Automated banking machine that outputs interference signals that jam reading ability of unauthorized card reader devices

ABSTRACT

A cash dispensing automated banking machine includes a card reader associated with a card slot. An anti-fraud sensing device is able to sense ambient light or generated radiation that passes to the sensing device through the card reader slot. The installation of an unauthorized card reading device on the machine changes at least one property sensed by the sensing device. A controller in the machine receives signals from the sensing device, and determines if an unauthorized card reading device has been installed.

CROSS REFERENCE TO RELATED APPLICATION

This Application is a continuation of U.S. application Ser. No.11/542,644 filed Oct. 3, 2006 now U.S. Pat. No. 7,798,395, which claimsbenefit pursuant to 35 U.S.C. §119(e) of Provisional Application No.60/815,287 filed Jun. 20, 2006.

U.S. application Ser. No. 11/542,644 is also a continuation-in-part ofU.S. application Ser. No. 10/832,960 filed Apr. 27, 2004, now U.S. Pat.No. 7,118,031, which is a continuation-in-part of U.S. application Ser.No. 10/601,813 filed Jun. 23, 2003, now U.S. Pat. No. 7,240,827, whichclaims benefit pursuant to 35 U.S.C. §119(e) of Provisional Application60/429,478 filed Nov. 26, 2002. U.S. application Ser. No. 10/832,960claims benefit pursuant to 35 U.S.C. §119(e) of Provisional Application60/560,674 filed Apr. 7, 2004. The disclosure of each of these priorapplications is incorporated herein by reference.

TECHNICAL FIELD

This invention relates to automated banking machines that operateresponsive to data read from data bearing records. Specifically thisinvention relates to automated banking machine apparatus, systems andmethods that provide for improved security, reliability andserviceability.

BACKGROUND ART

Automated banking machines are known. A common type of automated bankingmachine used by consumers is an automated teller machine (“ATM”). ATMsenable customers to carry out banking transactions. Examples of bankingtransactions that are sometimes carried out with ATMs include thedispensing of cash, the making of deposits, the transfer of fundsbetween accounts, the payment of bills, the cashing of checks, thepurchase of money orders, the purchase of stamps, the purchase oftickets, the purchase of phone cards and account balance inquiries. Thetypes of banking transactions a customer can carry out at an ATM aredetermined by the particular banking machine, the system in which it isconnected and the programming of the machine by the entity responsiblefor its operation.

Other types of automated banking machines may be operated in other typesof environments. For example certain types of automated banking machinesmay be used in a customer service environment. For example serviceproviders may use certain types of automated banking machines forpurposes of counting currency or other items that are received from orwhich are to be given to a customer. Other types of automated bankingmachines may be used to validate items which provide the customer withaccess, value or privileges such as tickets, vouchers, checks or otherfinancial instruments. Other examples of automated banking machines mayinclude machines which are operative to provide users with the right tomerchandise or services in an attended or a self-service environment.For purposes of this disclosure an automated banking machine shall bedeemed to include any machine may be operated to carry out transactionsincluding transfers of value.

Automated banking machines are typically used in environments where theycarry out or support the conduct of transactions. It is desirable tokeep automated banking machines in operation at all appropriate times tothe extent possible. If a machine should experience a fraud attempt, itis useful to detect such attempt and return the machine to service asquickly as possible.

Thus, there exists a need for improvements in the operation,reliability, servicing and repair of automated banking machines.

DISCLOSURE OF INVENTION

It is an object of an exemplary embodiment to provide an automatedbanking machine.

It is a further object of an exemplary embodiment to provide anautomated banking machine which provides for reliable illumination oftransaction areas while facilitating servicing of the machine.

It is a further object of an exemplary embodiment to provide anautomated banking machine that facilitates the detection of fraudulentactivity which may be attempted at the machine.

It is a further object of an exemplary embodiment to provide anautomated banking machine which improved capabilities.

It is a further object of an exemplary embodiment to provide anautomated banking machine which reduces the risk of unauthorized accessto devices and operations of the machine.

Further objects of exemplary embodiments will be made apparent in thefollowing Best Modes for Carrying Out Invention and the appended claims.

The foregoing objects are accomplished in some exemplary embodiments byan automated banking machine which is an ATM. The ATM includes aplurality of transaction function devices. In the exemplary embodimentthe transaction function devices include input and output devices whichare part of a user interface. In the exemplary embodiment thetransaction function devices also include devices for carrying out typesof banking transactions such as a currency dispenser device and adeposit accepting device. The exemplary ATM also includes at least onecomputer which is generally referred to herein as a controller, andwhich is operative to cause the operation of the transaction functiondevices in the machine.

In an exemplary embodiment the ATM includes a housing with a securechest portion and an upper housing area. The chest portion housescertain transaction function devices such as the currency dispenserdevice. The chest portion includes a chest door which is generallysecured but which is capable of being opened when unlocked by authorizedpersons.

In the exemplary embodiment the upper housing area includes a firstportion and a second portion. Access to the first and second portionsare controlled by independently movable first and second fasciaportions. In the exemplary embodiment one or more devices that must bemanipulated in order to unlock the chest door are positioned within thefirst housing area. Access to the first portion of the upper housing iscontrolled by a fascia lock in operative connection with the firstfascia portion.

In some exemplary embodiments during operation of the ATM, thetransaction areas are illuminated to facilitate operation of the machineby users. In an exemplary embodiment the controller of the ATM isoperative to illuminate the transaction areas at those times when theuser would be expected to receive or place items in such transactionareas during the conduct of transactions. This facilitates guiding theuser to the particular transaction area on the machine even when themachine is being operated during daylight hours.

In some exemplary embodiments the capability of illuminating selectedareas of the machine during certain transaction steps may be utilized inconjunction with anti-fraud devices. In an exemplary embodimentanti-fraud devices are used to reduce the risk that an unauthorized cardreading device is installed externally of the machine adjacent to thecard reader slot of the machine fascia. Criminals are sometimesingenious and in the past some have produced reading devices that canintercept magnetic stripe data on cards that are being input to an ATMby a consumer. By intercepting this data, criminals may be able toconduct unauthorized transactions with the consumer's card number. Suchexternal reading devices may be made to appear to be a part of thenormal ATM fascia.

In an exemplary embodiment the housing in surrounding relation of thecard reader slot is illuminated responsive to operation of thecontroller. In some exemplary machines the housing is operative toilluminate an area generally entirely surrounding the slot so as to makeit more readily apparent to a user that an unauthorized modification orattachment to the fascia may have been made.

In some exemplary embodiments during normal operation, the illuminationof the area surrounding the fascia card slot is operative to help toguide the user to the slot during transactions when a user is requiredto input or take their card. The exemplary ATM is provided withradiation sensing devices positioned adjacent to the illuminationdevices that are operative to illuminate the area surrounding the cardreader slot. The exemplary controller is programmed to sense changes inthe magnitude of radiation sensed by the one or more radiation sensingdevices. The installation of an unauthorized card reading device inproximity to the card reading slot generally produces a change in themagnitude of the radiation sensed by the radiation sensing devices. Theexemplary controller is programmed to recognize such changes and to takeappropriate action in response thereto so as to reduce the possibilityof fraud. Such action may include in some exemplary embodiments, themachine sending a status message through a network to a person to benotified of a possible fraud condition. Such actions may also include insome embodiments, warning the user of the machine to look for theinstallation of a possible fraud device. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In some exemplary embodiments sensing devices may be provided inproximity to the keypad used by the customer to provide inputs, such asa personal identification number (PIN). Such sensors may be of theradiation sensing type or other type. Such sensors are adapted to sensethe installation of unauthorized input intercepting devices above oradjacent to the keypad. The sensing of such an unauthorized device maycause an exemplary controller in the machine to give notice of thepotential fraud device and/or to cease or modify the operation of themachine to reduce the risk of interception of customer inputs. In someexemplary embodiments radiation emitting devices used for sensing mayprovide outputs of visible light and may be used to guide a user atappropriate times during transactions to provide inputs to the keypad.

As will be appreciated, the foregoing objects and examples are exemplaryand embodiments of the invention need not meet all or any of theforegoing objects, and need not include all or any of the exemplaryfeatures described above. Additional aspects and embodiments within thescope of the claims may be devised by those having skill in the artbased on the teachings set forth herein.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an isometric external view of an exemplary automated bankingmachine which is an ATM and which incorporates some aspects and featuresof embodiments described in the present application.

FIG. 2 is a front plan view of the ATM shown in FIG. 1.

FIG. 3 is a transparent side view showing schematically some internalfeatures of the ATM.

FIG. 4 is a schematic view representative of the software architectureof an exemplary embodiment.

FIG. 5 is a front view showing the fascia portion moved to access afirst portion of an upper housing of the machine.

FIG. 6 is a partially transparent side view showing air flow through anair cooling opening of the machine.

FIG. 7 is an isometric view of the ATM shown in FIG. 1 with thecomponents of the upper housing portion removed.

FIG. 8 is a schematic side view of the housing showing schematically theillumination system for the transaction areas and representing inphantom the movement of the upper fascia portion so as to provide accessfor servicing.

FIG. 9 is a schematic view of an illumination and anti-fraud sensingdevice which bounds a card reader slot of an exemplary embodiment.

FIG. 10 is a schematic side view of an unauthorized card reading devicein operative connection with a housing of the anti-fraud sensor.

FIG. 11 is a schematic view of exemplary logic for purposes of detectingthe presence of an unauthorized card reading device in proximity to thecard reader during operation of the ATM.

FIG. 12 is an exemplary side, cross sectional view of an ATM keypad.

FIG. 13 is a schematic representation of a sensor for sensing whether anunauthorized key input sensing device has been placed adjacent to thekeypad.

FIG. 14 is a view of a keypad similar to FIG. 12 but with anunauthorized key input sensing device attached.

FIG. 15 is a schematic representation similar to FIG. 13, butrepresenting the change in reflected radiation resulting from theattachment of the unauthorized key input sensing device.

FIG. 16 is a schematic view of an anti-fraud device disposed within aslot of a card reader.

FIG. 17 is a schematic view of an unauthorized card reading devicemounted adjacent the card reader.

FIG. 18 is a schematic view of an alternate embodiment utilizingradiation emitters to emit radiation detectable by an anti-fraud device.

FIG. 19 is a schematic view of yet a further alternative embodiment ofan anti-fraud device.

BEST MODES FOR CARRYING OUT INVENTION

Referring now to the drawings and particularly to FIG. 1, there is showntherein an exemplary embodiment of an automated banking machinegenerally indicated 10. In the exemplary embodiment automated bankingmachine 10 is a drive up ATM, however the features described and claimedherein are not necessarily limited to ATMs of this type. The exemplaryATM includes a housing 12. Housing 12 includes an upper housing area 14and a secure chest area 16 in a lower portion of the housing. Access tothe chest area 16 is controlled by a chest door 18 which when unlockedby authorized persons in the manner later explained, enables gainingaccess to the interior of the chest area.

The exemplary ATM 10 further includes a first fascia portion 20 and asecond fascia portion 22. Each of the fascia portions is movably mountedrelative to the housing as later explained, which in the exemplaryembodiment facilitates servicing.

The ATM includes a user interface generally indicated 24. The exemplaryuser interface includes input devices such as a card reader 26 (shown inFIG. 3) which is in connection with a card reader slot 28 which extendsin the second fascia portion. Other input devices of the exemplary userinterface 24 include function keys 30 and a keypad 32. The exemplary ATM10 also includes a camera 34 which also may serve as an input device forbiometric features and the like. The exemplary user interface 24 alsoincludes output devices such as a display 36. Display 36 is viewable byan operator of the machine when the machine is in the operativecondition through an opening 38 in the second fascia portion 22. Furtheroutput devices in the exemplary user interface include a speaker 40. Aheadphone jack 42 also serves as an output device. The headphone jackmay be connected to a headphone provided by a user who is visuallyimpaired to provide the user with voice guidance in the operation of themachine. The exemplary machine further includes a receipt printer 44(see FIG. 3) which is operative to provide users of the machine withreceipts for transactions conducted. Transaction receipts are providedto users through a receipt delivery slot 46 which extends through thesecond fascia portion. Exemplary receipt printers that may be used insome embodiments are shown in U.S. Pat. No. 5,729,379 and U.S. Pat. No.5,850,075, the disclosures of which are incorporated by referenceherein. It should be understood that these input and output devices ofthe user interface 24 are exemplary and in other embodiments, other ordifferent input and output devices may be used.

In the exemplary embodiment the second fascia portion has includedthereon a deposit envelope providing opening 48. Deposit envelopes maybe provided from the deposit envelope providing opening to users who mayplace deposits in the machine. The second fascia portion 20 alsoincludes a fascia lock 50. Fascia lock 50 is in operative connectionwith the second fascia portion and limits access to the portion of theinterior of the upper housing behind the fascia to authorized persons.In the exemplary embodiment fascia lock 50 comprises a key type lock.However, in other embodiments other types of locking mechanisms may beused. Such other types of locking mechanisms may include for example,other types of mechanical and electronic locks that are opened inresponse to items, inputs, signals, conditions, actions or combinationsor multiples thereof.

The exemplary ATM 10 further includes a delivery area 52. Delivery area52 is in connection with a currency dispenser device 54 which isalternatively referred to herein as a cash dispenser, which ispositioned in the chest portion and is shown schematically in FIG. 3.The delivery area 52 is a transaction area on the machine in whichcurrency sheets are delivered to a user. In the exemplary embodiment thedelivery area 52 is positioned and extends within a recessed pocket 56in the housing of the machine.

ATM 10 further includes a deposit acceptance area 58. Deposit acceptancearea is an area through which deposits such as deposit envelopes to bedeposited by users are placed in the machine. The deposit acceptancearea 58 is in operative connection with a deposit accepting devicepositioned in the chest area 16 of the ATM. Exemplary types of depositaccepting devices are shown in U.S. Pat. No. 4,884,769 and U.S. Pat. No.4,597,330, the disclosures of which are incorporated herein byreference.

In the exemplary embodiment the deposit acceptance area serves as atransaction area of the machine and is positioned and extends within arecessed pocket 60. It should be understood that while the exemplaryembodiment of ATM 10 includes an envelope deposit accepting device and acurrency sheet dispenser device, other or different types of transactionfunction devices may be included in automated banking machines. Thesemay include for example, check and/or money order accepting devices,ticket accepting devices, stamp accepting devices, card dispensingdevices, money order dispensing devices and other types of devices whichare operative to carry out transaction functions.

In the exemplary embodiment the ATM 10 includes certain illuminatingdevices which are used to illuminate transaction areas, some of whichare later discussed in detail. First fascia portion 20 includes anillumination panel 62 for illuminating the deposit envelope providingopening. Second fascia portion 22 includes an illumination panel 64 forilluminating the area of the receipt delivery slot 46 and the cardreader slot 28. Further, an illuminated housing 66 later discussed indetail, bounds the card reader slot 28. Also, in the exemplaryembodiment an illuminating window 68 is positioned in the recessedpocket 56 of the delivery area 52. An illuminating window 70 ispositioned in the recessed pocket 60 of the deposit acceptance area 58.It should be understood that these structures and features are exemplaryand in other embodiments other structures and features may be used.

As schematically represented in FIG. 3, the ATM 10 includes one or moreinternal computers which are alternatively referred to herein ascontrollers. Such internal computers include one or more processors.Such processors may be in operative connection with one or more datastores. In some embodiments processors may be located on certain deviceswithin the ATM so as to individually control the operation thereof.Examples such as multi-tiered processor systems are shown in U.S. Pat.No. 6,264,101 and U.S. Pat. No. 6,131,809, the disclosures of which areincorporated herein by reference.

For purposes of simplicity, the exemplary embodiment will be describedas having a single controller which controls the operation of deviceswithin the machine. However it should be understood that such referenceshall be construed to encompass multicontroller and multiprocessorsystems as may be appropriate in controlling the operation of aparticular machine. In FIG. 3 the controller is schematicallyrepresented 72. Also as schematically represented, the controller is inoperative connection with one or more data stores 78. Such data storesin exemplary embodiments are operative to store program instructions,values and other information used in the operation of the machine.Although the controller is schematically shown in the upper housingportion of ATM 10, it should be understood that in alternativeembodiments controllers may be located within various portions of theautomated banking machine.

In order to conduct transactions the exemplary ATM 10 communicates withremote computers. The remote computers are operative to exchangemessages with the machine and authorize and record the occurrence ofvarious transactions. This is represented in FIG. 3 by the communicationof the machine through a network with a bank 78, which has at least onecomputer which is operative to exchange messages with the ATM through anetwork. For example, the bank 78 may receive one or more messages fromthe ATM requesting authorization to allow a customer to withdraw $200from the customer's account. The remote computer at the bank 78 willoperate to determine that such a withdrawal is authorized and willreturn one or more messages to the machine through the networkauthorizing the transaction. After the ATM conducts the transaction, theATM will generally send one or more messages back through the network tothe bank indicating that the transaction was successfully carried out.Of course these messages are merely exemplary.

It should be understood that in some embodiments the ATM may communicatewith other entities and through various networks. For example asschematically represented in FIG. 3, the ATM will communicate withcomputers operated by service providers 80. Such service providers maybe entities to be notified of status conditions or malfunctions of theATM as well as entities who are to be notified of corrective actions. Anexample of such a system for accomplishing this is shown in U.S. Pat.No. 5,984,178, the disclosure of which is incorporated herein byreference. Other third parties who may receive notifications fromexemplary ATMs include entities responsible for delivering currency tothe machine to assure that the currency supplies are not depleted. Otherentities may be responsible for removing deposit items from the machine.Alternative entities that may be notified of actions at the machine mayinclude entities which hold marketing data concerning consumers and whoprovide messages which correspond to marketing messages to be presentedto consumers. Various types of messages may be provided to remotesystems and entities by the machine depending on the capabilities of themachines in various embodiments and the types of transactions beingconducted.

FIG. 4 shows schematically an exemplary software architecture which maybe operative in the controller 72 of machine 10. The exemplary softwarearchitecture includes an operating system such as for example Microsoft®Windows, IBM OS/2® or Linux. The exemplary software architecture alsoincludes an ATM application 82. The exemplary application includes theinstructions for the operation of the automated banking machine and mayinclude, for example, an Agilis® 91x application that is commerciallyavailable from Diebold, Incorporated which is a cross vendor softwareapplication for operating ATMs. Further examples of softwareapplications which may be used in some embodiments is shown in U.S. Pat.Nos. 6,289,320 and 6,505,177, the disclosures of which are incorporatedherein by reference.

In the exemplary embodiment middleware software schematically indicated84 is operative in the controller. In the exemplary embodiment themiddleware software operates to compensate for differences betweenvarious types of automated banking machines and transaction functiondevices used therein. The use of a middleware layer enables the moreready use of an identical software application on various types of ATMhardware. In the exemplary embodiment the middleware layer may beInvolve® software which is commercially available from Nexus Software, awholly owned subsidiary of the assignee of the present invention.

The exemplary software architecture further includes a diagnostics layer86. The diagnostics layer 86 is operative as later explained to enableaccessing and performing various diagnostic functions of the deviceswithin the ATM. In the exemplary embodiment the diagnostics operate inconjunction with a browser schematically indicated 88.

The exemplary software architecture further includes a service providerlayer schematically indicated 90. The service provider layer may includesoftware such as WOSA XFS service providers for J/XFS service providerswhich present a standardized interface to the software layers above andwhich facilitate the development of software which can be used inconjunction with different types of ATM hardware. Of course thissoftware architecture is exemplary and in other embodiments otherarchitectures may be used.

As schematically represented in FIG. 4, a controller 72 is in operativeconnection with at least one communications bus 92. The communicationsbus may in some exemplary embodiments be a universal serial bus (USB) orother standard or nonstandard type of bus architecture. Thecommunications bus 92 is schematically shown in operative connectionwith transaction function devices 94. The transaction function devicesinclude devices in the ATM which are used to carry out transactions.These may include for example the currency dispenser device 54, cardreader 26, receipt printer 44, keypad 32, as well as numerous otherdevices which are operative in the machine and controlled by thecontroller to carry out transactions. In the exemplary embodiment one ofthe transaction function devices in operative connection with thecontroller is a diagnostic article reading device 96 which may beoperative to read a diagnostic article schematically indicated 98 whichmay provide software instructions useful in servicing the machine.Alternatively and/or in addition, provision may be made for connectingthe bus 92 or other devices in the machine computer device 100 which maybe useful in performing testing or diagnostic activities related to theATM.

In the exemplary embodiment of ATM 10 the first fascia portion 20 andthe second fascia portion 22 are independently movably mounted on theATM housing 12. This is accomplished through the use of hinges attachedto fascia portion 20. The opening of the fascia lock 50 on the firstfascia portion 20 enables the first fascia portion to be moved to anopen position as shown in FIG. 5. In the open position of the firstfascia portion an authorized user is enabled to gain access to a firstportion 102 in the upper housing area 14. In the exemplary embodimentthere is located within the first portion 102 a chest lock input device104. In this embodiment the chest lock input device comprises a manualcombination lock dial, electronic lock dial or other suitable inputdevice through which a combination or other unlocking inputs or articlesmay be provided. In this embodiment, input of a proper combinationenables the chest door 18 to be moved to an open position by rotatingthe door about hinges 106. In the exemplary embodiment the chest door isopened once the proper combination has been input by manipulating alocking lever 108 which is in operative connection with a boltwork. Theboltwork which is not specifically shown, is operative to hold the chestdoor in a locked position until the proper combination is input. Uponinput of the correct combination the locking lever enables movement ofthe boltwork so that the chest door can be opened. The boltwork alsoenables the chest door to be held locked after the activities in thechest portion have been conducted and the chest door is returned to theclosed position. Of course in other embodiments other types ofmechanical or electrical locking mechanisms may be used. In theexemplary embodiment the chest lock input device 104 is in supportingconnection with a generally horizontally extending dividing wall 110which separates the chest portion from the upper housing portion. Ofcourse this housing structure is exemplary and in other embodimentsother approaches may be used.

An authorized servicer who needs to gain access to an item, component ordevice of the ATM located in the chest area may do so by opening thefascia lock and moving the first fascia portion 20 so that the area 102becomes accessible. Thereafter the authorized servicer may access andmanipulate the chest lock input device to receive one or more inputs,which if appropriate enables unlocking of the chest door 18. The chestdoor may thereafter be moved relative to the housing and about itshinges 106 to enable the servicer to gain access to items, devices orcomponents within the chest. These activities may include for exampleadding or removing currency, removing deposited items such as envelopesor checks, or repairing mechanisms or electrical devices that operate toenable the machine to accept deposited items or to dispense currency.When servicing activity within the chest is completed, the chest doormay be closed and the locking lever 108 moved so as to secure theboltwork holding the chest door in a closed position. Of course thisstructure and service method is exemplary and in other embodiments otherapproaches may be used.

In the exemplary embodiment the second fascia portion 22 is also movablerelative to the housing of the machine. In the exemplary embodiment thesecond fascia portion 22 is movable in supporting connection with arollout tray 112 schematically shown in FIG. 3. The rollout tray isoperative to support components of the user interface thereon as well asthe second fascia portion. The rollout tray enables the second fasciaportion to move outward relative to the ATM housing thereby exposingcomponents and transaction function devices supported on the tray andproviding access to a second portion 114 within the upper housing andpositioned behind the second fascia portion. Thus as can be appreciated,when the second fascia portion is moved outward, the components on thetray are disposed outside the housing of the machine so as to facilitateservicing, adjustment and/or replacement of such components. Furthercomponents which remain positioned within the housing of the machine asthe rollout tray is extended become accessible in the second portion asthe second fascia portion 22 is disposed outward and away from thehousing.

In the exemplary embodiment the rollout tray 112 is in operativeconnection with a releasible locking device. The locking device isgenerally operative to hold the tray in a retracted position such thatthe second fascia portion remains in an operative position adjacent tothe upper housing area as shown in FIGS. 1, 2 and 3. This releasiblelocking mechanism may comprise one or more forms of locking typedevices. In the exemplary embodiment the releasible locking mechanismmay be released by manipulation of an actuator 116 which is accessibleto an authorized user in the first portion 102 of the upper housing 14.As a result an authorized servicer of the machine is enabled to move thesecond fascia portion outward for servicing by first accessing portion102 in the manner previously discussed. Thereafter by manipulating theactuator 116 the second fascia portion is enabled to move outward asshown in phantom in FIG. 8 so as to facilitate servicing components onthe rollout tray. Such components may include for example a printer orcard reader. After such servicing the second fascia portion may be movedtoward the housing so as to close the second portion 114. Such movementin the exemplary embodiment causes the rollout tray to be latched andheld in the retracted position without further manipulation of theactuator. However, in other embodiments other types of lockingmechanisms may be used to secure the rollout tray in the retractedposition. It should be understood that this approach is exemplary and inother embodiments other approaches may be used.

As best shown in FIG. 7 in which the components supported in the upperhousing are not shown, the delivery area 52 and the deposit acceptancearea 58 are in supporting connection with the chest door 18. As suchwhen the chest door 18 is opened, the delivery area 52 and the depositacceptance area 58 will move relative to the housing of the machine. Theexemplary embodiment shown facilitates servicing of the machine byproviding for the illumination for the transaction areas by illuminationsources positioned in supporting connection with the rollout tray 112.As best shown in FIG. 6, these illumination sources 118 are movable withthe rollout tray and illuminate in generally a downward direction. Inthe operative position of the second fascia portion 22 and the chestdoor 18, the illumination sources are generally aligned with apertures120 and 122 which extend through the top of a cover 124 which generallysurrounds the recessed pockets 60 and 56. As shown in FIG. 10 aperture120 is generally vertically aligned with window 68 and aperture 122 isgenerally aligned with window 70. In an exemplary embodiment apertures120 and 122 each have a translucent or transparent lens positionedtherein to minimize the risk of the introduction of dirt or othercontaminants into the interior of the cover 124.

As can be appreciated from FIGS. 6 and 8, when the chest door 18 isclosed and the second fascia portion 22 is moved to the operativeposition, the illumination sources 118 are positioned in generallyaligned relation with apertures 120 and 122. As a result theillumination of the illumination devices is operative to cause light tobe transmitted through the respective aperture and to illuminate thetransaction area within the corresponding recessed pocket.

In operation of an exemplary embodiment, the controller executesprogrammed instructions so as to initiate illumination of eachtransaction area at appropriate times during the conduct oftransactions. For example in the exemplary embodiment if the user isconducting a cash withdrawal transaction, the controller may initiateillumination of the delivery area 52 when the cash is delivered thereinand is available to be taken by a user. Such illumination draws theuser's attention to the need to remove the cash and will point out tothe user that the cash is ready to be taken. In the exemplary embodimentthe controller is programmed so that when the user takes the cash themachine will move to the next transaction step. After the cash is sensedas taken, the controller may operate to cease illumination of thedelivery area 56. Of course these approaches are exemplary.

Likewise in an exemplary embodiment if a user of the machine indicatesthat they wish to conduct a deposit transaction, the controller maycause the machine to operate to initiate illumination of the depositacceptance area 58. The user's attention is drawn to the place wherethey must insert the deposit envelope in order to have it be accepted inthe machine. In the exemplary embodiment the controller may operate toalso illuminate the illumination panel 62 to illuminate the depositenvelope providing opening 48 so that the user is also made aware of thelocation from which a deposit envelope may be provided. In an exemplaryembodiment the controller may operate to cease illumination through thewindow 70 and/or the illumination panel 62 after the deposit envelope isindicated as being sensed within the machine.

In alternative embodiments other approaches may be taken. This mayinclude for example drawing the customer's attention to the particulartransaction area by changing the nature of the illumination in therecessed pocket to which the customer's attention is to be drawn. Thismay be done for example by changing the intensity of the light, flashingthe light, changing the color of the light or doing other actions whichmay draw a user's attention to the appropriate transaction area.Alternatively or in addition, a sound emitter, vibration, projectingpins or other indicator may be provided for visually impaired users soas to indicate to them the appropriate transaction area to which thecustomer's attention is to be drawn. Of course these approaches areexemplary and in other embodiments other approaches may be used.

As previously discussed the exemplary embodiment of ATM 10 is alsooperative to draw a user's attention at appropriate times to the cardreader slot 28. ATM 10 also includes features to minimize the risk ofunauthorized interception of card data by persons who may attempt toinstall a fraud device such as an unauthorized card reading device onthe machine. As shown in FIG. 9, the exemplary card slot 28 extendsthrough a card slot housing 66 which extends in generally surroundingrelation of the card slot. It should be understood that although thehousing 66 generally bounds the entire card slot, in other embodimentsthe principles described herein may be applied by bounding only one ormore sides of a card slot as may be appropriate for detectingunauthorized card reading devices. Further, it should be understood thatwhile the exemplary embodiment is described in connection with a cardreader that accepts a card into the machine, the principles beingdescribed may be applied to types of card readers that do not accept acard into the machine, such as readers where a user draws the cardthrough a slot, inserts and removes a card manually from a slot andother card reading structures.

In the exemplary embodiment the housing 66 includes a plurality ofradiation emitting devices 126. The radiation emitting devices emitvisible radiation which can be perceived by a user of the machine.However, in other embodiments the radiation emitting devices may includedevices which emit nonvisible radiation such as infrared radiation, butwhich nonetheless can be used for sensing the presence of unauthorizedcard reading devices adjacent to the card slot. In the exemplaryembodiment the controller operates to illuminate the radiation emittingdevices 126 at appropriate times during the transaction sequence. Thismay include for example times during transactions when a user isprompted to input the card into the machine or alternatively when a useris prompted to take the card from the card slot 28. In variousembodiments the controller may be programmed to provide solidillumination of the radiation emitting devices or may vary the intensityof the devices as appropriate to draw the user's attention to the cardslot.

In the exemplary embodiment the card slot housing 66 includes thereinone or more radiation sensing devices 128. The radiation sensing devicesare positioned to detect changes in at least one property of theradiation reflected from the emitting devices 126. The sensing devices128 are in operative connection with the controller. The controller isoperative responsive to its programming to compare one or more valuescorresponding to the magnitude and/or other properties of radiationsensed by one or more of the sensors, to one or more stored values andto make a determination whether the comparison is such that there is aprobable unauthorized card reading device installed on the fascia of themachine. In some embodiments the controller may be operative to executefuzzy logic programming for purposes of determining whether the natureof the change in reflected radiation or other detected parameters aresuch that there has been an unauthorized device installed and whetherappropriate personnel should be notified.

FIG. 10 shows a side view of the housing 66. An example of a frauddevice which comprises unauthorized card reading device 130 is shownattached externally to the housing 66. The unauthorized card readingdevice includes a slot 132 generally aligned with slot 128. The device130 also includes a sensor shown schematically as 134 which is operativeto sense the encoded magnetic flux reversals which represent data on themagnetic stripe of a credit or debit card. As can be appreciated, anarrangement of the type shown in FIG. 10 enables the sensor 134 ifproperly aligned adjacent to the magnetic stripe of a card, to read thecard data as the card passes in and out of slot 128. Such anunauthorized reading device may be connected via radio frequency (RF) orthrough inconspicuous wiring to other devices which enable interceptionof the card data. In some situations criminals may also endeavor toobserve the input of the user's PIN corresponding to the card data so asto gain access to the account of the user.

As can be appreciated from FIG. 10 the installation of the unauthorizedcard reading device 130 changes the amount of radiation from emittingdevices 126 and that is reflected or otherwise transmitted to thesensors 128. Depending on the nature of the device and its structure,the amount or other properties of radiation may increase or decrease.However, a detectable change will often occur in the magnitude or otherproperties of sensed radiation between a present transaction and a priortransaction which was conducted prior to an unauthorized card readingdevice being installed. Of course the sensing of the magnitude ofradiation is but one example of a property of radiation that may besensed as having changed so as to indicate the presence of anunauthorized reading device.

FIG. 11 demonstrates an exemplary simplified logic flow executed by acontroller for detecting the installation of an unauthorized cardreading device. It should be understood that this transaction logic ispart of the overall operation of the machine to carry out transactions.In this exemplary logic flow the machine operates to carry out cardreading transactions in a normal manner and to additionally execute therepresented steps as a part of such logic each time a card is read. Froman initial step 136 the controller in the machine is operative to sensethat a card is in the reader within the machine in a step 138. Generallyin these circumstances the controller will be operating the radiationemitting devices 126 as the user has inserted their card and the cardhas been drawn into the machine. In this exemplary embodiment thecontroller continues to operate the radiation emitting devices andsenses the radiation level or levels sensed by one or more sensors 128.This is done in a step 140.

The controller is next operative to compare the signals corresponding tothe sensed radiation levels to one or more values in a step 142. Thiscomparison may be done a number of ways and may in some embodimentsexecute fuzzy logic so as to avoid giving false indications due toacceptable conditions such as a user having the user's finger adjacentto the card slot 28 during a portion of the transaction. In the case ofa user's finger for example, the computer may determine whether anunauthorized reading device is installed based on the nature, magnitudeand changes during a transaction in sensed radiation, along withappropriate programmed weighing factors. Of course various approachesmay be used within the scope of the concept discussed herein. However,based on the one or more comparisons in step 142 the controller isoperative to make a decision at step 144 as to whether the sensedvalue(s) compared to stored value(s) compared in step 142 have adifference that is in excess of one or more thresholds which suggestthat an unauthorized card reading device has been installed.

If the comparison does not indicate a result that exceeds thethreshold(s) the ATM transaction devices are run as normal asrepresented in a step 146. For example, a customer may be prompted toinput a PIN, and if the card data and PIN are valid, the customer may beauthorized to conduct a cash dispensing transaction through operation ofthe machine. Further in the exemplary embodiment, the controller mayoperate to adjust the stored values to some degree based on the morerecent readings. This may be appropriate in order to compensate for theeffects of dirt on the fascia or loss of intensity of the emittingdevices or other factors. This is represented in a step 148. In step 148the controller operates the ATM to conduct transaction steps in theusual manner as represented in a step 150.

If in step 144 the difference between the sensed and stored valuesexceeds the threshold(s), then this is indicative that an unauthorizedcard reading device may have been installed since the last transaction.In the exemplary embodiment when this occurs, the controller isoperative to present a warning screen to the user as represented in astep 152. This warning screen may be operative to advise the user thatan unauthorized object has been sensed adjacent to the card reader slot.This may warn a user for example that a problem is occurring.Alternatively if a user has inadvertently placed innocently some objectadjacent to the card reader slot, then the user may withdraw it. Inaddition or in the alternative, further logic steps may be executed suchas prompting a user to indicate whether or not they can see theradiation emitting devices being illuminated adjacent to the card slotand prompting the user to provide an input to indicate if such items arevisible. Additionally or in the alternative, the illuminating deviceswithin the housing 66 may be operative to cause the emitting devices tooutput words or other symbols which a user can indicate that they cansee or cannot see based on inputs provided as prompts from outputdevices of the machine. This may enable the machine to determine whetheran unauthorized reading device has been installed or whether the sensedcondition is due to other factors. It may also cause a user to note theexistence of the reading device and remove it. Of course variousapproaches could be taken depending on the programming of the machine.

If an unauthorized reading device has been detected, the controller inthe exemplary embodiment will also execute a step 154 in which a statusmessage is sent to an appropriate service provider or other entity toindicate the suspected problem. This may be done for example through useof a system like that shown in U.S. Pat. No. 5,984,178 the disclosure ofwhich is incorporated herein by reference. Alternatively messages may besent to system addresses in a manner like that shown in U.S. Pat. No.6,289,320 the disclosure of which is also incorporated herein byreference. In a step 156 the controller will also operate to record dataidentifying for the particular transaction in which there has beensuspected interception of the card holder's card data. In addition or inthe alternative, a message may be sent to the bank or other institutionalerting them to watch for activity in the user's card account forpurposes of detecting whether unauthorized use is occurring.Alternatively or in addition, some embodiments may include card readersthat change, add or write data to a user's card in cases of suspectedinterception. Such changed data may be tracked or otherwise used toassure that only a card with the modified data is useable thereafter.Alternatively or in addition, in some embodiments the modified card maybe moved in translated relation, moved irregularly or otherwise handledto reduce the risk that modified data is intercepted as the card isoutput from the machine. Of course these approaches are exemplary ofmany that may be employed.

In the exemplary embodiment the ATM is operated to conduct a transactioneven in cases where it is suspected that an unauthorized card readingdevice has been installed. This is represented in a step 158. However,in other embodiments other approaches may be taken such as refusing toconduct the transaction. Other steps may also be taken such as capturingthe user's card and advising the user that a new one will be issued.This approach may be used to minimize the risk that unauthorizedtransactions will be conducted with the card data as the card can bepromptly invalidated. Of course other approaches may be taken dependingon the programming of the machine and the desires of the systemoperator. In addition while the fraud device shown is an unauthorizedcard reading device, the principles described may also be used to detectother types of fraud devices such as for example false fascias, userinterface covers and other devices.

In some embodiments additional or alternative features and methods maybe employed to help detect the presence of unauthorized card readingdevices or other attempted fraud devices in connection with the ATM. Forexample in some embodiments an oscillation sensor may be attached to themachine to detect changes in frequency or vibration that result from theinstallation of unauthorized devices on the ATM. FIG. 10 showsschematically an oscillator 127 attached to the interior surface of theATM fascia. Oscillator 127 may be operative responsive to the controllerand suitable vibration circuitry to impart vibratory motion to thefascia in the vicinity of the card reader slot. A sensor 129 is inoperative connection with the fascia and is operative to sense at leastone parameter of the motion imparted to the fascia by the oscillator127. Although oscillator 127 and sensor 129 are shown as separatecomponents, it should be understood that in some embodiments thefunctions of the components may be performed by a single device.

The sensor 129 is in operative connection with the controller of the ATMthrough appropriate circuitry. The controller selectively activates theoscillator and the sensor 129 is operative to sense the resultingmovement of the fascia caused by the oscillation. The installation of anunauthorized card reading device or other fraud device on the ATM willgenerally result in a change in at least one property being sensed bythe sensor 129. This may include changes in amplitude, frequency orboth. Alternatively or in addition, some embodiments may provide for theoscillator to impart vibration characteristics of various types orvibratory motion through a range of frequencies and/or amplitudes.Sensed values for various oscillatory driving outputs may then becompared through operation of the controller to one or more previouslystored values. Variances from prior values may be detected or analyzedthrough operation of the controller and notifications given insituations where a change has occurred which suggests the installationof an unauthorized device.

In some embodiments the controller may cause the oscillator and sensorto operate periodically to sense for installation of a possibleunauthorized device. Alternatively, the controller may cause such acheck to be made during each transaction. Alternatively in someembodiments oscillation testing may be conducted when a possibleunauthorized device is detected by sensing radiation properties. Thecontroller may operate to take various actions in response to sensing apossible unauthorized reading device through vibration, radiation orboth. For example detecting a possible fraud device by both radiationand oscillation may warrant taking different actions than only detectinga possible fraud device through only one test or condition.

In some embodiments the controller may be programmed to adjust thethresholds or other limits used for resolving the presence of a possiblefraud device for responses to changes that occur over time at themachine. This may include for example adjusting the thresholds forindicating possible fraud conditions based on the aging of theoscillator or the sensor. Such adjustments may also be based onparameters sensed by other sensors which effect vibration properties.These may include for example, the fascia temperature, air temperature,relative humidity and other properties. Of course readings from theseand other sensors may be used to adjust thresholds of the oscillationsensor, radiation sensor or other fraud device sensors. Variousapproaches may be taken depending on the particular system.

In some embodiments the oscillator may additionally or alternatively beused to prevent the unauthorized reading of card reader signals. Thismay be done for example when the banking machine has a device whichtakes a user card into the machine for purposes of reading data on thecard. In such embodiments the controller may operate to vibrate the areaof the fascia adjacent to the card reader slot when a user's card ismoving into and/or out of the slot. In such cases the vibration may beoperative to cause the generation of noise or inaccurate reading by anunauthorized card reading sensor so as to make it more difficult tointercept the card stripe data using an unauthorized reading device. Insome embodiments such vibration may also serve to disclose or make moreapparent the presence of unauthorized card reading devices. Of coursethese approaches are exemplary and in other embodiments other approachesmay be used.

In some exemplary embodiments provision may be made for detecting thepresence of unauthorized input sensing devices for sensing a user'sinputs through the keypad on the ATM. Such unauthorized input sensingdevices may be used by criminals to sense the PIN input by the user.Detecting unauthorized devices may be accomplished by providingappropriate sensing devices in or adjacent to the keypad. Such sensingdevices may be operative to detect that a structure has been placed overor adjacent to the keypad. Such sensors may be in operative connectionwith the controller in the machine or other devices which are operativeto determine the probable installation of such an unauthorized inputsensing device. In response to determining the probable installation ofsuch a device, the controller may be operative in accordance with itsprogramming to provide notification to appropriate entities, modify theoperation of the machine such as to disable operation or prevent certainoperations, or to take other appropriate actions.

FIG. 12 shows the cross-sectional view of exemplary keypad 32. Keypad 32is shown schematically, and it should be understood that not all of thecomponents of the keypad are represented. Keypad 32 includes a pluralityof keys 250. Keys 250 are moveable responsive to pressure applied by auser's finger to provide an input corresponding to alphabetical ornumerical characters. Extending between some of the keys 250 are areasor spaces 252. Extending in spaces 252 are sensors 254. In the exemplaryembodiment the sensors 254 are radiation type sensors, but as previouslydiscussed, in other embodiments other approaches may be used. Overlyingthe sensors 254 is an outer layer 256. In the exemplary embodiment,layer 256 is translucent or otherwise comprised of material so as topartially enable the transmission of radiation from the sensorstherethrough.

As represented in FIG. 13, the exemplary sensors 254 include a radiationemitter 258 and a radiation receiver 260. During operation the radiationemitter is operative to output radiation that is at least partiallyreflected from the inner surface of layer 256. The reflected radiationis received by the receiver 260. Corresponding electrical signals areproduced by the receiver, and such signals are transmitted throughappropriate circuitry so as to enable the controller to detect thechanges in signals that correspond to probable presence of anunauthorized reading device.

FIG. 14 is a schematic view of an unauthorized input intercepting device262 that has been positioned in overlying relation of a keypad 32. Theinput intercepting device 262 includes false keys 264 which are moveableand which are operatively connected to the corresponding keys 250 of thekeypad. In the exemplary embodiment, input intercepting device 262includes sensors which are operative to detect which of the false keys264 have been depressed by a user. Because the depression of the falsekeys is operative to actuate the actual keys 250, the ATM is enabled tooperate with the device 262 in place. Input intercepting device 262 inexemplary embodiments may include a wireless transmitter or othersuitable device for transmitting the input signals to a criminal who mayintercept such inputs.

As represented in FIG. 19, the input intercepting device 262 includesportions 267 which extend in the areas 252 in overlying relation oflayer 256. As represented in FIG. 15, the portion of the inputintercepting device extending in overlying relation of the layer 256 isoperative to cause a change in the amount of radiation from the emitter258 that is reflected and sensed by the receiver 260 of the sensor. Thisis because the overlying portion will have different radiationreflecting or absorbing characteristics which will change the radiationreflective properties of the layer 256 compared to when no such inputintercepting device is present. Thus the installation of theunauthorized input intercepting device can be detected.

In some exemplary embodiments the controller may be operative to sensethe level of reflected radiation at the sensors periodically. This maybe done, for example, between transactions when a user is not operatingthe terminal. This may avoid giving a false indication that anunauthorized input intercepting device has been installed when a user isresting a hand or some other item adjacent to the keypad during atransaction. Of course in other embodiments sensor readings can be takenand compared during transactions to prior values stored in a data storeto determine if a change lasting longer than normal has occurred whichsuggests that an unauthorized input intercepting device has beeninstalled rather than a user has temporarily placed their hand or someother item adjacent to the keypad. For example, in some exemplaryembodiments the controller may not resolve that there is a probableunauthorized input intercepting device on the machine until asignificant change from a prior condition is detected in the radiationproperties adjacent to the keypad on several occasions both during atransaction and thereafter. Alternatively or in addition, a controllermay be operative to determine that an improper device has been installedas a result of changes that occur during a time when no transactionshave occurred. Alternatively in other embodiments, the controller mayoperate to sense and analyze signals from the sensors responsive todetecting inputs from other sensors, such as for example an ultrasonicsensor which senses that a person has moved adjacent to the machine buthas not operated the machine to conduct a transaction. Of course theseapproaches are merely exemplary of many approaches that may be used.

It should be understood that although in the exemplary embodimentradiation type sensors are used for purposes of detection, in otherembodiments other types of sensors may be used. These include, forexample, inductance sensors, sonic sensors, RF sensors, or other typesof sensing approaches that can be used to detect the presence ofmaterial in locations that suggest an unauthorized input interceptingdevice being positioned adjacent to the keypad. Further, in someembodiments the controller or other circuitry associated with thesensors may be operative to make adjustments for normal changes that mayoccur at the machine. These may include, for example, changes with timedue to aging of emitters, the build up of dirt in the area adjacent tothe keypad, weather conditions, moisture conditions, scratching of thesurface of the sensing layer, or other conditions which may normallyoccur. Appropriate programs may be executed by the controller or othercircuitry so as to recalibrate and/or compensate for such conditions asmay occur over time while still enabling the detection of a rapid changewhich is sufficiently significant and of such duration so as to indicatethe probable installation of an unauthorized input intercepting device.Of course these approaches are exemplary of many approaches that may beused.

In other embodiments other or additional approaches to detectingfraudulent reading or other improper activities may be used. Forexample, in some embodiments the fascia of the banking machine may besubject to observation within a field of view of one or more imagingdevices such as camera 131 schematically represented in FIG. 10. Camera15 may be in operative connection with an image capture system of thetype shown in U.S. Pat. No. 6,583,813, the disclosure of which isincorporated herein by reference.

In some embodiments the controller and/or an image capture system may beoperative to execute sequences of activities responsive to triggeringevents that may be associated with attempts to install or operate frauddevices. For example, the presence of a person in front of the bankingmachine may be sensed through image analysis, weight sensors, sonicdetectors or other detectors. The person remaining in proximity to themachine for a selected period or remaining too long after a transactionmay constitute a triggering event which is operative to cause the systemto take actions in a programmed sequence. Such actions may includecapturing images from one or more additional cameras and/or moving imagedata from one or more cameras from temporary to more permanent storage.The sequence may also include capturing image data from the fascia totry to detect tampering or improper devices. Radiation or vibrationtests may also be conducted as part of a sequence. Notifications and/orimages may also be sent to certain entities or system addresses. Ofcourse these actions are exemplary.

In some exemplary embodiments the controller of the ATM or otherconnected computers may be operatively programmed to analyze conditionsthat are sensed and to determine based on the sensed conditions that afraud device is installed. Such a programmed computer may be operativeto apply certain rules such as to correlate the repeated sensing ofabnormal conditions with a possible fraud or tampering condition and toconduct tests for the presence of fraud devices. Such events mayconstitute soft triggers for sequences or other actions to detect andreduce the risk of fraud devices. Of course these approaches are merelyexemplary and in other embodiments other approaches may be used.

In some embodiments the ATM may include sensors adapted to interceptsignals from unauthorized card readers or customer input interceptingdevices. For example, some fraud devices may operate to transmit RFsignals to a nearby receiver operated by a criminal. The presence ofsuch RF signals in proximity to the ATM may be indicative of theinstallation of such a device. Such signals may be detected byappropriate circuitry and analyzed through operation of the ATMcontroller or other processor, and if it is determined that it isprobable that such a device is installed, programmed actions may betaken.

For example, in some embodiments suitable RF shielding material may beapplied to or in the fascia to reduce the level of RF interference fromdevices within the ATM at the exterior of the fascia. Antennas or otherappropriate radiation sensing devices may be positioned adjacent to orinstalled on the fascia. A change in RF radiation in the vicinity of thefascia exterior may result upon the installation of an unauthorizeddevice. The RF signals can be detected by receiver circuitry, andsignals or data corresponding thereto input to a processor. In someembodiments the circuitry may also determine the frequency of theradiation sensed to be used in resolving if it is within the rangeemitted by legitimate devices such as cell phones of users operating theATM. In other embodiments the circuitry may analyze the signals todetermine if they are varying, and the circuitry and/or the processormay evaluate whether the changes in signal correspond to the input of aPIN or a card to the ATM.

In response to the sensed signal data, the processor may operate inaccordance with its programming to evaluate the nature and character ofthe intercepted signals. For example, if the signals do not correspondto a legitimate source, such as a cell phone, the processor may operateto take actions such as to wholly or partially cease operation of theATM, capture images with a camera, and/or notify an appropriate remoteentity through operation of the ATM. Alternatively, the processor maycompare the sensed RF signals to transaction activity at the ATM. If thesensed signals are determined to be varying in ways that correspond in apattern or relationship to card or PIN inputs, for example, theprocessor may operate in accordance with its programming to cause theATM or other devices to take appropriate programmed steps.

In still other exemplary embodiments the processor may be in operativeconnection with an RF emitter. The processor may operate in accordancewith its programming to cause the emitter to generate RF signals thatinterfere with the detected signals. This can be done on a continuingbasis or alternatively only at times during user operation of the ATMwhen user inputs are likely to be intercepted. For example, theprocessor controlling the emitter may operate the ATM or be incommunication with a controller thereof. In such situations, theprocessor may operate to control the emitter to produce outputs at timeswhen a user's card is moving into or out of a card slot, and/or when theATM is accepting a user's PIN or other inputs. Thus, the emitter may beoperative to produce interfering signals during relatively brief periodsso as to not disrupt RF transmissions for an extended period in theevent an incorrect determination is made and the RF signals are from alegitimate source.

In some embodiments an emitter may be a type that transmits on aplurality of frequencies intended to disrupt transmissions within theexpected range of frequencies for a fraud device. In other embodimentsthe emitter may be controlled responsive to the processor to match thefrequency or frequencies of suspect signals that have been detected. Ofcourse these approaches are exemplary of approaches that may be used.

An alternate exemplary embodiment is described with particular referenceto FIGS. 16 and 17. In the exemplary embodiment, card reader 26, alsoshown schematically in FIG. 3, includes a card reader slot 28 defining apredetermined opening as indicated by arrow 300. The card readerincludes component 310, such as a magnetic read head, operative to readdata included on the magnetic stripe of a card such as a debit or creditcard. The embodiment shown in FIG. 16 is merely exemplary, and it shouldbe understood that the principles described herein are applicable tocard readers that accept a card into the machine and to card readersthat do not accept a card into the machine.

At least one sensing device also referred to as a sensor, schematicallyindicated 312, is positioned within an interior of the ATM adjacent thecard slot 28. In one exemplary embodiment, the sensing device 312 isable to sense at least one property of radiation passing through thecard reader slot 28 to the interior of the ATM and reaching the sensingdevice. For example, the sensing device 312 may be positioned so as tosense the intensity of ambient light that enters the slot from outsidethe ATM housing, as indicated by arrows 316. Of course it should beunderstood that the positioning of the sensing device is schematic onlyand in some embodiments the sensing device may comprise multiple sensingdevices and may be located outside the card path. Alternatively, one ormore radiation sensors may be mounted on a moving member that moves intothe card path when a card is not present.

As represented in FIG. 17, in the event that an unauthorized cardreading device 320 is positioned adjacent the card reader 26, theproperty sensed by the sensing device 312 will be altered. For example,a sensing device enabled to sense the intensity of ambient lightentering the slot will detect a change in that property.

The unauthorized card reading device 320 may be positioned such that atleast a portion of the unauthorized device extends in the slot 28 whicheffectively narrows the opening defined by the card reader slot 28, asillustrated by arrow 324. In the illustrated embodiment, theunauthorized card reading device 320 includes a fraudulent magnetic readhead 326 used to skim data from a passing card stripe. The unauthorizedcard reading device 320 defines a narrower opening than the legitimatecard slot 28 to cause the inserted card to be kept close to thefraudulent magnetic read head 326.

The narrowed opening reduces the amount of ambient light entering theslot 28, and ultimately the amount of light that passes through the slotand is detected by sensing device 312. The decrease in intensity ofambient light detectable by the sensing device is illustrated in FIGS.16 and 17 by arrows 328, 330, respectively. In an exemplary embodiment,the sensing device 312 includes at least one photocell which is used tosense light as an integrator over area. The exemplary sensorconfiguration is generally not sensitive to dust due to its positionwithin the machine interior. Of course, in other embodiments otherapproaches may be used.

In other embodiments an unauthorized card reading device may notnecessarily have a narrower slot than the ATM's card reader slot.However the placement of the unauthorized card reading device will oftenresult in a greater distance between the card opening to theunauthorized device outside the machine, and the at least one sensorinside the banking machine housing. This increased distance of theoverall card slot, and longer light path results in the amount of lightreaching the at least one sensor being reduced. Such a reduction inambient light or other radiation can be monitored and sensed betweentransactions or at other times to detect when such a device isinstalled, for example. Of course, these approaches are exemplary.

In an alternate embodiment, illustrated in FIG. 18, the property sensedby the sensing device 312 may be intensity of radiation emitted by oneor more radiation emitters 334, such as LEDs, which are positioned toenable radiation emitted thereby to enter the slot 28 and be detected bysensing device 312. As will be readily appreciated, placement of anunauthorized card reading device adjacent the card reader impacts thedetectable radiation.

The one or more radiation emitters 334 may operate substantiallycontinuously, intermittently, or in accordance with transactioninstructions as previously described. For example, the radiationemitters 334 may emit radiation responsive to operation of at least onecontroller in the machine when a user is instructed by the machine toinsert a card into the card reader. The radiation is sensed by thesensing device. If an unauthorized card reading device has beenpositioned adjacent the card reader slot subsequent to a priortransaction, there is a detectable change in the property sensed by thesensing device. Further, in some embodiments a radiation guide, such asa fiber optic strand may extend from an area adjacent at least oneemitter to an area adjacent the detector. Having the outside end of thestrand located in the area where an unauthorized device would beattached may result in a greater change in sensed radiation to indicatethe installation of an unauthorized card reading device. Of course thisapproach is exemplary.

In an exemplary embodiment, the sensing device 312 is in operativeconnection with at least one controller in the machine, as in previouslydescribed embodiments. With reference again to FIG. 11, the controlleris operative responsive to its programming to compare one or more valuescorresponding to the sensed property to one or more stored values andmake a determination as to the probability that an unauthorized cardreading device 320 has been installed on the machine. Numerous factorsand conditions may be used in making the determination. If anunauthorized card reading device is likely present, the controllergenerates at least one signal or otherwise enables the machine to takeat least one action responsive to a change in the sensed property, aspreviously described. In an exemplary embodiment, the responsive actionmay include the activation of an oscillator 127, as shown in FIG. 10 andpreviously described. Alternatively, the controller may sense for anunauthorized source of Radio Frequency (RF) signals at the machine. Ofcourse this is merely exemplary.

In still other embodiments the automated banking machine may include atleast one light operated externally, such as a fascia light. The fascialight may provide a light level that is used to calculate a threshold ofminimum light that can be expected to pass through the card slot when nocard is present in the slot. The threshold can be used by the at leastone controller to determine if the amount of radiation reaching thesensor is below the threshold. In such circumstances the at least onecontroller may be operative in accordance with its programming togenerate at least the signal which can be used to indicate the likelypresence of an unauthorized card reading device.

Of course in some embodiments the programming of the at least onecontroller is operative to compare the amount of light received atdifferent times, such as between card reading transaction steps, todetect a change that corresponds to installation of an unauthorized cardreading device. Alternately or in addition, the at least one controllermay operate to monitor signals from the at least one sensor at timesbetween transactions for changes which correspond to the installation ofan unauthorized card reading device. In still other embodiments the atleast one controller may be programmed to not identify certain changesas corresponding to the installation of an unauthorized reading device.This may include, for example, changes in radiation for card insertion,changes due to fingers placed against the slot by a user, such as ablind user, and other conditions that may cause a temporary drop inradiation sensed. In some embodiments the programming of the controllermay disregard certain conditions based on the then-current operationalstatus of the machine, such as receiving or delivering a card, forexample. In some embodiments the at least one controller may executefuzzy logic to determine events that correspond to installation of anunauthorized card reading device. Of course these approaches are merelyexemplary.

In still other embodiments the card slot may be bounded by one or morelight reflecting surfaces. Such light reflecting surfaces may beconfigured to facilitate detecting the installation of an unauthorizedcard reading device. For example, in some embodiments, multiple opposedside surfaces bounding a card slot may be comprised of reflectivematerial. Such material may be operative to normally conduct moreradiation through the slot from outside the machine to the at least onesensor within the machine housing. Therefore, in some embodiments thisconfiguration may cause a greater reduction in radiation reaching the atleast one sensor when an unauthorized card reading device is installed.

In still other embodiments the reflective surfaces may be tapered orotherwise contoured to facilitate detection of changes in radiation thatresult from an unauthorized card reading device. For example, in someembodiments one or more reflective surfaces may be contoured to increasethe amount of light that passes through the card slot to the at leastone sensor. However, in some embodiments one or more reflective surfacesmay be contoured to reflect at least some light falling on the card slotso it does not reach the sensor. This may be useful in embodiments wherethe card slot is subject to exposure to a wide range of radiationlevels, and restricting the radiation that reaches the at least onesensor facilitates identifying a change that indicates the installationof an unauthorized card reading device. In still other embodiments,reflective surfaces may facilitate directing radiation to at least onesensor within the machine. This may include using a contoured mirrorsurface that focuses visible radiation for example.

Further, in some embodiments a mirror surface may be used on only oneside of the slot. This may be done, for example, to provide reflectionof radiation on a side of a slot opposite the slot side adjacentmagnetic stripes of cards. Thus an unauthorized card reading device islikely to be positioned at least on the slot side opposite of thereflective surface, which may reduce radiation reading the reflectivesurface. This may help in detecting certain types of unauthorized cardreading devices. An example is shown in FIG. 19 which includes an ATMfascia surface 336 through which a card reader housing 338 extends. Thecard reader housing includes a card slot 340 through which cards pass.The card reader includes within the ATM, a card reader mechanism 342,which includes a read head 344. The mechanism operates responsive to atleast one controller to selectively move magnetic stripe cards byengagement with the rollers shown, so that data in the stripe is read bythe read head.

In this exemplary embodiment, at least one reflective surface 346 ispositioned on a side of the slot opposed of the side of the slot whichis adjacent the stripe on cards which pass through the slot. At leastone sensor 347 is positioned on the side of the slot opposite thereflective surface. As can be appreciated, an unauthorized readingdevice will generally be positioned ahead of the opening to the cardslot and will extend at least on the side of the slot on which magneticstripes of cards are positioned. As can be appreciated from the arrowshown in phantom, an unauthorized card reading device in this positionwill generally reduce the amount of light reflected from surface 346 tothe sensing device. As a result signals from the sensing device can beused by at least one controller to determine when an unauthorized cardreading device has been installed. Of course these approaches are merelyexemplary of approaches that may be used.

In the exemplary embodiment the ATM 10 is provided with enhanceddiagnostic capabilities as well as the ability for servicers to morereadily perform remedial and preventive maintenance on the machine. Thisis accomplished in an exemplary embodiment by programming the controllerand/or alternatively distributed controllers and processors associatedwith the transaction function devices, to sense and capture diagnosticdata concerning the operation of the various transaction functiondevices. In an exemplary embodiment this diagnostic data may includemore than an indication of a disabling malfunction. In some embodimentsand with regard to some transaction function devices, the data mayinclude for example instances of speed, intensity, deflection, vacuum,force, friction, pressure, sound, vibration, wear or other parametersthat may be of significance for purposes of detecting conditions thatmay be developing with regard to the machine and the transactionfunction devices contained therein. The nature of the diagnostic datathat may be obtained will depend on the particular transaction functiondevices and the capabilities thereof as well as the programming of thecontrollers within the machine.

Thus, the features and characteristics of the embodiments previouslydescribed achieve desirable results, eliminate difficulties encounteredin the use of prior devices and systems, solve problems and may attainone or more of the objectives stated above.

In the foregoing description certain terms have been used for brevity,clarity and understanding, however no unnecessary limitations are to beimplied therefrom because such terms are for descriptive purposes andare intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and the invention is notlimited to the details shown and described.

In the following claims any feature described as a means for performinga function shall be construed as encompassing any means capable ofperforming the recited function, and shall not be deemed limited to theparticular means shown in the foregoing description or mere equivalentsthereof.

Having described the features, discoveries and principles of theinvention, the manner in which it is constructed and operated, and theadvantages and useful results attained; the new and useful structures,devices, elements, arrangements, parts, combinations, systems,equipment, operations, methods, processes and relationships are setforth in the appended claims.

1. A method comprising: (a) operating at least one computer to determinethat a user card is expected to be moved in a card slot of a cashdispensing automated banking machine, wherein the at least one computeris in operative connection with at least one signal emitter; wherein theat least one signal emitter is operative to output interference signalsadapted to interfere with user card reading by an unauthorized cardreading device; (b) responsive at least in part to the determination instep (a), operating the at least one computer to cause the at least onesignal emitter to begin output of at least one interference signal; (c)subsequent to step (b), continuing output of the at least oneinterference signal while the user card is in the card slot; and (d)subsequent to step (c), operating the at least one computer to cause theat least one signal emitter to cease output of the at least oneinterference signal.
 2. The method according to claim 1 wherein theautomated banking machine is part of a banking system including aplurality of automated banking machines, wherein each automated bankingmachine includes a card reader, a biometric reader, and a cashdispenser, and further comprising: (e) operating the card reader of theautomated banking machine to read card data from the user card; (f)operating the biometric reader of the automated banking machine to readuser biometric data; (g) authorizing a user to use the automated bankingmachine to carry out a cash dispensing transaction responsive at leastin part to both computer-determined correspondence between the card dataread in step (e) and stored card information, and computer-determinedcorrespondence between user biometric data read in step (f) and storedbiometric information.
 3. The method according to claim 1 wherein the atleast one signal emitter is operative to emit RF signals, and furthercomprising: prior to step (a), sensing with at least one radio frequency(RF) signal sensor, at least one RF signal emitted from a sourceexternal and adjacent to the machine; determining through operation ofthe at least one computer that the at least one RF signal sensed in step(e) is not caused by operation of the machine; wherein step (b) isresponsive at least in part to both the determination in step (f) andthe determination in step (a), wherein step (b) includes causing the atleast one signal emitter to emit RF signals that match a frequency ofthe at least one RF signal sensed in step (e), wherein the RF signalsemitted in step (b) interfere with the at least one RF signal emittedfrom the source.
 4. The method according to claim 1 wherein the at leastone signal emitter is operative to output a plurality of signals ofdifferent frequencies, wherein step (b) includes outputting a pluralityof different frequencies.
 5. The method according to claim 1 wherein theautomated banking machine includes at least one card sensor operative tosense a user card in the card slot, wherein the at least one card sensoris in operative connection with the at least one computer, and furthercomprising (e) operating the at least one computer to determine from theat least one card sensor that the user card is no longer in the cardslot; wherein step (d) is responsive at least in part to thedetermination in step (e).
 6. The method according to claim 1 whereinstep (a) includes operating the at least one computer to determine thata user card is expected to be moved into the card slot, wherein step (c)includes continuing output of the at least one interference signal whilethe user card is being moved into the card slot.
 7. The method accordingto claim 1 wherein the automated banking machine includes a card reader,wherein the at least one computer is programmed to only cause emitteroperation during a transaction step which involves expected use of thecard reader, wherein the automated banking machine includes at least oneproximity sensor in operative connection with the at least one computer,and further comprising (e) operating the at least one proximity sensorto detect a customer adjacent the machine; wherein step (a) includesdetermining expected use of the card reader responsive at least in partto the customer detection in step (e).
 8. Apparatus comprising: anautomated banking machine including: a cash dispenser, a card reader, acard slot, at least one signal emitter; wherein the at least one signalemitter is operative to output interference signals adapted to interferewith card reading ability of unauthorized card reading devices, at leastone computer, wherein the at least one computer is in operativeconnection with the card reader and the at least one signal emitter;wherein the at least one computer includes software comprising computerinstructions executable by the at least one computer, wherein the atleast one computer is operative to determine expected operation of thecard reader to read a user card, wherein the at least one computer isprogrammed to operate responsive at least in part to the determining tocause the at least one signal emitter to begin output of at least oneinterference signal, wherein the at least one computer is programmed tosubsequently operate to cause the at least one signal emitter tocontinue outputting the at least one interference signal while the usercard is in the card slot,  wherein the at least one computer isprogrammed to subsequently operate to cause the at least one signalemitter to cease output of the at least one interference signal.
 9. Theapparatus according to claim 8 wherein the automated banking machineincludes a radio frequency (RF) signal sensor, wherein the RF signalsensor is operative to sense RF signals emitted from a source adjacentand external of the machine, wherein the RF signal sensor is inoperative connection with the at least one computer, wherein the atleast one computer is operative to determine whether RF signals sensedby the RF signal sensor correspond to signals caused by operation of themachine, wherein the at least one signal emitter comprises an RF emitteroperative to emit RF signals, wherein the at least one computer isoperative to cause the RF emitter to emit RF signals that match afrequency of at least one RF signal sensed by the RF signal sensor,wherein the emitted RF signals cause interference with signals emittedfrom the source.
 10. The apparatus according to claim 8 wherein the atleast one signal emitter is operative to output a plurality of signalsof different frequencies, wherein the at least one computer isprogrammed to operate responsive at least in part to expected operationof the card reader, to cause the at least one signal emitter to begincontinuous output of a plurality of signals of different frequencies.11. The apparatus according to claim 8 wherein the automated bankingmachine includes at least one card sensor operative to sense a user cardin the card slot, wherein the at least one card sensor is in operativeconnection with the at least one computer, wherein the at least onecomputer is operative to determine from the at least one card sensorwhether a user card has been removed from the card slot, wherein the atleast one computer is programmed to cause the at least one signalemitter to cease output of the at least one interference signalresponsive at least in part to determining that the user card has beenremoved from the card slot.
 12. The apparatus according to claim 8wherein the automated banking machine includes at least one proximitysensor in operative connection with the at least one computer, whereinthe at least one proximity sensor is operative to detect a customeradjacent the machine, and wherein the at least one computer isprogrammed to determine that a user card is expected to be moved intothe card slot responsive at least in part to detection of a customeradjacent the machine by the at least one proximity sensor.
 13. A methodcomprising: (a) operating an automated banking machine to sense at leastone customer action, wherein the machine includes a card reader, whereinthe machine includes a card slot adjacent to the card reader, whereinthe machine is associated with at least one sensor, wherein the machineincludes at least one computer in operative connection with the cardreader and the at least one sensor; (b) operating the machine responsiveat least in part to (a), to begin providing continuous interferenceoutput, wherein the interference output is operative to interfere withunauthorized card reader device reading of a user card; (c) operatingthe machine while the interference output is being provided, to sensethat a user card moved in the card slot in a direction toward the cardreader; (d) operating the machine responsive at least in part to (c) tocease providing the interference output; (e) subsequent to (d),operating the machine while the interference output is not beingprovided, to cause the card reader to read the user card; (f) operatingthe machine subsequent to the card reader reading the user card, tobegin providing the continuous interference output, (g) operating themachine while the interference output is being provided, to sense that auser card moved in the card slot in a direction away from the cardreader; and (h) operating the machine responsive at least in part to (g)to cease providing the interference output.
 14. The method according toclaim 13 wherein the continuous interference output comprises at leastone interference signal, wherein the machine includes at least onesignal emitter operative to emit the at least one interference signal,wherein the at least one interference signal is capable of jamming cardreading ability of an unauthorized card reader device positionedadjacent the card slot, wherein (b) and (f) include operating the atleast one signal emitter to begin emitting the at least one interferencesignal.
 15. The method according to claim 13 wherein the continuousinterference output comprises a plurality of interference signals ofdifferent frequencies, wherein at least one of the different frequenciesis capable of jamming unauthorized card reader device reading of theuser card, wherein (b) and (f) include operating the at least one signalemitter to begin emitting the plurality of interference signals ofdifferent frequencies.
 16. The method according to claim 13 wherein theat least one sensor includes at least one card sensor adjacent the cardslot, wherein (c) includes operating the at least one card sensor tosense that the user card passed out of the card slot in the directiontoward the card reader.
 17. The method according to claim 13 wherein theat least one sensor includes at least one card sensor adjacent the cardslot, wherein (g) includes operating the at least one card sensor tosense that the user card passed out of the card slot in the directionaway from the card reader.
 18. The method according to claim 13 whereinthe at least one sensor includes at least one card sensor adjacent thecard slot, wherein (a) includes operating the at least one card sensorto sense entry of the user card in the card slot.
 19. The methodaccording to claim 13 wherein the at least one sensor includes at leastone proximity sensor, wherein (a) includes operating the at least oneproximity sensor to detect a customer adjacent the machine.
 20. Themethod according to claim 13 wherein during (d) at least a portion ofthe user card is located in the card slot.
 21. Apparatus comprising: atleast one signal emitter, wherein the at least one emitter is configuredto be mounted in an automated banking machine that operates to causefinancial transfers at least one of to and from machine user financialaccounts, wherein the automated banking machine includes at least onecomputer, a card reader and a card slot, wherein the card reader isoperative to read card data from user cards, wherein the card datacorresponds to user financial accounts, and wherein cards read by thecard reader move in the card slot, wherein the at least one emitter isconfigured to be in operative connection with the at least one computer,wherein the at least one emitter when mounted in the machine andoperatively connected with the at least one computer, is operativeresponsive at least in part to the at least one computer to outputinterference signals that prevent interception of card data from usercards by an unauthorized card reading device positioned adjacent to thecard slot.