be conducting fraudulent transactions on the account.

In the exemplary arrangement the at least one remote computer 58 isoperative to maintain the alert status associated with the particularencrypted data until certain programmed steps are taken. For example,such status may be maintained until the at least one remote computerreceives messages that the alert status associated with that particularencrypted data should no longer be maintained. This is represented bythe step 76.

Of course it should be understood that the foregoing approach toidentifying a possible situation where account data has been stolen andis being used fraudulently is exemplary, and in other embodiments otherapproaches may be used. This may include, for example, includingsuitable programming in the at least one controller 34 associated witheach automated banking machine. Thus for example the controller may beprogrammed to produce the encrypted data directly and to send thisencrypted data either through the associated host or through otherconnected networks to the at least one remote computer which identifiesthe possible occurrences of fraudulent transactions on a stolen account.In addition as previously mentioned, in other exemplary systems, ratherthan having a common approach to producing encrypted data where the samedata corresponds to a common account, other approaches may be taken soas to send other data which can be resolved through appropriateprogrammed steps executed by the at least one remote computer 58 toidentify that the encrypted data sent from different sources correspondsto a common account. This may be done, for example, by programming ofthe automated banking machines, the host computer and the servers indifferent ways to produce the encrypted data, and by providingprogramming that enables the at least one remote computer to identifythat the different types of encrypted data correspond to one particularaccount. Further these approaches are useful in the exemplary embodimentbecause with the remote computer being incapable of determining theactual financial account data from the encrypted data, the financialaccount data remains secure. This is true even if the encrypted data istransmitted through an insecure network such as the Internet. Of courseit should be understood that these approaches are exemplary and in otherembodiments, other approaches may be used.

FIG. 4 shows an alternative arrangement in which one or more computers58 may be operated to identify unauthorized transactions, as well ascircumstances where account data may be stolen. In this exemplaryarrangement transactions are carried out on the account using a mobilewireless device such as a smart phone 78 represented schematically inFIG. 1. It should be understood that in exemplary arrangements awireless device may correspond to other types of devices such as tabletcomputers or wearable computers which are usable by consumers to conducttransactions at an automated banking machine. Alternatively the wirelessdevice may correspond to an article associated with a user such as auser's vehicle which incorporates one or more computers within thecircuitry thereof.

In the exemplary arrangement the mobile wireless device is operative tocause data corresponding to the financial account to be sent to theautomated banking machine at which the user wishes to conduct atransaction. This may be done, for example, by the mobile wirelessdevice sending data from the device wirelessly through the input device32 of the automated banking machine. The mobile device may be operativeto cause the automated banking machine to receive data that is usable toidentify a financial account. This may be done, for example, in somearrangements by the mobile device sending the automated banking machinedata which corresponds to an account number directly. Alternatively insome arrangements the mobile wireless device may cause communicationswith other systems which then cause the automated banking machine toreceive data which corresponds to or is usable to resolve the accountnumber. For example in some exemplary arrangements systems may includefeatures like those described in the following U.S. Patents which areincorporated herein by reference in their entirety: U.S. Pat. Nos.8,281,989; 8,376,221; 8,474,707; 8,052,048; 7,216,800; 7,201,313; and8,480,307. Of course these approaches are exemplary and in otherarrangements other approaches may be used.

In the exemplary arrangement at least one processor included incircuitry of the mobile wireless device 78 may operate in accordancewith its programming to cause encrypted data that corresponds to thefinancial account on which a transaction is to be conducted to be sentto the at least one remote computer. This may be done for examplethrough communication via wireless networks 64. Further as the automatedbanking machine host computer or server which receives the requestedtransaction also sends encrypted data that corresponds to the account,this enables the at least one remote computer to identify a common pairof communications having encrypted data that are both received close intime for each authorized transaction. The at least one remote computer58 is programmed to identify circumstances where both instances of theencrypted data for the given transaction have not been received and toidentify such circumstances as a possible situation where a fraudulenttransaction may be occurring. The logic associated with such a remotecomputer that identifies such circumstances is represented in FIG. 4.

In this exemplary arrangement the at least one remote computer 58receives the encrypted data associated with the account either from themobile wireless device, server, host or automated banking machine asrepresented in step 80. As in the prior example the at least one remotecomputer that operates to calculate the number of transactions indicatedas attempted on that account within a given time period. This isrepresented by a step 82. If the number of transactions is determined tohave exceeded the threshold, as represented in a step 84, the at leastone computer executes steps similar to those in the prior example. Theseinclude generating an alert, sending the encrypted data to the remotesystems and holding the alert status until it is reset. This isrepresented in steps 86, 88 and 90 respectively.

In this exemplary arrangement, in situations where the at least oneremote computer is expecting to receive two paired messages in closelyspaced time relation in order to indicate that a transaction isauthorized, the at least one computer operates in accordance with itsprogramming to determine if the two paired messages associated with theone transaction were received. This is accomplished by the at least oneremote computer comparing the messages received with the encrypted datathat corresponds to the particular account and the timing associatedwith the receipt thereof. This is represented in a step 92. Adetermination is made in a step 94 concerning whether the two pairedmessages for the common transaction were received. If the two pairedmessages for the single transaction were received close in time as wouldbe normally expected, then the at least one remote computer 58 operatesin accordance with its programming to not indicate that there is aproblem. In the exemplary arrangement the at least one remote computeroperates in accordance with its programming to adjust the transactioncount of transactions on the account to accommodate that two messagesare received for each transaction. This is represented in a step 96.Thereafter the at least one remote computer operates to continue tomonitor for any potentially problematic conditions.

However, if in the step 94 it is determined that paired messages fromthe mobile wireless device and from the automated banking machine, hostcomputer or server computer receiving the transaction request were notboth received, the computer operates in accordance with its programmingto identify an abnormal condition and to generate an alert. This isrepresented in a step 98. As can be appreciated, the absence of bothmessages of the expected pair may represent a circumstance where atransaction has been attempted by a criminal or unauthorized person whois not using the authorized mobile wireless device, but is insteadproviding the account data from an unauthorized source such as acounterfeit card or other fraudulent input device. Alternatively thecondition may represent the circumstance where criminals have set up afraudulent terminal to receive transaction data so as to capture thedata for purposes of conducting fraudulent transactions. In either casethese circumstances represent a suspect condition.

In the exemplary arrangement the computer operates in accordance withits programming to identify that there is an abnormal conditionassociated with the account as appropriate to the other computers in thesystems. This will enable such computers to identify further attemptedtransactions on the account and to deny them in accordance with theirprogramming. Further the at least one computer operates in accordancewith its programming to hold the alert status associated with theaccount until it is reset.

Of course it should be understood that these approaches are exemplaryand in other embodiments, other additional steps and arrangements may betaken similar to those described herein for purposes of identifyingsuspect transactions and for denying such transactions and reportingcriminal activity.

FIG. 5 shows an exemplary arrangement of a mobile wireless devicegenerally indicated 100 that may be used in connection with an automatedbanking machine or otherwise for purposes of carrying out financialtransactions. The exemplary device 100 is configured as wearableglasses. However, it should be understood that in other arrangementsother configurations of devices may be used. For example, configurationssimilar to that of a wrist watch, a medallion or a hat or other item ofclothing may be used. The exemplary embodiment of device 100 includes atleast one circuit which is operative to control the operation of devicesthat are included as part of the mobile wireless device. The at leastone circuit designated 102 in FIG. 6 includes a processor 104 and anassociated data store 106 which may be of the types previouslydescribed.

The exemplary arrangement further includes a source of electrical powersuch as a battery 108. The exemplary arrangement further includes agenerally transparent display 110, an outward facing camera 112 and aninward facing camera 114. The exemplary embodiment further includes amicrophone 116 and a speaker 118. The exemplary embodiment furtherincludes a wireless transmitter 120. The wireless transmitter 120 issuitable for transmitting wireless signals between the mobile wirelessdevice 100 and other devices. The wireless transmitter 120 may include ashort range wireless transmitter such as a short range RF transceiver ora Bluetooth™ transceiver. Alternatively the wireless transmitter mayinclude an infrared transceiver. Alternatively the wireless transmittermay include a transceiver suitable for communication via a cellulartelephone network, WiFi or other wireless network. Further in somearrangements of the mobile wireless device the apparatus may includemultiple types of wireless transceivers depending on the nature of thecommunications to be carried out through operation of the device.

As represented in FIG. 6, exemplary embodiments of the mobile wirelessdevice may operate to carry out financial transfers. This may be donethrough communication with an automated banking machine in one of theways described in the incorporated disclosures. In other arrangementsthe mobile wireless device may cause financial transfers throughcommunications via a cellular network, a local wireless network or otherlocal or wide area network. The exemplary mobile wireless device isoperative to include data in its data store that is usable to identify afinancial account. In the exemplary arrangement the data store of themobile wireless device also includes data that corresponds to a userbiometric feature. In some exemplary arrangements this may includeprogramming in the data store that includes data that corresponds to thetopography of an authorized user's iris topography of one or both of theuser's eyes. The user's iris topography uniquely identifies theauthorized user and can be captured through the use of at least oneinward facing camera 114. Further in some exemplary arrangements themobile device may include multiple inward facing cameras or othercameras that can capture iris topography of both irises of theauthorized user. In addition or in the alternative other mobile devicesmay include capabilities for identifying a user's facial topography,retina features and/or other biometric features that can be utilized toidentify the user.

Responsive to the inward facing camera or cameras 114 capturing datacorresponding to the user's iris topography or other identifying data,the circuitry 102 may operate in accordance with its programming toverify that the mobile device is being operated by the authorized user.This may be done by comparing captured electronic image data to storeddata to determine whether there is correspondence or anotherpredetermined relationship which indicates the user is an authorizeduser. Responsive to such verification determination the authorized usermay then provide instructions to the mobile device in connection withcarrying out a financial transaction and the mobile device will operatein accordance with its programming to execute instructions responsive tosuch commands. This may be accomplished in some exemplary arrangementsby the user providing spoken commands that are received by themicrophone 116 and determined as transaction related inputs throughoperation of the control circuit 102. Alternatively the user may bepresented with menu options or similar options through the display 110,which options the user may select. Selections may be made and input insome embodiments by providing spoken commands that correspond to theoptions. Alternatively the user may provide selected inputs which enableselecting transaction options output on the display through moving afinger along a tactile sensing bar or other similar input device 122. Instill other exemplary arrangements the user may provide inputs througheye movements or line of sight determinations which are detected by theone or more inward facing cameras 114. This may be done for example byutilizing features such as those described in U.S. Pat. Nos. 8,220,706and/or 8,883,008 the disclosures of which are incorporated herein byreference in their entirety. For example in some exemplary arrangementsthe circuitry connected with the at least one camera 114 may determine alocation where a user eye is looking on the display 10. By determiningwhat particular transaction selections or options the user is lookingat, the control circuitry may determine user provided inputs. Forexample in some instances the user may look at a particular selectionbeing provided on the display and designate that selection by blinkingone eye or both eyes. When this is done the control circuitry may thenoperate to provide additional outputs and/or messages that enablecarrying out the transaction selected by the user.

As represented in FIG. 6, the mobile wireless device 100 may be used forexample to send data associated with a user desired transaction to anautomated banking machine 124. Such data may include data such as carddata that is usable to identify a user's account. Such data may bestored in the at least one data store 106 and then transmittedwirelessly to the machine. Further in some arrangements the user mayselect through the mobile wireless device an account, a transaction typeand/or an amount associated with a transaction that they wish toconduct. Data corresponding to these items of information may beincluded in messages transmitted to the automated banking machine andreceived through a wireless portal on the machine. This may be done inany one of several ways that are described in the incorporateddisclosures or in another suitable manner.

Alternatively in some arrangements the mobile wireless device 100 maycommunicate data to a server 126 that is remote from the automatedbanking machine. The server 126 may utilize the data sent from themobile wireless device to resolve transaction data that is needed by theautomated banking machine to carry out the transaction. This mayinclude, for example, account data or other data such as amount data,PIN data or other data that is needed by the machine 124 for purposes ofcarrying out the transaction. This data may be transmitted from theserver 126 to the machine through one or more networks 128. Thisapproach may be utilized, for example, when the mobile device does notinclude data that directly corresponds to the account information, butrather pseudo data that may be utilized by one or more remote servers todetermine the actual account information. Thus for example server 126may include in its associated data store, data that associates thepseudo data that is provided from the mobile wireless device with theactual account data. The actual account data may then be sent in anencrypted and secure manner to the automated banking machine. Thisapproach may avoid the need, for example, for the mobile wireless deviceto have included in its data store actual account number data.

Also in other alternative arrangements the mobile wireless device mayuse its outward facing camera 112 to capture data that is output on thedisplay or other output device of the automated banking machine. Suchoutput data may be used in the manner of the incorporated disclosures toidentify a particular machine at which a transaction is to be conducted.This identifying data or data based thereon may then be transmitted tothe remote server so as to enable user operation of the automatedbanking machine. Alternatively or in addition data captured through theoutward facing camera of the mobile device may correspond to values,functions and/or instructions that may be utilized for purposes ofencrypting account data that is stored in a data store of the mobilewireless device. For example, bar codes such as QR codes output througha banking machine display may provide values or instructions utilizedfor purposes of encryption of account data. Such encrypted account datamay then be sent to either the automated banking machine and/or theremote server for purposes of securing the account data to reduce therisk that it can be intercepted during the transaction. This may be donea number of different ways including those described in the incorporateddisclosures as well as in other suitable ways depending on theparticular operation of the system.

In this manner a user may accomplish transaction steps through thewearable mobile wireless device or other user device for purposes ofcarrying out financial transfers. Further it should be understood thatalthough in the exemplary arrangement the mobile wireless device is usedin connection with an automated banking machine to accomplishtransactions, in other arrangements other devices and systems may beutilized and messages from the mobile wireless device may accomplishfinancial transfers, account balance checking, bill payment, checkcapture or other desired transaction operations. For example in someexemplary embodiments the mobile wireless device may utilize an outwardfacing camera for purposes of capturing an image of a check. The usermay provide instructions either verbally or through input devices tocapture the image of the check and then cause the check to be depositedin the user's account. This may be done, for example, in the mannershown in U.S. Pat. Nos. 8,418,916; 8,286,867; and/or 8,104,676 thedisclosures of each of which are incorporated herein by reference intheir entirety.

Further in other exemplary embodiments data corresponding to electronictickets or other items representative of value may be loaded into thememory of the mobile device. This may be done, for example, throughcapturing images thereof through the outward facing camera or otherwisethrough transmission wirelessly to the device. The mobile wirelessdevice may thereafter be utilized to transmit data which may be utilizedfor purposes of redeeming or utilizing the items of value. This may bedone, for example, through approaches described in U.S. Pat. No.8,387,864 the disclosure of which is incorporated herein by reference inits entirety. Of course these approaches are exemplary, and in otherembodiments other approaches may be used.

Further other exemplary arrangements of the mobile wireless device maybe useful to accomplish other transaction functions. For example in someexemplary arrangements the circuitry associated with the mobile devicemay be programmed to identify genuine items of value such as currencybills. This may include, for example, executable program steps that areusable to verify that visible and/or other sensor perceivableauthentication features are present in a particular currency bill. Thus,for example, a user may operate the mobile wireless device to captureone or more images of a currency bill through operation of the outwardfacing camera 112. This may be done, for example, by the programmedinstructions associated with the mobile device instructing a userthrough audible prompts or the visual outputs through display 110 tolook at certain features on a currency bill. The control circuitry ofthe mobile wireless device may operate to utilize the eye trackingcapability to monitor the eye or eyes of a user to direct or analyzeareas in the field of view of outward facing camera at which the user islooking, to a series of features that may identify a currency bill asgenuine. In this way the front and/or back of a currency bill may beanalyzed to verify that indicia or other visible features indicative ofgenuineness of the bill are present. In addition alternative exemplaryarrangements may include infrared, ultraviolet and/or spaced cameras forpurposes of capturing images of authenticity features. Alternatively auser may be prompted to take certain steps with one or more separatedevices. This can include illuminating certain areas with radiation atcertain frequencies, tilting the bill, bringing the bill closer to thecamera to detect features or testing for magnetic or other sensedproperties. The camera may capture features or indications of propertiesor characteristics that are indicative of whether notes are genuine.This approach may be utilized in some exemplary arrangements to enable auser to identify counterfeit or suspect notes that a user receives in atransaction environment and to decline such notes as may appear to besuspect. Further in some example arrangements the wireless communicationcapability of the mobile wireless device may enable the user to operatethe mobile device to analyze, verify or record data in one or more datastores that correspond to the genuine or suspect status of currencybills that are analyzed through operation of the mobile device. Thus inthis manner the user can avoid accepting counterfeit currency bills thatmay be attempted to be passed to the user.

Alternatively or in addition the mobile wireless device may be operativeto verify the authenticity of other items or documents. This mayinclude, for example, the capability to identify the genuineness of acredit or debit card through analysis of the visual or other non-contactsensor detectable features included thereon. Thus for example a merchantwho wishes to accept a credit or debit card may utilize the mobilewireless device to analyze the features that are on the card includingholograms, security codes, or other features that identify the card asgenuine. Further in some arrangements such cards or other items mayinclude wireless transmitters or other similar items, such as RFID tagsthat can be utilized to output signals which can indicate that the cardor other item is genuine. The mobile device may include appropriatesensors to capture and analyze such signals and properties and mayoperate one or circuits that include processors to determine of the cardor other item is genuine.

Further in some exemplary embodiments the mobile wireless device cancapture image data from the card or other record including for exampleaccount number data, verification codes, name data or other items thatare usable to carry out a financial transaction. In such arrangements,for example, an operator of the mobile wireless device may utilize themobile wireless device to obtain the data from a card that is necessaryto identify the particular account with which the card is associated andalso to verify the genuineness of the card. In this manner by providinginstructions to the mobile wireless device, the operator of the deviceis enabled to accept payments or otherwise accomplish functions thatinvolve a transfer to or from the account associated with the particularcard. Such an approach may enable the operator of the mobile wirelessdevice to accomplish the acceptance of credit card and/or debit cardpayments without a need to have a separate terminal that operates toreceive the card, read data from a stripe or computer chip on the card,or otherwise to identify the particular card as genuine and authorizedto conduct the transaction.

In other exemplary arrangements, the mobile wireless device may be usedto capture signature data of a person conducting a card transaction. Forexample, the mobile wireless device may be used to accomplish theresolution of account number data from image data captured by theoutward facing camera from the front and/or rear face of the user'scard. In cases where an account user's signature is also required tocarry out the transaction, an exemplary mobile wireless device maycommunicate with an automated banking machine, a receipt printer, a cashregister or other device that can produce an item to which a user'ssignature may be applied. For example, a receipt corresponding to thetransaction may be printed by the device responsive to communicationwith the mobile wireless device. The user may then apply their writtensignature thereto. An image of the signed receipt may then be capturedand stored through operation of the mobile wireless device to documentthe transaction. In some arrangements, the mobile wireless device mayoperate to communicate the account data, amount data, card verificationvalue and other data captured from the card and the receipt to one ormore remote systems so as to cause the financial transfer associatedwith the transaction.

In other arrangements, the mobile wireless device may operate tocommunicate with a device such as a display terminal that outputs thedetails regarding the transaction and which enables the user conductingthe transaction to apply an electronic image of their signature using astylus or similar device. The mobile wireless device may operate tocapture images of the transaction details and user signature that areoutput on the display of the display terminal. In other arrangements,the mobile wireless device may have integrated therewith a card reader.Such a card reader may include a wireless portal that is operative toreceive wireless data corresponding to account data via RF signals oroutput from a chip or similar device embedded in a user's card. In otherarrangements, the mobile wireless device may include a contact readerthat is configured to engage the contacts of a chip embedded in a cardsuch as an EMV chip. Such a card reader may obtain data that correspondsto the account of the user as well as other data that authenticates thegenuineness of the card. In other exemplary arrangements, the mobilewireless device may operate to obtain card data by wirelesscommunication with a separate card reader device with which a user cardcan be engaged. Such a separate reader device may be integrated with aprinter, automated banking machine, cash register, display terminal orother type device that is used in connection with carrying outtransactions. Such approaches enable the exemplary mobile wirelessdevices to obtain account data from the user's card as well astransaction data and to communicate such data with other devices andsystems so as to cause the financial transfers associated withtransactions.

In still other exemplary arrangements, the mobile device may be utilizedto identify features which are indicative of authenticity on articlessuch as event tickets, gaming tickets, lottery tickets, coupons,vouchers, scrip or other items. In this manner the mobile wirelessdevice may be programmed to utilize image data and/or other data whichcan be visually or wirelessly read by the device, or with the aid ofanother device, to determine the genuineness of such articles. Of coursethese approaches are exemplary and in other embodiments other approachesmay be used.

In still other arrangements the mobile device may be utilized to provideuseful features in connection with conducting transactions intransaction environments where cash or other items of value are acceptedby merchants or similar entities. For example in some establishments,merchants may prefer to receive cash payments for the goods and servicesthey provide. Cash payments have the advantages that they avoid therisks and costs that may be associated with taking payments by eithercredit or debit cards. Some establishments even provide automatedbanking machines that dispense cash within their establishment so thatusers can readily obtain cash for purposes of making purchases. However,such automated banking machines that dispense cash in merchantestablishments may commonly charge a fee for purposes of conducting thetransaction. This fee may be several dollars in some cases.

In order to facilitate the use of cash in some transaction environments,the establishment may be able to track the serial numbers of currencybills that are dispensed from an automated banking machine to patronswithin the establishment. This may be done using features like thosedescribed in U.S. Pat. No. 8,474,708, the disclosure of which isincorporated herein by reference in its entirety. In such arrangementsthe serial numbers and/or other machine readable indicia associated withdispensed bills may be stored in a data store associated with one ormore computer devices including one or more processors that areaccessible by the wearable computer devices worn by employees who arebill recipients such as sales clerks within the establishment. Suchmobile wearable computer devices may utilize features like thosepreviously described to evaluate currency bills for genuineness and toalso determine the serial numbers and/or other bill identifying indiciathereon. The wearable computer device may communicate the serial numbersand/or other identifying indicia from received bills to determine if thebills received by a bill recipient correspond to those dispensed by theautomated banking machine in the establishment. This may be done, forexample, through the use of cameras on a mobile wireless devicecapturing the serial number data and/or other indicia and resolving thecurrency bill identifying data in a manner that can be transmittedwirelessly to the computer which can access the serial number datacorresponding to bills dispensed from the banking machine. In caseswhere a serial number received by an employee is one that was dispensedfrom the machine, the merchant may offer a credit or a discount to thepurchaser. In this way the purchaser is compensated for spending themoney that they obtained through use of the machine and paying thesurcharge to obtain the cash. Such an approach may be very useful inproviding an incentive for individuals to spend the cash that theyobtain from the banking machine in the establishment where the machineis located. In addition it may enable the proprietor to evaluate thevalue of having the machine in terms of how much of the cash that isdispensed therefrom is actually spent by patrons within theirestablishment. This may be done through programmed instructionsassociated with one or more computers that evaluate the amountscorresponding to purchases by patrons in the establishment that arebased on bills that were dispensed from the machine. Further in theexemplary arrangement the computer data concerning serial numbers ofbills that are dispensed from the machine are only held for a limitedset period of time. This may correspond in some cases to a one dayperiod, as it would be expected that patrons would likely spend the cashthat they receive from the automated banking machine during the samevisit to the establishment in which the cash was received. Of course insome establishments the set period may be longer or shorter. After theset period of time, the data concerning the serial numbers of billsdispensed would no longer stored. This avoids the need for creating alarge database to hold serial number data associated with dispensedbills. Of course these approaches are exemplary and in otherarrangements other approaches may be used.

In some exemplary transaction environments, employees of a particularmerchant may have the wearable computer devices provided by theestablishment. It may be a requirement of the employment that theemployee utilize the wearable computer for business activities duringtheir work hours. In this way, the available functions of the devicescan be available at all times which the employee is on duty. In additionin some arrangements the employer may require that each employee storetheir wearable mobile wireless device in a particular location when itis not in use, such as during off hours when the establishment isclosed. In some exemplary arrangements a mounting shelf or stand may beprovided onto which the employee may place the wearable wireless mobiledevice when the employee's shift has ended. The placement of the mobiledevices when they are not in use may provide for additional uses of thedevices during off hours.

As can be appreciated, the cameras which are utilized on the wearablemobile wireless devices may serve as surveillance cameras during timesthat the establishment is not open. Such surveillance cameras may bemonitored from local or remote monitoring stations so that anyintrusions or abnormal conditions can be detected within theestablishment. Similarly audio receiving devices included on thewearable computer may be monitored during off hours for purposes ofdetermining abnormal noises which may be indicative of a break-in,machinery malfunction or other problem within the establishment. Byhaving numerous mobile devices positioned in various areas of theestablishment during off hours, it may be possible for a monitoringsystem to observe more areas from more different perspectives than wouldbe possible with stationary security cameras. In addition otherdetection features of mobile devices such as audible sounds or infraredsignals or other things that the wearable mobile devices are capable ofsensing, may be utilized in monitoring activities so that suchproperties may be detected to uncover abnormal or problematicconditions. Of course the capabilities of the wearable mobile wirelessdevices will determine the capabilities that can be achieved throughsuch arrangements and numerous variations to achieve effectivemonitoring may be utilized in various arrangements. In some arrangementsfeatures similar to those described in U.S. Pat. No. 8,302,856 which isincorporated herein by reference in its entirety, may be utilized.

FIG. 7 shows another exemplary automated banking machine with analternative arrangement generally indicated 130. Automated bankingmachine 130 may generally operate in a manner similar to automatedbanking machine 12 previously described and may include similarcomponents. This alternative embodiment also includes an item producingdevice generally indicated 132 which is alternatively referred to hereinas an article producing device. In the exemplary arrangement the itemproducing device 132 includes a 3D printer. The 3D printer is utilizedto produce items that are dispensed from or otherwise provided or madeavailable by the automated banking machine to a user.

In an exemplary arrangement a 3D printer or other type of materialprinter is utilized to produce an item that is representative of and/oris useable to obtain or redeemable for value. Specifically in someexemplary arrangements the printer is operative to print patterns ofconductive material that comprise RFID tags on a substrate to produce atoken article. The RFID tags are usable to produce signals correspondingto values that identify the token article as genuine and that areassociated with or representative of the value for which the tokenarticle is redeemable.

For example in some exemplary embodiments a user may operate theautomated banking machine in a manner similar to that previouslydescribed in connection with a cash dispensing transaction. However, inan exemplary alternative arrangement the user may elect through inputsto the machine, to receive an article such as a token articlecorresponding to a selected value rather than cash. This would be done,for example, where a user wishes to receive a token article that isredeemable for a particular type of merchandise or services availablefrom a particular identified retailer. For example in some arrangementsthe retailer may offer an additional bonus in terms of goods or servicesvalue above the amount that the user pays for the particular token inorder to provide an incentive for the user to acquire the merchant'sgoods or services. The user's account is assessed value corresponding tothe value of the token article that is provided to the user responsiveto operation of the automated banking machine. Of course thisarrangement is one of many that may be utilized in connection with thedescribed features.

In such arrangement the printer may operate as represented in FIG. 8 toproduce a token article that includes indicia and that can be securelyredeemed for value by the particular merchant. In this arrangement theprinter 132 includes a mechanism that operates to receive a piece oftoken substrate material from a storage magazine or similar storage areagenerally indicated 134. The single item of substrate that is removedfrom the storage area is then printed upon by applying one or morepatterns of metallic conductive material thereon in a printing chamber136. The printing chamber includes a printing head that deposits themetallic material such as silver or copper inks in patterns thatcorrespond to one or more RFID tags. This is accomplished responsive tocontrol provided by circuit 138. Circuit 138 includes one or moreprocessors and one or more data stores with programmed instructions suchas those previously described that are usable to determine the value orvalues corresponding to the desired tags and to produce the patternscorresponding to the RFID tags that are produced on the token. In someexemplary arrangements, the printed circuitry for producing the RFID tagor similar RF communication device may be pre-manufactured and includedon the substrate that is held in the magazine for producing the RFIDtags. This pre-manufactured portion of such tags may correspond tocircuit features that are common to all the tags that are to bedispensed. The circuit responsible for controlling the printing may thenonly apply such conductive circuit components that are necessary tocustomize the particular tag for the particular transactioncircumstances and which has the value associated with the tag that isbeing produced. Such an approach may enable the production of suchcustomized RFID tags more quickly through operation of the automatedbanking machine.

It should be understood that in the exemplary arrangement one or moreRFID tags that are produced on the substrate correspond to values thatare known by the controller of the automated banking machine and thatare communicated to one or more remote servers. This enables the tokenarticle that is produced through operation of the printer to beidentified as genuine or otherwise acceptable by RFID tag readers orother sensors positioned at the locations where the token may beredeemed for goods or services of the merchant. Further as can beappreciated, the RFID tags and associated circuitry that are included onthe token articles produced may include security features, encryptionfeatures, verification features, redemption indicating features or otheritems and features that are usable to prevent counterfeiting and assurethat the token presented is usable and genuine. Such features mayprovide wirelessly output electronic signatures that indicate thegenuine or authorized nature of the tag and its corresponding outputs.

Once the exemplary token article has been produced by the printer, it ismoved through operation of a suitable conveying mechanism through anopening 140 in the automated banking machine so that the token may beprovided from the machine and received by a user. As can be appreciated,the opening may be controlled by one or more suitable gate mechanisms142 or other mechanisms to help assure that access to the interior ofthe machine and the 3D printer from outside the machine is prevented.

Of course it should be understood that production of token articlescorresponding to value is merely exemplary of the types of items thatmay be produced through operation of an automated banking machineincluding one or more 3D printers or other printer types. For example insome exemplary arrangements the automated banking machine may be usableto produce articles that include plastic sheet materials. Such plasticsheet materials may include embedded metallic or non-metallic materialsand circuits which may be usable to identify the sheets as genuine andalso to indicate the value associated therewith. In addition visible andnon-visible elements may also be produced within or on the sheets so asto provide a visual appearance and detectable features that may indicateto a user the nature and/or value of the particular item. Such items maycommonly include items such as scrip, coupons, gift cards, tickets orother items that are representative of or are redeemable for or usableto obtain goods, services or other things of value.

Further in some exemplary arrangements such items may include embeddeditems that are included during their production in the machine. This mayinclude, for example, batteries, sensors, output devices, input devicesor other suitable items that may be either pre-produced and embedded inthe appropriate locations within the item when it is produced, oralternatively produced by multiple different types of 3D printers and/orother printers or devices included in the machine. For example andwithout limitation, some arrangements may include the capability of theautomated banking machine to produce a token, card or similar articlethat in itself can be operated as a transaction terminal that can beoperated by a user to carry out certain types of financial transactions.This may be accomplished by producing an item that includes a wirelesstransceiver, input and output devices, contact or non-contact connectorsand other things necessary to accomplish financial transfers throughcommunication. Such a produced item for example may include thecapability of transferring funds in an amount up to the associated valuethat the user selected in connection with the transaction with theautomated banking machine that resulted in production of the item.Alternatively in some arrangements the article may be usable as asubstitute for or in lieu of the credit or debit card used to acquirethe article from the automated banking machine. Of course this approachis exemplary and many different types of items may be produced utilizingthe principles discussed herein.

In some exemplary arrangements the automated banking machine may providetokens, cards or other articles that include circuits includingmicroprocessors and other electronic components. In some exemplaryarrangements the microprocessors and other circuitry may include organicmicroprocessors and other electronic components. Such components may beproduced for example in some exemplary arrangements by depositing thinfilms of alternating layers of organic material (for example, pentaceneand insulators) and metallic materials such as conductive inks forinterconnections. Such layers may be deposited onto a substrate such asa plastic material to produce microprocessors and other circuitcomponents that can execute instructions and other circuit componentfunctions. Such circuit components may also include, interface circuits,wireless transceivers, RFID tags, data stores, input devices and outputdevices such as emitters, indicators and displays. Such exemplarycomponents may provide outputs via card contacts, RF transceivers orother devices that are usable in connection with providing transactiondata or other information used for purposes of transactions.

In some exemplary arrangements such technology may be utilized forpurposes of providing processors such as microprocessors on or intransaction cards that can be used to provide verification of thegenuineness of the card. This may include, for example, producingmicroprocessor circuitry from organic material that carries outalgorithmic functions that identify the particular card as genuine.These algorithmic functions may be those developed by certain industrystandard setting organizations such as EMV. Using such approaches datasupplied as signals to circuitry on a card produces a result whichindicates that the card is the genuine card and not a counterfeit. Suchtechniques are particularly useful in connection with magnetic stripecards for which providing the separate circuitry including processorcapability is usable to generate verification values that provide anindication that the card is not counterfeit. Thus for example in anexemplary arrangement, data from a magnetic stripe on a card may be readby a card reader to provide account number and other data related to anaccount on which a transaction can be conducted. In addition, certaininputs to the microprocessor circuitry can be used by the circuitry toproduce one or more results. Such one or more output results may becommunicated and/or compared or otherwise used for purposes ofcomparison to data that indicates the genuineness of the card. Othermicroprocessors may output account identifying data which is usable toidentify a financial account. Different types of algorithms may be usedfor purposes of the programming of the microprocessors so as to utilizedifferent input values or other parameters to produce results which canbe verified as appropriate and corresponding to a genuine card. As canbe appreciated, various forms of encryption and decryption and othersecurity functions may also be included in such circuitry that includesthe microprocessor.

In some exemplary arrangements an automated banking machine may beoperated to apply microprocessor including circuits directly to an areaof an existing card. Such microprocessor based circuitry may then beutilized thereafter to verify the genuineness of that particular card.In some exemplary arrangements the microprocessor based circuitry maycommunicate via direct contact with conductive contacts that engage thecircuitry on the card that is applied through printing or othertechniques. In other arrangements the applied microprocessor circuit onthe card may communicate in a wireless manner via radio signals or othersignals similar to RFID tags previously discussed.

In some exemplary arrangements the automated banking machine may operateto take an existing card and with the permission of the user, apply theappropriate circuitry thereto to add verification capabilities that areusable in the future to verify that the card is the genuine card. Inother arrangements, the automated banking machine may operate to buildfor the user a new card or other article that includes appropriatecircuitry to provide outputs including article account identifyinginformation and/or outputs usable to verify that the card or otherarticle is genuine. This may be done in some arrangements, for example,by having a stored group of cards or other items which serve as thesubstrate or base part for the articles to be produced. The circuitsincluding microprocessors and other components are then applied by 3Dprinting to the substrate or base part to produce an article that can beused to provide outputs corresponding to transaction data, for exampledata usable to determine a financial account number, a user name and/orother information, and also in some embodiments outputs that can be usedto verify that the item is genuine.

In still other arrangements, 3D printer technology may be utilized toproduce an item without the use of a starting substrate or base part. Insome exemplary cases the 3D printer may be operated to produce a cardshaped article that includes therein circuitry and other components thatenable the use of the article as a credit card or a debit card. This mayinclude, for example, circuits including microprocessors or otherdevices produced via substance deposition techniques in appropriateconfigurations. Such circuits are operative to store and securelydeliver account data, verification data and other data that can beutilized to carry out transactions. For example card-like articles thatwirelessly communicate with automated banking machine card readers canprovide account data to be used to carry out purchase or bankingtransactions through connected terminal devices.

In still other exemplary arrangements, articles may be produced thatinclude appropriate circuits that communicate transaction data and/orother data with other devices so that a user can obtain goods orservices through use of the particular article. For example in someexemplary arrangements a 3D printer may be utilized to produce awearable article for a user that provides account data and othertransaction data to systems that communicate with the device. Thearticle may be operative to provide article account data. The articleaccount data may correspond to the financial account data used to obtainthe article from the automated banking machine. In other arrangements,the article account data may correspond to a stored value account thatcorresponds to the article and which is funded by funds from the accountused to obtain the article. In other arrangements, other sources offunds and accounts may be used. This enables a user to make purchases,transfer funds and carry out other functions without need forinteraction with dedicated financial transaction terminals. For examplein a transaction environment where a user makes purchases, the user maybe provided with a wrist band such as a bracelet or a pendant that theuser can wear while in the area where transactions are enabled to beconducted. Articles that a user can purchase are labeled with RFID tagsor other indicators of a price associated therewith. By transporting theitems from a location where they can be viewed and are positioned forsale within the establishment, to another area of the establishment suchas an area adjacent to the exit, wireless transceivers are operative toreceive signals usable to determine the particular articles that theuser is carrying and the user's account data by communication with thewearable article worn by the user in the transaction environment. Theuser's account may then be automatically charged for the items that aretaken from the transaction environment by the wearer.

In alternative exemplary arrangements that article may be produced via3D printing or other techniques previously discussed, and provided to auser for use in an area where the user may receive and be charged forgoods or services. Such areas may include for example, theme parks,fairs, movie theaters, amusement parks or other areas where a user ischarged based on where they travel within the establishment or venue.The article provided to the user may wirelessly communicate with sensorslocated in different areas so that the user's account data is sensed andthe account is automatically charged for the attractions that arevisited and/or services or goods received by the user. This may involvewirelessly sensing the presence of the article and receiving the accountdata therefrom as the user travels adjacent to sensors located at theentrance and/or exits of various attractions/services areas. Thus, forexample, in an environment where a user is attending a theme park, theuser may be charged for visiting certain premium areas of the park whentheir portable article is sensed within the premium area of the park.Alternatively, sensors may detect when a user enters the entrance to aparticular ride, enters a facility such as a buffet, enters an area ofan event such a performance venue, or enters another area for which acharge is applied. For example, in some exemplary arrangements,turnstiles, gates, doors or similar access devices may be used to enablethe user to access the particular attraction, area or thing for which acharge is made after the sensor adjacent to the access device operatesto read the wireless data from the article and determine that thearticle is suitable and authorized to have transactions conducted on theaccount that is associated with the data that is readable therefrom.

In some exemplary arrangements, the article produced for the user maycorrespond to the particular transaction environment in which thearticle is to be used. For example if the article is to be presented ina theme park, the article may be produced selectively by an automatedbanking machine responsive to corresponding user inputs to input devicesof the machine as an attractive bracelet or pendant including a designbased on the words, names, symbols or logos of the theme park or thecharacters (such as cartoon or other fictitious characters) associatedwith the theme park. Further 3D printing techniques may be used toinclude in the transaction article that is produced, personalizedinformation corresponding to user inputs such as the user's name orinitials or features such as words or symbols selected by a user. Forexample if a theme park is associated with several different cartoon orother fictitious characters, the article produced for the user can bemade in the shape of the user's chosen fictitious character that isselected via inputs to the input devices automated banking machine thatoperates to produce the item via 3D printing techniques. For example,user selections of various article shapes, properties or configurationscan be selected by presenting visual outputs corresponding to aplurality of possible user selections through a touch screen display orother output device of an automated banking machine, and the userproviding inputs by making selections corresponding to desired articleconfigurations and features through inputs through contacts with thetouch screen display. Of course these approaches are exemplary and inother arrangements, other approaches may be used.

In still other arrangements, the transaction articles produced may besuitable for generally continuous use in multiple different transactionenvironments. This would enable the user to use the article that isproduced in making purchases of goods and/or services in anyestablishment where the account data and verification data can be readby suitable sensing equipment. Alternatively such articles produced maybe programmed or otherwise configured so that they are limited and canonly be used during a given period of time after being provided to theuser from an automated banking machine. For example in the case of atheme park where a user has purchased a one-day pass, the transactionarticle produced through operation of the banking machine may beoperable to provide transaction data that is accepted for carrying outtransactions only during that day. In still other arrangements wirelessor contact communication with the article may be used to selectivelyturn the transaction capabilities of the item on and off. Thus forexample if the particular article is a token article that is usable formaking purchases in a particular type of store, wireless communicationor other communication with a transceiver may be utilized to turn on thecapabilities of the article to provide account or other transaction datawhen a user enters the store, and the capabilities of the article may beturned off automatically when the user exits. This may be done securelyso that user transaction data cannot be obtained from the item byunauthorized persons. Alternatively or in addition provision may be madefor the transaction capabilities of the article to be selectively turnedon and off by a user. This may be done, for example, by manual inputs toswitches, buttons, keypads or other input devices that are included inthe article. Such input devices may be included through the 3D printingtechniques or other printing techniques for including circuitry andother features in articles as previously discussed.

Further some exemplary arrangements may include using an automatedbanking machine to produce an article that has additional verificationfeatures. Such features may include, for example, circuit components andmicroprocessors that have the capabilities to receive inputs from users.As previously discussed, such articles may include input devices such asuser actuatable keypads or similar devices that can receive personalidentification numbers or other codes from a user. Thus for example insome exemplary arrangements an article can be produced for a user thatincludes a small keypad into which a user can provide a selected inputthat enables the device to output user account data and/or otherwisecarry out transactions until the capability is disabled. Such disablingcapability may be provided by the user providing an additional inputthrough the keypad or other device. Alternatively in other arrangementsthe article may be made so that use of the device in connection withconducting a transaction causes the circuitry therein to be operableresponsive to the programming of the circuitry, to disable the operationof the device after a single transaction has been conducted. Thereafterthe user would have to provide inputs or otherwise enable the articleagain if the user desired to conduct another transaction. For example insome arrangements if the article has been transaction enabled via inputsfrom a user, the article may wirelessly communicate via RF to deliverdata corresponding to the user's account and data which indicates thegenuineness of the article, in response to signals received from atransceiver associated with a particular merchant terminal or a merchantestablishment. In situations where the article was not transactionenabled, the article would not provide such communications and no suchtransactions could be conducted.

In other arrangements other types of input devices may be included intransaction articles that are produced through operation of theautomated banking machine. Such input devices may include, for example,sensors that are suitable for reading biometric inputs such asfingerprints. For example layers of suitable materials for sensing theridges of a user's fingerprints may be utilized to receive the uniquedata associated with contact with an authorized user's finger. Forexample in some arrangements if the user's finger is not currently incontact with the sensing area of a given article, the article will notoperate to communicate account data with transceivers that are connectedto a transaction system. Alternatively in other arrangements,programming associated with the article may be enabled to remainoperative to deliver account or other data for a period of time afterthe sensing area has been in contact with an authorized user'sfingerprint. In still other arrangements other types of sensing devicesmay be utilized for purposes of verifying codes, images, audible words,voice recognition or other things that are uniquely associated with auser for purposes of verifying that the article is in possession of andis being used by an authorized user to conduct transactions. Of coursethese approaches are exemplary and in other arrangements otherapproaches may be used.

In still other exemplary embodiments enhanced security for card basedtransactions may be accomplished by providing a user with a card, tokenor other device that may be used as an adjunct to their transaction cardwhen carrying out transactions. As previously discussed, enhancedsecurity for card based transactions is achieved by including a circuitincluding a microprocessor on or in a card, which circuit executesalgorithms and produces results which indicate that the card is genuine.Processor chips may be included on magnetic stripe cards for purposes ofverifying card genuineness and reducing the risk that the magneticstripe card has been counterfeited. In such arrangements the fact thatthe magnetic stripe of the card includes proper data identifying theuser and/or their account and the chip on the card, when properlysupplied with certain input signals and/or values produces a particularresult, shows that the card is genuine. However, providing users with acard with both a magnetic stripe and a chip may be more expensive orhave other drawbacks than providing to the user a card with a magneticstripe alone. This is particularly true if the user has already receiveda magnetic stripe card that does not include a processor chip.

In exemplary arrangements in order to provide enhanced security, theuser is provided with a separate article that can be used in conjunctionwith the magnetic stripe card. In some exemplary arrangements the useris provided with a card or token that includes a circuit including aprocessor programmed with suitable program instructions to produceresults that can be used to verify authenticity of a card. Suchprogrammed instructions may correspond to the algorithms developed byEMV Co. and which have been adopted by many transaction processors andcard issuers. Of course these approaches are exemplary and in otherembodiments other types of algorithms for card verification routines maybe utilized.

In some exemplary arrangements the circuitry embedded in the validationdevice may include wireless communication capabilities so as to enablenon-contact communication with a transaction terminal such as anautomated banking machine. Such communication may include radiofrequency communication of messages with a transceiver positioned in themachine. Such a transceiver may include an RF transceiver positionedwithin the card reading device of the banking machine that reads themagnetic stripe data on a card. Alternatively the transceiver may belocated in another location on the automated banking machine. Anadvantage of positioning the transceiver in the card reader is that itmay be used to communicate with circuits including microprocessors thatare embedded in cards that include a magnetic stripe, as well as withseparate verification articles that are separate from the magneticstripe card. For example in some arrangements the transceiver mayoperate to communicate with the verification article which is positionedin close proximity to the card slot of the automated banking machine. Insuch arrangement while the card bearing the magnetic stripe is receivedand read by the card reader, the verification article is placed in closeproximity to the card reader slot and communicates with the transceiverso as to receive the initiation messages and provide the results inresponse thereto so as to confirm the genuineness of the associatedmagnetic stripe card. Further in exemplary arrangements, theverification article is programmably changeable through communicationwith the transceiver so that in subsequent transactions the verificationresults data produced through operation of the circuit andmicroprocessor on the verification article corresponds to differentresults required to verify the identity of the magnetic stripe card insuch subsequent transactions. In other exemplary arrangements, the datathat is provided for purposes of verification and resolving the accountnumber data may include data that is a function of both the data that isread from the card as well as data that is received wirelessly from theverification article. In such arrangements, while the data that is readfrom the stripe of the card may be generally static, the data stored inand recovered from the verification article may be dynamic and providethe necessary values to enable the automated banking machine to providedata from which the account number can be resolved as well as othervalues which indicate the genuineness of the card and/or verificationarticle.

In other arrangements the verification article may include other typesof devices. For example in some arrangements the verification articlemay comprise a wearable computer device which is worn by a user. In sucharrangements the programming associated with providing the results datato the transaction terminal which confirms the authenticity of themagnetic stripe card, is provided through communication with the RFtransceiver and processor circuitry included in the wearable computerarticle. The processor included in the wearable computer executes thealgorithms that provides the results which verify the authenticity ofthe card. Further one or more data stores associated with the wearablecomputer article enables the results to be modified and to correspond towhat is required to authenticate the card in subsequent transactions.Further in some exemplary arrangements the wearable computer article mayinclude data for multiple magnetic stripe cards so that each may beauthenticated through communication with the wearable article. As aresult the wearable computer device can serve as the verificationarticle for multiple magnetic stripe cards.

In still other exemplary arrangements a portable communication devicesuch as a smart phone may include programs that cause the at least oneprocessor in the smart phone to execute the verification algorithms thatreceive inputs and produce results that can be used to authenticate oneor more magnetic stripe cards. Such a smart phone may communicate viaradio frequency communication with a transceiver in an automated bankingmachine so as to receive the initiation data and provide the necessaryresults which help to prove the authenticity of the card. This may bedone via communication by a near field communication, Bluetooth or othersuitable communication type.

Thus these exemplary arrangements enable a magnetic stripe card thatdoes not include a processor thereon to nonetheless be verified as agenuine card by a user having possession of the verification articlewhich executes the verification algorithms and provides to a transactionterminal the one or more results that indicate that the card and/orcard-article combination is genuine. Such approaches can be used toavoid the need to deploy magnetic stripe cards that have includedthereon processors which execute algorithms to verify the genuineness ofthe card. Of course these approaches are exemplary and in otherembodiments other approaches may be used.

In still other exemplary arrangements remote communications may beutilized for purposes of verifying the genuineness of a transaction cardsuch as a magnetic stripe card. In such exemplary arrangements, aportable device such as a smart phone with the ability to communicateover a wide area network may execute the algorithms that produce resultswhich demonstrate the genuineness of a card. These may include, forexample, the EMV algorithms or other algorithms that are normallyexecuted on a microprocessor chip that is resident on a card. Ratherthan providing short distance RF communication as in the previouslydescribed embodiment, such a smart phone or other device may provideother wide area network communications such as via cellular phone orwireless Internet connections to the transaction processing host thatprocesses the card data. The communication of the verification data viathe wide area network may be encrypted to further assure that suchcommunications are not fraudulent. Further in order to avoid the risk offraudulent communications, the location of the verification articlewhich comprises a portable wireless device such as the smart phone, canbe determined by the one or more computers associated with the systemvia global positioning system signals to verify that the device is inproximity to the transaction terminal. This may be done using featuressuch as those disclosed in U.S. Pat. Nos. 8,479,983; 8,505,814;8,540,147 and/or 8,561,889 the disclosures of each of which areincorporated herein by reference in their entirety.

Of course it should be understood that these approaches may be combinedor used in conjunction with other approaches that are described in theincorporated disclosures for purposes of verifying that a transactionthat a user is requesting at an automated banking machine or othertransaction terminal, is authorized by the user. Such approaches mayinclude, for example, approaches where the user is contacted via theirsmart phone or other mobile wireless device through an automated system,and requested to provide at least one input to verify that thetransaction should proceed. In such arrangements the portable wirelessdevice of the user may operate not only to provide a message to thesystem to indicate that the transaction should proceed, but may alsocommunicate with the system to receive the necessary initiation data andprovide the results which demonstrate that the user card being utilizedin connection with the transaction, is genuine. Such systems may utilizefeatures such as those described in U.S. Pat. No. 8,353,450 thedisclosure of which is incorporated herein by reference in its entirety.Of course these approaches are exemplary and in other arrangements otherapproaches may be used.

FIG. 9 describes an alternative automated banking machine generallyindicated 143. Machine 143 is generally similar to machine 12 previouslydescribed except as otherwise indicated.

Machine 143 includes at least one recycler module generally indicated144. In exemplary embodiments the recycler may be a belt type recycler.Exemplary arrangements may include features like those described in U.S.Pat. Nos. 6,367,692; 6,367,691; and/or 6,264,102 the disclosures of eachof which are incorporated herein by reference in their entirety.

The exemplary embodiment further includes one or morecleaner/disinfecting devices generally indicated 146. In exemplaryembodiments the cleaner/disinfecting devices may include one or moreultraviolet radiation emitting devices. Such a device may be used in anultraviolet germicidal irradiation (UVGI) cleaning/disinfecting method.Such devices may be operative to emit UV-C or other radiation thatoperates to kill bacteria and viruses on surfaces, including thesurfaces of currency bills (which are alternatively referred to hereinas notes). In addition or in the alternative the cleaner/disinfectingdevices may also include devices that operate to scrub currency notesand to apply vacuum or other forces designed to cleanse the surfacesthereof of impurities and other unwanted substances. In somearrangements the cleaner/disinfecting devices may be usable to killdisease transmitting organisms that may reside on the surfaces ofcurrency bills. Alternatively or in addition in some arrangements suchcleaner/disinfecting devices may be usable to remove undesirablesubstances such as the residue of illegal drugs or contaminants or otherimpurities that may be present on bills, so that such substances cannotbe detected or absorbed through the skin by persons who receive andhandle such bills.

Exemplary arrangements may operate to enable automated banking machinesto clean, disinfect or otherwise process currency bills which arereceived in and/or dispensed from automated banking machines. Exemplaryarrangements may include the features described in allowed U.S. patentapplication Ser. No. 14/281,936 which is incorporated herein byreference in its entirety. In such exemplary systems automated bankingmachines may operate to selectively enable certain users to receive cashthat has been cleaned, is uncirculated or is otherwise less likely toinclude harmful organisms or other contaminants.

In alternative embodiments automated banking machines may accept and/ordispense other types of documents that may be desirably disinfected. Forexample, such machines may accept and disinfect financial checks,tickets, vouchers or other types of documents representative of value.Disinfecting such documents may reduce the risks of contacting virusesor bacteria by persons who subsequently receive or handle suchdocuments. Machines for handling such documents may include featureslike those described in the following U.S. patents, the disclosures ofeach of which are incorporated herein by reference in their entirety:U.S. Pat. Nos. 7,780,073; 6,331,000; 8,356,748; 8,763,897; 8,695,874;8,695,873; 8,701,985; 8,613,388; 8,608,060; 8,608,055; 8,573,483; and8,517,260.

FIGS. 10 and 11 represent the software and controller architectureassociated with an alternative exemplary automated banking machine. Ascan be appreciated in exemplary embodiments the controller includescircuitry which has one or more processors that execute computerexecutable instructions. Computer executable instructions correspondingto various types of computer programs are stored in the at least onedata store associated with a processor. These computer executableinstructions when executed cause the machine to operate to carry out thetransaction functions such as the functions previously described.

The exemplary computer executable instructions include a number ofdifferent software programs. These software programs as represented inFIG. 10 may include an operating system schematically indicated 222.Operating system 222 may include, for example, a Windows® operatingsystem, a Linux operating system, a Chrome operating system or othersuitable operating system for the particular environment in which theprocessor and associated software operate. The operating system alsocommunicates via a communications bus schematically indicated 224.Communications bus 224 may include a proprietary or non-proprietarycommunications bus such as for example a Universal Serial Buscommunications architecture that is suitable for communicating withtransaction function devices generally indicated 226, which are laterdescribed in detail. The exemplary software architecture includes aplurality of device drivers schematically indicated 228. Device drivers228 provide an electronic communication interface to the transactionfunction devices 226. In the exemplary arrangement specific devicedrivers for each particular transaction function device are included inthe software architecture.

In the exemplary arrangement the device drivers 228 are in operativecommunication with an XFS interface 230. The XFS interface may in someexemplary arrangements comprise a device interface layer that meets therequirements of the CEN Extensions for Financial Services Standard. ThisStandard provides a standardized software interface for numerousdifferent types of devices that are used in financial systems. Byincluding an XFS interface the exemplary software architecture providesa standardized software interface to which different software developersmay interface their machine operating software applications. This ispossible because the communications that are necessary to operate andreceive data from the devices are presented in a standardized formatwhich is available to application developers. Of course this approach isexemplary.

Further in the exemplary software architecture a software application232 is included. In the exemplary embodiment the software applicationincludes the computer executable instructions that are executed by theat least one processor of the at least one controller to cause themachine to carry out the transaction functions of the machine. Inexemplary arrangements the application software is what causes themachine to perform the necessary activities and to operate the variousdevices so as to enable the machine to carry out the various types offinancial transactions of which it is capable.

The exemplary software architecture further includes some other programsincluding security software programs represented 234. The securitysoftware 234 may include types of software that are suitable for theparticular type of automated banking machine. Such security software mayinclude, for example, firewall software that prevents the machine fromconnecting to unauthorized network addresses. Security software may alsoinclude software that is usable to identify viruses or other exploitsthat might execute on the machine. The security software may alsoinclude software that operates to enable security features of themachine and provide secure communications of the type hereinafterdescribed. The exemplary software architecture further includes certainutilities schematically represented 236. Utility software may include,for example, software that is needed to perform ancillary functionsassociated with the machine. This may include, for example, softwarethat keeps track of currency stored in the machine so that the machinecan report its current status to one or more remote computers. Theutility software may also include in some arrangements predictivemaintenance software which monitors aspects of machine operation andreports conditions that are likely to need attention in the near future.This may include potential device failures, replenishment of suppliessuch as paper, cash or other things that will likely need to be done tothe machine. Various types of utility software may be included in thesoftware of the machine depending on the particular type of automatedbanking machine involved.

As represented in FIG. 10, the exemplary transaction function devicescommunicate messages through the bus 224 with the controller thatincludes the representative software stack. The transaction functiondevices in the exemplary arrangement include a card reader 238. Anothertransaction function device of the exemplary arrangement includes anencrypting PIN pad 240. A thumbprint reader 242 which is an input deviceusable to receive identifying inputs from users is also included in thisexemplary arrangement. As schematically represented each of the devices238, 240 and 242 include one or more circuits which have respectiveprocessors and data stores. The circuits are capable of carrying outcomputer executable instructions stored in their respective data storesto enable these devices to not only carry out functions but also toprovide security features in a manner hereinafter discussed.

Another exemplary transaction function device that is included in thisautomated banking machine is a check scanner 244. Check scanner 244operates to produce images of financial checks that are received throughthe check scanner. The check scanner also includes circuitry whichincludes at least one processor and at least one data store asschematically represented. Check scanners and other devices used inexemplary arrangements may include features like those described in U.S.Pat. Nos. 8,418,916; 7,922,098; 7,837,096; 7,815,104; and/or 7,595,816the disclosures of each of which are incorporated herein by reference intheir entirety. In addition numerous other types of devices generallyreferred to as 246 may be included in the machine. Devices 246 may be ofthe types previously described such as displays, portals, outputdevices, input devices, sensing devices or other types of devices thatmay be included in the machine. Of course additional or differentdevices may be included in various embodiments.

Shown in FIG. 11, the software components referred to in FIG. 10 areexecuted in a controller 248 of the exemplary machine. The controllerincludes one or more circuits that include one or more data storesschematically indicated 250. Data store 250 of the exemplary embodimentmay include a processor controlled hard drive or other suitable datastorage unit that is controlled through operation of at least oneassociated processor. The control circuitry of the exemplary embodimentfurther includes at least one processor schematically indicated 252. Theprocessor 252 may include an Intel iCore processor or other suitableprocessor having structures and features like those previously describedthat is capable of executing the instructions stored in the at least onedata store.

The exemplary controller further includes a trusted platform module(TPM) schematically represented 254. The trusted platform module of theexemplary embodiment operates in accordance with programmed instructionsand provides a security device to reduce the risk of unauthorizeddevices operating in the machine. Further the trusted platform modulemay also be used to assure that the devices which operate in the machinehave not had their software programming modified from documented secureprogramming conditions. Such changes in software in the devices mayresult from attempts to conduct exploits on the machine. Further inexemplary arrangements the trusted platform module may operate toprovide secure communication between the controller and one or more ofthe transaction function devices in the machine. Exemplary embodimentsmay include features like those described in the following U.S. Patents,the disclosures of which are incorporated herein by reference in theirentirety: U.S. Pat. Nos. 8,474,698; 8,342,395; 7,988,039; 8,448,850;7,967,193; 8,100,323; 8,052,048; 8,052,047; 8,038,057; 7,988,039; and7,229,009. Of course it should be appreciated that although in someexemplary arrangements the trusted platform module is utilized toprovide secure communications and secure operation of the controller andthe associated devices, in other arrangements other hardware andsoftware may be utilized to accomplish these functions.

In exemplary embodiments the software architecture operates to avoidpossible security problems that might otherwise arise due to compliancewith the CEN XFS Standards, particularly security vulnerabilities arepossible due to the required standardized interface between theapplication and the device drivers, and which requires that certain datathat is received through or produced by the transaction function devicesmust be presented to the application so that the application can carryout the necessary transaction steps. Presenting the data to theapplication in the required standard and/or unencrypted format maypresent issues as criminals may be able to intercept the data within themachine at the standardized interface.

In the exemplary arrangement the devices that are enabled to providesecure communication between the devices and the controllers areoperated to prevent the transmission of sensitive data through the XFSdevice interface. This is accomplished by using substitute data whichcan then be correlated through operation of the originating device withthe actual data that is needed for the transaction. Such actual data maythen be sent from the device to the controller in a secure and encryptedmanner to avoid the unauthorized interception thereof.

In exemplary arrangements a card reader may read card data from themagnetic stripe of a user card. Alternatively or in addition the cardreader may operate to read data from a chip of a smart card. This may bedone via electrical contacts or via wireless communications. Such dataread through operation of the card reader may be caused to be stored inaccordance with the programming of the processor associated with thecircuitry of the card reader in the at least one data store of thecircuitry. In some exemplary arrangements the circuitry of the cardreader may operate to cause the card data and/or chip data to be storedin an encrypted manner.

Responsive to the programming of the circuitry of the card reader,instead of sending the card and/or chip data to the XFS interfacesoftware layer, the card reader operates to produce substitute data thatcan be correlated through operation of the circuitry in the card readerwith the actual read data from the card. Substitute data which may bealternatively referred to herein as pseudo or token data, produced bythe card reader may then be utilized and passed through the XFSinterface to the application. The application may be configured tooperate to then securely recover the actual card data at an appropriateplace in the transaction steps when such data is needed. Alternativelyin some arrangements the security software included with the softwareinstalled on the machine may operate to determine when the card data isneeded and take the necessary steps to cause communication with the cardreader to recover the actual data. In the exemplary arrangement when theapplication calls for the card data, the at least one controlleroperates in accordance with its programming to communicate securely withthe control circuitry in the card reader 238. The application and/or thesecurity software communicates the substitute data to the card readerthat then operates in accordance with its programming to recover theactual card data. Such card data can then be recovered from the datastore in the card reader and transmitted in a secure and encryptedmanner to the application layer or the security layer where the actualcard data needed for carrying out the transaction is resolved andutilized for purposes of further carrying out the transaction steps. Ascan be appreciated, this approach avoids passing the card and/or chipdata in a clear and unencrypted manner through the XFS interface.

Similar approaches may be utilized with certain secure input devicessuch as the exemplary thumbprint reader 242. Again the thumbprint readermay operate in accordance with its programmed control circuitry toprovide data that is a substitute for the actual data which is read fromthe user's thumbprint. Instead the substitute data is utilized by thethumbprint reader to recover the actual data. The controller operates inaccordance with the software programming to transfer the substitute datathrough the XFS software interface to the software application. Againthe security related software for the application operates to causecommunication with the thumbprint reader so that when the actual data isneeded, secure communication of the substitute data is sent to thethumbprint reader. The thumbprint reader then recovers the actual dataand transmits it in a secure and encrypted manner to the applicationwhich then may utilize it for purposes of carrying out the transaction.

Other exemplary embodiments may include secure operation of the checkscanner. The check scanner produces images of checks that are receivedthrough operation of the machine. These checks include private data suchas the check writer's account number, the check writer's name andaddress and other information that may present privacy concerns. Inexemplary arrangements to minimize the risks associated withtransmitting this data and/or images in the clear through a standardizedinterface, substitute data is generated through operation of thecircuitry in the check scanner. The substitute data is then correlatedwith stored data in the data store of the check scanner. Again as withthe other examples the substitute data is processed and passed throughthe software layers. The substitute data is utilized until the actualdata is needed by the application. At the point in the transaction wherethe actual data is required, secure communication of the substitute datato the check scanner is made. The substitute data is then utilized torecover the actual data which is then sent in an encrypted and secureformat to the application. The application can then use this data forpurposes of processing the transactions in a manner like that describedin the incorporated disclosures. As can be appreciated, numerousapplications of these approaches may be utilized in exemplaryembodiments to avoid having to store or to pass data in the clearbetween software applications at the XFS interface. Thus the exemplaryembodiment enables the configuration of software architectures inmachines in accordance with the XFS standards or other suitablestandards but avoids the possible security risks that compliance withsuch standards may impose. Of course it should be understood that theprinciples may be utilized in various types of automated banking machineenvironments to help in providing enhanced security.

FIG. 12 shows yet a further alternative embodiment of an automatedbanking machine generally indicated 256. Automated banking machine 256may include devices of the types previously described and may operate ina manner similar to that described in connection with automated bankingmachine 12 except as hereinafter specifically discussed. Automatedbanking machine 256 includes improved capabilities for operation of themachine by users that are blind or that have impaired vision. In orderto facilitate the operation of the machine by blind or other disabledusers, the exemplary machine 256 includes at least one sound outputdevice schematically indicated 258. Sound output device 258 may includedevices that are usable to produce audible outputs corresponding toinstructions for operation of the machine. Such sound outputs mayinclude in some exemplary embodiments a headphone jack, audio speakers,wireless transmitter or other suitable devices for providing signalswhich can be directly or indirectly audibly perceived by users and whichinstruct the user in how to operate the particular machine in theabsence of the ability to visually see the output or input devices ofthe machine. Exemplary machines may include features like thosedescribed in the following U.S. Patents, the disclosures of which areeach incorporated herein by reference in their entirety: U.S. Pat. Nos.8,308,057; 8,393,534; 8,469,266; and/or 7,988,041.

The exemplary automated banking machine further includes a userinterface having an imaging sensor schematically indicated 260. Inexemplary embodiments the imaging sensor 260 may include an active pixelsensor which is operative in accordance with its programming to capturenumerous images of adjacent structures in rapid succession so as todetermine the direction of movement of an adjacent object. Such imagingsensors may include photo diodes or complementary metal oxidesemiconductor (CMOS) sensors that are operative to detect movement of anadjacent structure. Such imaging sensors and related circuitry which areused in optical computer mice, cameras and other types of devices may beoperative to analyze the successive images that are captured from anobject and to compare the relative movement between successive images.This enables determining the amount and direction of movement of theadjacent object. This enables providing selected types of inputs to themachine through the detected movement by the imaging sensor. Of courseit should be understood that while only one imaging sensor is discussed,multiple imaging sensors may also be utilized for purposes ofdetermining movement and resolving inputs.

In the exemplary arrangement, the one or more imaging sensors 250 isutilized to detect movement of a machine user's body part such as ahand, finger or other body surface to provide inputs to the machine. Forexample as represented in FIG. 13, the imaging sensor 260 may be placedadjacent to the keypad or other input devices of the machine. Asrepresented in FIG. 13, the user interface of the automated bankingmachine includes a sound output device in the form of a headphone jack.In the exemplary embodiment the at least one controller operates inaccordance with its programming to provide output instructions to theuser and to receive inputs based on movement of a user's hand adjacentto the imaging sensor.

For example in the exemplary arrangement shown in FIG. 13, thecontroller may operate in accordance with its programming and a suitableinterface circuit to detect the insertion of a headphone connector intothe headphone jack 258. Responsive to detecting this connection, thecontroller may provide outputs that produce audible signals in theheadphones that advise the user to move their hand in an area of themachine to the right of the headphone jack. The exemplary controller maythen operate in accordance with its programmed instructions to produceaudible outputs that advise the user to move their hand to the right ifthey wish to increase headphone volume or to the left if they wish todecrease volume. The controller may then sense movement of the user'shand to the right or the left through operation of the imaging sensor260 and cause the associated circuitry to adjust the volume outputaccordingly.

In an exemplary arrangement the user may then be instructed to movetheir hand in a direction away from the machine if the wish to blank thedisplay of the machine during their transaction. The controller uponsensing through operation of the imaging sensor that the user has movedtheir hand in a direction away from the machine, operates to cause thedisplay to go blank or otherwise display indicia that is not related tothe user's transaction. If the user's hand is not sensed as moving awayfrom the machine, the display continues to operate in a manner similarto that utilized when the machine is operated by users with normalvision.

In the exemplary arrangement the controller may operate in accordancewith its programming to then provide audible outputs to the userindicating that the card accepting slot is positioned approximately teninches to the right, and two inches above where the user's hand iscurrently sensed. The user may then move their hand to the card readerslot and input their card. The controller then operates in accordancewith its programming to sense that the card has been inserted and thenoperate the card reader to read the data from the user's card.

Upon determining that the user's card has been read, the controller mayoperate in accordance with its programming to indicate to the user thatthey can input their PIN number through a keypad that is located eightinches to the right of the headphone jack. The user may then locate thekeys on the keypad to provide their PIN input. Generally one or morekeys of the keypad may include an indicator so that the user can locatea particular key. For example in some arrangements the “5” key of thekeypad may include a raised dimple which facilitates a blind userfinding the central 5 key of the keypad. The user may then input theirPIN in this manner.

Alternatively in some arrangements the programming of the controller maycause audible outputs that instruct the user to move their hand incertain ways to provide a selected PIN input. For example the controllermay operate to advise the user to move their hand in the area of thesensor to the left and then to the right to start audible outputscorresponding to a series of digits. The user may be instructed to movetheir hand toward the machine when they hear a digit that they wish toinput. The controller may then operate in accordance with itsprogramming to provide audible outputs of the series of numerals untilthe user moves their hand in the manner which indicates that they haveselected that particular output digit. The user may then be advised thatthey have selected the particular digit and to move their hand in acertain way if they would like to select a second digit by having themachine output a series of numerals and to again move their hand in aparticular way when they want to select a second digit of their PIN.This process may be repeated until the user has provided all of theirPIN digit inputs. Of course it should be understood that this approachis exemplary and in other embodiments, other approaches may be used.

In exemplary arrangements the controller may then operate in accordancewith its programming to provide audible outputs to the user to have themselect a particular type of transaction. This may be done in somearrangements such as those described in the incorporated disclosures byhaving the user provide inputs through the keypad. In this manner theuser may select the type of transaction they wish to conduct in themachine. For example the user may provide key inputs to select balanceinquiry, a cash withdrawal, a deposit transaction, a check acceptingtransaction or other transactions that are available through operationof the machine. The user can then provide the appropriate key inputs toselect their desired transaction.

Alternatively in some embodiments the controller 176 may operate inaccordance with its associated programming to instruct the user to movetheir hand in certain ways adjacent to the imaging sensor to makeselections. For example the user may be instructed to move their hand tothe left to select a balance inquiry and to the right to select a cashwithdrawal. A user may be further instructed to move their hand towardthe machine to select a deposit transaction and away from the machine toselect a check cashing transaction. Further for additional transactions,additional types of movements or series of movements may be indicatedthrough audible instructions to the user so that the user may selecttheir transaction by moving their hand a certain way or thorough aseries of movements. After the controller has determined that the userhas moved their hand a certain way, the user may be given the option toindicate that they agree that that is their selected transaction bymoving their hand one way, or to reset and select a differenttransaction by moving their hand an opposite way. Of course theseapproaches are exemplary.

In exemplary embodiments the user once they have selected a transactiontype, is instructed to enter an amount associated with the transaction.For example in cases of cash withdrawal, the user may be instructed toenter the amount of cash they wish to receive through the keypad. Theuser may be instructed in the manner of the incorporated disclosures toprovide their input amount through the keypad and then provide a furtherinput confirming the amount. Alternatively the user may be instructed toprovide an input through the keypad the amount associated with adeposit, a check cashing transaction or other transaction that involvesa financial transfer. Audible outputs produced through operation of theexemplary controller may advise the user of the selected input and askthem to provide a further input to confirm the amount selected.

Alternatively in other arrangements the controller may operate inaccordance with its programming to cause audible outputs to be presentedthat enable the user to select an amount associated with theirtransaction through hand movements adjacent to the imaging sensor. Forexample the audible outputs may instruct the user to move their hand acertain way to indicate the first digit of the amount that they wish toreceive. As the user moves their hand in the particular directioninstructed, the amount may increment to the desired first digit. Whenthe user stops moving their hand, the machine controller may operate inaccordance with its programming to indicate that the user has selectedthe first digit. Thereafter the controller may operate in accordancewith its programming to instruct the user to select a second digit. Thecontroller may operate in this manner until the user has selected all ofthe digits of their selected transaction through hand movements. Furtheronce the digits have been selected, the controller may prompt the userto move their hand adjacent to the imaging sensor in a certain way toconfirm the amount that they have selected. In exemplary embodiments thecontroller may operate in accordance with its programming after it hasreceived the necessary transaction data to instruct the user to provideat least one input which is indicative that the user wants to proceedwith the transaction. The controller may operate in accordance with itsprogramming to indicate the transaction type and amount that the userhas selected. The user may then be instructed to provide a particularinput to confirm the transaction should proceed. This may be done forexample by the user providing at least one input through an input devicesuch as the keypad. Alternatively the at least one controller mayoperate to advise the user to move their hand in a certain way adjacentto the imaging sensor in order to indicate that they wish to proceedwith the transaction.

Once the user has provided the confirming input, the automated bankingmachine operates to then provide the particular transaction functionsthrough operation of the devices. For example if a user has requested acash withdrawal transaction, the controller operates the cash dispenserto make the cash available to the user. The controller then operates toindicate through audible outputs to the user where to place their handto take the cash. For example the controller may indicate to the userthat they may take the cash through the cash dispensing slot that islocated six inches to the right and five inches below the headphonejack.

In exemplary arrangements the controller may then operate after the userhas taken their cash to ask whether they wish to conduct anothertransaction or end the session. Again in exemplary embodiments thecontroller may operate in accordance with its programming to acceptinputs either through the keypad or other input devices or by sensinghand movements through the imaging sensor. If a user requests anothertransaction, the controller may operate in accordance with itsprogramming to instruct the user how to provide the inputs to identifythe transaction type and the amount. Alternatively if the user wishes toterminate the transaction session, the controller will provide audibleoutputs to indicate to the user where to position their hand to taketheir card, printed receipt and to perform other actions the user shouldtake. As can be appreciated, exemplary embodiments may enable theoperation of the machine through use of keypads or alternatively imagingsensors of the type described. In this way users who wish to utilizehand movements to provide inputs may do so. An advantage of utilizinghand movements for providing machine inputs is that the user does nottouch the keys of the keypad. This helps to avoid the risk ofunauthorized persons intercepting the user's confidential PIN or otherinputs. Further utilizing the imaging sensor to receive inputs alsohelps to reduce the risk that unauthorized persons can determine thetype and amount of transaction that a blind user may be requesting atthe automated banking machine. Additional benefits may be obtaineddepending on the particular type of transaction involved.

Other exemplary arrangements utilizing imaging sensors are representedby the alternative automated banking machine user interface representedin FIG. 14. In this alternative arrangement an imaging sensor 260 ispositioned on a side surface which extends generally outward from thefascia of the automated banking machine. A speaker opening 262 ispositioned adjacent to the imaging sensor 260. The speaker opening isassociated with an audio speaker that produces outputs that can beperceived by a user by placing their ear in generally close proximitywith the speaker opening.

This exemplary arrangement may be utilized to enable a user to operatethe machine through voice guidance without the need for having aheadphone connector. In this exemplary arrangement the user may placetheir ear in generally close relation with the speaker opening 262.Instructions provided responsive to operation of the controller mayinstruct the user to move their head in certain ways so as to provideinputs, select transaction types and to select amounts. By the usermoving their head in the user desired manner, various inputs may beprovided to the machine. In exemplary arrangements the user's ear may bepositioned in generally close proximity to the speaker opening. The riskof interception of any of the audible outputs to the user may be reducedto the same level as would be achieved through the use of headphones.Further in this exemplary arrangement the user could avoid generallyhaving contact with keys or other input devices of the machine in orderto achieve operation.

A further alternative arrangement is represented by the automatedbanking machine fascia shown in FIG. 15. In this exemplary arrangementthree spaced imaging sensors 264, 266 and 268 are arranged in variouspositions of an outward vertically extending fascia wall of the machine.Each of the imaging sensors is associated with a respective adjacentspeaker opening 270, 272 and 274.

As with the previously described arrangement this exemplary arrangementis configured to provide audible instructions through the speakeropenings and to receive user inputs responsive to movement of the user'sadjacent head or ear by an imaging sensor. In this exemplary arrangementby having multiple spaced imaging sensors and speaker openings, users ofvarious stature may operate the machine by placing their head and earadjacent to the sensor and speaker opening that is the most convenientfor them. The exemplary controller may operate in accordance with itsprogramming to sense the user's ear in proximity to the selected one ofthe imaging sensors and to provide the audible outputs through theassociated speaker opening. In some exemplary arrangements the otherspeaker openings operate to provide masking sounds while the selectedspeaker opening is providing audible instructions so as to reduce therisk of unauthorized reception of instructions to the user. As with theother described arrangements the user may provide inputs including PINdata, transaction selection data, amounts and confirming inputs throughmovement in response to audible prompts that are generated throughoperation of the controller. Such a configuration may enable numerousdifferent types of users to operate the machine in a suitable securemanner. Of course it should be understood that these arrangements ofimaging sensors and audio output devices are exemplary and in otherembodiments other approaches and arrangements may be used.

FIG. 16 is a schematic view of an alternative automated banking machineand system which operates to identify circumstances which correspond toinstallation of a card skimming device or other illegal interceptiondevice on the automated banking machine. The system 276 includesautomated banking machines 278, 280 and 282. The machines are inoperative connection with one or more networks 284. The one or morenetworks are in operative communication with one or more remotecomputers such as servers schematically indicated 286. Communicationsbetween the automated banking machines and the servers are operative tocause financial transfers in a manner similar to that previouslydiscussed in connection with other embodiments.

Automated banking machine 278 includes a reader 288. Reader 288 mayinclude a contact or contactless card reader or other suitable readingdevice for reading data bearing records. Records from which datacorresponding to financial accounts may be read are schematicallyrepresented by a card 290. Exemplary reader 288 includes or is inoperative connection with at least one microprocessor 292 which is inoperative connection with at least one data store 294.

Automated banking machine 278 further includes a terminal controller 296which may be similar to the terminal controllers previously discussed.The terminal controller is in operative connection with one or more datastores 298 which data store is operative to hold executableinstructions, data and other information used by the machine inconnection with carrying out transactions.

The exemplary machine further includes transaction function devicesgenerally referred to as 300. The transaction function devices mayinclude devices such as those previously discussed which are suited tocarrying out the transaction types for which the machine is adapted.Such devices may include cash acceptors, check acceptors, cashdispensers, input devices, output devices, wireless communicationdevices and other devices suitable for carrying out transactions. Theexemplary automated banking machine further includes an interface 302which is suitable for communicating with the network or other connectedsystems. The exemplary machine further is in operative connection withimage capture devices 304 which may include cameras or other systemswhich are suitable for capturing images or other data in response toinstructions from the terminal controller.

In the exemplary embodiment the automated banking machine is operativeto identify conditions which likely correspond to attempts to install anunauthorized card reading device on or in connection with the reader 288of the machine. A criminal's attempt to install such a unauthorizedreading device may utilize a card type that is not suitable forconducting transactions with the automated banking machine, to testwhether the unauthorized device interferes with the operation of thecard reader and to determine that data read from the card can beaccurately captured via the illegal device. In many circumstances thecard would be inserted into the card reader one or more times toaccomplish this testing. Further if the card is operatively engaged withthe reader for purposes of criminal testing activities, the criminalwill not generally attempt a transaction using the card. As a resultoften the programming of the terminal controller will not result in anymessages being sent to the network in connection with the criminaltesting activity because no transaction is requested.

In the exemplary arrangement provisions are made so that card readingactivity that may correspond to such criminal testing is identified. Theexemplary program logic flow associated with an embodiment of such asystem is shown in FIG. 17. The exemplary program logic flow may becarried out by the microprocessor 292 associated with the card reader,the terminal controller 296 or may be shared between the two components.

In the exemplary arrangement the reader 288 operates to accept and reada card. This is represented by a step 306. The card reader 288 operatesto read the data from the card. As can be appreciated, the data readfrom the card is indicative of whether the card is a financial card suchas a credit or debit card or an alternative type of card such as acredit card size non-financial card. These cards may include librarycards, transit cards, insurance cards, loyalty program cards and thelike. In the exemplary embodiment in a step 308 microprocessor 292determines if the card data corresponds to what is proper for afinancial transaction. This may include analysis of the types of dataavailable from the card. In exemplary arrangements the microprocessor292 determines whether the card presented is a proper card type based ondata stored in the data store 294. If the card data does not correspondto the type of card that could be used to carry out a transactionthrough operation of the machine, a check is conducted in the step 310on whether the card data that has been read corresponds to suspect cardsthat have been previously been identified as possibly being used bycriminals to test the installation of unauthorized interception devices.If a card is not identified as a previously suspected card in step 312,the microprocessor 292 sends a message to cause the machine to carry outnormal operation as reflected in step 316.

If the card is identified as one that has already been identified assuspect in a step 312, the microprocessor 292 operates to send a noticeto the terminal controller 396 which operates in accordance with itsprogramming to carry out steps that are appropriate for purposes ofresponding to the probable criminal activity. This is represented in astep 314. In such circumstances, the terminal controller 296 may operateto cause the image capture devices 304 to capture images of theindividuals who may be attempting to use such an improper card in themachine. In addition, the terminal controller may operate in accordancewith its programming to send a notice through the network 284 to one ormore servers 286 or other appropriate computers to indicate the probablecriminal activity. Such notices may then be responded to by notifyingsecurity personnel or other appropriate individuals to proceed to themachine to investigate a possible criminal activity. Alternatively or inaddition, the terminal controller may operate to capture the card,suspend operation of the machine and also take other steps as may beappropriate based on the programming of the terminal controller. Itshould be understood that these steps are exemplary and in otherarrangements, other or different steps may be taken.

Alternatively if in step 308 the card data read through operation of thereader is determined to correspond to a proper card type that can beused with the machine, the microprocessor 292 in conjunction with theterminal controller 296 are operative at a step 218 to determine if theuser cancelled the transaction. This is represented in step 318.Cancelling the transaction may often correspond to the criminal testingthe movement of the card and for communication of card data from theunauthorized card reader. If the transaction is cancelled, the card datais stored through operation of the microprocessor 292 in data store 294.This is represented in a step 320.

If the automated banking machine is not operated to cancel thetransaction, the terminal controller operates in the usual manner tosubmit a transaction request as represented in step 322. As can beappreciated, the transaction request will be routed through the one ormore networks 284 to the appropriate remote server 286 that will eitherauthorize or deny the transaction. One or more messages is then returnedby the server to indicate if the transaction is authorized. If themessage returned through the network indicates that the transaction isdenied due to an invalid card, the terminal controller 296 andmicroprocessor 292 identify this condition as represented in a step 324.The machine then operates in accordance with its programming to storethe card data in the data store 294 as represented in a step 326.

In exemplary arrangements the terminal controller 296 operates on aperiodic basis or in response to messages received through the networkto send updates concerning the card data associated with suspect cardsthat have been attempted to be used in the machine. Data correspondingto suspect cards is then sent from the machine to one or more remoteservers. The one or more remote servers may then operate in accordancewith their programming to cause the data concerning suspect cards to bedistributed to other automated banking machines such as machines 280 and282 in FIG. 16 so that all the machines have the updated suspect carddata. This way if attempts are detected to use the same card forpurposes of testing a skimmer device or other similar interceptiondevice at another one of the automated banking machines, this conditionmay be detected.

Further in exemplary arrangements, the remote server may also analyzethe data to see if the same suspect card data has been presented atmultiple machines. Such card data may not only be stored at each of themachines, but may also be associated with a special status so thatfurther steps are taken when such a card is read at a machine. Thesesteps may include, for example, having the machine immediately givenotice to law enforcement authorities, security personnel or otherentities that need to be notified of illegal activities. Alternativelyor in addition in the event that the machine is in a vestibule or otherenclosure, the enclosure may be immediately locked so that the criminalwithin the enclosure cannot escape before law enforcement authoritiesarrive. Alternative or additional steps may further be taken dependingon programming of the automated banking machine and the system in whichit is used.

FIG. 18 shows a schematic view of program logic carried out through anexemplary automated banking machine that may be similar to thosepreviously described. The exemplary automated banking machine isoperative to provide users with financial checks. Such financial checksmay include printed paper checks. Alternatively in some arrangements theautomated banking machine may be operative to provide electronicrepresentations of checks that can be processed as checks. In stillother arrangements, electronic tokens or tangible items may be providedto a user in connection with exemplary transactions.

The exemplary program logic flow which may be carried out by one or moreterminal controllers in an automated banking machine may be utilized incircumstances where a merchant or other vendor wishes to provide itemsof value such as goods, services or cash to a user. Such a system may beemployed in some circumstances where the merchant and/or user wishes toavoid the transaction fees that may be associated with withdrawing cashor transferring value via communication with a transaction processingnetwork. As can be appreciated in some arrangements, significanttransaction surcharges are applied to cash withdrawal transactions oncertain machines. Further certain network rules may cause the liabilityfor fraudulent transactions to shift from an entity issuing a credit ordebit card to a person accepting such a card if a transaction isconducted at a device or a system does not include all of the securityfeatures that the card issuer has indicated are required in order forthe card issuer to have liability. An automated banking machine carryingout transaction logic as represented schematically in FIG. 18 may insome embodiments avoid such a liability shift. Of course it should beunderstood that these approaches are exemplary and the representedfeatures may be used in other types of systems as well.

In the exemplary arrangement the automated banking machine executesprogram instructions to receive from a user data bearing records orother information that is suitable to identify the user or an account.This is represented in a step 328. Such activity may include in somearrangements the reading of account identifying data from a user card,the receipt of a PIN number, the reading of biometric data or other datathrough input devices on the machine so as to identify the user and/ortheir account. The automated banking machine then operates in accordancewith its programming to present the user with transaction selectionoptions, and the user provides a transaction selection input asrepresented in a step 330. In the exemplary arrangement the user mayelect to receive value such as cash or goods or services through themachine by making payment by check. If the user wishes to make such atransaction selection, they may do so by providing the correspondingtransaction selection input. The user also is prompted through operationof the machine to indicate the amount associated with their transaction.This is represented in a step 332. In an exemplary arrangement if theuser has selected a check transaction, the user will be prompted toprovide inputs corresponding to the amount of the check that they wishto have accepted by the merchant or other associated entity.

In a step 334, the terminal controller or other processor operates todetermine if a check transaction has been selected by the machine user.If the machine user has not selected a check transaction, and has chosena cash withdrawal transaction, cash acceptance transaction or othertransaction that can be carried out through operation of the machine,the terminal controller operates in accordance with its programming tocarry out the transaction steps associated with those othertransactions. This is represented in a step 336.

If the user of the automated banking machine has selected a checktransaction, the terminal controller operates in accordance with itsprogramming to automatically formulate an account balance inquirytransaction. This account balance inquiry transaction is operative tocause the machine to communicate through one or more associated networkswith computers to determine if the account corresponding to the user isvalid and also whether the account has a sufficient balance and/orstatus so as to allow the check transaction in the selected amount to becarried out. In some exemplary arrangements the formatted transactionmessages may be comparable to those carried out in response to userinputs making an account balance inquiry to check the amount of money intheir account. Alternatively in other arrangements, the formulatedtransaction inquiry may include messages that inquire as to otherfeatures such as whether the account is in good standing, includesoverdraft protection, qualifies for cash advances or other informationwhich is appropriate for determining whether the check transactionshould be carried out. The nature of the formulated inquiry messageswill depend on the nature of the account on which a check has beenrequested to be drawn. These steps as carried out through operation ofthe terminal controller and associated networks is representedschematically by step 338.

If the account is determined not to have a sufficient balance orotherwise qualify for writing a check in the amount requested by theuser, a determination is made at step 340 that the transaction could notbe carried out. The user is so informed as represented in a step 342.This step may include, for example, the terminal controller operating inaccordance with its programming to inform the user that the transactioncannot be carried out. Further in some arrangements the terminalcontroller may operate to return the user's card or otherwise close thetransaction.

If in step 340 it is determined that the user's account balance issufficient for writing a check in the amount, the automated bankingmachine operates in accordance with its programming to take steps toclose the network session which was involved in making thedetermination. This is represented by step 344. In some arrangements,step 344 may include additional communications between the automatedbanking machine and other computers in the network such as obtainingappropriate information from the network about the user's account whichmay be utilized by the automated banking machine in producing afinancial check in the amount requested by the user. The informationobtained may include data that cannot be derived from the data bearingrecord such as the user card or other information that the user hasinput to the machine in connection with requesting the transaction,which information is necessary for purposes of producing the financialcheck. Alternatively or in addition, the automated banking machine mayin step 344, communicate with computers in multiple systems which canderive the data necessary for purposes of producing the check. This mayinclude, for example, obtaining information on bank identificationnumbers, routing numbers or any other information that may be requiredto produce the check such as for example, the data that appears in themicr line of a financial check indicating the account and routing dataused for processing the check. Of course these approaches are exemplaryand the exact approaches used will depend on the particular system.

The terminal controller of the exemplary arrangement then operates in astep 346 to produce a printed financial check in the amount requested bythe user. The printed financial check will include the data necessaryfor processing and may include all of the data normally found on apreprinted check. Alternatively or in addition, the check may includeextended micr line data or other data so as to cause the amount of thecheck to be routed and paid to the account of the merchant or otherperson who is to receive the amount. Further in the exemplary embodimentthe terminal controller operates in a step 348 to print an accountbalance statement. The account balance statement of the exemplaryarrangement may include information such as the user's account data andtheir account balance. Further in exemplary arrangements, the accountbalance statement may include information on whether the user accounthas overdraft protection, certain statuses or other information that mayprovide the merchant with assurance that they may accept the check. Ofcourse it should be understood that this logic flow is exemplary and inother exemplary arrangements other or alternative approaches andadditional or different steps may be utilized.

The printed financial check and account balance statement may be takenby the machine user from the machine and presented to a merchant at atransaction location who can provide value in exchange for the check. Insome exemplary arrangements the merchant station may include a terminalor other device for accessing information that enables the merchant toverify that the check has been issued by the machine and that it isunaltered. This may include, for example, a merchant terminalcommunicating through a local network with the banking machine orthrough a wide area network with the systems that provided informationon the account balance or other authorization to issue the check. Themerchant may also physically or electronically review the accountbalance statement.

In exemplary arrangements if the merchant finds that everything is inorder, the merchant may accept the check and provide the user with valuefor the check in the form of cash, goods or other agreed value. Themerchant may then scan the check using a scanner connected to themerchant terminal or other system commonly employed by the merchant toscan received checks issued by the automated banking machine as well aspreprinted checks. The merchant may then carry out the necessary stepsto have the funds represented by the check deposited in the merchant'saccount by a financial institution or other financial services providerassociated with the merchant's account.

In other exemplary arrangements, the automated banking machine mayoperate in alternative ways to provide check data or items to a userthat the user can exchange for value. For example in some exemplaryarrangements, the automated banking machine may operate to securelycommunicate with a user's portable wireless device. The datacommunicated to the user's portable device may correspond to value foran electronic check. For example in some arrangements the data maycorrespond to a visual image of a check that a user may present on thedisplay of a smart phone to the merchant's system. Alternatively or inaddition, the automated banking machine may provide the user with anelectronic token or other data which can be stored in the memory of asmart phone and then communicated to the merchant's system in exchangefor receiving value. In still other alternative arrangements, theautomated banking machine may issue a stored value card or othertangible item which is representative of the value that the user wishesto receive. The tangible item may then be taken to a merchant stationand the value transferred in the manner of a check or similar article sothe merchant can obtain a deposit of the funds in the merchant'saccount. The merchant may then provide inputs to a merchant terminal ortake other steps to authorize the use of the card. The user can then usethe card for purposes of obtaining goods or services from the merchantor other affiliated merchants which accept the card. Of course theseapproaches are exemplary of many different approaches that may be used.

In some exemplary arrangements the automated banking machine may beoperative to cause one or more transaction messages to be communicatedwhich place a hold on the user's account for an amount corresponding tothe check. The hold can be maintained for a sufficient period of time toallow the merchant to scan and present the check to a check paymentprocessing system. This may be done in a manner similar to that used forcertain credit and debit card transactions where the actual charges thatthe user will incur are unknown. For example, in some arrangements thehold for the amount could be placed on the user's account for a periodof one day and then automatically lifted through operation of thesystem. This might be done, for example, by having the machine performin accordance with its programming on a timed basis to submit messagesto the network that cause a reversal of the initial hold transaction.Alternatively or in addition, communication with a merchant terminalwhich would show submission of the check for processing would then causethe automated banking machine to operate so as to send transactionreversal messages that release the hold on the user's account. Furtherit should be understood that these approaches may be used in connectionwith the other types of articles or data discussed herein whichrepresent value and which can be received from the machine. Of coursethese approaches are exemplary and in other arrangements, otherapproaches may be used.

FIGS. 19-22 show schematically program logic carried out throughoperation of one or more devices in connection with providing a userwith cash or other value from an automated banking machine or otherfulfillment point. In this exemplary arrangement the user may request atransaction using a mobile device such as a smart phone or wearablecomputer of the types previously discussed. The exemplary arrangement isfurther usable to assist the user in locating a fulfillment point thatcan complete the user's transaction which involves a transfer of value.

As represented in FIG. 19, a user who desires to receive cash may, forexample, provide a transaction request input through an input deviceassociated with a mobile device. The mobile device may include a smartphone which includes a program such as an application for receiving sucha transaction request. Alternatively other arrangements may involve awearable computer, such as in the form of glasses like those previouslydiscussed, wallets, watches or other articles which include programmingfor receiving such a request. This transaction request is represented bya step 350. In response to receiving the request, the mobile deviceoperates in accordance with its programming to transmit information thatis appropriate for purposes of conveying a request for the transactionthat the user wishes to conduct to a remote transaction system. Forexample the mobile device may submit messages including an identifyingvalue associated with the user's account, the amount of value such ascash the user wishes to receive, and data corresponding to the user'scurrent location, to the transaction system. It should be understoodthat in some exemplary arrangements the account identification mayinclude an account number. Alternatively the identification data mayinclude token data which can be used by the transaction system to derivedata corresponding to a user account number or other information thatcan be associated with a user account. The use of a token instead of anactual account number may be used to enhance security associated withthe system. The transmission of the data concerning the user'stransaction request to the system from the mobile device is representedin a step 352.

The data transmitted in step 352 along with other data which istransmitted from the mobile device for purposes of requesting thetransaction is received in an exemplary arrangement wirelessly by theremote transaction system. The exemplary transaction system includes oneor more servers and data stores that are capable of validating thetransaction data and carrying out financial transfers. Thecommunications to the transaction system may include communications viacellular phone communications, wireless broadband or other suitablemethods for communicating the data between the mobile wireless deviceand transaction system.

In a step represented 354 the transaction system receives theidentifying data and other information from the mobile device. Thesystem then operates in accordance with its programming to validate thatthe user identification data and other information that is transmittedcorresponds to a valid user and/or account which can be used to carryout the transaction as requested by the user. The system 354 operates inaccordance with its programming to create a transaction identifier (ID)for the particular transaction is represented in a step 356. The systemthen further operates in accordance with its programming to determinelocations where the user's requested transaction can be fulfilled. Inthe exemplary embodiment the transaction system uses the locationinformation received from the user to determine the fulfillment pointsthat are in proximity to the user that can complete the transaction theuser has requested. This is done based on stored data that thetransaction system can access as to the locations of automated bankingmachines, merchant facilities or other systems that can fulfill the userrequest. This is represented in a step 358. The transaction system thenoperates in accordance with its programming to cause to be sent to themobile device, the resolved transaction ID associated with the requestedtransaction as well as data corresponding to the fulfillment points thatare currently in proximity to the user which can fulfill thetransaction. This is represented in a step 360.

The mobile device of the user receives the data from the transactionsystem including the data corresponding to the fulfillment points thatcan carry out the requested transaction. The user's mobile device thenoperates in accordance with its programming to present to the user auser interface that enables the user to provide inputs to select afulfillment point. This is represented in a step 362. The user's mobiledevice then operates in accordance with its programming to determine orobtain from a remote system directions from the user's current locationto the selected fulfillment point. This may be done based on stored dataincluded in one or more data stores accessible by the mobile device.Alternatively or in addition, such directions may be resolved throughcommunication of the mobile device with remote servers such as GoogleMaps, MapQuest or other similar service that can provide a user withdirections. The presentation of the directions to the user from themobile device is represented by a step 364.

The user may then travel to the selected fulfillment point. The mobiledevice may provide turn-by-turn instructions or similar guidance to theuser to help them reach the desired fulfillment point. It should beunderstood that in exemplary arrangements the fulfillment point mayinclude an automated banking machine, a merchant transaction area, aparticular facility or other apparatus that can fulfill the user'stransaction request. It should be understood that although the exemplaryarrangement may be discussed in connection with an automated bankingmachine, such other devices and systems may be utilized in exemplaryarrangements to fulfill transactions.

As represented in FIG. 20, when the user reaches the fulfillment point,the mobile device operates in accordance with its programming totransmit the user identifier, transaction ID and other information asmay be required by the system to a device such as a terminal at thefulfillment point. This is represented by a step 366. In the exemplaryarrangement the data is transmitted via radio frequency communications ashort distance to a device at the fulfillment point. This may include,for example, Bluetooth or NFC communication via a wireless interface onan automated banking machine. Alternatively, other types of contact orwireless communication may be used.

In response to receiving the user identification and transaction IDinformation at the automated banking machine at the fulfillment point,the automated banking machine operates in accordance with itsprogramming to send data corresponding to the user identifyinginformation, transaction ID and an identifier associated with thefulfillment point to the transaction system. This is represented by astep 368. The one or more servers of the transaction system then operateto verify the user identification, transaction ID and other data todetermine that the requested transaction is one which can be authorized.This is represented by a step 370. The transaction system communicatesone or more messages to the fulfillment point to indicate that the datawhich has been sent is verified. In response to this communication, theautomated banking machine at the fulfillment point then operates inaccordance with its programming to provide to the mobile device afulfillment point identifier which is then communicated wirelessly tothe mobile device. This is represented by step 372.

The mobile device receives the fulfillment point identifier at a step374. Of course it should be understood that in exemplary arrangements,additional data including data associated with maintaining security orauthentication may also be communicated from the automated bankingmachine of the fulfillment point to the mobile device. The mobile devicethen operates in accordance with its programming to cause thefulfillment point identifier and the current location data of the mobiledevice to be sent wirelessly to the transaction system. This isrepresented by a step 376. In response to receiving the data sent instep 376, the transaction system operates in accordance with itsprogramming to verify that the fulfillment point and the location of themobile device correspond. The transaction system also operates to verifythat the fulfillment point ID corresponds to the prior communicationfrom the fulfillment point. Of course additional steps may be performedin connection with authentication or security of the communications bythe transaction system. This is represented by a step 378.

The transaction system then operates in accordance with its programmingto determine if the account associated with the requested usertransaction currently is available for purposes of conductingtransactions. This is done in a step 380. In the exemplary embodimentthe account holder is enabled to operate their mobile device forpurposes of enabling and disabling the status of their account. Thiscapability may be used to assure that the account status is generallydisabled at times when a user does not wish to conduct transactions. Theuser may selectively enable the account at times when the user wishes toconduct transactions, this can generally avoid unauthorized transactionactivity. In this exemplary arrangement the transaction system at a step382 determines if the account control status currently has the accountdisabled or “off” or enabled and “on.” If in step 382 the transactionsystem determines that the account is currently disabled, thetransaction system operates to cause one or more messages to be sent tothe mobile device to indicate that if the transaction is to beconducted, the account status will need to be changed. The sending ofthis message is represented in a step 384.

The mobile device receives an account status change request from thetransaction system in a step 386. If the user acknowledges that thetransaction is to move forward, and is authorizing the transaction toproceed, the user will provide one or more inputs through input deviceson the mobile device. The mobile device then operates in accordance withits programming as represented in step 388 to cause an account statuschange request messages to be sent wirelessly to the transaction system.The transaction system operates in accordance with its programming tochange the account status so as to enable transactions as represented instep 390.

Enabling the account status then causes the transaction system toproceed at step 382 to operate in accordance with its programming tosend transaction data to the automated banking machine at thefulfillment point. This is represented in step 392. The automatedbanking machine receives the transaction data sent by the transactionsystem as represented in step 394. The automated banking machine thenoperates in accordance with its programming to determine that it canfulfill the requested transaction. The automated banking machine, uponverifying that it can provide the requested transaction, such asdispensing the requested amount of cash, sends one or more messages tothe transaction system confirming its fulfillment capability. This isrepresented by a step 396. The transaction system then receives the oneor more messages which indicate that the machine has the fulfillmentcapability and will proceed with the transaction. This is represented ina step 398.

The automated banking machine at the fulfillment point then operates inaccordance with its programming to prompt the user to provide useridentifying data. This is represented in a step 400. In some exemplaryarrangements the user identifying data may include a PIN number or othersecret code for purposes of authorizing a transaction. In still otherarrangements, the user identification data may include data read from adata bearing record, such as a card or biometric data such as datacorresponding to a user's fingerprint or iris scan. In still otherexemplary arrangements the identifying data may include audible soundsor a voiceprint. The automated banking machine in response to receivingthis data in the exemplary embodiment then operates to communicate withthe mobile device to request device and/or account verification data.This is represented in a step 402. The mobile wireless device inresponse to receiving the request operates in accordance with itsprogramming to provide the requested verification data as represented ina step 404. Verification data is then wirelessly communicated to theautomated banking machine. In some exemplary arrangements theverification data may include data such as account identifying data ofthe type previously discussed as being sent to the transaction system.Such verification data may also include the transaction ID data or otherdata that is received from the transaction system. In still otherarrangements the verification data may include data resolved by themobile device from data sent from the transaction system and data storedin one or more data stores in the mobile device. The type and nature ofthe verification data used may vary depending on the particular type ofsystem and mobile device. Generally the verification data will besufficient to verify the account, the particular transaction and devicewith which the transaction has been associated.

The automated banking machine which is the fulfillment point operates inaccordance with its programming to receive the data from the mobiledevice. The machine then operates in accordance with its programming toassemble the user identifying data, data corresponding to account,transaction ID and other information so as to present the information tothe transaction system. This is represented in a step 406. In step 408the automated banking machine operates to send one or more messages tothe transaction system so as to request authorization to complete thetransaction. This is represented in step 408.

The transaction request messages are sent to the transaction systemthrough one or more networks such as those described in connection withthe previous embodiments. Such network communications may be wired orwireless communications and may include transmission over the Internetor other public or private networks. Encryption and other securityfeatures are included with or applied to the messages to avoidinterception. One or more computers associated with the transactionsystem receive the messages and operate in accordance with theirprogramming to verify the data associated with the transaction request.In verifying the data, the transaction system determines that thetransaction is authorized to be conducted. This is represented in a step410. In response to verifying the data and the propriety of thetransaction, one or more servers of the transaction system operate tosend one or more messages to the automated banking machine to authorizethe transaction. This is represented in a step 412.

The automated banking machine operates in accordance with itsprogramming in response to the received transaction authorizationmessages to verify that the messages correspond to instructions tofulfill the transaction. This is represented in a step 414. Theautomated banking machine then operates to fulfill the transaction asrepresented in a step 416. This may include in some exemplaryembodiments operating to cause cash to be dispensed from the automatedbanking machine to a user. Of course it should be understood that thisform of fulfillment is exemplary and in other arrangements otherapproaches and forms of delivering value may be used.

The automated banking machine operates in accordance with itsprogramming to confirm that the cash was dispensed properly and sendsone or more messages to the transaction system, confirming fulfillmentof the transaction. This is represented by a step 418. In some exemplaryarrangements the automated banking machine may communicate with themobile device to prompt the user to confirm through one or more inputsthrough their mobile device that the cash or other value has beenreceived. Alternatively the transaction system may communicate with themobile device to have the user provide one or more inputs to confirmreceipt of the cash or other value. The user of the mobile device thenprovides one or more inputs to the mobile device to confirm fulfillment.The mobile device then operates in accordance with its programming tocause one or more confirmation messages to be sent to the transactionsystem. This is represented in a step 420.

If the transaction system receives confirmation of fulfillment inmessages from both the automated banking machine and the mobile device,one or more servers of the transaction system operate in accordance withtheir programming to commit the particular transaction. This isrepresented by a step 422. The one or more servers then operate to causefinancial transfers such as debiting the account of the user for cashreceived and crediting the account of the entity who operates themachine or other system that has provided value that fulfilled thetransaction request. This is represented by a step 424.

Of course it should be understood that in the event the user does notconfirm fulfillment of the transaction or the automated banking machineis unable to fulfill the transaction, steps can be taken to againattempt to complete fulfillment in accordance with the programming ofthe transaction system, the fulfillment device and the mobile device.Alternatively or in addition, failure to receive appropriateconfirmation messages may result in additional steps being taken such asthe automated banking machine capturing images of the user receivingcash or other value from the machine so as to document that thetransaction was properly completed. Alternatively or in addition, thedevices included in the system may be programmed to operate so that theaccount of the user is not charged in the event that the transactioncannot be fulfilled.

It should be understood that although in the exemplary embodiment thefulfillment device is described as an automated banking machine of thetype that automatically dispenses cash or other value to a user, inother arrangements the fulfillment device may include other types ofautomated banking machines. For example in some arrangements theautomated banking machine which provides fulfillment may include atransaction terminal at a merchant location. The transaction terminalmay include, for example, a cash register from which a merchant mayremove cash and provide it directly to the user. Alternatively or inaddition, other fulfillment devices may include wearable computers wornby merchant representatives who can control the wearable computers so asto provide messages that document the delivery of cash or other value toa user from merchant representatives.

FIGS. 23-25 show schematically the program logic executed by one or morecomputers in an alternative system in which the user may receive cash orother value. The system described in connection with this exemplaryarrangement unlike the previously described embodiment, may enable auser to have cash or other things of value delivered to them rather thanthe user having to travel to a fulfillment location to receive therequested value. In this exemplary arrangement a user may operate a userdevice such as a mobile device including a smart phone or wearablecomputer terminal of the types previously described. Alternatively insome exemplary arrangements the user device may include a tabletcomputer or personal computer or other type of transaction terminal thatis accessible by a user in connection with making transaction requests.In this exemplary arrangement the one or more devices that are operatedby an entity that fulfills the user's transaction request are referredto as a delivery service. The transaction system utilized in connectionwith this exemplary arrangement may include one or more servers of thetype previously described that operate in accordance with theirprogramming and that may operate to cause financial transfers betweenthe accounts of the various entities involved.

In this exemplary arrangement the user requesting a transaction operatesa user device as represented in a step 426. In this exemplary embodimentthe user device may include a portable wireless device through which auser provides inputs corresponding to a request for the amount of cashor other value that a user wishes to receive. The device also operatesin accordance with its programming to recover from one or more datastores, data corresponding to an account. This may include an accountnumber or alternatively token data or other data from which thetransaction system can derive data corresponding to an account. Inaddition in this exemplary embodiment the user device operates toreceive a second user identifying factor. Such an identifying factor mayinclude, for example, a personal identification number from the user, ascan of a user's fingerprint, a user's voiceprint or spoken secretwords, a signature image, an iris scan or other suitable identifyingfactor which identifies the user as an authorized user. Of course itshould be understood that additional data or other data may also beprovided in connection with a particular transaction system.

The user device operates to send the transaction data to one or moreservers associated with the transaction system. The servers operate inaccordance with their programming to verify the account and otherinformation which identifies the user as an authorized user and/or asthe user of a valid account. This is represented by a step 428. Thetransaction system further operates in a step 430 to verify that theamount requested by the user is available. The transaction system thenoperates to generate a transaction identifier or other data that can beused to identify the user's requested transaction. This data is sent tothe user device as represented in a step 432. Of course in otherarrangements additional data such as data for authenticating thetransaction, encrypting the communications, or that is otherwise usablein connection with the transaction may also be sent by the transactionsystem to the user device.

In the exemplary arrangement the user device is operative to store thetransaction identifying data received from the transaction system asrepresented in a step 434. The user then may operate the user device ata time proximate to receiving the transaction identifying data or at alater time, to send the transaction identifying data and other data suchas the amount of the cash or value requested, to a terminal device ofthe delivery service. Further in the exemplary embodiment the userdevice operates in accordance with its programming to send to thedelivery service device, data corresponding to the current location ofthe user device and/or location data corresponding to a place ofdelivery. This is represented in a step 436.

In the exemplary arrangement the data communicated in step 436 from theuser device is transmitted via wireless or wired communication to aterminal device including at least one processor and data store operatedby the delivery service. The delivery service device receives thetransaction data and communicates with the user device to communicateoptions for the delivery of goods and/or the cash or other value that isrequested by the user. This is represented in a step 438. For purposesof this exemplary arrangement, the delivery service will be described inconnection with a service that provides food items for delivery. In someexemplary arrangements the services which are offered by entities whodeliver food for consumption may be utilized to also provide cash orother items of value so as to make better use of the resources that arecommonly used for such delivery. Of course this approach is exemplaryand in other arrangements the delivery service may be solely dedicatedto the delivery of cash or may deliver other types of items or value.

In the exemplary arrangement the data communicated from the device ofthe delivery service is received by the user device and causes the userdevice to operate in accordance with its programming to prompt the userto select whether the user wishes to have certain types of goodsdelivered along with the requested cash. This is represented in a step440. The user provides inputs through one or more input devices of theuser device to select any goods that the user also wishes to havedelivered with their cash. Further as represented in a step 442 the useris prompted to provide inputs through the user device to indicatewhether the value of the goods that they wish to have delivered is to bededucted from the amount of cash that they have requested. Generally inexemplary embodiments because the transaction has been previouslyverified for a given amount, the user will be required to agree that thecost of the goods will be deducted from the cash or other form of valuethat the user will additionally receive. In alternative arrangements, ifthe user wishes to receive goods and cash or other value which have agreater value than that originally authorized, the user device and thetransaction system may operate in accordance with their respectiveprogramming to authorize the requested higher transaction amount.

In the exemplary transaction, the user agrees to have the value of thegoods deducted from the initially authorized amount and communicates thegoods information and such confirmation to the device operated by thedelivery service as represented in a step 444. The terminal device ofthe delivery service then operates in accordance with its programming tocause one or more messages to be sent by the delivery service device tothe transaction system. The messages in the exemplary arrangement areoperative to request verification of the transaction ID, the total valueof the transaction, and the location for delivery that has been providedto the delivery service device from the user device. This is representedin a step 446.

The data communicated from the delivery service device is then verifiedas correct through operation of the transaction system. This isrepresented in a step 448. Of course if the transaction data cannot beverified through operation of the transaction system, the exemplaryarrangement sends appropriate messages to the delivery service that thetransaction is not verified and should not proceed. In addition othersteps may be taken as well in accordance with the programming of theservers which comprise the transaction system and/or the terminal deviceof the delivery service.

If the transaction data is verified in step 448, the transaction systemof the exemplary embodiment operates in accordance with its programmingto cause one or more messages to be sent to the user device indicatingthe information concerning the requested transaction. This isrepresented in a step 450. The data sent to the user device may includedetails of the transaction, the delivery service, the amount involved,the goods involved or other information as is necessary for the useroperating the user device to evaluate whether the transaction shouldproceed. The data sent to the user device causes the user device topresent an interface to the user which requests that the user provideinputs to either authorize or disallow the transaction. This isrepresented in a step 452. If the user does not confirm the transaction,then the transaction does not proceed and an appropriate message is sentto the transaction system.

Assuming that the user confirms the transaction as acceptable, one ormore messages confirming such fact is sent to the transaction system asrepresented in step 454. The transaction system evaluates the messagesand confirms that the transaction is acceptable as represented in step456. The transaction system then operates in accordance with itsprogramming as represented in step 458 to send one or more messages tothe device of the delivery service to indicate that the transaction hasbeen verified as authorized. The device of the delivery service receivesthese messages and verifies the receipt of transaction verification asrepresented in a step 460. In response to verifying that the transactionshould proceed, the device of the delivery service operates inaccordance with its programming to communicate with the user device toconfirm the delivery location. This is represented by a step 462. Theuser device then provides communication to confirm the delivery locationas represented by a step 464.

In response to confirming the delivery location, the delivery servicedevice operates in accordance with its programming to send messages tothe transaction system. The data sent by the delivery service deviceincludes data corresponding to a fulfillment identifier (ID) associatedwith the delivery service as well as the transaction identifierassociated with the particular transaction. The sending of thisinformation is represented in a step 466. In response to receiving thedata from the delivery service device, the transaction system verifiesthat it recognizes the fulfillment ID associated with the deliveryservice and confirms that it can complete the transaction associatedwith the financial transfers involved. This is represented by a step468. In the exemplary arrangement if the transaction system determinesthat it cannot complete the financial transfers associated with thetransaction, appropriate messages are sent to the device associated withthe delivery service so as to prevent the transaction from proceeding.

In response to verifying the fulfillment ID and transaction ID by thetransaction system, the delivery service device receives confirmationmessages from the transaction system to proceed with delivery of thecash and the requested goods. The delivery service then transports therequested cash and goods to the location where the user is located. Thetransport of the goods and cash may be tracked through operation of adevice associated with the delivery service such as a portable terminal,wearable computer or other device which may be the same as or may be aseparate terminal device capable of being in communication with thedelivery service terminal receiving the other messages. The presentmentof the cash and goods is represented by a step 470. In the exemplaryarrangement when the goods and cash or other value is presented to theuser at the location, a portable terminal associated with the deliveryservice is operative to receive identifying data to identify that theuser receiving the goods and cash is the appropriate recipient. This mayinclude, for example, in some embodiments the portable terminal of thedelivery service receiving data such as by reading card data from a databearing record provided by the user. Alternatively the portable terminalmay receive a biometric identifier such as a fingerprint of the user.Alternatively or in addition, the terminal associated with the deliveryservice may receive identifying data from the mobile device of the user.Various types of input information or combinations of information may beso received which can be verified as associated with the authorizeduser. The receipt of the identifying factor or factors by the deliveryservice terminal is represented by step 472.

As represented in a step 474, in the exemplary arrangement the portableterminal associated with the delivery service is operative to send dataindicative of the delivery of the cash and/or goods to the transactionsystem. In the exemplary arrangement the portable terminal of thedelivery service is further operative to send the transaction data anddata corresponding to at least a portion of the received useridentifying data to the transaction system. Of course it should beunderstood that in step 474 additional data and/or other informationthat is usable to verify that the delivery is completed or thetransaction is being fulfilled may also be sent to the transactionsystem.

As represented in a step 476, the transaction system of the exemplaryembodiment operates to confirm the user identifying data and thetransaction data associated with delivery of the goods and cash. Thetransaction system then operates in accordance with its programming in astep 478 to send one or more messages to the portable terminal of thedelivery service to indicate that the identifying data has beenconfirmed. In response to receiving the confirmation data from thetransaction system, the portable terminal of the delivery serviceprompts the individual making the delivery to complete the delivery asrepresented in a step 480. The delivery service terminal then promptsthe user from the delivery service to verify the delivery throughproviding at least one input to the terminal and sends at least onemessage to the transaction system verifying that delivery has beencompleted in accordance with a step 482. In the exemplary arrangementthe transaction system receives the data corresponding to theverification of delivery in a step 484. In response to receiving thisdata, the transaction system stores the data indicating delivery hasbeen made. The transaction system further operates in accordance withits programming to send to the user's portable device, one or moremessages asking the user to confirm delivery of the goods and cash. Thisis represented in a step 486.

In response to receiving the one or more messages from the transactionsystem, the user device operates in accordance with its programming topresent an interface to the user which prompts the user to provide aninput that the delivery of the requested goods and cash has beencompleted. This is represented in a step 488. If the transaction isproceeding properly, the user then provides one or more inputs to theuser device which causes one or more messages to be sent to thetransaction system confirming that the delivery has been made in asatisfactory manner. This is represented in a step 490. Responsive toreceiving the one or more messages sent by the user device in step 490,the transaction system operates to cause a charge or debit to be madeagainst the account of the user as represented in a step 492 and tocause a credit for the amount of cash and goods or other value deliveredby the delivery service as represented in a step 494.

Of course in the exemplary arrangement if the user does not confirmappropriate delivery of the goods, additional steps are taken so as toresolve the discrepancy. This may include, for example, additionalcommunications between the delivery service terminal, the user terminaland the transaction system so as to prevent or revoke the delivery ofthe goods, cash or other value to unauthorized persons. In addition, theuser terminal and delivery service terminal may include image capturedevices or other devices for obtaining information so as to document thecircumstances of delivery if the delivery is going to be completed sothat the recipient cannot deny delivery at a later date. The particularsteps taken will depend on the capabilities of the particular system andthe devices involved. Further it should be understood that additional ordifferent steps may also be taken through operation of the variousdevices in connection with the exemplary steps described. Furthernumerous different variations may be utilized in connection with variousembodiments. Further although cash and goods delivery has been describedas the form of value delivered in connection with this exemplaryembodiment, it should be understood that other types of delivery mayalso be made. This may include, for example, other types of value suchas prepaid cards, stored value cards, gift cards, scrip or other thingsthat can be redeemed for goods or services. Of course it should beunderstood that numerous different combinations of goods, services, cashor other items of value may also be delivered through systems of thistype.

FIG. 26 shows schematically a further alternative embodiment of anautomated banking machine 496. Automated banking machine 496 may includefeatures like the automated banking machines previously described andmay be used for carrying out transactions including transfers of value.The exemplary automated banking machine includes a controller 498including circuitry having at least one processor having structures likethose previously described. The controller further includes one or moredata stores schematically indicated 500 which store computer executableinstructions, data and other information associated with operation ofthe automated banking machine. The automated banking machine furtherincludes a number of transaction function devices collectively referredto as 502 that are in operative connection with the controller. Thetransaction function devices may include, for example, in someembodiments card readers, key pads, printers, displays, cash dispensers,check acceptors, cash acceptors, input devices, output devices andvarious other types of devices that are used in connection with theparticular types of transactions that are carried out by the automatedbanking machine. The exemplary machine further includes a suitableinterface 504. Interface 504 is usable to provide communications withone or more networks 506. Networks 506 are in operative connection withone or more transaction systems including remote computers such asservers and other systems which enable carrying out transactions of thetype for which the automated banking machine is specifically adapted.

The exemplary automated banking machine 498 further includes a wirelessinterface 508. The wireless interface 508 of the exemplary embodiment issuitable for radio frequency communication with relatively nearby mobiledevices. Such mobile devices may include smart phones, tablet computers,wearable computers or other portable computing devices commonly carriedby users which may come into proximity with the machine. Alternating insome arrangements the automated banking machine may communicate in awide area network but may be configured to communicate only withportable computing devices within a certain area in proximity to themachine. In the exemplary arrangement the terminal controller 498 orother circuitry in association with the machine may be operative toprovide communications with one or more types of mobile devices andapplications operating therein. Further in some exemplary arrangementsthe communication provided is operative to inform a user mobile devicethat the automated banking machine may provide a particular type ofservice or transaction function that a user associated with the mobiledevice may be seeking to obtain.

For example in an exemplary embodiment a mobile device of the user mayinclude a particular application or other suitable programming thatenables a user to establish parameters for things that they wish topurchase or otherwise acquire. Such an application may enable the userto indicate a request to obtain cash in a particular amount and to notincur a transaction fee for receipt of the cash above a particularthreshold. For example the user may program their mobile device to seekto obtain cash in the amount of $300 without incurring a transaction feein excess of $2.00. Of course it should be understood that this amountand transaction fee are merely exemplary.

The exemplary automated banking machine 496 may include data in its oneor more data stores 500 that it is willing to offer the dispense of cashin certain amounts for certain transaction fees. The controller of themachine may further include programming so as to communicate thisinformation when a request of this type is received by the machinethrough the wireless interface. Further in some exemplary embodimentsthe programming of the automated banking machine may be such that normaltransactions attract transaction fees that are higher than those thatthe owner of the machine is willing to offer to those which are seekinglower transaction fees through communications with transient mobiledevices through the wireless interface.

In the exemplary embodiment the mobile device of the user is carried bythe user and transmits wireless messages corresponding to those itemsthat the user is seeking to nearby terminals which can receive suchmessages. The automated banking machine is operative to receive throughits wireless interface the messages from the user's mobile deviceincluding messages which indicate that the user is seeking to receivecash in the particular amount for a transaction fee that is no more thanthe indicated fee. In response to receiving these messages, thecontroller of the automated banking machine is operative to determinethat the machine is programmed to offer transactions that satisfy theparameters that the user is seeking. The controller then operates inaccordance with its programming to communicate with the user's mobiledevice through the wireless interface. The controller operates toindicate to the user device the fact that the requested transaction isavailable and the location where the machine is located. The user mayalso be prompted to receive directions to travel to the machine if theuser is interested in completing the transaction. Further in exemplaryembodiments the user may also be informed through messages from themachine that in order to obtain the cash for the requested fee, the usercan use a certain code or token which is provided by the machine to theuser device. In the exemplary embodiment the user operating the mobiledevice may operate the device to receive the data or token from themachine at the time of the initial communication. Alternatively in otherarrangements the user may be advised that they can obtain the discountedtransaction fees by taking other steps when they are present at themachine.

If the user elects to travel to the machine, the user may commence atransaction in the usual manner such as by presenting a card and PINnumber. In the exemplary arrangement the programming of the automatedbanking machine is configured to prompt the user to provide an input toindicate that they are conducting a transaction in response to apromotional offer received through their mobile device. In response toselecting this particular transaction selection, the user is enabled toprovide the code or token data previously delivered to their mobiledevice. This can be provided by communication of the user's device witha wireless portal or an image capture device of the machine or the userproviding manual inputs to an input device of the machine. Alternativelythe user can commence another communication session through their mobiledevice while at the machine so as to indicate to the machine that theyare responding to the promotional offer to receive the cash for thereduced transaction fee. In response to receiving the information fromthe user, the machine operates in accordance with its programming tofulfill the transaction requested by the user. This would include in theexemplary embodiment the delivery of cash with the assessment of onlythe $2.00 transaction fee as agreed to by the user. In this exemplaryarrangement the machine is programmed to cause any additional chargesthat may be associated with the transaction to be absorbed by themachine owner or the owner of the establishment in which the machine islocated. Alternatively in some alternative arrangements the machine usermay be assessed the usual transaction fee, but may be issued a receipt,token or instructions that allow the user to receive cash or other valuefrom the establishment where the machine is located that corresponds tothe excess fee charged over what the user requested. The owner of themachine or the establishment may do this in order to obtain the benefitassociated with having the user present in their establishment with cashthat can be used to acquire goods and services from the merchant.Alternatively and/or in addition the user may be required to watchcertain advertising or other information output by the machine aboutgoods and services of the establishment or the machine owner whilereceiving the cash for the discounted fee. In this manner the exemplaryembodiment provides for the user to receive the discounted transactionfee they requested and the operator of the machine and/or theestablishment in which the machine is located, to receive the additionalbenefit associated with more customers present within the establishmentand/or reviewing advertising messages associated with the establishment.

Although the particular mobile device request described that providesfor the receipt of cash for a discounted transaction fee may befulfilled through operation of exemplary automated banking machines,other mobile device request offers may also be responded to. This mayinclude, for example, offering to fulfill requests associated with othertypes of goods and services that can be obtained through operation ofthe automated banking machine. Such goods and services may include theprovision of items such as tickets for events, gaming materials or otheritems that can be offered through operation of the automated bankingmachine. Alternatively and/or in addition offers to fulfill requests maybe associated with the goods or services provided by the particularestablishment. For example if the particular mobile device userapplication enables the user to transmit requests to receive particulargoods or services at certain prices or within particular distanceranges, the automated banking machine may be programmed to communicatewith the user devices that the particular establishment in which themachine is located, will offer the particular things that the user islooking for. Further as can be appreciated, the programming of theautomated banking machine may enable the machine to be programmed so asto identify particular thresholds at which the machine and/orestablishment is willing to offer particular goods and services.

Alternatively or in addition other exemplary embodiments may enablecommunications between the controller of the machine and other terminalswithin the merchant establishment to indicate that there is a user inproximity who is looking for something that may correspond to that whichthe merchant has to offer, but the user's request parameters do notcorrespond to those which the establishment has currently programmed themachine to offer. In such cases communication with a merchant terminalmay enable a merchant user to agree to meet the particular parametersbeing requested by the user of the mobile device. Inputs to the merchantterminal which operatively communicates with the machine may then enablethe machine to inform a user through their mobile device that theparticular merchant establishment is prepared to offer what it is thatthe user is looking for. Alternatively, in some arrangements themerchant terminal may communicate with the user's mobile devicedirectly. Those exemplary arrangements may enable a user of a mobiledevice to use the device to look for things at particular prices and toobtain those things from automated banking machines or from merchantestablishments as they travel in proximity to such locations. Of courseit should be understood that these approaches are exemplary and in otherembodiments other approaches may be used.

A further exemplary embodiment of an automated banking machine 510 isschematically represented in FIG. 27. The automated banking machine 510may include features and devices similar to those previously describedexcept as otherwise mentioned herein. The exemplary automated bankingmachine 510 may be used for carrying out transactions of the typespreviously discussed at a transaction user interface area 512. Interfacearea 512 of the exemplary embodiment may include items for communicatingwith a user during transactions such as a display, key pad, card reader,acceptor slot, printer delivery slot, cash accepting slot, cash deliveryslot, check accepting slot or other appropriate interface elements forcarrying out transactions with users.

Exemplary automated banking machine 510 further includes additionalvisual displays 514 and 516. In the exemplary embodiment, these visualdisplays are provided for purposes of facilitating activities byindividuals who carry mobile devices and wearable computers that do nothave visual displays and/or which may not have visual displays of asuitable size or configuration to carry out certain types of desiredfunctions. The exemplary automated banking machine includes one or morewireless interfaces that are suitable for communicating with such mobiledevices and which can facilitate the use of such devices or multipledevices that are carried by multiple users.

For example in some exemplary arrangements mobile devices may include adevice such as a watch-like wearable computer, pendant or other mobilecomputing device that includes no visual display or only a small visualdisplay. Bringing such a mobile device in proximity with a display suchas display 514 causes the automated banking machine to operate inaccordance with its programming to prompt the user to provide an inputif they wish to utilize the display on the machine in connection withtheir device. In the exemplary arrangement the displays comprise touchscreen displays which enable a user to select whether they wish toutilize the display or not. By selecting an option presented through thedisplay to connect to the mobile device, the mobile device can thenpresent a user interface to the user through the display which providesmultiple options and selections to the user. The user can then interfacewith their mobile device through the touch screen display on theautomated banking machine. Further in exemplary arrangements theinterface may also provide outputs from remote sources such as outputsproduced by various Internet or other network connections that the useris able to make through their mobile device. Thus the user is able toutilize their mobile device while using the display in connection withthe automated banking machine as the input and output user interface forthe mobile device.

Further in exemplary embodiments the automated banking machine mayprovide a printer which enables the user of the mobile device to printan item selected via the particular interface that is output through thedisplay. The printer of the automated banking machine may deliver to theuser the printed information that they have caused to be selectedthrough or presented on the display. The automated banking machine mayinclude one or more printer outlets 518 for this purpose. Further inexemplary embodiments the automated banking machine may operate inaccordance with its programming to charge the user for use of theprinting function or for other functions that a user may choose toexecute when using the display interface provided on the machine. Forexample if a user uses the display interface in order to request thatfunds be added to a mobile wallet associated with the mobile device, theautomated banking machine terminal controller may operate in response tothe user's selected inputs to cause data representative of value to beincluded in the mobile wallet and to cause communications withappropriate networks so as to cause the user's account to be charged.Alternatively or in addition the automated banking machine may operateto cause money to be transferred to or from stored value accountsassociated with the user's mobile device. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In addition when the automated banking machine is located at a merchantestablishment, provision may be made to have user interfaces whichprovide visual outputs from user mobile devices and which can receiveuser inputs to such devices located in other devices within theestablishment. For example in some arrangements the automated bankingmachine may be located in a coffee shop or restaurant environment inwhich there are tables with input/output devices such as surfacecomputers or tabletop supported terminals 520. The terminals 520 maycomprise input and output devices which communicate with a user's mobiledevice and enable the user to employ the terminal of the table orsimilar structure as the display and input device for the mobile device.

In still other exemplary embodiments the displays in operativeconnection with the automated banking machine may be usable for purposesof facilitating transfers of value between mobile devices of multipleusers. When mobile devices of users do not have suitable displays suchas certain wearable computers, visual outputs may be presented to theuser's mobile devices on the displays in communication with theautomated banking machine. In situations where a user wishes to transfervalue from a stored value account or other account, to another user whohas a mobile device, both users may bring their devices in proximity toa touch screen display associated with the automated banking machine. Insuch circumstances, devices may communicate with the machine to provideoutputs through the display and the users may provide inputs so as touse the interface presented by the machine for communication with one orboth devices. In such circumstances the display may be used to provideinputs and receive outputs to cause value to be transferred from onedevice to another and/or to the accounts of the respective users. Thusfor example if a user of a mobile device wishes to transfer funds to auser of another mobile device, they may do so using the interfaceprovided on or through communication with the automated banking machine.Further in exemplary embodiments the automated banking machine mayinclude encryption features or other security features that help toassure that the communication of the messages which communicate thevalue or cause the value to be transferred are secured in a manner thatis more effective than occurs when mobile devices communicate directly.Such encryption functions may be controlled or initiated through inputsprovided to the displays that are connected to the automated bankingmachine. For example the automated banking machine may have itscontroller operate in accordance with its programming to provide tomobile devices, one-time session keys and/or encryption keys that areusable to provide communication on a secure basis between the mobiledevices while they are operated in connection with the automated bankingmachine. Thus the automated banking machine may provide additional valuethat facilitates the carrying out of transactions between wearablecomputers, particularly such computers that do not include suitablylarge user displays or input devices.

Further in exemplary embodiments the automated banking machine 510 maybe utilized for purposes of providing electronic tokens to wearablecomputers that can be used as a substitute for account numbers oraccount verification data in connection with carrying out financialtransactions. For example it may be desirable in some transactionarrangements to use token data which can be used by a remote computersystem to resolve a user's account number, rather than the actualaccount number for purposes of carrying out transactions. In additiontokens may also be provided for other data such as data corresponding tobiometric data, PIN numbers or other values which a user may not want tohave available in transmissions which could be intercepted or utilizedby unauthorized persons if they are stored in a mobile device that islost or stolen.

The exemplary automated banking machine operates in accordance with itsprogramming to provide one or more tokens to users which can be storedin a user's mobile device. For example the automated banking machine mayoperate to receive a user's credit or debit card data as well as a PINnumber, biometric data cryptogram or other data that authenticates theidentity of the user and/or the card. In response to the user providinginputs through the automated banking machine indicating that the userwishes to receive an electronic token for a mobile device, the automatedbanking machine operates in accordance with its programming tocommunicate with a remote transaction system. The remote transactionsystem verifies the authenticity of the card data and PIN or other datato determine that the user data and/or card data corresponds to anauthorized user. In response to messages corresponding to token datafrom the remote system, the automated banking machine may then deliverthrough the wireless interface, a token that is stored in the memory ofthe user's mobile device. This may be accomplished responsive to asoftware application that operates on the mobile device that enables thereceipt and storage of the token and/or other data. As can beappreciated, the token corresponds to data which a remote transactionsystem may receive, validate and associate with the user's account data.However, the token data has no relationship to the user's account dataand thus if the token data is compromised, the user's account number isnot obtained. Thus in exemplary arrangements once the user has receivedtoken data and stored it on their mobile device, the user can conducttransactions on their account using the token data in communicationsdirectly with the transaction system without transmitting their accountnumber directly.

In other exemplary embodiments the automated banking machine may alsooperate to dispense token data corresponding to parameters other than auser's account number. This may include for example, token datacorresponding to a user's biometric data, which token data may be storedin a user's mobile device. Such data may be sent from the mobile deviceto a separate device or system in lieu of actual biometric data when itis required for purposes of verifying transactions. Alternatively or inaddition the token data may be used and correlated by a remote system tocompare fingerprint data that is scanned either on the user's mobiledevice or at a separate transaction terminal, with the remote systemstored data so as to verify the user. Using a token stored on the mobiledevice instead of the biometric data itself produces the risk ofcompromise of the data. Alternatively, or in addition, an automatedbanking machine may operate to deliver computer executable instructionsthat enable the mobile device to perform other functions. This mayinclude, for example, instructions and/or data used for the calculationof cryptograms or other values that can be used for authentication orother purposes when performing transactions.

Once the token and/or instruction data is loaded to the mobile device,the device may be operated to conduct transactions using the token dataand/or other data. For example, in some arrangements the mobile devicemay be operated to conduct transactions by wireless communication with aremote computer system that operates to correlate the token data withaccount data. The user may communicate instructions from the mobiledevice to cause financial transfers, which communication causes theremote computer system to carry out the transaction in accordance withthe user's instructions.

In some arrangements the user may utilize their mobile device tocommunicate token data (and other required data) for an automatedbanking machine. Such automated banking machines may include forexample, a cash dispenser, a point of sale terminal, or other terminaltype. In such arrangements, the mobile device may provide the token datato the terminal. The terminal will operate to present the transactionmessages to computers that can authorize the requested transaction usingthe token data rather than actual account number data. The terminaloperates to communicate transaction messages using the token data as theaccount identifier. The terminal may communicate with one or more remotecomputers or systems that correlate the token data with thecorresponding account data. The remote computer or system is thenoperative to authorize or deny the requested transaction based on storedaccount information, and provide appropriate return messages to theterminal. Further, in exemplary arrangements, the mobile device mayoperate in accordance with its programming to provide other data asrequired by the terminal application to authenticate the desiredtransaction. This may include such values as account type identifiers,application identifiers, cryptograms, keys, prior transaction data,transaction velocity data and/or other data required to be delivered inorder to request authorization to carry out the particular transactions.This may include in some arrangements different types of values and datafor different types of transactions. In some arrangements, the valuesand data may vary with the transaction type being requested such asaccount debit, credit, stored value or other type transaction. Themobile device may operate to provide the additional values and data asrequired for the requested transaction in addition to the token data.Further, some exemplary arrangements may have common token data linkedto multiple different accounts in one or more remote computers orsystems such that the data provided by the mobile device also indicatesan account or an account type which is linked for purposes of carryingout the currently requested transaction. This enables the token data tobe securely utilized to conduct transactions on any one of numerous userselectable accounts or account types. The linking data for such accountsmay in some arrangements be provided through user inputs receivedthrough operation of the automated banking machine during the usertransaction session during which the token data is delivered. In otherarrangements, the linking to additional accounts may be carried out insubsequent wireless communications between the mobile device and thecomputer system that links token data to account data. Such linking maybe accomplished via user inputs to the mobile device and a userinterface provided by the remote system. Of course, such communicationsshould be appropriately secured to reduce the risk of unauthorizedinterception. Further in some exemplary arrangements such communicationsbased on user inputs to the mobile device may enable the remote systemto discontinue linking of token data to particular user selectedaccounts.

Some exemplary remote computer systems may automatically and/or inresponse to user action, modify the token data. This may be done eitherperiodically, after a set number of transactions, or after eachtransaction, to reduce the risk of unauthorized transactions using thetoken data. Further in some exemplary arrangements the system whichoperates linked token data to account data and/or operates to changetoken data may be operated in conjunction with a system that allows auser to selectively enable and/or disable their account or accountsthrough inputs through their mobile device such as is described in theincorporated patent disclosures. For example, the remote system may sendmessages and/or data to the mobile device that operates in accordancewith the application instructions executed therein to change the tokendata that is stored in the mobile device (and by the remote computerwhich corresponds to the account data). This may be done, for example,each time the account is enabled subsequent to being disabled by theuser through inputs to their mobile device. In some arrangements, themessages from the remote system may cause the new token data to beresolved through operation of the mobile device based at least in parton the existing storage token data. In this way the interception of themessages to the mobile device that are operative to cause the existingtoken data to be modified will not result in disclosure of the new tokendata. Alternatively, in some arrangements, new token data that entirelyreplaces existing token data may be securely transmitted to the mobiledevice. Of course, these approaches are exemplary. Alternative ordifferent approaches may be used.

Further in other exemplary arrangements an automated banking machine maybe utilized to help users to avoid fraudulent transactions that may beconducted via other methods. For example a user may prefer to ordergoods or services by phone or using a personal computer which uses onlythe user account data and card data which can be verbally read from acard or keyed into a personal computer keyboard. Such transactions wherethe actual card is not presented to the merchant or a merchant'stransaction terminal, can present risks because the data that is storedon a chip associated with a genuine card is not available to verify thatthe card is genuine. This is because in a transaction that is carriedout either on the phone or at a PC or other terminal that cannot readthe data from the chip on the card or communicate with the chip, onlythe visible data on the card can be used in connection with presentingthe transaction.

Exemplary embodiments of automated banking machines may operate toprovide the user with additional information or capabilities that can beused in transactions that are conducted with merchants when the card isnot present. This may include, for example, the automated bankingmachine operating to verify the authenticity of the user's cardincluding chip data included on the card. The user may also beauthenticated by other factors such as the user's PIN, biometricidentifiers or other data. With the user and their card authenticated,the terminal may operate to provide the user with an additionalauthenticating factor or a device that can provide such a factor thatcan be used when transactions are conducted with a merchant where thecard is not physically presented to the merchant. In some arrangementsthis may include an additional secret code that is provided to the userfrom the automated banking machine. The code data may be provided by themachine in the form of a visual output, a printed document or other formof output. In some alternative arrangements the automated bankingmachine may operate to send the secret code to a mobile device through awireless portal of the machine. Alternatively or in addition, theautomated banking machine may operate to electronically send the secretcode to the user such as via a text message sent to a phone number thatis input by the user or to another network address selected by the usersuch as an e-mail address. The secret code may be stored in a remotesystem accessible by merchants for use in connection with transactionsthat are conducted by a merchant when the card is not present. Thus, forexample, if the user places an order for goods on the phone or through aPC, the user can additionally provide the secret code in addition to thedata on the card so as to further authenticate the transaction asauthorized. Alternatively, in some embodiments the machine may providethe user with an article in a manner like that previously discussed,which article can output data which can be used as an additionalauthenticating factor.

For example, in some arrangements the automated banking machine mayinclude a transaction selection option that provides the user with aunique value that can later be presented during a phone transactioncarried out by the user with a merchant involving the same card basedaccount. For example, the value may correspond to a token value that hasno relationship to the account data. For example, in some arrangementsthe token value may be a random generated value that is correlated inone or more data stores by the remote system with the account data. Thistoken data may be accessed by a merchant system at the time the phonetransaction is requested by the user. The token value can be received bythe merchant via phone communication with the user so that the merchantmay verify that the transaction is authorized. In some arrangements thetoken data may be used for one transaction and once utilized on oneoccasion by a merchant may be deleted from the remote systemautomatically. In other arrangements the token value may be utilized fora number of phone or other transactions carried out where the physicalcard is not present. Alternatively or in addition, such value may beutilized for transactions conducted during a defined time period or upto a cumulative total value of transactions.

Alternatively and/or in addition, in some systems token values may beissued that can be resolved as authorized without access to stored datafrom the system that issued the token. For example, in some arrangementsthe token values may correspond to account data, user name data, cardvalidation data, expiration date data, card issuer data, or combinationsthereof that are encrypted using a public key of a public/private keypair through operation of the system which issues the token. A merchantwho is to conduct “card not present” transactions may hold thecorresponding private key and utilize it to resolve the encrypted tokendata. In this way the merchant who receives the token data can comparethe resolve data to data provided by the user in connection with thetransaction. The fact that the data corresponds with the transactionwhere the card is not present is an indication that the transaction isconducted by an authorized card user. Of course, these approaches areexemplary.

Alternatively and/or in addition, if a user normally conductstransactions such as purchase transactions by phone, when using theautomated banking machine to receive transaction authenticatingcredentials for use in future “card not present” transactions, the usermay be requested to provide an input to the automated banking machine ofa spoken code word that the user will use in connection withtransactions that are conducted in the future by phone. The automatedbanking machine may operate in accordance with its programming tocommunicate data corresponding to the code word and/or a voice print tothe remote transaction system. The data is then securely stored inmemory. When the user later wishes to place an order for goods viatelephone, the communications by phone may include the user presentingthe code word verbally to the order system in addition to data that isread from the card. This code word and or voice data from the user isthen compared to the stored data for correspondence. This provides anadditional authenticating factor that the merchant receiving the ordercan use to have higher assurance that the transaction being presented bythe user is authorized. Of course these are but examples of things thatan automated banking machine may provide as additional authenticatingfactors to help assure that transactions requested of a merchant incircumstances where the card is not present at the merchant location,are not fraudulent.

Thus the exemplary embodiments achieve improved operation, eliminatedifficulties encountered in the use of prior devices and systems, andattain the useful results described herein.

In the foregoing description certain terms have been used for brevity,clarity and understanding. However, no unnecessary limitations are to beimplied therefrom because such terms are used for descriptive purposesand are intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and the invention is notlimited to the features shown and described.

Further in the following claims any feature described as a means forperforming a function shall be construed as encompassing any means knownto those skilled in the art as being capable of carrying out the recitedfunction and shall not be deemed limited to the particular means shownor described for performing the recited function in the foregoingdescription or mere equivalents thereof.

It should be understood that features and/or relationships associatedwith one embodiment can be combined with features and/or relationshipsfrom another embodiment. That is, various features and/or relationshipsfrom various embodiments can be combined in further embodiments. Theinventive scope of the disclosure is not limited to only the embodimentsshown or described herein.

It should be understood that language which refers to a list of itemssuch as “at least one of A, B, or C” (example 1) means “at least one ofA, B and/or C.” Likewise, it should be understood that language whichrefers to a list of items such as “at least one of A, B, and C” (example2) means “at least one of A, B and/or C.” The list of items in example 2is not required to include one of each item. The lists of items in bothexamples 1 and 2 can mean “only one item from the list or anycombination of items in the list.” That is, the lists of items (in bothexamples 1 and 2) can mean only A, or only B, or only C, or anycombination of A, B, and C (e.g., AB, AC, BC, or ABC).

The term “non-transitory” with regard to computer readable medium isintended to exclude only the subject matter of a transitory signal perse, where the medium itself is transitory. The term “non-transitory” isnot intended to exclude any other form of computer readable media,including, but not limited to, media comprising data that is onlytemporarily stored or stored in a transitory fashion. Should the lawchange to allow a computer readable medium itself to be transitory, thenthis exclusion is no longer valid or binding.

Having described the features, discoveries and principles of theexemplary embodiments, the manner in which they are constructed andoperated and the advantages and useful results attained, the new anduseful structures, devices, elements, arrangements, parts, combinations,systems, equipment, operations, methods, processes and relationships areset forth in the appended claims.

We claim:
 1. Apparatus comprising: a mobile device configured to becarried by a user, wherein the mobile device includes at least one inputdevice, at least one output device, at least one wireless transceiver, abattery, at least one control circuit including at least one data store,wherein the at least one input device, the at least one output device,at least one wireless transceiver and the battery are in operativeconnection with the at least one control circuit, wherein the at leastone data store includes user identifying data corresponding to a userfinancial account wherein the at least one control circuit is operativeto cause (a) the at least one input device to be operative to receive atleast one input from the user corresponding to a request to receive anamount of cash, (b) responsive at least in part to the at least oneinput received in (a), the mobile device to send at least one wirelessmessage to a remote transaction system including data corresponding tothe request, the user identifying data and a current location of themobile device, (c) subsequent to (b), the mobile device to receive atleast one wireless message from the remote transaction system thatincludes data corresponding to a transaction identifier and a pluralityof fulfillment points located in proximity to the current location ofthe mobile device, (d) responsive at least in part to the at least onemessage received in (c), the at least one output device to output datacorresponding to each of the plurality of fulfillment points, (e)subsequent to (d), the at least one input device to be operative toreceive at least one input from the user corresponding to a selected oneof the fulfillment points, (f) responsive at least in part to the atleast one input received in (e), the at least one output device tooutput directions from the current location to a fulfillment pointlocation corresponding to the selected one fulfillment point, (g)subsequent to (f), the mobile device to wirelessly send at least onemessage to an automated banking machine located at the one selectedfulfillment point, the at least one message including data correspondingto the transaction identifier and the user identifying data, wherein theautomated banking machine is in operative connection with the remotetransaction system, (h) the mobile device to wirelessly receive at leastone message from the automated banking machine including datacorresponding to at least one fulfillment point identifier, (i)subsequent to (h), the mobile device to send data corresponding to theat least one fulfillment point identifier and a further current locationof the mobile device to the remote transaction system, wherein theremote transaction system is enabled to make a determination that thefurther current location of the mobile device corresponds to a locationof the automated banking machine, wherein the automated banking machineis operative responsive at least in part to the determination, thetransaction identifier and the user identifying data to cause the amountof cash to be made available to the user.
 2. The apparatus according toclaim 1 wherein subsequent to the amount of cash being made available tothe user responsive to operation of the automated banking machine, theat least one control circuit is further operative to cause at least onewireless confirmation message to be sent from the mobile deviceindicative that the user has received the requested amount of cash. 3.The apparatus according to claim 1 wherein the mobile device comprises awearable device including a configuration of at least one of wearableglasses, a wristwatch, a medallion, a hat, and an article of clothing.4. The apparatus according to claim 1 wherein the at least one controlcircuit is further operative in (g) to cause data corresponding tomobile device identifying data to be included in the at least onewireless message sent by the mobile device, wherein the automatedbanking machine is operative to cause the amount of cash to be madeavailable to the user responsive at least in part to the mobile deviceidentifying data.
 5. The apparatus according to claim 1 wherein the useridentifying data includes token data, wherein the token data is usableonly by the remote transaction system to determine the financial accountassociated with the user.
 6. The apparatus according to claim 1 whereinprior to the automated banking machine operating to cause the amount ofcash to be available to the user, the at least one control circuit isoperative to cause (j) the mobile device to receive at least onewireless message indicative that the user financial account is currentlyunavailable to conduct a transaction, (k) responsive at least in part tothe at least one message received in (j), the at least one output deviceto provide at least one output indicative that the user financialaccount is currently unavailable, (l) subsequent to (k), the at leastone input device to be operative to receive at least one input from theuser indicative of a change in account status to make the financialaccount available, (m) responsive at least in part to the at least oneinput received in (1), the mobile device to cause at least one wirelessmessage to be sent to the remote transaction system, wherein the remotetransaction system is operative responsive at least in part to the atleast one message to change the account status to available to conductthe transaction, wherein the automated banking machine is operative tomake the amount of cash available to the user responsive at least inpart to the account being available to conduct the transaction.
 7. Theapparatus according to claim 1 wherein prior to the automated bankingmachine operating to cause the amount of cash to be available to theuser, the at least one control circuit is operative to cause the mobiledevice to send at least one wireless message to the remote transactionsystem to change a status of the user financial account from unavailableto available to conduct transactions.
 8. The apparatus according toclaim 1 wherein prior to the amount of cash being made available to theuser, the at least one control circuit is operative to cause (j) the atleast one input device to be operative to receive at least one inputfrom the user indicative of a threshold transaction fee the user iswilling to pay to receive the amount of cash, (k) subsequent to (j), themobile device to receive at least one wireless message indicative of atleast one fulfillment point in proximity to the current location of themobile device where the amount of cash will be made available for atransaction fee at or below the threshold.
 9. The apparatus according toclaim 1 wherein prior to the amount of cash being made available to theuser, the at least one control circuit is operative to cause (j) the atleast one input device to be operative to receive at least one inputfrom the user indicative of a threshold transaction fee the user iswilling to pay to receive the amount of cash, (k) subsequent to (j), themobile device to receive at least one wireless message indicative of atleast one fulfillment point in proximity to the current location of themobile device where the amount of cash will be made available for atransaction fee at or below the threshold, and which at least onewireless message includes a code or token usable to obtain the amount ofcash or transaction fee at or below the threshold, (l) subsequent to(k), the mobile device to transmit at least one wireless message to theautomated banking machine including data corresponding to the code ortoken received in (k).
 10. The apparatus according to claim 1 andfurther comprising: the automated banking machine, wherein the automatedbanking machine is operative to send at least one transaction requestmessage to the remote transaction system, wherein the at least onetransaction request message includes data corresponding to thetransaction identifier and the user identifying data, wherein theautomated banking machine is operative to receive at least oneauthorization message from the remote transaction system responsive atleast in part to the at least one transaction request message, whereinthe automated banking machine is operative to make the amount of cashavailable to the user responsive at least in part to the at least oneauthorization message.
 11. The apparatus according to claim 1 andfurther comprising: the automated banking machine, wherein the automatedbanking machine includes at least one automated banking machine inputdevice, wherein the at least one automated banking machine input deviceis operative to receive a user identifier input from a user, wherein theuser identifier input received through the automated banking machineinput device includes at least one of a personal identification number,data read from a card, a biometric feature, an audible sound, whereinthe automated banking machine is operative to send at least onetransaction request message to the remote transaction system, whereinthe at least one transaction request message includes data correspondingto the user identifier input, the transaction identifier and the useridentifying data, wherein the automated banking machine is operative toreceive at least one authorization message from the remote transactionsystem responsive at least in part to the at least one transactionrequest message, wherein the automated banking machine is operative tomake the amount of cash available to the user responsive at least inpart to the at least one authorization message.
 12. The apparatusaccording to claim 1 and further comprising: the automated bankingmachine, wherein the automated banking machine is operative responsiveat least in part to the transaction identifier and the user identifyingdata received from the mobile device to cause a capability determinationto be made that the automated banking machine can operate to cause theamount of cash to be made available to the user, wherein the automatedbanking machine is operative to cause the amount of cash to be madeavailable to the user responsive at least in part to the capabilitydetermination.
 13. The apparatus according to claim 1 and furthercomprising: the automated banking machine, wherein the automated bankingmachine includes at least one of a cash dispenser, a cash register, aportable computer configured to be movably carried by a merchantrepresentative.
 14. The apparatus according to claim 1 and furthercomprising: an automated banking machine, wherein the automated bankingmachine is operative to send at least one machine confirmation messageto the remote transaction system indicative that the amount of cash hasbeen made available to the user, wherein subsequent to the amount ofcash being made available to the user responsive to operation of theautomated banking machine, the at least one control circuit of themobile device is further operative to cause at least one wireless mobiledevice confirmation message to be sent from the mobile device indicativethat the user has received the requested amount of cash, wherein thefinancial account is charged for the amount of cash responsive at leastin part to the at least one machine confirmation message and the atleast one mobile device confirmation message.
 15. Apparatus comprising:an automated banking machine configured to make cash available to a userof a mobile device which mobile device is configured to be carried bythe user, and wherein the automated banking machine is configured tocommunicate with a remote transaction system, wherein the mobile deviceincludes at least one input device, at least one output device, at leastone wireless transceiver, a battery, at least one control circuitincluding at least one data store, wherein the at least one inputdevice, the at least one output device, the at least one wirelesstransceiver, and the battery are in operative connection with the atleast one control circuit, wherein the data store includes useridentifying data corresponding to a user financial account, wherein theat least one control circuit is operative to cause (a) the at least oneinput device to be operative to receive at least one input from the usercorresponding to a request to receive an amount of cash, (b) responsiveat least in part to the at least one input received in (a), the mobiledevice to send at least one wireless message to the remote transactionsystem including data corresponding to the request, the user identifyingdata and a current location of the mobile device, (c) subsequent to (b),the mobile device to receive at least one wireless message from theremote transaction system, wherein the at last one wireless messageincludes data corresponding to a transaction identifier and a pluralityof fulfillment points located in proximity to the current location ofthe mobile device, (d) responsive to the at least one message receivedin (c), the at least one output device to output data corresponding toeach of the plurality of fulfillment points, (e) subsequent to (d), theat least one input device to be operative to receive at least one inputfrom the user corresponding to a selected one of the fulfillment pointscorresponding to the automated banking machine, (f) responsive at leastin part to the at least one input received in (e), the at least oneoutput device to output directions from the current location to theautomated banking machine, (g) subsequent to (f), the mobile device towirelessly send at least one message to the automated banking machine,the at least one message including data corresponding to the transactionidentifier and the user identifying data, (h) the mobile device towirelessly receive data corresponding to at least one fulfillment pointidentifier associated with the automated banking machine to which the atleast one message is sent in (g), (i) the data corresponding to the atleast one fulfillment point identifier to be sent to the remotetransaction system, wherein the automated banking machine comprises: acash dispenser, a wireless portal, a network interface configured tocommunicate with the remote transaction system, a controller, whereinthe controller is in operative connection with the cash dispenser, thewireless portal, and the network interface, wherein the controller isoperative to cause responsive at least in part to the at least onewireless message from the mobile device including the data correspondingto the transaction identifier and the user identifying data, to send atleast one transaction request message to the remote transaction systemincluding data corresponding to the transaction identifier and the useridentifying data, responsive at least in part to at least oneauthorization message received by the automated banking machine from theremote transaction system responsive at least in part to the at leastone transaction request message and the received data corresponding tothe at least one fulfillment point identifier, operation of the cashdispenser to make the amount of cash available to the user.
 16. Theapparatus according to claim 15 wherein the automated banking machinefurther includes at least one automated banking machine input deviceconfigured to receive at least one user identifier input, wherein the atleast one user identifier input includes at least one of a personalidentification number, data read from a card, a biometric feature, anaudible sound, wherein the controller is operative to cause datacorresponding to the at least one user identifier input to be includedin the at least one transaction request message, wherein the at leastone authorization message is received from the remote transaction systemresponsive at least in part to the data corresponding to the at leastone user identifier input being included in the at least one transactionrequest message.
 17. The apparatus according to claim 15 wherein thecontroller is further operative to cause at least one machineconfirmation message to be sent to the remote transaction systemresponsive at least in part to the cash dispenser making the amount ofcash available to the user, wherein the mobile device is operative towirelessly send at least one mobile device confirmation message to theremote transaction system responsive at least in part to at least oneinput to the at least one input device indicative that the user receivedthe amount of cash, wherein the user financial account is charged forthe amount of cash through operation of the remote transaction systemresponsive at least in part to the at least one machine confirmationmessage and the at least one mobile device confirmation message.
 18. Theapparatus according to claim 15 wherein the mobile device includes aconfiguration of at least one of wearable glasses, a wristwatch, amedallion, a hat, and an article of clothing.
 19. The apparatusaccording to claim 15 and further comprising: wherein the useridentifying data includes a token that is only correlatable throughoperation of the remote transaction system with the user financialaccount, wherein the at least one control circuit of the mobile deviceis operative to cause at least one wireless message to be sent to theautomated banking machine wherein the at least one wireless messageincludes mobile device identifying data, wherein the controller isoperative to cause data corresponding to the mobile device identifyingdata to be included in the at least one transaction request message,wherein the at least one authorization message is received by theautomated banking machine responsive at least in part to the datacorresponding to the mobile device identifying data being included inthe at least one transaction request message.
 20. Apparatus comprising:an automated banking machine configured to make cash available to a userof a mobile device which mobile device is configured to be carried bythe user, and wherein the automated banking machine is configured tocommunicate with a remote transaction system, wherein the mobile deviceincludes at least one input device, at least one output device, at leastone wireless transceiver, a battery, at least one control circuitincluding at least one data store, wherein the at least one inputdevice, the at least one output device, the at least one wirelesstransceiver, and the battery are in operative connection with the atleast one control circuit, wherein the data store includes useridentifying data corresponding to a user financial account, wherein theat least one control circuit is configured to cause (a) the at least oneinput device to be operative to receive at least one input from the usercorresponding to a request to receive an amount of cash, (b) responsiveat least in part to the at least one input received in (a), the mobiledevice to send at least one wireless message to the remote transactionsystem including data corresponding to the request, the user identifyingdata and a current location of the mobile device, (c) subsequent to (b),the mobile device to receive at least one wireless message from theremote transaction system that includes data corresponding to atransaction identifier and a plurality of fulfillment points located inproximity to the current location of the mobile device, (d) responsiveat least in part to the at least one message received in (c), the atleast one output device to output data corresponding to each of theplurality of fulfillment points, (e) subsequent to (d), the at least oneinput device to be operative to receive at least one input from the usercorresponding to a selected one of the fulfillment points correspondingto the automated banking machine, (f) responsive at least in part to theat least one input received in (e), the at least one output device tooutput directions from the current location to the automated bankingmachine, (g) subsequent to (f), the mobile device to wirelessly send atleast one message, wherein the at least one message is operative tocause the automated banking machine to receive at least one messageincluding data corresponding to the transaction identifier, (h)subsequent to (g), the mobile device to receive at least one wirelessmessage, wherein the at least one wireless message includes datacorresponding to a fulfillment point identifier that corresponds to theautomated banking machine, (i) subsequent to (h), the mobile device tosend data corresponding to the fulfillment point identifier to theremote transaction system, wherein the automated banking machinecomprises: a cash dispenser, a wireless portal, a network interfaceconfigured to communicate with the remote transaction system, acontroller, wherein the controller is in operative connection with thecash dispenser, the wireless portal, and the network interface, whereinthe controller is operative to cause the at least one wireless messagewhich includes the data corresponding to the fulfillment pointidentifier to be sent to the mobile device, responsive at least in partto receipt of the at least one message including the data correspondingto the transaction identifier, at least one transaction request messageto be sent to the remote transaction system, wherein the at least onetransaction request message includes the data corresponding to thetransaction identifier, responsive at least in part to at least oneauthorization message received by the automated banking machine from theremote transaction system, wherein the at least one authorizationmessage is received responsive at least in part to the at least onetransaction request message and to receipt by the remote transactionsystem from the mobile device of the data corresponding to thefulfillment point identifier, operation of the cash dispenser to makethe amount of cash available to the user.
 21. At least onenon-transitory computer readable storage medium having stored thereincircuit executable instructions, which instructions are operative tocause at least one control circuit in a mobile device executing suchinstructions to perform operations, comprising: (a) enabling at leastone input device of the mobile device to be operative to receive atleast one input from a user corresponding to a request to receive anamount of cash, (b) responsive at least in part to the at least oneinput received in (a), sending to a remote transaction system via awireless transceiver of the mobile device, at least one wireless messageincluding data corresponding to the request, user identifying datacorresponding to a user financial account, and a current location of themobile device, (c) subsequent to (b), receiving via the wirelesstransceiver at least one wireless message from the remote transactionsystem that includes data corresponding to a transaction identifier anda plurality of fulfillment points located in proximity to the currentlocation of the mobile device, (d) responsive at least in part to the atleast one wireless message received in (c), outputting datacorresponding to each of the plurality of fulfillment points through atleast one output device of the mobile device, (e) subsequent to (d),enabling the at least one input device to receive at least one inputfrom the user corresponding to a selected one of the fulfillment points,(f) responsive at least in part to the at least one input received in(e), outputting through the at least one output device, directions fromthe current location to a fulfillment point location corresponding tothe selected one fulfillment point, (g) subsequent to (f), wirelesslysending via the wireless transceiver at least one message, wherein theat least one message is operative to cause an automated banking machinelocated at the one selected fulfillment point to receive at least onemessage including data corresponding to the transaction identifier,wherein the automated banking machine is in operative connection withthe remote transaction system, (h) subsequent to (e), wirelesslyreceiving at least one message via the wireless transceiver, wherein theat least one message includes data corresponding to at least onefulfillment point identifier associated with the automated bankingmachine, (i) subsequent to (h), sending via the wireless transceiver tothe remote transaction system, data corresponding to the at least onefulfillment point identifier and a further current location of themobile device, wherein the remote transaction system is enabled to makea determination using the at least one fulfillment point identifier thatthe further current location of the mobile device corresponds to alocation of the automated banking machine, wherein the automated bankingmachine is operative responsive at least in part to the determination,the transaction identifier and the user identifying data to cause theamount of cash to be made available to the user.
 22. The at least onenon-transitory computer readable storage medium according to claim 21wherein in (h) the data corresponding to the at least one fulfillmentpoint identifier is received from the automated banking machine.