Banking system controlled responsive to data bearing records

ABSTRACT

An apparatus that operates to cause financial transfers responsive to data read from data bearing records, includes a processor that is in operative connection with a card reader and a touch screen display. The processor can cause the card reader to read card data from a user card, and can determine whether the read card data corresponds to an authorized financial account. Without the touch screen display surface visibly providing indicia that corresponds to a desired character, the user can still input the character through user contact with the touch screen display surface. The processor can resolve the desired character from the user contact.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims benefit pursuant to 35 U.S.C. §119(e) ofProvisional Application 61/455,827 filed Oct. 27, 2010.

This application is a continuation-in-part of application Ser. No.13/134,654 filed Jun. 13, 2011 which claims benefit pursuant to 35U.S.C. §119(e) of Provisional Application 61/354,778 filed Jun. 15,2010.

Application Ser. No. 13/134,654 is a continuation-in-part of applicationSer. No. 12/380,408 filed Feb. 25, 2009 which claims benefit pursuant to35 U.S.C. §119(e) of Provisional Application 61/067,660 filed Feb. 29,2008.

Application Ser. No. 12/380,408 is a continuation-in-part of applicationSer. No. 12/008,348 filed Jan. 10, 2008 which claims benefit pursuant to35 U.S.C. §119(e) of Provisional Applications 60/994,742 filed Sep. 20,2007 and 60/994,680 filed Sep. 20, 2007.

This disclosure of each of these applications is incorporated herein byreference in its entirety.

TECHNICAL FIELD

This invention relates to automated banking machines that operateresponsive to data read from data bearing records and which may beclassified in U.S. Class 235, Subclass 379.

BACKGROUND ART

Automated banking machines that operate responsive to data read fromdata bearing records may include a card reader that operates to readdata from a bearer record such as a user card.

Automated banking machines may operate to cause the data read from thecard to be compared with other computer stored data related to thebearer or their financial accounts. The machine operates in response tothe comparison determining that the bearer record corresponds to anauthorized user or account, to carry out at least one transaction whichmay be operative to transfer value to or from at least one account. Arecord of the transaction is often printed through operation of aprinter of the machine and provided to the user. Automated bankingmachines may be used to carry out transactions such as dispensing cash,the making of deposits, the transfer of funds between accounts andaccount balance inquiries. The types of banking transactions that may becarried out are determined by the capabilities of the particular bankingmachine and system, as well as the programming of the institutionoperating the machine. Other types of automated banking machines may beoperated by merchants to carry out commercial transactions. Thesetransactions may include, for example, the acceptance of deposit bags,the receipt of checks or other financial instruments, the dispensing ofrolled coin, or other transactions required by merchants. Still othertypes of automated banking machines may be used by service providers ina transaction environment such as at a bank to carry out financialtransactions. Such transactions may include for example, the countingand storage of currency notes or other financial instrument sheets, andother types of transactions. For purposes of this disclosure anautomated banking machine, automated transaction machine or an automatedteller machine (ATM) shall be deemed to include any machine that may beused to automatically carry out transactions involving transfers ofvalue.

Automated banking machines may benefit from improvements.

OBJECTS OF EXEMPLARY EMBODIMENTS

It is an object of some exemplary embodiments to provide an automatedbanking machine.

It is a further object of some exemplary embodiments to provide anautomated banking machine which provides enhanced security.

It is a further object of some exemplary embodiments to provide anautomated banking machine that facilitates user operation.

It is a further object of some exemplary embodiments to provide anautomated banking machine that has improved weather resistance.

It is a further object of some exemplary embodiments to provide anautomated banking machine that provides a concealment device adapted tocover an input keypad.

It is a further object of some exemplary embodiments to provide anautomated banking machine that provides users with an indication of userinputs being received in an encrypted manner.

It is a further object in some exemplary embodiments to provide anautomated banking machine that includes features for reducing thetransmission of germs to users of the machine.

It is a further object of some exemplary embodiments to provide anautomated banking machine that operates in conjunction with currencybills that include tracking devices.

It is a further object of some exemplary embodiments to provide anautomated banking machine that is configured for use by visuallyimpaired users.

Further objects of exemplary embodiments will be made apparent in thefollowing Detailed Description of Exemplary Embodiments and the appendedclaims.

Certain of the foregoing objects are accomplished in exemplaryembodiments by an automated banking machine which comprises an automatedteller machine. The machine includes a user interface. The userinterface includes input devices for receiving identifying inputs thatidentify user accounts, such as a card reader that is operative to readuser cards. The input devices also receive inputs from users that causethe machine to carry out transaction functions. The user interfacefurther includes one or more output devices that output indicia such asinstructions for a user in operating the machine.

In some exemplary embodiments, a user input device such as a keypad, maybe concealed from unauthorized viewing by a concealment device. Theconcealment device may include a cover adapted to conceal a keypad andprevent viewing of a user's input, such as a PIN, by another whileenabling a person having a point of view of a machine user to view thekeypad and their digits providing inputs. Other embodiments may includefeatures that minimize the risk of the transmission of germs betweenusers of the banking machine.

Alternative exemplary embodiments include a keypad device that includesencrypting capabilities within the keypad device. The keypad device isselectively operative to encrypt and not encrypt user inputs responsiveto signals received from at least one processor. In some exemplaryembodiments the machine includes a visual indicator adjacent the keypad.The visual indicator is operative responsive to the at least oneprocessor to indicate whether the inputs being provided by a user arebeing encrypted by the keypad. This visual indication provides the userwith assurance that their inputs are being securely received by thebanking machine.

Alternative exemplary embodiments include features which assure that thedisplay on the automated banking machine and/or at least one processorcausing outputs to users through the display are authorized componentsthat are authorized to operate in the automated banking machine. Thisreduces the risk that unauthorized components are installed byunauthorized persons to capture sensitive customer data. Alternativeexemplary embodiments provide a secure touch screen display module thatprovides secure user inputs.

Alternative exemplary embodiments include an automated banking machinethat is configured to recognize inputs on a touch screen display withoutthe need to display the character inputted. In particular, datacorresponding to a character is received by a processor associated withthe automated banking machine in response to a contact with at least onearea of an input surface of the touch screen display. The area ofcontact does not include any visible output indicia that corresponds tothe character, before the area is contacted.

Further aspects of the exemplary embodiments will be made apparent inthe following detailed description. It should be understood that thefeatures described are exemplary and in other embodiments otherapproaches may be used which nonetheless employ the features as claimedherein.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a front plan view of a fascia of an exemplary automatedbanking machine.

FIG. 2 is a schematic side view of components within a housing of thebanking machine shown in FIG. 1.

FIG. 3 is a further schematic side view of components within the housingof the banking machine shown in FIG. 1.

FIG. 4 is a view of a sheet stacking mechanism which may be employed inan exemplary embodiment of the banking machine.

FIG. 5 is a further view of the exemplary sheet stacking mechanism whichmay be used to hold multiple types of sheets.

FIG. 6 is a rear view of the housing of the automated banking machine ofthe exemplary embodiment.

FIG. 7 is a schematic view of an exemplary embodiment of a mechanism forseparating sheets from a stack of financial instrument sheets placedwithin the automated banking machine.

FIG. 8 is a front plan view of an exemplary picking member incombination with a plurality of non-contacting stripper rolls and acontacting stripper roll used for separating individual sheets from thestack.

FIG. 9 is a schematic view showing separation of a first sheet from asheet stack through operation of the mechanism shown in FIG. 7.

FIG. 10 is a view showing a cross-sectional wave configuration impartedto a sheet through action of the picking member and the non-contactingstripper rolls.

FIG. 11 is a schematic view showing a cash acceptor mechanism moved to aservicing position and exposing the cash accepting opening in an upperportion of the chest of the automated banking machine.

FIG. 12 is a schematic view of the cash acceptor mechanism withdrawn forservicing similar to FIG. 11 and with a first embodiment of an accessdoor in an open position for purposes of accessing unacceptable sheetswhich have been identified through operation of the cash acceptormechanism.

FIG. 13 is a view of the automated banking machine similar to FIG. 12but with an alternative access mechanism for accessing unacceptablesheets.

FIG. 14 is yet another view of the automated banking machine similar toFIG. 12 showing a further alternative mechanism for accessingunacceptable sheets.

FIG. 15 is a schematic view of the cash acceptor mechanism with a firstform of service panel shown in an open position for purposes ofservicing.

FIG. 16 is a view of the cash acceptor mechanism similar to FIG. 15 butwith an alternative form of service panels shown in an accessibleposition.

FIG. 17 is a schematic cross-sectional view of a chute to and from whichstacks of sheets are received and removed through the fascia of themachine, and including devices for capturing and draining water whichmay enter the chute.

FIG. 18 is an external isometric view of the cash acceptor mechanismrepresented in FIG. 17 and including a schematic representation of thedrain used for passing water collected in the chute to the outside ofthe machine.

FIG. 19 is a schematic view representative of a sealing system used inan exemplary embodiment to minimize the risk of contaminants enteringthe machine through the opening in the machine fascia through which thechute extends in an operative position of the cash acceptor mechanism.

FIG. 20 is a transparent side view of an alternative form of a mechanismfor accepting and storing financial instrument sheets that have beenprocessed by the cash acceptor mechanism.

FIG. 21 is an isometric view of the financial instrument holdingcontainer shown in FIG. 20, moved outside the machine.

FIG. 22 is a schematic view of a light emitting device which is operatedto facilitate use of the machine by users.

FIG. 23 is an enlarged view of the light emitting device shown in FIG.22.

FIG. 24 is a schematic view of the light emitting diodes included in thelight emitting device.

FIG. 25 is a cross-sectional view of the flexible web which includes thediodes in the light emitting device.

FIG. 26 is an isometric view of the fascia shown in FIG. 1 andparticularly the mirrors thereon which facilitate a user viewing thearea adjacent to them when operating the machine.

FIG. 27 is a schematic top view indicating the area viewable by a useroperating the machine.

FIG. 28 is an isometric view of a fascia similar to that shown in FIG.26 showing a concealment device.

FIG. 29 is an isometric view of a concealment device shown as covering akeypad.

FIG. 30 is a cross-sectional view of a concealment device taken alongthe line 30-30 of FIG. 29.

FIG. 31 is a partial isometric view of a fascia showing a concealmentdevice in an uncovered position.

FIG. 32 is an isometric view of an alternative concealment device forpreventing viewing of inputs to an automated banking machine customerkeypad by unauthorized persons.

FIG. 33 is a top view of the embodiment of the concealment device shownin FIG. 32.

FIG. 34 is an isometric view of a portion of an automated bankingmachine user interface which includes an alternative device forobscuring the viewing of inputs to a customer keypad by unauthorizedpersons, the concealment device being shown in an open position.

FIG. 35 is an isometric view similar to FIG. 34 but with the panelmembers of the alternative concealment device shown in a closedposition.

FIG. 36 is a top view of the automated banking machine fascia portionshown in FIG. 35 with the panels shown in a closed position.

FIG. 37 is an isometric view of a portion of a banking machine fasciaand an associated keypad cover.

FIG. 38 is an isometric view similar to FIG. 37 but with the keypadcover shown in fixed engagement with the fascia.

FIG. 39 is an isometric view similar to FIG. 32 but including analternative form of a keypad cover.

FIG. 40 is a schematic view of an alternative embodiment similar to thatshown in FIG. 34 but which includes panels that are movable by movementmechanisms so that the panels operate to restrict viewing of inputsthrough the keypad at appropriate times during transactions.

FIG. 41 is an isometric view of an alternative automated banking machineuser interface with an alternative concealment device comprised offlexible material positioned for installation on the user interface.

FIG. 42 is an isometric view similar to FIG. 41 with the alternativeconcealment device installed.

FIG. 43 is a top plan view of a portion of an automated banking machineuser interface including a flexible keypad cover that is collapsibleshown in an operative position in which digit access to all of the keysof the keypad are provided.

FIG. 44 is a top plan view of the keypad cover similar to FIG. 43 butwith the keypad cover in a collapsed position.

FIG. 45 is a schematic view of a keypad cover that is collapsibleincluding deformable members included therein.

FIG. 46 is a schematic view of a keypad cover that is collapsibleincluding fluid cavities therein.

FIG. 47 is a schematic view of a keypad included on a banking machinewhich includes encryption capabilities and a visual indicator on thebanking machine interface which is operative to indicate when userinputs are being encrypted.

FIG. 48 is a front plan view of an automated banking machine includingexemplary user manual contact points.

FIG. 49 is a view similar to FIG. 48 but including schematic views ofareas contacted by ultraviolet radiation.

FIG. 50 is a view showing an exemplary device for emitting ultravioletlight.

FIG. 51 is an isometric view demonstrating use of the device shown inFIG. 50 to contact manual contact points of an automated banking machinewith ultraviolet radiation.

FIG. 52 is a schematic view showing embodiments of an exemplary ATMincluding a secure touch screen display module.

FIG. 53 is a schematic view similar to FIG. 52 but including a secureinput device for providing secure communication between the terminalprocessor and the touch screen display module.

FIG. 54 is a schematic view showing another exemplary embodiment of anATM.

FIG. 55 is an isometric view of the exemplary embodiment of FIG. 54.

FIG. 56 is an enlarged isometric view of the portion of the ATM asindicated in FIG. 55.

FIG. 57 is a schematic view showing another exemplary embodiment of anATM.

FIG. 58 is an isometric view of the exemplary embodiment of FIG. 57.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1, there is showntherein a front plan view of an automated banking machine which in theexemplary embodiment is an automated teller machine 10. Machine 10 is athrough-the-wall type machine which includes a fascia 12. Fascia 12 isaccessible to users of the machine who are positioned externally of thewall 14. In some embodiments wall 14 may be an exterior building walland machine 10 may be one that is configured for use in a walk-up ordrive-up environment. In other embodiments the machine may be used in anindoor environment. Of course this configuration is exemplary and inother embodiments, other types of banking machine configurations may beused.

The exemplary automated banking machine includes a user interfacegenerally indicated 15. The user interface of the exemplary embodimentincludes input devices for receiving inputs from users. These inputdevices include a card reader 16, a keypad 18, function keys 20 and animaging device such as a camera 22. In the exemplary embodiment theinput devices may be used for providing identifying inputs such asindicia read from cards, alphanumerical data, numerical data and/orbiometric data which may be used to identify a particular user of themachine and/or their accounts. In exemplary embodiments the card readeris operative to read data from or on user cards, that corresponds to atleast one of a user and/or a user's financial account or accounts. Thecard data may be utilized for purposes of comparison with data stored inthe system in which the machine is connected to determine if the user isan authorized user of the machine, and to enable transactions thatinclude the transfer and/or allocation of monetary value. Exemplary cardreaders may include magnetic stripe readers, smart card readers, radiofrequency identification (RFID) readers, near field communication (NFC)readers, inductance readers or other types of contact or contactlessreaders. In addition, the exemplary input devices are also operative toreceive transaction inputs which cause the machine to carry out selectedtransaction functions. It should be understood that these input devicesare exemplary and in other embodiments other types of input devices maybe used.

The exemplary user interface 15 further includes output devices. Theoutput devices of the exemplary embodiment include a display 24, aspeaker 26 and a headphone jack 28. The output devices of the exemplaryembodiment are operative to output indicia either visual, audible orboth, which are usable to operate the machine. For purposes of thisdisclosure the display shall be deemed to include an output device suchas a CRT or LCD as well as the associated circuitry which producesoutputs from the display. Of course the output devices shown in userinterface 15 are exemplary and in other embodiments other or additionaloutput devices may be used.

The exemplary machine 10 further includes other transaction functiondevices. These transaction function devices include a receipt printer 30which is operative to provide receipts to users of the machine. As shownin more detail in the interior view of the machine shown in FIG. 2, thereceipt printer includes a paper supply 32 which supplies paper on whichreceipts are printed by a printer mechanism 34. Printed receipts arethen transported to the receipt opening in the fascia 12 by a transport36. In exemplary embodiments the receipt printer used may be of the typeshown in U.S. Pat. No. 5,850,075, the disclosure of which isincorporated herein by reference. Of course in other embodiments othertypes of receipt printers may be used.

The exemplary machine 10 user interface includes on the fascia as shownin FIG. 1, a cash dispensing opening 38 and a cash accepting opening 40.Each of these openings is in operative connection with correspondingtransaction function devices as later discussed, and each has anassociated gate mechanism which operates to block access through theopening except at appropriate times during transactions by authorizedusers. In the exemplary embodiment the cash dispensing opening is showncontrolled by a gate 42 and the cash accepting opening is controlled bya gate 44. It should be understood that the fascia and devicesassociated with machine 10 are exemplary and in other embodiments otheror different fascia configurations and devices may be used.

In the exemplary embodiment the user interface of the machine includes aplurality of multicolor light emitting devices 17, 31, 41, 43 and 45.Each of the light emitting devices is positioned at a location adjacentto the location on the user interface which is associated with aparticular transaction function device. For example, light emittingdevice 17 is positioned adjacent to the opening to card reader 16.Likewise, light emitting device 31 is positioned adjacent to the slotfor delivery of receipts. Likewise, light emitting device 41 isassociated with cash-accepting opening 40, and light emitting device 43is associated with cash-dispensing opening 38. As later explained, inthis exemplary embodiment the multicolor light emitting devices areselectively operated to output light of a particular color responsive toconditions of the associated transaction function device. Such featuresmay be used to guide a user in operation of the machine, provideindications concerning the status of devices, alert a user to particularconditions, or provide improved aesthetics for the machine.

As shown in FIGS. 2, 3 and 6, machine 10 includes a housing 46 whichextends generally on an interior side of wall 14. Housing 46 includes achest portion 48. In the exemplary embodiment chest portion 48 is agenerally secure chest which has a safe-like access door 50. Access tothe interior of the chest portion is limited to authorized personnelthrough a suitable locking mechanism schematically indicated 52 (seeFIG. 3). In the exemplary embodiment the chest is generally L-shaped incross section.

Housing 46 further includes an upper portion 54. Upper housing portion54 which is in connection with the fascia, is in supporting connectionwith the chest portion 48. In the exemplary embodiment upper housingportion 54 has in association therewith, access doors 56 and 58. Accessto the upper housing portion is controlled by one or more lockingmechanisms in operative connection with access doors 56 and 58 asrepresented by key locks 60 and 62. In the exemplary embodiment thesecure chest portion 48 is used to house financial instrument sheetssuch as currency notes, checks and other valuable sheets. The upperhousing portion 54 is generally used to house components of the machinethat do not hold on an extended basis notes or other financialinstrument documents which can be redeemed for value. For purposes ofthis disclosure a cash dispenser shall be considered to include a devicethat operates to deliver cash stored inside the machine to a locationaccessible by a machine user outside of the machine. Of course it shouldbe understood that the construction of machine 10 is exemplary and inother embodiments other approaches may be used.

As schematically shown in FIG. 2, machine 10 includes at least onecontroller schematically indicated 64. In the exemplary embodimentcontroller 64 includes at least one processor and is in operativeconnection with at least one data store schematically indicated 66. Acontroller or processor may be alternatively referred to herein as acomputer. In the exemplary embodiment the data store is operative tohold data representative of instructions such as computer programs,configuration parameters, data about transactions conducted and otherinformation that may be usable in the operation of the machine 10. Insome embodiments the at least one processor of the machine may belocated within the housing of the machine. In other embodiments the atleast one processor may be remotely located from the housing of themachine. In still other example embodiments, the at least one processormay operate the machine via a virtualized environment in one or moreremote servers, and the devices of the machine operate in response tothe virtual machine operated in the at least one server. Of course theseapproaches are exemplary, and in other embodiments other approaches maybe used.

Controller 64 is in operative connection with numerous transactionfunction devices within the machine, and is operative to control theoperation thereof in accordance with its programming. Controller 64 isshown schematically in operative connection with devices 68, 70 and 72.It should be understood that this representation is schematic only andis intended merely to represent numerous components within the machinewhich are in operative connection with the controller and the at leastone processor included therein. For example the transaction functiondevices may include moving devices such as motors, solenoids and otherdevices that are operative to impart motion to components. Likewisetransaction function devices may include sensors such as radiationsensors, proximity sensors, switches and other types of sensors that areoperative to sense items, users, conditions, properties, characteristicsor components within the machine and to enable a controller to performfunctions in accordance with its programming. Transaction functiondevices include output devices such as sound emitters and light emittingdevices. For example and without limitation, transaction functiondevices may include the card reader, display, keyboard, function keys,printer, cash dispenser, cash acceptor, storage mechanisms and otherdevices previously discussed as well as other devices within the machinewhich are operative in response to the controller.

In the exemplary embodiment the controller is also in operativeconnection with a communications device schematically indicated 74. Thecommunications device is operative to communicate messageselectronically between the machine 10 and other computers in financialtransaction processing systems or other systems or networks. These mayinclude for example communications with systems operated by banks,credit card networks, automated clearinghouses and other entities. InFIG. 2 the communications device 74 in the machine 10 is schematicallyshown as providing communication with a financial institution 76 througha network 78. It should be understood that this communicationconfiguration is exemplary and in other embodiments other communicationarrangements may be used.

As represented in FIGS. 2 and 6, in the operative position of machine 10the housing 46 houses a sheet acceptor mechanism 80 which is alsoreferred to herein as a cash acceptor mechanism. In the exemplaryembodiment the mechanism 80 is operative to accept sheets from a machineuser through the opening 40, to analyze each sheet for at least oneproperty or characteristic, and to route the sheets selectively forstorage within the housing of the machine based on the characteristicsanalyzed. It should be understood that in various embodiments thesesheets may include currency notes, checks or other financial instrumentsheets. For purposes of this disclosure currency notes are alternativelyreferred to as currency bills. It should further be understood that inexemplary embodiments the financial instrument sheets may be sheetscomprised of different types of material such as paper, plastic orcombinations thereof. It should further be understood that referencesherein to a cash acceptor mechanism shall be deemed to encompassmechanisms which handle not only currency notes, but also otherfinancial instrument sheets such as checks, money orders, giftcertificates, vouchers, scrip and/or other items that correspond tovalue.

As represented in FIG. 2, cash acceptor mechanism 80 includes a chute 82which extends through opening 40 in fascia 15 in its operativecondition. As previously discussed the user accessible opening to chute82 is controlled by a movable gate 44. Gate 44 moves responsive to thecontroller 64 and enables authorized users to access the chute atappropriate times during transaction sequences.

In operation of the machine users are enabled to insert a stack offinancial instrument sheets schematically indicated 84, into the chute.The stack 84 may comprise currency notes, checks or other forms offinancial instrument sheets.

In operation of the cash acceptor mechanism sheets are individuallyseparated from the stack by a picker mechanism 86, an exemplaryembodiment of which is later discussed in detail. Each picked sheet istransported individually from the picker mechanism past the validatordevice schematically indicated 88. The validator device 88 of theexemplary embodiment is operative to determine at least onecharacteristic of each sheet. This may include for example adetermination as to whether the sheet is a note or check and if a note,the denomination and whether it is valid. If the document is a check, adetermination may be made as to whether the check is genuine as well asthe indicia associated with the maker of the check and the amountthereof. For example in some exemplary embodiments the validating devicemay be of the type shown in U.S. Pat. No. 5,923,415, the disclosure ofwhich is incorporated herein by reference in its entirety. Alternativelyor additionally a validating device having features disclosed in U.S.Pat. No. 6,554,185 and/or U.S. Pat. No. 7,137,551, the disclosures ofeach of which are incorporated herein by reference in its entirety, maybe used. Of course in other embodiments other types of validatingdevices such as imagers, readers, sensors and combinations thereof maybe used. For example, in some embodiments the sheet accepting device mayinclude a scanner that is operative to image instruments such as checksand provide data which can be stored and transmitted as an electronicreproduction of that check. In such circumstances an electronicreproduction of the check may be transmitted to remote locations so asto facilitate review and validation of the check. Alternatively or inaddition, the electronic representation of the check may serve as asubstitute for the physical paper check which thereafter enables thepaper check to be cancelled and subsequently destroyed. This may be donein the manner described in U.S. patent application Ser. No. 11/370,430filed Mar. 8, 2006 the disclosure of which is incorporated herein byreference in its entirety.

In the exemplary embodiment of the cash acceptor mechanism 80, sheetswhich have been analyzed through operation of the validator device 88are moved through a transport 90 to a routing device 92. The routingdevice is operative responsive to the controller 64 to route sheetsselectively to either an escrow device 94 or to a transport 96. Escrowdevice 94 generally operates to hold sheets in storage on a temporarybasis. Such an escrow device may be of the type shown in U.S. Pat. No.6,371,368, the disclosure of which is incorporated by reference in itsentirety herein. Escrow device 94 may be operative to accept sheets andstore them. Thereafter responsive to operation of the controller 64 theescrow device may deliver those sheets to the routing device 92 whichdirects them along sheet paths in the machine to carry out transactions.Of course it should be understood that the escrow device shown isexemplary and in other embodiments other types of escrow devices may beused.

In the exemplary embodiment transport 96 is used to receive unacceptablesheets which have characteristics that do not satisfy certain parametersset by the machine. These may include for example, notes which have oneor more characteristics which suggest that they are counterfeit. Inother embodiments such sheets may include checks which have propertieswhich suggest that they are reproductions or forged or otherwiseunacceptable. Of course in other embodiments other sheets may be deemedunacceptable. As schematically represented in FIG. 2, sheet acceptormechanism 80 is operated to cause transport 96 to deposit suspect sheetsschematically indicated 98 in a storage area 100. In the exemplaryembodiment the suspect sheets are stored within the cash acceptormechanism and outside of the secure chest so that they may be recoveredby servicing personnel in a manner that is later discussed. Of coursethis approach is exemplary and in other embodiments other approaches maybe used.

In the exemplary embodiment the cash acceptor mechanism 80 is operativeresponsive to signals from the controller 64 to cause financialinstrument sheets that are determined to be valid or otherwiseacceptable, to be directed through a cash accepting opening 102 thatextends in an upper surface 104 of the chest. In the operative positionof the cash acceptor mechanism shown in FIG. 2, the transport in thecash acceptor mechanism is aligned with the cash accepting opening and atransport 108 that extends into the secure chest. As schematicallyrepresented in FIG. 2, in the operative position of the cash acceptormechanism 80 at least one driving member 110 of the transport 106 is inoperative connection with a driven member 112 of the transport 108. Inthe exemplary embodiment this enables the cash acceptor mechanism totransmit movement to sheet handling mechanisms within the secure chestand to assure coordinated movement of processed sheets therein. Furtherin the exemplary embodiment the driving and driven members extend in thecash accepting opening so as to block access therethrough byunauthorized persons as later discussed.

In the exemplary embodiment when the cash acceptor mechanism is movedfrom the operative position shown in FIG. 2 to a servicing position suchas shown in FIGS. 12, 13 and 14, the driving member 110 and the drivenmember 112 disengage. In some exemplary embodiments the movement of thecash acceptor mechanism from the operative position to a servicingposition may include movably mounting the cash acceptor mechanism suchthat the mechanism moves both upward away from the secure chest so as todisengage the driving and driven members as well as outward for purposesof servicing. Of course to return the cash acceptor mechanism to theoperative position, movement thereof is made both inward and downward soas to reengage the driving and driven members. This may be accomplishedby a combination of slides, rollers or other suitable mechanisms. Ofcourse the approach described of providing for engagement between thecash acceptor mechanism and a mechanism for handling sheets within achest portion is exemplary and in other embodiments other approaches maybe used, or the transport within the chest portion may have a separatemotor or other moving device.

As shown in FIG. 2, transport 108 which moves sheets generally in avertical direction through the cash accepting opening is in operativeconnection with a horizontal transport schematically indicated 114. Thehorizontal transport is operative to engage sheets moved into the chestportion and to move them transversely away from the cash acceptingopening. The horizontally extending transport 114 is in operativeconnection with a vertically extending transport 116 which istransversely disposed from the cash accepting opening in the securechest.

Vertical transport 116 is operative to move sheets selectively intoengagement with sheet handling mechanisms 118, 120, 122 and 124. In someexemplary embodiments, sheet handling mechanisms 118, 120, 122 and 124may be sheet stacking mechanisms such as those shown schematically inFIGS. 5 and 6. Alternatively or in addition in other embodiments one ormore of the sheet handling mechanisms may include sheet receiving anddispensing mechanisms which are operative to selectively accept sheetsfor storage as well as to dispense sheets therefrom. Examples of sheetaccepting and stacking mechanisms as well as sheet accepting, stackingand dispensing mechanisms which may be used in some exemplaryembodiments are described in detail in U.S. Pat. Nos. 6,302,393 and6,290,070, the disclosures of each of which are incorporated byreference in its entirety.

As shown schematically in FIG. 4, the exemplary sheet accepting andstacking mechanism 118 is selectively operative to accept a sheet 126moving in the vertical transport 116. Sheet 126 is guided to engage thesheet handling mechanism 118 through movement of a gate member 128. Thegate member moves responsive to the controller 64 to direct the leadingedge of the sheet into a recess 130 of a rotatable member 132. As theleading edge of the sheet 126 enters the recess 130 the rotatable member132 rotates in the direction of Arrow R. This causes the gripper portionbounding the recess 130 to move inwardly capturing the sheet 126therein. The rotatable member 132 rotates until the leading edge of thesheet 126 engages a stop surface 136 at which time the gripper portion134 has moved radially outward such that the sheet disengages from therotatable member 132 and is integrated into a sheet stack 138. Stack 138may be for example a stack of currency notes all of which are of thesame denomination. Of course in other embodiments the stack 138 may be acollection of other types of sheets.

In the exemplary embodiment the stack is maintained in abutting relationwith the rotatable member by a biasing plate 140 which acts against theback of the stack. The biasing plate 140 is movable responsive to abiasing mechanism 142 which is operative to enable the stack to increaseor decrease while maintaining the sheets in an appropriately alignedposition. Further details related to an exemplary embodiment of thesheet handling mechanism are described in the incorporated disclosure ofU.S. Pat. No. 6,302,393.

FIG. 5 further shows the exemplary operation of exemplary sheet handlingmechanisms 118 and 120. In this case a sheet 142 moving in transport 116is enabled to pass the rotatable member 132 when the gate member 128remains retracted as the sheet passes. This enables the sheet to move toother sheet handling mechanisms such as sheet handling mechanism 120.This arrangement enables sheets having particular characteristics to bestored together, for example, valid currency notes of differentdenominations to be collected in stacked relation in selected sheetstorage areas. Alternatively in other embodiments sheets of similartypes such as checks may be segregated from other financial instrumentsheets such as notes or travelers checks. In still other embodimentssheets which are to be recycled such as suitable fit currency notes canbe segregated from valid yet worn or soiled currency notes which are notsuitable for providing to customers. It should be understood that theseapproaches are exemplary and in other embodiments other approaches maybe used.

In the exemplary embodiment shown in FIG. 2, a security plate 144extends within the secure chest in intermediate relation between thehorizontal transport 114 and the note storage mechanism such as thestorage area 146 associated with sheet handling mechanism 118. Thesecurity plate 144 in the exemplary embodiment is secured within theinterior of the secure chest and is adapted to prevent unauthorizedaccess through the cash accepting opening 102 in the chest. This may beaccomplished by securing the security plate 144 to the walls boundingthe interior of the secure chest or other suitable structures. As can beappreciated in the exemplary embodiment the upper housing portion 54houses the sheet acceptor mechanism 80, it is generally easier to accessthe area housing the sheet acceptor mechanism than the secure chest. Incases where criminals may attack ATM 10 and attempt to remove the sheetaccepting mechanism, ready access through the cash accepting opening isfirst blocked by the driving and driven members and other components ofthe transports 106 and 108. However, in the event that criminals attemptto clear away the transport mechanism components, access to the storedsheets in the note storage mechanisms is still blocked by the securityplate. FIG. 11 shows greater detail of the cash acceptor mechanism 180retracted to a servicing position so as to expose the cash acceptingopening. In the exemplary embodiment the cash acceptor mechanism ismovably mounted in supporting connection with the chest portion onsuitable slides or other members. As can be appreciated in thisexemplary embodiment the security plate 144 operates to separate thecash accepting opening 102 from the notes or other valuable financialinstrument sheets which are stored below the security plate within thesecure chest. Of course the security plate is exemplary and other formsof security plates or other structures may be used.

In an alternative embodiment the machine includes a bulk storagecontainer 260 shown in FIG. 20 for holding currency bills, notes, checksor other items that have been deposited into the machine. The container260 includes a top wall 262 with an opening 264 which corresponds toopening 102 in the chest when the container 260 is in the operativeposition. Container 260 includes a transport 266 which transports itemsthat pass through the opening 264 into an interior area 268 of thecontainer. A horizontal transport 270 is operative to move depositeditems transversely away from the opening 264. A security plate 272 ispositioned to reduce the risk of unauthorized access to the interiorarea 268. A further transport 274 is operative to move deposit itemssuch as currency sheet 276 to a suitable location for being dispatchedinto the interior area 268 below the security plate. Deposited itemsschematically represented 278 are held within the interior area of thecontainer 260.

In the exemplary embodiment the container 260 includes a bottom wall280. The interior area 268 is bounded by a shaker member 282 that isdisposed vertically above the bottom wall. In the exemplary embodimentthe shaker member comprises a resilient flexible membrane 284. A rigidplate 286 extends in underlying relation of a central portion of themembrane. Flexible supports 288 support the rigid plate 286 above thebottom wall 280. The flexible supports further enable movement of therigid plate and membrane relative to the bottom wall. In exemplaryembodiments the rigid supports 288 may include springs or other memberswhich enable relative vertical and/or horizontal movement of the bottomwall and the rigid plate.

In the exemplary embodiment an actuator 290 extends in intermediaterelation between the bottom wall and the rigid plate. In exemplaryembodiments the actuator is an electrical vibrating device which isoperative to shake the rigid plate and overlying membrane. The shakingaction of the actuator 290 is operative to impart shaking motion to thedeposited items 278 that are in supporting connection with the membrane.This facilitates the dispersal and settling of deposited items andenables a relatively larger quantity of such items to be collectedwithin the interior area 268 before such items need to be removed. Inexemplary embodiments the actuator 290 is electrically connected to thecircuitry within the machine through a releasable connector 292. Thisfacilitates removal of the exemplary container as hereafter discussed.In addition, in some embodiments the moving devices for transportswithin the container may be supplied with signals and/or electricalpower through the releasable connector.

In operation of the machine, the interior area 268 of the container 260is in operative connection with the opening 38 in the housing of themachine through which deposited items are accepted. The deposited itemsare passed through the cash accepting mechanism or other mechanism forprocessing such items. Items appropriate for deposit in the containerare passed through the opening 102 in the top of the chest. Such itemsare transported by the transports 266, 270 and 274 to the area below thesecure plate 272 and accumulate within the interior area 268.Periodically responsive to the controller, the actuator 290 operates toimpart shaking motion to the deposited items 278 within the interiorarea. This facilitates settling of the items so as to densely pack theitems therein. Sensors 294 may be included within the interior area soas to sense the deposited items. The controller may be operative tocause the actuator to shake deposited items responsive to the sensingthe level of such items by the sensors. Alternatively the controller maybe operative to shake deposited items based on elapsed time, number ofitems deposited, or other programmable bases. In the exemplaryembodiment the sensors 294 may be in operative connection with thecontroller through the releasable connector 292.

The exemplary container 260 is removably mounted within the securechest. The exemplary container is supported on rollable supports 296.The rollable supports 296 may be castors, wheels, ball rollers or othertype items that enable more ready movement of the container in a loadedcondition. In the exemplary embodiment upon opening of the secure chestthe container 260 is enabled to move outward from the chest. This isfacilitated by a servicer grasping a handle 298 which is attached to thecontainer. The releasable connector 292 is enabled to be disconnected sothat the container 260 can be pulled outward from the secure chest. Asshown in greater detail in FIG. 21, in the exemplary embodiment thehandle 298 is a telescoping handle that is enabled to be moved upwardonce the handle has cleared the secure chest. This facilitates movingthe container outside of the machine. Thereafter the container may bemoved to a suitable location by the handle away from the machine forpurposes of removing the contents. This may be, for example, an areawithin a vault or other secure room in which the items within thecontainer may be processed.

As represented in FIG. 21, the container 260 in the exemplary embodimentincludes a door 300. Access to door 300 is controlled by one or morelocks represented 302. In the exemplary embodiment door 300 is shownhinged at a side toward the chest door so as to reduce the risk ofpersons obtaining unauthorized access to the interior of the containerwhen the container is within the machine. Once the container has beenmoved to a suitable location, the lock 302 may be unlocked; the dooropened, and deposited items removed. After the items have been removed,the door 300 may be returned to the closed position. Thereafter thecontainer may be reinstalled in the machine with the handle 298 beingretracted so as to enable the container to again be aligned with opening102. Further, the releasable connector 292 may be reconnected so as toagain enable operation of the container within the machine.

As can be appreciated, the exemplary container 260 is enabled to hold asubstantial quantity of deposited items. Further, the constructionincluding the rollable supports and telescoping handle facilitatesmovement of the loaded container out of the machine and the containerinto the machine. It should be understood that the container isexemplary and in other embodiments other approaches may be used. Thesemay include, for example and without limitation, containers whichinclude multiple interior areas in which deposited items are supportedon shaking members. Such embodiments may achieve, for example, aseparation of deposited notes, checks and/or envelopes by denominationor deposit type, and achieve more densely packed storage within aparticular interior compartment within the container. In addition or inthe alternative, in other embodiments shaking members may be provided onside walls or on top walls bounding the container so as to facilitatethe shaking of deposited items and the packing and storage thereof. Inaddition or in the alternative, containers may be used in someembodiments in conjunction with sheet handling mechanisms such thatcertain sheets are stored precisely positioned in containers forpurposes of stacking and/or recycling while other sheets are stored inbulk within a container or compartment within a container.

FIGS. 7 through 10 schematically describe an exemplary embodiment of thepicker mechanism 86 used in the cash accepting mechanism 80. In thisexemplary embodiment the stack of sheets 84 is positioned in the chute82 and is in supporting connection with a generally angled lower surface148. Moving members 150 and 152 are operative to engage the stack andselectively rotate responsive to a motor or other mechanism in thedirection of Arrow P so as to move the stack into generally abuttingrelation with an engaging surface 154. Positioned adjacent to theengaging surface 154 in proximity to the lower surface 158 is an idlerroll 156 which is a generally free wheeling roll. The engagement of thestack 84 of the engaging surface 154 and the face of the roll 156 isoperative to splay the sheets as shown.

The picker mechanism 86 further includes a generally cylindrical pickingmember 158. Picking member 158 is rotatable selectively by a motor orother driving member responsive to the controller 64. The picking memberduring picking operation rotates in the direction of Arrow P as shown.Picking member 158 further includes high friction arcuate segments 160which in the exemplary embodiment serve as sheet engaging portions andwhich extend about a portion of the circumference of the picking member.

Picker mechanism 86 of the exemplary embodiment further includes aplurality of rolls 162 that serve as non-contact stripper rolls in amanner later discussed. The picking mechanism further includes a contactstripper roll 164 which biasingly engages the high friction segments 160of the picking member.

As represented in FIG. 8, the picking member is a generally cylindricalmember that includes a plurality of annular recesses 166. The outersurface of the non-contact stripper rolls 162 extend into acorresponding annular recess 166, but are generally not in strippingengagement therewith. As represented in the exemplary embodiment of FIG.8, the outer surface of the non-contact stripper rolls 162 are disposedslightly away from the base of the annular recess. As a consequence theouter surface of the non-contact stripper rolls which serve as a firststripper portion are not positioned to be in direct contact strippingengagement with the picking member. However, because the surface of suchrolls is disposed in close proximity thereto and generally enables onlya single sheet to pass between the picking member and the non-contactstripper rolls, the separation of a single sheet from other sheets isgenerally achieved. It should be understood however that while in theexemplary embodiment the non-contact stripper rolls are disposedslightly from the picking member, in other embodiments such rolls orother stripper members may operate to actually contact the pickingmember but may be of such resilient consistency or other properties thatthe rolls are not in a biased contact stripping engagement as is thecase with the contact stripper roll 164.

As shown in FIG. 8 the contact stripper roll is biased to engage acentral sheet engaging portion 168 of the picking member. This centralsheet engaging portion is generally centered with regard to sheets thatare moved by the picker mechanism 86. This reduces the tendency ofsheets to twist or skew as they are being moved in the picker mechanism.Of course it should be understood that this arrangement is exemplary andin other embodiments other approaches may be used.

The operation of the exemplary picker mechanism 86 is represented inFIGS. 9 and 10. The picker mechanism is operative to separate sheetsindividually from the stack 84. This is done by sequentially picking afirst sheet 170 which bounds the lower end of the stack while moving thefirst sheet in a first direction generally indicated by Arrow F so as tomove the sheet away from the stack. To accomplish this, the controller64 operates motors or other moving mechanisms to cause the movingmembers 150 and 152 to rotate as the picker mechanism 168 similarlyrotates in a counterclockwise direction as shown. The rotation of thepicking member causes the high friction arcuate segments 160 which serveas sheet engaging portions to engage a lower face of the first sheet andpull the sheet in intermediate relation between the picking member andthe non-contact stripper rolls 162. As the first sheet is moved theidler roll 156 rotates to facilitate the movement of the first sheetbetween the picking member and the non-contact stripper rolls.

The non-contact stripper rolls 162 are in operative connection with aone-way clutch 172 such that the first stripper rolls remain stationarywhen the first sheet is engaged therewith and moving in the direction ofArrow F. Because the resistance force provided by the non-contactstripper rolls against the face of the sheet engaged therewith is lessthan the moving force imparted to the opposed face of the sheet, thefirst sheet 170 is moved into intermediate relation between the pickingmember and the non-contact stripper rolls. This causes the sheet toassume the cross-sectional wave configuration shown in FIG. 10. This iscaused by the sheet being deformed by the non-contact stripper rollsinto the annular recesses 166 of the picker member. This cross-sectionalwave configuration is generally operative in combination with theopposing force applied by the non-contact stripper rolls, to separatethe first sheet from other sheets that may be moving therewith from thestack.

As the first sheet 170 moves further in the direction of Arrow F asshown in FIG. 9, the leading edge of the sheet then engages the contactstripper roll 164 which is biased to engage the sheet engaging portionsof the picking member. The contact stripper roll is also in operativeconnection with a one-way clutch 174 such that in the exemplaryembodiment the contact stripper roll remains stationary as the firstsheet moves in the direction of Arrow F. The engagement of the contactstripper roll and the first sheet operates to displace the contactstripper roll so as to enable the sheet 170 to move in intermediaterelation between the contact stripper roll and the central sheetengaging portion 168. The resistance force of the non-contact stripperroll is generally operative to separate any sheets other than the firstsheet 170 from moving in the direction of Arrow F.

As shown in FIG. 9 the sensor 176 is positioned adjacent to the contactstripper roll in the exemplary embodiment. Sensor 176 is operative tosense the presence of double sheets which may have been able to pass thenon-contact and contact stripper rolls. Suitable sensors in someembodiments may be those shown in U.S. Pat. Nos. 6,241,244 and6,242,733, the disclosures of which are incorporated herein by referencein its entirety. Upon sensing a double sheet the controller of themachine is enabled to make additional attempts to strip the sheet aslater discussed. However, in the event that only a single sheet issensed the picker member 158 continues moving in the counterclockwisedirection until the leading edge of the sheet reaches takeaway rolls178. In the exemplary embodiment takeaway rolls are operative to engagethe sheet and to move the sheet in the cash accepting mechanism towardthe validator device 88. In the exemplary embodiment one rotation of thepicking member is operative to separate one sheet from the stack.

In the event that the sensor 176 senses that a double sheet or othermultiple sheet has been able to pass the contact and non-contactstripper rolls, the controller of this exemplary embodiment is operativeto stop the movement of the picker member 158 in the counterclockwisedirection as shown prior to the first sheet 170 being disengagedtherefrom. Thereafter the controller is operative to reverse thedirection of the picker member 158 and the moving members 150 and 152 soas to move the first sheet back toward the stack. Through the operationof one-way clutches 172 and 174 the contact stripper roll 164 and thenon-contact stripper rolls 162 are enabled to rotate in acounterclockwise direction as shown so as to facilitate the return ofthe sheets to the stack. Thereafter the controller may operate thepicker mechanism 86 to again pick a single bill. Repeated attempts maybe made until a single sheet is separated from the stack so that it maybe processed by the cash acceptor mechanism.

It has been found that the exemplary embodiment of the picker mechanism86 is well adapted for separating various types of financial instrumentsheets having different properties. In general, sheets such as currencynotes that are new or other types of sheets which have generallyconsistent properties of rigidity and friction from sheet to sheet areseparated through the operation of the picker mechanism and thenon-contact stripper rolls. However, in situations where rigidity andfrictional properties vary substantially from sheet to sheet, thecontacting stripper roll which subsequently engages the sheets afterthey have engaged the non-contact stripper rolls is effective inseparating sheets that would not otherwise be separated. This may beparticularly helpful for example in processing sheets that may includeplastic and paper currency notes, checks or other documents that havesignificantly variable properties and which are mixed together in astack from which the sheets must be individually picked.

It should be understood that while picking rolls and cylindrical membersare used in the exemplary embodiment, in other embodiments other pickingand stripping structures such as belts, pads, fingers and other membersmay be used.

The exemplary embodiment comprises a through-the-wall type machine inwhich the fascia is exposed to the elements. As a result, rain and snowmay impact on the fascia and in the absence of suitable measures mayenter the machine. As can be appreciated the cash accepting opening 40in the fascia must be sufficiently large to accept the chute 82 whichholds a stack of documents 84 as previously discussed. Duringtransactions when an authorized user indicates that they wish to insertthe stack of sheets into the chute, the gate 44 must be opened whichresults in exposure of the chute to the elements.

To minimize the risk posed by rain and snow to the currency acceptormechanism 80, the exemplary embodiment includes the capability tocapture and direct from the machine moisture which may enter the chute.The approach used in the exemplary embodiment is represented in FIGS. 17through 19. As shown in FIG. 17, the lower surface of the chute 148includes at least one water accepting opening 180 therein. In theexemplary embodiment the water accepting opening comprises one or moretroughs which extend transversely across the lower surface of the sheet.Of course in other embodiments other approaches may be used. The fluidaccepting openings are in fluid connection with a conduit schematicallyrepresented 182 which is in fluid connection with a drain 184 whichdelivers the water outside the machine. As represented in FIGS. 18 and19 the trough 180 is in operative connection with a fluid fitting 184which connects to a generally flexible fluid conduit 182 such as a tube.The conduit 182 connects to the drain 184 which in the exemplaryembodiment includes a cavity at a lower side of the fascia and whichincludes openings through which the water may drain to the outside ofthe machine housing.

In the exemplary embodiment a tube support 186 is positioned to controlthe direction of the tube and assure drainage when the cash acceptormechanism is in the operative position as well as when the cash acceptormechanism is in a service position such as is shown in FIG. 12. In theexemplary embodiment the tube support minimizes the risk of the fluidconduit being crimped or otherwise assuming a position which preventsthe drainage of water from the interior of the chute to the outside ofthe machine. It should be understood, however, that the approach shownis exemplary and in other embodiments other approaches may be used.

In the exemplary embodiment, provision is made to minimize the risk ofmoisture entering the machine in the area of the cash accepting openingthrough which the chute 82 extends in the operative position of the cashacceptor mechanism 80. As shown in FIGS. 18 and 19, in the exemplaryembodiment a resilient gasket 188 extends in surrounding relation of thechute 82 in the area adjacent to the fascia. The resilient gasket issupported on a front face of the cash acceptor mechanism. As shown inFIG. 19, when the cash acceptor mechanism 80 is positioned such that thechute extends through the cash acceptor opening 40 in the fascia, theresilient gasket is positioned in sandwiched fluid tight relationbetween the front face of the cash acceptor mechanism and the interiorface of the fascia. As the seal provided by the gasket extends insurrounding relation of the chute, the risk of moisture or othercontaminants entering the machine through the cash acceptor opening isminimized. Of course it should be understood that this approach isexemplary and in other embodiments other approaches may be used.

As discussed in connection with FIG. 2, the cash acceptor mechanism 80in response to operation of the validator device 88 and the controller64 determines at least one characteristic indicative of whetherfinancial instrument sheets are acceptable to the machine. In theexemplary embodiment unacceptable sheets may be suspect sheets such aspotentially counterfeit notes, invalid checks or other unacceptabledocuments. When such documents are detected, they are directed to astorage area 100 which in the exemplary embodiment is within the cashacceptor mechanism and outside the chest portion. Periodically theseunacceptable sheets must be recovered by servicing personnel forpurposes of either verifying the invalidity of the sheets or forpurposes of tracing the sheets to the user who placed them in themachine. In the exemplary embodiment such sheets are recoverable byauthorized persons who have access to the upper housing portion 54 butwho may be prevented from having access to the chest 48 where documentsdetermined to be valid are stored.

In the exemplary embodiment access to the storage area 100 is controlledby a suitable access device. In one form of such an access device shownin FIG. 12, an opening 190 is provided to the storage area 100. Accessto the opening is controlled by a flip-down access door 192. In someembodiments, the flip-down access door 192 may be opened only when thecash acceptor mechanism 80 has been moved rearward to extend outside ofthe housing subsequent to opening access door 58. In some embodimentsthe flip-down access door may be provided with a locking mechanism 194such as a key lock or other suitable locking mechanism. As a result inthis exemplary embodiment in order to access the sheets in the storagearea 100, the user could be required to have the necessary capabilitiesthrough keys, combinations or otherwise to unlock both lock 62 on accessdoor 58 as well as lock 194 and flip-down door 192 in order to accessthe sheets. It should be understood, however, that although in theembodiment shown the cash acceptor mechanism 180 is shown retracted outof the machine to facilitate opening the flip-down door and extractingthe sheets, in other embodiments the flip-down door may be sized,segmented or otherwise adapted such that the cash acceptor mechanism maynot need to be retracted from its operative position in order to accesssheets in the storage area 100.

FIG. 13 shows yet a further alternative for accessing sheets in thestorage area 100. In this exemplary embodiment an opening 196 isprovided through the storage area so as to enable access to the sheetstherein. Access through opening 196 is provided to a sliding door 198.Door 198 is operative to slide along the direction of Arrow S in opposedtracks, slots or other suitable mechanisms for holding and guiding thedoor in supporting connection with the cash acceptor mechanism. In someembodiments door 198 may include a locking mechanism 200. Lockingmechanism 200 may be a suitable key, combination or other lockingmechanism for assuring that only authorized personnel are enabled toaccess the documents in the storage area. As can be appreciated fromFIG. 13, door 198 may be both unlocked and opened without having toretract the cash accepting mechanism rearward. In some embodiments thismay serve to speed servicing and the removal of invalid sheets from themachine.

FIG. 14 shows yet another exemplary embodiment for accessing sheets inthe storage area 100. In this embodiment an opening 202 is provided in arear face of the cash accepting mechanism 80. Access to opening 202 iscontrolled by a door 204. In the exemplary embodiment door 204 is asliding door adapted to be selectively moved in tracks, slots or similardevices. In some embodiments a suitable locking mechanism schematicallyindicated 206 is used to assure that only authorized personnel haveaccess to the door. In the embodiment shown in FIG. 14, a transport 208is provided for moving the sheets in the storage area 100 to the servicepersonnel through the opening 202. A transport 208 may be operative inresponse to provided inputs to input devices by the servicing personnelor may be automatic responsive to the opening of the door 204. Of courseit should be understood that all of the approaches shown are exemplaryand in other embodiments other approaches may be used.

In some exemplary embodiments suspect notes or other documents arecorrelated with particular transactions conducted at the machine and/orwith particular users of the machine. This may be accomplished throughoperation of the validator and the controller. In some exemplaryembodiments the suspect documents in storage may be arranged in aparticular order and the controller is operative to provide one or moreoutputs such as through a screen or a printer indicating thetransactions and/or users which correspond to the suspect sheets.Alternatively or in addition, provisions may be made for the cashacceptor mechanism to be in operative connection with a printer whichprints transaction and/or user identifying information on each of thesuspect sheets. This may include for example, visible or non-visibleindicia. In some embodiments the indicia may be removable such asremovable labels or indicia that can be washed off or otherwise removedor neutralized. In other embodiment the characteristics determined bythe validator may be such that the data is sufficiently detailed and oftypes that create a unique electronic profile of each suspect sheet.This data can be stored at the machine in a data store through operationof the controller or elsewhere in a connected data store. This sheetidentifying data may then later be used by a servicer or other personsrecovering or analyzing the suspect sheets to correlate each sheet withthe transaction and/or user that provided the sheet to the machine. Thismay be done in some embodiments by putting the machine controller in amode for such analysis and feeding each suspect sheet through the cashacceptor mechanism. The controller may then operate to correlate thestored data related to the transaction and/or user with the stored datathat uniquely identifies the sheet. Such information is then provided toa user of the machine recovering the sheets. Alternatively, suchanalysis may be conducted by transferring data away from the machinealong with the suspect sheets, and conducting the analysis at anothervalidator. Of course these approaches are exemplary of approaches thatmay be used to uniquely identify a suspect sheet and associate it with auser and/or a transaction.

In the exemplary embodiment of the cash acceptor mechanism 80, it isdesirable to maintain the interior components of the cash acceptormechanism isolated and in sealed relation except when access is requiredfor servicing. As can be appreciated, while the exemplary embodimentpositions the cash acceptor mechanism in intermediate relation between avertically extending wall of the generally L-shaped chest and the wallof the housing to provide enhanced security, it also presents challengesfor servicing. While the ability of the exemplary embodiment to move thecash acceptor mechanism rearward through a service opening of themachine facilitates servicing, problems are still potentially presentedby the need to have to remove cover panels and the like. Further, thereis always a risk that cover panels, once removed, will not be replacedresulting in infiltration of contaminants to the cash acceptor mechanismand causing malfunctions or failures.

To reduce the risk of service persons not replacing service panels, theexemplary embodiments are made to minimize the risk that service panelswill be removed and not replaced. As shown in FIG. 15, in one exemplaryembodiment a side service panel 210 is mounted in hinged relation insupporting connection with the cash acceptor mechanism. This enables theservice panel 210 to be opened once the cash acceptor mechanism has beenmoved rearward from the machine. This enables ready access to thecomponents within the machine. In addition in this exemplary embodiment,the front service panel 212 is mounted in hinged relation adjacent thefront of the cash acceptor mechanism. This front service panel enablesaccess to components accessible through a front opening of the cashaccepting mechanism.

As can be appreciated because of the hinged character of service panels210 and 212, the panels may be readily opened. However, the hingedmounting makes it difficult for a technician to entirely remove thepanels from the machine. Further the cash acceptor mechanism cannot bereturned to service without closing the service panels. Of course as canbe appreciated, suitable latching mechanisms or other holding devicesmay be used so as to assure that once the service panels are returned totheir closed position, they remain therein until such time as theservice panels need to be opened again for servicing.

FIG. 16 shows yet a further schematic view of an alternative approach toproviding service panels on the cash acceptor mechanism 80 that provideprotection for internal components and yet can be readily removed forservicing. In the embodiment shown in FIG. 16, service panels 214 and216 are provided such that they can move in the direction indicated bythe adjacent arrows. Service panels 214 and 216 in the exemplaryembodiment are mounted in channels, slots or other suitable devices onthe cash acceptor mechanism for guiding and holding the panels inposition. The useful aspect of the service panels shown in FIG. 16 isthat the cash acceptor mechanism 80 need not be removed from theoperative position in order to open the interior of the mechanism bymoving the service panel. Indeed in the exemplary embodiment, servicepanel 214 may be entirely removed exposing the components of the cashacceptor mechanism without moving the cash acceptor mechanism from theoperative position. Service panel 216 which may include the front facesupporting the resilient gasket, may be made more readily removable bymoving the gasket relative to the chute. The ability to remove servicepanels may be particularly useful in situations where a service personneeds to observe the cash acceptor mechanism in operation in order todiagnose and remedy certain problems.

In some embodiments it may be desirable to include devices to assurethat the service panels 214 and 216 are reinstalled on the cash acceptormechanism after servicing procedures are completed. This may beaccomplished by including contact switches such as the contact switchschematically represented as 218 to sense when the service panels havebeen placed back in position. Such contact switches may limit theoperation of the cash acceptor mechanism until such panels are replaced.Alternatively the circuitry within the machine may cause an alarm orother indication to be given or may disable operation of the currencyacceptor mechanism if the access doors to the upper housing are closedand the service panels have not been returned to their operativeposition. Of course other approaches may be used.

As can be appreciated, the arrangements of service panels shown in FIGS.15 and 16 for the cash acceptor mechanism are exemplary and in otherembodiments other approaches may be used.

In the exemplary machine 10 there is also included a mechanism fordispensing cash through the cash dispensing opening 38 in the fascia.This cash dispensing mechanism generally indicated 220 is schematicallyrepresented in FIG. 3. In the exemplary embodiment the cash dispensingmechanism is positioned in the higher side of the generally L-shapedchest and includes a plurality of note storage areas 222, 224, 226, 228,230 and 232. In some exemplary embodiments the note storage areas may behoused within removable currency cassettes which are suitable forholding notes and which may be readily removed from the machine.

In the exemplary embodiment each of the note storage areas is inoperative connection with a picker mechanism 234, 236, 238, 240, 242 and244. Each of these picker mechanisms are selectively operativeresponsive to controller 64 to selectively dispense notes or othersheets from the corresponding storage area responsive to appropriateinputs to input devices of the user interface. In some exemplaryembodiments the picker mechanisms used may be similar to the pickermechanism 86 used to separate sheets from a stack in the cash acceptormechanism 80.

In the exemplary embodiment a vertically extending transport 246 is inoperative connection with the picker mechanisms and a presentermechanism 248. In operation of the machine the presenter mechanism isoperative to receive sheets dispensed by the picker mechanisms and tomove the sheets upward through the transport 246 to accumulate thesheets into a stack schematically indicated 250. After the desiredsheets have been accumulated, the presenter mechanism is operative tomove the stack toward the cash dispensing opening 38 while thecontroller is operative to open the cash dispensing gate 42. Thisenables the stack of sheets to be dispensed to a user of the machine.

It should be understood that while in the exemplary embodiment the cashdispensing mechanism 220 has been described as dispensing variousdenominations of currency notes; in other embodiments the cashdispensing mechanism may dispense other types of sheets. These mayinclude, for example, travelers' checks, stamps, vouchers, scrip, giftcertificates, or other documents. Further, in some embodiments themachine may be operative to dispense combinations of both notes andother documents as may be requested by the user. Of course themechanisms shown are exemplary and in other embodiments other approachesmay be used.

In operation of the exemplary machine 10, a user operating the machineprovides inputs sufficient to identify the user's account through theinput devices of the machine. This may include, for example, providing acard and/or alpha-numeric data through the input devices which can becorrelated through operation of the controller in the machine and/or byinteraction with a remote computer to determine whether the card datacorresponds to an authorized user as well as a financial account of theuser. The controller thereafter operates the output devices of themachine so as to prompt the user to provide inputs and to select aparticular type of transaction or provide other inputs. In situationswhere the user wishes to conduct a cash accepting transaction, themachine operates responsive to the controller 64 to open the gate 44 tothe chute 82 which enables the user to provide a stack of notes or otherdocuments into the machine.

In response to the user providing the stack of documents 84 and/or inresponse to inputs from the user, the cash acceptor mechanism 80operates to unstack the documents through operation of the pickermechanism 86 and to determine at least one of the characteristics ofeach document through operation of the validator device 88. Thedetermined characteristics of the documents may cause valid oracceptable documents to be routed through operation of the routingdevice 92 into the escrow device 94 where they may be temporarilystored. Also, the controller may operate the routing device 92 to directsuspect documents such as invalid documents or probable counterfeitnotes to the transport 86 and the storage area 100.

In the exemplary embodiment once the documents have been moved past thevalidator, the controller may operate to advise the user of themachine's determination with regard to the documents through outputsthrough one or more output devices. In some exemplary embodiments theuser may be offered the option to recover the valid or invalid documentsor both. This may be accomplished by the escrow device delivering thedocuments to the same or different transports such that the documentsmay be returned to the chute or other area of the machine that isaccessible to the user. Likewise if the option is offered, invaliddocuments may likewise be routed back to the user. Of course variousapproaches may be used depending on the particular machine configurationand the programming associated with the controller.

In the exemplary transaction, if the documents determined to be validare to be stored within the machine, the controller operates responsiveto inputs from the user and/or its programming to cause the escrowdevice 94 to deliver the documents. The documents are directed by therouting device 92 through the cash accepting opening 102 in the chest inwhich they are transported and stored in the appropriate sheet handlingmechanisms or in an appropriate bulk storage container. In the exemplaryembodiment the user's account is credited for valid sheets deposited.Information is collected concerning any invalid sheets provided by theuser so that if the sheets are later determined to be valid, the usermay be credited or alternatively the user may be contacted to determinethe source of the invalid sheets. Of course as can be appreciated, thistransaction is exemplary and in other embodiments other approaches maybe used.

Using the exemplary machine 10 a user may also conduct cash dispensingtransactions. This may be done either during the same session as a cashaccepting transaction or as part of a separate session. In such atransaction the user of the ATM provides inputs to the input devicesthat are sufficient to identify one or more accounts of the user and/orother identifying inputs. Responsive to prompts through the outputdevices, the user provides inputs indicating that they wish to conduct atransaction involving the dispense of notes or other types of sheets,and the amount, nature or character of the sheets that the user hasrequested.

Responsive to the inputs from the user the controller 64 is operative tocause the cash dispenser mechanism 220 and the picker mechanisms locatedtherein to deliver the requested sheets to the presenter mechanism 248,which is operative to accumulate the requested sheets into a stack 250.Once the sheets are accumulated, the sheets are moved outward to theuser as the gate mechanism is opened. Hereafter the controller operatesto cause the value of the dispensed cash or other sheets to be chargedto the user's account.

Some embodiments may be useful in handling sheets that includeprogrammable tracking devices or other programmable memory devicesthereon. For example some embodiments may be useful in handling sheetsthat include programmable radio frequency identification (RFID) datastores thereon. Still other types of sheets may include programmabletracking devices that have processing and data storage capabilities suchas for example Memory Spot™ devices available from Hewlett-Packard. Forexample in some embodiments currency bills may include programmabletracking devices that can be programmed with data that can be later readto determine information concerning the bill. Such information mayinclude data which is used to verify that the bill is genuine.Alternatively or in addition the programmable tracking devices can beused to store and deliver information about entities and/or transactionsin which the bill has been involved. In still other embodimentsprogrammable tracking devices may be used on sheets such as checks,tickets, script or other items for purposes of authenticating thegenuineness thereof and/or indicating transactions in which such itemshave been used. Of course these approaches are exemplary.

In operation of an exemplary machine the machine may include one or moresensors which are operative to sense programmable tracking devices oncurrency bills or other sheets. Such sensors may operate based on radiofrequency back scatter principles or other sensing techniques as may beappropriate. Alternatively or in addition, a machine may include one ormore programming devices which are operative to program the programmabletracking devices included on currency bills or sheets. In someembodiments and depending on the type of programmable tracking devices,the sensors and programming devices may be separate or a part of thesame device. In the exemplary embodiment shown in FIG. 2 such sensorsand programming devices may be incorporated with the validator device88. Alternatively one or more such devices may be separate and includedin appropriate areas of the machine. In some embodiments sensors andprogramming devices may operate to program the devices on sheets thatare moving through the machine while in others such devices may be readand/or programmed while in storage. Approaches taken will depend on theparticular types of devices used, the type of sheets involved and thetransaction functions carried out by the machine.

In some exemplary embodiments the machine may include sensors forsensing whether currency bills that are received by the machine includeprogrammable tracking devices. For bills that include such devices, theat least one processor in the machine may operate the at least oneprogramming device to include data in the memory associated with thetracking device on the bill that corresponds to the user and/or thetransaction. This may include for example data corresponding to the nameof the user, the user's account, the machine in which the bill isreceived, the time and date of the transaction, the amount involved inthe transaction, the nature of the transaction and/or other data thatcorresponds to the transaction in which the bill is received. Of coursethese items are exemplary. Further in some embodiments the at least oneprocessor associated with the machine may also operate to segregatebills that include programmable tracking devices and store them in aparticular storage area. This storage area may be different than anotherstorage area in the machine used to store bills that do not include suchprogrammable tracking devices. Thus for example the machine may operateto store twenty dollar bills that include programmable tracking devicesin one storage area while twenty dollar bills that do not include suchdevices are stored in a different area. In some embodiments the storageareas may be within containers that are removable from the interior ofthe machine.

In addition in some exemplary embodiments the at least one sensor mayoperate as a reading device to read data that is included in the memoryassociated with the programmable tracking device on each bill proximateto the time that the bill is input to the machine. The at least oneprocessor in the machine may operate in accordance with its programmingto record and/or analyze this data for particular data of interest.Alternatively or in addition the machine may transmit selected items ofdata from the bills to other computers for purposes of analysis. Suchanalysis may include information about transactions in which particularcurrency bills have previously been involved. Such information may beuseful in terms of tracking activities such as detecting moneylaundering, improper payments, tax evasion or other activities that maybe of interest. Of course these approaches are exemplary.

In some embodiments a machine may include bill dispensing devices thatare capable of dispensing currency bills or other sheets that includeprogrammable tracking devices. In some embodiments such machines mayalso include dispensing devices that are also capable of dispensingcurrency bills that do not include programmable tracking devices. Suchembodiments may include machines that include bill receiving devices andcash dispensers as part of an integrated mechanism such as a cashrecycler. In other embodiments the machine may only include mechanismsthat dispense bills from storage. In still other embodiments machinesmay include separate bill receiving devices. Of course variouscombinations of such devices may be included in the same or differentmachines.

Some embodiments may operate in accordance with the programmingassociated with at least one processor to cause data to be included onbills or other sheets that are dispensed from the machine. This may beaccomplished through operation of one or more programming devices in themachine. Such programming devices may operate, for example, to includedata on currency bills moving in the machine that are going to bedispensed to a particular user. The programming device may operate toinclude data in the programmable tracking devices that includeinformation that corresponds to the user receiving the bill and/or otherinformation. Such information may include for example, the recipient'sname, account number, the machine at which the bill is received, thetransaction time and date, the transaction amount involved, thetransaction type or other information. Of course this approach isexemplary.

In some embodiments the at least one processor in the machine isoperative to provide outputs through the display of the machine whichincludes indicia advising the user that they are receiving currencybills that include programmable tracking devices. This may include forexample outputs which indicate that the bill that they are receivingincludes such tracking devices and/or the nature of the data which isbeing provided in memory on the bills. Of course in some embodimentssuch information may be output through other devices on the machine suchas through a speaker, headphone jack or other type of device throughwhich messages may be perceived by a user.

In some embodiments the at least one processor may be programmed tooffer a user the option of not including any or certain data in theprogrammable tracking devices of bills or other sheets that are providedto the user. The user may provide one or more inputs to input devices onthe machine to indicate that they do not wish the bills or other sheetsthat are received to include any or at least some of this data. In caseswhere a user has provided such inputs, the at least one processoroperates so that such information is not included in the programmabletracking devices of the currency bills the user receives.

In still other embodiments the at least one processor may operate togive a user an option of receiving bills with or without suchprogrammable tracking devices. For example some users may prefer toreceive bills which do not include such programmable tracking devicesthereon. The at least one processor may provide outputs giving a machineuser an option to provide an input to select to receive such bills. Byproviding at least one input the user may indicate to the machine thatthe bills to be dispensed should not include such programmable trackingdevices. The machine may then operate in accordance with its programmingto dispense only bills to that particular user that do not include suchprogrammable tracking devices. In some embodiments the at least oneprocessor may also operate to provide outputs to a user to indicate thatthere is an additional charge for receiving bills that do not includesuch programmable tracking devices. If a user provides inputs indicatingthat they wish to receive such bills despite the additional charge, theat least one processor will operate to assess a charge for the receiptof such bills in addition to the face value associated with the bills.Alternatively in some embodiments the at least one processor in themachine may operate to store information in the machine concerning theuser's request to receive bills without programmable tracking devices.Information about such transactions or the users involved therewith maybe communicated by the machine to other computers for purposes ofanalysis. Such information may be used for example to identify possibleillicit activities. Of course these approaches are exemplary.

It should be understood that although the exemplary use of programmabletracking devices on sheets is used in connection with currency bills,the principles may also be used in connection with other parts of sheetsor items. These may include for example tickets, checks, scrip, gamingmaterials or other items that can be redeemed for goods or services. Forexample and without limitation, the principles described can be used inconjunction with gaming systems of the type described in U.S.Provisional Application Ser. No. 60/789,644 filed Apr. 5, 2006 thedisclosure of which is incorporated herein by reference in its entirety.

It should be understood that the transactions described are exemplaryand additional types of transactions may be carried out throughoperation of various embodiments. In addition as previously discussed,mechanisms that are operative to both accept and dispense cash such asthose described in the incorporated disclosures may be utilized assubstitutes for, or in addition to, the mechanisms described herein soas to carry out transactions. Other types of transaction functiondevices may be included in some embodiments. For example as previouslydiscussed, embodiments may include a scanner which enables the machineto image and validate checks. In such cases it may be desirable for themachine to have the capability to cancel the check or destroy the checkso there is no risk that the check may be later be stolen and usedfraudulently. In some embodiments suitable mechanisms may be providedfor carrying out such functions. In addition it may be desirable in someembodiments to have the machine produce bank checks, travelers' checks,tickets or other documents and suitable mechanisms may be provided forproducing such documents in the selected amounts. Further, inalternative embodiments features used by merchants such as devices foraccepting deposit bags, dispensing rolled coin and other devices may beincorporated into an automated banking machine having features describedherein. As can also be appreciated, features of the exemplaryembodiments may also be used in numerous other types of automatedbanking machines.

Exemplary embodiments include light emitting devices 17, 31, 41, 43 and45. In the exemplary embodiment the light emitting devices arepositioned in areas on the user interface at locations associated withparticular transaction function devices. For example, light emittingdevice 31 is associated with the receipt printer 30 and light emittingdevice 17 is associated with the card reader 16. In the exemplaryembodiment the light emitting devices are in operative connection withthe one or more controllers in the machine. In addition, such devicesare capable of emitting light of selected colors at particular timesduring the transaction responsive to the operative condition of thetransaction function device of the machine with which the light emittingdevice is associated.

In the exemplary embodiment the light emitting devices include an arrayof LEDs of different colors embedded on a flexible circuit. For example,FIG. 22 represents light emitting device 31. However, it should beunderstood that in the exemplary embodiment all the light emittingdevices are generally similar. Light emitting device 31 includes anarray of LEDs 304 connected through a circuit on a flexible substratesuch as a polymide film, for example, DuPont Kapton® material, andincludes a flexible connector portion 306. The flexible connectorterminates in an electrical connector 308. Electrical connector 308 isreleasably connectible to a driving circuit or other electrical circuitin the machine which operably connects to one or more controllers forpurposes of controlling the illumination of the light emitting device.

As shown in FIG. 23, in the exemplary embodiment the light emittingdevice includes three different color LEDs. These LEDs are red, greenand yellow, which are represented by “R,” “G,” and “Y” in the figures asshown. As represented in FIG. 23, in the exemplary embodiment the LEDsare in an array such that LEDs of only one color are vertically alignedalong a single line of the light emitting device. For example, as shownin FIG. 23, a line 310 comprises a line of vertically aligned red LEDs.As shown in FIG. 23, a line 312 is a line of only green LEDs, and a line314 of only yellow LEDs. As shown in FIG. 23, in the exemplaryembodiment the lines repeat so that there are five vertical lines ofeach color LED. It should be understood that while in the exemplaryembodiment the LEDs of each color are arranged in vertically alignedrelation; in other embodiments other arrangements such as horizontalalignment or other matrices of LEDs may be used. It should also beappreciated that although the LEDs are connected electrically in seriesas shown in FIG. 24, the electrical connections on the flexible circuitprovide for spaced vertically aligned pairs of LEDs of only one color.

As shown in FIG. 25, in the exemplary embodiment the light emittingdevices are supported in a flexible web. The web is thin in thepreferred embodiment, having a thickness of approximately 1.20millimeters. This facilitates the positioning of the light emittingdevices on the user interface. In the exemplary embodiment, LEDs whichare represented 316 and 318 are mounted on a base layer 320 includingthe circuit on a flexible substrate. An outer layer 322 which in theexemplary embodiment comprises a polyester layer overlies the LEDs. Aspacer 324 extends between the base layer and the outer layer. As bestshown in FIG. 23 multiple spacers may be used. In the exemplaryembodiment the spacers are positioned outboard of the LEDs and includeopenings 326 to facilitate positioning the light emitting devices on themachine. This may include, for example, extending pins, studs, orfastening devices through the openings so as to secure the lightemitting devices in the proper position. Further, in the exemplaryembodiment the release layer includes an underlying adhesive layer 328.The adhesive layer enables attaching of a light emitting device to aselected area within the machine. The adhesive layer is initiallyexposed for purposes of attaching the light emitting device by removalof an adhesive release layer 330 as shown in FIG. 25.

In an exemplary embodiment the light emitting devices are attached tocomponents of the machine with which they are associated. This may bedone, for example, by using modular construction for the transactionfunction devices within the machine and attaching the particular lightemitting device to the associated module. For example, FIG. 18 shows thecash accepting device 80 which is arranged as a modular device forpurposes of processing sheets that may be received in the machine. Inthe exemplary embodiment the associated light emitting device 41 ismounted in supporting connection with the module. The adjacent fasciaarea of the machine provides an opening through which the light emittingdevice may be viewed when it is in the operative position. In someembodiments the fascia of the machine may include a transparent ortranslucent material separating the light emitting device from theexterior of the machine. However, in other embodiments the lightemitting devices may be exposed on the exterior of the machine. Theattachment of the light emitting devices directly to the modularcomponents of the machine may facilitate assembly and service of themachine. Placing the light emitting device directly on the module of thetransaction function device with which it is associated, may reduce theamount of wiring and connectors needed for purposes of assembly andservice.

In the exemplary embodiment the multicolor light emitting devices areoperated under the control of one or more controllers in the machine.Each light emitting device is operated to emit light of a selected colorand/or in a selected manner responsive to the operative condition of anassociated transaction function device. For example, exemplary machinesmay be selectively programmable to emit a particular color lightresponsive to a given operative condition. For example, the lightemitting device adjacent to the card reader may emit green light when itis ready to receive the card of a user, and then change to a yellowlight after the card has been received therein. Alternatively or inaddition, lights of a different color may flash or alternate to reflectconditions of a particular device. Further, for example, in the event ofan improper action such as a user attempting to insert a card into thecard reader incorrectly, the controller may be programmed to have theassociated light emitting device emit red light or otherwise flash acolor of light so as to indicate to the user that they have donesomething improper. Similarly, if a particular transaction functiondevice is malfunctioning or not available, red light may be output.

In some exemplary embodiments the controller may be programmed so as toilluminate the light emitting devices to guide a user in operation ofthe machine. This may include, for example, illuminating or flashing aparticular colored light to indicate a required user activity at aparticular location on the machine. For example, at a particular time inthe transaction the controller may cause to be output on the display anindication to the customer that they are to take their receipt. When themachine has delivered the receipt, the controller may operate to causethe light emitting device 31 associated with the receipt delivery toilluminate, flash or otherwise indicate to the user that activity isrequired by the user in the area of the receipt delivery slot.

In some exemplary embodiments the controller may be programmed to causethe light emitting devices to selectively illuminate intermittently andfor a different duration depending on the operative condition of anassociated device. For example, if a user provides inputs so as torequest a cash-dispensing transaction, the light emitting device 43adjacent to the cash dispensing opening may illuminate in a yellowcondition as the machine operates internally to move bills toward thecash dispensing opening. Thereafter as the bills are pushed through theopening and presented to the user, the controller may cause the color ofthe light emitting device to change to green. In addition, thecontroller may cause the green light to flash so as to draw the user'sattention to the fact that the money is ready to be taken. Further, inan exemplary embodiment, if the user has not taken their cash after acertain time and the machine is programmed to retract it, the controllermay cause the light emitting device to flash or may operate so as toflash different colors in an alternating fashion so as to capture theattention of the user prior to the money being retracted.

In other embodiments, the colors emitted by the light emitting devicesmay be selectively programmed based on aesthetic reasons. For example,if the entity which operates the machine has particular trade dressinvolving certain colors the controller may be programmed to have thelight emitting devices correspond with that trade dress. Thus, forexample, if the particular entity's trade dress color is green, themachine may be programmed to utilize the green LEDs as lead-throughindicators in prompting the user in how to operate the machine. Likewiseif a different operating entity with a similar machine utilizes yellowas part of their trade dress scheme, the controller may be programmed toilluminate the yellow LEDs in the light emitting devices as thelead-through indicators.

It should further be understood that although the use of three colors oflight emitting devices is shown, this is exemplary and in otherembodiments additional types of light emitting devices may be provided.In addition it should be understood that although light emitting devicesin the exemplary embodiment are arranged so that only one color may beoutput from a given light emitting device at a given time, in otherembodiments provision may be made to illuminate multiple color LEDssimultaneously. In such arrangements, LEDs in primary colors may beincluded so as to achieve ranges of hue through color combinations. Thismay be done by illuminating multiple light emitting sourcessimultaneously and/or varying the intensity of such sources throughoperation of a controller so as to achieve various colors. This mayinclude, for example, providing for a gradual change in the hue of thelight emitting device in accordance with the status of the associatedtransaction function device. This may include, for example, providing anindication to the user of the status of the completion of a particulartask. Combinations of two or more colors may also be selectivelyproduced. It should also be understood that although LEDs are used asthe light source in the exemplary embodiment, in other embodiments ofthe invention other approaches may be used. It should be understood thatthe structures and operations described are exemplary and numerous otherstructures and methods may be used.

In some exemplary embodiments, provision is made to facilitate a user'soperation of the machine and to minimize the risk of persons improperlyobserving a user or their activities. Such undesirable activities mayinclude, for example, unauthorized persons observing the user's input oftheir PIN number or other data. As shown in FIG. 26, fascia 12 of theexemplary embodiment includes a recessed area 332 in which the display,function keys, card reader and receipt outlet are positioned. Thisrecessed area 332 is illuminated by a light source 334. Light source 334provides illumination generally in the downward direction so as toenable the user to more readily view the locations of the input andoutput devices on the fascia of the machine.

In the exemplary embodiment the fascia 12 includes a top panel portion336 which is positioned generally above the light source 334 and theuser interface of the machine. As represented in FIG. 26, the top panelportion includes a pair of convex mirrors 338, 340. The convex mirrors338, 340 are generally horizontally disposed and are positioned atopposed sides of the user interface.

As represented in FIG. 27, a user 342 operating the ATM 10 willgenerally have their body aligned with the user interface 15 of themachine. As a result, the user is generally enabled to view in theconvex mirrors an area behind the user generally indicated 343. The useris enabled to do this by looking in the mirrors 338 and 340 to theuser's left and right, respectively. By looking in these mirrors, theuser is enabled to generally see what is going on behind them as well asin a transverse direction from the area directly behind the user. Thismay enable the user to determine if one or more persons are in theirproximity as well as whether such persons may be attempting to observethe user or their inputs to the machine. In some embodiments where themachine is operated in an external environment, lighting sources may beprovided in the area 343 to facilitate the user's observation of personswho may be present therein.

It should be understood that the arrangement shown is exemplary and inother embodiments other mirror or observation arrangements may be used.In addition, in some embodiments provision may be made to maintain thecleanliness of the mirrors so as to reduce the risk that the user'sability to observe surrounding activities is impaired. These provisionsmay include, for example, automated devices which wipe the surface ofthe mirrors periodically. These may be external wiping devices or insome embodiments internal wiping devices. This may be accomplished, forexample, by having the convex mirrors be in supporting connection withone or more rotatable members that may be periodically rotated withinthe fascia by a motor or other moving device that operates responsive tothe controller so as to expose a new external surface. Cleaning deviceson the interior of the fascia may operate to wipe contaminants from thesurface of the mirror as it passes internally such that further rotationexposes a clean mirror surface to the user. This may include for examplecontact wiper blades that engage the surface of the mirror. Movement ofthe mirror surface such as rotation thereof in engagement with the wiperblades may serve to remove accumulations of dirt on the reflectivesurface. In some embodiments the mirror surface may be part of acylindrical body, and rotation of the body about a central longitudinalaxis may provide wiping action as the mirror surface moves paststationary wipers engaged therewith. In some embodiments the stationarywipers may be comprised of resilient material and/or may include movablemounting mechanisms so as to bias the wiper into engagement with themovable mirror surface. In alternative embodiments a reservoir ofcleaning solution may be provided within or adjacent to the machine. Asuitable pump or other device may be used to apply the cleaning solutionto the mirror surface as it is moved relative to the wipers so as tofacilitate the removal of dirt therefrom. Of course these approaches aremerely exemplary and in other embodiments other approaches may be used.

In some embodiments the buildup of material on the mirror surface may bedetected to determine when there is a need for cleaning. This may bedone for example by providing a mirror that has some significant lighttransmission properties as well as light reflective properties in themanner of a half-silvered mirror. For example a radiation source andsensor may be positioned behind the mirror. In such embodimentsradiation emitted by the radiation source is partially reflected fromthe interior of the mirror surface and the magnitude of the reflectedradiation is sensed by the sensor. A buildup of dirt on the outersurface of the mirror changes the amount of radiation reflected from theinternal radiation source to the sensor. In some exemplary embodimentsthe buildup of dirt on the exterior mirror surface increases themagnitude of radiation reflected from the internal mirror surface. Thischange in the magnitude of reflected radiation is detected and used asthe basis for determining a need for cleaning the mirror. For exampleimmediately after cleaning the mirror the ATM controller or otherprocessor may cause the emitter to output radiation and the sensor tosense the magnitude of internally reflected radiation from an internalsurface of the mirror. This initial value is stored by the controller inone or more data stores. Thereafter on a periodic basis, for example ona timed basis or after each or a set number of transactions, the emittermay again output radiation and the level of reflected radiation sensed.The controller may then compare the then current level of reflectedradiation to the initial value.

In response to sensing a difference greater than the set amount, whichdifference corresponds to an unacceptable level of dirt built up on anexterior surface of the mirror, the controller operates to provide oneor more signals. The signals result in the mirrors being cleaned. Suchsignals may include for example operating a device such as a motor orother mechanism so as to cause movement of the mirror to undergocleaning. Alternatively in some embodiments the controller may cause amessage to be sent to a remote servicer indicating a need for cleaningof the mirror surfaces on the fascia. In still other embodiments thecontroller may cause the machine to operate to try to clean the mirrorsthrough the internal cleaning mechanism and then test the reflectanceagain after the attempted self cleaning. If the self cleaning effortdoes not cause the reflectance value to reach the prior initial value orwithin a programmed range (indicating perhaps that the mirror has beenspray painted) the controller is operative to cause a message to be setto contact a remote servicer. Of course these approaches are merelyexemplary and in other embodiments other approaches may be used.

In some other alternative embodiments the controller may sense for dirton a mirror through the use of mirrors or other reflective devices thatpass at least some significant amount of light therethrough from theexterior to the interior. One or more light sensors in operativeconnection with the machine controller are positioned behind the mirrorsurface. An external light sensor is positioned on the exterior of themachine to sense the level of ambient light. A controller is programmedto determine an unacceptable level of accumulation of dirt on the mirrorbased on the level of external ambient light that is sensed as passingthrough the mirror. This may be done for example by sensing themagnitude of the signal from the ambient light sensor and comparing themagnitude of ambient light to the magnitude of light sensed as reachingthe sensor located behind the mirror. As can be appreciated when littleor no dirt is accumulated on the mirror surface, the greatest amount oflight will reach the sensor behind the mirror. As dirt accumulates, thelevel of light transmitted will decrease. If the magnitude of the lightsensed as passing through the mirror and reaching the sensor relative tothe level of ambient light declines to a preset ratio or other value,the controller may then operate in accordance with its programmedinstructions to operate the necessary device to self clean the mirror,generate signals so as to contact a servicer, or take other appropriateaction.

In further alternative embodiments one or more external ambient lightsensors may be in operative connection with the controller, and aninternal emitter and sensor behind a mirror surface that enables lightto pass therethrough may also be used. In such embodiments thecontroller may be programmed to analyze the amount of ambient light thatis expected to pass through the mirror and reach the sensor based on theambient light level. In such circumstances the controller can compensatefor the ambient light when sensing the level of reflected light from theinternal emitter. Such compensation may further help more accuratelydetect when there is a need for the mirror to be cleaned. Of course theparticular relationships and compensation levels will depend on theparticular mirror configuration. Alternatively or in addition in someexemplary embodiments, the controller may operate so as to sense thelevel of ambient radiation and the magnitude thereof that passes throughthe mirror to reach the sensor at a different time than when thecontroller operates the internal emitter and senses reflected radiation.The controller may be operative to compare these two separate values andthe relationship thereof and/or changes in reflectance and lighttransmissivity over time so as to determine when the mirror needs to becleaned. Of course these approaches are merely exemplary and in otherembodiments other approaches may be used.

In still other embodiments the mirrors may be operative only duringtransactions or portions thereof. This may be done for example byproviding mirrors that are operative only when a person is sensed asadjacent the machine or the machine is involved in conducting aparticular portion of a transaction. For example a sensor such as asonic sensor, radiation sensor, weight sensor or other suitable devicemay detect a user in proximity to the machine. Upon sensing the useradjacent the machine the controller may be operative to cause one ormore mirrors to be exposed externally on the fascia of the machine. Thismay be done for example by having movable members in supportingconnection with the mirror surfaces driven by motors or other suitablemoving devices that are in operative connection with the controllers.Upon sensing a user adjacent the machine the controller is operative tocause the motors or other moving devices to cause the mirrors to moveinto an operative position so a user can view the area behind them.

For example in some embodiments the reflective surfaces which comprisethe mirror may be in supporting connection with a rotatable member. Therotatable member may be rotated when the customer is present at themachine so that the reflective surface is positioned so as to providethe user with a view of the area behind them. Further, when the customeris sensed as leaving the area of the machine, such departure of the useris sensed and the controller in response thereto is operative to causethe members that include the reflected surfaces to move so that thereflector surfaces are no longer exposed. Such an approach may providean advantage in that the mirror surfaces are exposed to the elementsonly during the times when transactions are occurring and therefore areless likely to accumulate dirt as quickly. In addition, in someembodiments wipers or other suitable cleaning devices may be providedadjacent to the reflective surfaces so that as the reflective surfacesmove the surfaces are wiped and cleaned so as to remain relatively dirtfree.

Although in some embodiments the reflective surfaces may move into theoperative position for a customer responsive to sensing a user adjacentto the machine, in other embodiments other approaches may be used. Thesemay include for example moving the mirror surfaces to the operativeposition only in response to certain actions or certain transactiontypes being conducted by the user at the machine. Alternatively or inaddition the mirrors may be moved to the operative position only inresponse to other conditions such as ambient lighting conditions, thetime of day and/or the sensing of persons or objects entering an areabehind the user in which persons or objects are sensed. Alternatively orin addition the controller may be programmed and appropriate sensors maybe provided to move the mirrors to the operative position based on thenature of the use being made by the user of the machine. For example ina machine that is intended for both drive up and walk up use,appropriate sensors may be positioned so as to sense whether the user ispositioned in a vehicle or has approached the machine on foot. This maybe done for example through proximity sensors, magnetic sensors, weightsensors or other suitable sensors. The controller may be programmed tomake a determination based on one or more sensor inputs whether the useris in a vehicle or is on foot. In situations where the user isdetermined to be in a vehicle the deployment of the mirrors to theoperative position may be deemed unnecessary because the vehicle mayserve to block access by unauthorized users to viewing the inputs thatthe user makes to the machine. Alternatively if the user is determinedto have approached the machine on foot, the controller may be operativeto deploy the mirrors to the operative position so as to assure that theuser can view the area behind them in which unauthorized persons may beattempting to view inputs to the machine.

In still other embodiments, alternative or additional provisions may bemade to further help to prevent the observation of inputs by users tothe machine. For example in some embodiments the machine fascia may beprovided with lighting that is directed rearward from the fascia outsideof the line of sight of the user. Such rearward directed lighting, whenactivated, may operate to obscure the view of unauthorized persons ordevices attempting to observe inputs by the user to a machine. Suchrearward directed lighting may be selectively operative when a user issensed as adjacent to the machine so as to reduce the risk of theinterception of the user inputs and/or to provide lighting in the areabehind the user. In other embodiments the controller may be programmedso as to be operative to initiate the rearward directed lighting onlyduring certain portions of the transaction where the user is conductingcertain activities. For example the controller may be programmed so asto activate the lighting when the user is providing an input of a PINnumber which unauthorized persons may wish to intercept. Further in someembodiments the rearward directed lighting may be activated only atthose times that the mirrors are moved into the activated position.Alternatively or in addition the lighting devices may be mounted insupporting connection with the mechanisms associated with the mirrorstructures. Further provision may be made in some cases so as to providemechanisms for cleaning the lighting devices as they are moved into theoperative position. Of course these approaches are exemplary and inother embodiments other approaches may be used. Further, the principlesdiscussed may be used with other types of automated banking machines andin other circumstances other than those described in connection with theexemplary embodiment.

FIGS. 28-31 are directed to yet other exemplary embodiments to furtherhelp to prevent the observation of inputs by users to the machine byunauthorized persons. As shown in FIG. 28 a user input device which inthe exemplary embodiment comprises a keypad 18 comprising a plurality ofkeys, may be covered by a concealment device generally denoted 350. Asshown in FIG. 29, the concealment device 350 may include a body which isalternatively referred to as a casing 354, including top cover 358,first and second side walls 360, 362, respectively, and back wall 366which bound an interior area. Elements of the exemplary casing 354extend in generally surrounding relation of the keypad and in thisembodiment cooperate to form a viewing portal 370. A viewing portalcomprises an area in which a user can view the input device and theactuation thereof by the user such as by a user's fingers which arealternatively referred to herein as digits. In the exemplary embodimentshown viewing portal 370 is formed by a gap between the top cover 358and back wall 366, although various other approaches may be used. Forexample, the top cover 358 may abut back wall 366 and viewing portal 370may be cut out of the top cover 358. Viewing portal 370 mayalternatively be an open slot, or it may be formed of transparentmaterial. Alternatively, the viewing portal may comprise othercombinations for indirect viewing and may include for example a cameraor other image device in the casing, and a display positioned in alocation for viewing only from a point of view of the machine user. Insome embodiments the display may be the display of the machine, such asdisplay 24. Alternatively the viewing portal may comprise one or moredisplays supported on the casing 354, the machine fascia 12 or otherlocation that limits viewing of the inputs being made only to themachine user.

The elements of casing 354 cooperate to define an interior area 374. Theuser input device or keypad 18 may be accessible to a user through handentry slot 376 which is bounded by the casing. The user in thisembodiment is enabled to extend one or several fingers and a portion oftheir hand in the slot to actuate the keys of the keypad.

With reference to FIG. 30, concealment device 350 includes an indirectviewing mechanism generally denoted 378. In this exemplary embodiment,the indirect viewing mechanism 378 includes reflecting surfaces withinthe interior area. A first mirror 380 is disposed on an interior surfaceof the top cover 358. A second mirror 382 may be positioned on aninterior surface of back wall 366. In the exemplary embodiment, firstmirror 380 is operable to reflect an image of user input device; in thisexample keypad 18 toward the back wall 366. Second mirror 382 isoperable to reflect that image so that it can be viewed through theviewing portal 370. The viewing portal 370 is arranged to allow a userto view the reflected image from a viewing position in the user's lineof sight 386. Thus indirect viewing mechanism 378 utilizes theproperties of reflected light in order to allow a user to indirectlyview inputs as they are being made by the user's fingers to keypad 18.The double reflection of the image of the keypad 18 presents an image incorrect orientation to the user.

The arrangement and user's required body position necessary to extend ahand through the opening to actuate the keypad may prevent unwantedviewing of the user inputs from a position directly behind the user andthe casing 354 operates to cut down on sight lines from viewpoints onthe top and sides. In this exemplary embodiment, input device 18 cannotbe readily viewed by a person other than one having a point of view ofthe user of the banking machine, thus enhancing the security of anyinput made.

A user may thus use the automated banking machine with greaterconfidence that various inputs, including a PIN, may not be readilyviewed by another. Also, the exemplary embodiments of the concealmentdevice 350 prevent unauthorized devices that may be positioned to viewthe machine fascia such as cameras, from viewing the input of the user'sPIN.

In yet another exemplary embodiment, an exemplary casing 354 isselectively positionable with respect to the user input device 18between a covered position, as illustrated in FIG. 27, and an uncoveredposition, as illustrated in FIG. 31. The casing 354 or a portion thereofmay be mounted in supporting connection with the fascia 12 via one ormore hinges 390 or other supports which enable movement thereof. In thisexemplary embodiment, hinge 390 extends between first side wall 360 andfascia 12 to allow selective positioning of casing 354. Thus, in thisembodiment if a user believes that the added security of the concealmentdevice is unnecessary under the circumstances, the casing 354 can bemoved from its covered position to an uncovered position to allow directviewing of the keypad 18.

In alternative embodiments the device may include a movable cover forsecurely providing access to the input device. For example the top cover358 may be mounted in movable supporting connection with the casing. Thetop cover may be movable to an open position such that the input devicebecomes more accessible when the cover is moved from a closed positionto an open position. In some embodiments based on the mounting, the sizeof the opening may be increased as the movable cover is moved from theclosed position to the open position. In some embodiments a user may beable to open and close the cover or other enclosure as they deem fit. Inalternative embodiments the casing may be held closed by a lock or otherlatching mechanism. The lock or latching mechanism may be opened by aservicer or other authorized person for servicing such as cleaning orother maintenance functions. Of course these approaches are exemplaryand in other embodiments other approaches may be used.

In yet another exemplary embodiment, an exemplary concealment device 350may include a lighting mechanism such as light 394, operable toilluminate interior area 374. The illustrated positioning of thelighting mechanism is merely exemplary and in other embodiments, otherapproaches may be used. For example, the lighting mechanism may beincorporated into the keypad 18, or may be mounted on the interior ofthe top cover 358. For example, the keypad may include a backlightingmechanism such that the keys are illuminated. Such an illuminationmechanism may be combined with a mechanism that detects unauthorizeddevices that are intended to intercept a user's inputs. Such a system isshown in U.S. patent application Ser. No. 10/832,960 filed Apr. 27, 2004which is incorporated herein by reference as if fully set forth herein.Alternatively or in addition, embodiments may include backlighting ofthe input device and lighting of the interior area from a directionother than that of the face of the input device. Such apparatus may helpin viewing the user's fingers in actuating the keys of the keypad. Insome alternative embodiments lights of difference colors may be used tofurther aid in viewing the input device and the user's fingers. Forexample in some embodiments the keypad may be backlit in one color whilea light of a different color within the casing primarily illuminates theuser's fingers. This may make it easier to view the user's fingers inrelation to the keys of the keypad. Of course this approach is exemplaryof many that may be used.

In still other embodiments provisions may be made to facilitate viewingthe casing. For example in some embodiments, particularly those designedfor use in an outdoor environment, moisture may tend to condense withinthe interior area of the casing. In some embodiments devices forminimizing condensation may be provided. Such devices may include forexample, an air movement device such as a fan schematically indicated396. The fan may be operative responsive to a controller or other deviceto cause air movement in the casing and minimize condensation ofmoisture. In some embodiments a heater 398 may be provided to heat airwithin the casing. The heater may be operative responsive to thecontroller in the machine or other controller to heat the air within thecasing so as to reduce the risk of condensation.

In some embodiments sensors may be provided in or adjacent to the casingto detect conditions that likely result in condensation. These mayinclude temperature and/or humidity sensors that are used to senseconditions that result in condensation. In response to such conditionsthe heater and/or the fan are caused to operate. Alternatively or inaddition, sensor systems of the type previously discussed in connectionwith the detection of the need to clean the mirrors 338 and 340 may beused in connection with the reflective surfaces within the casing. Forexample, such approaches may be used for detecting condensation on thesurfaces and may cause a controller to turn on and off the fan and/orheater as appropriate. Alternatively or in addition, signals fromtemperature and/or humidity sensors may also be used in the programsexecuted by the controller in deciding what actions to take.Alternatively in some embodiments, provision may be made for signalingthe need for cleaning the reflective surfaces in a manner similar tothat discussed in connection with the mirrors 338 and 340. Alternativelyor in addition, provisions may be made in some embodiments for providingfor automated cleaning thereof. It should further be understood thatalthough the fan and heater are schematically shown in the casing, insome embodiments such devices may be positioned within the housing ofthe ATM and suitable fluid conduits provided to achieve air flow and/orheating within the interior area of the casing. Of course theseapproaches are exemplary and in other embodiments other approaches maybe used.

In some embodiments sensors may be provided to detect attempts toinstall unauthorized input interception devices. These may include forexample, sensors that sense radiation properties within the interior ofthe casing so as to detect installation of an unauthorized device fordetecting the pressing of keys. Alternatively devices for impartingvibration to the fascia and/or casing and sensing changes in vibrationproperties may be used to detect the presence of an unauthorized device.Alternatively or in addition, sensors which detect changes in levels orfluctuations in radio frequencies may be installed to detect theinstallation of a radio transmitter associated with an unauthorizedinput interception device. Approaches described may also be of the typedisclosed in the incorporated disclosure of U.S. application Ser. No.10/832,960. Controllers in operative connection with such sensors whichdetect unauthorized input interception devices may be operative tonotify a remote entity, modify operation of the machine, initiatecountermeasures to prevent input interception, invalidate user cardsand/or cause the machine to cease operation. Of course these approachesare exemplary and in other embodiments other approaches may be used.

In alternative embodiments other approaches may be used to minimizeinterception of inputs by unauthorized persons. For example in someembodiments the reflective surfaces may be configured such that a user'seyes must be positioned in a particular location to readily observe thekeypad and fingers. As a result, an unauthorized person or deviceattempting to observe user inputs in a position that is remote or evenrelatively close to a user's position cannot actually observe theinputs. This might be done for example by using contoured mirrorsurfaces that enable a clear image only from a point of view in aparticular location. In alternative embodiments the reflective surfacesand/or the casing may be made to be movable by the user. This could bedone through a movable mounting of the casing in supporting connectionwith the fascia of the machine such that the user can precisely positionthe spot at which the inputs may be readily observed. In somealternative embodiments the keypad or other input device may also bemade movable such that the user can precisely position the portal forviewing. Such approaches may also make the machine more readily suitablefor use by both left and right hand users as well as persons of varyingheights. Of course, these approaches are exemplary of many that may beused.

Of course as previously discussed, some embodiments may have an imagingdevice in the casing and may provide outputs for viewing on one or moredisplays. In some embodiments provision may be made to enable a userthrough hand and/or finger movements to adjust the position of one ormore display screens or the position of the output image within a fieldof view such as on the machine display. For example, a display screenmay be positioned on the casing, and may be movable with or relative tothe casing to a desired position by the user to minimize the risk ofinput observation. Alternatively if an output though the display isused, the user may position a frame showing the user's fingers and inputdevice selectively on the display in a way that assures it is blockedfrom viewing by others.

In some embodiments the display screen may be operative only duringselected time periods during transactions when inputs to the inputdevice are possible or required. For example, an image of the keypad andthe user's fingers may appear only in a portion of the display during atransaction when the machine is in condition to receive confidentialinputs. For example, the image may be output when a user is required toinput a personal identification number (PIN). At other times the imageof the input device may not be presented. Alternatively one or moresensors may sense the introduction of the user's fingers into theinterior area of the casing and cause a controller to provide screenoutputs. This may be appropriate for example in situations where a userenters various inputs such as a PIN, amounts or other instructions atvarious times during various transactions.

Further, in some embodiments a controller may be programmed to sensethat a user is using voice guidance features for operating the machine.This might be done for operation of the machine by a visually impairedperson. In such circumstances the machine may sense that a user hasconnected headphones to a headphone jack on the machine to receive audioinstructions. In such embodiments the controller may operate to shut offor restrict viewing through the viewing device. This may include nothaving the image of the input device appear on the machine display orother screen. Alternatively in other embodiments the controller may notactuate the lights that enable viewing the input device in the casing.Of course difference approaches may be used depending on the particularembodiment.

It should be understood that while the exemplary embodiment is discussedas being in connection with a keypad, other embodiments may be used withother types of banking machine input devices.

FIGS. 32 and 33 disclose an alternative embodiment that prevents theunauthorized viewing of customer inputs to a keypad of an automatedbanking machine. This exemplary embodiment includes a cover 400. Cover400 overlies at least a portion of all of the keys 402 of a keypad 404.Cover 400 of this exemplary embodiment includes a top portion 406. Cover400 also includes a pair of tapered side wall portions 408. Top portion406 and wall portions 408 bound an opening 410. Opening 410 enablesusers to extend their digits through the opening generally in thedirection of arrow M so as to enable a user to engage all of the keyengaging surfaces of the keys which make up the keypad.

In this exemplary embodiment the cover 400 is attached to a fascia 412.Fascia 412 includes a rectangular depression or recess 414. The taperedwall portions 408 terminate in inturned flange portions 416. In theexemplary embodiment the flange portions are sized so as to extend incorresponding shaped recesses or pockets within the recess 414 of thefascia. In the exemplary embodiment the inturned flange portions 416engage the fascia in the pockets and are held in fixed engagementtherewith through adhesive or other fastening devices. As can beappreciated from FIGS. 32 and 33, the exemplary embodiment provides forthe tapered side walls 408 to extend upward from the recess 414 in thefascia in close abutting engagement with the generally verticallyextending walls of the fascia which bound the recess. This helps tominimize the risk of vandalism in which the cover 400 is pried off thefascia.

In the exemplary embodiment the top portion 406 is generally tapered sothat the top portion extends closer to the upper surface of the keyswhich make up the keypad with increasing distance from the opening 410.It should be understood however that the inner surface of the topportion remains sufficiently disposed from the keys so as to providesufficient digit access thereto. Also in the exemplary embodiment thetapered side wall portions 408 taper inwardly with increasing distancefrom the surface of the keys and join with the top portion. In theexemplary embodiment the cover 400 is integrally formed of suitableplastic or other durable material. Of course in other embodiments otherapproaches may be used.

The exemplary cover 400 is constructed such that the tapered side wallportions 408 are comprised of generally nontransparent material whilethe top portion 406 is comprised of transparent material. This helps toassure that a user having a point of view of that of a user of themachine is able to view the keypad and the engagement of his or herdigits with the keys through the top portion. Persons attempting tointercept the inputs of the machine user generally do not have theability to intercept visual signals near the point of view of themachine user and are blocked from viewing the manual digit engagement ofthe keys by the generally nontransparent sidewalls 408.

In this exemplary embodiment cover 400 includes on the top portion 406 aplurality of elongated outward extending projections 418. The outwardextending projections which are alternatively referred to herein as ribsextend generally along the direction of Arrow M. Extending between theprojections 418 are visual openings 420. In the exemplary embodimentvisual openings also extend on the top portion outboard of the furthestprojection on each lateral side to the point where the top portionengages the tapered side wall portion. The visual openings provide forgenerally undistorted viewing of the keypad and the manual digitengagement of the keys by the user through the top portion. Theelongated projections 418 operate to distort the view of the keys byunauthorized persons not having the point of view of the machine user.Thus in the exemplary embodiment even if an unauthorized person is ableto place a camera or other viewing device in reasonable proximity to thetop portion of the cover, the requirement to have the viewpoint of thecamera offset from the point of view of the user results in theprojections preventing the camera from having a clear view of the user'sinputs. Of course this approach is exemplary and in other embodimentsother approaches may be used.

In some embodiments of the cover 400 the elongated projections 418 maybe configured so as to prevent the viewing therethrough even fromcertain points of view of a machine user. In such embodiments themachine user's view of the keypad from a narrow range of positions issufficient through the visual openings 420 to provide the necessaryinputs. In other embodiments the projections 418 may be configured sothat moderately distorted viewing is possible therethrough from thepoint of view of the machine user. In such cases the distortion from thepoint of view of the user is limited, while viewing from a viewpointangularly disposed from the machine user's point of view, issufficiently distorted so that it is not reasonably possible todetermine the user's manual inputs.

In alternative embodiments rather than having projections that extendoutward from the top portion of the cover, the projections may extendinwardly so as to provide sufficient distortion in viewing from otherthan a user's point of view to reduce the risk of inputs beingintercepted. In still other embodiments the projections may extend invarious directions and in different ways as is appropriate to achieve areduction in the risk of unauthorized viewing. In still otherembodiments projections may be included on covers so that although theentire cover is comprised of transparent materials, the projections areconfigured to make viewing through the cover reasonably impossible fromall but the desired point of view of the authorized machine user. Someembodiments may include features such as those previously discussed, tofacilitate viewing by the authorized user. This may include for example,providing lighting within the cover so as to facilitate viewing by theuser. Such lighting may include the provision of fiberoptic strands orother suitable light guides to facilitate the output of light of asuitable type so as to enable the provision of inputs by a user.Similarly fiberoptic outputs may be used to emit light from surfaces ofthe cover that help to obscure viewing of user inputs from viewpointsother than the user's point of view. This may be done selectively and attimes during transactions when the machine is in a state to receive userinputs. This may be accomplished by at least one processor in themachine controlling the output from one or more light sources.

Further alternative embodiments may also include provisions fordetecting and minimizing the risk of condensation within the cover. Thismay include for example, providing sensors for detecting condensationeither inside or outside the cover. This may include for example sensorswhich sense the transmission of the light through the cover or whichdirectly detect the presence of moisture. Such sensors may be inoperative connection with one or more processors within the machine sothat the machine can take appropriate steps to eliminate the problemand/or if the problem cannot be detected as having been remedied afterthe machine takes action, to cause the machine to notify an appropriateentity such as a service company. For example in some embodimentsprovision may be made for the machine to cause a flow of air to bedirected beneath the cover on a periodic or continuous basis. Such airflow may be controlled so as to minimize the risk of condensation orother conditions which obscure viewing through the cover. It shouldfurther be understood that the techniques described in connection withdetecting the accumulation of dirt on viewing mirrors may also beapplied to assuring the sufficient clarity of the top portion of thecover so as to enable operation of the machine by users. Of course theseapproaches are merely exemplary and in other embodiments otherapproaches may be used.

FIG. 39 shows an alternative cover 422. Cover 422 is generallyconstructed and operated in a manner similar to cover 400 except asspecifically discussed. Cover 422 of this exemplary embodiment has a topportion 424 and sidewall portions 426 comprised of generallynontransparent material. In this exemplary embodiment top portion 424includes a plurality of parallel slots 428 which serve as visualopenings. In this embodiment the visual openings 428 are openingsthrough the top portion of the cover that are sized and spaced such thata user in a limited range of viewing positions at the user interface ofthe banking machine is enabled to see their manual digit engagement withthe keys of the keypad underlying the cover through the openings. Theexemplary openings are configured such that an unauthorized person orviewing device that is angularly disposed from the point of view of themachine user, is unable to adequately view the keys engaged by a userwhen performing a transaction. For example in this exemplary embodimentunauthorized users attempting to intercept inputs from a viewpoint tothe side of the machine user do not have sufficient visual access to thekeys to see what keys are being engaged. However, the openings willenable the machine user to see what keys the user is pressing.

Of course it should be understood that this approach is exemplary and inother embodiments other approaches may be used. This may include forexample, providing visual openings of various dimensions, configurationsand sizes in lieu of the elongated openings shown. As can be appreciatedarrangements of visual openings of various shapes and sizes may providea machine user within a suitable range of points of view with anadequate view of the keys of the keypad while obscuring viewing byunauthorized users. As can be appreciated in exemplary embodiments theability of the covers to require that a user position their head andeyes in a particular area to view digit engagement with the keys, urgesthe machine user to position their body at the machine in a way thatfurther blocks unauthorized observation of the user's inputs.

In alternative embodiments other approaches to producing the visualopenings may be used. This may include for example, embedding materialswithin the cover so that the cover includes certain areas that aretransparent and other areas that block viewing from a viewpoint disposedfrom the point of view of a user. Alternatively in some embodiments aplurality of structures, markings or other suitable devices may beincluded within the cover so as to only enable viewing therethrough froma permitted direction or location. This may include for example,achieving a light polarizing effect. Such effect may enable the personhaving the point of view of a machine user to be able to readily seethrough the top portion of the cover, while a device or person viewingthe cover from an angle of incidence beyond the narrow range of a user'spoint of view is unable to see through the cover. In still otherembodiments covers may implement electro-optic features to control thepoint of view from which user inputs can be detected. This may includefor example including liquid crystal materials in at least a portion ofthe cover. The opaque or visible properties of the cover with respect tothe field of view of the user may be controlled responsive to operationof at least one processor in the machine. For example the liquid crystalmaterial may be activated in a selected area of the cover to enableviewing therethrough. On other areas the liquid crystal material remainsopaque. In still other embodiments electro-optic properties such asproviding a polarizing effect or Fresnel lens effect may be achieved tolimit observation of the keys to a field of view of the user. In stillother embodiments liquid crystal material within the cover may be usedto provide a Fresnel lens effect which achieves magnification of thekeys for a user. This may be selectively controlled through operation ofa processor in the machine. Changes in magnification or focus effectsachieved with the liquid crystal may be based on the user inputs to themachine or data stored remotely of the machine which is operative todetermine when a particular user or user type is identified as operatingthe machine. For example if a user is sensed as connecting headphones tothe machine so as to operate the machine in response to audio outputs,the at least one processor may operate to obscure all viewing of thekeypad through the cover. Alternatively if a machine user indicates oris otherwise identified as one who requires magnification, the Fresnellens properties may be used to provide magnification. Of course theseapproaches are exemplary and in other embodiments other approaches maybe used.

FIGS. 37 and 38 show yet another alternative exemplary keypad cover 430as well as an exemplary method used to install the cover on a fascia 432of an automated banking machine. Cover 430 of the exemplary embodimentis generally similar in construction to cover 422 except that cover 430includes one relatively large opening 434 in the top portion thereof. Asrepresented in FIG. 38 opening 434 when the cover is installed overliesat least some portion of the keys 436 of the keypad 438. However, asshown in FIG. 38 a user is still enabled to view all of the keys fromthe point of view of a user operating the user interface of the machine.

A top portion 440 of the cover bounds the opening 434. Tapered sidewallportions 442 extend outward from the top portion as is the case with thepreviously described embodiments. The tapered sidewall portions eachterminate in inturned flange portions 444.

In the exemplary embodiment the fascia 432 includes a generallyrectangular recess 446. The recess is bounded by generally verticallyextending fascia walls 448 on each transverse side of the recess 446.The vertically extending walls extend from an outer fascia wall surface447 to the fascia face within the recess. Extending between the keypad438 and the fascia walls 448 on the fascia are a pair of pockets 450. Inthe exemplary embodiment the pockets 450 are recessed within the fasciaface and extend below a plane in which the upper surfaces of the keys436 generally extend when they are not being depressed. The exemplarypockets are sized so that the inturned flange portions 444 are acceptedinto the pockets when the cover is installed.

As can be appreciated from FIGS. 37 and 38, in the exemplary embodimentwhen the cover 430 is to be installed, the cover is moved relative tothe fascia such that the flange portions 444 are engaged in the pockets450. The flange portions 444 serve as engaging portions which areaccepted in the pockets. In the exemplary embodiment the cover 430 isheld in engagement with the fascia through adhesive which is applied inthe pockets. This adhesive may be applied on media such as a suitabletape based material or alternatively as a liquid or solid adhesivematerial. As can be appreciated the adhesive holds the cover 430positioned as shown in FIG. 38 in engaged relation with the fascia. Inthe exemplary embodiment the size of the flange portions and the pocketswhich are engaged hold the cover and fascia together are sized so as tominimize the risk of the cover being pulled off due to vandalism.Further the proximity of the sidewall portions 442 to the fascia walls448 of the exemplary embodiment minimize the risk of an unauthorizedperson prying the cover off the fascia. However, in the exemplaryembodiment if sufficient force is applied to the cover to tear it offthe fascia, the pockets are sized so as to allow the cover to be removedwithout causing permanent damage to the fascia. This is achieved in anexemplary embodiment by controlling the area of adhesive contact to thearea of the pockets and the strength of the adhesive. This approachassures that the adhesive will release before the cover or the fasciabreaks. Alternatively in some embodiments a similar result may beaccomplished by providing weaker areas in the cover at or above each ofthe flange portions. These weaker areas may serve as frangible portionsthat break in responsive to applied force before other areas release orbreak. In some embodiments the point of breakage may be configured sothat a new cover can be installed without removal of the prior flangeportions. For example, the flange portions of the replacement cover maybe attached to the flange portions of the cover that has otherwise beentorn away. As a result a new cover can be installed through the methodpreviously discussed, generally without the need to make other repairsto the fascia of the banking machine.

Of course it should be understood that these approaches are exemplaryand in other embodiments other approaches may be used.

FIGS. 34 through 36 and 40 show yet another alternative embodiment of anapparatus for reducing the risk of interception of a user's confidentialinputs through a keypad. In this embodiment an automated banking machineincludes a fascia 452. The fascia 452 includes a generally rectangularrecess 454 which is bounded laterally by a pair of fascia sidewalls 456.The keypad 458 which includes a plurality of keys 460, is positioned soas to be manually accessible in the recess. As is the case with thepreviously described embodiment, users of the automated banking machineare enabled to provide inputs through manual digit engagement with thekeys of the keypad. The keys of the keypad generally extend within aplane which extends within the recess of the fascia.

This exemplary embodiment comprises a pair of movable panels 462 and464. The panels are disposed on opposed lateral sides of the keypad 458.Each of the panels is mounted in supported connection with the machinethrough a hinge connection (not separately shown). The hinge connectionof the exemplary embodiment comprises a structure which enables eachrespective panel to move rotationally about an axis of the hingeconnection adjacent to the area where the panel is connected to thefascia.

In the exemplary embodiment panels 462 and 464 are enabled to be rotatedabout the hinge connection between a first position and a secondposition. The first position which is shown in FIGS. 35 and 36 is aposition in which the panels extend generally upwardly relative to thefascia so as to prevent viewing of a user's inputs through the keys,from a position other than the point of view of the machine user. In theexemplary embodiment shown in FIGS. 35 and 36 in the first position ofthe panels, the panels also generally overlie some of the keys of thekeypad. In this way the panels are enabled to restrict viewing of thekeypad by unauthorized persons while at the same time enabling the userto view the keypad so as to provide their necessary manual inputs suchas a PIN number. It should be understood however that although theexemplary embodiment shows the panels extending at an angle in overlyingrelation of at least some of the keys of the keypad, other embodimentsmay provide for the panels to be in a different position so as torestrict viewing. This may include for example the panels moving to aposition generally perpendicular of the fascia and the plane in whichthe keys of the keypad extend. In some embodiments movement of thepanels to a position generally perpendicular to the keys may besufficient for purposes of restricting unwanted viewing of the keypad.

In the exemplary embodiment the panels 462 and 464 are enabled to moveto a second position shown in FIG. 34. In the position shown in FIG. 34the panels do not overlie the keypad and are not generally operative torestrict viewing from a wider range of viewpoints that are outside theviewpoint of a machine user operating the machine. The panels may bepositioned in the second position for purposes of a user providingnonconfidential inputs through the keypad such as amount data ortransaction selection data.

In some exemplary embodiments, panels 462 and 464 are manually movableby a user at the banking machine. In such embodiments a user who isabout to input confidential data may move one or both of the panels fromthe first position to the second position so as to reduce the risk ofunauthorized observation of the user's input of confidential data suchas their PIN number. Thereafter when the user has completed the PINnumber input the user may manually move the panels to the secondposition. Alternatively in this embodiment if the user is concerned thata person may be attempting to observe their inputs from a particularside of the machine, the user may elect to move only one of the panelsto the first position so as to obscure viewing from viewpoints on thatparticular side. Alternatively or in addition the user may move theirpoint of view to a side away from the panel in the first position. Inthis way the user can control the panels and reduce the risk ofobservation by other individuals. Of course in this embodiment the usermay also determine that no one is nearby and they wish to leave thepanels positioned in the second position at all times regardless of thenature of the inputs being provided through the keypad.

In exemplary embodiments the panels 462 and 464 may be held in theposition in which they are manually placed through the effect ofgravity. Alternatively in other embodiments the panels may bespring-loaded so that for example they are held by gravity in the firstposition but when a user moves them rotationally beyond a particularangle, they are biased toward the second position. Alternatively each ofthe panels may be biased toward the first position as well as toward thesecond position depending on the angle to which they are manually moved.Various approaches may be taken depending on the nature of the system.

In some embodiments the panels and/or the structures which comprise thehinge connection may be attached to the fascia of the machine byadhesive or other materials that resist the removal of the panels, butare nonetheless frangible so that once excessive force is applied thepanels break away, reducing the chance of more substantial damage to thefascia. This can be done for example in the manner previously discussedby providing a hinged connection or other suitable connection through aflange portion which is held by adhesive in appropriately sized pocketsof the recess of the fascia. Thus if the machine is subject to vandalismand a panel is torn off, a replacement panel may be readily applied.Further it should be understood that while the exemplary embodiment hasrectangular panels of the shape shown, other embodiments may includeother shaped panels or mounting mechanisms.

While the exemplary embodiment may include manually movable panels,other embodiments may include panels in operative connection with drivesor other movement devices so as to automatically move the panels atappropriate times during transactions. Such a system is schematicallyrepresented in FIG. 40. In this system panel 462 is shown in operativeconnection with a drive 466 and panel 464 is shown in operativeconnection with a drive 467. Of course it should be understood thatdrives 466 and 467 may comprise suitable movement devices such asmotors, solenoids, actuators or other movement devices. Further suchdrives may include transmission mechanisms which limit the applicationof force to the panels and reduce the risk of damage in the event offorced manual movement of the panels or if the panels are prevented frommoving due to an obstruction. Various suitable force-limitingtransmission mechanisms may be devised that are suitable for theparticular embodiment by those having skill in the art.

In the exemplary embodiment at least one processor operating in theautomated banking machine may operate in accordance with its programmingto determine when the machine is ready to receive a confidential inputfrom a user. This may include for example the at least one processordetermining that the machine has reached the point in its operationwhere the machine is in condition to receive the input of a PIN from auser. Responsive to this determination the at least one processor isoperative to cause the drives 466, 467 to move the panels 462, 464 intothe raised first position. In this raised first position, the panels areoperative to generally block viewing of inputs to the keypad from aviewpoint other than the point of view of the machine user. Likewise insome exemplary embodiments the at least one processor may be operativeto determine when a machine user has completed the input of theconfidential data such as the PIN and to cause the drives to then movethe panels to the second position. Of course this approach is exemplary.

It should be understood that in some embodiments the at least oneprocessor may be operative to move the panels to the first position soas to restrict viewing, not only for the input of PIN data but alsounder other circumstances where confidential inputs may be required.Further in some alternative embodiments the at least one processor mayoperate only to provide certain movement for the panels. For example insome embodiments rather than having the panels moved to the firstposition by the drive, the user may be able to manually move one or bothpanels to the first position. After the at least one processordetermines that the user has completed providing confidential inputs orthat the user has completed a transaction, the at least one processormay operate to cause the drives to move the panel that the user haspreviously manually moved to the first position, back to the secondposition. In alternative embodiments the at least one processor mayoperate to cause the panels to be moved to the first position at adetermined point in a transaction, but may rely on a user to manuallymove the panels from the first position back to the second position.Further yet in some other alternative embodiments, the drives may beoperative to move the panels but the transmission mechanism may be suchthat the user can override the drives and move the panels to positionsas the user may desire at certain times or at any time during atransaction. Of course these approaches are exemplary and in otherembodiments other approaches may be used.

It should be understood that embodiments described with movable panelsmay incorporate features like those previously described in connectionwith other embodiments. This may include for example provisions toprovide lighting to facilitate user operation of the machine. Suchlighting may be incorporated in the panels or in other locations of thefascia so as to facilitate user operation. Alternatively or in additionin other embodiments lighting may be provided through the panels or inother locations so as to provide outputs which are effective to obscurethe viewing of user inputs. This may be done for example by providingfiberoptic output points or other lighting from the outputs of thepanels.

It should be understood that in other embodiments the panels and fasciamay have other configurations. This may include for example, panels thatrotate to lie flush relative to a fascia surface when not in use.Alternatively, panels may be retractable relative to the fascia. Forexample, the panels may move generally vertically to raise and lowerthem relative to the key pad at appropriate times. In still otherembodiments panel structures may be made to expand and retract atappropriate times. Of course, other approaches and structures may beused.

In still other embodiments provision may be made for changing propertiesof the panels or the covers. This may include for example providing fora liquid crystal material to be encapsulated within the panels or othertypes of covers previously discussed. Such a liquid crystal material maybe acted upon by electrical fields so as to selectively change thematerial in various selected regions from transparent to opaque. Thisenables the machine for example, to enable a portion of a panel or acover to be made transparent upon the sensing of the user's digit in anarea adjacent to the keypad. Alternatively or in addition provision canbe made for sensing the position of particular digits within a cover oradjacent to a panel using sensors such as infrared, optical, ultrasonicor other suitable sensors. One or more processors associated with themachine may operate pursuant to the sensed location of the user's digitto render the liquid crystal material transparent only in the vicinityof the particular digit while keeping the remainder of the cover orpanel opaque so as to minimize the risk of unauthorized viewing. Otherembodiments may incorporate polarizing features or Fresnel lens effectsto achieve visibility from the point of view of the user while reducingthe risk of unauthorized observation. Of course as previously discussedFresnel lens effects achieved through liquid crystal may also provideother desirable properties including magnification or obfuscation. Inaddition responsive to operation of at least one processor in themachine the effects achieved may be varied responsive to operation ofthe machine. This may provide for example limiting observationcapabilities to the point of view of the machine user during input of auser's PIN while enabling greater visibility of other portions of thecover during other transaction steps. Of course these approaches areexemplary.

Alternatively or in addition provision may be made for assuring thevisibility through such covers or panels using the principles previouslydiscussed for detecting or eliminating the buildup of dirt orcondensation. Further in alternative embodiments provision may be madeto minimize the effect of undesirable bacterial accumulation on the keysof the keypad. This may include for example providing for the dispersalof disinfectant material of a generally transparent nature onto thekeypad and within the interior and exterior surfaces of a keypad coverand panels. Aerosol materials including disinfectants may likewise beprovided in suitable locations adjacent to the keypad. This may beaccomplished for example through the programming of one or moreprocessors in the machine which enable a dispersal of an aerosoldisinfectant onto the keypad and adjacent structures on a programmedbasis. In some embodiments the machine may include a supply ofdisinfectant material. Suitable pumps and aeration devices may beprovided for delivering the disinfectant into and/or on the surfaceswhere bacterial growth is to be inhibited. Such dispersal of materialmay be accomplished responsive to operation of at least one processor ofthe machine to correspond to particular conditions. This may include forexample at times when the machine is not operating to conducttransactions. The at least one processor may also operate in accordancewith its programming to provide the antibacterial material whenenvironmental conditions are suitable such as temperature and humidityare within particular ranges. In still other embodiments the machine mayinclude a device for generating ozone. Such generation may be doneresponsive to operation of the processor and the ozone materialdelivered at appropriate times and in appropriate areas for purposes ofdisinfecting areas of the machine. Of course these approaches areexemplary.

Alternatively or in addition air flow provided from the machine in thearea adjacent to a cover or panels so as to reduce the risk ofcondensation may also include the dispersal of an aerosol disinfectantinto the area adjacent to the keypad. Of course it should be understoodthat a supply of such disinfectant may be provided in the machine andmay be included for example so as to provide suitable disinfecting atpoints where users would generally be expected to come in contact withthe machine in addition to the keypad. This may include for example thearea adjacent to card readers, function keys, touch screens or otherlocations which provide user contact. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In some embodiments the machine may include a supply of disinfectantlotion that is suitable for application to a user's hands. The machinemay include a suitable pump and outlet in connection with the supplythat provides for output of the disinfectant lotion from the machine ina way that enables the user to rub the lotion on their hands. Forexample, the at least one processor associated with the machine may beprogrammed to offer a user an option through an output device of themachine to select to have the disinfectant dispensed from an outlet sothey can apply it to their hands. This may be done, for example, when auser indicates they are ending their transaction session, which mayinvolve the return of their card from the machine. In response to theuser indicating through an input to an input device that they wish tohave such lotion, the processor will cause the pump to operate todispense an amount of lotion to the user. The user can then apply thelotion to their hands immediately after use of the machine.

Alternatively, some embodiments may offer the user an option to receivedisinfectant lotion near the start of a transaction session. This mayinclude for example, in response to a user input. This may be forexample, a manual input. Alternatively lotion may be dispensed inresponse to a sensor on the machine sensing a user's efforts todisinfect the machine, such as with a portable ultraviolet (UV) light aslater described. Alternatively the machine may be programmed to dispensedisinfectant lotion to the user unless the user provides an inputindicating they do not wish to receive the disinfectant lotion. Ofcourse these approaches are exemplary.

In still other alternative embodiments disinfectant may be dispensed ina packaged form. This may include, for example, dispensing a containerholding the disinfectant for a user's skin from the machine. In someembodiments, the disinfectant may be an antibacterial liquid or gelmaterial included in a generally flat containers, similar to foil orplastic packages used for holding food items such as small quantities ofketchup or mustard, which can be dispensed from the machine. In stillother embodiments the disinfectant may be on cloth or other substrate,and dispensed in a packet comprised of foil, plastic or other fluidtight material. Alternatively, such packages may be attached to sheetmaterials which may be dispensed form the machine in a manner similar tobills, envelopes or other sheet materials. The container may bereleasibly adhered to, or made an integral part of the sheet material.This may enable the material to be stored in containers and dispensedfrom the machine in a manner comparable to notes and other sheets.Alternatively, such disinfectant material may be placed in or on sheetsor envelopes and dispensed in a manner like that shown for envelopes inU.S. Pat. No. 7,103,958, the disclosure of which is incorporated byreference in its entirety. The approach of the incorporated disclosuremay also be used to dispense to a user the disinfectant material in anenvelope or other container. The waste material after use can then beplaced in the container and discarded in a suitable waste container whenthe user is done. In some embodiments the machine itself may accept thewaste material therein for disposal. In some embodiments a machine usermay receive such disinfectant from the machine either at the beginningor end of a transaction session. Further the machine may be operative tocharge some or all users for such disinfectant material. This may beaccomplished through the programming associated with at least oneprocessor of the machine.

In exemplary embodiments, to produce a suitable disinfectant, generallyflat fluid tight packets may be attached to sheets or envelopes ofmaterial which are sized to be dispensed by a sheet dispenser (orenvelope dispenser) in the machine. Such attachment may be through asuitable means that maintains engagement, such as by adhesive (forexample), staples or in the case of an envelope or other container,placing the package inside the envelope or container. The sheet (orenvelope which for purposes hereof will be considered sheet material) isthen placed in the machine for dispensing from the machine. The sheetmaterials with the disinfectant may be placed in a sheet holdingcassette of a type used to house currency notes form the machine. Thecassette may then be placed in the machine and the sheets withdisinfectant packages attached selectively dispensed to users.Alternatively the sheet materials may be placed in another location inthe machine from which they may be selectively dispensed.

Alternatively sheet materials may be formed to include integraldisinfectant holding packages. For example, sheet structures sized to bedispensed from the machine may be formed to include pockets therein inwhich disinfectant materials (or cloth or other substrates bearingdisinfectant materials) are housed. Such pockets may be bounded bymaterials which are generally fluid tight and hold the disinfectantsecurely until a user deliberately breaks the pocket to access thedisinfectant. For example, sheets with pockets may be formed by adheringsheet materials in a blister pack or other sandwich structure. Of coursethese approaches are exemplary.

Ultraviolet (UV) radiation may be used in some embodiments to provide adisinfecting function for manual contact points on a machine. FIG. 48shows a fascia 540 which includes a number of manual contact points onthe machine which may come into contact with the fingers of usersoperating the machine. These contact points include function keys 542. Aplurality of function keys 542 are positioned on each side of a display544. In this exemplary embodiment the function keys 542 are positionedbetween the display and a corresponding side surface 546 that extendsoutwardly from the fascia beyond the surface of the display in thefascia keys.

The exemplary machine in FIG. 48 also includes a keypad 548. Keypad 548includes a plurality of manually actuatable keys of the type previouslydescribed. Keypad 548 has in overlying relation thereof a keypad shieldor cover 550. Each of the keys of the keypad as well as the area withinthe keypad cover may be commonly contacted by user fingers in operationof the machine.

Also included in the exemplary user interface shown is a headphone jack552. Headphone jack 552 is adapted to receive plug in connectors fromheadphones used by visually impaired persons in the operation of themachine. An area adjacent to the headphone jack 552 will commonly becontacted by fingers of machine users particularly visually impairedusers.

The exemplary ATM also includes a card reader of the type previouslydiscussed which is in operative connection with a card reader opening556. The card reader opening is operative to pass magnetic stripe cardsor other card types therethrough. In the exemplary embodiment the cardreader opening is surrounded by a card housing 558. In the exemplaryembodiment the card housing is of the type that includes selectivelyilluminatable light indicators therein so as to facilitate the abilityof users to insert and receive cards through the card reader opening. Instill further embodiments the card housing may be of the type thatincludes features that are usable to detect the installation of anunauthorized card reading device adjacent to the card reader. Forexample the housing may be of the type described in U.S. patentapplication Ser. No. 10/722,067 filed Nov. 25, 2003, the disclosure ofwhich is incorporated herein by reference in its entirety. The areaadjacent to the card reader opening which includes the card housingconstitutes an area in which machine users to generally contact themachine with their fingers during the course of operation thereof.

The exemplary machine shown in FIG. 48 also includes a receipt printer.A receipt printer is in operative connection with a paper outlet 560.The paper outlet area generally indicated 562, extends generallyadjacent to the paper outlet in an area where users will commonlycontact the machine fascia when taking receipts that are printed by themachine during transactions. A cash dispenser outlet 564 is operative todeliver cash from the machine to users. In this exemplary embodiment thecash dispenser outlet is generally blocked by one or more gate members566 except when the machine is operating to deliver cash to a user.During such times at least one processor of the machine is operative tocause an actuator to move the gate member so that currency bills can beextended therethrough. A cash outlet area generally indicated 568includes an area that extends generally adjacent to the cash dispenseroutlet (and may include the outlet as well as the gate member thereof)and which users generally contact the machine with their fingers whenobtaining cash from the machine.

In this exemplary embodiment the machine further includes at least onecustomer sensor schematically indicated 570. Customer sensor 570 isoperative to sense users in proximity to the machine. In someembodiments the customer sensor 570 may include an optical sensor, asonic sensor, an ultrasonic sensor, inductance sensor or other typesensor suitable for detecting the presence of a person. It should beunderstood that although the sensor shown is positioned on the fascia,other positions and types of sensors may be used. These may include forexample, cameras in connection with devices which conduct analysis ofimage data that identify images that include a person adjacent themachine. Other types of customer sensors such as weight sensors, heatsensors or other types of sensors may be used. In the exemplaryembodiment the customer sensor is in operative connection with the atleast one processor of the machine so as to carry out steps such asthose that are hereinafter described.

In this exemplary embodiment a plurality of UV light sources arepositioned so as to emit UV light onto surfaces of the machine that arecommonly contacted by users' fingers in the course of conductingtransactions. In some exemplary embodiments a plurality of UV lightsources that output ultraviolet light in one or more of the UV-A, UV-Band/or UV-C bands may operate to cause ultraviolet light to be emittedin a manner that contacts surfaces of the machine. Such UV light contactmay be of sufficient length and intensity to kill germs and provide adisinfecting function on the surfaces of the machine that are routinelycontacted by user fingers.

In the embodiment represented in FIG. 49, a UV light source 572 shown inphantom, is positioned in supporting relation of the side surface 546 onthe right side of the fascia as shown. The UV light source 572 isoperative to cause UV light to contact the area of the fascia indicatedby the circular area 574. Area 574 includes function keys 542 on theright side of the fascia. A further UV light source 576 shown in phantomis in supporting connection with the opposed side surface 546. UV lightsource 576 emits UV light that contacts an area schematically indicated578 which includes the function keys 542 on the left side of the fascia.

In this exemplary embodiment the machine further includes a UV lightsource 580 in supporting connection with the keypad cover 550. UV lightsource 580 is selectively operative to output UV light and is operativeto cause the UV light to contact an area 582 that includes the keys ofthe keypad.

It should be understood that in still other embodiments UV light sourcesmay be positioned so as to cause UV light to contact the card area inthe area of the card housing 558, the paper outlet area 562 and/or thecash outlet area 568. Of course in other embodiments other or differentareas may be contacted by UV light so as to achieve disinfecting ofother customer contact points.

In the exemplary embodiment each of the UV light sources is in operativeconnection through appropriate circuitry with at least one processor inthe machine. The at least one processor operates in accordance with itsassociated programming to selectively cause the UV light sources tooperate and output such UV light in a manner that will facilitatedisinfecting the areas of the machine that are contacted by the UVlight.

In some exemplary embodiments UV light sources may also be included inthe interior of the machine housing. This may include for example UVlight sources that are operative to contact currency bills that arebeing accepted into and/or dispensed from the machine. In suchembodiments one or more UV light sources may be operative to cause UVlight to contact currency bills moving through one or more transports inthe machine. This will help to assure that currency bills received fromusers receive the benefit of disinfecting UV light contact prior to bestored in the machine. Likewise UV light sources in the machine maycause the UV light to contact passing bills that are moving toward amachine outlet so as to be dispensed from the machine. This will help toassure that bills received by customers are treated prior to receiptthereby.

Alternatively or in addition UV light sources within the machine may beoperated to disinfect an area inside a card reader in which cardsreceived from users pass during operation of the machine. This mayinclude for example a card transport area through which user cards aremoved to read such cards and hold them during operation of the machine.Such a card transport area as well as devices therein are shown in U.S.Pat. No. 7,032,245 the disclosure of which is incorporated herein byreference in its entirety. In some exemplary embodiments the UV lightsource may be operative to cause UV light to contact structures withinthe card transport area of a card reader during times that user cardsare not positioned therein. Alternatively or in addition, UV lightsources may be operated to cause UV light to contact user cardspositioned within the transport.

In still other embodiments UV light may be used to disinfect other typesof items that are received by or dispensed from the machine. Further insome embodiments other disinfectant techniques of the types previouslydescribed or other approaches may be used in combination with UV lightto disinfect items internally or externally of the machine as well as todisinfect points of manual contact with the machine.

In some exemplary embodiments the UV light sources are in operativeconnection with the at least one processor to facilitate operating theUV light sources at appropriate times. This includes for example,operating the UV light sources within the machine at times when itemsare being moved to be dispensed from the machine such as currency bills.The at least one processor may be operative to cause the UV lightsources within the machine to disinfect the currency bills as they aremoving toward the cash outlet opening in the machine. Likewise the atleast one processor may be operative in accordance with its programmingto cause a UV light source positioned adjacent to a card reader and acard transport area therein, to cause UV light to contact a user's cardin the card transport path as it is moved or otherwise positionedtherein. Likewise the at least one processor may operate at appropriatetimes to cause UV light to operate and disinfect items received by ordispensed from the machine.

The at least one processor may also be in operative connection with theUV light sources that operate to cause UV light to contact manualcontact areas of the machine so as to disinfect those areas of themachine. This may be done in some exemplary embodiments after eachtransaction session carried out by the machine. In this exemplaryembodiment a transaction session includes one or more transactionactivities carried out by a given user at the machine between when theuser's card is input to a card reader of the machine and a time when thecard is taken from the machine. For example the at least one processormay operate in accordance with its programming to determine that theuser has completed the transaction session and has taken their card. Theprocessor then operates to cause each of the UV light sources to outputUV light that contacts the respective associated manual contact pointsof the machine. This may be done for a time period as is appropriate todisinfect the areas contacted, which is generally a short period oftime. During this period the at least one processor may operate to causethe display of the machine to output at least one message instructingany users who may be waiting at the machine to wait while the machineoperates to conduct the disinfecting activities. Of course it should beunderstood that in some embodiments the display may not output a messagespecifically indicating the particular disinfecting activity that isoccurring. Once the activity is complete the at least one processor mayoperate to provide indicia which includes instructions for the waitinguser to begin their transaction session. Of course this approach isexemplary.

In still other embodiments the at least one processor may operate inaccordance with its programming to determine the nature of thetransaction conducted by the user who has completed the immediatelypreceding transaction session. The at least one processor may beprogrammed to have the capability to determine exactly what manualcontact points the user contacted in the course of performing theirtransaction. For example the user may have only contacted function keyson the one side of the display rather than both sides. Likewise the usermay have conducted transactions that would not have resulted in the userreceiving a receipt, and thus the user would not have contacted thepaper outlet area 562 of the machine. In such embodiments the at leastone processor may operate in accordance with its programming to onlycause the UV light sources corresponding to the particular areas thatwould have been manually contacted by the user to output UV light thatcontacts the corresponding machine contact areas. Such an approach mayserve to reduce the number of cycles in which UV light is output andalso reduce the exposure of the particular areas of the machine to theUV light which may have a tendency to degrade certain materials overtime.

In still other embodiments the at least one processor can operateresponsive to sensing a customer with the customer sensor 570 to causethe UV light sources to operate prior to the user commencing atransaction. For example upon sensing a customer approaching the machinethe at least one processor may cause the display to output at least onemessage advising the user to wait for a brief period while the machineis disinfected. During at least a portion of the time that this messageis output the at least one processor may be operative to cause the UVlight sources to disinfect the areas of the machine with UV light. Afterthe disinfection activity has occurred the at least one processor maythen be operative to output through the display at least one messageadvising the user to insert their card or otherwise initiate atransaction session. Alternatively or in addition embodiments may alsooperate to disinfect user contact areas both before and aftertransaction sessions. The user may also be offered disinfectant lotionor the dispense of a disinfectant material. Of course these approachesare exemplary.

In still other embodiments other approaches may be used to facilitatedisinfecting user contact surfaces of machines. FIG. 50 shows a handheldUV emitting unit 584. The exemplary handheld unit 584 is designed to bea relatively small size and suitable for a user to carry around in apocket, on a key ring or in another manner similar to a small portableflashlight or similar device. The handheld unit 584 includes inputdevices 586 that are used by a person to control operation of thehandheld unit. The input devices 586 are operative to selectively causethe unit to output disinfecting UV light as schematically represented bythe area 588.

In an exemplary embodiment a user may use the handheld unit 584 toselectively disinfect manual contact areas on a machine beforecommencing a transaction session. For example as represented in FIG. 51the user may direct a handheld unit to output UV light that contactssurfaces of the keypad cover and keypad. This may be done to enable theuser to disinfect the areas that they wish to contact on the machinebefore commencing a transaction session or during a transaction session.Likewise the user may operate the handheld device to selectivelydisinfect other manual contact areas on the machine.

Further in some exemplary embodiments the fascia may include one or moresensors schematically indicated 590. In the exemplary embodiment thesensors 590 are operative to sense UV light of the type that would beoutput by a handheld unit of the type described. Such sensors 590 are inoperative connection with appropriate circuitry including the at leastone processor. This enables the at least one processor to determine thata person is disinfecting areas of the machine. In some embodiments theat least one processor of the machine may operate in accordance with itsprogramming to perform various functions in response to sensing thedisinfecting action by the user. Such actions may include for examplecausing the processor not to actuate the UV light sources on the machinein response to sensing that the user is disinfecting the machinedirectly. This will avoid unnecessary operation of the UV light sourcesand help to prolong their useful life. Alternatively or in addition theat least one processor may operate to cause at least one output througha display that indicates to the user that the machine has sensed thatthey are disinfecting the machine and to instruct the user to inserttheir card when they are ready to proceed. Alternatively the machine mayoperate to offer the user a dispense of disinfectant.

Alternatively in some embodiments the at least one processor may operatein response to sensing the disinfecting activity by the user to causethe UV light sources on the machine to also operate. The at least oneprocessor may cause an output through the display in such circumstancesto indicate to the user that they need not disinfect the contact areasof the machine with their handheld unit as the machine is doing soautomatically. Such instructions would save the user the time andinconvenience of disinfecting the contact points themselves. It wouldalso give the user greater confidence that the machine is adequatelyperforming disinfecting activities. Of course these approaches areexemplary and in other embodiments other approaches that may be used.

FIGS. 43 through 44 disclose yet a further embodiment of the device forreducing the risk of unauthorized interception of user inputs providedthrough a keypad of a machine. A further fascia 470 includes a keypad472 including a plurality of keys that are actuatable by a user'sdigits. A cover 474 is used to minimize the risk of unauthorizedinterception of inputs through the keypad. Exemplary cover 474 includesa pair of tapered side wall portions 476. Side wall portions 476terminate in inturned flange portions 478. Inturned flange portions 478are attached to the fascia. Such attachment may be made in a manner likethat previously discussed. Cover 474 includes a top portion 480. The topportion 480 is tapered in a manner generally similar to that discussedin connection with cover 430. The top portion 480 and side wall portions476 bound an opening 482. Opening 482 overlies at least portions of someof the keys of the keypad in the exemplary embodiment. The opening 482also enables an ATM user to view engagement of their digits with all ofthe keys of the keypad.

As best shown in FIG. 43 the cover 474 includes a flap portion 484. Inthe exemplary embodiment, flap portion 484 is bounded on each transverseside by a slot 486.

In the exemplary embodiment the cover 474 is comprised of a flexiblematerial such as a molded urethane. The flexible material of thisexemplary embodiment is sufficiently rigid to generally maintain itsshape when a user's hand and/or digits are not present within the cover.However, in the exemplary embodiment the flexible nature of the cover474 enables a user to deform the cover through engagement with theirhand and/or fingers when providing inputs to the machine.

For example in the exemplary embodiment the flap portion 484 is enabledto be deformed by the back of the user's hand or fingers in a directionthat is generally upward and outward. The slots 46 facilitate theability of the flap portion to move as desired by a user. Thedeformation of the flap portion may in some embodiments enable a user tomore readily view keys of the keypad that are positioned beneath theflap portion in the undeformed condition of the cover. Likewise a user'shand can deform the side wall portions of the cover to facilitate accessand observation to selected keys. This approach can facilitate operationof the machine by the user. Further in exemplary embodiments thedeformability and resilient character of the cover may prevent damageand breakage to which covers of more rigid material may be susceptible.Of course it should be understood that although in the embodimentdescribed the entire cover is comprised of flexible material, in otherembodiments only selected portions may be comprised of such materialwhile other portions may be comprised of more rigid materials. Further,this exemplary embodiment may be combined with features of other coversand security devices that are described herein.

In still other embodiments a cover may be provided that is selectivelymovable responsive to at least one processor in the machine betweendifferent shapes. For example in an exemplary embodiment a coveroverlying the keypad may be selectively changed between an operativeposition in which a user can access with their digits all of the keys ofthe keypad, and a collapsed position in which at least some of the keysof the keypad cannot be accessed by a user. This may be accomplished inexemplary embodiments responsive to one or more processors of themachine that operate to place the cover in an operative position whenthe machine is in a state in which it is able to accept keypad inputsfrom the user. Similarly in some embodiments the at least one processormay cause the cover to be in the collapsed position when the machine isnot in an operative position to accept keypad inputs from the user. Inthe collapsed position the cover may operate to help to protect thekeypad from vandalism, the elements or other undesirable conditions. Ofcourse this approach is exemplary.

FIG. 45 shows an alternative keypad cover 488. Cover 488 is comprised ofsuitable flexible material that enables the deformation thereof. Cover488 includes a plurality of members 490 in supporting connectiontherewith. In the exemplary embodiment the members 490 may be comprisedof shape memory alloy material of a type that changes between differentshaped configurations based on the application of electrical energythereto.

In the exemplary embodiment of cover 488, the members are in operativeelectrical connection with a driver 492 which is operative to providesuitable electrical energy to cause the members 490 to change from afirst shape to a second shape. The at least one driver 492 is inoperative connection with at least one processor 494 of the automatedbanking machine. Processor 494 may in some embodiments include theprocessors and the controllers that operate to cause the machine tocarry out the transaction functions. In other embodiments the at leastone processor 494 may include one or more processors that are other thanthose that primarily cause the machine to carry out transactions, but isin operative connection therewith.

In the exemplary embodiment when the machine is carrying out transactionfunctions in response to at least one processor, the cover 488 may be ina collapsed position as shown in FIG. 44. In the collapsed position theside walls and top portion of the cover are disposed in close overlyingrelation of several keys of the keypad. The inner face of the side wallsand top portion are also disposed in close adjacent relation of the keysso as to generally prevent digit access to at least some of the keys ofthe keypad. Of course in some embodiments even with the cover in thecollapsed position at least some keys of the keypad may be digitaccessible. This is represented by keys 496. Of course this approach isexemplary.

When the machine operates to conduct transactions and/or the transactionflow reaches a state in which the machine is ready to accept acustomer's personal identification number (PIN), numerical values orother inputs through the keypad, the at least one processor 494 isoperative to cause the driver 492 to actuate the members 490. Uponactuation of the members the flexible material of the cover 488 deformsand changes shape such that the cover of the exemplary embodimentgenerally corresponds to the shape of cover 474. In this operativeposition the user of the machine is enabled to access with at least onedigit all of the keys of the keypad and to view digit engagement witheach of the keys from the point of view of the user.

In an exemplary embodiment the at least one processor of the machine isoperative to cause the cover 488 to remain in the operative positionthroughout the user transaction session. For example the cover mayremain in the operative configuration while the user inputs their PIN,numerical values and other inputs until the user indicates to themachine that they do not wish to conduct any further transactions.Thereafter the at least one processor 494 operates to cause the at leastone driver to change the shape of the member 490 and in response whenthe cover 488 returns to the collapsed position. Of course this approachis exemplary.

It should be understood that covers which are changeable between anoperative position and a collapsed position may operate using othertypes of structures to achieve changes in shape. FIG. 46 shows anexemplary embodiment of a cover 498. Cover 498 includes a plurality offluid cavities 500 therein. In the exemplary embodiment the fluidcavities are embedded in the flexible cover and are fluidly connected toone another as well as to a port schematically indicated 502. In thisexemplary embodiment the port 502 is operative to selectively apply andrelease fluid pressure to the fluid cavities in the cover. Of course itshould be understood that this approach is exemplary.

In this embodiment the port 502 is operative to have fluid pressureapplied thereto and relieved therefrom responsive to a three-way valveschematically indicated 504. Valve 504 is in fluid communication with afluid source 506 such as a small air compressor included in the machine.Of course in other embodiments other sources of compressible orincompressible fluid may be used. In the exemplary embodiment the fluidsource 506 and the valve 504 are in operative connection with at leastone processor 508. Processor 508 may in some embodiments comprise theprocessor which executes instructions to cause the machine to carry outtransactions, or may be a separate processor in operative connectiontherewith.

In this exemplary embodiment the cover 498 is operative to changebetween an operative position in which a user is enabled to access withat least one digit all of the keys of the underlying keypad, and acollapsed condition in which digit access to at least some of the keysof the keypad are prevented. This is accomplished in the exemplaryembodiment through operation of the at least one processor 508 causingthe fluid source 506 and the valve 504 to apply fluid pressure to port502. In this exemplary embodiment the fluid pressure is transmitted tothe fluid cavities 500 which causes the cover 498 to change shape to theoperative position. In the operative position a user may provide inputsthrough the keypad. Thereafter responsive to operation of the machineand the state thereof in which a machine user no longer needs to provideinputs through the keypad, the at least one processor 508 changes thecondition of the valve 504 to relieve fluid pressure from the port 502and the fluid cavities 500. This causes the exemplary cover 498 tochange to the collapsed condition. Of course it should be understoodthat elastic materials or other biasing mechanisms as well as thedrawing of vacuum on the fluid cavities may be provided in someembodiments to facilitate the contraction of the cover into a collapsedposition.

It should be understood however that the use of shaped memory membersand fluid pressure to change the configuration of the cover and othersecurity devices associated with input devices of a machine, are merelyexemplary and in other embodiments other approaches may be used.

FIG. 47 shows yet a further embodiment. This embodiment may be used inconjunction with features of other embodiments described or incorporatedby reference. FIG. 47 shows a keypad 510. Keypad 510 of this embodimentcomprises a plurality of keys 512 through which an ATM user can provideinputs by accessing the keys with manual digits. Keypad 510 may be of aconfiguration like that described in other embodiments herein.

The keypad 510 of an exemplary embodiment comprises an encrypting PINpad (EPP) which is selectively operative to receive inputs through thekeys, and encrypt corresponding key input signals within the keypad sothat the output from the keypad is encrypted. This approach may be usedin some embodiments to reduce the risk that a criminal could decipherATM user inputs such as a user's PIN. The keypad 510 of the exemplaryembodiment is also selectively operative to provide unencrypted outputsresponsive to user inputs through the keys. This is done in the courseof transactions where the inputs of a user are not necessarilyconfidential, such as inputs corresponding to amount data related totransactions a user is conducting, transaction selections or otherinputs of a type that would not allow a criminal to compromise securityfor a user's account or other personal data.

In the exemplary embodiment the keypad 510 includes at least oneinternal processor 514. The processor 514 is in operative connectionwith the at least one data store 516. In an exemplary embodiment thedata store may include digital certificates, at least one public key andat least one private key. The at least one data store 516 may alsoinclude other programmed instructions that facilitate maintaining thesecurity of the keypad as well as the machine. Exemplary embodiments ofthe keypad may include features of those described in U.S. patentapplication Ser. No. 10/126,808 filed Apr. 19, 2002, the disclosure ofwhich is incorporated herein by reference in its entirety. Of coursethis approach is exemplary.

In this exemplary embodiment the keypad 510 is in operative connectionwith at least one processor 518. Processor 518 of the exemplaryembodiment is in operative connection with at least one data store.Processor 518 is also in operative connection with a plurality oftransaction function devices schematically indicated 522. Thetransaction function devices may include devices that operate in themachine responsive to the at least one processor 518. These devices mayinclude for example some or all of a display, a card reader, cashdispenser, depository, check acceptor and other devices operative in themachine to carry out transactions.

In this exemplary embodiment the at least one processor 518 executesprogrammed instructions stored in at least one data store and which areoperative to cause the machine to carry out transactions. Asschematically indicated, the at least one processor 518 is operative tocommunicate through at least one appropriate interface in a network 524.Network 524 enables the machine to communicate with at least one remotecomputer schematically indicated 526. The at least one remote computerwith which the machine communicates may include for example, a financialtransaction computer which transfers funds and keeps track of accountsheld by users of the machine. Of course it should be appreciated that invarious embodiments the machine may communicate through numerousdifferent networks and with numerous different remote computers. Theconfiguration shown in FIG. 47 is merely schematic.

In exemplary embodiments the at least one processor 518 is in operativeconnection with a visual indicator 528. Visual indicator 528 of anexemplary embodiment comprises a light emitter which is changeablebetween illuminated and unilluminated conditions. The visual indicator528 is included in the user interface of the machine. In someembodiments it may be operatively connected to the processor through thekeypad as shown, or may be connected in other ways. In addition in someexemplary embodiments other types of visual indicators may be used.These may include for example changeable signage indicators, outputsthrough the display of the user interface, mechanical indicators orother suitable indicators to indicate to a user that inputs they provideat certain times during transactions are being encrypted.

In the exemplary embodiment the at least one processor 518 is operativeto cause the machine to carry out transactions. In an exemplarytransaction flow the machine may output one or more instructions throughthe display to indicate to the user that the machine is ready to receivea confidential input such as a user's PIN. Responsive to the at leastone processor being in this condition the processor sends at least onesignal to the keypad 510 which causes the keypad to encrypt the inputsthereto prior to delivering signals corresponding to such inputs to theat least one processor. In the exemplary embodiment the at least oneprocessor is operative responsive to providing the output which causesthe keypad to encrypt inputs, to also cause the at least one visualindicator 528 to provide a visual output. This visual output indicatesto the user that the inputs that they are now providing through thekeypad are encrypted.

In the exemplary embodiment the at least one processor providesinstructions through a display or other output device to the user whichinstructs the user to input their PIN, and when they are done to providean end input. This may include for example pressing a particular key ofthe keypad or other key or input device of the machine. In the exemplaryembodiment responsive to receipt of this end input the at least oneprocessor is operative to send at least one signal that causes thekeypad 510 to cease its encrypting functions. Further the signals fromthe at least one processor are also operative to cause the at least onevisual indicator 528 to change its condition as well. This indicates tothe machine user that inputs through the keypad are no longer beingencrypted. Of course this approach is exemplary.

In further transaction steps the at least one processor 518 may provideinstructions to a user through a screen or other output device. Theseinstructions may include instructions for a user to input selectednumerical values or other items through the keypad. In such conditionsthe at least one processor is operative through signals to the keypad tocause the keypad to receive such inputs and deliver signalscorresponding to the inputs to the at least one processor in anunencrypted manner. During receipt of such signals which are not securedthrough encryption, the at least one processor is operative to cause theat least one visual indicator to be in a condition in which it indicatesthat the inputs are not encrypted. This may be to have the lightemitting device off. Of course this approach is exemplary.

The function of providing to a machine user an indication that sensitiveinputs such as the PIN are being encrypted may help to increase userconfidence that their personal data is being secured. In addition thefailure of the at least one visual indicator to operate at times when auser is being requested to input a PIN or other confidential data, mayprovide an indication to a user that the machine has been potentiallysubject to tampering and should not be used.

In some embodiments the at least one visual indicator may be included onthe keypad. In some exemplary embodiments the indicator may include anilluminated indicator such as a lock, which is indicated 530 in FIG. 47.The exemplary indicator including a lock graphic may serve tocommunicate to the machine user that their inputs to the keypad aresecure. In some exemplary embodiments the indicator may be made as anintegral part of a tamper resistant input device such as an EncryptingPIN Pad (EPP). The EPP may be made so that any tampering therewith orunauthorized programming thereof will cause the encryption indicator tocease to function or to function in ways associated with an undesirablecondition. In this way it is less likely that a corrupted device will beinstalled on a banking machine and used by unwary users. In still otherembodiments, the at least one processor may cause an output indicatingan encrypting condition of a device through the display or other outputdevice of the banking machine. This may include a visual output throughthe screen which includes a word output such as “keypad input now beingencrypted” and/or the output of icons, graphics or other indicatingoutputs. Of course these approaches are exemplary.

Principles like that applied in connection with the exemplary keypad 510may also be applied through other transaction devices that are operativeto receive sensitive user inputs. For example a card readerschematically indicated 542 may include capabilities for selectivelyproviding encrypted outputs corresponding to the data read from thecards of users. Exemplary embodiments may also include visual indicators534 which are operative to indicate to users that a device is operatingto encrypt the inputs that are being received therethrough. Suchindicators may be in addition to or in lieu of indicators of the typepreviously discussed which are operative to indicate the condition ofthe device and/or to draw a user's attention thereto. Of course itshould be understood that these approaches are exemplary.

In still other exemplary embodiments provision may be made for reducingthe risk of unauthorized access to customers' confidential informationsuch as a PIN number. These additional features may include for example,guarding against situations where criminals have programmed the machineor otherwise operatively connected to it in a way that causes themachine to request that a user input their confidential information at atime when the keypad or other device is not operating to encrypt inputs.This may be done for example by including unauthorized computerexecutable instructions in a data store associated with at least oneprocessor of the machine. Alternatively or in addition, this might beaccomplished by programming the machine in a way that causes the machineto connect to a network address which causes the machine to output arequest for the user to input their confidential information. In stillother situations criminals may include additional processors or otherdevices in the machine that send signals to the display to provideoutputs through the display, which request a user to input theirconfidential information to the machine.

As can be appreciated these unauthorized outputs through the display orother output device can cause the user to input their confidentialinformation at times during operation of the machine when the authorizedprogramming is not causing the user inputs to be encrypted. As a resultcriminals can gather the unencrypted data corresponding to confidentialinputs and later use the information to obtain unauthorized access tothe user's account. In some situations this may be done by storing datacorresponding to these inputs in at least one data store in the machinewhich can later be recovered either locally or remotely. Alternativelyor in addition, in some situations the criminals may provide for theinputs to be delivered from the machine through a network to a remotelocation so as to minimize the risk of detection. Of course theseapproaches are exemplary of criminal exploits that may be attempted atautomated banking machines.

As can be appreciated, in the exemplary embodiment of the machine duringnormal operation of the at least one processor 518, the at least onedata store 520 includes computer executable instructions which cause theat least one processor to operate the machine to carry out transactions.These computer executable instructions cause the computer to carry outat least one transaction sequence. The transaction sequence that iscarried out includes a plurality of states in which the machine isenabled to carry out certain transaction functions. For example in anexemplary embodiment, the at least one processor may wait for a customerto begin a transaction and may output certain displays to attract acustomer to the machine. This step in the transaction sequence isassociated with a wait state in which the machine is waiting for aninitial input from a user to commence a transaction. In an exemplaryembodiment the machine senses that the user has presented a card to anopening associated with a card reader, or that a user has otherwiseengaged a similar article with the machine. In response to sensing theseinputs the computer executable instructions of the at least oneprocessor causes the machine to be in a card read state associated withthe transaction sequence in which the card or other article has dataread therefrom.

Thereafter responsive to being able to read the card, the at least oneprocessor may then operate in accordance with the computer executableinstructions to cause the at least one processor to be placed in a PINentry state of the transaction sequence. In the PIN entry state of theexemplary embodiment, the at least one processor operates in conjunctionwith the encrypting PIN pad, namely keypad 510. The keypad operates inaccordance with its programming and the instructions from the at leastone processor to encrypt inputs from a user that are provided throughthe keypad. Input of an indication that the PIN has been provided, thencauses the at least one processor to move to a next state in thetransaction sequence in which the user is presented with options throughthe display for selecting a type of transaction that they wish toconduct at the machine.

The at least one processor of the machine in its normal operation stepsthrough a series of states which have associated functions, operationsand outputs that enable the machine to carry out different transactions.As can be appreciated in the exemplary transaction flow provisions aremade in various states for the transaction to take different paths froma given state in the transaction sequence. For example in thetransaction selection state the user may be asked if they wish toreceive cash or if they wish to make a deposit. Depending on the user'sinput in response to the outputs through the display, the exemplarymachine operates to move through the appropriate states in a transactionsequence for the particular type of transaction that the user hasselected. Of course this approach is exemplary and in other embodimentsother approaches may be used.

As can be appreciated, the at least one processor causes the machine tooperate in accordance with the transaction sequence and causes signalscorresponding to inputs through the keypad, card reader and/or otherdevices to turn on the encryption function during appropriate states inthe transaction sequence. When the at least one processor in the machinehas the machine in these particular states, the inputs through thekeypad or other device capable of encrypting inputs are encrypted toprotect the confidential information from interception. Of course inexemplary embodiments in other states in the transaction sequence, theuser is not being instructed to input confidential information and theat least one processor causes inputs through the keypad to be output tothe circuitry of the machine as signals that are unencrypted. Suchunencrypted inputs are then transmitted to the at least one processor sothat the machine can then carry out the appropriate transaction steps.

A potential risk arises if a criminal has electronically accessed themachine in ways that cause a request for input of confidentialinformation to be provided from the machine during a state in thetransaction sequence when the encryption capabilities of the keypad,card reader or other device with encrypting capabilities, are not turnedon. If, for example, the criminal has installed software instructionsthat provides an unauthorized user exit in the transaction sequencewhich causes an output through the display that asks the user tore-enter their PIN number, the user may re-enter their PIN number at atime when the encrypting keypad is not operating to encrypt the inputs.Thus the user's confidential information may be input in the clear andintercepted. Likewise similar unauthorized outputs may request a user toreinsert their card at a time when outputs from the card reader are notbeing encrypted. In still other situations the user may be asked forother types of confidential information such as social security numbers,account numbers, mother's maiden name, etc. all of which might be usedto gain unauthorized access to user's accounts or to accomplish identitytheft.

As may be appreciated some of the ways in which unauthorized outputs canbe caused to be made through a machine display will not necessarilydisrupt the normal operation of the at least one processor or thetransaction sequence that occurs responsive to the authorizedinstructions. Indeed as previously discussed, unauthorized devices canbe connected to the display, unauthorized network connections orunauthorized computer executable instructions may operate in the atleast one processor to perpetrate such unlawful activity. In addition itshould be understood that such programming, while discussed as beingused in connection with providing outputs through the display, may alsobe output through other output devices such as the audio outputsassociated with voice guidance or other similar output devices whichprovide instructions to users of the machine to provide inputs.

To minimize such risks exemplary embodiments may include computerexecutable instructions in the at least one data store, that comprisecharacter recognition software. Further in exemplary embodiments thecomputer executable instructions include software instructions that areoperative to recognize signals that are received by the display on themachine and that cause the display to provide certain outputs. Furtherthe exemplary instructions are operative to determine that the signalsbeing provided correspond based on the operation of the characterrecognition software, to certain words and/or phrases which suggest thatthe display is providing outputs to users that instruct the users toinput confidential information to the machine.

Thus for example in an exemplary embodiment the at least one processor518 may be in operative connection with appropriate sensors, interfacesor other devices which sense the signals being received by the displayon the machine. The signals are then analyzed through operation of theat least one processor to determine if the signals correspond tocharacters, phrases and/or other outputs that instruct a user to inputconfidential information to the machine. For example in exemplaryembodiments, the at least one processor may operate to look for signalswhich correspond to the words personal identification number, PIN,secret number, account identification number or other words and/orphrases (including in exemplary embodiments words and/or phrases inother languages) that are instructing a user to enter their PIN number.

In an exemplary embodiment, upon determining that the display isoutputting such instructions, the at least one processor operates inaccordance with its programming to turn on the encryption functions forinputs through the keypad. In this way upon determining that such anoutput is being provided through the display, the at least one processorassures that the encrypting functions of the keypad are turned on andthe signals being output from the keypad are encrypted. The at least oneprocessor can operate to cause inputs through the keypad to be encrypteduntil the output from the display is determined to no longer ask for auser's confidential information.

In still other embodiments the at least one processor may operateresponsive to determining that a particular type of output requestinguser confidential information is being presented, to determine the statein the particular transaction sequence in which the authorized softwarein the machine is currently operating. Thus for example, the at leastone processor may operate to determine if the current state in thetransaction sequence is the PIN entry state and/or that the at least oneprocessor has already caused the encryption functions of the keypad tobe turned on. In an exemplary embodiment the at least one processor upondetermining that the machine is acting in a normal manner may take nofurther action. However, in circumstances where the at least oneprocessor determines that entry of the customer's PIN is being requestedat a time other than an appropriate state in the transaction sequence,the at least one processor causes the machine to operate to send atleast one message to at least one remote computer indicating an abnormalcondition. This may be accomplished in some embodiments in a manner likethat described in U.S. Pat. No. 6,297,826 the disclosure of which isincorporated herein by reference in its entirety. Of course in otherembodiments other approaches may be used.

In the exemplary embodiment the at least one processor may operate inaccordance with its programming to analyze subsequent signals that causeoutputs through the display, and to shut off the encrypting functionswhen the signals received by the display no longer correspond torequests that the customer input confidential information. However, instill other embodiments the at least one processor may be programmed tocause the machine to cease operation either entirely or to cease atleast certain functions, upon the at least one processor determiningthat the display has output a request for confidential information at aninappropriate time during a transaction. Alternatively in otherembodiments other approaches may be taken such as contacting a servicingentity or bank personnel or police authorities to advise of a particularsuspicious condition. In still other embodiments the at least oneprocessor may operate in a manner like that described in U.S. Pat. No.7,147,147 the disclosure of which is incorporated herein by reference inits entirety, to capture image data and/or other information that may beuseful in determining the cause of the unauthorized ATM operation. Ofcourse these approaches are exemplary.

In exemplary embodiments the at least one processor may operatecharacter recognition software therein of the types that arecommercially available. These may include for example software availablefrom Carreker Corporation, A2ia or other commercially available softwarethat recognizes characters, words and/or phrases. Such software may beoperated to obtain the signals corresponding to those being sent toand/or received at the display, and convert them to suitable data foranalysis to enable the at least one processor to determine whether thewords, phrases, etc. being looked for are found in the current outputdisplay. Further in some embodiments the at least one processor may beconnected through an appropriate interface located directly at or withinthe housing of the display so that the actual signals being deliveredthereto are monitored. This may be useful for example in situationswhere the criminals have included in the machine a separate processor orother device that delivers signals to the display in a switched manner.For example in some embodiments it may be appropriate to integrate thesignal sensing devices directly into the display to assure that thesensing devices that deliver the signals to the at least one processorfor analysis cannot be bypassed.

In still other embodiments the at least one display may include at leastone processor and data store which includes appropriate programs and theability to provide at least one output back to the processor. Such asystem may provide at least one output signal to the processor in themachine responsive to the signals being received by the display whichcause outputs therefrom. The at least one processor may operate inaccordance with associated programming to assure that the signals beingdelivered to the display at the particular time, correspond to thosesignals that the processor and its associated authorized transactionprograms are causing to be delivered to the display. If the at least onefeedback output signal from the display indicates a variance from whatthe at least one processor determines that the feedback signal ought tobe at the particular time, then the at least one processor may operatein accordance with its programming to take appropriate action. Suchappropriate action may include sending messages, disabling functionsand/or shutting down the machine. Such feedback output signals may begenerated responsive to encryption of signals being received at thedisplay, which signals can then be compared to the values calculated bythe at least one processor based on the signals it is causing to be sentto the display. Of course other approaches may be used.

In still other embodiments the machine may operate in a manner thatincludes at least one camera adjacent to the display. The cameraoperates to capture images corresponding to screen outputs. This may bedone for example in the manner of the incorporated disclosures. Suchcamera signals may then be analyzed through operation of the at leastone processor, or by a separate authorized processing system, todetermine if the outputs requesting confidential inputs from a user arebeing presented at an inappropriate time in the transaction sequence.Such an approach may be useful in environments where it is not possibleto assure that the signals actually driving the display can be monitoredat all times and/or when there is a risk that a display with antifraudcapabilities has been replaced with a different display. Alternativelyor in addition, such an approach may be useful in situations where acriminal has overlaid an output device on the outside of the displayscreen of the machine. For example a criminal may install a liquidcrystal pane or other display structure on the outside of the authorizedmachine display. Such an external display may operate to make it appearthat the machine is outputting messages to the user, when the messagesare being generated from the unauthorized overlaid display pane. Atother times the pane may be operated so as to be transparent. In suchcircumstances the use of systems with imaging devices such as cameraswhich monitor the outputs which the user actually sees, and analyzesthem for requests for confidential information at inappropriate times inthe transaction sequence, or for lack of correspondence with what theauthorized software would cause the output to be, may be useful inhelping to prevent fraud. Of course these approaches are exemplary andin other embodiments other approaches may be used.

As can be appreciated, in some embodiments the at least one processorwhich operates to conduct the analysis for inappropriate outputs, mayinclude processors within the machine such as processors included in thekeypad or other processors such as distributed processors throughout themachine. In still other embodiments as previously discussed, theanalysis may be conducted through external processors such as imageanalysis devices which operate to capture images or other data fromcameras. In still other embodiments the character recognition softwareand analysis may be conducted within processors located in tamperresistant devices such as the keypad or other devices within the machinethat will generally cease to operate if an attempt is made to tamperwith their operation or programming. Of course these approaches areexemplary.

In some exemplary embodiments communications between at least oneprocessor in the machine on the display may be used to assure that thedisplay of the at least one processor are both authorized componentsthat are trusted and are intended for operation in the automated bankingmachine. In exemplary embodiments at least one authorization signal thatis operatively communicated between circuitry associated with thedisplay and the at least one processor helps to assure that at least oneof the components is a trusted component. In the absence of the at leastone authorization signal, the automated banking machine will not carryout at least one transaction function. For example in some embodimentsin the absence of the at least one authorization signal the display maycease to operate to provide any visual outputs. Alternatively in theabsence of the at least one authorization signal the display mayselectively cease to provide certain outputs such as for examplerequests for users to provide confidential information such as a PIN. Instill other embodiments in the absence of the at least one authorizationsignal the display may operate to provide an output such as if themachine is not operational and is not in service. Of course theseapproaches are exemplary.

In some embodiments the at least one authorization signal may include aplurality of signals that are communicated responsive to the at leastone processor to the circuitry associated with the display and/or fromthe display circuitry to the processor. For example the processor mayoperate to generate a first authorization signal to the display. Thedisplay circuitry may thereafter operate in accordance with computerexecutable instructions stored in connection therewith to cause a secondauthorization signal to be sent to the processor of the associateddisplay drive and circuitry which operatively communicates with theprocessor. In some embodiments the authorization signal from the displayto the processor may include a portion that is a function of the firstauthorization signal that is sent to the display circuitry. By having atleast a portion of the second authorization signal reconstituted as afunction of the first signal, there may be greater assurance that thedisplay operating in the machine is an authorized component. Of coursethis approach is merely an example.

In some exemplary embodiments the at least one processor may operate tocause the authorization signal to the display to be a function of thecard data that is read from the card of the customer that is currentlyoperating the machine. This may include for example an encrypted codethat is generally responsive to the card data and which provides aunique data signal to the display circuitry. The display circuitry willthen operate in response to certain computer executable instructions inoperative connection therewith to carry out one or more mathematicalmanipulations based on the authorization sent from the processorincluding the card data and return a second signal to the processor. Theprocessor may then carry out computational functions to verify that theauthorization signal generated by the display circuitry corresponds tothe card data originally sent. In determining such correspondence the atleast one processor may then operate to carry out transaction functionsbased on assurance that the display is being operated as a trustedcomponent. However, in the event that the authorization signal from thedisplay is determined by the at least one processor to be an impropersignal or one that cannot be verified as authorized, the at least oneprocessor may cease to operate the machine to carry out transactions.Alternatively or in addition the at least one processor may cause theautomated banking machine to send at least one message from theautomated banking machine to at least one remote computer to indicatethe possible fraud condition of the machine. Of course these approachesare exemplary.

In still other embodiments the at least one authorization signal sent bythe at least one processor to the display may include a time signal. Inan exemplary embodiment the at least one processor includes a clockfunction operating therein which is operative to generate datacorresponding to a then current time. Data corresponding to all or aportion of the then current time data may be included in the at leastone authorization signal sent by the processor to the display.Alternatively or in addition the at least one processor, the displayand/or both may have data associated with one or more respective serialnumbers or other numbers associated therewith. The authorization signalscommunicated may be a function of the respective serial numbersassociated with these components. As a result the serial numbers may beused as a basis for assuring that the respective authorized componentsare operating in the machine. Alternatively or in addition otherparameters may be used as the basis for the authorization signals thatare communicated to be sure that the processor and/or the display areauthorized components. Of course in some embodiments combinations ofmultiple parameters may be used.

In still other exemplary embodiments the at least one processor and/orthe circuitry associated with the display may be operative to includeroutines that generate random numbers. For purposes of this disclosure arandom number will be deemed to include any form of random characters orvalues. Such random numbers may be included in the authorization signalsthat are sent by and/or returned from the various components. Forexample in some embodiments a random number generated through operationof the processor may be encrypted through operation of the at least oneprocessor and sent as part of the authorization signal through thecircuitry associated with the display. The display may thereafterprocess the data received including the random number and encrypt it ina manner through operation of one or more processors and computerexecutable instructions associated with the display circuitry. Theauthorization signal returned by the display to the processor of themachine originating the random number will then be analyzed throughoperation of the processor to verify that the return signal is based onthe original random number and has been manipulated in a mannerconsistent with the programming of the circuitry in the authorizeddisplay. Such determination may be used as the basis for continuing theoperation of the at least one processor to carry out transactions. Ofcourse it should be understood that random numbers are but one type ofvalue that may be included in authorization signals.

In still other embodiments each of the at least one processor in themachine on the display circuitry may have an associated respectivepublic/private key pair. In such embodiments the at least one processorin the machine may generate values to be included in an authorizationmessage and encrypt such values using the private key associated withthe at least one processor. The circuitry associated with the displaymay then use the associated public key of the at least one processor todecrypt the message. The ability of the public key associated with theat least one processor to decrypt the message provides assurance thatthe message is sent by the at least one processor.

In the exemplary embodiment the circuitry associated with the displaymay thereafter manipulate or otherwise process all or a portion of thedata received in the message from the at least one processor to generatea further authorization message. In exemplary embodiments this messagemay include one or more portions that are a function of the originalmessage from the at least one processor. The circuitry associated withthe display may then encrypt the authorization message to the at leastone processor using the private key associated with the displaycircuitry. The message is then communicated through the internalcommunications channel of the automated banking machine such as auniversal serial bus connection or other data bus to the at least oneprocessor. The at least one processor may then decrypt the message fromthe display in accordance with its associated programming using thepublic key associated with the display circuitry. The ability of the atleast one processor to decrypt the message using the public key of thedisplay circuitry provides assurance that the message originated fromthe display circuitry. Further the at least one processor may confirmthat the message sent by the display circuitry is based on its originalmessage by comparing or manipulating the data included in theauthorization message to assure that it corresponds with the data thatwas originally sent.

In some embodiments the programming associated with the display and/orthe devices in communication with the processor and driving the displaymay include anti-tampering features. This may include for examplememories that hold data such as public and private key data which areautomatically erased in the event of any attempt to access or manipulatethe data therein that might be consistent if efforts to reverse engineerthe circuitry are made. In still other embodiments such communicationscircuitry and sensitive data may be encapsulated within physicalstructures. Such physical structures may be built to destroy any storedinformation therein in the event an effort is made to open the physicalcasing. Thus for example physical modules associated with the at leastone processor that operate to send messages to the display and/ormodules which are included therein or are connected with the displaycircuitry may be hardened so as to prevent tampering or access thereto.Of course these approaches are exemplary and in other embodiments otherapproaches may be used.

It should be understood that while the exemplary approach has beendiscussed in connection with the display of the machine, otherembodiments may operate using similar principles for other types ofdevices on a machine which provide outputs and/or receive inputs. Thusfor example the at least one processor in the machine may be programmedto look for requests to input confidential and/or private customerinformation of the type that can be read from the user's card. This mayinclude for example, asking the customer to re-input a card at aninappropriate time. In exemplary embodiments the at least one processormay operate to turn on an encryption function that can operate in aprocessor associated with the card reader or other device, to avoidinterception of the data as well as to give notification. Further instill other embodiments the at least one processor may include softwareof a type that recognizes verbal outputs. For purposes of thisdisclosure software of the type that recognizes verbal outputs will alsobe called character recognition software. Such software which recognizesverbal outputs may monitor output signals to or through speakers,headphone jacks or other similar output devices on the ATM. The at leastone processor may monitor for the output of words requesting the inputof user confidential information at inappropriate times in thetransaction sequence. This may minimize the risk for example, that ablind user provides their confidential information in response to voiceguidance outputs which are caused to be presented due to criminalmodifications to the machine.

In addition it should be understood that the features discussed inconnection with FIG. 47 may also be used in conjunction with otherfeatures described herein. This may include for example devices forlimiting unauthorized observation of inputs through the keypad andapproaches for minimizing the risk of unauthorized detection ofconfidential user data.

FIG. 52 shows schematically components of yet another alternativeembodiment of an automated banking machine generally indicated 592.Machine 592 includes at least one terminal processor 594. Processor 594is in operative connection with at least one data store 596. As in theother embodiments data store 596 includes data as well as computerexecutable instructions that are carried out through operation of theprocessor to operate the machine. Of course it should be understood thatwhile only one processor and data store are shown, embodiments mayinclude numerous processors and data stores.

Terminal processor 594 is in operative connection with transactionfunction devices of the machine generally indicated 598. The exemplarytransaction function devices include card reader 600. Card reader 600 isoperative to read data included on user cards. This includes for exampledata corresponding to financial accounts of users of the automatedbanking machine. Another exemplary transaction function device is aprinter 602. Printer 602 may include a receipt printer of the type thatprovides users with receipts for transactions conducted at the machine.

Another exemplary transaction function device in machine 592 is a cashdispenser 604. Cash dispenser 604 may be of the type previouslydescribed that operates to cause cash such as currency bills that arestored within the machine to be selectively dispensed and madeaccessible to a user outside the machine. The exemplary machine alsoincludes a depository 606. Depository 606 may be of the type thataccepts deposits made by a user into the machine. Such deposits mayinclude in some embodiments deposited items that are included in depositenvelopes. In other embodiments the depository may accept items such ascash or checks.

Of course it should be understood that machine 592 may include other ordifferent types of transaction function devices. These may include forexample different types of input devices, output devices as well asdevices for performing transaction functions of the type desired at themachine.

In the exemplary embodiment machine 592 includes a touch screen displaymodule 608. In this exemplary embodiment the touch screen display module608 is a structure or assembly of components designed to provide asecure input device through which users can input data which isprotected from being intercepted by unauthorized persons. The exemplaryembodiment of the touch screen display module includes an output pane610. Output pane 610 of the exemplary embodiment comprises a generallytransparent pane which is part of a touch sensitive screen. The touchsensitive screen may be one of several types which can be used todetermine the relative location on the screen at which a user makescontact with the screen using their finger. This may include for examplein some embodiments a resistance detecting touch sensitive screen. Inother embodiments the touch sensitive screen may be of the capacitancedetecting type. In still other embodiments the screen may include anacoustic wave detecting type of touch sensitive screen. In still otherembodiments other types of touch sensitive screens may be used. As canbe appreciated other various suitable types of touch sensitive screensmay be used to determine the position of contact made by a user'sfingers on the screen so as to detect when a user touches a selectablevisible output that is provided from the display.

An exemplary embodiment of the touch screen display module 608 may alsoinclude a haptic interface system in order to provide tactile feedback.Example haptic touch screens that may be used in exemplary embodimentsmay include the haptic touch screens manufactured by Pacinian Corp. ofSpokane Wash., or Esterline Advanced Input systems of Bellevue Wash., ormay include any other haptic interface system that is operative toprovide tactile feedback with a touch screen.

In an exemplary embodiment, the touch screen display module 608 may becomprised of a haptic touch screen that overlies an LCD display screen(or CRT display screen) of the touch screen display module. The haptictouch screen may be selectively configured to provide tactile feedback(e.g. vibration) responsive to touches (e.g. finger presses, fingersliding) in designated positions on the surface of the touch screen thatcorrespond to virtual buttons (e.g. keypad keys and functions keys) orother user interface controls and indicia displayed by the displayscreen under the haptic touch screen.

The exemplary embodiment further includes a housing 612. The housing 612of the exemplary embodiment houses internal display module components.These include a display module processor 614. The display moduleprocessor is in operative connection with at least one module data store616. In the exemplary embodiment the at least one display module datastore includes a volatile memory in which at least some of the datastore therein is erased in the event of power loss. The exemplarydisplay module includes a power supply connection so that the volatilememory of the display module maintains its data when the ATM is turnedon. In the exemplary embodiment the housing of the display moduleincludes at least one battery 618. The at least one battery operates toprovide a source of power so as to enable the volatile memory tomaintain data storage even during times when the ATM is turned off orunplugged from an AC power source.

In the exemplary embodiment the housing 612 comprises a unitarystructure that is designed to require breakage to access the internalcomponents thereof. This may be done for example by providing apermanently sealed assembly so as to avoid the risk that unauthorizedpersons can gain access to information in the display module data store.For example in an exemplary embodiment the housing includes a pluralityof sensors that are operative to sense an effort to access the interiorarea of the housing. In an exemplary embodiment the sensors may includefrangible electrical conductors 620. The exemplary frangible electricalconductors may be operative to electrically connect the electrical powersource including the battery and the data store. Such conductors mayinclude thin wires, conductive traces or other conductive items thatreadily break when disturbed. Attempts to open the housing may fractureone or more of the electrical conductors resulting in a loss of powerfrom the electrical power source and the battery 618 to the displaymodule data store. Thus the sensors detecting possible compromise of thedisplay module, result in the data included in the display module datastore being erased.

Further in exemplary embodiments the sensors may include electricallyconductive material in at least one transparent pane of the touchscreen. This may include for example electrically conductive tracematerial or other material which is operative to provide a sensor thatassures the integrity of the housing. Deformation or breakage to thehousing results in the loss of electrical power to the volatile memoryresulting in erasure of the data in the data store. In some embodimentsfor example the sensors including the electrical conductors may bemolded into components of the display module so as to minimize the riskthat the sensors can be compromised. Of course these approaches areexemplary. Further it should be understood that while in the exemplaryembodiment the approach of maintaining power to the data store is usedto determine efforts to compromise the display module housing, otherapproaches may be used in alternative embodiments. These may include forexample other types of sensors that detect deformation of the housingwhich is indicative of efforts at disassembly or compromise. Likewiseother embodiments may include sensing of changes in gas pressure eitherinto or out of the interior area of the housing so as to detect a breakin the housing indicating a compromised condition. Of course theseapproaches are exemplary and in other embodiments other approaches maybe used.

In the exemplary embodiment the at least one display module data storeis used to store data corresponding to at least one encryption key. Insome exemplary embodiments the at least one encryption key may include asymmetric key such as a key that complies with the Data EncryptionStandard (DES) or other suitable key type. The at least one processor inthe display module may operate in accordance with its programming tocause the display module to output selectable outputs such as the visualrepresentation of a keypad on the display. The visible representation ofthe keypad may include a plurality of keys, each of which may beselected by a user touching the screen where the key appears.

In exemplary embodiments with a haptic touch screen, the moduleprocessor and/or the terminal processor may be operative to configurethe haptic touch screen to provide tactile feedback for the displayedkeys. Such tactile feedback may by outputted by the haptic touch screenimmediately upon detection of a user's finger touching or sliding acrossa displayed key or other indicia on the screen. In further embodimentssuch tactile feedback may by outputted by the haptic touch screen inresponse to the detection of a finger of a user that persists for atleast a predetermined amount of time in generally the same location(e.g. a “long press”) on the haptic touch screen.

To assist in locating a displayed numeric keypad on the haptic touchscreen, in exemplary embodiments, a designated key such as a central key(e.g. a “5” key) of the keypad may be configured to provide a tactilefeedback output when initially contacted by a finger, whereas adjacentsurrounding keys either do not provide such a tactile feedback orprovide a different tactile feedback. Providing a distinctive hapticfeedback for a designated key (such as a central “5” key) may enable avisually impaired user to slide a finger around the touch screen toidentify the location of the designated key. Once the designated key isfound, the user can use its position to determine the location ofadjacent keys of the keypad. The user may then long press one or more ofthe keys to produce an input requested by the machine (e.g. a PIN,amount of value, menu selection).

In exemplary embodiments, tactile feedback may be outputted responsiveto the detection of a finger pressing or sliding adjacent the edges ofkeys or in the border between keys. For example, the spaces between andaround keypad keys may correspond to a grid that is configured toprovide tactile feedback as the user slides a finger over the spacesbetween and around displayed keys. A visually impaired user may identifythe location of the keypad and the location of individual keys in thekeypad by sliding a finger around the screen to identify the location ofthe grid that defines the keypad.

In example embodiments, the haptic touch screen may be configured toprovide different tactile sensations for different locations (e.g.different displayed keys or other indicia) on the screen and fordifferent types of inputs (e.g. sliding a finger or long press of afinger). Such different tactile sensations may be produced by having thehaptic touch screen produce different vibration patterns for thedifferent locations and/or types of inputs. Such different vibrationpatterns may include variations in magnitude, duration, waveform and/orfrequency of the vibration.

For example in one embodiment, each numeric key of a keypad displayed bythe touch screen and touched by a finger of a user, may produce a uniquetactile output in a pattern that can be used to recognize the key beingtouched. Such a pattern for example may correspond to a series of shortand long vibrations based on the Morse Code signals for the particularnumeric number associated with the key being touched. Also, it should beappreciated that in addition to outputting tactile outputs, theprocessor controlling the haptic touch screen may also causecorresponding audio outputs (beeps, words) through a speaker deviceassociated with the display screen (e.g. headphone jack, loud speakers)to be outputted as well.

Responsive to user input corresponding to one of the selectable outputs,the at least one processor operates in accordance with its programmingto generate encrypted input data corresponding to the user input. Thisencrypted input data may be generated in some embodiments by the displaymodule processor encrypting the data corresponding to the input usingthe stored encryption key. Further in some embodiments the input datamay be triple encrypted using the DES key stored in the at least onedata store. The at least one processor 614 of the display module maythen operate to cause data corresponding to the encrypted input data tobe communicated to the terminal processor 594. Of course it should beunderstood that in some embodiments the display module processor mayoperate to provide encrypted input data corresponding to multiple userinputs provided as part of a series of inputs from the ATM user. Thismay include for example a plurality of inputs provided by the user whichcorrespond to the user's personal identification number (PIN). Of coursethis approach is exemplary and in other embodiments other approaches maybe used.

It should also be understood that in some embodiments the display moduleprocessor may operate executable instructions including communicationverification software or other software of the types previouslydescribed to assure that it is in operative communication with anauthorized terminal processor of the ATM. Further in other exemplaryembodiments the display module processor may operate characterrecognition software such that outputs corresponding to requests forinput of sensitive data are recognized to assure that any confidentialinputs by the customer are properly encrypted.

In still other embodiments the at least one display module processor maybe operative to execute instructions which produce the outputs from thedisplay. Thus for example the display module processor and theassociated data store may include instructions to produce the graphicsand other output content that is presented by the machine to users. Inthis way the terminal processor 594 need only provide messages to thetouch screen display module which indicates the nature of the currentoutput which the touch screen module is to provide. This may be usefulin avoiding need for the terminal processor to generate the necessaryscreen output data. This minimizes the processing power utilized forthis purpose by the terminal processor and also minimizes the risk thatthe display may be operated to output messages to users that are notappropriate. Of course these approaches are exemplary.

In still other embodiments the data store 616 of the touch screendisplay module may include data corresponding to at least apublic/private asymmetric key pair. Likewise the data store 596associated with the terminal processor may also include datacorresponding to another public/private key pair. The public/private keypairs may each be associated with respective digital certificates. Theterminal processor 594 and the display module processor 614 may operateto communicate messages using the respective certificates and public andprivate key pairs which help to assure that each of the processors is inoperative communication with the other authorized ATM component. Thismay be done in a manner like that previously discussed. For example thepublic key associated with terminal processor 594 may be communicated tothe processor in the touch screen display module and stored in datastore 616. Likewise the public key associated with the display modulemay be communicated and stored in data store 596. By exchanging messageswhich are encrypted with the public keys of the other component, eachprocessor is able to assure that it is in communication with the otherauthorized component and not with a rogue component that has beeninstalled improperly in the machine. Such assurance may be achievedusing techniques that involve the exchange of the certificate data orother secret data or information that helps to assure that eachcomponent is authorized to the other.

In still other embodiments communications between the terminal processor594 and the display module processor 614 may be suitably encrypted so asto minimize the risk of interception. This may include for exampleencrypting communications of data which generally is not required to bekept secret internally within the machine. Such data may include forexample numerical data corresponding to transactions, transactionfunction selection inputs or other information. This may also includethe encryption of messages to the touch screen display module whichcause the output of selectable outputs through the display. This mayinclude encryption of messages that cause the display module to outputthe PIN input or similar outputs. The use of encryption may further helpto assure that the accuracy and secrecy of internal machinecommunications are properly maintained. Further in some embodiments datasuch as customer input data corresponding to a PIN may be encryptedusing the reversible DES encryption key as well as throughcommunications which are encrypted using asymmetric keys. Of course thisapproach is exemplary and in other embodiments other approaches may beused.

In still another arrangement represented schematically in FIG. 53 securecommunications may be further facilitated between the touch screendisplay module and the terminal processor. In this exemplary embodimentsecure communication is facilitated by having the terminal processor andthe touch screen display module connected through at least one secureinput device schematically indicated 622. In the exemplary embodimentthe secure input device includes at least one component having amanually actuatable input device. Further the exemplary secure inputdevice is located within a chest portion 624 of an ATM housing 626. Ascan be appreciated the touch screen display module 608 and the terminalprocessor may both be located within the ATM housing in an upper portion627. The upper portion of the housing of this exemplary embodiment isnot as secure as the chest portion. The chest portion generallycorresponds to a safe with a closable chest door and secure lock. Thechest houses valuable documents such as cash. Thus in this exemplaryembodiment providing for the secure input device 622 to be accessibleonly when the chest portion is open assures that persons that provideinputs thereto are those who are authorized to have access to thevaluables such as cash that are located in the ATM chest.

In the exemplary embodiment the secure input device 622 comprises atleast one processor and at least one data store. The at least oneprocessor is operative to provide for a secure key exchange between thetouch screen display module and the terminal processor or other securecommunications initialization. Thus in the exemplary embodimentactuation of the secure input device operates to cause the establishmentof secure communications between the display module and the terminalprocessor. This may include communications that cause the public keyassociated with the terminal processor to be communicated to the touchscreen display module and stored in the data store therein, and viceversa. This may also include an exchange of certificate, signature orother verification data. This may be done for example in someembodiments to initialize secure communications so that each of thetouch screen display module and terminal processor are recognized by oneanother as authorized machine components. Thus in such embodimentsattempts to replace one or the other of the components will result inthe other of such components determining that it is not in communicationwith an authorized component, and the device will operate in accordancewith its programmed instructions to cease communication of sensitivedata unless the secure input device is again accessed and is used toreinitialize each of the components to the other.

In still other embodiments the secure input device may operate inaccordance with its programming to provide monitoring of the securecommunications to help assure that the at least one terminal processorand display module are communicating securely and that there are nosigns of efforts to compromise their operation. This may be done forexample by using multiple signals and encryption techniques that areexchanged between the devices and the secure input device. The secureinput device operates in accordance with its programming to analyze thecommunications and to discontinue normal operation in the event thatconditions corresponding to a possible problem are detected. Further insome embodiments the secure input device may also be in operativeconnection with other transaction function devices so as to disable themfrom operation in the event of a possible detected problem such as asecurity attack. Likewise in still other embodiments the secure inputdevice may also operate to cause the banking machine to givenotifications either locally or remotely of suspected problems. Ofcourse these approaches are exemplary and in other embodiments otherapproaches may be used.

In still other embodiments the processor included in the touch screendisplay module may have programming that enables the touch screendisplay module processor to perform the functions performed by theterminal processor in other embodiments. This includes communicatingwith other transaction function devices in the machine so as to controltheir operation. Thus for example in some embodiments all of theinstructions necessary for operation of the automated banking machinemay be included in the data store encapsulated within the displaymodule. Efforts to compromise the display module to gain access to anyof the secure programming may result in the loss of operability of themachine. Further as can be appreciated the principles discussed whichprovide secure communications between the touch screen display moduleand the terminal processor may be used in alternative embodiments toachieve secure communications between the touch screen display moduleand the processors operative on individual transaction function devices.

Further in some other exemplary embodiments the touch screen displaymodule may include other input devices that it may be desirable tosecure from tampering. This may include for example card readercomponents. Thus for example in some embodiments the housing of thetouch screen display module may include a card reader device that isoperative to read data from user cards. This may include for examplecomponents suitable for reading data in a magnetic stripe of the usercard. Alternatively this may include contactless card reading devicessuch as devices that are suitable to read radio frequency or inductancedata signals from cards that are positioned in proximity to the readingdevice. Of course these approaches are exemplary.

By including the card reading capability and user input capabilitywithin a single encapsulated display module some embodiments ofautomated banking machines may reduce the risk of compromise that wouldotherwise be associated with communications between such components ofthe machine. Further encapsulating such components within a singleassembly may further facilitate machine operation and reduce cost andcomplexity in machine design. Of course these approaches are exemplaryand in other embodiments other approaches may be used.

In exemplary embodiments, the terminal processor may be located in acomputer mounted in the same automated banking machine as is thedescribed display module. However, in alternative embodiments, theterminal processor/computer that operates the display module and othercomponents in the machine (e.g. cash dispenser, card reader) maycorrespond to a virtual processor of a virtual machine executing in aremote server. In such embodiments, the display module may include aprocessor and associated circuitry (referred to herein as a portaldevice) configured to securely communicate with and carry out a remoteclient protocol with the virtual machine. Examples of portal devices foruse with automated banking machines and the display devices of automatedbanking machines is shown in U.S. Patent Application No. 61/323,161filed Apr. 12, 2010 which is hereby incorporated by reference herein.

In this described embodiment, the portal device may includeprocessor/controllers adapted to carrying out a remote client protocolsuch as Teradici PC over IP (PCoIP) protocol. Such a PCoIP protocol isoperative to communicate device bus communications corresponding toUniversal Serial Bus (USB) communications and display videocommunications over a TCP/IP network with a remote host processor and/orvirtual machine. The portal device may include USB ports for connectingmachine devices (e.g. cash dispenser, card reader, display module/touchscreen). The portal device may also include video ports for connectingthe display screen of the display module.

In this described embodiment, terminal software such as applications anddevice drivers that operate the automated banking machine, may executein the virtual processor of the remote virtual machine. USB and videocommunications on the remote virtual machine may then be communicated tothe respective devices and display screen in the automated bankingmachine via the portal device.

In an example embodiment of a display module that includes a portaldevice, the display module may include USB ports for connecting devicesin the machine (e.g. cash dispenser, card reader) to the portal device.Internally in the display module, the display screen and touch screenmay be connected to the portal device. Also for embodiments of thedisplay module with a card reader, such a card reader may be connectedto an internal USB port/header in the display module.

FIGS. 54-56 show a machine 700 of another exemplary embodiment. Themachine 700 includes a touch screen display that is configured for useby visually impair users 701 (FIG. 55). The machine 700 includes atleast one terminal processor 702. The terminal processor 702 is inoperative connection with at least one data store 704. As in the otherembodiments data store 704 includes data as well as computer executableinstructions or software that are carried out through operation of theterminal processor to operate the machine. Of course it should beunderstood that while only one terminal processor and data store areshown, embodiments may include numerous processors and data stores.Alternatively, the terminal processor 702 may not be located within themachine and may be located in a server or other device remote from themachine. For example, the terminal processor 702 may be located in acentral server that is operatively connected to the machine 700 and alsoto other machines. This central server may be located remotely from themachines.

The terminal processor 702 is in operative connection with transactionfunction devices of the machine generally indicated 706. The exemplarytransaction function devices include a card reader 708. The card reader708 is operative to read data included on user cards. This includes forexample data corresponding to financial accounts of users of theautomated banking machine. Another exemplary transaction function deviceis a printer 710. The printer 710 may include a receipt printer of thetype that provides users with receipts for transactions conducted at themachine.

Another exemplary transaction function device in the machine 700 is acash dispenser 712. Cash dispenser 712 may be of the type previouslydescribed that operates to cause cash such as currency bills that arestored within the machine 700 to be selectively dispensed and madeaccessible to a user outside the machine 700. The terminal processor 702is in operative connection with the cash dispenser 712 and the cardreader 708. The terminal processor 702 is operative to cause the machine700 to operate to read card data from a user card and to cause adetermination to be made that the card data read from the user cardcorresponds to an authorized user and an authorized financial account.The terminal processor 702 may then operate to cause cash to bedispensed from the machine 700 to the user 701 and to cause a financialaccount corresponding to the card data to be assessed for cashdispensed.

The exemplary machine 700 also includes a depository 714. Depository 714may be of the type that accepts deposits made by a user into the machine700. Such deposits may include in some embodiments deposited items thatare included in deposit envelopes. In other embodiments the depositorymay accept items such as cash or checks. Of course it should beunderstood that the machine 700 may include other or different types oftransaction function devices. These may include for example differenttypes of input devices, output devices as well as devices for performingtransaction functions of the type desired at the machine.

In the exemplary embodiment, the machine 700 includes a touch screendisplay module 716 that is operatively connected to the terminalprocessor 702. The touch screen display module includes a housing 718that houses the internal display module components. These components mayinclude a display module processor 720. The display module processor isin operative connection with at least one module data store 722. In theexemplary embodiment, the housing of the display module may include atleast one battery 724. The at least one battery 724 operates to providea source of power so as to enable volatile memory of the data store 722to maintain data storage even during times when the machine is turnedoff or unplugged from an AC power source. These components are designedto provide a secure input device through which users can input datawhich is protected from being intercepted by unauthorized persons.

The exemplary embodiment of the touch screen display module 716 includesan output pane 726. Output pane 726 of the exemplary embodimentcomprises a generally transparent pane which is part of a touch screendisplay 728. The touch screen display 728 may be one of several typeswhich can be used to determine the relative location on the screen atwhich user 701 makes contact with an input surface 730 of the touchscreen display 728 using his or her fingers 731. This may include forexample in some embodiments a resistance detecting touch screen display.In other embodiments the touch screen display 728 may be of thecapacitance detecting type. In still other embodiments the touch screendisplay 728 may include an acoustic wave detecting type. As can beappreciated other various suitable types of touch screen displays 728may be used to determine the position of contact made by a user'sfingers on the touch screen display 728 so as to detect when a usertouches the input surface 730 of the touch screen display 728. Also, themachine 700 may include the touch screen display 728 as a standalonecomponent that is operatively connected to the terminal processor 702instead of being part of a touch screen display module.

The machine 700 is configured to recognize inputs on the touch screendisplay 728 without the need to display the character to be inputted. Inparticular, data corresponding to a character is received by theterminal processor 702 in response to a contact with at least one areaof the input surface 730 of the touch screen display 728. The area ofcontact does not include any visible output indicia that corresponds tothe character, before the area is contacted. The character maycorrespond to alphanumerical characters, such as a numerical character,an alphabetic character, or any other type of character.

FIGS. 55 and 56 show one exemplary embodiment that includes thisfeature. As shown in FIG. 55, the machine 700 includes a fascia 732. Thefascia 732 of the exemplary embodiment may include a recessed area 734in which the touch screen display 728, function key buttons 736, cardreader 708 and receipt outlet 738 are positioned. A cash dispenseopening 740 and a cash acceptance opening 742 are also positioned on thefascia 732. The fascia may include other openings or devices such as forexample, an opening for accepting checks which can be imaged by a checkacceptor that includes a scanner. The fascia 732 may include a top panel744 which is positioned generally above a light source 746 and the userinterface of the machine. The top panel portion 744 may include a pairof convex mirrors 748, 750.

In this embodiment, one or more fingers 731 of the user 701 may contactconcurrently one or more respective areas 752 of the input surface 730of the touch screen display 728. When the user 701 touches the inputsurface 730 with one or more of his fingers 731, software running on theterminal processor 702 determines the number of fingers 731 thatconcurrently contact the input surface 730. The software then determinesthe numerical character corresponding to this number and sends thisinput data to the terminal processor 702. The data may be sent to theterminal processor 702 when the user 701 removes his or her fingers 731from the input surface 730. Alternatively, the data may be sent to theterminal processor 702 upon the user 701 removing the fingers 731 andpushing a function key button 736 configured for visually impaired userson the ATM 700.

For example, as seen in FIGS. 55 and 56, when the user 701 concurrentlytouches the input surface 730 of the touch screen display 728 with threefingers 731 a, 731 b, 731 c. The software determines that the number ofcontact areas 752 a, 752 b, 752 c of finger contacts is three. Thesoftware then determines that the numerical character “3” corresponds tothis input. Alternatively, the number of areas of finger contacts maycorrespond to an alphabetic character instead of a numerical character.Alternatively in other embodiments, alphanumeric characters may beindicated by repetitive contacts via a finger with an area of the touchscreen. For example, the user may repeatedly touch the screen toindicate a value. In such embodiments, the software may operate toconsider such inputs to be an incrementing value or character with eachtouch provided that the user touches the screen again within a certaintime period after the previous touch. If the user does not touch thescreen within a given period after the last touch, the computer operatesto determine that the desired character of the user corresponds to thelast touch contact made with the input surface. Also, other objects suchas a stylus may be used instead of fingers to contact areas 752 of theinput surface 730 of the touch screen display 728.

The exemplary machine 700 includes an audio output port 754 (FIG. 54)for providing signals usable to produce audio outputs to the user 701corresponding to the character being input. In the exemplary embodimentshown in FIG. 55, the audio output port 754 includes a headphone jack756 that is operatively connected to a headphone 758. However, the audiooutput port 754 may include other output devices such as a Bluetoothport or a speaker. Also, the audio output port 754 may be configured tobe in operative communication with a cell phone. The audio output port754 may alternatively and additionally utilize near field communication.Alternative embodiments may include other types of audio output portsthat receive signals that are usable to produce audio outputs.

The audio output port 754 is in operative connection with the terminalprocessor 702. The terminal processor 702 includes software thatgenerates signals corresponding to verbal outputs of names identifyingcharacters based on inputs received by the terminal processor 702. Theterminal processor 702 is operative to cause audio signals correspondingto the alphanumeric character corresponding to the finger contact(s)with the contact surface to be outputted through the audio output port754. For example, when the user 701 concurrently contacts the inputsurface 730 of the touch screen display 728 with three fingers, theterminal processor 702 operates to cause the generation of signalsusable to produce a verbal output of the number three using an audiooutput device in connection with the audio output port 754. In anexample transaction, the user 701 hears the number three via theheadphones 758 and is thus provided with appropriate audio feedback ofthe character inputted. The headphones 758 can provide secure audiofeedback of the character inputted to the user 701 by preventing otherpersons in the area near the machine 700 from hearing the characterinputted. Optionally, the signals usable to produce audio outputs may beencrypted so that they can only be determined by a decrypting device inthe headphone or other apparatus of the user 701 so as to enable theuser to hear the character corresponding to the contacts with the inputsurface.

Various approaches may be used in alternative embodiments to have fingercontacts with the input surface to represent various types ofalphabetical and/or numerical characters being input to the machine. Forexample, the number of concurrent finger contacts with the screen maycorrespond to the input of the corresponding numerical value. This willgenerally enable a user to selectively input up to ten differentnumerical values. The machine may operate in accordance with itsprogramming to advise a user one through nine concurrent finger contactscorrespond to those values and that ten concurrent finger contacts withthe input surface corresponds to a zero input. Of course this approachis exemplary.

Likewise alphabetical values could be input in various ways. Forexample, tapping one or more fingers against the screen rapidly may bemade to cause the at least one processor to cause signals thatcorrespond to sequential letters of the alphabet to be output to theaudio output port. The user could stop further tapping of the screenwhen the selected alphabetical character has been output. Alternativelyplacing and holding one finger constantly in contact with the screen andrepeatedly touching and disengaging another finger with the screenwithin a time period may cause the output of a sequence of alphabeticalor other characters. Alternatively, repeatedly touching anddisconnecting from the screen in two different areas may cause the atleast one processor to resolve and produce outputs that correspond toalphabetical (or numerical) characters, that can be iteratively output,randomly presented, scrolled through or otherwise output in a way inwhich a selected character can be identified by a user. In theseexamples, no corresponding outputs would be provided on the screen torequire finger contact with the screen in any particular area or areas.The screen could be blank or could be outputting a design or otherindicia not related to the user selections for inputs prior to and/orwhile the user provides inputs. Alternatively in some embodiments, oncethe character corresponding to the inputs has been resolved based on thepreceding contacts with the input surface, the display may output thecharacter to a user through the display.

Alternatively, if the user is operating the machine through a securevoice guidance mode, it may be undesirable to output the actualcharacter and the machine may output a placeholder value such as anasterisk or other icon. Further, in some exemplary embodiments, the atleast one processor may operate to give the user the option to eitherdisplay the selected character on the screen or to avoid displaying theselected character. This feature may allow users with limited sight tohelp to verify that the character they have selected is the one thatthey desire. Of course these are only a few exemplary ways in whichcharacters can be selectively input through contact with an inputsurface.

The characters inputted through contact with the input surface maycorrespond to one or more characters in the personal identificationnumber (PIN). This method may also be used to input the user's entirePIN. Alternatively in some embodiments, the inputted characters maycorrespond to values, such as the values associated with the financialtransaction that the user desires to carry out. In still otherembodiments, the inputted characters may correspond to selected types oftransactions or other values or selections that a user can provide to anautomated banking machine.

In an exemplary transaction, the user may have a card read throughoperation of the card reader 708. The banking machine 700 prompts theuser via signals that produce audio outputs through the audio outputport to enter his or her PIN through contact with the input surface ofthe touch screen display 728. The user 701 then contacts the inputsurface 730 of the touch screen display 728 with one or more fingers731. In this example, the number of fingers contacting the input surface730 corresponds to the first character of the PIN. After the terminalprocessor 702 receives the at least one input corresponding to the firstcharacter of the PIN, the terminal processor 702 generates signals thatprovide a verbal output of the character to the audio output port 754.The user hears the name of the character via the headphone 758. A“cancel” function key button 736 configured for visually impaired usersmay be provided for the user 701 to press, if the user 701 desires tocancel this input. Outputs may advise the user of the location of thisbutton. Alternatively, an “accept” function key button may be providedon the machine so the user may indicate that the output character isaccurate. Alternatively the user may be instructed to touch the screenin a certain way to indicate if the output is correct. For example, theuser could be prompted to concurrently place two fingers on the inputsurface of the touch screen to accept the character and three fingers tocancel.

After accepting a first character, the user 701 may then be instructedthrough audio outputs produced through operation of the at least oneprocessor to again contact the input surface 730 of the touch screendisplay 728 with one or more fingers 731. The number and/or sequence offingers 731 contacting the input surface 730 provides an inputcorresponding to the second character of the PIN. After the terminalprocessor 702 receives the data corresponding to the second PINcharacter inputted, the terminal processor 702 generates a verbal outputof the character to the audio output port 754. The user 701 hears thename of the second character via the headphone 758. The user can thenaccept or cancel the character in the manner provided through operationof the at least one processor of the machine. This process of inputtingcharacters repeats until all of the characters of the PIN are inputted.Verbal outputs may instruct the user to touch the input source in acertain way (for example with two fingers) to enter the PIN, and inanother way (for example three fingers) to cancel and start over.

The inputs through contact with the input surface may alternativelycorrespond to a value associated with cash requested to be dispensed bythe machine 700. For example, the machine may prompt the user 701 via anaudio output to enter on the touch screen display 728 the amount of cashthat the user 701 wants dispensed. The user 701 then contacts the inputsurface 730 of the touch screen display 728 with one or more fingers731. The number of fingers 731 and sequence for contacting the inputsurface 730 corresponds to the first numerical character of the value ofthe desired amount of cash. After the terminal processor 702 receivesthe data corresponding to the first numerical character, the terminalprocessor 702 generates signals corresponding to verbal output of thefirst numerical character to the audio output port 754. The user 701hears the name of the character via the headphone 758. The user 701 maypress the “cancel” function key button 736, if the user 701 desires tocancel this input. This process of inputting a numerical characterrepeats until all characters of the value associated with the cashdispensed are inputted.

Alternatively or additionally inputs may correspond to other characters,such as characters associated with or that represent functions orvalues. For example, the machine may be programmed to provide numeroustypes of transaction functions. These functions may include (forexample) cash dispense, balance inquiry, check cashing, deposit andother functions. The at least one processor may operate to receive oneor more character inputs via finger contact with the contact surface forthe user to select a transaction function. For example the machine mayprompt a user at a given time in the transaction sequence carried outresponsive to operation of the at least one processor to place onefinger in contact with the input surface to select a cash dispenser, twofingers to select a balance inquiry, three fingers to select a depositand so on for other available transaction types. Of course theseapproaches are exemplary and in other embodiments other approaches maybe used.

It should be understood that in some embodiments only users whocommunicate with the machine via headphones or other device in operationconnection with the output port may operate the machine by providinginputs through finger contact of the type described. In otherembodiments other users of the machine may provide inputs to the machinein this manner. In such embodiments the output port of the machine mayinclude or be in operative connection with an audio speaker, visualdisplay or other type of user perceptible output device that enablescommunication with the machine user. Such communication may direct theuser in operation of and to indicate to the user the character valuesrepresented by such contact inputs. Alternatively, in some embodimentswhen a device such as headphones are not in operative connection withthe output port the at least one processor of the machine may operate toprovide indicia through the screen which instructs sighted users on howto input characters by contacts with the touch screen. Further in somealternative embodiments inputs may be provided through contact withitems other than a touch screen. This might include a touch pad,signature pad or other contact sensing device on the machine, forexample. Alternatively the at least one processor of the machine may bein contact with a wireless output device which enables the user toprovide inputs through a mobile wireless device such as a smart phone.In such embodiments, the user may provide transaction inputs throughfinger contact with the screen or other input devices of the smartphone. The user may also be able to receive audio outputs securely usinga headset that is in operative connection with the smart phone. This mayinclude, for example, a Bluetooth enabled headset which enables the userto privately hear the audio outputs produced through operation of theprocessor of the machine responsive to the finger contacts with thescreen of the portable wireless device. Of course these approaches areexemplary and in other embodiments, other approaches may be used.

FIG. 57 shows an alternative exemplary embodiment of a machine forvisually impaired users 801 (FIG. 58). The machine 800 is in operativeconnection with at least one terminal processor 802. The terminalprocessor 802 is in operative connection with at least one data store804. Similar to some of the other example embodiments data store 804includes data as well as computer executable instructions or softwarethat are carried out through operation of the terminal processor tooperate the machine. Of course it should be understood that while onlyone terminal processor 802 and data store 804 are shown, embodiments mayinclude numerous processors and data stores. Alternatively, the terminalprocessor 802 may not be located within the machine 800 and may belocated in a server or other device remote from the machine.

The terminal processor 802 is in operative connection with transactionfunction devices of the machine generally indicated 806. The exemplarytransaction function devices 806 include a card reader 808. The cardreader 808 is operative to read data included on user cards. Thisincludes for example data corresponding to financial accounts of usersof the automated banking machine. Another exemplary transaction functiondevice is a printer 810. The printer 810 may include a receipt printerof the type that provides users with receipts for transactions conductedat the machine.

Another exemplary transaction function device in the ATM 800 is a cashdispenser 812. Cash dispenser 812 may be of the type previouslydescribed that operates to cause cash such as currency bills that arestored within the machine 800 to be selectively dispensed and madeaccessible to a user outside the machine 800. The terminal processor 802is in operative connection with the cash dispenser 812 and the cardreader 808. The terminal processor 802 is operative to cause the machine800 to operate to read card data from a user card and to cause adetermination to be made by communication with another computer orotherwise that the card data read from the user card corresponds to anauthorized user and/or an authorized financial account. The terminalprocessor is also operative to receive at least one input such as a useridentifying PIN. The terminal processor may also operate to cause adetermination to be made that the PIN is valid. The terminal processor802 may then operate responsive at least in part to one or bothdeterminations to cause cash to be dispensed from the machine 800 to theuser and to cause a financial account corresponding to the card data tobe assessed for cash dispensed.

The exemplary ATM 800 also includes a depository 814. Depository 814 maybe of the type that accepts deposits made by a user into the machine800. Such deposits may include in some embodiments deposited items thatare included in deposit envelopes. In other embodiments the depositorymay accept items such as cash or checks. Of course it should beunderstood that the machine 800 may include other or different types oftransaction function devices. These may include for example differenttypes of input devices, output devices as well as devices for performingtransaction functions of the type desired at the machine.

In the exemplary embodiment, the machine 800 includes a touch screendisplay module 816 that is operatively connected to the terminalprocessor 802. The touch screen display module 816 includes a housing818 that houses the internal display module components. These componentsmay include a display module processor 820. The display module processoris in operative connection with at least one module data store 822. Inthe exemplary embodiment, the housing of the display module may includeat least one battery 824. The at least one battery 824 operates toprovide a source of power so as to enable volatile memory of the datastore 822 to maintain data storage even during times when the machine isturned off or unplugged from an AC power source. These components aredesigned to provide a secure input device through which users can inputdata which is protected from being intercepted by unauthorized persons.

The exemplary embodiment of the touch screen display module 816 includesa pane 826. Pane 826 of the exemplary embodiment comprises a generallytransparent pane which is part of a touch screen display 828. The touchscreen display 828 may be one of several types which can be used todetermine the relative location on the screen at which user 801 makescontact with an input surface 830 of the touch screen display 828 usinghis or her fingers 831. This may include for example in some embodimentsa resistance detecting touch screen display 828. In other embodimentsthe touch screen display 828 may be of the capacitance detecting type.In still other embodiments the touch screen display 828 may include anacoustic wave detecting type. In still other embodiments, a camera maybe positioned either behind or in front of the pane to determine thepoint of user finger contact with the input surface. As can beappreciated other various suitable types of touch screen displays 828may be used to determine the position of contact made by a user'sfingers on the touch screen display 828 so as to detect when a usertouches the input surface 830 of the touch screen display 828. Also, themachine 800 may include the touch screen display 828 as a standalonecomponent that is operatively connected to the terminal processor 802instead of being part of a touch screen display module.

The exemplary machine 800 is configured to recognize inputs on the touchscreen display 828 without the need to display the character inputted.In particular, data corresponding to a character is received by theterminal processor 802 in response to a contact with at least one area852 of the input surface 830 of the touch screen display 828. The area852 of contact does not include any visible output indicia thatcorresponds to the character, before the area 852 is contacted. Thecharacter may correspond to a numerical character, an alphabeticcharacter, or any other type of character. As shown in FIG. 58, themachine 800 includes a fascia 832. The fascia 832 of the exemplaryembodiment may include a recessed area 834 in which the touch screendisplay 828, function key buttons 836, card reader 808 and receiptoutlet 838 are positioned. The fascia may include an opening for thereceipt of one or more checks which can be passed to a check acceptorincluding a scanner within the machine. A cash dispense opening 840 anda cash acceptance opening 842 are also positioned on the fascia 832.

In this example embodiment, a user contacts the input surface 830 of thetouch screen display 828 with his finger 831 and draws the character onthe area 852 of the input surface 830 with his finger 831. For example,as represented in FIG. 58, the user touches the input surface 830 of thetouch screen display 828 with his finger 831 and draws the number one.Alternatively, the user may contact the input surface 830 of the touchscreen display 828 with the stylus or other writing instrument and drawthe character on the input surface 830 using the stylus or other writinginstrument. In exemplary embodiments, the at least one processoroperates to receive an input corresponding to a character responsive toa line or lines drawn through finger contact with the input surface. Theprogramming associated with the at least one processor may operate insome environments to analyze a cursive character represented by theuser's movement of the finger while in continuous contact with the inputsurface. In still other embodiments, the programming associated with theat least one processor may operate to provide persistence through aperiod of finger contacts to the input surface during a relatively smallperiod of time. Thus, for example, the user may be able to create acharacter by printing or writing while removing the finger from contactwith the machine between strokes. Thus, in such exemplary embodiments, acharacter may be indicated by drawing through finger contact with theinput surface, a number of different lines which make up the characterthe drawing of such lines being done by the user repeatedly engaging anddisconnecting their finger from the input surface. Of course theseapproaches are exemplary and in other embodiments other approaches maybe used.

The at least one processor operates to execute instructions whichanalyze the line or lines drawn through finger contact with the inputsurface. The computer executable instructions operating in the at leastone processor are operative to resolve a character corresponding to thecharacter drawn by the user through contact with the input surface.Handwriting recognition software running on the terminal processor 802or other processor determines the character corresponding to thehandwritten character drawn on the input surface 830 of the touch screendisplay 828. The data may be resolved by the terminal processor 802 whenthe user removes his or her finger 831 from the input surface 830.Alternatively, the data may be resolved through operation of theterminal processor 802 upon the user removing his finger 831 and pushinga function key button 836 or taking other action suitable for visuallyimpaired users of the machine 800. This may be done, for example, in themanner previously described such as by instructing the user to contactthe input surface with two fingers concurrently to accept the resolvedcharacter that is output and to concurrently contact the input surfacewith three or more fingers to cancel the resolved character and tryagain. Of course these approaches are exemplary of approaches that maybe used for, this purpose.

The exemplary machine 800 includes an audio output port 854 (FIG. 57)for providing audio feedback to the user after inputting the character.In the exemplary embodiment shown in FIG. 58, the audio output port 854includes a headphone jack 856 that is operatively connected to aheadphone 858. However, as previously discussed, in other embodimentsthe audio output port 854 may include other output devices such as aBluetooth port or a speaker. Also, the audio output port 854 may beconfigured to be in operative communication with a cell phone. The audiooutput port 854 may also utilize near field communication.

The audio output port 854 is in operative connection with the at leastone terminal processor 802. The terminal processor 802 may includesoftware that generates signals corresponding to verbal outputs ofcharacters based on data received by the terminal processor 802. Theterminal processor 802 is operative to cause audio signals correspondingto the name of the character to be outputted through the audio outputport 854. For example, after the terminal processor 802 receives thedata corresponding to the number one drawn on the input surface 830 ofthe touch screen display 828, the terminal processor 802 generatesoutput signals usable to produce an audio output of the number “one” tothe audio output port 854. The user 801 hears the number one via theheadphone 858 and is thus, provided with appropriate audio feedback ofthe character inputted. The headphone 858 provides secure audio feedbackof the character inputted to the user 801 by preventing other persons inthe area near the machine 800 from hearing the character inputted.Optionally, the verbal signals may be encrypted so that they can only bedetermined by the hardware device of the user 801 which decrypts theaudio outputs.

In some embodiments input characters may correspond to characters in theperson identification number (PIN). This method may also be used toinput the entire PIN. In particular, the user 801 may insert his or hercard through the card reader 808 and the machine 800 prompts the uservia an audio output to enter his PIN on the touch screen display 828.The user then draws the first character of the PIN on the input surface830 of the touch screen display 828.

After the terminal processor 802 receives or resolves the inputscorresponding to the character drawn on the input surface 830 of thetouch screen display 828, the terminal processor 802 resolves thecharacter and produces signals usable to produce a verbal output of thecharacter through the audio output port 854. The user 801 hears thesounds corresponding to the type of the character via the headphone 858.A “cancel” function key button 836 configured for visually impairedusers or other input type may be provided for the user 801 to press orinput, if the user 801 desires to cancel this input. Alternatively or inaddition an “accept button” or other input device or other approach maybe provided for a user to accept or reject selections in a manner likethat previously described.

After a first character is input, the exemplary at least one processoroperates in accordance with its programming to cause the output ofsignals that prompt the user to input the next character of their PIN.In exemplary embodiments, this may be done through signals usable toproduce audio outputs via the headphone or other audio output device. Insome embodiments the at least one processor may alternatively or alsooperate to provide outputs through the display which prompt the user toprovide an input corresponding to the next character of the user's PIN.The at least one processor then receives an input corresponding to thenext PIN character as the user draws the next character of the PIN onthe input surface 830 of the touch screen display 828. After theterminal processor 802 receives the data corresponding to this characterdrawn on the input surface 830 of the touch screen display 828, theterminal processor 802 generates signals corresponding to a verbaloutput of the type of character through the audio output port 854. Theuser 801 hears the name type of the character via the headphone 858. Theuser is then enabled to accept or cancel the indicated character that isdescribed through the verbal output. This process of inputtingcharacters repeats until all of the characters of the PIN are inputted.Alternatively, the touch screen display 828 may be configured to alloweither inputting a character by drawing it on the input surface 830 ofthe touch screen display 828, or inputting a character by touching theinput surface 830 of the touch screen display 828 concurrently with thefingers 831 of the user 801. For example, for a PIN that has thecharacters “31”, the number three may be inputted by touching the inputsurface 830 of the touch screen display 828 concurrently with thefingers 831 of a user 801, and the number one may be drawn by the useron the input surface 830 of the touch screen display 828. Alternativelyor in addition, the programming associated with the at least oneprocessor in some embodiments may enable the input of characters byrepeated contact via finger with the screen or combinations of contactssuch as one or more continuous contacts with concurrent repeated contactand releases with the screen. As previously discussed, numerousdifferent combinations of continuous and periodic contacts and/or thedrawing of characters on the input surface can be used in variousembodiments to provide inputs which can be resolved through operation ofone or more processors as characters or other types of inputs to bereceived by the machine.

Alternatively, in some embodiments instead of drawing and input of dataof each character of the PIN to the terminal processor 802 one characterat a time, the entire PIN may be drawn on the input surface 830 of thetouch screen display 828, and the input corresponding to all of thecharacters of the PIN may then be received and/or resolved all at onceto the terminal processor 802. In this example, the user would hear theverbal output of the entire PIN after the terminal processor 802resolves the characters in the PIN data. Alternatively the PIN data maybe output visually through the screen or the user may have the option toallow the characters included in the PIN to be output through thedisplay of the machine or in some cases the display of a phone or otherpersonal device. Similar to the approaches previously described, usingthis approach, the user will have the option to either indicate that theresolved PIN data is correct or to cancel the input if it is not correctand provide another input.

In some embodiments input characters may alternatively correspond to avalue associated with cash dispensed by the machine 800. For example,the machine 800 may prompt the user 801 via an audio output to enter onthe touch screen display 828 the amount of cash that the user 801 wantsdispensed. The user 801 then draws the first numerical character of thevalue of the desired amount of cash on the input surface 830 of thetouch screen display 828. After the terminal processor 802 or otherprocessor receives the one or more inputs corresponding to the firstcharacter drawn on the input surface 830 of the touch screen display828, the terminal processor 802 or other processor generates a verbaloutput signal of the character to the audio output port 854. The user801 hears the name of the character via the headphone 858. The user 801may accept or cancel and retry the input in the manner previouslydescribed. This process of inputting a numerical character repeats untilall the characters of the value associated with the cash dispensed areinputted. Alternatively, the touch screen display 828 may be configuredto allow either inputting a character of the value by drawing it on theinput surface 830 of the touch screen display 828, or inputting acharacter of the value by touching the input surface 830 of the touchscreen display 828 simultaneously with the fingers 831 of a user 801.

Alternatively, instead of drawing and sending data of each numericalcharacter of the value associated with the cash dispensed to theterminal processor 802 one character at a time, the entire value may bedrawn on the input surface 830 of the touch screen display 828, and theinput corresponding to all of the characters of the value may then beused to resolve the entire value through operation of the terminalprocessor 802 or other processor. In this example, the user 801 wouldhear the verbal output of the value after the terminal processor 802receives the data corresponding to all of the characters of the value.

It should be understood that other types of characters of other indiciacan be input in this manner, such as characters or indicia correspondingto functions or other types of values (e.g., one finger contact for cashwithdrawal, and so on). Further, in some embodiments finger contact maybe used by users other than those that are visually impaired to operatethe machine. For example in some embodiments finger contact data may becommunicated via audio or visual output devices to sighted machine usersto enable operation of the machine. Further in some embodiments usersmay provide inputs by touching a tactile sensing device such as a touchpad, signature pad or other device that senses finger contact(s),position and/or movement.

In addition in some embodiments, the machine may communicate via theoutlet port with a user's phone or other portable device to provideaudio or visual outputs that enable interfacing with the machine. Instill other embodiments the machine may be operative to communicate witha user's portable interface device such as a smart phone or iPad® deviceproduced by Apple Computer. In such circumstances the machine maycommunicate with such a device such that the input surface on the deviceserves as the contact surface for inputs for the machine. Thus forexample, a portable device of the type that has a screen that can sensecontact by and/or movement of a user's finger thereon, may be used asthe contact surface for inputs to the machine. The inputs through theportable device may be communicated to the machine via Bluetooth or nearfield communication, for example. Thus the portable device may be usedin lieu of or in addition to the input surface on the machine forpurposes of providing inputs. In some embodiments, automated bankingmachines may be programmed to operate to receive user inputs through atouch screen that corresponds to visual outputs for some users whoprovide inputs to indicate that they wish to operate the machine in thatmanner. Other users may provide inputs to the machine via contact withan input surface on the touch screen display of the machine with audioor visual feedback via headphones, a visual display or other outputdevice. Other users may interface with the machine such that the surfaceof the machine becomes the contact sensitive screen of the user'spersonal portable device. Further, in various examples, processorsassociated with the touch screen, various circuit boards, the user'spersonal portable device and/or a central terminal processor may operateto determine the nature of user contacts with the input surface andresolve characters representative thereof. Of course these approachesare exemplary and in other embodiments, different or other combinationsof approaches may be used.

Other exemplary embodiments of a machine for the visually impaired thatrecognize inputs on a touch screen display without the need to displaythe character inputted may be provided. For example, a user maysuccessively touch the input surface of the touch screen display withhis or finger. Software running on the terminal processor or otherprocessor or other processor determines the number of successive toucheson the input surface. The software then determines the numerical orother character corresponding to this input. The data may be resolved bythe terminal processor or other processor after a predetermined timeelapses from the last touch on the input surface. Alternatively, thedata may be resolved by another processor and sent to the terminalprocessor upon the user pushing a function key button on the machine.For example, a user may touch the input surface three successive times.The software determines that this corresponds to the number three andsends this data to the terminal processor after five seconds has elapsedfrom the third touch of the input surface if another touch is notdetected. Similar to the previously mentioned embodiments, the machineincludes an audio output port for providing audio feedback to the userafter inputting the character.

In other example embodiments, a user may touch the input surface andslide or drag his finger along the input surface. As the user drags hisfinger, verbal outputs corresponding to sequential numerical charactersmay be resolved through operation of at least one processor and signalscorresponding thereto outputted to the audio port. For example, thesequential verbal outputs of the numerical characters generated maybegin with the number nine and count down to zero (i.e. 9, 8, 7, 6, 5,4, 3, 2, 1, 0). In another example, the sequential verbal outputs of thenumerical characters generated may begin with zero and count up to thenumber nine (i.e. 0, 1, 2, 3, 4, 5, 6, 7, 8, 9). These sequences may berepeated as the finger drags along the input surface. Alternatively orin addition, sequences may include alphabetical characters or othertypes of characters or indicia. The user hears the name of the numericalcharacters via the head phones or other output device. When the userhears the desired number to be inputted, he stops moving his finger.Data corresponding to this last numerical character heard by the user isthen resolved as the selected character through operation of aprocessor. In examples where a separate processor resolves the characterdata, the data may be sent to the terminal processor after the userremoves his finger off the input surface of the touch screen displaywhen a desired character or other indicia has been output.

Alternatively, the data may be resolved or sent to the terminalprocessor upon the user removing his finger and then pushing a functionkey button or proving another type of input through the machine.Optionally, in some examples the user may touch the input surface withhis finger and thumb and slide them on the input surface towards or awayfrom each other to provide selected inputs. For example, when the fingerand thumb are moved towards each other in contact with the input surface(i.e. pinching movement), verbal outputs corresponding to the countingdown of numerical characters (or other types of characters) aregenerated. When the finger and thumb are moved away from each other incontact with the input surface, verbal outputs corresponding to thecounting up of numerical characters (or other types of characters) aregenerated. Of course these approaches are merely exemplary of fingercontact and movements that can be used for character selection andinput.

Some exemplary automated banking machines with the touch screen display(or other tactile device) which can be operated in the manner describedmay have advantages over other machines for the visually impaired. Forexample, the machine may not require a keyboard and/or Braille keys forthe visually impaired to feel or otherwise allows the visually impairedto operate. Further such features may also be used to facilitate theoperation of automated banking machine by sighted users and/or users whowish to interface with machines through tactile inputs or through theirpersonal portable devices.

Thus the automated banking machines and systems of the exemplaryembodiments may achieve one or more of the above stated objectives,eliminate difficulties encountered in the use of prior devices andsystems, solve problems and attain the desirable results describedherein.

In the foregoing description certain terms have been used for brevity,clarity and understanding, however no unnecessary limitations are to beimplied therefrom because such terms are for descriptive purposes andare intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and any claimed invention isnot limited to the details shown and described.

In the following claims any feature described as a means for performinga function shall be construed as encompassing any means capable ofperforming the recited function, and shall not be deemed limited to theparticular means shown in the foregoing description or mere equivalentsthereof.

Having described the features, discoveries and principles of theinvention, the manner in which it is constructed and operated, and theadvantages and useful results attained; the new and useful structures,devices, elements, arrangements, parts, combinations, systems,equipment, operations, methods, processes and relationships are setforth in the appended claims.

We claim:
 1. A method comprising: (a) operating at least one processor,while an area of an input surface of a touch screen display device of anautomated transaction machine is absent any output of visible indiciacorresponding to user contact with the input surface by at least one of:(ai) a plurality of user fingers simultaneously contacting the area ofthe input surface; or (aii) a user finger drawing a character whilecontacting the area of the input surface; (b) operating the at least oneprocessor to analyze the contact data received in (a) with regard touser input to the machine; and (c) operating the at least one processorresponsive at least in part to the analysis in (b), to determine thatthe contact data received in (a) corresponds to user input of aparticular alphanumeric character; wherein the particular alphanumericcharacter determined in (c) is not visible in the area of the inputsurface during (a).
 2. The method according to claim 1 wherein themachine includes at least one data reader operable to read user datacorresponding to financial accounts, wherein the machine includes a cashdispenser, wherein the machine is operable to allow a cash dispenseinvolving a financial account responsive at least in part to thefinancial account corresponding to user data read by the at least onedata reader, and further comprising: (d) operating the at least oneprocessor to cause the cash dispenser to dispense an amount of cash,wherein the amount corresponds to at least one alphanumeric character,wherein the at least one alphanumeric character includes the particularalphanumeric character determined in (c).
 3. The method according toclaim 1 wherein (a) includes receiving the contact data by a pluralityof user fingers simultaneously contacting the area of the input surface.4. The method according to claim 1 wherein (a) includes receiving thecontact data by a user finger drawing a character while contacting thearea of the input surface.
 5. The method according to claim 1, furthercomprising: wherein the machine includes a card reader operable to readfrom cards, card data that corresponds to at least one financialaccount; and a cash dispenser operable to dispense cash from themachine; operating at least one processor to: cause the card reader toread card data from a user card; cause a determination to be made thatthe card data corresponds to an authorized financial account; cause thecash dispenser, responsive at least in part to both the determinationthat the card data corresponds to an authorized financial account, andthe particular alphanumeric character to dispense cash from the machine;and cause the authorized financial account to be assessed a valueassociated with the cash dispensed by the cash dispenser.
 6. The methodaccording to claim 1, wherein (a) wherein the user contact with theinput surface includes a stylus contact with the at least one area ofthe input surface.
 7. The method according to claim 1, wherein theparticular alphanumeric character includes a numerical value, andwherein the first numerical value corresponds to a number of concurrentin contact with the area of the input surface.
 8. The method accordingto claim 1, wherein the automated transaction machine includes an audiooutput port, the method further comprising operating the at least oneprocessor to cause signals usable to produce audio outputs correspondingto the particular alphanumeric character, to be output through the audiooutput port.
 9. The method according to claim 8, wherein the audiooutput port includes at least one of a speaker, a headphone jack or awireless output port, wherein the signals are to be output through theat least one of a speaker, a headphone jack, and a wireless output port.10. The method according to claim 1, wherein the particular alphanumericcharacter corresponds to at least one portion of a personalidentification number.
 11. The method according to claim 5, wherein theat particular alphanumeric character corresponds to an amount of cash tobe dispensed by the cash dispenser.
 12. The method according to claim 1,the method further comprises encrypting the particular alphanumericcharacter.
 13. The method, according to claim 1, wherein the automatedtransaction machine further comprises a check scanner the method furthercomprising: operating at least one processor to cause a check to bescanned through operation of the check scanner, wherein the check has anassociated value; determining the associated value of the check; andcrediting a financial account associated with the user with theassociated value of the check.
 14. A method comprising: operating atleast one processor associated with an automated transaction machinecomprising a cash dispenser, a reader and a touch screen to obtain datarepresentative of a financial account associated with a user from dataobtained by the reader operating at least one processor, while an areaof an input surface of the touch screen display device is absent anyoutput of visible indicia corresponding to user contact with the inputsurface by at least one of: a plurality of user fingers simultaneouslycontacting the area of the input surface, or a user finger drawing acharacter while contacting the area of the input surface surface, toanalyze the contact data received in with regard to user input to theautomated transaction machine and to determine that the contact datareceived corresponds to user input of particular alphanumericcharacters, wherein the particular alphanumeric characters determinedare not visible in the area of the input surface during user contactwith the contact surface; operating the at least one processor to causethe cash dispenser to dispense an amount of cash, wherein the amountcorresponds to the particular alphanumeric characters; and operating theat least one processor to cause the amount of cash dispensed by the cashdispenser to be debited from the financial account.
 15. The methodaccording to claim 14, wherein the automated transaction machine furthercomprises a check scanner, the method further comprising: obtaining datarepresentative of a check deposited via the check scanner, wherein thecheck has a value; and crediting the value of the check to the financialaccount.
 16. The method according to claim 14, wherein the automatedtransaction machine further comprises a deposit interface, the methodfurther comprising: obtaining data representative of cash deposited viathe deposit interface, wherein the cash has a value; and crediting thevalue of the cash to the financial account.
 17. The method according toclaim 14 wherein the reader is a card reader.
 18. The method accordingto claim 14, wherein the reader obtains data wirelessly from a mobiledevice associated with the user.