Transaction system and method

ABSTRACT

A method, such as for executing electronic financial transactions, is disclosed herein. The method can include arranging an automated bank terminal and a bank core in communication with one another over a secured internal bank network. The method can also include receiving, at the automated bank terminal, a banking transaction request from a user wherein the banking transaction request is defined by a plurality of transaction details. The method can also include directing, with the automated bank terminal, the banking transaction request to a partner switch outside of the secured internal bank network in response to receiving the banking transaction request.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/909,544, filed Mar. 1, 2018, which is hereby incorporated in itsentirety. This application also claims priority to and the benefit ofU.S. Provisional Patent Application No. 62/465,472 filed Mar. 1, 2017,which is hereby incorporated by reference in its entirety.

BACKGROUND 1. Field

The present disclosure relates to systems for executing electronicfinancial transactions.

2. Description of Related Prior Art

Recent technological advancements related to In-Lobby Teller (ILT)terminals have empowered consumers to interact with banking branches innew ways. While this opportunity enhances efficiency, it sometimes canbe at the cost of consumer acquisition, engagement, and retention. NewerILTs offer enhanced solutions. They combine the speed and accuracy of aself-service terminal with intelligence from a bank's core systems. Forexample, the Diebold Nixdorf 9900 ILT links to the staff within the bankto provide around-the-clock service for many types of transactions,provide a diverse range of services to individuals, and fulfill theneeds of many small and medium businesses.

An ILT can have a flexible and modular design for enhanced functionalityand can be designed to meet international accessibility guidelines. SomeILTs may have a nineteen inch color touchscreen consumer-viewabledisplay with privacy filter and have both landscape and portrait displayoptions as well as optional video enablement with Concierge VideoServices™. Other options may be desirable such as having a cash capacitywith a recycling module with up to five cassettes for denominationsupport and enhanced cash capacity, up to 10,800-note capacity forrecycling, deposits of up to 11,500 notes in a five-cassetteconfiguration, up to four cassettes to dispense or recycle (fifthcassette reserved for mix of deposit and reject/dispense retracts),and/or have a pocket-style user interface that accepts 200 notes at onetime. Some units may have an optional Advanced Function Dispenser (AFD)the enables fast dispensing and holds an additional 13,000-note capacityand five denominations. ILT may be capable of advanced features such asa barcode reader and coin dispenser, an intelligent depository modulefor configuration flexibility, and capacity to accept stacks of up to 30checks or bill payment documents in any insertion orientation.

The background description provided herein is for the purpose ofgenerally presenting the context of the disclosure. Work of thepresently named inventors, to the extent it is described in thisbackground section, as well as aspects of the description that may nototherwise qualify as prior art at the time of filing, are neitherexpressly nor impliedly admitted as prior art against the presentdisclosure.

SUMMARY

A method, such as for executing electronic financial transactions, caninclude arranging an automated bank terminal and a bank core incommunication with one another over a secured internal bank network. Themethod can also include receiving, at the automated bank terminal, abanking transaction request from a user wherein the banking transactionrequest is defined by a plurality of transaction details. The method canalso include directing, with the automated bank terminal, the bankingtransaction request to a partner switch outside of the secured internalbank network in response to receiving the banking transaction request.

According to other features, the method can also include arranging aswitch and the bank core in communication with one another over thesecured internal bank network. The method can also include receiving,with the switch, a force-post transaction defined by at least some ofthe plurality of transaction details and originating at the partnerswitch after the directing of the banking transaction to the partnerswitch. The receiving the force-post transaction can be further definedas receiving, with the switch, the force-post transaction over one of anelectronic funds transfer (EFT) network and an automated clearing house(ACH) network distinct from the secured internal bank network. Themethod can also include converting, with the partner switch, the bankingtransaction request to the force-post transaction after the directing ofthe banking transaction to the partner switch and prior to the receivingthe force-post transaction with the switch. The method can also includedesignating, with the automated bank terminal, the banking transactionrequest as an off-us transaction prior to the directing of the bankingtransaction request to the partner switch, wherein the designating isirresponsive to the plurality of transaction details and wherein theplurality of transaction details of the force-post transaction includesthe off-us designation.

In other features, the method can also include converting, with thepartner switch, the banking transaction request to a force-posttransaction defined by at least some of the plurality of transactiondetails after the directing of the banking transaction to the partnerswitch. The method can also include directing, with the partner switch,the force-post transaction to the secured internal bank network afterthe converting. The method can also include tagging, with the automatedbank terminal, the banking transaction request as an off-us transactionprior to the directing of the banking transaction request to the partnerswitch outside of the secured internal bank network in response to thereceiving the banking transaction request, the tagging irresponsive tothe plurality of transaction details. The directing of the bankingtransaction to the partner switch can be further defined as directing,with the automated bank terminal, the banking transaction request to thepartner switch over one of an electronic funds transfer (EFT) networkand an automated clearing house (ACH) network outside of the securedinternal bank network.

According to additional features, the plurality of transaction detailsinclude at least one of the group including a transaction amount, one ormore bank accounts, a personal identification number, a current image ofuser, an image of a driver's license, and a bank routing number. Themethod can also include directing, with the automated bank terminal, thebanking transaction request over the secured internal bank network to ateller computing device before the directing the banking transactionrequest to the partner switch. The method can also include receiving, atthe teller computing device, an approval input corresponding to approvalof the banking transaction request before the directing the bankingtransaction request to the partner switch. The directing of the bankingtransaction request to the teller computing device can be furtherdefined as directing, with the automated bank terminal, the bankingtransaction request over a secured internal bank network to a tellercomputing device including a tablet computer.

According to other features, the method can also include receiving, at asecond automated bank terminal, a second banking transaction requestfrom a second user wherein the second banking transaction request isdefined by a second plurality of transaction details. The method canalso include directing, with the second automated bank terminal, thesecond banking transaction request over the secured internal banknetwork to the tablet computer. The method can also include receiving,at the tablet computer, a second approval input corresponding toapproval of the second banking transaction request. The method can alsoinclude directing, with the second automated bank terminal, the secondbanking transaction request to the partner switch. The method can alsoinclude accessing, with the teller computing device, the bank core overthe secured internal bank network prior to the receiving the approvalinput. The method can also include executing, with the automated bankterminal, the banking transaction request substantiallycontemporaneously with the directing the banking transaction request toa partner switch outside of the secured internal bank network.

A method, such as for executing electronic financial transactions, caninclude receiving, at an automated bank terminal, a banking transactionrequest from a user wherein the banking transaction request is definedby a plurality of transaction details. The method can also includedirecting, with the automated bank terminal, the banking transactionrequest over a secured internal bank network to a teller computingdevice. The method can also include receiving, at the teller computingdevice, an approval input corresponding to approval of the bankingtransaction request. The method can also include directing, with one ofthe automated bank terminal and the teller computing device, the bankingtransaction request to a partner switch outside of the secured internalbank network in response to the receiving the approval input.

In other features, the method can also include arranging a switch and abank core in communication with one another and with the tellercomputing device and the automated bank terminal over the securedinternal bank network. The method can also include receiving, with theswitch, a force-post transaction defined by at least some of theplurality of transaction details after the directing of the bankingtransaction to the partner switch. The method can also includedirecting, with the switch, the force-post transaction to the bank coreover the secured internal bank network after the receiving of theforce-post transaction from the partner switch. The method can alsoinclude directing, with the bank core, a confirmation message to theswitch over the secured internal bank network after the directing of theforce-post transaction to the bank core from the switch. Theconfirmation message can correspond to recordation of the force-posttransaction in the bank core. The method can also include directing,with the switch, the confirmation message outside of the securedinternal bank network.

According to additional features, the method can also include receiving,with the automated bank terminal, the confirmation message from outsideof the secured internal bank network. The method can also includeexecuting, with the automated bank terminal, the banking transactionrequest in response to the receiving the confirmation message fromoutside of the secured internal bank network.

A system, such as for executing electronic financial transactions, caninclude a bank core having one or more processors and configuredmaintain a primary ledger of a plurality of accounts and transactionsassociated with the plurality of accounts. The system can also includean automated bank terminal having one or more processors and configuredto receive a banking transaction request from a user. The bankingtransaction request can be defined by a plurality of transactiondetails. The automated bank terminal can be configured to transmit thebanking transaction request for eventual receipt by the bank core of theplurality of transaction details. The system can also include a securedinternal bank network, wherein the bank core and the automated bankterminal directly input at least some communications to the securedinternal bank network. The system can also include a partner switchhaving one or more processors and disposed outside of the securedinternal bank network and in communication with the automated bankterminal and configured to receive the banking transaction request fromthe automated bank terminal and also configured to convert the bankingtransaction request to a force-post transaction defined by at least someof the plurality of transaction details.

According to other features, the system can also include a switch havingone or more processors and configured to direct electroniccommunications relative to the secured internal bank network and also toreceive and output electronic communications relative to one or morefinancial transaction networks external to the secured internal banknetwork. The switch can be further configured to receive the force-posttransaction from the partner switch over the one or more financialtransaction networks external to the secured internal bank network. Theswitch can be further configured to transmit the force-post transactionto the bank core over the secured internal bank network. The switch canbe further configured to transmit a confirmation of the force-posttransaction to the partner switch over the one or more financialtransaction networks external to the secured internal bank network.

In other features, the system can also include a teller computing devicehaving one or more processors and disposed to communicate with theswitch and the automated bank terminal over the secured internal banknetwork. The teller computing device can be configured to receive thebanking transaction request from the automated bank terminal over thesecured internal bank network. The teller computing device can also beconfigured to receive an approval input corresponding to approval of thebanking transaction request. The teller computing device can beconfigured to direct the approval input to the automated bank terminal.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description set forth below references the followingdrawings:

FIG. 1 is a schematic illustration of a system according to a firstexemplary embodiment of the present disclosure;

FIG. 2 is a schematic illustration of a system according to a secondexemplary embodiment of the present disclosure;

FIG. 3 is a schematic illustration of a system according to a thirdexemplary embodiment of the present disclosure;

FIG. 4 illustrates a first example of a system for processing taggedoff-us banking transactions using a partner switch having a processorlogic;

FIG. 5 illustrates a second example embodiment of a system forprocessing tagged off-us banking transactions using a partner switchhaving an external switch logic.

FIG. 6 is a simplified flow diagram of a process carried out in one ormore embodiments of the present disclosure;

FIG. 7 is a simplified flow diagram of a process carried out in one ormore embodiments of the present disclosure;

FIG. 8 is a simplified flow diagram of a process carried out in one ormore embodiments of the present disclosure;

FIG. 9 is a simplified flow diagram of a process carried out in one ormore embodiments of the present disclosure;

FIG. 10 is a simplified flow diagram of a process carried out in one ormore embodiments of the present disclosure; and

FIG. 11 is a schematic illustration of a teller computing deviceaccording to one or more embodiments of the present disclosure.

DETAILED DESCRIPTION

The present disclosure, as demonstrated by the exemplary embodimentdescribed below, can provide systems and methods for executingelectronic financial transactions that improve the computingefficiencies of existing systems. Efficiency relates to the relationshipbetween the accomplishment of a task and the resources required toaccomplish the task. Improvements in efficiency are defined when theresources required to perform the task are reduced and also whenrelatively greater or additional tasks can be accomplished withoutsupplementing resources or with minimal additions to resources.

The inventors have observed that the costs associated with improvementsin banking technology often include variable costs and fixed costs. Theinventors have further observed that variable costs are defined, by wayof example and not limitation, by the cost of automated bank terminalssuch as ILTs and automated transaction machines (ATMs). The cost ofautomated bank terminals is variable, based on the number of terminalspurchased and the extent of functionality of each automated bankterminal. The inventors have further observed that fixed costs aredefined, by way of example and not limitation, by the cost of setting upnew technology to function with existing, or “legacy” systems. Set-upcan require extensive reprogramming and testing for validation.

The inventors have further observed that, for many banks, the extent offixed costs can preclude the deployment of new technology. The presentdisclosure discloses improvements in the efficiency of banking systems.The present disclosure discloses new methods of operating componentswithin a banking system that increases the functionality of the banksystem. The present disclosure also discloses new methods of operatingcomponents outside of an internal banking system that increases thefunctionality of the bank system.

The present disclosure provides a method and system with the enhancedfunctionality associated with ILTs without requiring significant changesto existing bank computing system. Transactions are routed out of theinternal bank network and directed back into the internal bank core. Anautomated bank terminal, such as an ILT, can receive a bankingtransaction request from a user. Prior to being routed out of theinternal bank network, the banking transaction request can be tagged ordesignated as an off-us transaction by the automated bank terminal. Thebanking transaction request can be directed to a partner switch that isdisposed outside of the internal bank network. The partner switch canconvert the banking transaction request to a force-post transaction andthen direct the force-post transaction back into the internal bank core.By so designating and converting the transaction, the existing bankcomputer network can accept and execute the transaction. Conversely,modifying an existing bank computer system to accept the same bankingtransaction request “directly” through the internal bank network(directly between an ILT and the bank core) would require setup costs ofover one million dollars.

FIG. 1 illustrates one example embodiment of a banking system 1 of afirst bank 18. The system 1 includes various components that communicateover a first bank network/computer system. The first banknetwork/computer system of the first bank 18 includes a secured internalbank network that is referenced schematically at 12. FIG. 1 showsseveral components arranged to communicate with one another over theexemplary secured internal bank network 12, including a local bankswitch/first bank switch 13, a bank core 15, a bank teller personalcomputer (a teller terminal) 5, an automated transaction machine (ATM)17, an ILT 3, and a teller application server 7 running a tellerapplication 9. As shown in FIG. 1, the switch 13 directs communicationsbetween devices arranged on the secured internal bank network 12. Asalso shown in FIG. 1, the switch 13 is disposed to communicate with apartner switch 11 that is outside of the secured internal bank network12. A second bank 19 includes second, secured internal bank network thatis referenced at 14.

The ILT 3 includes one or more processors and a variety of differentbanking transaction requests may be input to the ILT or automated bankterminal 3 by a user 4. A banking transaction request is schematicallyillustrated and referenced at 2 in FIG. 1. For example, the user 4 mayrequest a cash withdrawal (e.g., debit) from an account such as achecking account, a savings account, or another type of bank account. Insome embodiments of the present disclosure, if the requested withdrawalexceeds a threshold value, such as $10,000, or another value, thetransaction may first need teller approval, as will be discussed ingreater detail below. Cash deposits (e.g., credits) may be accepted atthe ILT 3 that may include cash, checks, or both. A deposit including acheck may be an on-us or an off-us deposit. The system 1 of FIG. 1 mayalso be used to cash checks at the ILT 3 for on-us or off-us users withan on-us check. In some embodiments of the present disclosure, cashingan on-us check for an on-us user may involve verifying the identity ofthe user 4 with a banking card and a personal identification number(PIN). If the check is over a threshold limit value, the transaction maybe teller assisted/approved through the teller application 9.

The teller terminal/teller PC 5 is in general a personal computer thatmay be a laptop, a desktop, or a tablet. Alternatively, the tellerterminal 5 may be an iPad type of device, a handheld device, or anotherdevice that is capable of permitting a bank teller 6 to approve/overridea banking transaction request 2 that a banking user 4 is attempting toenter and process at the ILT 3. In the example system 1, the tellerterminal 5 may be at least partially under the control of the tellerapplication 9 running on the teller application server 7. The tellercomputing device 5 has one or more processors and is disposed tocommunicate with the switch 13 and the ILT 3 over the secured internalbank network 12. The teller application 9 may detect banking requesttransactions 2 that are entered into the ILT 3 by a user 4 and that haveexceeded a threshold value, such as a $5,000 limit for a cash withdrawal(e.g., debit), and then forward these transactions 2 to the tellerterminal 5. The teller terminal 5 and the teller application 9 (e.g.,teller software) provide screens/menus prompting and allowing the bankteller 6 the option of approving or rejecting a particular bankingtransaction request 2 exceeding the threshold limit. In someembodiments, the teller application 9 may provide audit support withreporting capability of transactions such as when a teller approves ordisapproves of various transactions.

The first bank switch 13 and, in general, the partner switch 11 receivestransaction requests/messages/data blocks/packets of data and determineswhere they should be routed in order to reach their intendeddestination(s). The switches 11 and 13 can be substantially similar interms of structure and differentiated by programming. The off-sitepartner switch 11 can be a certified banking switch that has averifiable reliability for routing electronic financial transactions.The first bank switch 13 may loosely operate similar to a telephoneswitch and route data blocks based on their destination address. Thoseof ordinary skill in the art will appreciate that over timelookup-tables of destination address may be matched with paths ontowhich they may be routed to reach those destinations. Existing, knownswitches will not transmit transaction requests/messages/datablocks/packets of data that re-enter the secured internal bank network12 from which it originated. However, the switch 13 according to thepresent disclosure will transmit transaction requests/messages/datablocks/packets of data sent to the partner switch 11 from the ILT 3 andthen routed back into the secured internal bank network 12 by thepartner switch 11. For example, messages leaving the secured internalbank network 12 from the ILT 3 and received by the partner switch 11 arereceived back into the secured internal bank network 12 by the switch13.

In some embodiments of the present disclosure, the teller application 9is able to handle typical teller control functions such as signaturecard verification. An off-us user with an on-us item (e.g., check) mayrequire authentication to be performed through an embodiment of theteller application 9 that compares signatures, an image of the useragainst the physical appearance of the user at the ILT 3, and/or otherbiometric data. In some embodiments of the present disclosure, theteller application 9 can detect false identifications. Rather thanutilize a human teller for completing a relatively small loanapplication, the first bank 18 can direct at least some users to beginor completely fill out necessary forms electronically at the ILT 3before subsequently involving a human teller.

In general, the bank core 15 includes central databases so that accurateaccount balances are maintained. These databases of various accountinformation may reside within the bank core 15 on multiple serversand/or other computing devices. Thus, the bank core 15 can have one ormore processors and be configured to maintain a primary ledger of aplurality of accounts and transactions associated with the plurality ofaccounts. As illustrated in FIG. 1, the exemplary bank core 15communicates with the exemplary first switch 13 and the exemplary tellerapplication server 7. The ILT 3 and the bank core 15 are incommunication with one another over a secured internal bank network 12.The communication may or may not be direct. An automated bank terminalmay communicate with the bank core through a server located at a branchand or through a switch positioned within the secured internal banknetwork. As shown in FIG. 1, the exemplary ILT 3 communicates with theexemplary bank core 15 through the exemplary teller application server7.

In general, the ATM 17 is a traditional ATM where banking transactionsmay be conducted that generally have a lower threshold limit than theILT 3. For example, cash withdrawals at the ATM 17 may not exceed $500.

FIG. 2 is an illustration of a banking system 31 similar to the bankingsystem 1 shown in FIG. 1. FIG. 2 further illustrates a global bankswitch 33 disposed between the switch 13 and the partner switch 11.FIGS. 1 and 2 thus confirm that communications between the switch 13 andthe partner switch 11 can be direct or indirect in various applicationsof embodiments of the present disclosure.

FIG. 3 is an illustration of a banking system 301 in which a first bank318 and a second bank 319 communicate. The first bank 318 includes asecured internal bank network 312. Various components communicate overthe exemplary secured internal bank network 312, such as an ILT 303, ateller terminal 305, an ATM 317, a teller application server 307, a bankcore 315, and a local bank switch 313. The system switch 313 is disposedto communicate with a partner switch 311. As shown in FIG. 3, the ILT303 may further include a processor logic 321 (e.g., microprocessor asseen in FIG. 3) to assist in parsing messages/packets and in makingdecisions.

FIG. 4 illustrates an example system 401 including a secured internalbank network 412. An ILT 403 is disposed in the secured internal banknetwork 412. A partner switch 411 is arranged to communicate with thesecured internal bank network 412. The ILT 403 can communicate with asecond bank 419 through the partner switch 411. The exemplary partnerswitch 411 has a transmitter 431, a receiver 433, and a processor or“processor logic” 435. The transmitter 431 and receiver 433 transmit andreceive data such as packets of fixed size or variable size, as well asand other types of data. The processor logic 435 may run softwareinstructions and is configured to analyze data information and todetermine where received data should be routed. For example, thereceiver 433 receives communications from the ILT 403 within the securedinternal bank network 412 such as a banking transaction request that hasbeen tagged as approved by a teller. The processor logic 435 determineswhether to route the banking transaction request directly back to thesecured internal bank network 412 or to the second bank 19. The bankingtransaction request may be fully processed by the first bank without thesecond bank 419 receiving the banking transaction request. In that case,the transmitter 431 will transmit the banking transaction request backto the secured internal bank network 412. As set forth elsewhere herein,the processor logic 435 can also be configured to convert the bankingtransaction request to a force-post transaction before directing theforce-post transaction back to the secured internal bank network 412. Insome configurations, the transmitter 431 transmits the ILT bankingrequest back to a switch disposed in the secured internal bank network412.

FIG. 5 illustrates an example system 501 including a secured internalbank network a first bank 518 having a secured internal bank network(represented by a box in dash line). An ILT 503 is disposed in thesecured internal bank network. A partner switch 511 is arranged tocommunicate with the secured internal bank network. The ILT 503 cancommunicate with a second bank 519 through the partner switch 511. Theexternal, partner switch 511 is configured to route off-us bankingtransactions back to the same bank that generated that bankingtransaction. The external-partner switch 511 includes a transceiver 531and external switch logic 535. In operation, the transceiver 531 willreceive an off-us banking transaction request from the first bank 518.The external switch logic 535 is configured to re-route the messagebased, at least in part, on an address in the message and the tag of themessage as an off-us message. The external-partner switch 511 and theexternal switch logic 535 may be certified according to at least onequality standard for switches in financial networks. The external switchlogic 535 sends the message back to the first bank 518, where the off-usbanking transaction request will be executed by the first bank 18. Thetransceiver 531 transmits the message back to the first bank 18 where itmay now be executed. It also noted that the switch logic 535 can convertthe banking transaction request to a force-post transaction.

In other operating scenarios, the external switch logic 535 of theexternal-partner switch 511 can send the banking transaction request tothe second bank 519 when the banking transaction is in fact off-us andassociated with the second bank 519. For example, the second bank 519may be requested to approve/confirm a signature on a check that ispresented at the first bank 518 as part of the banking transactionrequest. The check may be associated with an account that is maintainedby the first bank 518 while the user and his/her signature is associatedwith a banking account maintained by the second bank 519.

FIG. 6 is a simplified flow diagram of a method 600 according to one ormore implementations of the present disclosure. It is noted that theflow diagrams of the present disclosure and the blocks within the flowdiagrams schematically illustrate the architecture, functionality, andoperation of possible implementations of systems, methods, and computerprogram products according to various embodiments of the presentdisclosure. In this regard, each block in the flow diagram or blockswith the flow diagram may represent a module, segment, or portion ofcode, which comprises one or more executable instructions forimplementing the specified logical function(s). It will also be notedthat each block of the blocks with the flow diagram and combinations ofblocks in the blocks with the flow diagram may be implemented by specialpurpose hardware-based systems that perform the specified functions oracts, or combinations of special purpose hardware and computerinstructions. These computer program instructions may also be stored ina computer-readable medium that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablemedium produce an article of manufacture including instruction meanswhich implement the function/act specified in the flow diagram and/orblock diagram block or blocks.

In method 600, an off-site partner switch, such as any of partnerswitches 11, 311, 411, or 511, re-routes an off-us banking transactionrequest, such as request 2, back into a secured internal bank network,such as secured internal bank network 12, that the banking transactionrequest originated from. At 602, a banking transaction request isreceived by the first bank from a user. The exemplary bankingtransaction request requires approval of a teller, but other bankingtransaction requests may not require approval of a teller.

With reference again to FIG. 1, 602 corresponds to the bankingtransaction request 2 received by the first bank 18 from the user 4. Thebanking transaction request 2 can be defined by a plurality oftransaction details. By way of example and not limitation, the pluralityof transaction details can include at least one of the group including atransaction amount, one or more bank accounts, a personal identificationnumber, a current image of user, an image of a driver's license, and abank routing number. As set forth in greater detail below, the ILT 3receives the banking transaction request 2 and can be configured totransmit the banking transaction request 2 for eventual receipt, by thebank core 15, of at least some or all of the plurality of transactiondetails.

At 604 in FIG. 6, the banking transaction request is sent to the tellerapplication server and a teller computer. With reference again to FIG.1, 604 corresponds to the ILT 3 directing the banking transactionrequest 2 over the secured internal bank network 12 to the tellercomputing device. In FIG. 1, this communication is referenced at 20, 22and the teller computing device is defined by the teller applicationserver 7 operating the teller application 9 as well as the teller pc 5,which can be a tablet. With reference again to FIG. 3, 604 correspondsto the ILT 303 directing the banking transaction request over thesecured internal bank network 312 to the teller computing device. InFIG. 3, this communication is referenced at 320, 322 and the tellercomputing device is defined by the teller application server 307 incombination the teller pc 305. Alternatively, the communication can betransmitted directly to the teller pc 305, as referenced bycommunication line 324.

At 606 in FIG. 6, the teller computing device receives an approval inputcorresponding to approval of the banking transaction request by thehuman teller. It is noted that prior to presenting the human teller auser interface to enter approval or deny approval, the teller computingdevice can access the bank core 15 over the secured internal banknetwork 12 so that the human teller can be presented with additionalinformation before deciding whether or not to grant approval. Forexample, the user interface displayed to the human teller in order toenter approval or deny approval can display the amount of a desiredwithdrawal (one of the details defining the banking transaction request)and also display a current balance in the account against which thewithdrawal will be applied (current balance and account number beingother details defining the banking transaction request).

In one or more embodiments of the present disclosure, the tellerterminal 5 allows a human bank teller 6 to approve user-entered bankingtransactions requests entered at more than one automated bank terminals.A second banking transaction request from a second banking customer canbe received at a second automated bank terminal, wherein the secondbanking transaction request is defined by a second plurality oftransaction details. The second automated bank terminal can direct thesecond banking transaction request over the secured internal banknetwork 12 to the tablet computer 5 of the human teller. The tabletcomputer can receive a second approval input corresponding to approvalof the second banking transaction request, the second approval inputentered by the human teller.

The approval input can be communicated back to the ILT 3 from the tellercomputing device. With reference again to FIG. 1, this communication isreferenced at 22, 20. With reference again to FIG. 3, this communicationis referenced at 322, 320 or at 324.

The exemplary ILT 3 does not send the banking transaction request 2 tothe human bank teller when no approval is needed. By way of example andnot limitation, if the banking transaction request 2 is a depositincluding cash and/or a check the ILT 3 does not send the bankingtransaction request 2 to the human bank teller. Other examples ofbanking transaction requests that may not require approval include awithdrawal under a predetermined limit, a withdrawal under apredetermined limit in which the user request a particular combinationof bills, or a payment of a bill. Such requests can be designated as anoff-us transaction by the ILT 3 and directed to the partner switch 11upon entry. Further, the ILT 3 can execute such a banking transactionrequest substantially contemporaneously with directing the bankingtransaction request to the partner switch 11. Substantiallycontemporaneously refers to the executing of the banking transactionrequest and the directing occur at generally the same time or occursequentially. The automated bank terminal need not wait to execute therequested transaction for approval from the bank core if the details ofthe transaction do not require prior approval.

In one or more embodiments of the present disclosure, the tellerapplication server 7 may tag the banking transaction request 2 asapproved by the bank teller 6 with a tag that may include a record ofwhich teller approved the banking transaction request 2, what action theteller approved, and/or what time and date the banking transactionrequest 2 was approved. When the teller approves the banking transactionrequest 2, systems according to one or more embodiments may assign ateller approval code that identifies the teller that approved thebanking transaction. In other configurations, the teller applicationserver 7 stores a name of an approving teller, an approval time anddate, and/or an action taken by the approving teller.

At 608 in FIG. 6, responsive to the banking transaction request beingapproved or prior to transmission outside of the secure internal banknetwork, the banking transaction request is tagged as an off-ustransaction by the ILT 3. The designation or tagging of the bankingtransaction request as off-us is irresponsive to the plurality oftransaction details. For example, the banking transaction request mayinvolve the cashing of a check against a first account maintained by thefirst bank by user with a second account maintained by the first bank,and the banking transaction request can nonetheless be tagged as off-us.This facilitates processing of the banking transaction request withoutsignificant modifications to legacy systems. Current teller platforms donot allow check cashing at a self-service device. The ILT of the presentdisclosure will allow a check deposit through the partner switch 11 tobe seen as a proper credit/debit transaction to the correct accounts.This is done by using the account from the check and the accountassociated with the card from the person wanting to cash the check.

At 610 in FIG. 6, the banking transaction request is directed to anoff-site partner switch. With reference again to FIG. 1, 610 correspondsto the ILT 3 directing the banking transaction request 2 to the partnerswitch 11, outside of the secured internal bank network 12. In FIGS. 1and 2, this communication is referenced at 26. With reference again toFIG. 3, 610 corresponds to the ILT 303 directing the banking transactionrequest over the secured internal bank network 312 to the partner switch311. In FIG. 3, this communication is referenced at 326. The ILT 303 candirect the banking transaction request to the partner switch 311 over anelectronic funds transfer (EFT) network or an automated clearing house(ACH) network, which are outside of the secured internal bank network12, 312. This can be accomplished with a secure VPN to the Partnerswitch, or other communications methods like cellular.

At 612 of FIG. 6, the partner switch determines a path to route thebanking transaction request. In the exemplary embodiment of the presentdisclosure, the banking transaction request is directed back to thesecure internal bank network. With reference again to FIG. 1, thecommunication after the determination at 612 corresponds to thecommunication line referenced at 28. With reference again to FIG. 2, thecommunication after the determination at 612 corresponds to thecommunication lines referenced at 28 and 30, as the communication isdirected through the global bank switch 33. With reference again to FIG.3, the communication after the determination at 612 corresponds to thecommunication line referenced at 328.

Prior to directing the banking transaction request back to the secureinternal bank network, the partner switch 611 converts the bankingtransaction request to the force-post transaction. The force-posttransaction is defined by at least some of the plurality of transactiondetails that defined the banking transaction request, such the amount ofthe transaction, the implicated account(s), the relevant PIN, etc. Thedetails of the force-post transaction include the off-us designationthat was assigned to the banking transaction request prior to itstransmission to the partner switch. The conversion of the bankingtransaction request to a force-post transaction facilitates processingof the banking transaction request without significant modifications tolegacy systems. Force Post messaging allows the partner switch 611 to“approve” the transaction. This format ensures the bank switch willaccept the teller approved transaction. This allows a self servicedevice like the ILT to do teller transactions without having to makeexpensive changes directly to the core and/or the teller platform.

At 614 of FIG. 6, the first bank receives the off-us, force-post bankingtransaction from the partner switch. As shown in the Figures of thevarious embodiments, the switch 13 or 113 is configured to receive theoff-us, force-post banking transaction request from the respectivepartner switch 11 or 311 over communication paths 28, 28 and 30, or 328.The force-post transaction is defined by at least some of the pluralityof transaction details that defined the banking transaction request, orall of the plurality of transaction details. As set forth above, theforce-post transaction can also be defined by designation or tagging asan off-us transaction. The partner switch, 11 or 311, can communicateacross networks distinct from the secured internal bank network, suchEFT or ACH networks.

The local bank switch, 13 or 313, can transmit the off-us, force-postbanking transaction request after receipt to the bank core 15 or 315over the secured internal bank network 12 or 312. With reference againto FIGS. 1 and 2, the communication to the bank core 15 corresponds tothe communication line referenced at 32. With reference again to FIG. 3,the communication to the bank core 315 corresponds to the communicationline referenced at 332.

At 616 of FIG. 6, a portion of the off-us, force-post bankingtransaction request is processed in the bank core. The bank core canupdate the primary ledger of the account(s) implicated by the bankingtransaction request and direct a confirmation message to the switch overthe secured internal bank network. The confirmation message correspondsto recordation of the off-us, force-post transaction in the bank core. Aforce-post transaction, generally, does not require an authorization andso the confirmation message is not an authorization of the bankingtransaction request. The confirmation message can be desirable to advisethe user at the ILT that the banking transaction request has beenrecorded in the appropriate account(s).

At 618 of FIG. 6, after at least partially processing the off-us,force-post banking transaction request, the bank core transmits an“approved transaction request” or confirmation message back to the ILT.In some configurations, the confirmation message is directed along thesame path taken by the banking transaction request. With reference againto FIG. 1, the bank core 15 can direct the confirmation message to theswitch 13 as shown by communication line 34, the switch 13 can directthe confirmation message outside of the secured internal bank network 12to the partner switch 11 as shown by communication line 36, and theautomated bank terminal 3 can receive the confirmation message fromoutside of the secured internal bank network 12 as shown bycommunication line 38. With reference again to FIG. 2, the bank core 15can direct the confirmation message to the switch 13 as shown bycommunication line 34, the switch 13 can direct the confirmation messageoutside of the secured internal bank network 12 to the global bankswitch 33 as shown by communication line 40, the global bank switch 33can direct the confirmation message to the partner switch 11 as shown bycommunication line 42, and the automated bank terminal 3 can receive theconfirmation message from outside of the secured internal bank network12 as shown by communication line 38. With reference again to FIG. 3,the bank core 315 can direct the confirmation message to the switch 313as shown by communication line 334, the switch 313 can direct theconfirmation message outside of the secured internal bank network 312 tothe partner switch 311 as shown by communication line 336, and theautomated bank terminal 303 can receive the confirmation message fromoutside of the secured internal bank network 312 as shown bycommunication line 338.

At 620 of FIG. 6, the ILT can execute the banking transaction request.The ILT may mechanically dispense from a cash dispensing portion of theILT an amount of cash. The ILT 3 may be configured to dispense cash fora banking transaction request that includes a request for two differenttypes of currency denominations.

It is noted that more than one bank may share the partner switch 11. Itis also noted that the partner switch 11 may be owned by a third-partythat may not be a single bank. This may be especially useful and costeffective for small banks with few branch offices because the partnerswitch eliminates the complexity of completely updating the software,message protocols, and/or other features of the first bank switch 13 toallow the first bank switch 13 to communicate with the ILT 3, as well asmultiple ILTs. With a partner switch 11, the ILT 3 communicates directlywith the partner switch 11 without the need of having the partner switch11 or the ILT 3 needing to communicate with other legacy devices such asfirst bank switch 13 using legacy message formats, communication formatsand protocols, and using legacy SW. Thus, the partner switch hardwarecan come with a connection to a network provider that will route on-ustransactions back to the first bank core 15 with minimal or, in somecases, zero changes to in-house processing by the first bank.

In one or more embodiments of the present disclosure, the systems 1, 31,301 of FIGS. 1-3 may be utilized to cash a check received at therespective ILT 3 or 303. With specific reference to FIG. 2, an exemplarybanking transaction request for cash can be based on a presented checkassociated with a banking account maintained at the first bank 18 withpayment directed to a person with a second account maintained at thesecond bank 19. The ILT 3 or the teller application server 7 cangenerate an authentication request message to request authentication ofthe person desiring to cash the check. The teller application server 7sends the authentication request message to the switch 13 of the securedinternal bank network 12. The switch 13 next sends the authenticationrequest message to a global bank switch 33 that is external to the firstbank 18 and a second bank 19. Next, the global bank switch 33 sends theauthentication message to the second bank 19. The switch 13 of the firstbank 18 receives an authentication response message that originated atthe second bank 19 and is a response to the authentication requestmessage. The authentication response message travels from the switch 13to the ILT 3. Responsive to the authentication response message, the ILT3 executes the request for cash by dispensing cash in an amountauthorized on the presented check.

In one or more embodiments of the present disclosure, checks may beimaged by the ILT. Checks, deposits and the like may also be imaged whenused to receive funds, deposit funds, or perform authentications. At thetime of imaging, Magnetic Ink Character Recognition (MICR) lines on thecheck may be read by MICR strip readers and routing numbers may bedetermined from the check and/or captured image(s).

It can be desirable to verify an identity of the user. For example, thefirst bank, via the ILT and/or teller application server, can firstattempt to verify an identity of the user with the records held by thefirst bank. One exemplary approach to verifying the user is by comparinga photograph of the user on a state-issued identification with a currentimage of the user. A camera located near the ILT can capture a firstpicture of the user. The ILT can then acquire a second picture of theuser from a controlled source. For example, the controlled source may bea government-issued identification. The ILT may then verify the user bydetermining if the user is the person in the picture of thegovernment-issued identification. Of course, other verifications caninclude verifying a signature of the user.

FIG. 7 illustrates an exemplary method 700 of authenticating a personcashing a check at a bank using a partner switch. At 702, an ILT of afirst bank receives a request to cash a check. In this illustrative andnon-limiting example, the check is drawn on an account maintained by thefirst bank and the user does not maintain an account at the first bank.At 704, in response to the request, an authentication message isgenerated. At 706, the authentication message is sent to the partnerswitch. At 708, the partner switch then directs the authenticationmessage to a second bank, the bank that maintains an account associatedwith the user.

With reference again to FIG. 1, communication line 26 corresponds to 706and communication line 44 corresponds to 708. With reference again toFIG. 2, communication line 26 corresponds to 706. Communication lines 28and 46 correspond to 708, as the global bank switch 33 can direct theauthentication message to the second bank 19. With reference again toFIG. 3, communication line 326 corresponds to 706 and communication line344 corresponds to 708.

The second bank can respond to the authentication message with anauthentication response message. At 710, the authentication responsemessage is received at a core of the first bank. With reference again toFIG. 1, communication lines 48, 28, and 32 correspond to 710. Withreference again to FIG. 2, communication lines 50, 30, and 32 correspondto 710. With reference again to FIG. 3, communication lines 348, 328,and 332 correspond to 710.

After the core performs any necessary operations related to the message,the authentication response message is sent to the ILT at 712. Withreference again to FIG. 1, communication lines 34, 36, and 38 correspondto 712. With reference again to FIG. 2, communication lines 34, 40, 42,and 38 correspond to 712. With reference again to FIG. 3, communicationlines 334, 336, and 338 correspond to 712. Responsive to theauthentication response message, the banking transaction request ofcashing a check is executed by the ILT at 714, by dispensing cash in anamount authorized on the presented check.

FIG. 8 illustrates an example method 800 of processing a check cashingrequest by verifying the presenter of a check at one of two banks. At802, a check is presented at an ILT of a first bank by a user. In thisillustrative and non-limiting example, the user has an account at asecond bank but not at the first bank. The check is drawn on an accountmaintained by the first bank. A teller can generate a check cashingrequest with an approval tag indicating the check cashing request isteller approved at 804.

At 806, an attempt is made to verify the identity of the user within thefirst bank. This may be done by capturing a first picture of the userand comparing it to a second picture of the user that is recovered froma controlled source. The controlled source may be a government issuedidentification. When the user has not been verified by the first bank, averification request is sent to the second bank at 808 to verify theidentity of the user. A verification response is received by the firstbank from the second bank at 810. When the user has been verified by oneof the first and second banks, the ILT sends the check cashing requestwith the approval tag as an off-us request to the partner switch at 812.The check cashing request is received at the core of the first bank fromthe partner switch at 814. The core at least partially processes thecheck cashing request at 816, to create a core-processedcashing-request. The core-processed cashing-request is returned to thepartner switch at 818. The core-processed cashing-request is returned tothe ILT of the first bank at 820. The core-processed cashing-request isprocessed to completion by the ILT of the first bank by presenting fundsto the user 822.

FIG. 9 is an example method 900 of processing a banking transaction thatrequires actions of two different banks to execute the transaction. At902, an ILT of a first bank receives a banking transaction request. Inthis illustrative and non-limiting example, the check is presented by auser that has an account at a second bank but not at the first bank. Ateller tags the banking transaction request with an approval tag at 904,indicating that the banking transaction request is teller-approved.

An attempt is made to verify an identity of the user within the firstbank at 906. When the user has not been verified by the first bank, thecore of the first bank sends a verification request to the second bankat 908, to verify the identity of the user. A verification response isreceived from the second bank at 910. When the user has been verified,the first transaction request with the approval tag is sent as an off-usrequest, at 912, from the partner switch to the first bank. Prior to912, the banking transaction request was sent to the partner switch fromthe ILT.

The banking transaction request is received by the first bank from thepartner switch and at least partially processed at 914 to create anoff-us second banking transaction request. The off-us second bankingtransaction request is transmitted from the first bank to the partnerswitch at 916. The second banking transaction request is sent, at 918,to the second bank and, at least partially, processed at the secondbank. The second banking transaction request is processed by accessingan account of the user to produce a receipt message at 920. The receiptmessage is sent from the second bank to the partner switch at 922. Thereceipt message is sent from the partner switch to the first bank at924. The receipt message is processed, at 924, to close out the bankingtransaction.

FIG. 10 illustrates a method of processing an ILT request at a partnerswitch. In this illustrative and non-limiting example, the method 1000begins by tagging the ILT request as teller approved at a first bank at1002, to create a tagged ILT request. The tagged ILT request is sent asan off-us request, at 1004, to a partner switch 11 external to the bank18. The first bank receives the tagged ILT request from the partnerswitch at 1006. In one or more embodiments of the present disclosure,the tagged ILT request is received in a condition to process tocompletion at the first bank without requiring action by a second bank.In other embodiments, the ILT processes the request to completion.

FIG. 11 illustrates an exemplary computing device which may be includedin systems and methods described herein. The example computing devicemay be a computer 1100 that includes a processor 1102, a memory 1104,and input/output ports 1110 operably connected by a bus 1108. In oneexample, the computer 1100 may include a tag logic 1130 configured toallow a teller to tag (e.g., flag) a banking transaction request thatthe teller has approved. In different examples, tag logic 1130 may beimplemented in hardware, software, firmware, and/or combinationsthereof. Thus, the tag logic 1130 may provide means (e.g., hardware,software, firmware) for allowing a bank teller to tag transactions forapproval and for a partner switch, as discussed above, to recognizesthose tagged transactions and re-route them back into the bank thattagged those messages. While the tag logic 1130 is illustrated as ahardware component attached to bus 1108, it is to be appreciated that inone example, the tag logic 1130 could be implemented in the processor1102.

Generally describing an example configuration of the computer 1100, theprocessor 1102 may be a variety of various processors including dualmicroprocessor and other multi-processor architectures. The memory 1104can store a process 1114 and/or the data 1116, for example. The memory1104 may include volatile memory and/or non-volatile memory. Thenon-volatile memory may include, for example, ROM, programmable readonly memory (PROM), EPROM. The volatile memory may include, for example,RAM, synchronous random access memory (SRAM), dynamic random accessmemory (DRAM), synchronous dynamic random access memory (SDRAM), doubledata rate synchronous dynamic random access memory (DDR SDRAM), directRambus random access memory (DRRAM) and the like.

A disk 1106 may be operably connected to the computer 1100 via, forexample, an input/output interface (e.g., card, device) 1118 and theinput/output port 1110. The disk 1106 may be, for example, a magneticdisk drive, a solid state disk drive, a floppy disk drive, a tape drive,a Zip drive, a flash memory card, and/or a memory stick. Furthermore,the disk 1106 may be a compact disc-ROM (CD-ROM), a compact disk (CD)recordable drive (CD-R drive), a CD rewriteable drive (CD-RW drive),and/or a digital video ROM drive (DVD ROM). The disk 1106 and/or thememory 1104 can store an operating system that controls and allocatesresources of the computer 1100.

The bus 1108 may be a single internal bus interconnect architectureand/or other bus or mesh architectures. While a single bus isillustrated, it is to be appreciated that the computer 1100 maycommunicate with various devices, logics, and peripherals using otherbusses (e.g., PCIE, SATA, Infiniband, 1384, USB, Ethernet). The bus 1108can be types including, for example, a memory bus, a memory controller,a peripheral bus, an external bus, a crossbar switch, and/or a localbus.

The computer 1100 may interact with input/output devices via theinput/output interfaces 1118 and the input/output ports 1110.Input/output devices may be, for example, a keyboard, a microphone, apointing and selection device, cameras, video cards, displays, the disk1106, the network devices 1120, and so on. The input/output ports 1110may include, for example, serial ports, parallel ports, universal-serialbus (USB) ports and the like.

The computer 1100 can operate in a network environment and thus may beconnected to the network devices 1120 via the input/output interfaces1118, and/or the input/output ports 1110. Through the network devices1120, the computer 1100 may interact with a network. Through thenetwork, the computer 1100 may be logically connected to remotecomputers. Networks with which the computer 1100 may interact include,but are not limited to, a local area network (LAN), a wide area network(WAN), and other networks. The networks may be wired and/or wirelessnetworks.

Embodiments of the present disclosure can include apparatuses, methods,and computer program products. Accordingly, embodiments may take theform of an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.), or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “module” or “system.” Furthermore,embodiments may take the form of a computer program product embodied inany tangible medium of expression having computer-usable program codeembodied in the medium. Any combination of one or more computer-usableor computer-readable media may be utilized. For example, acomputer-readable medium may include one or more of a portable computerdiskette, a hard disk, a random access memory (RAM) device, a read-onlymemory (ROM) device, an erasable programmable read only memory (EPROM)device, a portable compact disc read-only memory (CD ROM), an opticalstorage device, and a magnetic storage device. Computer program code forcarrying out operations may be written in any combination of one or moreprogramming languages.

“Processor” and “Logic”, as used herein, includes but is not limited tohardware, firmware, software and/or combinations of each to perform afunction(s) or an action(s), and/or to cause a function or action fromanother logic, method, and/or system. For example, based on a desiredapplication or need, logic and/or processor may include asoftware-controlled microprocessor, discrete logic, an applicationspecific integrated circuit (ASIC), a programmed logic device, a memorydevice containing instructions or the like. Logic and/or processor mayinclude one or more gates, combinations of gates, or other circuitcomponents. Logic and/or a processor may also be fully embodied assoftware. Where multiple logics and/or processors are described, it maybe possible to incorporate the multiple logics and/or processors intoone physical logic (or processors). Similarly, where a single logicand/or processor is described, it may be possible to distribute thatsingle logic and/or processor between multiple physical logics and/orprocessors.

While the present disclosure has been set forth with reference toexemplary embodiments, it will be understood by those skilled in the artthat various changes may be made and equivalents may be substituted forelements thereof without departing from the scope of the presentdisclosure. In addition, many modifications may be made to adapt aparticular situation or material to the teachings of the presentdisclosure without departing from the essential scope thereof.Therefore, it is intended that the present disclosure not be limited tothe particular embodiments disclosed, but that the present disclosurewill include all embodiments falling within the scope of the appendedclaims. The right to claim elements and/or sub-combinations that aredisclosed herein is hereby unconditionally reserved. The use of the word“can” in this document is not an assertion that the subject preceding orfollowing the word is unimportant or unnecessary or “not critical”relative to anything else described in this document. The word “can” isused herein in a positive and affirming sense and no other motive shouldbe presumed. More than one “invention” may be disclosed in the presentdisclosure; an “invention” is defined strictly by the content of apatent claim and not by what is written in a detailed description of anembodiment of an invention.

What is claimed is:
 1. A method comprising: arranging an automated bankterminal and a bank core both of a first bank in communication with oneanother over a secured internal bank network; receiving, at theautomated bank terminal, a banking transaction request from a userhaving an account with the first bank wherein the banking transactionrequest is thus an on-us transaction and is defined by a plurality oftransaction details; designating, with the automated bank terminal, thebanking transaction request as an off-us transaction irresponsive to thebanking transaction actually being an on-us transaction; directing, withthe automated bank terminal, the banking transaction request to apartner switch outside of the secured internal bank network in responseto said receiving the banking transaction request and after saiddesignating; converting, with the partner switch, the bankingtransaction request received from the automated bank terminal anddesignated as off-us to a force-post transaction; and directing, withthe partner switch, the banking transaction request back into thesecured internal bank network after said converting.
 2. The method ofclaim 1 further comprising: arranging a switch and the bank core incommunication with one another over the secured internal bank network;and receiving, with the switch, the banking transaction request in theform of the force-post transaction defined by at least some of theplurality of transaction details and originating at the partner switchafter said directing the banking transaction to the partner switch. 3.The method of claim 2 wherein said receiving the banking transactionrequest in the form of the force-post transaction is further defined as:receiving, with the switch, the banking transaction request in the formof the force-post transaction over one of an electronic funds transfer(EFT) network and an automated clearing house (ACH) network distinctfrom the secured internal bank network.
 4. The method of claim 1 whereinsaid directing the banking transaction request to the partner switch isfurther defined as: directing, with the automated bank terminal, thebanking transaction request to the partner switch over one of anelectronic funds transfer (EFT) network and an automated clearing house(ACH) network outside of the secured internal bank network.
 5. Themethod of claim 1 wherein the plurality of transaction details includeat least one of the group including a transaction amount, one or morebank accounts, a personal identification number, a current image ofuser, an image of a driver's license, and a bank routing number.
 6. Themethod of claim 1 further comprising: directing, with the automated bankterminal, the banking transaction request over the secured internal banknetwork to a teller computing device before said directing the bankingtransaction request to the partner switch; and receiving, at the tellercomputing device, an approval input corresponding to approval of thebanking transaction request before said directing the bankingtransaction request to the partner switch.
 7. The method of claim 6wherein said directing the banking transaction request to the tellercomputing device is further defined as: directing, with the automatedbank terminal, the banking transaction request over a secured internalbank network to a teller computing device including a tablet computer.8. The method of claim 7 further comprising: receiving, at a secondautomated bank terminal, a second banking transaction request from asecond user wherein the second banking transaction request is defined bya second plurality of transaction details; directing, with the secondautomated bank terminal, the second banking transaction request over thesecured internal bank network to the tablet computer; receiving, at thetablet computer, a second approval input corresponding to approval ofthe second banking transaction request; and directing, with the secondautomated bank terminal, the second banking transaction request to thepartner switch.
 9. The method of claim 6 further comprising: accessing,with the teller computing device, the bank core over the securedinternal bank network prior to said receiving the approval input. 10.The method of claim 1 further comprising: executing, with the automatedbank terminal, the banking transaction request substantiallycontemporaneously with said directing the banking transaction request toa partner switch outside of the secured internal bank network.