Method of operating an automated transaction machine for enhanced security

ABSTRACT

A method of operating an automated transaction machine (ATM) can include at least partially disengaging a first component of the ATM from a remainder of the ATM. The method can also include altering the first component to a non-conforming condition after being at least partially disengaged. The method can also include re-engaging the first component with the ATM after being altered. The method can also include replacing a second component of the ATM after the re-engaging. Replacing the second component can include pairing the second component with a computing device of the ATM. The pairing can be responsive at least in part to the altering.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/972,229 for a METHOD OF OPERATING AN AUTOMATED TRANSACTION MACHINEFOR ENHANCED SECURITY, filed on Dec. 4, 2020, which was a national phaseapplication of PCT/US2019/038144, for a METHOD OF OPERATING AN AUTOMATEDTRANSACTION MACHINE FOR ENHANCED SECURITY, filed on Jun. 20, 2019, whichclaimed the benefit of U.S. Provisional Patent Application Ser. No.62/691,054 for a METHOD OF OPERATING AN AUTOMATED TRANSACTION MACHINEFOR ENHANCED SECURITY, filed on Jun. 28, 2018, which are herebyincorporated by reference in their entireties.

BACKGROUND 1. Field

This relates in general to a method of operating an automatedtransaction machine (ATM) for enhanced security.

2. Description of Related Prior Art

U.S. Pat. No. 9,858,571 discloses methods and systems for mitigatingfraud losses during a payment card transaction. As alleged in the '571patent, computer systems and methods for identifying a potentiallyfraudulent payment card transaction in progress, and mitigating lossesarising from completion of a fraudulent payment card transaction areprovided. The computer system is programmed to receive an authorizationrequest message for authorization of a payment card-initiatedtransaction, when the transaction is initiated using a payment card thatincludes a first security device operable for transactions initiatedwithin a predefined geographic region and a second security deviceoperable for transactions initiated both within the predefinedgeographic region and outside of the predefined geographic region. Whenthe transaction is initiated outside the predefined geographic region,the computer system compares data on the payment card to stored datacorresponding to a plurality of payment cards previously-approved fortransactions outside of the predefined geographic region approval, andapplies one or more sets of rules to the transaction as appropriate.

U.S. Pub. No. 20010032118 discloses a system, method, and computerprogram for managing storage and distribution of money tills. Acomputer-controlled automated management system for monitoring andcontrolling distribution and storage of money tills, and linkingtracking of employee productivity to time in receipt of a till. Thesystem comprises a cabinet, a control panel, and a personal computer.The cabinet is mounted through a wall to provide an interface having afront side accessible from a first area and a rear side accessible froma second area, such as, for example, a cash room. The control panel ismounted next to the cabinet on the front side of the wall. The interiorcabinet space is divided into a plurality of till compartments, witheach compartment being selectively accessible from both the front andrear of the cabinet. Tills are loaded and removed from the rear by cashroom personnel and from the front by cashiers and other employees. Inorder to remove a till from the front of the cabinet, the employee mustidentify him or herself using a keypad or other device provided at thecontrol panel, which, in turn, communicates the information to thecomputer. The computer receives the identification information andmatches it to employee and authorization information stored in adatabase. The computer is then able to match the particular employeewith a particular till in a particular compartment. The computer recordsthe time and other relevant data and opens the appropriate cabinet doorto allow the employee to take the till. When the employee returns thetill, a similar process occurs. The system is further operable toanticipate, based upon work schedules, needed till types or amounts;compile and maintain useful associated records, including employeeproductivity (i.e., time in possession of a till); and link to andintegrate with other systems to further improve efficiency.

U.S. Pub. No. 20070013124 discloses a polymer divert cassette for ATMcurrency. A polymer currency cassette for an ATM. The cassette includesa one-piece polymer body attached to a one-piece polymer lid. The lid isarranged with the body to resist entry into the cassette interior.Integral stiffening ribs are provided. The body side walls includeintegrally formed guide tracks. A one-piece tambour door is securelymovable along the guide tracks. The upper edge of each body side wallextends into a gap created between double-walled side walls of the lidwhen the lid is closed. A tab, which projects outward from an upper edgeof a body side wall, extends even further into the closed lid. The tabbecomes nested in an aligned slot in the lid when the lid is closed. Anested tab affords further cassette security by providing resistance tolid and body separation.

U.S. Pub. No. 20090084841 discloses an AUTOMATED BANKING MACHINECURRENCY CASSETTE WITH RFID TAG. An ATM currency cassette includes anRFID tag. The tag includes information about the cassette, such as thecassette serial number and the currency denomination. An ATM includes atag reader that can interrogate the tag to receive the information. Thehistory of a particular cassette can be tracked via the cassette serialnumber. Problem cassettes can be identified.

U.S. Pub. No. 20090108059 discloses cash handling. Cash handling in acash handling system is described in terms of methods and arrangementsthat interact by exchanging cash as well as information signals. A cashtransport unit is configured to receive, store and provide cash,preferably in the form of notes. The transport units connect with ATM's,shops, vehicles as well as cash docking stations. Information flowsamong the entities of the system, between the transport units, theshops, the vehicles, the docking stations, a transport service controlcenter, cash centers as well as banks.

U.S. Pub. No. 20100156036 discloses a lockable removable cassette. Alockable, removable cassette is described. In an implementation, thecassette includes a plastic shell and a currency access door. Thecassette may also include a flexible handle and/or an integrated grip.In addition, the cassette may include at least one of an aperture and atransparent window positioned to reveal the contents of the cassette. Inan implementation, the cassette includes a stacking mechanism which mayinclude a drive means having non-circular drive gears.

The background description provided herein is for the purpose ofgenerally presenting the context of the disclosure. Work of thepresently named inventors, to the extent it is described in thisbackground section, as well as aspects of the description that may nototherwise qualify as prior art at the time of filing, are neitherexpressly nor impliedly admitted as prior art against the presentdisclosure.

SUMMARY

A method of operating an automated transaction machine (ATM) can includeat least partially disengaging a first component of the ATM from aremainder of the ATM after the dispensing. The method can also includealtering the first component of the ATM to a condition that renders thefirst component non-conforming after the at least partially disengaging.The method can also include re-engaging the first component with theremainder of the ATM after the altering. The method can also includereplacing a second component of the ATM after the re-engaging. Replacingthe second component can include pairing the second component of the ATMwith a computing device of the ATM. The pairing can be responsive atleast in part to the altering.

According to other features, the at least partially disengaging can befurther defined as at least partially disengaging the first componentthat can be positioned within a safe of the ATM during the dispensingfrom the remainder of the ATM after the dispensing. The replacing of thesecond component can be further defined as replacing, after there-engaging, the second component of the ATM that can be positionedoutside of the safe during the dispensing, including pairing the secondcomponent of the ATM with the computing device of the ATM, wherein thepairing can be responsive at least in part to the altering.

In other features, the altering can be further defined as physicallymodifying the first component. The altering can be further defined asremoving a portion of the first component from a remainder of the firstcomponent. The altering can be further defined as removing a button thatcan be slidably received in an aperture defined by the first component.The altering can be further defined as removing the button that can beslidably received in the aperture defined by the first component anddirected away from a door of the safe during the dispensing. There-engaging can be further defined as repositioning the first componentin a safe of the ATM, without the portion removed during the removing,with the remainder of the ATM after the altering.

According to additional features, the method can also include at leastpartially disengaging the first component of the ATM from the remainderof the ATM a second time, after the replacing of the second component.The method can also include restoring the first component of the ATM toa conforming condition after the at least partially disengaging thefirst component of the ATM from the remainder of the ATM the secondtime. The method can also include re-engaging the first component withthe remainder of the ATM a second time, after the restoring. The methodcan also include receiving, at an ATM, a token from a user; confirming,with the ATM, a personal identification number (PIN) of the user; anddispensing, with the ATM, banknotes to the user in response to theconfirming.

According to other features, the method can also include placing a firstprocessing device of the ATM in a maintenance mode of operation afterthe dispensing and before the at least partially disengaging the firstcomponent of the ATM from the remainder of the ATM. The method can alsoinclude testing a conformance of the first component after the placingand before the at least partially disengaging the first component of theATM from the remainder of the ATM. The method can also include at leastpartially disengaging the first component of the ATM from the remainderof the ATM a second time, after the replacing of the second component.The method can also include restoring the first component of the ATM toa conforming condition after the at least partially disengaging thefirst component of the ATM from the remainder of the ATM the secondtime. The method can also include re-engaging the first component withthe remainder of the ATM a second time, after the restoring. The methodcan also include rebooting the first processing device button after there-engaging. The method can also include pairing the first processingdevice with the computing device of the ATM after the rebooting. Themethod can also include removing the first processing device frommaintenance mode after the pairing.

In other features, the at least partially disengaging can be furtherdefined as at least partially disengaging the first component that canbe a currency cassette of the ATM from a remainder of the ATM after thedispensing. The replacing can be further defined as replacing a secondcomponent of the ATM that can be memory accessed by a computing deviceof the ATM during at least one of the confirming and the dispensing.

According to additional features, the method can also include detecting,with the computing device of the ATM, non-conformance of the firstcomponent of the ATM after the re-engaging. The replacing can be furtherdefined as replacing the second component of the ATM after there-engaging, including pairing the second component of the ATM with thecomputing device of the ATM. The pairing can be responsive at least inpart to the altering and the detecting of non-conformance can berequired to complete the pairing. The method can also include detecting,with the computing device of the ATM, conformance of the first componentof the ATM prior to the receiving. The detecting can further comprisedetecting, with the computing device of the ATM, a physicalcharacteristic of the first component to determine non-conformance ofthe first component.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram of an exemplary ATM according toone or more implementations of the present disclosure;

FIG. 2 is a first perspective view of an exemplary cassette utilized inan ATM according to one or more implementations of the presentdisclosure, the perspective generally from the front and left of thecassette;

FIG. 3 is a right-side view of the exemplary cassette shown in FIG. 2 ;

FIG. 4 is a second perspective view of the exemplary cassette shown inFIGS. 2 and 3 , the perspective generally from the rear and right of thecassette;

FIG. 5 is a third perspective view of the exemplary cassette shown inFIGS. 2-4 , the perspective generally from the rear and left of thecassette;

FIG. 6 is a rear view of the exemplary cassette shown in FIGS. 2-5 ;

FIG. 7 is a fourth perspective view of a portion of the exemplarycassette shown in FIGS. 2-6 , the perspective generally from the rearand left of the cassette, the view magnified relative to the view shownin FIG. 5 ;

FIG. 8 is a first flow diagram of an exemplary method of operating anATM according to one or more implementations of the present disclosure;and

FIG. 9 is a second flow diagram of an exemplary method of operating anATM according to one or more implementations of the present disclosure.

DETAILED DESCRIPTION

Generally, the present disclosure is desirable to enhance the securityof ATMs. ATMs are used by bank account holders to withdraw currency orbank notes, or to make deposits of such notes. Often, in order toinitiate an exchange at the ATM, the user must be authenticated. Thisprocess can include the user presenting a token in the form of a bankcard and entering a personal identification number (PIN). When thisinformation is confirmed, the user is authenticated and the ATM candispense banknotes to the user.

Over time, the sub-components of the ATM can require replacement. Onesuch component is memory. When sub-components of the ATM are replaced, areplacement component may require electronic pairing with one or moreexisting components of the ATM. The electronic pairing of a replacementATM component typically includes one or more security protocols toinhibit fraudulent activity. The present disclosure provides a novel andnon-obvious method of pairing a replacement component in an ATM thatenhances security and inhibits fraud.

It has been observed that fraudulent activity can be perpetrated whereinthe ATM can be caused to dispense relatively large quantities of banknotes, very quickly, to someone who is not entitled to such adispensation. This is known as “jackpotting.” The present disclosureprovides an ATM and a process implemented at least in part by the ATMthat requires full access to a safe of the ATM and the process canprevent jackpotting. The process can supplement existing bank securityapprovals and controls for safe access.

Referring now to the drawings, FIG. 1 discloses a functional blockdiagram of an exemplary ATM 10 according to one or more implementationsof the present disclosure. It will be understood that embodiments of thepresent disclosure are applicable to other types of SSTs, such asvending machines and kiosks, by way of example and not limitation. TheATM 10 includes different structures and subsystems for executing andrecording transactions. The ATM 10 includes a computing device 12. Theexemplary computing device 12 has one or more processors and anon-transitory, computer readable medium 46. The computing device 12operates under the control of an operating system, kernel and/orfirmware and executes or otherwise relies upon various computer softwareapplications, components, programs, objects, modules, data structures,etc. The exemplary computing device 12 can operate under the control ofthe Windows® operating system. The computer readable medium (memory) 46of the computing device 12 can include random access memory (RAM)devices comprising the main storage of computing device 12, as well asany supplemental levels of memory, e.g., cache memories, non-volatile orbackup memories (e.g., programmable or flash memories), read-onlymemories, etc. The memory 46 can be accessed by the computing device 12during operation for control logic, such as commands to execute inassessing financial transactions requested by a user. Such transactionscan require confirming the authority of the user to complete a financialtransaction and can also include dispensing of banknotes. In addition,memory may be considered to include memory storage physically locatedelsewhere in computing device 12, such as any cache memory in aprocessor, as well as any storage capacity used as a virtual memory. Thecomputing device 12 can also include one or more mass storage devices,e.g., a floppy or other removable disk drive, a hard disk drive, adirect access storage device (DASD), an optical drive (e.g., a CD drive,a DVD drive, etc.), and/or a tape drive, among others for memory 46.

The exemplary ATM 10 also includes a display 14. The computing device 12can control the display 14 to present information to the user forfurthering completion of the transaction. The display 14 can be a touchscreen that allows the user to enter information through the display 14.The exemplary display 14 is configured to transmit any user-enteredinformation to the computing device 12.

The exemplary ATM 10 also includes a key pad 16 and an encryption module18. Generally, the combination of a key pad and an encryption module arereferred to in the art as an encrypted PIN pad (EPP). The exemplary keypad 16 includes a plurality of keys, such as key 20. The exemplaryencryption module 18 has one or more processors and a non-transitory,computer readable medium. The user can press the keys of the key pad 16to enter a PIN. The key pad is placed in communication with theencryption module 18 and therefore the numbers of the PIN are receivedby the encryption module 18. It is noted that the communication of thePIN is direct and secure; the PIN cannot be intercepted between the keypad 16 and the encryption module 18. The PIN is then encrypted by theencryption module to define a PIN block. The encryption module 18includes a network encryption key and applies the network encryption keyto encrypt the PIN to a PIN block. The exemplary encryption module 18 isconfigured to transmit the PIN block to the computing device 12.

The exemplary ATM 10 also includes a card module 22. The card module 22can receive a token from the user, such as a card. The card module 22can be configured to execute read and write operations with respect toany storage medium fixed to the user's card. The exemplary card module22 is configured to transmit any data read from the user's card to thecomputing device 12. The exemplary card module 22 can also be configuredto receive commands and data from the computing device 12 and changedata stored on the user's card.

The exemplary ATM 10 also includes a printer module 24. The computingdevice 12 can control the printer module 24 to print a receipt when atransaction has been completed. The printer module 24 can communicateone or more messages to the computing device 12, such as a maintenancemessage regarding the need to refill printer paper.

The exemplary ATM 10 also includes a recycler or cash dispenser/receiver26. The recycler 26 can be configured to receive items such as banknotes (cash) and checks and also be configured to dispense banknotes.The exemplary recycler 26 communicates with a slot 28 defined on anexterior of the ATM 10 for the passage of such items. In otherembodiments of the present disclosure, the recycler 26 can be configuredto facilitate the exchange of other items. The recycler 26 can includeone or more sensors and transmit signals from any such sensors to thecomputing device 12 to execute an exchange. The computing device 12 cancontrol the recycler 26 in response to such signals. For example, therecycler 26 can include a sensor that detects receipt of an item such asa check. The recycler 26 can include a further sensor in the form of ascanner that generates an image of the received item and transmits theimage to the computing device 12.

The exemplary ATM 10 also includes a printer module 30. The printermodule 30 can generate a continuous record of all transactions executedby the ATM 10. The computing device 12 can control the printer module 30to supplement the record after each transaction has been completed. Theprinter module 30 can communicate one or more messages to the computingdevice 12, such as a maintenance message regarding the need to refillprinter paper.

The exemplary ATM 10 also includes an access module 32. The accessmodule 32 can be positioned proximate to a rear side of the ATM 10. Theaccess module 32 can be utilized for service and support technicians.For example, the access module 32 can be utilized by a field engineer tocomplete software updates to the computing device 12. The access module32 can also be utilized when non-software updates and maintenance isperformed, such as the refilling of printer paper or currency.

The exemplary ATM 10 also includes a transceiver 34. The exemplarytransceiver 34 is configured to facilitate communication between thecomputing device 12 and other computing devices that are distinct fromand physically remote from the computing device 12. An example of such aremote computing device is a server computing device, such as a bankingserver communicating with a plurality of ATMs. The exemplary transceiver34 places the computing device 12 in communication with one or morenetworks, such as network 36. The network 36 can be a local area network(LAN), a wide area network (WAN) such as the Internet, or anycombination thereof. The transceiver 34 can transmit data and requestsfor input generated by the computing device 12 and receive responses tothese requests, directing these responses to the computing device 12.The computing device 12 can transmit the PIN block to a remote computingdevice such as a bank server to confirm the PIN entered by the user.

The exemplary ATM 10 also includes a transceiver 38. The exemplarytransceiver 38 is configured to facilitate communication between atleast one of the encryption module 18 and the computing device 12 andother computing devices that are distinct from and physically proximateto the ATM 10. An example of such a proximate computing device is asmartphone possessed by the user. The dashed connection lines in FIG. 1represent optional interconnections. The exemplary transceiver 38 canplace the user's smartphone in communication with the encryption module18, the computing device 12, or both. The exemplary transceiver 38 canimplement various communication protocols. For example, the transceiver38 can be a Near Field Communication (NFC) device. Alternatively, thetransceiver 38 can be a Bluetooth beacon. The transceiver 38 cantransmit and receive data and requests for input generated by theencryption module 18 and/or the computing device 12, such transmissionsoccurring with the user's smart phone for example. The exemplarycomputing device 12 is thus configured to communicate with othercomputing devices.

The exemplary ATM 10 also includes an advanced function dispenser (AFD)40. The exemplary AFD 40 includes one or more processors and memorycontaining control logic applied by the one or more processors. The AFD40 can also include electromechanical components and be configured tomove banknotes, such as currency. The exemplary AFD 40 can be positionedin a safe 42. The exemplary computing device 12 and memory 46 arepositioned outside of the safe 42. The safe 42 can include a door 43.One or more cassettes or cash boxes 44 can also be positioned andprotected in the safe 42. Banknotes can be stored in the cassettes 44for disbursement to a user of the ATM 10. The exemplary AFD 40 canextract the banknotes from one or more of the cassettes 44 and directthe banknotes out of the ATM 10 through the slot 28. The AFD 40alternatively can direct banknotes to the recycler 26, which can directbanknotes through the slot 28. The AFD 40 can also be configured toreceive banknotes from the recycler 26 and direct these banknotes to thecassettes 44 for storage. The exemplary AFD 40 can communicate with andbe controlled by the computing device 12. Each of the cassettes 44 canengage the AFD 40 through a rack whereby the positioning of thecassettes is controlled. Further, each of the cassettes 44 and the AFD40 can include mating connectors of any form, whereby a positiveinterconnection is confirmed electronically. When one or more of thecassettes 44 and the AFD 40 are not properly interconnected, a signal orlack thereof can be communicated to the computing device 12 whereby anerror message is generated or the ATM 10 can be disabled.

FIGS. 2-7 disclose an exemplary cassette 44 that can be utilized in anATM according to one or more implementations of the present disclosure.The exemplary cassette 44 defines a front side 48, a rear side 50, aleft side 52, and a right side 54. The rear side 50 can be receivedfirst in the safe 42 when the cassette 44 is inserted in the safe 42.The rear side 50 can face a rear face 45 of the safe 42 and thus bepositioned facing away from the door 43. The front side 48 can beexposed when a door of the safe 42 is opened. The exemplary cassette 44can include a box portion 56 and a lid 58. The box portion 56 and thelid 58 can be interconnected for pivoting movement of the lid 58relative to the box portion 56 at a pivot pin 60. The exemplary cassette44 includes a handle 62 that can be utilized when the cassette 44 ispulled from the safe 42.

A plurality of indicators can be positioned on the rear side 50 of thecassette 44 to identify aspects of the cassette 44 to the computingdevice 12. For example, the indicators can be utilized to identify thenationality of the banknotes in the cassette 44 or the denomination ofthe banknotes. The indicators can also be utilized to confirm thepresence of the cassette 44 in the safe 42 and/or confirm that thecassette 44 is properly positioned/seated in the safe 42.

The physical nature of the indicators can be selected as desired. Forexample, the indicators can be male or female connectors that mate withthe oppositely-configured connectors of the AFD 40. Alternatively, theAFD 40 can include one or more proximity sensors that detect one or moreprojections on the cassette 44, wherein the projections defineindicators. In another embodiment, the AFD 40 can include pressure orforce sensors to detect indicators on the cassette 44.

As best shown in FIGS. 4-7 , the exemplary cassette 44 includes aplurality of indicators. The exemplary indicator referenced at 62 canconvey an indication of the fill level of the cassette 44 in theexemplary embodiment. The extent that the indicator 62 projectsoutwardly from the rear side 50 can correspond the extent that thecassette is filled with banknotes. The indicator referenced at 64conveys an indication of the nationality of the currency in the cassette44 in the exemplary embodiment. The exemplary indicators 62, 64 are pinsbiased outwardly by springs (not visible) from pin seats. Pin seats notpresently supporting indicators are referenced at 66, 68, 70, forexample, and other, similarly-structured pins seats are shown but notreferenced by number. The indicator pins 62, 64 can press against apressure or force sensor of the AFD 40. The computing device 12 canreceive signals from such sensors to confirm attributes of the cassette44.

FIGS. 4-7 also disclose that the exemplary cassette 44 includesindicators 72, 74. The indicators 72, 74 are buttons that are slidablyreceived in respect apertures defined by the cassette 44 in the rearside 50. As can be seen in the Figures, the indicator 72 extends furtherthan the indicator 74. In the exemplary embodiment, the indicator 72conveys an indication that the cassette 44 is being inserted. Upondetection of the indicator 72, the computing device 12 prepares forcomplete engagement of the cassette 44. In the exemplary embodiment,detection of the indicator 74 conveys an indication that engagement ofthe cassette 44 has been completed. The exemplary indicator thusprojects further away from the rear side 50 than the indicator 74.

Over time, the sub-components of the ATM can require replacement. Onesuch component is memory 46. When memory 46 is replaced, the replacementmemory 46 and the computing device 12 are paired with one or moresecurity protocols in order to inhibit fraudulent activity. Suchsecurity protocols can include the exchange of electronic certificatesand encrypted communications, for example.

FIG. 8 is a flow diagram of an exemplary method of operating an ATMaccording to one or more implementations of the present disclosure. Themethod is associated, at least in part, with pairing memory 46 andcomputing device 12. At 76, the method starts. At 78, the ATM can be inoperation and receive a token from a user. The token can be a bank cardand the card can be received with the card module 22. At 80, the ATM 10can confirm the PIN of the user. This typically involves communicationbetween the computing device 12 and one or more other, remote computingdevices. At 82, in response to 80, the ATM 10 can dispense banknotes tothe user with the recycler 26 and/or the AFD 40.

Steps 76-82 indicate usage of the ATM 10 and, after some period of usagein which steps 76-82 are repeated, the memory 46 can requirereplacement. At 84, the operator of the ATM 10 can at least partiallydisengage a first component of the ATM 10 from a remainder of the ATM 10after 82. The first component of the ATM 10 that can be disengaged froma remainder of the ATM 10 is the cassette 44 in this exemplaryembodiment. Thus, at 84, the cassette 44 can be withdrawn from the safe42. A service technician can open the door 43 of the safe 42 and atleast partially remove the cassette 44 from the safe 42.

As detailed above, prior to disengagement of the cassette 44 from theremainder of the ATM 10, the computing device 12 can have previouslydetected the presence of the cassette 44 and the conformance of thecassette 44. In the exemplary embodiment, “conformance” is defined bythe computing device 12 or the AFD 40 having first detected the presenceof the indicator 72 and then the presence of the indicator 74, whichindicates complete engagement of the cassette 44 in the safe 42.

At 86, the first component of the ATM 10 can be altered after beingdisengaged at 84. The first component can be altered to a condition thatrenders the first component non-conforming. The altering of the firstcomponent can involve physically modifying the first component. Thealtering of the first component can involve removing a portion of thefirst component from the remainder of the first component. In thisexemplary embodiment, the indicator 72 can be removed from cassette 44to render the cassette 44 non-conforming. The indicators 72, 74 aredirected away from the door 43 of the safe 42 to inhibit any attempt atremoval without drawing the cassette 44 out of the safe 42 through thedoor 43.

At 88, the first component can be re-engaged with the remainder of theATM 10 after being altered at 86. After the indicator 72 has beenremoved, the cassette 44 can be returned to the safe 42. Thus, thecassette 44 is repositioned in the safe 42 without the indicator 72. Asset forth above, the detection of the indicator 72 is one of theindications that the cassette 44 is properly positioned and fullyengaged with the AFD 40. When the cassette 44 is returned to the safe 42after the indicator 72 has been removed, the indicator 74 remains andthe computing device 12 and/or AFD 40 will receive a signalcorresponding to the presence of the indicator 74 but not a signalcorresponding to the presence of the indicator 72. The computing device12 and/or AFD 40 can be configured/programmed to determine that thisdefines non-conformance of the cassette 44. The computing device 12and/or AFD 40 can be further configured/programmed to emit an alert,cease operations of the ATM 10, and/or perform some other action inresponse to detection of the indicator 74 and the failure to detect theindicator 72. In the present disclosure, the ATM 10 can be in theprocess of being serviced when the computing device 12 and/or AFD 40detects that the indicator 72 is missing and that the cassette 44 istherefore non-conforming.

At 90, a second component of the ATM 10 can be replaced after 88. In theexemplary embodiment, the second component is memory 46. The replacementof the memory 46 includes pairing the memory 46 with the computingdevice 12. The exemplary computing device 12 is configured/programmed topair with the replacement memory 46 only after the altering of thecassette 44. In other words, the exemplary computing device 12 isconfigured/programmed such that detection of the indicator 74 and thefailure to detect the indicator 72 is a prerequisite to pairing with acomponent such as memory 46. The exemplary method ends at 92.

It is noted that, in the exemplary embodiment, after pairing of thecomputing device 12 and the replacement memory 46 is complete, thecassette 44 can again be removed from the safe 42 and the indicator 72reinstalled. The cassette 44 can then be reinserted in the safe 42 andsteps 76-82 can resume.

The method disclosed above can prevent jackpotting by preventing theeasy exchange of intended memory with fraudulent memory. A bad actorcannot merely access a portion of the ATM that is outside of the safe inorder to install fraudulent memory. However, at the same time, thepresent disclosure provides an enhanced process that obviates the needto position memory itself within the safe. When memory is replaced, anauthorized technician can perform a few additional actions requiringlittle time to enhance security.

In another embodiment of the present disclosure, an indicator associatedwith a cassette can be a radio frequency identification (RFID) chipmounted on a card that is positioned in or on the cassette. Thedispensing device could include a reader to detect the RFID chip whenthe cassette is appropriately positioned. The RFID chip is analogous toindicator 72 and the cassette could also include a second indicatoranalogous to indicator 74. The second indicator could be a second RFIDchip. When pairing the computing device with a replacement componentsuch as memory, the card bearing the RFID chip could be removed and thecassette reinserted in the ATM while the second indicator is retained onor in the cassette. The computing device would be configured/programmedsuch that detection of the second RFID chip and the failure to detectthe first RFID chip is a prerequisite to pairing with the replacementcomponent. In another embodiment, the cassette can be altered byremoving or misaligning the lid.

FIG. 9 is a flow diagram of another exemplary method of operating an ATMaccording to one or more implementations of the present disclosure. Themethod is associated, at least in part, with pairing memory 46 andcomputing device or PC 12, while implicating the AFD 40 and componentsin the safe 42 to prevent the replacement of legitimate memory withfraudulent memory. Fraudulent memory can be utilized to permitjackpotting of the ATM 10. At 94, the method starts. At 96, the ATM 10is taken out of service and placed in a maintenance or diagnostics mode.The ATM 10 can be placed in maintenance mode through a physical switchpositioned at some location within the ATM 10.

At 98, the safe 42 can be opened and a cassette 44 can be drawn from thesafe 42. At 100, the cassette 44 can be returned to the safe 42. Steps98 and 100 are useful to “baseline” the cassette 44 relative the AFD 40.In other words, steps 98 and 100 allow the computing device 12 or theAFD 40 to test the conformance of the cassette 44 and establish that thecassette 44 has the indicator 72 and is in conformance before replacingthe memory 46. Because the ATM 10 is in maintenance mode, an errormessage will not be communicated from the AFD 40 to the PC 12.

At 102, the cassette 44 can again be drawn from the safe 42. At 104, theindicator 72 can be removed from the cassette 44. At 106, the cassette44 can again be returned to the safe 42. The AFD 40 or the computingdevice 12 will detect that the cassette 44 is missing the indicator 72.

At 108, a boot button on the AFD 14 can be pressed and a pairbutton/command on the PC 12 can be pressed/initiated. In the presentembodiment, these two actions are executed within about two minutes ofone another. Pairing of the PC 12, the AFD 14 and memory 46 will thenbegin. Thus, as described thus far, detection that the indicator ismissing is a prerequisite to pairing.

When pairing has been completed, the various components of the ATM 10will re-initialize. After pairing, at 110, the cassette 44 can again bedrawn from the safe 42. At 112, the indicator 72 can be reinstalled onthe cassette 44. At 114, the cassette 44 can again be returned to thesafe 42.

At 116, a reset button on the AFD 40 can be pressed to address theprevious detection of the missing indicator 72. At 118, the AFD 40 canbe removed from maintenance mode. The process can end at 120.

While the present disclosure has been described with reference to anexemplary embodiment, it will be understood by those skilled in the artthat various changes may be made and equivalents may be substituted forelements thereof without departing from the scope of the presentdisclosure. In addition, many modifications may be made to adapt aparticular situation or material to the teachings of the presentdisclosure without departing from the essential scope thereof.Therefore, it is intended that the present disclosure not be limited tothe particular embodiment disclosed as the best mode contemplated forcarrying out this present disclosure, but that the present disclosurewill include all embodiments falling within the scope of the appendedclaims. The right to claim elements and/or sub-combinations that aredisclosed herein is hereby unconditionally reserved. The use of the word“can” in this document is not an assertion that the subject precedingthe word is unimportant or unnecessary or “not critical” relative toanything else in this document. The word “can” is used herein in apositive and affirming sense and no other motive should be presumed.More than one “invention” may be disclosed in the present disclosure; an“invention” is defined by the content of a patent claim and not by thecontent of a detailed description of an embodiment of an invention.

What is claimed is:
 1. A method of servicing an automated transaction machine (ATM) comprising: at least partially disengaging a currency cassette as a first component of the ATM from a remainder of the ATM after dispensing banknotes with the ATM, wherein said at least partially disengaging is further defined as: at least partially disengaging the first component that is positioned within a safe of the ATM during said dispensing from the remainder of the ATM after said dispensing; altering the first component of the ATM to a condition that renders the first component non-conforming after said at least partially disengaging; re-engaging the first component with the remainder of the ATM after said altering; and replacing a memory as a second component of the ATM after said re-engaging, including pairing the second component of the ATM with a computing device of the ATM, wherein said pairing is responsive at least in part to said altering.
 2. The method of claim 1 wherein said replacing the second component is further defined as: replacing, after said re-engaging, the second component of the ATM that is positioned outside of the safe during said dispensing, including pairing the second component of the ATM with the computing device of the ATM, wherein said pairing is responsive at least in part to said altering.
 3. The method of claim 1 wherein said altering is further defined as: physically modifying the first component.
 4. The method of claim 3 wherein said altering is further defined as: removing a portion of the first component from the remainder of the first component.
 5. The method of claim 4 wherein said altering is further defined as: removing a button that is slidably received in an aperture defined by the first component.
 6. The method of claim 5 wherein said altering is further defined as: removing the button that is slidably received in the aperture defined by the first component and directed away from a door of a safe during said dispensing.
 7. The method of claim 4 wherein said re-engaging is further defined as: repositioning the first component in a safe of the ATM, without the portion removed during said removing, with the remainder of the ATM after said altering.
 8. The method of claim 1 further comprising: at least partially disengaging the first component of the ATM from the remainder of the ATM a second time, after said replacing of the second component; restoring the first component of the ATM to a conforming condition after said at least partially disengaging the first component of the ATM from the remainder of the ATM the second time; and re-engaging the first component with the remainder of the ATM a second time, after said restoring.
 9. The method of claim 8 further comprising: receiving, at an ATM, a token from a user; confirming, with the ATM, a personal identification number (PIN) of the user; and dispensing, with the ATM, banknotes to the user in response to said confirming.
 10. The method of claim 1 further comprising: placing a first processing device of the ATM in a maintenance mode of operation before said at least partially disengaging the first component of the ATM from the remainder of the ATM; and testing a conformance of the first component after said placing and before said at least partially disengaging the first component of the ATM from the remainder of the ATM.
 11. The method of claim 10 further comprising: at least partially disengaging the first component of the ATM from the remainder of the ATM a second time, after said replacing of the second component; restoring the first component of the ATM to a conforming condition after said at least partially disengaging the first component of the ATM from the remainder of the ATM the second time; re-engaging the first component with the remainder of the ATM a second time, after said restoring; and rebooting the first processing device after said re-engaging the second time.
 12. The method of claim 11 further comprising: pairing the first processing device with the computing device of the ATM after said rebooting.
 13. The method of claim 12 further comprising: removing the first processing device from maintenance mode after said pairing.
 14. The method of claim 1 wherein said at least partially disengaging is further defined as: at least partially disengaging the first component that is the currency cassette of the ATM from the remainder of the ATM after said dispensing.
 15. The method of claim 14 wherein said replacing is further defined as: replacing a second component of the ATM that is the memory accessed by the computing device of the ATM during at least one of said confirming and said dispensing.
 16. The method of claim 1 further comprising: detecting, with the computing device of the ATM, non-conformance of the first component of the ATM after said re-engaging.
 17. The method of claim 16 wherein said replacing is further defined as: replacing the second component of the ATM after said re-engaging, including pairing the second component of the ATM with the computing device of the ATM, wherein said pairing is responsive at least in part to said altering and wherein said detecting non-conformance is required to complete said pairing.
 18. The method of claim 16 further comprising: detecting, with the computing device of the ATM, conformance of the first component of the ATM.
 19. The method of claim 16 wherein said detecting further comprises: detecting, with the computing device of the ATM, a physical characteristic of the first component to determine non-conformance of the first component. 