System including an automated banking machine and at least one wearable computer device worn by an individual for identifying data on a bill dispensed from the automated banking machine

ABSTRACT

An automated banking machine operates to cause financial transfers responsive at least in part to data read from data bearing records. The automated banking machine includes a reader configured to read identifying data from currency bills dispensed from the machine. A wearable computer device configured to be worn by an individual, includes at least one wearable reader that reads identifying data from currency bills. The wearable device is configured to read bill indicia from bills received by an individual while wearing the device. The wearable device is operative to cause a bill source comparison to be made concerning whether identifying data read from a received currency bill corresponds to a bill previously dispensed from the machine. The wearable device is also configured to cause a bill genuineness determination to be made responsive to read bill indicia.

TECHNICAL FIELD

This invention pertains to automated banking machines that arecontrolled responsive to data read from data bearing records such asuser cards and which scan and resolve data from documents such asfinancial checks or currency bills, which may be classified in U.S.Class 235, Subclass 379, Group Art Unit 2887.

BACKGROUND

Automated banking machines may include a card reader that operates toread data from a bearer record such as a user card. The automatedbanking machine may operate to cause the data read from the card to becompared with other computer stored data related to authorized users.The machine operates in response to the comparison determining that thebearer card corresponds to an authorized system user to carry out atleast one transaction which is operative to transfer value to or from atleast one account. A record of the transaction is also commonly printedthrough operation of the automated banking machine and provided to theuser. A common type of automated banking machine used by consumers is anautomated teller machine which enables consumers to carry out bankingtransactions. Banking transactions carried out may include thedispensing of cash, the making of deposits, the transfer of fundsbetween accounts, and account balance inquiries. Such machines mayadditionally receive, optically scan and resolve data from documentssuch as financial checks. The types of transactions a customer may carryout with an automated banking machine are determined by the capabilitiesof the particular machine and the programming associated with operatingthe machine.

Other types of automated banking machines may be operated by merchantsto carry out commercial transactions. These transactions may include,for example, the acceptance of deposit bags, the receipt of checks orother financial instruments, the dispensing of rolled coin or othertransactions that are required by merchants. Still other types ofautomated banking machines may be used by service providers in atransaction environment such as at a bank to carry out financialtransactions. Such transactions may include, for example, the countingand storage of currency notes or other financial instrument sheets, thedispensing of notes or other sheets, the imaging of checks or otherfinancial instruments and other types of service provider transactions.For purposes of this disclosure, an automated banking machine, anautomated transaction machine, an automated teller machine, or an ATMshall be deemed to include any machine that may be used toelectronically carry out transactions involving automated transfers ofvalue.

Automated banking machines may benefit from improvements.

SUMMARY OF DISCLOSURE

An automated banking machine that operates responsive at least in partto data read from data bearing records operates to cause financialtransfers to or from financial accounts of machine users. The exemplarymachine and system provides enhanced security to assure that risks offraudulent transactions are reduced. Other exemplary arrangementsprovide for improved user interfaces for operation of automated bankingmachines. These include improved user interfaces for persons to operatethe machine utilizing wearable mobile devices. Other examplearrangements provide user interfaces that enable users that are blind orhave impaired vision to operate the machine more conveniently andreadily.

Other exemplary arrangements provide capabilities for enabling users toachieve a more sanitary operating environment in connection with itemsthat are provided by the machine. Other example arrangements provide forthe capability of dispensing articles which are produced and/orconfigured through operation of the machine, to include datarepresentative of value and which can be used or redeemed for goods orservices.

Further exemplary embodiments will be made apparent in the followingdescription of exemplary embodiments and the appended claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic view of a system of an exemplary arrangementincluding automated banking machines that are operated in response todata read from data bearing records.

FIG. 2 is a schematic view of the components of an exemplary automatedbanking machine.

FIG. 3 is a schematic view of steps carried out in operation of at leastone remote computer in connection with an exemplary banking machinesystem.

FIG. 4 is an alternative schematic view of steps executed by at leastone computer in connection with an automated banking machine system ofan exemplary arrangement.

FIG. 5 is an isometric view of an exemplary user wearable mobilewireless device.

FIG. 6 is a schematic view showing components of the wearable mobilewireless device operating in connection with components of an automatedbanking machine system.

FIG. 7 is a schematic view of components of an alternative exemplaryautomated banking machine that has the capability of producing orconfiguring an article for a user.

FIG. 8 is a schematic view of a 3D printer operated in connection witharticles dispensed from an exemplary automated banking machine.

FIG. 9 is a schematic view of an alternative arrangement of an automatedbanking machine that provides the capability for disinfecting itemsdispensed from the machine.

FIGS. 10-12 are schematic views demonstrating operation of the exemplaryautomated banking machine shown in FIG. 9 in connection with dispensingdisinfected items.

FIGS. 13-17 are a schematic representation of steps carried out by anexemplary controller of an automated banking machine in connection withdispensing disinfected items.

FIG. 18 is a schematic view of software architecture used in connectionwith an exemplary arrangement of an automated banking machine.

FIG. 19 is a schematic view of a controller and devices used in anexemplary automated banking machine.

FIG. 20 is a schematic view of components included in an exemplaryalternative automated banking machine that has a user interface thatfacilitates operation by blind or sight impaired users.

FIGS. 21-23 show different alternative user interface arrangements foran automated banking machine of the type shown in FIG. 20.

FIGS. 24-27 are schematic representations of steps carried out by logicflow associated with automated banking machine transactions involvingquality cash.

FIG. 28 is a schematic view showing a system that operates to identifyactivities that may correspond to installation of a card skimming deviceon an automated banking machine.

FIG. 29 is a schematic representation of program logic carried out by atleast one processor identifying possible installation of a skimmingdevice.

FIG. 30 is a schematic representation of program logic carried out by anautomated banking machine that issues financial checks.

FIGS. 31-34 are a schematic view of program logic carried out inconnection with a transaction that involves a wearable computer.

FIGS. 35-37 are a schematic representation of program logic carried outin one or more computers in connection with delivering cash or otheritems to a user.

FIG. 38 is a schematic view of an automated banking machine whichcommunicates with mobile user devices.

FIG. 39 is a schematic view of an automated banking machine and systemthat provides displays for mobile computers and carries out multipletransaction types.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1, there is showntherein an exemplary system 10. System 10 includes a plurality ofautomated banking machines 12, 14 and 16. Each of the automated bankingmachines of the exemplary system is operative to cause financialtransfers at least one of to or from user financial accounts responsiveat least in part to data read from data bearing records. It should beunderstood that these automated banking machines are exemplary and inother arrangements other types of automated banking machines may beused.

The components of the exemplary automated banking machine 12 are shownschematically in FIG. 2. Automated banking machine 12 includes aplurality of transaction function devices 18. The exemplary transactionfunction devices in automated banking machine 12 include a card reader20. Card reader 20 is operative to read data from bearer records such asuser cards. The data read through operation of the card reader is usableto identify at least one financial account on which transactions at themachine are to be conducted. The exemplary arrangements may includemagnetic stripe card readers, chip type card readers, wireless type cardreaders or other types of contact or non-contact devices for readingarticles which include data that corresponds to financial accounts. Insome exemplary arrangements the automated banking machine may includecard readers and other features like those described in U.S. Pat. Nos.7,004,385; 7,284,692; 7,992,776; 7,992,778; and 8,540,142 thedisclosures of each of which are incorporated herein by reference intheir entirety.

The exemplary automated banking machine further includes a keypad 22.The exemplary machine includes a keypad having a plurality of manuallyactuatable keys that may be used by machine users to provide inputs.Inputs provided may include alphanumerical inputs or other types ofinputs as appropriate to be provided by users for operation of themachine. In exemplary embodiments the keypad may include an encryptingkeypad (alternatively referred to herein as an encrypting PIN pad orEPP) which includes internal circuitry that is operative to encryptinputs that are provided through the keys. Some exemplary arrangementsmay include features like those shown in U.S. Pat. Nos. 8,540,146;8,517,262; 7,904,713; 7,896,228; and/or 7,418,592 the disclosures ofeach of which are incorporated herein by reference in their entirety.

The exemplary automated banking machine 12 further includes a printer24. Printer 24 of the exemplary arrangement is operative to print paperdocuments for users of the machine. In some exemplary arrangements thepaper documents may include receipts for transactions conducted at themachine. In other exemplary arrangements the printer may be operative toprint other documents such as vouchers, scrip, checks, postage or otherfinancial instruments. Some exemplary arrangements may include featureslike those shown in U.S. Pat. No. 8,424,755 the disclosure of which isincorporated herein by reference in its entirety. Various types ofprinters may be used in exemplary arrangements such as impact printers,dot matrix printers, laser printers, thermal printers or other suitabletypes of printers for producing the documents desired to be produced bythe machine. It should be understood that some exemplary arrangementsmay include multiple different types of printers, each of which producedifferent types of documents that are provided to machine users.

The exemplary automated banking machine further includes a display 26.Display 26 is operative to provide visual outputs to users of themachine. The visual outputs in the exemplary embodiment includeinstructions to users concerning the operation of the machine. Displaysin some exemplary embodiments may include liquid crystal displays, CRTdisplays, OLED displays or other types of displays that are suitable forproviding visual outputs to users.

The exemplary automated banking machine 12 further includes a cashdispenser 28. In some exemplary arrangements the cash dispenser includesone or more mechanisms that are operative to make cash such as currencybills, coin or other currency items stored within the machineselectively available to users of the machine during the course oftransactions. In some exemplary arrangements cash dispensers may includemechanisms that operate to provide currency bills to users. For examplein some arrangements the cash dispenser and automated banking machinemay include features like those described in U.S. Pat. Nos. 8,128,083;7,261,236; 7,144,006; 6,981,638; and/or 6,945,526 the disclosures ofeach of which are incorporated herein by reference in their entirety.

Further in other arrangements the cash dispenser 28 may include acurrency recycling device. Such currency recycling devices may includefor example devices that enable a machine to receive currency bills fromusers, to validate the received currency bills as genuine, and storesuch bills within the machine for later dispense to other authorizedusers. For example some automated banking machines of exemplaryarrangements may include features like those shown in U.S. Pat. Nos.8,251,281; 8,191,771; 8,132,718; 7,992,775; 7,748,615; 7,891,554;7,971,781; 7,934,642; 6,682,068; 6,131,809; and/or 6,331,000 thedisclosures of each of which are incorporated herein by reference intheir entirety.

The exemplary automated banking machine further includes a plurality ofmanually actuatable function keys 30. In some exemplary embodiments thefunction keys may be disposed at locations adjacent to the display so asto enable users to manually actuate selected keys to make selectionsoutput through the display and to provide inputs to the machine.Alternatively other exemplary embodiments may include other types ofkeys for receiving inputs from users. Such keys may include otherarrangements for manually actuatable keys such as a keyboard or otherkey arrangement. Further in some exemplary arrangements the display mayinclude a touch screen type input device which may include visualrepresentations of keys which can be selected by authorized users toprovide inputs to the machine. Of course these types of keys areexemplary of input devices through which users may provide inputs to themachine.

The exemplary automated banking machine 12 further includes an inputdevice 32. Input device 32 in some embodiments includes a wirelessportal that is suitable for receiving and communicating wirelesssignals. This may include for example communicating signals via radiofrequency, infrared, Bluetooth™ or other signals that may be receivedfrom or communicated with portable wireless devices such as smartphones, portable tablet devices, wearable computers or other items.Further in other exemplary arrangements other types of communicationsdevices may be utilized for receiving inputs and providing outputs fromthe machine. Of course it should be understood that these transactionfunction devices 18 are exemplary and in other arrangements, other oradditional devices may be used.

The exemplary automated banking machine 12 includes at least onecontroller 34. The exemplary controller 34 includes one or more circuitswhich are operative to communicate electrical signals with and controlthe operation of transaction function devices 18. In the exemplaryarrangement the at least one controller 34 includes at least oneprocessor schematically indicated 36 and at least one data storeschematically indicated 38. In exemplary arrangements the processor mayinclude a processor suitable for carrying out computer executableinstructions that are stored in the one or more associated data stores.The processor includes or is in connection with a non-volatile storagemedium including instructions that include a basic input/output system(BIOS). The exemplary arrangements may include, for example, processorsproduced by Intel Corporation such as Intel Pentium processors or InteliCore series processors. Of course it should be understood that theseprocessors are exemplary of many types of processors that may be used.

The exemplary data stores used in connection with exemplary embodimentsmay include any one or more of several types of mediums suitable forholding computer executable instructions. This may include, for example,magnetic media, optical media, solid state media or other types of mediasuch as RAM, ROM, PROMs, flash memory, computer hard drives or any otherform of media suitable for holding data and computer executableinstructions. Some exemplary embodiments may include features like thosedescribed in U.S. Pat. No. 8,474,698 the disclosure of which isincorporated herein by reference in its entirety. Exemplary controllersmay include other components such as hardware and/or software interfacesfor communication with the transaction function devices.

The exemplary automated banking machine 12 further includes at least oneinterface 40. Interface 40 may include, for example, a suitable networkinterface that enables communication between the at least one controller34 in the banking machine and one or more networks schematicallyindicated 42. Interface 40 may include one or more circuits whichinclude electrical components suitable to communicate with wired,optical or wireless networks as appropriate for purposes of providingcommunications with the machine.

As shown in FIGS. 1 and 2 automated banking machine 12 may communicatethrough one or more networks 42 with one or more host computersschematically indicated 44. First computer 44 includes at least oneprocessor schematically represented 46 which is in operative connectionwith at least one data store schematically indicated 48. The processorand data store associated with host computer 44 is operative to carryout computer executable instructions that are stored in at least onedata store.

As represented in FIG. 1 in the exemplary arrangement, host computer 44is in operative communication through one or more networks 50 withfinancial transaction servers 52, 54 and 56. Each of servers 52, 54 and56 each include at least one processor and at least one associated datastore as schematically shown.

In the exemplary arrangement the system further includes at least oneremote computer 58. In the exemplary arrangement at least one remotecomputer 58 is in operative communication with the system throughnetwork 50. Remote computer 58 includes at least one processor and atleast one data store as schematically shown. Further in the exemplaryarrangement remote computer 58 is also in operative connection withother networks such as network 60 that is schematically shown, as wellas other servers 62. Further in the exemplary arrangement the at leastone remote computer 58 may be in operative connection with wirelesscommunication networks as schematically indicated 64 as well as othertypes of public or private networks. The configuration of the particularsystem will depend on the nature of the system and the types oftransactions to be conducted.

In operation of the exemplary arrangement a user at an automated bankingmachine such as automated banking machine 12 is enabled to carry outtransactions involving a user's financial account. This is accomplishedin the exemplary arrangement by a user providing to the card reader ofthe machine, a suitable card such as a credit or debit card thatincludes card data that is usable to identify the financial accountassociated with the user. The controller 34 of the exemplary automatedbanking machine is operative in accordance with its programming to causethe card reader to read the data from the user card. The controllerfurther operates to cause the display to output indicia that prompts auser to input other identifying data to the machine such as a personalidentification number (PIN) through the keypad 22 of the machine. Thecontroller then operates to cause the user input PIN or otheridentifying data to be received through the keypad. Alternatively insome arrangements other or additional identifying data may be received.Such data may include biometric data such as a fingerprint input throughan input device such as a fingerprint reader. Other identifying data mayinclude a facial recognition scan, an iris scan, a retina scan, voicerecognition or other suitable identifying data that may be input via aninput device which can receive such inputs. For purposes hereof each ofsuch types of user identifying input data will be referred to as a PIN.

In the exemplary arrangement the controller 34 operates in accordancewith its associated programming to cause the display to output messagesto the user which ask the user to select the type of transaction thatthey wish to conduct through operation of the machine. For purposes ofthis example, the user will select a cash dispense transaction which theuser indicates by providing inputs by pressing the appropriate keys 30of the machine. In the exemplary arrangement, in response to the userselecting a cash dispense transaction, the at least one controller 34operates to provide outputs through the display to the user promptingthe user to input the amount of cash they wish to have dispensed inconnection with the transaction. The controller then operates to causethe user input amount to be received through operation of the keypad 22or other user input device of the machine.

In response to receiving these items of information from the machineuser, the exemplary controller 34 operates in accordance with itsprogramming to cause one or more messages to be sent to the host 44. Themessages sent to the host 44 are transmitted through the networkinterface 40 and through the one or more networks 42 to the host 44. Themessages sent by the automated banking machine to the host include datacorresponding to the inputs provided by the user to the machine.

In the exemplary arrangement the host 44 operates in accordance with itsprogramming to determine if the data read from the user card correspondsto a user financial account that is authorized to conduct a transactionat the machine. This is accomplished in the exemplary arrangement by theprocessor 46 of the host 44 determining if the card data corresponds todata stored in the one or more data stores 48 associated with the host.In this exemplary arrangement if the data read from the user cardcorresponds to an account that is authorized to conduct a transactionthrough operation of the machine, the host then determines if thecustomer input PIN corresponds to user identifying data associated withthat particular account. This is accomplished by comparing datacorresponding to the input PIN to data stored in the at least one datastore 48. Thereafter if the PIN data that is input corresponds to thePIN associated with the account, the host computer then operates inaccordance with its programming to determine if the financial account ofthe machine user includes a balance that is at least equal to the amountthat the user has requested to be dispensed from the automated bankingmachine. The host computer does this by comparing the financial accountdata stored in one or more data stores regarding the balance in theaccount to the amount requested by the machine user.

If the host computer determines that the card data and PIN data areauthorized and that the user's account has sufficient funds to enablethe user to withdraw the amount requested, the host then operates inaccordance with its programming to send one or more messages to theautomated banking machine. The messages sent by the host computer areindicative that the transaction requested by the user is authorized tobe carried out. Of course it should be understood that in the event thatthe card data does not correspond to the account of a user authorized toconduct a transaction at the machine or if the PIN data is notappropriate for that account, then the host computer will send one ormore messages to the machine that indicate that the transaction is notauthorized. Likewise if the host computer determines that the user doesnot have a suitable balance in their account to cover the requested cashwithdrawal, the host computer will likewise send one or more messagesindicating that the transaction is not authorized. In cases where it isindicated that the transaction is not authorized, the at least onecontroller 34 operates in accordance with its programming to provide oneor more outputs through the display 26 to indicate to the user that thetransaction is declined. The exemplary controller further operates inaccordance with its programming to return the user's card to the userthrough operation of the card reader. Thereafter the machine returns tothe waiting state to conduct another transaction that will start withthe input of another card.

In the exemplary arrangement if the one or more messages sent by thehost to the automated banking machine indicate that the transaction isauthorized, the at least one controller 34 operates in accordance withits programming to cause the cash dispenser to operate. The cashdispenser is operated to make available to the user of the machine, cashcorresponding to the amount of cash that the user has requested. Theexemplary controller also operates in accordance with its programming tocause the printer 24 of the machine to operate to produce a receipt forthe user which indicates the details of the transaction including thevalue of the cash dispensed.

In the exemplary arrangement the controller 34 also includes one or morerecords in its data store 38 regarding the carrying out of thetransaction and the fact that the cash was dispensed. Further thecontroller operates in accordance with its programming to send one ormore messages to the host computer 44 to indicate that the cash dispensewas successfully carried out for the user. In response to the receipt ofsuch messages, the exemplary host operates in accordance with itsprogramming to assess a charge to the user's account corresponding tothe value of the cash dispensed.

Of course the process described is utilized for authorizing transactionsin situations where host 44 has access to the data necessary toauthorize financial transfers for the particular user at the machine. Insome exemplary transactions, the host 44 may not have direct access tothe data associated with the particular user's account that issufficient to authorize the user's requested transaction. In sucharrangements when the host 44 receives the data related to the requestedtransaction, the host 44 will operate in accordance with its programmingto determine that it does not have the capability to determine whetherthe transaction requested should be authorized. In such arrangements thehost 44 operates in accordance with its programming to route thetransaction data in one or more messages to the appropriate network suchas network 50 which includes the remote server such as server 52, 54 or56 that can determine whether the transaction should be authorized.

In the exemplary arrangements the transaction data routed to theappropriate remote server is then analyzed in a manner like thatpreviously described in connection with host 44 to determine if the carddata corresponds to an account that is authorized to conduct atransaction through operation of the machine. Further the appropriateremote server operates in accordance with its programming to determineif the customer input PIN corresponds to an authorized user of theaccount and whether the user account has sufficient funds to cover therequested cash withdrawal. The remote server then operates in accordancewith its programming to communicate through the network 50 to the host44, messages which include information on whether the transactionrequested is to be authorized or denied. The host 44 then communicatesthe appropriate messages to the machine. If the transaction isauthorized, the machine communicates that it successfully carried outthe transaction to the host 44. The host 44 then communicates thisinformation through the one or more networks 50 to the appropriateremote server. The server then causes the user's account to be assessedan amount corresponding to the value of the cash dispensed.

It should be understood that the approaches described are exemplary. Inaddition other types of transactions such as deposits, account balanceinquiries, check deposit transactions, check cashing transactions,converting electronic value stored on a mobile device to cash or viceversa, cash accepting transactions, or other types of transactions maybe conducted in other exemplary embodiments. Further exemplary systemsmay include features like those described in the following U.S. Patents,the disclosures of which are incorporated herein by reference in theirentirety: U.S. Pat. Nos. 8,365,985; 8,376,219; 7,934,644; 7,857,208;7,844,512; 7,819,309; 7,689,509; 7,653,601; 7,582,944; 7,533,805; and6,966,487.

In some exemplary embodiments the at least one remote computer 58operates to identify situations where fraudulent transactions may beoccurring. For example in some situations where card data and PIN datafor a financial account has been stolen by criminals, numerousfraudulent cards may be produced by criminals in different parts of thecountry or in various countries of the world. These criminals mayconduct numerous frequent transactions on the account until the accountbalance is depleted. Often these transactions may be occurring atnumerous different automated banking machines or at other types ofterminals where value is given, such as at a point of sale or service indiverse locations. The fact that numerous transactions are occurring inrapid succession on a given account may not be realized until after thecriminals have successfully depleted a significant portion of the fundsin the account for which the card and/or PIN data or other authorizeduser data that enables carrying out transactions has been stolen.

In the exemplary arrangement at least one remote computer 58 is operatedto identify situations where transactions are occurring on a particularaccount and to provide an alert message in the event a particularaccount is having an abnormally high number of transactions attemptedthereon. By determining that a particular account is experiencing anabnormally high level of activity, the remote computer can provide thealert message so as to enable the entity which holds the account to takeappropriate action such as to suspend all further transaction activity.Further in the exemplary arrangement the at least one remote computerdoes not have the capability to identify the account number or otherdata for the particular account. Rather the remote computer receivesencrypted or other data which is unique to each account but which cannotbe utilized to determine the actual account number. Thus the at leastone remote computer does not have the associated security risks thatwould be associated with having such actual account data transmittedthereto over wide area networks, or even public networks, which may beaccessed by unauthorized persons.

In the exemplary arrangement the host computer 44 as well as each of theremote servers, for example servers 52, 54 and 56, each have associatedprogramming that operates to produce encrypted data that corresponds tothe account number data for each transaction that is requested at anautomated banking machine. In exemplary arrangements the encrypted datamay correspond to a one-way hash or other algorithmic result that isproduced from the account number data either alone or in combinationwith other data. The algorithmic result that is produced results inencrypted data that in the exemplary embodiment is unique to theparticular account number, but that may not be used to resolve theaccount number except by the particular computer that produced theencrypted data. In some exemplary arrangements the encrypted data may beused directly for purposes of comparison while in other arrangements theencrypted data may need to be mathematically manipulated using othervalues in order to resolve data that may be compared to other data toidentify a common account. Further in the exemplary arrangements thehost computer 44 and other servers may operate to provide securecommunication through the one or more networks 50 with the at least oneremote computer 58. Such secure remote communication may include variousapproaches such as secure socket layer communications or public keycryptography that ensures that the encrypted data sent from theoriginating computer is multiply encrypted and can only deliver theencrypted data to the at least one remote computer 58. Of course theseapproaches are exemplary and in other arrangements other approaches maybe used.

Logic carried out by the at least one remote computer 58 is representedschematically in FIG. 3. In the exemplary arrangement the at least oneremote computer operates to receive the encrypted data from the hostcomputer or server that has received a transaction request related to anaccount. This is represented by a step 66. The at least one computerthen operates in accordance with its programming to review the receivedencrypted data and to calculate the number of other transactions inwhich the same or corresponding encrypted data that corresponds to thesame account has been received within a prior time period. This mayinclude, for example, a time period which is a rolling window, such asthe previous one hour. This is represented by a step 68. Of course itshould be understood that this approach is exemplary and in otherarrangements other calculations may be made, such as a total number oftransactions that have been conducted on the particular account, theelapsed time since the last transaction or the number of transactionsthat were conducted within a fixed time window. Various approaches maybe taken depending on the particular analysis to be conducted toidentify an abnormal situation which represents a possible circumstanceinvolving stolen card data.

In the exemplary arrangement the at least one remote computer 58operates in accordance with its programming to determine based on thecalculated number of transactions, whether the transaction count hasexceeded a programmed threshold. This is represented in a step 70. Ifthe number of occurrences of receipt of the encrypted data whichrepresents the number of transactions carried out on a particularaccount, does not exceed the threshold based on the receipt of the mostrecent occurrence, the computer operates in accordance with itsprogramming to defer any action. However, in the event that the numberof transactions has exceeded the programmed threshold within the setrolling time window, the at least one computer operates to generate oneor more messages or statuses which comprise an alert. This isrepresented by a step 72. In some exemplary arrangements the at leastone computer may be operated to respond promptly to the receivedencrypted data so as to indicate to the server or host computergenerating the encrypted data that there is a possible problem. Thisreceived data is usable by the server or host computer to cause a denialof the then pending transaction and/or further transactions which arerequested on the account. In alternative arrangements other analysis inaccordance with the programming of the remote computer 58 may beconducted. This may include for example evaluating the timing betweensuccessive transactions. In this case the computer determines iftransactions are happening more quickly than a threshold, and if so,generates a signal corresponding to an alert. In some embodiments thecomputer may monitor and evaluate multiple factors in determiningwhether to generate an alert.

Further in the exemplary arrangement responsive to the generation of thealert, the at least one remote computer 58 is operative to send the datacorresponding to the encrypted data to other computers operativelyconnected in the system that might receive transaction requests relatedto the account. The sending of this encrypted data to the computerscauses the computers to operate in accordance with their programming tostore in their associated data stores the encrypted data or other datathat is produced when a transaction on that account is requested. Thusby holding the data corresponding to the encrypted data or data that canbe used to identify a transaction requested on the same account in theone or more data stores associated with the servers 52, 54 and 56 aswell as host 44, such systems may immediately take appropriate steps inaccordance with their programming, such as to deny a transactionwhenever a transaction on an account is requested and the mathematicalmanipulation of that account data to produce encrypted data correspondsto the encrypted data for which the alert has been generated. Further insome exemplary systems the receipt of the alert message and encrypteddata which can be used to identify transactions which may be suspect,may be utilized by the hosts, servers and remote computer to take stepsto try to minimize loss associated with the possible fraudulenttransactions. This may include, for example, notifying authorities ofthe particular transactions which were conducted recently on the accountand/or the locations where such transactions occurred. It may alsoinclude storing and/or transmitting video surveillance data or takingother appropriate steps that may be useful to identify and apprehendcriminals who may be conducting fraudulent transactions on the account.

In the exemplary arrangement the at least one remote computer 58 isoperative to maintain the alert status associated with the particularencrypted data until certain programmed steps are taken. For example,such status may be maintained until the at least one remote computerreceives messages that the alert status associated with that particularencrypted data should no longer be maintained. This is represented bythe step 76.

Of course it should be understood that the foregoing approach toidentifying a possible situation where account data has been stolen andis being used fraudulently is exemplary, and in other embodiments otherapproaches may be used. This may include, for example, includingsuitable programming in the at least one controller 34 associated witheach automated banking machine. Thus for example the controller may beprogrammed to produce the encrypted data directly and to send thisencrypted data either through the associated host or through otherconnected networks to the at least one remote computer which identifiesthe possible occurrences of fraudulent transactions on a stolen account.In addition as previously mentioned, in other exemplary systems, ratherthan having a common approach to producing encrypted data where the samedata corresponds to a common account, other approaches may be taken soas to send other data which can be resolved through appropriateprogrammed steps executed by the at least one remote computer 58 toidentify that the encrypted data sent from different sources correspondsto a common account. This may be done, for example, by programming ofthe automated banking machines, the host computer and the servers indifferent ways to produce the encrypted data, and by providingprogramming that enables the at least one remote computer to identifythat the different types of encrypted data correspond to one particularaccount. Further these approaches are useful in the exemplary embodimentbecause with the remote computer being incapable of determining theactual financial account data from the encrypted data, the financialaccount data remains secure. This is true even if the encrypted data istransmitted through an insecure network such as the Internet. Of courseit should be understood that these approaches are exemplary and in otherembodiments, other approaches may be used.

FIG. 4 shows an alternative arrangement in which one or more computers58 may be operated to identify unauthorized transactions, as well ascircumstances where account data may be stolen. In this exemplaryarrangement transactions are carried out on the account using a mobilewireless device such as a smart phone 78 represented schematically inFIG. 1. It should be understood that in exemplary arrangements awireless device may correspond to other types of devices such as tabletcomputers or wearable computers which are usable by consumers to conducttransactions at an automated banking machine. Alternatively the wirelessdevice may correspond to an article associated with a user such as auser's vehicle which incorporates one or more computers within thecircuitry thereof.

In the exemplary arrangement the mobile wireless device is operative tocause data corresponding to the financial account to be sent to theautomated banking machine at which the user wishes to conduct atransaction. This may be done, for example, by the mobile wirelessdevice sending data from the device wirelessly through the input device32 of the automated banking machine. The mobile device may be operativeto cause the automated banking machine to receive data that is usable toidentify a financial account. This may be done, for example, in somearrangements by the mobile device sending the automated banking machinedata which corresponds to an account number directly. Alternatively insome arrangements the mobile wireless device may cause communicationswith other systems which then cause the automated banking machine toreceive data which corresponds to or is usable to resolve the accountnumber. For example in some exemplary arrangements systems may includefeatures like those described in the following U.S. Patents which areincorporated herein by reference in their entirety: U.S. Pat. Nos.8,281,989; 8,376,221; 8,474,707; 8,052,048; 7,216,800; 7,201,313; and8,480,307. Of course these approaches are exemplary and in otherarrangements other approaches may be used.

In the exemplary arrangement at least one processor included incircuitry of the mobile wireless device 78 may operate in accordancewith its programming to cause encrypted data that corresponds to thefinancial account on which a transaction is to be conducted to be sentto the at least one remote computer. This may be done for examplethrough communication via wireless networks 64. Further as the automatedbanking machine host computer or server which receives the requestedtransaction also sends encrypted data that corresponds to the account,this enables the at least one remote computer to identify a common pairof communications having encrypted data that are both received close intime for each authorized transaction. The at least one remote computer58 is programmed to identify circumstances where both instances of theencrypted data for the given transaction have not been received and toidentify such circumstances as a possible situation where a fraudulenttransaction may be occurring. The logic associated with such a remotecomputer that identifies such circumstances is represented in FIG. 4.

In this exemplary arrangement the at least one remote computer 58receives the encrypted data associated with the account either from themobile wireless device, server, host or automated banking machine asrepresented in step 80. As in the prior example the at least one remotecomputer that operates to calculate the number of transactions indicatedas attempted on that account within a given time period. This isrepresented by a step 82. If the number of transactions is determined tohave exceeded the threshold, as represented in a step 84, the at leastone computer executes steps similar to those in the prior example. Theseinclude generating an alert, sending the encrypted data to the remotesystems and holding the alert status until it is reset. This isrepresented in steps 86, 88 and 90 respectively.

In this exemplary arrangement, in situations where the at least oneremote computer is expecting to receive two paired messages in closelyspaced time relation in order to indicate that a transaction isauthorized, the at least one computer operates in accordance with itsprogramming to determine if the two paired messages associated with theone transaction were received. This is accomplished by the at least oneremote computer comparing the messages received with the encrypted datathat corresponds to the particular account and the timing associatedwith the receipt thereof. This is represented in a step 92. Adetermination is made in a step 94 concerning whether the two pairedmessages for the common transaction were received. If the two pairedmessages for the single transaction were received close in time as wouldbe normally expected, then the at least one remote computer 58 operatesin accordance with its programming to not indicate that there is aproblem. In the exemplary arrangement the at least one remote computeroperates in accordance with its programming to adjust the transactioncount of transactions on the account to accommodate that two messagesare received for each transaction. This is represented in a step 96.Thereafter the at least one remote computer operates to continue tomonitor for any potentially problematic conditions.

However, if in the step 94 it is determined that paired messages fromthe mobile wireless device and from the automated banking machine, hostcomputer or server computer receiving the transaction request were notboth received, the computer operates in accordance with its programmingto identify an abnormal condition and to generate an alert. This isrepresented in a step 98. As can be appreciated, the absence of bothmessages of the expected pair may represent a circumstance where atransaction has been attempted by a criminal or unauthorized person whois not using the authorized mobile wireless device, but is insteadproviding the account data from an unauthorized source such as acounterfeit card or other fraudulent input device. Alternatively thecondition may represent the circumstance where criminals have set up afraudulent terminal to receive transaction data so as to capture thedata for purposes of conducting fraudulent transactions. In either casethese circumstances represent a suspect condition.

In the exemplary arrangement the computer operates in accordance withits programming to identify that there is an abnormal conditionassociated with the account as appropriate to the other computers in thesystems. This will enable such computers to identify further attemptedtransactions on the account and to deny them in accordance with theirprogramming. Further the at least one computer operates in accordancewith its programming to hold the alert status associated with theaccount until it is reset.

Of course it should be understood that these approaches are exemplaryand in other embodiments, other additional steps and arrangements may betaken similar to those described herein for purposes of identifyingsuspect transactions and for denying such transactions and reportingcriminal activity.

FIG. 5 shows an exemplary arrangement of a mobile wireless devicegenerally indicated 100 that may be used in connection with an automatedbanking machine or otherwise for purposes of carrying out financialtransactions. The exemplary device 100 is configured as wearableglasses. However, it should be understood that in other arrangementsother configurations of devices may be used. For example, configurationssimilar to that of a wrist watch, a medallion or a hat or other item ofclothing may be used. The exemplary embodiment of device 100 includes atleast one circuit which is operative to control the operation of devicesthat are included as part of the mobile wireless device. The at leastone circuit designated 102 in FIG. 6 includes a processor 104 and anassociated data store 106.

The exemplary arrangement further includes a source of electrical powersuch as a battery 108. The exemplary arrangement further includes agenerally transparent display 110, an outward facing camera 112 and aninward facing camera 114. The exemplary embodiment further includes amicrophone 116 and a speaker 118. The exemplary embodiment furtherincludes a wireless transmitter 120. The wireless transmitter 120 issuitable for transmitting wireless signals between the mobile wirelessdevice 100 and other devices. The wireless transmitter 120 may include ashort range wireless transmitter such as a short range RF transceiver ora Bluetooth™ transceiver. Alternatively the wireless transmitter mayinclude an infrared transceiver. Alternatively the wireless transmittermay include a transceiver suitable for communication via a cellulartelephone network or other wireless network. Further in somearrangements of the mobile wireless device the apparatus may includemultiple types of wireless transceivers depending on the nature of thecommunications to be carried out through operation of the device.

As represented in FIG. 6, exemplary embodiments of the mobile wirelessdevice may operate to carry out financial transfers. This may be donethrough communication with an automated banking machine in one of theways described in the incorporated disclosures. In other arrangementsthe mobile wireless device may cause financial transfers throughcommunications via a cellular network, a local wireless network or otherlocal or wide area network. The exemplary mobile wireless device isoperative to include data in its data store that is usable to identify afinancial account. In the exemplary arrangement the data store of themobile wireless device also includes data that corresponds to a userbiometric feature. In some exemplary arrangements this may includeprogramming in the data store that includes data that corresponds to thetopography of an authorized user's iris topography of one or both of theuser's eyes. The user's iris topography uniquely identifies theauthorized user and can be captured through the use of at least oneinward facing camera 114. Further in some exemplary arrangements themobile device may include multiple inward facing cameras or othercameras that can capture iris topography of both irises of theauthorized user. In addition or in the alternative other mobile devicesmay include capabilities for identifying a user's facial topography,retina features and/or other biometric features that can be utilized toidentify the user.

Responsive to the inward facing camera or cameras 114 capturing datacorresponding to the user's iris topography or other identifying data,the circuitry 102 may operate in accordance with its programming toverify that the mobile device is being operated by the authorized user.This may be done by comparing captured electronic image data to storeddata to determine whether there is correspondence or anotherpredetermined relationship which indicates the user is an authorizeduser. Responsive to such verification determination the authorized usermay then provide instructions to the mobile device in connection withcarrying out a financial transaction and the mobile device will operatein accordance with its programming to execute instructions responsive tosuch commands. This may be accomplished in some exemplary arrangementsby the user providing spoken commands that are received by themicrophone 116 and determined as transaction related inputs throughoperation of the control circuit 102. Alternatively the user may bepresented with menu options or similar options through the display 110,which options the user may select. Selections may be made and input insome embodiments by providing spoken commands that correspond to theoptions. Alternatively the user may provide selected inputs which enableselecting transaction options output on the display through moving afinger along a tactile sensing bar or other similar input device 122. Instill other exemplary arrangements the user may provide inputs througheye movements or line of sight determinations which are detected by theone or more inward facing cameras 114. This may be done for example byutilizing features such as those described in U.S. Pat. Nos. 8,220,706and/or 8,883,008 the disclosures of which are incorporated herein byreference in their entirety. For example in some exemplary arrangementsthe circuitry connected with the at least one camera 114 may determine alocation where a user eye is looking on the display 10. By determiningwhat particular transaction selections or options the user is lookingat, the control circuitry may determine user provided inputs. Forexample in some instances the user may look at a particular selectionbeing provided on the display and designate that selection by blinkingone eye or both eyes. When this is done the control circuitry may thenoperate to provide additional outputs and/or messages that enablecarrying out the transaction selected by the user.

As represented in FIG. 6, the mobile wireless device 100 may be used forexample to send data associated with a user desired transaction to anautomated banking machine 124. Such data may include data such as carddata that is usable to identify a user's account. Such data may bestored in the at least one data store 106 and then transmittedwirelessly to the machine. Further in some arrangements the user mayselect through the mobile wireless device an account, a transaction typeand/or an amount associated with a transaction that they wish toconduct. Data corresponding to these items of information may beincluded in messages transmitted to the automated banking machine andreceived through a wireless portal on the machine. This may be done inany one of several ways that are described in the incorporateddisclosures or in another suitable manner.

Alternatively in some arrangements the mobile wireless device 100 maycommunicate data to a server 126 that is remote from the automatedbanking machine. The server 126 may utilize the data sent from themobile wireless device to resolve transaction data that is needed by theautomated banking machine to carry out the transaction. This mayinclude, for example, account data or other data such as amount data,PIN data or other data that is needed by the machine 124 for purposes ofcarrying out the transaction. This data may be transmitted from theserver 126 to the machine through one or more networks 128. Thisapproach may be utilized, for example, when the mobile device does notinclude data that directly corresponds to the account information, butrather pseudo data that may be utilized by one or more remote servers todetermine the actual account information. Thus for example server 126may include in its associated data store, data that associates thepseudo data that is provided from the mobile wireless device with theactual account data. The actual account data may then be sent in anencrypted and secure manner to the automated banking machine. Thisapproach may avoid the need, for example, for the mobile wireless deviceto have included in its data store actual account number data.

Also in other alternative arrangements the mobile wireless device mayuse its outward facing camera 112 to capture data that is output on thedisplay or other output device of the automated banking machine. Suchoutput data may be used in the manner of the incorporated disclosures toidentify a particular machine at which a transaction is to be conducted.This identifying data or data based thereon may then be transmitted tothe remote server so as to enable user operation of the automatedbanking machine. Alternatively or in addition data captured through theoutward facing camera of the mobile device may correspond for values,functions and/or instructions that may be utilized for purposes ofencrypting account data that is stored in a data store of the mobilewireless device. For example, bar codes such as QR codes output througha banking machine display may provide values or instructions utilizedfor purposes of encryption of account data. Such encrypted account datamay then be sent to either the automated banking machine and/or theremote server for purposes of securing the account data to reduce therisk that it can be intercepted during the transaction. This may be donea number of different ways including those described in the incorporateddisclosures as well as in other suitable ways depending on theparticular operation of the system.

In this manner a user may accomplish transaction steps through thewearable mobile wireless device or other user device for purposes ofcarrying out financial transfers. Further it should be understood thatalthough in the exemplary arrangement the mobile wireless device is usedin connection with an automated banking machine to accomplishtransactions, in other arrangements other devices and systems may beutilized and messages from the mobile wireless device may accomplishfinancial transfers, account balance checking, bill payment, checkcapture or other desired transaction operations. For example in someexemplary embodiments the mobile wireless device may utilize an outwardfacing camera for purposes of capturing an image of a check. The usermay provide instructions either verbally or through input devices tocapture the image of the check and then cause the check to be depositedin the user's account. This may be done, for example, in the mannershown in U.S. Pat. Nos. 8,418,916; 8,286,867; and/or 8,104,676 thedisclosures of each of which are incorporated herein by reference intheir entirety.

Further in other exemplary embodiments data corresponding to electronictickets or other items representative of value may be loaded into thememory of the mobile device. This may be done, for example, throughcapturing images thereof through the outward facing camera or otherwisethrough transmission wirelessly to the device. The mobile wirelessdevice may thereafter be utilized to transmit data which may be utilizedfor purposes of redeeming or utilizing the items of value. This may bedone, for example, through approaches described in U.S. Pat. No.8,387,864 the disclosure of which is incorporated herein by reference inits entirety. Of course these approaches are exemplary, and in otherembodiments other approaches may be used.

Further other exemplary arrangements of the mobile wireless device maybe useful to accomplish other transaction functions. For example in someexemplary arrangements the circuitry associated with the mobile devicemay be programmed to identify genuine items of value such as currencybills. This may include, for example, executable program steps that areusable to verify that visible and/or other sensor perceivableauthentication features are present in a particular currency bill. Thus,for example, a user may operate the mobile wireless device to captureone or more images of a currency bill through operation of the outwardfacing camera 112. This may be done, for example, by the programmedinstructions associated with the mobile device instructing a userthrough audible prompts or the visual outputs through display 110 tolook at certain features on a currency bill. The control circuitry ofthe mobile wireless device may operate to utilize the eye trackingcapability to monitor the eye or eyes of a user to direct or analyzeareas in the field of view the outward facing camera at which the useris looking to a series of features that may identify a currency bill asgenuine. In this way the front and/or back of a currency bill may beanalyzed to verify that indicia or other visible features indicative ofgenuineness of the bill are present. In addition alternative exemplaryarrangements may include infrared, ultraviolet and/or spaced cameras forpurposes of capturing images of authenticity features. Alternatively auser may be prompted to take certain steps with one or more separatedevices. This can include illuminating certain areas with radiation atcertain frequencies, testing for magnetic or other sensed properties.The camera may capture features or indications of properties orcharacteristics that are indicative of whether notes are genuine. Thisapproach may be utilized in some exemplary arrangements to enable a userto identify counterfeit or suspect notes that a user receives in atransaction environment and to decline such notes as may appear to besuspect. Further in some example arrangements the wireless communicationcapability of the mobile wireless device may enable the user to operatethe mobile device to analyze, verify or record data in one or more datastores that correspond to the genuine or suspect status of currencybills that are analyzed through operation of the mobile device. Thus inthis manner the user can avoid accepting counterfeit currency bills thatmay be attempted to be passed to the user.

Alternatively or in addition the mobile wireless device may be operativeto verify the authenticity of other items or documents. This mayinclude, for example, the capability to identify the genuineness of acredit or debit card through analysis of the visual or other non-contactsensor detectable features included thereon. Thus for example a merchantwho wishes to accept a credit or debit card may utilize the mobilewireless device to analyze the features that are on the card includingholograms, security codes, or other features that identify the card asgenuine. Further in some arrangements such cards or other items mayinclude wireless transmitters or other similar items, such as RFID tagsthat can be utilized to output signals which can indicate that the cardor other item is genuine. The mobile device may include appropriatesensors to capture and analyze such signals and properties and mayoperate one or circuits that include processors to determine of the cardor other item is genuine.

Further in some exemplary embodiments the mobile wireless device cancapture image data from the card or other record including for exampleaccount number data, verification codes, name data or other items thatare usable to carry out a financial transaction. In such arrangements,for example, an operator of the mobile wireless device may utilize themobile wireless device to obtain the data from a card that is necessaryto identify the particular account with which the card is associated andalso to verify the genuineness of the card. In this manner by providinginstructions to the mobile wireless device, the operator of the deviceis enabled to accept payments or otherwise accomplish functions thatinvolve a transfer to or from the account associated with the particularcard. Such an approach may enable the operator of the mobile wirelessdevice to accomplish the acceptance of credit card and/or debit cardpayments without a need to have a separate terminal that operates toreceive the card, read data from a stripe or computer chip on the card,or otherwise to identify the particular card as genuine and authorizedto conduct the transaction.

In still other exemplary arrangements, the mobile device 100 may beutilized to identify features which are indicative of authenticity onarticles such as event tickets, gaming tickets, lottery tickets,coupons, vouchers, scrip or other items. In this manner the mobilewireless device may be programmed to utilize image data and/or otherdata which can be visually or wirelessly read by the device, or with theaid of another device, to determine the genuineness of such articles. Ofcourse these approaches are exemplary and in other embodiments otherapproaches may be used.

In still other arrangements the mobile device 100 may be utilized toprovide useful features in connection with conducting transactions intransaction environments where cash or other items of value are acceptedby merchants or similar entities. For example in some establishments,merchants may prefer to receive cash payments for the goods and servicesthey provide. Cash payments have the advantages that they avoid therisks and costs that may be associated with taking payments by eithercredit or debit cards. Some establishments even provide automatedbanking machines that dispense cash within their establishment so thatusers can readily obtain cash for purposes of making purchases. However,such automated banking machines that dispense cash in merchantestablishments may commonly charge a fee for purposes of conducting thetransaction. This fee may be several dollars in some cases.

In order to facilitate the use of cash in some transaction environments,the establishment may be able to track the serial numbers of currencybills that are dispensed from an automated banking machine to patronswithin the establishment. This may be done using features like thosedescribed in U.S. Pat. No. 8,474,708, the disclosure of which isincorporated herein by reference in its entirety. In such arrangementsthe serial numbers associated with dispensed bills may be stored in adata store associated with one or more computer devices that areaccessible by the wearable computer devices worn by employees within theestablishment. Such mobile wearable computer devices may utilizefeatures like those previously described to evaluate currency bills forgenuineness and to also determine the serial numbers thereon. Thewearable computer device 100 may communicate the serial numbers fromreceived bills 111 (shown schematically in FIG. 5) to determine if thebills received correspond to those dispensed by the automated bankingmachine in the establishment. This may be done, for example, through theuse of cameras 112 on a mobile wireless device 100 capturing the serialnumber data and resolving the data in a manner that can be transmittedwirelessly to the computer which can access the serial number datacorresponding to bills dispensed from the banking machine. In caseswhere a serial number received by an employee is one that was dispensedfrom the machine, the merchant may offer a credit or a discount to thepurchaser. In this way the purchaser is compensated for spending themoney that they obtained through use of the machine and paying thesurcharge to obtain the cash. Such an approach may be very useful inproviding an incentive for individuals to spend the cash that theyobtain from the banking machine in the establishment where the machineis located. In addition it may enable the proprietor to evaluate thevalue of having the machine in terms of how much of the cash that isdispensed therefrom is actually spent by patrons within theirestablishment. This may be done through programmed instructionsassociated with one or more computers that evaluate the amountscorresponding to purchases by patrons in the establishment that arebased on bills that were dispensed from the machine. Further in theexemplary arrangement the computer data concerning serial numbers ofbills that are dispensed from the machine are only held for a limitedset period of time. This may correspond in some cases to a one dayperiod, as it would be expected that patrons would likely spend the cashthat they receive from the automated banking machine during the samevisit to the establishment in which the cash was received. Of course insome establishments the set period may be longer or shorter. After theset period of time, the data concerning the serial numbers of billsdispensed would no longer be stored. This avoids the need for creating alarge database to hold serial number data associated with dispensedbills. Of course these approaches are exemplary and in otherarrangements other approaches may be used.

In some exemplary transaction environments, employees of a particularmerchant may have the wearable computer devices 100 provided by theestablishment. It may be a requirement of the employment that theemployee utilize the wearable computer for business activities duringtheir work hours. In this way, the available functions of the devicescan be available at all times which the employee is on duty. In additionin some arrangements the employer may require that each employee storetheir wearable mobile wireless device 100 in a particular location whenit is not in use, such as during off hours when the establishment isclosed. In some exemplary arrangements a mounting shelf or stand may beprovided onto which the employee may place the wearable wireless mobiledevice when the employee's shift has ended. The placement of the mobiledevices when they are not in use may provide for additional uses of thedevices during off hours.

As can be appreciated, the cameras 112, 114 which are utilized on thewearable mobile wireless devices 100 may serve as surveillance camerasduring times that the establishment is not open. Such surveillancecameras may be monitored from local or remote monitoring stations sothat any intrusions or abnormal conditions can be detected within theestablishment. Similarly, audio receiving devices such as microphone 116included on the wearable computer may be monitored during off hours forpurposes of determining abnormal noises which may be indicative of abreak-in, machinery malfunction or other problem within theestablishment. By having numerous mobile devices positioned in variousareas of the establishment during off hours, it may be possible for amonitoring system to observe more areas from more different perspectivesthan would be possible with stationary security cameras. In addition,other detection features of mobile devices 100 such as audible sounds orinfrared signals or other things that the wearable mobile devices arecapable of sensing, may be utilized in monitoring activities so thatsuch properties may be detected to uncover abnormal or problematicconditions. Of course the capabilities of the wearable mobile wirelessdevices will determine the capabilities that can be achieved throughsuch arrangements and numerous variations to achieve effectivemonitoring may be utilized in various arrangements. In somearrangements, features similar to those described in U.S. Pat. No.8,302,856 which is incorporated herein by reference in its entirety, maybe utilized.

FIG. 7 shows another exemplary automated banking machine with analternative arrangement generally indicated 130. Automated bankingmachine 130 may generally operate in a manner similar to automatedbanking machine 12 previously described and may include similarcomponents. This alternative embodiment also includes an item producingdevice generally indicated 132. In the exemplary arrangement the itemproducing device 132 includes a 3D printer. The 3D printer is utilizedto produce items that are dispensed from or otherwise made available bythe automated banking machine to a user.

In an exemplary arrangement a 3D printer or other type of materialprinter is utilized to produce an item that is representative of and isredeemable for value. Specifically in some exemplary arrangements theprinter is operative to print patterns of conductive material thatcomprise RFID tags on a substrate to produce a token. The RFID tags areusable to produce signals corresponding to values that identify thetoken as genuine and that are associated with or representative of thevalue for which the token is redeemable.

For example in some exemplary embodiments a user may operate theautomated banking machine in a manner similar to that previouslydescribed in connection with a cash dispensing transaction. However, inan exemplary alternative arrangement the user may elect through inputsto the machine, to receive a token corresponding to a selected valuerather than cash. This would be done, for example, where a user wishesto receive a token that is redeemable for a particular type ofmerchandise or services available from a particular identified retailer.For example in some arrangements the retailer may offer an additionalbonus in terms of goods or services value above the amount that the userpays for the particular token in order to provide an incentive for theuser to acquire the merchant's goods or services. Of course thisarrangement is one of many that may be utilized in connection with thedescribed features.

In such arrangement the printer may operate as represented in FIG. 8 toproduce a token that includes indicia that can be securely redeemed forvalue by the particular merchant. In this arrangement the printer 132includes a mechanism that operates to receive a piece of token substratematerial from a magazine or similar storage area generally indicated134. The single item of substrate that is removed from the storage areais then printed upon by applying one or more patterns of metallicconductive material thereon in a printing chamber 136. The printingchamber includes a printing head that deposits the metallic materialsuch as silver or copper inks in patterns that correspond to one or moreRFID tags. This is accomplished through control provided by circuit 138.Circuit 138 includes one or more processors and one or more data storeswith programmed instructions that are usable to determine the value orvalues corresponding to the desired tags and to produce the patternscorresponding to the RFID tags that are produced on the token.

It should be understood that in the exemplary arrangement one or moreRFID tags that are produced on the substrate correspond to values thatare known by the controller of the automated banking machine and thatare communicated to one or more remote servers. This enables the tokenthat is produced through operation of the printer to be identified asgenuine or otherwise acceptable by RFID tag readers or other itemspositioned at the locations where the token may be redeemed for goods orservices of the merchant. Further as can be appreciated, the RFID tagsthat are included on the token produced may include security features,encryption features, verification features, redemption indicatingfeatures or other items and features that are usable to preventcounterfeiting and assure that the token presented is usable andgenuine.

Once the exemplary token has been produced by the printer, it is movedthrough operation of a suitable conveying mechanism through an opening140 in the automated banking machine so that the token may be receivedby a user. As can be appreciated, the opening may be controlled by oneor more suitable gate mechanisms 142 or other mechanisms to help assurethat access to the interior of the machine and the 3D printer fromoutside the machine is prevented.

Of course it should be understood that production of tokenscorresponding to value is merely exemplary of the types of items thatmay be produced through operation of an automated banking machineincluding one or more 3D printers or other printer types. For example insome exemplary arrangements the automated banking machine may be usableto produce plastic sheet materials. Such plastic sheet materials mayinclude embedded metallic or non-metallic materials which may be usableto identify the sheets as genuine and also to indicate the valueassociated therewith. In addition visible and non-visible elements mayalso be produced within or on the sheets so as to provide a visualappearance that may indicate to a user the nature and/or value of theparticular item. Such items may commonly include items such as scrip,coupons, tickets or other items that are representative of or areredeemable for value.

Further in some exemplary arrangements such items may include embeddeditems that are included during their production in the machine. This mayinclude, for example, batteries, sensors, output devices, input devicesor other suitable items that may be either pre-produced and embedded inthe appropriate locations within the item when it is produced, oralternatively produced by multiple different types of 3D printers and/orother printers or devices included in the machine. For example andwithout limitation, some arrangements may include the capability of theautomated banking machine to produce a token, card or similar articlethat in itself can be operated as a transaction terminal that can beoperated by a user to carry out certain types of financial transactions.This may be accomplished by producing an item that includes a wirelesstransceiver, input and output devices, contact or non-contact connectorsand other things necessary to accomplish financial transfers throughcommunication. Such a produced item for example may include thecapability of transferring funds in an amount up to the associated valuethat the user selected in connection with the transaction that resultedin production of the item. Of course this approach is exemplary and manydifferent types of items may be produced utilizing the principlesdiscussed herein.

In some exemplary arrangements the automated banking machine may providetokens, cards or other articles that include circuits includingmicroprocessors and other electronic components. In some exemplaryarrangements the microprocessors and other circuitry may include organicmicroprocessors and other electronic components. Such components may beproduced for example in some exemplary arrangements by depositing thinfilms of alternating layers of organic material (for example, pentaceneand insulators) and metallic materials such as conductive inks forinterconnections. Such layers may be deposited onto a substrate such asa plastic material to produce microprocessors and other circuitcomponents that can execute instructions and other circuit componentfunctions, and to provide outputs via card contacts, RF transceivers orother devices that are usable in connection with providing transactiondata or other information used for purposes of transactions.

In some exemplary arrangements such technology may be utilized forpurposes of providing microprocessors on or in transaction cards thatcan be used to provide verification of the genuineness of the card. Thismay include, for example, producing microprocessor circuitry fromorganic material that carries out algorithmic functions that identifythe particular card as genuine. These algorithmic functions may be thosedeveloped by certain industry standard setting organizations such asEMV. Using such approaches data supplied as signals to circuitry on acard produces a result which indicates that the card is the genuine cardand not a counterfeit. Such techniques are particularly useful inconnection with magnetic stripe cards for which providing the separatecircuitry including processor capability is usable to generateverification values that provide an indication that the card is notcounterfeit. Thus for example in an exemplary arrangement, data from amagnetic stripe on a card may be read by a card reader to provideaccount number and other data related to an account on which atransaction can be conducted. In addition, certain inputs to themicroprocessor circuitry can be used by the circuitry to produce one ormore results. Such one or more output results may be communicated and/orcompared or otherwise used for purposes of comparison to data thatindicates the genuineness of the card. Different types of algorithms maybe used for purposes of the programming of the microprocessors so as toutilize different input values or other parameters to produce resultswhich can be verified as appropriate and corresponding to a genuinecard. As can be appreciated, various forms of encryption and decryptionand other security functions may also be included in such circuitry thatincludes the microprocessor.

In some exemplary arrangements an automated banking machine may beoperated to apply microprocessor including circuits directly to an areaof an existing card. Such microprocessor based circuitry may then beutilized thereafter to verify the genuineness of that particular card.In some exemplary arrangements the microprocessor based circuitry maycommunicate via direct contact with conductive contacts that engage thecircuitry on the card that is applied through printing or othertechniques. In other arrangements the applied microprocessor circuit onthe card may communicate in a wireless manner via radio signals or othersignals similar to RFID tags previously discussed.

In some exemplary arrangements the automated banking machine may operateto take an existing card and with the permission of the user, apply theappropriate circuitry thereto to add verification capabilities that areusable in the future to verify that the card is the genuine card. Inother arrangements, the automated banking machine may operate to buildfor the user a new card or other article that includes appropriatecircuitry to verify that the card or article is genuine. This may bedone in some arrangements, for example, by having a stored group ofcards or other items which serve as the substrate or base part for thearticles to be produced. The circuits including microprocessors andother components is then applied to the substrate or base part toproduce an article that can be used to provide transaction data such asaccount number, user name and other information, and then also providesoutputs that can be used to verify that the item is genuine.

In still other arrangements, 3D printer technology may be utilized toproduce an item without the use of a starting substrate or base part. Insome exemplary cases the 3D printer may be operated to produce a cardshaped article that includes therein circuitry and other components thatenable the use of the article as a credit card or a debit card. This mayinclude, for example, circuits including microprocessors or otherdevices produced via substance deposition techniques in appropriateconfigurations. Such circuits are operative to store and securelydeliver account data, verification data and other data that can beutilized to carry out transactions. For example card-like articles thatwirelessly communicate with automated banking machine card readers canprovide account data to be used to carry out purchase or bankingtransactions through connected terminal devices.

In still other exemplary arrangements, articles may be produced thatinclude appropriate circuits that communicate transaction data and/orother data with other devices so that a user can obtain goods orservices through use of the particular item. For example in someexemplary arrangements a 3D printer may be utilized to produce awearable article for a user that provides account data and othertransaction data to systems that communicate with the device. Thisenables a user to make purchases, transfer funds and carry out otherfunctions without need for interaction with dedicated financialtransaction terminals. For example in a transaction environment where auser makes purchases, the user may be provided with a wrist band orpendant that the user can wear while in the area where transactions areenabled to be conducted. Articles that a user can purchase are labeledwith RFID tags or other indicators of a price associated therewith. Bytransporting the items from a location where they can be viewed and arepositioned for sale within the establishment, to another area of theestablishment such as an area adjacent to the exit, wirelesstransceivers determine the particular articles that the user is carryingand the user's account data by communication with the wearable articleworn by the user in the transaction environment. The user's account maythen be automatically charged for the items that are taken.

In alternative exemplary arrangements that article may be produced via3D printing or other techniques previously discussed, and provided to auser in an area where the user may receive and be charged for services.Such areas may include for example, theme parks, movie theaters or otherareas where a user is charged based on where they travel within theestablishment. The article provided to the user may wirelesslycommunicate with sensors located in different areas so that the user'saccount is automatically charged for the attractions that are visitedand/or services received by the user. This may involve wirelesslysensing the presence of the article and receiving the account datatherefrom as the user travels adjacent to sensors located at theentrance and/or exits of various attractions/services areas. Thus, forexample, in an environment where a user is attending a theme park, theuser may be charged for visiting certain premium areas of the park whentheir portable article is sensed within the premium area of the park.

In some exemplary arrangements, the article produced for the user maycorrespond to the particular transaction environment in which thearticle is to be used. For example if the article is to be presented ina theme park, the article may be produced as an attractive pendantincluding a design based on the logos of the theme park or thecharacters (such as cartoon or other characters) associated with thetheme park. Further 3D printing techniques may be used to include in thetransaction article that is produced, personalized information such asthe user's name or initials or features selected by a user. For exampleif a theme park is associated with several different cartoon characters,the article produced for the user could be in the shape of the user'schosen character that is selected via inputs to the automated bankingmachine that operates to produce the item via 3D printing techniques. Ofcourse these approaches are exemplary and in other arrangements, otherapproaches may be used.

In still other arrangements, the transaction articles produced may besuitable for generally continuous use in multiple different transactionenvironments. This would enable the user to use the article that isproduced in making purchases of goods and/or services in anyestablishment where the account data and verification data can be readby suitable sensing equipment. Alternatively such articles produced maybe programmed so that they are limited and can only be used during agiven period of time. For example in the case of a theme park where auser has purchased a one-day pass, and the transaction article producedthrough operation of the banking machine may be operable to providetransaction data only during that day. In still other arrangementswireless or contact communication with the article may be used toselectively turn the transaction capabilities of the item on and off.Thus for example if the particular article is a token that is usable formaking purchases in a particular type of store, wireless communicationor other communication with a transceiver may be utilized to turn on thecapabilities of the article to provide account or other transaction datawhen a user enters the store and the capabilities of the article may beturned off automatically when the user exits. This may be done securelyso that user transaction data cannot be obtained from the item byunauthorized persons. Alternatively or in addition provision may be madefor the transaction capabilities of the article to be selectively turnedon and off by a user. This may be done, for example, by inputs toswitches, keypads or other input devices that are included in thearticle. Such input devices may be included through the 3D printingtechniques or other printing techniques for including circuitry andother features in articles as previously discussed.

Further some exemplary arrangements may include using an automatedbanking machine to produce an article that has additional verificationfeatures. Such features may include, for example, circuit components andmicroprocessors that have the capabilities to receive inputs from users.As previously discussed, such articles may include input devices such asuser actuatable keypads or similar devices that can receive personalidentification numbers or other codes from a user. Thus for example insome exemplary arrangements an article can be produced for a user thatincludes a small keypad into which a user can provide a selected inputthat enables the device to output user account data and/or otherwisecarry out transactions until the capability is disabled. Such disablingcapability may be provided by the user providing an additional inputthrough the keypad or other device. Alternatively in other arrangementsthe article may be made so that use of the device in connection withconducting a transaction causes the circuitry therein to be operableresponsive to the programming of the circuitry, to disable the operationof the device after a single transaction has been conducted. Thereafterthe user would have to provide inputs or otherwise enable the articleagain if the user desired to conduct another transaction. For example insome arrangements if the article has been transaction enabled via inputsfrom a user, the article may wirelessly communicate via RF to deliverdata corresponding to the user's account and data which indicates thegenuineness of the article, in response to signals received from atransceiver associated with a particular merchant terminal or a merchantestablishment. In situations where the article was not transactionenabled, the article would not provide such communications and no suchtransactions could be conducted.

In other arrangements other types of input devices may be included intransaction articles that are produced through operation of theautomated banking machine. Such input devices may include, for example,sensors that are suitable for reading biometric inputs such asfingerprints. For example layers of suitable materials for sensing theridges of a user's fingerprints may be utilized to receive the uniquedata associated with contact with an authorized user's finger. Forexample in some arrangements if the user's finger is not currently incontact with the sensing area of a given article, the article will notoperate to communicate account data with transceivers that are connectedto a transaction system. Alternatively in other arrangements,programming associated with the article may be enabled to remainoperative to deliver account or other data for a period of time afterthe sensing area has been in contact with an authorized user'sfingerprint. In still other arrangements other types of sensing devicesmay be utilized for purposes of verifying codes, images, audible words,voice recognition or other things that are uniquely associated with auser for purposes of verifying that the article is in possession of andis being used by an authorized user to conduct transactions. Of coursethese approaches are exemplary and in other arrangements otherapproaches may be used.

In still other exemplary embodiments enhanced security for card basedtransactions may be accomplished by providing a user with a card, tokenor other device that may be used as an adjunct to their transaction cardwhen carrying out transactions. As previously discussed, enhancedsecurity for card based transactions is achieved by including a circuitincluding a microprocessor on or in a card, which circuit executesalgorithms and produces results which indicate that the card is genuine.Processor chips may be included on magnetic stripe cards for purposes ofverifying card genuineness and reducing the risk that the magneticstripe card has been counterfeited. In such arrangements the fact thatthe magnetic stripe of the card includes proper data identifying theuser and/or their account and the chip on the card, when properlysupplied with certain input signals and/or values produces a particularresult, shows that the card is genuine. However, providing users with acard with both a magnetic stripe and a chip may be more expensive orhave other drawbacks than providing to the user a card with a magneticstripe alone. This is particularly true if the user has already receiveda magnetic stripe card that does not include a processor chip.

In exemplary arrangements in order to provide enhanced security, theuser is provided with a separate article that can be used in conjunctionwith the magnetic stripe card. In some exemplary arrangements the useris provided with a card or token that includes a circuit including aprocessor programmed with suitable program instructions to produceresults that can be used to verify authenticity of a card. Suchprogrammed instructions may correspond to the algorithms developed byEMV Co. and which have been adopted by many transaction processors andcard issuers. Of course these approaches are exemplary and in otherembodiments other types of algorithms for card verification routines maybe utilized.

In some exemplary arrangements the circuitry embedded in the validationdevice may include wireless communication capabilities so as to enablenon-contact communication with a transaction terminal such as anautomated banking machine. Such communication may include radiofrequency communication of messages with a transceiver positioned in themachine. Such a transceiver may include an RF transceiver positionedwithin the card reading device of the banking machine that reads themagnetic stripe data on a card. Alternatively the transceiver may belocated in another location on the automated banking machine. Anadvantage of positioning the transceiver in the card reader is that itmay be used to communicate with circuits including microprocessors thatare embedded in cards that include a magnetic stripe, as well as withseparate verification articles that are separate from the magneticstripe card. For example in some arrangements the transceiver mayoperate to communicate with the verification article which is positionedin close proximity to the card slot of the automated banking machine. Insuch arrangement while the card bearing the magnetic stripe is receivedand read by the card reader, the verification article is placed in closeproximity to the card reader slot and communicates with the transceiverso as to receive the initiation messages and provide the results inresponse thereto so as to confirm the genuineness of the associatedmagnetic stripe card. Further in exemplary arrangements, theverification article is programmably changeable through communicationwith the transceiver so that in subsequent transactions the verificationresults data produced through operation of the circuit andmicroprocessor on the verification article corresponds to differentresults required to verify the identity of the magnetic stripe card insuch subsequent transactions.

In other arrangements the verification article may include other typesof devices. For example in some arrangements the verification articlemay comprise a wearable computer device which is worn by a user. In sucharrangements the programming associated with providing the results datato the transaction terminal which confirms the authenticity of themagnetic stripe card, is provided through communication with the RFtransceiver and processor circuitry included in the wearable computerarticle. The processor included in the wearable computer executes thealgorithms that provides the results which verify the authenticity ofthe card. Further one or more data stores associated with the wearablecomputer article enables the results to be modified and to correspond towhat is required to authenticate the card in subsequent transactions.Further in some exemplary arrangements the wearable computer article mayinclude data for multiple magnetic stripe cards so that each may beauthenticated through communication with the wearable article. As aresult the wearable computer device can serve as the verificationarticle for multiple magnetic stripe cards.

In still other exemplary arrangements a portable communication devicesuch as a smart phone may include programs that cause the at least oneprocessor in the smart phone to execute the verification algorithms thatreceive inputs and produce results that can be used to authenticate oneor more magnetic stripe cards. Such a smart phone may communicate viaradio frequency communication with a transceiver in an automated bankingmachine so as to receive the initiation data and provide the necessaryresults which help to prove the authenticity of the card. This may bedone via communication by a near field communication, Bluetooth or othersuitable communication type.

Thus these exemplary arrangements enable a magnetic stripe card thatdoes not include a processor thereon to nonetheless be verified as agenuine card by a user having possession of the verification articlewhich executes the verification algorithms and provides to a transactionterminal the one or more results that indicate that the card is genuine.Such approaches can be used to avoid the need to deploy magnetic stripecards that have included thereon processors which execute algorithms toverify the genuineness of the card. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In still other exemplary arrangements remote communications may beutilized for purposes of verifying the genuineness of a transaction cardsuch as a magnetic stripe card. In such exemplary arrangements, aportable device such as a smart phone with the ability to communicateover a wide area network may execute the algorithms that produce resultswhich demonstrate the genuineness of a card. These may include, forexample, the EMV algorithms or other algorithms that are normallyexecuted on a microprocessor chip that is resident on a card. Ratherthan providing short distance RF communication as in the previouslydescribed embodiment, such a smart phone or other device may provideother wide area network communications such as via cellular phone orwireless Internet connections to the transaction processing host thatprocesses the card data. The communication of the verification data viathe wide area network may be encrypted to further assure that suchcommunications are not fraudulent. Further in order to avoid the risk offraudulent communications, the location of the verification articlewhich comprises a portable wireless device such as the smart phone, canbe determined by the one or more computers associated with the systemvia global positioning system signals to verify that the device is inproximity to the transaction terminal. This may be done using featuressuch as those disclosed in U.S. Pat. Nos. 8,479,983; 8,505,814;8,540,147 and/or 8,561,889 the disclosures of each of which areincorporated herein by reference in their entirety.

Of course it should be understood that these approaches may be combinedor used in conjunction with other approaches that are described in theincorporated disclosures for purposes of verifying that a transactionthat a user is requesting at an automated banking machine or othertransaction terminal, is authorized by the user. Such approaches mayinclude, for example, approaches where the user is contacted via theirsmart phone or other mobile wireless device through an automated system,and requested to provide at least one input to verify that thetransaction should proceed. In such arrangements the portable wirelessdevice of the user may operate not only to provide a message to thesystem to indicate that the transaction should proceed, but may alsocommunicate with the system to receive the necessary initiation data andprovide the results which demonstrate that the user card being utilizedin connection with the transaction, is genuine. Such systems may utilizefeatures such as those described in U.S. Pat. No. 8,353,450 thedisclosure of which is incorporated herein by reference in its entirety.Of course these approaches are exemplary and in other arrangements otherapproaches may be used.

FIGS. 9-17 describe an alternative automated banking machine generallyindicated 143. Machine 143 is generally similar to machine 12 previouslydescribed except as otherwise indicated.

Machine 143 includes at least one recycler module generally indicated144. In exemplary embodiments the recycler may be a belt type recycler.Exemplary arrangements may include features like those described in U.S.Pat. Nos. 6,367,692; 6,367,691; and/or 6,264,102 the disclosures of eachof which are incorporated herein by reference in their entirety.

The exemplary embodiment further includes one or morecleaner/disinfecting devices generally indicated 146. In exemplaryembodiments the cleaner/disinfecting devices may include one or moreultraviolet radiation emitting devices. Such a device may be used in anultraviolet germicidal irradiation (UVGI) cleaning/disinfecting method.Such devices may be operative to emit UV-C or other radiation thatoperates to kill bacteria and viruses on surfaces, including thesurfaces of currency bills (which are alternatively referred to hereinas notes). In addition or in the alternative the cleaner/disinfectingdevices may also include devices that operate to scrub currency notesand to apply vacuum or other forces designed to cleanse the surfacesthereof of impurities and other unwanted substances. In somearrangements the cleaner/disinfecting devices may be usable to killdisease transmitting organisms that may reside on the surfaces ofcurrency bills. Alternatively or in addition in some arrangements suchcleaner/disinfecting devices may be usable to remove undesirablesubstances such as the residue of illegal drugs or contaminants or otherimpurities that may be present on bills, so that such substances cannotbe detected or absorbed through the skin by persons who receive andhandle such bills.

FIGS. 10-12 schematically show certain components of exemplary automatedbanking machine 143. In the exemplary arrangement the automated bankingmachine includes a lower chest portion 148. Chest portion 148 includesbill dispenser mechanisms 150. The exemplary bill dispenser mechanisms150 may operate to selectively dispense currency bills that are storedin the machine and deliver them to machine users through a presenter152. The bill dispenser mechanisms include features of the type shown inU.S. Pat. No. 7,780,073, the disclosure of which is incorporated hereinby reference in its entirety. In other exemplary arrangements the billdispenser mechanisms may include bill recycler mechanisms. These mayinclude mechanisms that both receive and store currency bills and alsoselectively dispense currency bills from storage. These currencyrecycler mechanisms may operate in the manner of incorporateddisclosures, including U.S. Pat. Nos. 6,331,000 and 8,356,748, thedisclosures of each of which are incorporated herein by reference intheir entirety. Further in some exemplary arrangements the automatedbanking machine may include some mechanisms that are suitable only fordispensing sheets from storage, while others are usable to both receiveand store as well as dispense sheets. The particular configurationutilized will depend on the particular requirements of the machine.Further in the exemplary arrangement the chest 148 houses the belt typerecycler mechanism of the exemplary arrangement 144. Of course it shouldbe understood that the exemplary embodiments include actuators,controllers, sensors and many other mechanisms not specifically shownthat enable the machine to carry out the functions that are hereinafterdescribed.

The exemplary automated banking machine 143 further includes a tophousing portion 154. The top housing portion 154 is positioned above thechest and houses the machine controller 156. The top housing 154 alsosupports the display 158 and the keypad 160. The exemplary top housingfurther supports the card reader 162 and the printer 164. The tophousing also may support additional devices such as function keys, inputdevices, output devices, transceivers and other suitable devices for theoperation of the machine.

In the exemplary arrangement the automated banking machine 143 isoperative to utilize the cleaner/disinfecting devices 146 to producecurrency bills that are generally free of bacteria, viruses and otherpotentially harmful items so as to reduce the risk of disease (or otherillnesses) that may occur from handling such items. This is done in theexemplary embodiment by operating the currency dispenser mechanismsresponsive to the at least one controller 156 when the machine is notperforming transactions for a user. This is done as represented in FIG.10 by the machine operating to move currency bills from at least onebill dispenser mechanism 150 into storage on the belt recycler 144.During the exemplary operation the cleaner/disinfecting devices operateso as to irradiate the bills before they are loaded onto storage in thebelt recycler device using UV-C emitters. In the exemplary arrangementthe bills moving into storage on the bill recycler move in supportedconnection with sets of transversely staggered belts. These belts whichmove the bills into engagement with a bill storage roll 147 of the beltrecycler are offset so that all of the surface areas of all the billsare irradiated.

Further, in some exemplary arrangements the belts which move thepreviously irradiated bills include impregnated silver or othersubstances that are operative to retard the growth of harmful bacteria.Similarly, the storage roll, tape, or other storage media can includesuch substances that will retard and/or prevent the growth ofundesirable bacteria and viruses on currency bills. In this way themachine operates to store a supply of clean, disinfected bills on thestorage roll 147 of the bill recycler 144. In alternative embodiments,cleaned or disinfected currency bills can be stored by the machine inone or more currency cassettes instead of (or in addition to) on thestorage roll 147. Such a currency cassette can be designated (orrecognized) by the controller (or the machine) to only contain (or hold)cleaned or disinfected currency bills.

Further in some exemplary arrangements the cleaning/disinfecting devicesmay operate to not only irradiate the bills but also to clean the billsso as to remove undesirable substances. This may include, for example,passing the bills through a cleaning mechanism such as sets of movingbrushes or other devices to loosen particulate materials or othermaterials that are adhering to the bills.

Further in exemplary arrangements a vacuum system may operate to pulland collect the impurities that are dislodged from the bills so as tocarry the impurities away from the bill surfaces. Such systems may beused for example to remove residues of narcotics that may be present onthe surfaces of bills that have been passed by persons who use or dealin illegal drugs. This may avoid, for example, persons receiving fromthe machine currency bills that may cause drug sniffing dogs or othernarcotics sensing systems to be triggered from the use of the particularbills. Of course it should be appreciated that additional or alternativemethods for cleansing bills and disinfecting bills may be used. This maydepend on the quality of the particular bills. For example in somecountries where plastic currency notes are used, certain solvent orother cleaning materials may be appropriate for use in connection withdisinfecting such bills that would not be appropriate for use inconnection with paper or cloth bills. Alternatively in some arrangementsheating or cooling devices may change the temperature of bills to killundesirable organisms. Of course the particular type ofcleaner/disinfecting devices included in the automated banking machinewill depend on a number of different circumstances that are involved andthe particular substances and organic material that is desired to beremoved or neutralized.

The exemplary embodiment of the automated banking machine may beoperated responsive to programmable instructions stored in the one ormore data stores associated with controller 156. The exemplary logicflow carried out by machine 143 is represented in FIGS. 13-17. Inoperation of the exemplary machine, the user may be prompted through aninitial display screen output to input their user card to the cardreader of the machine. This is represented in step 166. The controller156 in the machine operates to cause the card reader to read data fromthe card that is usable to identify the financial account. This isrepresented in the step 168. The controller then operates in accordancewith its programming to output through the display a prompt messagewhich instructs the user to input their personal identification number(PIN). This is represented in a step 170. The controller then operatesto receive the user input of the PIN through the keypad in a step 172.

The controller 156 then operates to cause the display to output at leastone screen that prompts the user to make a transaction selection. Thismay include a step that presents the user with a display prompt toselect a particular account on which their transaction is to beconducted, such as checking or savings. This is represented in a step174. For purposes of this example, it will be assumed that the userrequests the transaction that includes a dispense of cash from themachine. The controller operates to receive the user's input request toreceive cash through one or more input devices. This is represented in astep 176. Once the user has input their selection to receive a cashdispense, the controller operates to provide at least one output throughthe display that prompts the user to input the amount of cash they wishto have dispensed. This is represented in step 178. The controller thenoperates to receive the user input amount through a user input device onthe machine. This is represented in a step 180.

In the exemplary arrangement the program steps stored in the at leastone data store associated with controller 156 include data that enablesthe controller to output a display that prompts a user to provide atleast one input concerning whether they wish to receive clean anddisinfected cash from the machine. This is represented in a step 182.The machine also provides at least one output that indicates to a userthat a charge will be assessed for receiving clean and disinfected cashfrom the machine. This is represented in a step 184. Steps 182 and 184may be combined as a single step. In response to these outputs, themachine operates to receive at least one input from the user whichindicates whether they wish to receive clean and disinfected cash fromthe machine or not. The receipt of this indicating input is representedin the step 186.

After receiving the input from the user concerning whether they wish toreceive disinfected and cleaned cash, the at least one controller 156operates in accordance with its programming to send the transaction dataassociated with the user selected transaction to the remote hostcomputer. This is represented by step 188. The host computer of theexemplary embodiment operates in a manner like that previously describedto obtain a determination whether the transaction is authorized or not.It should be appreciated that in this exemplary embodiment the user hasselected to receive cleaned cash from the machine. The associatedsurcharge associated with receiving the cleaned cash will be included inthe amount to be assessed to a user's account if the transaction isapproved. If the user has not elected to receive cleaned and disinfectedcash from the machine, the surcharge is not included in the transactiondata sent to the host concerning the amount of the transaction. Ofcourse it should be understood that this approach is exemplary and otherapproaches, such as independently assessing the surcharge fee throughseparate machine communications with the host or another computer (e.g.,a remote server), may alternatively be used.

As represented in a step 190, the automated banking machine receives aresponse from the host which indicates whether the transaction isapproved or not approved. The at least one controller operatesresponsive to the received host message in a step 192. If thetransaction is not approved, the at least one controller 156 operates tocause the display to provide an output that the transaction has beendenied. This is represented in a step 194. The controller also operatesto return the user's card in a step 196 and returns the machine to await state for the next transaction.

If in step 192 the transaction is indicated to be approved, the at leastone controller 156 then makes a determination whether the user haselected to receive cleaned and disinfected cash from the machine. Thisis indicated in a step 198. If the user has not elected to receivecleaned and disinfected cash from the machine, the at least onecontroller operates in accordance with its programming to dispense thecash from the bill dispensing mechanisms 150. This cash has not beencleaned or disinfected through operation of the machine. This isrepresented by a step 200. The machine is operated to dispense the cashto the user and provide (e.g., print) a receipt as reflected in step202. The controller then operates the machine in step 204 to cause thecard reader to return the card to the user. The controller 156 thenoperates to notify the host that the cash was successfully dispensed tothe user so that the host or other connected server may assess theuser's account for the value of the cash dispensed. This is representedin a step 206. In the exemplary embodiment if the user has elected instep 198 to receive (high) quality cash (e.g., uncirculated, new,cleaned, and/or disinfected cash), then the at least one controlleroperates at step 212 (in FIG. 17) to cause the quality cash stored inthe recycler 144 to be dispensed to the user. This is accomplished bythe controller operating to remove bills from the storage roll of thebelt recycler 144 and to stack the clean bills in a stack 208 of thepresenter 152, as shown in FIG. 11. Once the stack of cleaned anddisinfected currency bills has been built in the presenter, the stack208 is moved through operation of the presenter through a bill outletopening 210 from which the bill stack may be taken by the user. This isrepresented in FIG. 12. In some exemplary embodiments the bill cleaningand disinfecting devices such as ultraviolet emitters or otherirradiation devices may operate during the time period when the billsare being delivered from the belt recycler 144 and to the presenter.Further UV disinfecting devices and other devices 146 may be operated invarious other locations in the machine to help assure that the billswhich have been disinfected do not attract contaminants as they aremoved from the belt recycler to the user. Of course this approach isexemplary and in other embodiments, other approaches may be used.

In an exemplary embodiment a clean currency bill has at least one higherfactor of cleanness relative to a non clean currency bill. For example,factors of bill cleanness can include newness, age, received a cleaningtreatment (e.g., radiation treated), timeliness of cleaning treatmentreceived, type of cleaning treatment received, material quality (e.g.,paper quality) of the bill, uncirculated versus circulated, etc. A nonclean currency bill can include for example a bill that has been used inpublic circulation, or a bill that has at least one defect detected by anote analyzer of the machine, or a bill that has not been treated by themachine, etc. A factor of cleanness can be deemed (or recognized ordesignated or determined) by at least one controller associated with themachine. Again, an exemplary automated banking machine can dispense bothclean and non clean currency bills (or notes) of the same denominationvalue.

As represented in FIG. 17, the machine operates to dispense the cleanedand/or disinfected cash to the user from the machine as represented instep 212. Thereafter the machine operates in accordance with itsprogramming to provide (e.g., print) a receipt for the user asrepresented in step 214. The at least one controller 156 then operatesto cause the card reader to return the card to the user in a step 216.The controller then operates to notify the host computer that the cashwas dispensed successfully from the machine. This is represented in astep 218. As previously explained, the messages from the automatedbanking machine cause the host to assess the user's account for thevalue of the cash dispensed including the surcharge for the userreceiving the cleaned and disinfected cash. Further in this exemplaryarrangement the at least one controller 156 operates in accordance withits programming to then (if determined necessary) replenish the supplyof cleaned and disinfected cash stored in the recycling mechanism 144.This is done in the manner previously described by moving currency billsfrom the dispensers 150 into the storage roll of the recycler 144. Thisis represented by a step 220. Of course it should be understood thatthese transaction flows are exemplary and in other automated bankingmachine arrangements, other or alternative approaches may be used forproviding a user with bills that have been cleansed of potentiallyharmful or undesirable impurities.

In other exemplary embodiments the machine 143 can operate to analyzethe quality of currency notes stored in the cash dispenser 150. Forexample, during a cash reloading process the cash dispenser 150 issupplied with currency notes. The added currency notes may be insidecurrency cassettes that get inserted into the cash dispenser 150. Thecontroller is programmed to cause notes to be removed from thesecurrency cassettes and then moved past a note analyzer, which canmeasure several factors of note quality. The note analyzer can be usedto determine whether a note is of high quality. For example, a highquality note may not need to be cleaned and/or disinfected. As a result,a high quality note can be directly placed (without cleaning) onto astorage roll of the recycler 144. Of course notes determined to be ofhigh quality may also be thoroughly cleaned before being stored onto astorage roll of the recycler 144.

In another exemplary embodiment a designated portion of the cashdispenser 150 includes currency cassettes that hold uncirculated (brandnew) currency notes. That is, these notes have never been in publiccirculation. Thus, these notes should be relatively free of any dirt,disease, germs, viruses, harmful bacteria, etc. The controller isoperable to maintain a real time count of the quantity of uncirculatednotes (and their respective denominations) that are available to bedispensed by the machine. Uncirculated notes can be dispensed to userfor an extra fee. The fee assessed to a user can vary. For example, theextra fee may be on a per note basis, a single fee for a specificquantity of notes (e.g., three notes), or a single fee for the entirecash dispense, etc. The uncirculated note fee may be waived for selectusers, such as VIP customers. Also, some machine users may be permittedthe option to withdraw more uncirculated notes than other users.

The uncirculated notes stored in the machine may also be of higherdenominational value than regular (unclean) notes stored in the machine.For example, an uncirculated note may be a $50 and/or a $100 bill,whereas a regular note may be a $20 bill. As can be appreciated, thearrangements allow a user of an automated banking machine (e.g., an ATM)the ability to easily obtain an uncirculated note, such for use as agift.

FIG. 24 shows a further exemplary programming logic flow that can becarried out by the machine 143. As can be seen, the machine can receivea user request for a cash withdrawal transaction which includes qualitycash and user acceptance of the extra quality cash fee. The machinesends a transaction authorization request to the host. The authorizationrequest includes the cash withdraw amount and the extra fee amount. Theamounts are presented to the host to be assessed against the user'saccount. The amounts may be combined by the machine into a single totalvalue that is presented to the host. Upon host approval of thetransaction, the machine operates to dispense the requested amount ofquality cash. Upon host disapproval of the transaction, the machineoperates to notify the user that the transaction request is denied,which may include ending the user session with the machine.

FIG. 25 shows a further exemplary programming logic flow that can becarried out by the machine 143. As can be seen, the machine candetermine the real time quantity and denomination of both clean(quality) and unclean (regular) notes currently available to bedispensed.

The machine can compare a requested amount of quality cash to the amountof quality cash currently available. If available, then the total amountof quality cash can be dispensed. Otherwise the user can be informedthat the requested amount of quality cash is unavailable. The logic flowmay then lead the user back to a screen where a smaller amount ofquality cash can be requested. For example, the machine may notify theuser of the total amount of quality cash available to the user. Themachine may also provide the user an option to mix regular notes withquality cash to meet the total cash withdrawal amount. The logic flowmay eventually lead the user back to a screen where a regular cashdispense can be requested.

The machine can also compare a requested amount of regular cash to theamount of regular cash currently available. If available, then the totalamount of regular cash can be dispensed. Otherwise the user can beinformed that the requested amount of regular cash is unavailable.Alternatively, the machine logic flow may try to meet the requestedtotal cash withdrawal amount by mixing the available regular notes withsome quality cash (e.g., a small amount, such as one note). The userwould not be charged a fee for receiving the quality cash.

FIG. 26 shows a further exemplary programming logic flow that can becarried out by the machine 143. As can be seen, the machine cancommunicate with a server to determine whether the current user is in aspecial program (e.g., a VIP user). The machine-to-server communicationis independent of the transaction host. That is, the machine can(directly) communicate with the server without involving the host in thecommunication path.

The machine sends user data (e.g., account data or other useridentifying data) to the server. The server operates to determinewhether the user data corresponds to VIP user data. The server canaccess a data store that includes the VIP user data for a plurality ofusers that are to automatically receive quality cash. Depending on theVIP program, the user may or may not be assessed the extra fee. As canbe seen, if the user is determined to be a VIP then the logic flowcauses the machine to bypass presenting the normal user option to selectpurchasing quality cash. The machine can send a transactionauthorization request to the host. Again, the machine has an ability tosend an authorization request that does not include the extra fee thatis normally assessed to a user account for receiving quality cash.

As can be seen, if the user is determined not to be a VIP then the logicflow causes the machine to present the user option to select purchasingquality cash. If the non VIP user selects to pay the fee to receivequality cash then the machine sends a transaction authorization requestto the host that includes the extra fee for receiving quality cash. Theextra fee can be assessed to the user's account through operation of thehost. As discussed in more detail later, in other embodiments the extrafee can be assessed by use of an independent server instead of the host.

FIG. 27 shows a further exemplary programming logic flow that can becarried out by the machine 143. As can be seen, the machine canindependently communicate with a server which can assess the extra feeassociated with a quality cash dispense. The charging of the extra feeamount can be a separate financial transaction that is carried outindependent of the cash withdrawal transaction. That is, the extra feetransaction can be performed independent of host involvement. The hostcan still handle (and approve) the cash withdrawal transaction.

As shown, user data (e.g., a user account number or data usable todetermine a user or an account) can be sent from the machine to theserver. The server can communicate with one or more financial computersto determine whether the user account can cover (is good for) the extrafee. The server may assess (debit or charge) the fee at this time in thelogic flow or may wait until later receiving a confirmation message fromthe machine that the amount of quality cash was properly dispensed fromthe machine. The server notifies the machine of the determination. Uponreceiving a fee approval message from the server, the machine operatesto carry out the dispense of the requested amount of quality cash.However, upon receiving a disapproval message from the server themachine operates to either end the user session or allow the user anoption to request a cash withdrawal involving regular cash. It should beunderstood the steps shown are exemplary, and in other embodiments otherarrangements of the steps can be used. For example, the machine may benotified of the server's determination regarding the extra feeassessment before the machine sends the transaction authorizationrequest message to the host for approval of the cash withdrawaltransaction. Again, the machine logic flow allows for both onetransaction portion carried out through machine-to-host communicationand another transaction portion carried out through machine-to-servercommunication. Each communication portion can be independent of theother.

It should be understood that the logic flows shown in FIGS. 24-27 areexemplary. That is, in other automated banking machine logic flowarrangements, other or alternative approaches or programming may be usedfor providing a user with quality cash. Likewise, other or alternativeapproaches or programming may be used for assessing (if necessary) theextra fee.

In alternative embodiments automated banking machines may accept and/ordispense other types of documents that may be desirably disinfected. Forexample, such machines may accept and disinfect financial checks,tickets, vouchers or other types of documents representative of value.Disinfecting such documents may reduce the risks of contacting virusesor bacteria by persons who subsequently receive or handle suchdocuments. Machines for handling such documents may include featureslike those described in the following U.S. patents, the disclosures ofeach of which are incorporated herein by reference in their entirety:U.S. Pat. Nos. 8,763,897; 8,695,874; 8,695,873; 8,701,985; 8,613,388;8,608,060; 8,608,055; 8,573,483; and 8,517,260.

FIGS. 18 and 19 represent the software and controller architectureassociated with an alternative exemplary automated banking machine. Ascan be appreciated in exemplary embodiments the controller includescircuitry which has one or more processors that execute computerexecutable instructions. Computer executable instructions correspondingto various types of computer programs are stored in the at least onedata store associated with the processor. These computer executableinstructions when executed cause the machine to operate to carry out thetransaction functions such as the functions previously described.

The exemplary computer executable instructions include a number ofdifferent software programs. These software programs as represented inFIG. 18 may include an operating system schematically indicated 222.Operating system 222 may include, for example, a Windows® operatingsystem, a Linux operating system, a Chrome operating system or othersuitable operating system for the particular environment in which theprocessor and associated software operate. The operating system alsocommunicates via a communications bus schematically indicated 224.Communications bus 224 may include a proprietary or non-proprietarycommunications bus such as for example a Universal Serial Buscommunications architecture that is suitable for communicating withtransaction function devices generally indicated 226, which are laterdescribed in detail. The exemplary software architecture includes aplurality of device drivers schematically indicated 228. Device drivers228 provide an electronic communication interface to the transactionfunction devices 226. In the exemplary arrangement specific devicedrivers for each particular transaction function device are included inthe software architecture.

In the exemplary arrangement the device drivers 228 are in operativecommunication with an XFS interface 230. The XFS interface may in someexemplary arrangements comprise a device interface layer that meets therequirements of the CEN Extensions for Financial Services Standard. ThisStandard provides a standardized software interface for numerousdifferent types of devices that are used in financial systems. Byincluding an XFS interface the exemplary software architecture providesa standardized software interface to which different software developersmay interface their machine operating software applications. This ispossible because the communications that are necessary to operate andreceive data from the devices are presented in a standardized formatwhich is available to application developers. Of course this approach isexemplary.

Further in the exemplary software architecture a software application232 is included. In the exemplary embodiment the software applicationincludes the computer executable instructions that are executed by theat least one processor of the at least one controller to cause themachine to carry out the transaction functions of the machine. Inexemplary arrangements the application software is what causes themachine to perform the necessary activities and to operate the variousdevices so as to enable the machine to carry out the various types offinancial transactions of which it is capable.

The exemplary software architecture further includes some other programsincluding security software programs represented 234. The securitysoftware 234 may include types of software that are suitable for theparticular type of automated banking machine. Such security software mayinclude, for example, firewall software that prevents the machine fromconnecting to unauthorized network addresses. Security software may alsoinclude software that is usable to identify viruses or other exploitsthat might execute on the machine. The security software may alsoinclude software that operates to enable security features of themachine and provide secure communications of the type hereinafterdescribed. The exemplary software architecture further includes certainutilities schematically represented 236. Utility software may include,for example, software that is needed to perform ancillary functionsassociated with the machine. This may include, for example, softwarethat keeps track of currency stored in the machine so that the machinecan report its current status to one or more remote computers. Theutility software may also include in some arrangements predictivemaintenance software which monitors aspects of machine operation andreports conditions that are likely to need attention in the near future.This may include potential device failures, replenishment of suppliessuch as paper, cash or other things that will likely need to be done tothe machine. Various types of utility software may be included in thesoftware of the machine depending on the particular type of automatedbanking machine involved.

As represented in FIG. 18, the exemplary transaction function devicescommunicate messages through the bus 224 with the controller thatincludes the representative software stack. The transaction functiondevices in the exemplary arrangement include a card reader 238. Anothertransaction function device of the exemplary arrangement includes anencrypting PIN pad 240. A thumbprint reader 242 which is an input deviceusable to receive identifying inputs from users is also included in thisexemplary arrangement. As schematically represented each of the devices238, 240 and 242 include one or more circuits which have respectiveprocessors and data stores. The circuits are capable of carrying outcomputer executable instructions stored in their respective data storesto enable these devices to not only carry out functions but also toprovide security features in a manner hereinafter discussed.

Another exemplary transaction function device that is included in thisautomated banking machine is a check scanner 244. Check scanner 244operates to produce images of financial checks that are received throughthe check scanner. The check scanner also includes circuitry whichincludes at least one processor and at least one data store asschematically represented. Check scanners and other devices used inexemplary arrangements may include features like those described in U.S.Pat. Nos. 8,418,916; 7,922,098; 7,837,096; 7,815,104; and/or 7,595,816the disclosures of each of which are incorporated herein by reference intheir entirety. In addition numerous other types of devices generallyreferred to as 246 may be included in the machine. Devices 246 may be ofthe types previously described such as displays, portals, outputdevices, input devices, sensing devices or other types of devices thatmay be included in the machine. Of course additional or differentdevices may be included in various embodiments.

Shown in FIG. 19, the software components referred to in FIG. 18 areexecuted in a controller 248 of the exemplary machine. The controllerincludes one or more circuits that include one or more data storesschematically indicated 250. Data store 250 of the exemplary embodimentmay include a processor controlled hard drive or other suitable datastorage unit that is controlled through operation of at least oneassociated processor. The control circuitry of the exemplary embodimentfurther includes at least one processor schematically indicated 252. Theprocessor 252 may include an Intel iCore processor or other suitableprocessor that is capable of executing the instructions stored in the atleast one data store.

The exemplary controller further includes a trusted platform module(TPM) schematically represented 254. The trusted platform module of theexemplary embodiment operates in accordance with programmed instructionsand provides a security device to reduce the risk of unauthorizeddevices operating in the machine. Further the trusted platform modulemay also be used to assure that the devices which operate in the machinehave not had their software programming modified from documented secureprogramming conditions. Such changes in software in the devices mayresult from attempts to conduct exploits on the machine. Further inexemplary arrangements the trusted platform module may operate toprovide secure communication between the controller and one or more ofthe transaction function devices in the machine. Exemplary embodimentsmay include features like those described in the following U.S. Patents,the disclosures of which are incorporated herein by reference in theirentirety: U.S. Pat. Nos. 8,474,698; 8,342,395; 7,988,039; 8,448,850;7,967,193; 8,100,323; 8,052,048; 8,052,047; 8,038,057; 7,988,039; and7,229,009. Of course it should be appreciated that although in someexemplary arrangements the trusted platform module is utilized toprovide secure communications and secure operation of the controller andthe associated devices, in other arrangements other hardware andsoftware may be utilized to accomplish these functions.

In exemplary embodiments the software architecture operates to avoidpossible security problems that might otherwise arise due to compliancewith the CEN XFS Standards, particularly security vulnerabilities arepossible due to the required standardized interface between theapplication and the device drivers, and which requires that certain datathat is received through or produced by the transaction function devicesmust be presented to the application so that the application can carryout the necessary transaction steps. Presenting the data to theapplication in the required standard and/or unencrypted format maypresent issues as criminals may be able to intercept the data within themachine at the standardized interface.

In the exemplary arrangement the devices that are enabled to providesecure communication between the devices and the controllers areoperated to prevent the transmission of sensitive data through the XFSdevice interface. This is accomplished by using substitute data whichcan then be correlated through operation of the originating device withthe actual data that is needed for the transaction. Such actual data maythen be sent from the device to the controller in a secure and encryptedmanner to avoid the unauthorized interception thereof.

In exemplary arrangements a card reader may read card data from themagnetic stripe of a user card. Alternatively or in addition the cardreader may operate to read data from a chip of a smart card. This may bedone via electrical contacts or via wireless communications. Such dataread through operation of the card reader may be caused to be stored inaccordance with the programming of the processor associated with thecircuitry of the card reader in the at least one data store of thecircuitry. In some exemplary arrangements the circuitry of the cardreader may operate to cause the card data and/or chip data to be storedin an encrypted manner.

Responsive to the programming of the circuitry of the card reader,instead of sending the card and/or chip data to the XFS interfacesoftware layer, the card reader operates to produce substitute data thatcan be correlated through operation of the circuitry in the card readerwith the actual read data from the card. Substitute data produced by thecard reader may then be utilized and passed through the XFS interface tothe application. The application may be configured to operate to thensecurely recover the actual card data at an appropriate place in thetransaction steps when such data is needed. Alternatively in somearrangements the security software included with the software installedon the machine may operate to determine when the card data is needed andtake the necessary steps to cause communication with the card reader torecover the actual data. In the exemplary arrangement when theapplication calls for the card data, the at least one controlleroperates in accordance with its programming to communicate securely withthe control circuitry in the card reader 238. The application and/or thesecurity software communicates the substitute data to the card readerthat then operates in accordance with its programming to recover theactual card data. Such card data can then be recovered from the datastore in the card reader and transmitted in a secure and encryptedmanner to the application layer or the security layer where the actualcard data needed for carrying out the transaction is resolved andutilized for purposes of further carrying out the transaction steps. Ascan be appreciated, this approach avoids passing the card and/or chipdata in a clear and unencrypted manner through the XFS interface.

Similar approaches may be utilized with certain secure input devicessuch as the exemplary thumbprint reader 242. Again the thumbprint readermay operate in accordance with its programmed control circuitry toprovide data that is a substitute for the actual data which is read fromthe user's thumbprint. Instead the substitute data is utilized by thethumbprint reader to recover the actual data. The controller operates inaccordance with the software programming to transfer the substitute datathrough the XFS software interface to the software application. Againthe security related software for the application operates to causecommunication with the thumbprint reader so that when the actual data isneeded, secure communication of the substitute data is sent to thethumbprint reader. The thumbprint reader then recovers the actual dataand transmits it in a secure and encrypted manner to the applicationwhich then may utilize it for purposes of carrying out the transaction.

Other exemplary embodiments may include secure operation of the checkscanner. The check scanner produces images of checks that are receivedthrough operation of the machine. These checks include private data suchas the check writer's account number, the check writer's name andaddress and other information that may present privacy concerns. Inexemplary arrangements to minimize the risks associated withtransmitting this data and/or images in the clear through a standardizedinterface, substitute data is generated through operation of thecircuitry in the check scanner. The substitute data is then correlatedwith stored data in the data store of the check scanner. Again as withthe other examples the substitute data is processed and passed throughthe software layers. The substitute data is utilized until the actualdata is needed by the application. At the point in the transaction wherethe actual data is required, secure communication of the substitute datato the check scanner is made. The substitute data is then utilized torecover the actual data which is then sent in an encrypted and secureformat to the application. The application can then use this data forpurposes of processing the transactions in a manner like that describedin the incorporated disclosures. As can be appreciated, numerousapplications of these approaches may be utilized in exemplaryembodiments to avoid having to store or to pass data in the clearbetween software applications at the XFS interface. Thus the exemplaryembodiment enables the configuration of software architectures inmachines in accordance with the XFS standards or other suitablestandards but avoids the possible security risks that compliance withsuch standards may impose. Of course it should be understood that theprinciples may be utilized in various types of automated banking machineenvironments to help in providing enhanced security.

FIG. 20 shows yet a further alternative embodiment of an automatedbanking machine generally indicated 256. Automated banking machine 256may include devices of the types previously described and may operate ina manner similar to that described in connection with automated bankingmachine 12 except as hereinafter specifically discussed. Automatedbanking machine 256 includes improved capabilities for operation of themachine by users that are blind or that have impaired vision. In orderto facilitate the operation of the machine by blind or other disabledusers, the exemplary machine 256 includes at least one sound outputdevice schematically indicated 258. Sound output device 258 may includedevices that are usable to produce audible outputs corresponding toinstructions for operation of the machine. Such sound outputs mayinclude in some exemplary embodiments a headphone jack, audio speakers,wireless transmitter or other suitable devices for providing signalswhich can be directly or indirectly audibly perceived by users and whichinstruct the user in how to operate the particular machine in theabsence of the ability to visually see the output or input devices ofthe machine. Exemplary machines may include features like thosedescribed in the following U.S. Patents, the disclosures of which areeach incorporated herein by reference in their entirety: U.S. Pat. Nos.8,308,057; 8,393,534; 8,469,266; and/or 7,988,041.

The exemplary automated banking machine further includes a userinterface having an imaging sensor schematically indicated 260. Inexemplary embodiments the imaging sensor 260 may include an active pixelsensor which is operative in accordance with its programming to capturenumerous images of adjacent structures in rapid succession so as todetermine the direction of movement of an adjacent object. Such imagingsensors may include photo diodes or complementary metal oxidesemiconductor (CMOS) sensors that are operative to detect movement of anadjacent structure. Such imaging sensors and related circuitry which areused in optical computer mice, cameras and other types of devices may beoperative to analyze the successive images that are captured from anobject and to compare the relative movement between successive images.This enables determining the amount and direction of movement of theadjacent object. This enables providing selected types of inputs to themachine through the detected movement by the imaging sensor. Of courseit should be understood that while only one imaging sensor is discussed,multiple imaging sensors may also be utilized for purposes ofdetermining movement and resolving inputs.

In the exemplary arrangement, the one or more imaging sensors 250 isutilized to detect movement of a machine user's body part such as ahand, finger or other body surface to provide inputs to the machine. Forexample as represented in FIG. 21, the imaging sensor 260 may be placedadjacent to the keypad or other input devices of the machine. Asrepresented in FIG. 21, the user interface of the automated bankingmachine includes a sound output device in the form of a headphone jack.In the exemplary embodiment the at least one controller operates inaccordance with its programming to provide output instructions to theuser and to receive inputs based on movement of a user's hand adjacentto the imaging sensor.

For example in the exemplary arrangement shown in FIG. 21, thecontroller may operate in accordance with its programming and a suitableinterface circuit to detect the insertion of a headphone connector intothe headphone jack 258. Responsive to detecting this connection, thecontroller may provide outputs that produce audible signals in theheadphones that advise the user to move their hand in an area of themachine to the right of the headphone jack. The exemplary controller maythen operate in accordance with its programmed instructions to produceaudible outputs that advise the user to move their hand to the right ifthey wish to increase headphone volume or to the left if they wish todecrease volume. The controller may then sense movement of the user'shand to the right or the left through operation of the imaging sensor260 and cause the associated circuitry to adjust the volume outputaccordingly.

In an exemplary arrangement the user may then be instructed to movetheir hand in a direction away from the machine if the wish to blank thedisplay of the machine during their transaction. The controller uponsensing through operation of the imaging sensor that the user has movedtheir hand in a direction away from the machine, operates to cause thedisplay to go blank or otherwise display indicia that is not related tothe user's transaction. If the user's hand is not sensed as moving awayfrom the machine, the display continues to operate in a manner similarto that utilized when the machine is operated by users with normalvision.

In the exemplary arrangement the controller may operate in accordancewith its programming to then provide audible outputs to the userindicating that the card accepting slot is positioned approximately teninches to the right, and two inches above where the user's hand iscurrently sensed. The user may then move their hand to the card readerslot and input their card. The controller then operates in accordancewith its programming to sense that the card has been inserted and thenoperate the card reader to read the data from the user's card.

Upon determining that the user's card has been read, the controller mayoperate in accordance with its programming to indicate to the user thatthey can input their PIN number through a keypad that is located eightinches to the right of the headphone jack. The user may then locate thekeys on the keypad to provide their PIN input. Generally one or morekeys of the keypad may include an indicator so that the user can locatea particular key. For example in some arrangements the “5” key of thekeypad may include a raised dimple which facilitates a blind userfinding the central 5 key of the keypad. The user may then input theirPIN in this manner.

Alternatively in some arrangements the programming of the controller maycause audible outputs that instruct the user to move their hand incertain ways to provide a selected PIN input. For example the controllermay operate to advise the user to move their hand in the area of thesensor to the left and then to the right to start audible outputscorresponding to a series of digits. The user may be instructed to movetheir hand toward the machine when they hear a digit that they wish toinput. The controller may then operate in accordance with itsprogramming to provide audible outputs of the series of numerals untilthe user moves their hand in the manner which indicates that they haveselected that particular output digit. The user may then be advised thatthey have selected the particular digit and to move their hand in acertain way if they would like to select a second digit by having themachine output a series of numerals and to again move their hand in aparticular way when they want to select a second digit of their PIN.This process may be repeated until the user has provided all of theirPIN digit inputs. Of course it should be understood that this approachis exemplary and in other embodiments, other approaches may be used.

In exemplary arrangements the controller may then operate in accordancewith its programming to provide audible outputs to the user to have themselect a particular type of transaction. This may be done in somearrangements such as those described in the incorporated disclosures byhaving the user provide inputs through the keypad. In this manner theuser may select the type of transaction they wish to conduct in themachine. For example the user may provide key inputs to select balanceinquiry, a cash withdrawal, a deposit transaction, a check acceptingtransaction or other transactions that are available through operationof the machine. The user can then provide the appropriate key inputs toselect their desired transaction.

Alternatively in some embodiments the controller 176 may operate inaccordance with its associated programming to instruct the user to movetheir hand in certain ways adjacent to the imaging sensor to makeselections. For example the user may be instructed to move their hand tothe left to select a balance inquiry and to the right to select a cashwithdrawal. A user may be further instructed to move their hand towardthe machine to select a deposit transaction and away from the machine toselect a check cashing transaction. Further for additional transactions,additional types of movements or series of movements may be indicatedthrough audible instructions to the user so that the user may selecttheir transaction by moving their hand a certain way or thorough aseries of movements. After the controller has determined that the userhas moved their hand a certain way, the user may be given the option toindicate that they agree that that is their selected transaction bymoving their hand one way, or to reset and select a differenttransaction by moving their hand an opposite way. Of course theseapproaches are exemplary.

In exemplary embodiments the user once they have selected a transactiontype, is instructed to enter an amount associated with the transaction.For example in cases of cash withdrawal, the user may be instructed toenter the amount of cash they wish to receive through the keypad. Theuser may be instructed in the manner of the incorporated disclosures toprovide their input amount through the keypad and then provide a furtherinput confirming the amount. Alternatively the user may be instructed toprovide an input through the keypad the amount associated with adeposit, a check cashing transaction or other transaction that involvesa financial transfer. Audible outputs produced through operation of theexemplary controller may advise the user of the selected input and askthem to provide a further input to confirm the amount selected.

Alternatively in other arrangements the controller may operate inaccordance with its programming to cause audible outputs to be presentedthat enable the user to select an amount associated with theirtransaction through hand movements adjacent to the imaging sensor. Forexample the audible outputs may instruct the user to move their hand acertain way to indicate the first digit of the amount that they wish toreceive. As the user moves their hand in the particular directioninstructed, the amount may increment to the desired first digit. Whenthe user stops moving their hand, the machine controller may operate inaccordance with its programming to indicate that the user has selectedthe first digit. Thereafter the controller may operate in accordancewith its programming to instruct the user to select a second digit. Thecontroller may operate in this manner until the user has selected all ofthe digits of their selected transaction through hand movements. Furtheronce the digits have been selected, the controller may prompt the userto move their hand adjacent to the imaging sensor in a certain way toconfirm the amount that they have selected. In exemplary embodiments thecontroller may operate in accordance with its programming after it hasreceived the necessary transaction data to instruct the user to provideat least one input which is indicative that the user wants to proceedwith the transaction. The controller may operate in accordance with itsprogramming to indicate the transaction type and amount that the userhas selected. The user may then be instructed to provide a particularinput to confirm the transaction should proceed. This may be done forexample by the user providing at least one input through an input devicesuch as the keypad. Alternatively the at least one controller mayoperate to advise the user to move their hand in a certain way adjacentto the imaging sensor in order to indicate that they wish to proceedwith the transaction.

Once the user has provided the confirming input, the automated bankingmachine operates to then provide the particular transaction functionsthrough operation of the devices. For example if a user has requested acash withdrawal transaction, the controller operates the cash dispenserto make the cash available to the user. The controller then operates toindicate through audible outputs to the user where to place their handto take the cash. For example the controller may indicate to the userthat they may take the cash through the cash dispensing slot that islocated six inches to the right and five inches below the headphonejack.

In exemplary arrangements the controller may then operate after the userhas taken their cash to ask whether they wish to conduct anothertransaction or end the session. Again in exemplary embodiments thecontroller may operate in accordance with its programming to acceptinputs either through the keypad or other input devices or by sensinghand movements through the imaging sensor. If a user requests anothertransaction, the controller may operate in accordance with itsprogramming to instruct the user how to provide the inputs to identifythe transaction type and the amount. Alternatively if the user wishes toterminate the transaction session, the controller will provide audibleoutputs to indicate to the user where to position their hand to taketheir card, printed receipt and to perform other actions the user shouldtake. As can be appreciated, exemplary embodiments may enable theoperation of the machine through use of keypads or alternatively imagingsensors of the type described. In this way users who wish to utilizehand movements to provide inputs may do so. An advantage of utilizinghand movements for providing machine inputs is that the user does nottouch the keys of the keypad. This helps to avoid the risk ofunauthorized persons intercepting the user's confidential PIN or otherinputs. Further utilizing the imaging sensor to receive inputs alsohelps to reduce the risk that unauthorized persons can determine thetype and amount of transaction that a blind user may be requesting atthe automated banking machine. Additional benefits may be obtaineddepending on the particular type of transaction involved.

Other exemplary arrangements utilizing imaging sensors are representedby the alternative automated banking machine user interface representedin FIG. 22. In this alternative arrangement an imaging sensor 260 ispositioned on a side surface which extends generally outward from thefascia of the automated banking machine. A speaker opening 262 ispositioned adjacent to the imaging sensor 260. The speaker opening isassociated with an audio speaker that produces outputs that can beperceived by a user by placing their ear in generally close proximitywith the speaker opening.

This exemplary arrangement may be utilized to enable a user to operatethe machine through voice guidance without the need for having aheadphone connector. In this exemplary arrangement the user may placetheir ear in generally close relation with the speaker opening 262.Instructions provided responsive to operation of the controller mayinstruct the user to move their head in certain ways so as to provideinputs, select transaction types and to select amounts. By the usermoving their head in the user desired manner, various inputs may beprovided to the machine. In exemplary arrangements the user's ear may bepositioned in generally close proximity to the speaker opening. The riskof interception of any of the audible outputs to the user may be reducedto the same level as would be achieved through the use of headphones.Further in this exemplary arrangement the user could avoid generallyhaving contact with keys or other input devices of the machine in orderto achieve operation.

A further alternative arrangement is represented by the automatedbanking machine fascia shown in FIG. 23. In this exemplary arrangementthree spaced imaging sensors 264, 266 and 268 are arranged in variouspositions of an outward vertically extending fascia wall of the machine.Each of the imaging sensors is associated with a respective adjacentspeaker opening 270, 272 and 274.

As with the previously described arrangement this exemplary arrangementis configured to provide audible instructions through the speakeropenings and to receive user inputs responsive to movement of the user'sadjacent head or ear by an imaging sensor. In this exemplary arrangementby having multiple spaced imaging sensors and speaker openings, users ofvarious stature may operate the machine by placing their head and earadjacent to the sensor and speaker opening that is the most convenientfor them. The exemplary controller may operate in accordance with itsprogramming to sense the user's ear in proximity to the selected one ofthe imaging sensors and to provide the audible outputs through theassociated speaker opening. In some exemplary arrangements the otherspeaker openings operate to provide masking sounds while the selectedspeaker opening is providing audible instructions so as to reduce therisk of unauthorized reception of instructions to the user. As with theother described arrangements the user may provide inputs including PINdata, transaction selection data, amounts and confirming inputs throughmovement in response to audible prompts that are generated throughoperation of the controller. Such a configuration may enable numerousdifferent types of users to operate the machine in a suitable securemanner. Of course it should be understood that these arrangements ofimaging sensors and audio output devices are exemplary and in otherembodiments other approaches and arrangements may be used.

FIG. 28 is a schematic view of an alternative automated banking machineand system which operates to identify circumstances which correspond toinstallation of a card skimming device or other illegal interceptiondevice on the automated banking machine. The system 276 includesautomated banking machines 278, 280 and 282. The machines are inoperative connection with one or more networks 284. The one or morenetworks are in operative communication with one or more remotecomputers such as servers schematically indicated 286. Communicationsbetween the automated banking machines and the servers are operative tocause financial transfers in a manner similar to that previouslydiscussed in connection with other embodiments.

Automated banking machine 278 includes a reader 288. Reader 288 mayinclude a contact or contactless card reader or other suitable readingdevice for reading data bearing records. Records from which datacorresponding to financial accounts may be read are schematicallyrepresented by a card 290. Exemplary reader 288 includes or is inoperative connection with at least one microprocessor 292 which is inoperative connection with at least one data store 294.

Automated banking machine 278 further includes a terminal controller 296which may be similar to the terminal controllers previously discussed.The terminal controller is in operative connection with one or more datastores 298 which data store is operative to hold executableinstructions, data and other information used by the machine inconnection with carrying out transactions.

The exemplary machine further includes transaction function devicesgenerally referred to as 300. The transaction function devices mayinclude devices such as those previously discussed which are suited tocarrying out the transaction types for which the machine is adapted.Such devices may include cash acceptors, check acceptors, cashdispensers, input devices, output devices, wireless communicationdevices and other devices suitable for carrying out transactions. Theexemplary automated banking machine further includes an interface 302which is suitable for communicating with the network or other connectedsystems. The exemplary machine further is in operative connection withimage capture devices 304 which may include cameras or other systemswhich are suitable for capturing images or other data in response toinstructions from the terminal controller.

In the exemplary embodiment the automated banking machine is operativeto identify conditions which likely correspond to attempts to install anunauthorized card reading device on or in connection with the reader 288of the machine. A criminal's attempt to install such a unauthorizedreading device may utilize a card type that is not suitable forconducting transactions with the automated banking machine, to testwhether the unauthorized device interferes with the operation of thecard reader and to determine that data read from the card can beaccurately captured via the illegal device. In many circumstances thecard would be inserted into the card reader one or more times toaccomplish this testing. Further if the card is operatively engaged withthe reader for purposes of criminal testing activities, the criminalwill not generally attempt a transaction using the card. As a resultoften the programming of the terminal controller will not result in anymessages being sent to the network in connection with the criminaltesting activity because no transaction is requested.

In the exemplary arrangement provisions are made so that card readingactivity that may correspond to such criminal testing is identified. Theexemplary program logic flow associated with an embodiment of such asystem is shown in FIG. 29. The exemplary program logic flow may becarried out by the microprocessor 292 associated with the card reader,the terminal controller 296 or may be shared between the two components.

In the exemplary arrangement the reader 288 operates to accept and reada card. This is represented by a step 306. The card reader 288 operatesto read the data from the card. As can be appreciated, the data readfrom the card is indicative of whether the card is a financial card suchas a credit or debit card or an alternative type of card such as acredit card size non-financial card. These cards may include librarycards, transit cards, insurance cards, loyalty program cards and thelike. In the exemplary embodiment in a step 308 microprocessor 292determines if the card data corresponds to what is proper for afinancial transaction. This may include analysis of the types of dataavailable from the card. In exemplary arrangements the microprocessor292 determines whether the card presented is a proper card type based ondata stored in the data store 294. If the card data does not correspondto the type of card that could be used to carry out a transactionthrough operation of the machine, a check is conducted in the step 310on whether the card data that has been read corresponds to suspect cardsthat have been previously been identified as possibly being used bycriminals to test the installation of unauthorized interception devices.If a card is not identified as a previously suspected card in step 312,the microprocessor 292 sends a message to cause the machine to carry outnormal operation as reflected in step 316.

If the card is identified as one that has already been identified assuspect in a step 312, the microprocessor 292 operates to send a noticeto the terminal controller 396 which operates in accordance with itsprogramming to carry out steps that are appropriate for purposes ofresponding to the probable criminal activity. This is represented in astep 314. In such circumstances, the terminal controller 296 may operateto cause the image capture devices 304 to capture images of theindividuals who may be attempting to use such an improper card in themachine. In addition, the terminal controller may operate in accordancewith its programming to send a notice through the network 284 to one ormore servers 286 or other appropriate computers to indicate the probablecriminal activity. Such notices may then be responded to by notifyingsecurity personnel or other appropriate individuals to proceed to themachine to investigate a possible criminal activity. Alternatively or inaddition, the terminal controller may operate to capture the card,suspend operation of the machine and also take other steps as may beappropriate based on the programming of the terminal controller. Itshould be understood that these steps are exemplary and in otherarrangements, other or different steps may be taken.

Alternatively if in step 308 the card data read through operation of thereader is determined to correspond to a proper card type that can beused with the machine, the microprocessor 292 in conjunction with theterminal controller 296 are operative at a step 218 to determine if theuser cancelled the transaction. This is represented in step 318.Cancelling the transaction may often correspond to the criminal testingthe movement of the card and for communication of card data from theunauthorized card reader. If the transaction is cancelled, the card datais stored through operation of the microprocessor 292 in data store 294.This is represented in a step 320.

If the automated banking machine is not operated to cancel thetransaction, the terminal controller operates in the usual manner tosubmit a transaction request as represented in step 322. As can beappreciated, the transaction request will be routed through the one ormore networks 284 to the appropriate remote server 286 that will eitherauthorize or deny the transaction. One or more messages is then returnedby the server to indicate if the transaction is authorized. If themessage returned through the network indicates that the transaction isdenied due to an invalid card, the terminal controller 296 andmicroprocessor 292 identify this condition as represented in a step 324.The machine then operates in accordance with its programming to storethe card data in the data store 294 as represented in a step 326.

In exemplary arrangements the terminal controller 296 operates on aperiodic basis or in response to messages received through the networkto send updates concerning the card data associated with suspect cardsthat have been attempted to be used in the machine. Data correspondingto suspect cards is then sent from the machine to one or more remoteservers. The one or more remote servers may then operate in accordancewith their programming to cause the data concerning suspect cards to bedistributed to other automated banking machines such as machines 280 and282 in FIG. 28 so that all the machines have the updated suspect carddata. This way if attempts are detected to use the same card forpurposes of testing a skimmer device or other similar interceptiondevice at another one of the automated banking machines, this conditionmay be detected.

Further in exemplary arrangements, the remote server may also analyzethe data to see if the same suspect card data has been presented atmultiple machines. Such card data may not only be stored at each of themachines, but may also be associated with a special status so thatfurther steps are taken when such a card is read at a machine. Thesesteps may include, for example, having the machine immediately givenotice to law enforcement authorities, security personnel or otherentities that need to be notified of illegal activities. Alternativelyor in addition in the event that the machine is in a vestibule or otherenclosure, the enclosure may be immediately locked so that the criminalwithin the enclosure cannot escape before law enforcement authoritiesarrive. Alternative or additional steps may further be taken dependingon programming of the automated banking machine and the system in whichit is used.

FIG. 30 shows a schematic view of program logic carried out through anexemplary automated banking machine that may be similar to thosepreviously described. The exemplary automated banking machine isoperative to provide users with financial checks. Such financial checksmay include printed paper checks. Alternatively in some arrangements theautomated banking machine may be operative to provide electronicrepresentations of checks that can be processed as checks. In stillother arrangements, electronic tokens or tangible items may be providedto a user in connection with exemplary transactions.

The exemplary program logic flow which may be carried out by one or moreterminal controllers in an automated banking machine may be utilized incircumstances where a merchant or other vendor wishes to provide itemsof value such as goods, services or cash to a user. Such a system may beemployed in some circumstances where the merchant and/or user wishes toavoid the transaction fees that may be associated with withdrawing cashor transferring value via communication with a transaction processingnetwork. As can be appreciated in some arrangements, significanttransaction surcharges are applied to cash withdrawal transactions oncertain machines. Further certain network rules may cause the liabilityfor fraudulent transactions to shift from an entity issuing a credit ordebit card to a person accepting such a card if a transaction isconducted at a device or a system does not include all of the securityfeatures that the card issuer has indicated are required in order forthe card issuer to have liability. An automated banking machine carryingout transaction logic as represented schematically in FIG. 30 may insome embodiments avoid such a liability shift. Of course it should beunderstood that these approaches are exemplary and the representedfeatures may be used in other types of systems as well.

In the exemplary arrangement the automated banking machine executesprogram instructions to receive from a user data bearing records orother information that is suitable to identify the user or an account.This is represented in a step 328. Such activity may include in somearrangements the reading of account identifying data from a user card,the receipt of a PIN number, the reading of biometric data or other datathrough input devices on the machine so as to identify the user and/ortheir account. The automated banking machine then operates in accordancewith its programming to present the user with transaction selectionoptions, and the user provides a transaction selection input asrepresented in a step 330. In the exemplary arrangement the user mayelect to receive value such as cash or goods or services through themachine by making payment by check. If the user wishes to make such atransaction selection, they may do so by providing the correspondingtransaction selection input. The user also is prompted through operationof the machine to indicate the amount associated with their transaction.This is represented in a step 332. In an exemplary arrangement if theuser has selected a check transaction, the user will be prompted toprovide inputs corresponding to the amount of the check that they wishto have accepted by the merchant or other associated entity.

In a step 334, the terminal controller or other processor operates todetermine if a check transaction has been selected by the machine user.If the machine user has not selected a check transaction, and has chosena cash withdrawal transaction, cash acceptance transaction or othertransaction that can be carried out through operation of the machine,the terminal controller operates in accordance with its programming tocarry out the transaction steps associated with those othertransactions. This is represented in a step 336.

If the user of the automated banking machine has selected a checktransaction, the terminal controller operates in accordance with itsprogramming to automatically formulate an account balance inquirytransaction. This account balance inquiry transaction is operative tocause the machine to communicate through one or more associated networkswith computers to determine if the account corresponding to the user isvalid and also whether the account has a sufficient balance and/orstatus so as to allow the check transaction in the selected amount to becarried out. In some exemplary arrangements the formatted transactionmessages may be comparable to those carried out in response to userinputs making an account balance inquiry to check the amount of money intheir account. Alternatively in other arrangements, the formulatedtransaction inquiry may include messages that inquire as to otherfeatures such as whether the account is in good standing, includesoverdraft protection, qualifies for cash advances or other informationwhich is appropriate for determining whether the check transactionshould be carried out. The nature of the formulated inquiry messageswill depend on the nature of the account on which a check has beenrequested to be drawn. These steps as carried out through operation ofthe terminal controller and associated networks is representedschematically by step 338.

If the account is determined not to have a sufficient balance orotherwise qualify for writing a check in the amount requested by theuser, a determination is made at step 340 that the transaction could notbe carried out. The user is so informed as represented in a step 342.This step may include, for example, the terminal controller operating inaccordance with its programming to inform the user that the transactioncannot be carried out. Further in some arrangements the terminalcontroller may operate to return the user's card or otherwise close thetransaction.

If in step 340 it is determined that the user's account balance issufficient for writing a check in the amount, the automated bankingmachine operates in accordance with its programming to take steps toclose the network session which was involved in making thedetermination. This is represented by step 344. In some arrangements,step 344 may include additional communications between the automatedbanking machine and other computers in the network such as obtainingappropriate information from the network about the user's account whichmay be utilized by the automated banking machine in producing afinancial check in the amount requested by the user. The informationobtained may include data that cannot be derived from the data bearingrecord such as the user card or other information that the user hasinput to the machine in connection with requesting the transaction,which information is necessary for purposes of producing the financialcheck. Alternatively or in addition, the automated banking machine mayin step 344, communicate with computers in multiple systems which canderive the data necessary for purposes of producing the check. This mayinclude, for example, obtaining information on bank identificationnumbers, routing numbers or any other information that may be requiredto produce the check such as for example, the data that appears in themicr line of a financial check indicating the account and routing dataused for processing the check. Of course these approaches are exemplaryand the exact approaches used will depend on the particular system.

The terminal controller of the exemplary arrangement then operates in astep 346 to produce a printed financial check in the amount requested bythe user. The printed financial check will include the data necessaryfor processing and may include all of the data normally found on apreprinted check. Alternatively or in addition, the check may includeextended micr line data or other data so as to cause the amount of thecheck to be routed and paid to the account of the merchant or otherperson who is to receive the amount. Further in the exemplary embodimentthe terminal controller operates in a step 348 to print an accountbalance statement. The account balance statement of the exemplaryarrangement may include information such as the user's account data andtheir account balance. Further in exemplary arrangements, the accountbalance statement may include information on whether the user accounthas overdraft protection, certain statuses or other information that mayprovide the merchant with assurance that they may accept the check. Ofcourse it should be understood that this logic flow is exemplary and inother exemplary arrangements other or alternative approaches andadditional or different steps may be utilized.

The printed financial check and account balance statement may be takenby the machine user from the machine and presented to a merchant at atransaction location who can provide value in exchange for the check. Insome exemplary arrangements the merchant station may include a terminalor other device for accessing information that enables the merchant toverify that the check has been issued by the machine and that it isunaltered. This may include, for example, a merchant terminalcommunicating through a local network with the banking machine orthrough a wide area network with the systems that provided informationon the account balance or other authorization to issue the check. Themerchant may also physically or electronically review the accountbalance statement.

In exemplary arrangements if the merchant finds that everything is inorder, the merchant may accept the check and provide the user with valuefor the check in the form of cash, goods or other agreed value. Themerchant may then scan the check using a scanner connected to themerchant terminal or other system commonly employed by the merchant toscan received checks issued by the automated banking machine as well aspreprinted checks. The merchant may then carry out the necessary stepsto have the funds represented by the check deposited in the merchant'saccount by a financial institution or other financial services providerassociated with the merchant's account.

In other exemplary arrangements, the automated banking machine mayoperate in alternative ways to provide check data or items to a userthat the user can exchange for value. For example in some exemplaryarrangements, the automated banking machine may operate to securelycommunicate with a user's portable wireless device. The datacommunicated to the user's portable device may correspond to value foran electronic check. For example in some arrangements the data maycorrespond to a visual image of a check that a user may present on thedisplay of a smart phone to the merchant's system. Alternatively or inaddition, the automated banking machine may provide the user with anelectronic token or other data which can be stored in the memory of asmart phone and then communicated to the merchant's system in exchangefor receiving value. In still other alternative arrangements, theautomated banking machine may issue a stored value card or othertangible item which is representative of the value that the user wishesto receive. The tangible item may then be taken to a merchant stationand the value transferred in the manner of a check or similar article sothe merchant can obtain a deposit of the funds in the merchant'saccount. The merchant may then provide inputs to a merchant terminal ortake other steps to authorize the use of the card. The user can then usethe card for purposes of obtaining goods or services from the merchantor other affiliated merchants which accept the card. Of course theseapproaches are exemplary of many different approaches that may be used.

In some exemplary arrangements the automated banking machine may beoperative to cause one or more transaction messages to be communicatedwhich place a hold on the user's account for an amount corresponding tothe check. The hold can be maintained for a sufficient period of time toallow the merchant to scan and present the check to a check paymentprocessing system. This may be done in a manner similar to that used forcertain credit and debit card transactions where the actual charges thatthe user will incur are unknown. For example, in some arrangements thehold for the amount could be placed on the user's account for a periodof one day and then automatically lifted through operation of thesystem. This might be done, for example, by having the machine performin accordance with its programming on a timed basis to submit messagesto the network that cause a reversal of the initial hold transaction.Alternatively or in addition, communication with a merchant terminalwhich would show submission of the check for processing would then causethe automated banking machine to operate so as to send transactionreversal messages that release the hold on the user's account. Furtherit should be understood that these approaches may be used in connectionwith the other types of articles or data discussed herein whichrepresent value and which can be received from the machine. Of coursethese approaches are exemplary and in other arrangements, otherapproaches may be used.

FIGS. 31-34 show schematically program logic carried out throughoperation of one or more devices in connection with providing a userwith cash or other value from an automated banking machine or otherfulfillment point. In this exemplary arrangement the user may request atransaction using a mobile device such as a smart phone or wearablecomputer of the types previously discussed. The exemplary arrangement isfurther usable to assist the user in locating a fulfillment point thatcan complete the user's transaction which involves a transfer of value.

As represented in FIG. 31, a user who desires to receive cash may, forexample, provide a transaction request input through an input deviceassociated with a mobile device. The mobile device may include a smartphone which includes a program such as an application for receiving sucha transaction request. Alternatively other arrangements may involve awearable computer, such as in the form of glasses like those previouslydiscussed, wallets, watches or other articles which include programmingfor receiving such a request. This transaction request is represented bya step 350. In response to receiving the request, the mobile deviceoperates in accordance with its programming to transmit information thatis appropriate for purposes of conveying a request for the transactionthat the user wishes to conduct to a remote transaction system. Forexample the mobile device may submit messages including an identifyingvalue associated with the user's account, the amount of value such ascash the user wishes to receive, and data corresponding to the user'scurrent location, to the transaction system. It should be understoodthat in some exemplary arrangements the account identification mayinclude an account number. Alternatively the identification data mayinclude token data which can be used by the transaction system to derivedata corresponding to a user account number or other information thatcan be associated with a user account. The use of a token instead of anactual account number may be used to enhance security associated withthe system. The transmission of the data concerning the user'stransaction request to the system from the mobile device is representedin a step 352.

The data transmitted in step 352 along with other data which istransmitted from the mobile device for purposes of requesting thetransaction is received in an exemplary arrangement wirelessly by theremote transaction system. The exemplary transaction system includes oneor more servers and data stores that are capable of validating thetransaction data and carrying out financial transfers. Thecommunications to the transaction system may include communications viacellular phone communications, wireless broadband or other suitablemethods for communicating the data between the mobile wireless deviceand transaction system.

In a step represented 354 the transaction system receives theidentifying data and other information from the mobile device. Thesystem then operates in accordance with its programming to validate thatthe user identification data and other information that is transmittedcorresponds to a valid user and/or account which can be used to carryout the transaction as requested by the user. The system 354 operates inaccordance with its programming to create a transaction identifier (ID)for the particular transaction is represented in a step 356. The systemthen further operates in accordance with its programming to determinelocations where the user's requested transaction can be fulfilled. Inthe exemplary embodiment the transaction system uses the locationinformation received from the user to determine the fulfillment pointsthat are in proximity to the user that can complete the transaction theuser has requested. This is done based on stored data that thetransaction system can access as to the locations of automated bankingmachines, merchant facilities or other systems that can fulfill the userrequest. This is represented in a step 358. The transaction system thenoperates in accordance with its programming to cause to be sent to themobile device, the resolved transaction ID associated with the requestedtransaction as well as data corresponding to the fulfillment points thatare currently in proximity to the user which can fulfill thetransaction. This is represented in a step 360.

The mobile device of the user receives the data from the transactionsystem including the data corresponding to the fulfillment points thatcan carry out the requested transaction. The user's mobile device thenoperates in accordance with its programming to present to the user auser interface that enables the user to provide inputs to select afulfillment point. This is represented in a step 362. The user's mobiledevice then operates in accordance with its programming to determine orobtain from a remote system directions from the user's current locationto the selected fulfillment point. This may be done based on stored dataincluded in one or more data stores accessible by the mobile device.Alternatively or in addition, such directions may be resolved throughcommunication of the mobile device with remote servers such as GoogleMaps, MapQuest or other similar service that can provide a user withdirections. The presentation of the directions to the user from themobile device is represented by a step 364.

The user may then travel to the selected fulfillment point. The mobiledevice may provide turn-by-turn instructions or similar guidance to theuser to help them reach the desired fulfillment point. It should beunderstood that in exemplary arrangements the fulfillment point mayinclude an automated banking machine, a merchant transaction area, aparticular facility or other apparatus that can fulfill the user'stransaction request. It should be understood that although the exemplaryarrangement may be discussed in connection with an automated bankingmachine, such other devices and systems may be utilized in exemplaryarrangements to fulfill transactions.

As represented in FIG. 32, when the user reaches the fulfillment point,the mobile device operates in accordance with its programming totransmit the user identifier, transaction ID and other information asmay be required by the system to a device such as a terminal at thefulfillment point. This is represented by a step 366. In the exemplaryarrangement the data is transmitted via radio frequency communications ashort distance to a device at the fulfillment point. This may include,for example, Bluetooth or NFC communication via a wireless interface onan automated banking machine. Alternatively, other types of contact orwireless communication may be used.

In response to receiving the user identification and transaction IDinformation at the automated banking machine at the fulfillment point,the automated banking machine operates in accordance with itsprogramming to send data corresponding to the user identifyinginformation, transaction ID and an identifier associated with thefulfillment point to the transaction system. This is represented by astep 368. The one or more servers of the transaction system then operateto verify the user identification, transaction ID and other data todetermine that the requested transaction is one which can be authorized.This is represented by a step 370. The transaction system communicatesone or more messages to the fulfillment point to indicate that the datawhich has been sent is verified. In response to this communication, theautomated banking machine at the fulfillment point then operates inaccordance with its programming to provide to the mobile device afulfillment point identifier which is then communicated wirelessly tothe mobile device. This is represented by step 372.

The mobile device receives the fulfillment point identifier at a step374. Of course it should be understood that in exemplary arrangements,additional data including data associated with maintaining security orauthentication may also be communicated from the automated bankingmachine of the fulfillment point to the mobile device. The mobile devicethen operates in accordance with its programming to cause thefulfillment point identifier and the current location data of the mobiledevice to be sent wirelessly to the transaction system. This isrepresented by a step 376. In response to receiving the data sent instep 376, the transaction system operates in accordance with itsprogramming to verify that the fulfillment point and the location of themobile device correspond. The transaction system also operates to verifythat the fulfillment point ID corresponds to the prior communicationfrom the fulfillment point. Of course additional steps may be performedin connection with authentication or security of the communications bythe transaction system. This is represented by a step 378.

The transaction system then operates in accordance with its programmingto determine if the account associated with the requested usertransaction currently is available for purposes of conductingtransactions. This is done in a step 380. In the exemplary embodimentthe account holder is enabled to operate their mobile device forpurposes of enabling and disabling the status of their account. Thiscapability may be used to assure that the account status is generallydisabled at times when a user does not wish to conduct transactions. Theuser may selectively enable the account at times when the user wishes toconduct transactions, this can generally avoid unauthorized transactionactivity. In this exemplary arrangement the transaction system at a step382 determines if the account control status currently has the accountdisabled or “off” or enabled and “on.” If in step 382 the transactionsystem determines that the account is currently disabled, thetransaction system operates to cause one or more messages to be sent tothe mobile device to indicate that if the transaction is to beconducted, the account status will need to be changed. The sending ofthis message is represented in a step 384.

The mobile device receives an account status change request from thetransaction system in a step 386. If the user acknowledges that thetransaction is to move forward, and is authorizing the transaction toproceed, the user will provide one or more inputs through input deviceson the mobile device. The mobile device then operates in accordance withits programming as represented in step 388 to cause an account statuschange request messages to be sent wirelessly to the transaction system.The transaction system operates in accordance with its programming tochange the account status so as to enable transactions as represented instep 390.

Enabling the account status then causes the transaction system toproceed at step 382 to operate in accordance with its programming tosend transaction data to the automated banking machine at thefulfillment point. This is represented in step 392. The automatedbanking machine receives the transaction data sent by the transactionsystem as represented in step 394. The automated banking machine thenoperates in accordance with its programming to determine that it canfulfill the requested transaction. The automated banking machine, uponverifying that it can provide the requested transaction, such asdispensing the requested amount of cash, sends one or more messages tothe transaction system confirming its fulfillment capability. This isrepresented by a step 396. The transaction system then receives the oneor more messages which indicate that the machine has the fulfillmentcapability and will proceed with the transaction. This is represented ina step 398.

The automated banking machine at the fulfillment point then operates inaccordance with its programming to prompt the user to provide useridentifying data. This is represented in a step 400. In some exemplaryarrangements the user identifying data may include a PIN number or othersecret code for purposes of authorizing a transaction. In still otherarrangements, the user identification data may include data read from adata bearing record, such as a card or biometric data such as datacorresponding to a user's fingerprint or iris scan. In still otherexemplary arrangements the identifying data may include audible soundsor a voiceprint. The automated banking machine in response to receivingthis data in the exemplary embodiment then operates to communicate withthe mobile device to request device and/or account verification data.This is represented in a step 402. The mobile wireless device inresponse to receiving the request operates in accordance with itsprogramming to provide the requested verification data as represented ina step 404. Verification data is then wirelessly communicated to theautomated banking machine. In some exemplary arrangements theverification data may include data such as account identifying data ofthe type previously discussed as being sent to the transaction system.Such verification data may also include the transaction ID data or otherdata that is received from the transaction system. In still otherarrangements the verification data may include data resolved by themobile device from data sent from the transaction system and data storedin one or more data stores in the mobile device. The type and nature ofthe verification data used may vary depending on the particular type ofsystem and mobile device. Generally the verification data will besufficient to verify the account, the particular transaction and devicewith which the transaction has been associated.

The automated banking machine which is the fulfillment point operates inaccordance with its programming to receive the data from the mobiledevice. The machine then operates in accordance with its programming toassemble the user identifying data, data corresponding to account,transaction ID and other information so as to present the information tothe transaction system. This is represented in a step 406. In step 408the automated banking machine operates to send one or more messages tothe transaction system so as to request authorization to complete thetransaction. This is represented in step 408.

The transaction request messages are sent to the transaction systemthrough one or more networks such as those described in connection withthe previous embodiments. Such network communications may be wired orwireless communications and may include transmission over the Internetor other public or private networks. Encryption and other securityfeatures are included with or applied to the messages to avoidinterception. One or more computers associated with the transactionsystem receive the messages and operate in accordance with theirprogramming to verify the data associated with the transaction request.In verifying the data, the transaction system determines that thetransaction is authorized to be conducted. This is represented in a step410. In response to verifying the data and the propriety of thetransaction, one or more servers of the transaction system operate tosend one or more messages to the automated banking machine to authorizethe transaction. This is represented in a step 412.

The automated banking machine operates in accordance with itsprogramming in response to the received transaction authorizationmessages to verify that the messages correspond to instructions tofulfill the transaction. This is represented in a step 414. Theautomated banking machine then operates to fulfill the transaction asrepresented in a step 416. This may include in some exemplaryembodiments operating to cause cash to be dispensed from the automatedbanking machine to a user. Of course it should be understood that thisform of fulfillment is exemplary and in other arrangements otherapproaches and forms of delivering value may be used.

The automated banking machine operates in accordance with itsprogramming to confirm that the cash was dispensed properly and sendsone or more messages to the transaction system, confirming fulfillmentof the transaction. This is represented by a step 418. In some exemplaryarrangements the automated banking machine may communicate with themobile device to prompt the user to confirm through one or more inputsthrough their mobile device that the cash or other value has beenreceived. Alternatively the transaction system may communicate with themobile device to have the user provide one or more inputs to confirmreceipt of the cash or other value. The user of the mobile device thenprovides one or more inputs to the mobile device to confirm fulfillment.The mobile device then operates in accordance with its programming tocause one or more confirmation messages to be sent to the transactionsystem. This is represented in a step 420.

If the transaction system receives confirmation of fulfillment inmessages from both the automated banking machine and the mobile device,one or more servers of the transaction system operate in accordance withtheir programming to commit the particular transaction. This isrepresented by a step 422. The one or more servers then operate to causefinancial transfers such as debiting the account of the user for cashreceived and crediting the account of the entity who operates themachine or other system that has provided value that fulfilled thetransaction request. This is represented by a step 424.

Of course it should be understood that in the event the user does notconfirm fulfillment of the transaction or the automated banking machineis unable to fulfill the transaction, steps can be taken to againattempt to complete fulfillment in accordance with the programming ofthe transaction system, the fulfillment device and the mobile device.Alternatively or in addition, failure to receive appropriateconfirmation messages may result in additional steps being taken such asthe automated banking machine capturing images of the user receivingcash or other value from the machine so as to document that thetransaction was properly completed. Alternatively or in addition, thedevices included in the system may be programmed to operate so that theaccount of the user is not charged in the event that the transactioncannot be fulfilled.

It should be understood that although in the exemplary embodiment thefulfillment device is described as an automated banking machine of thetype that automatically dispenses cash or other value to a user, inother arrangements the fulfillment device may include other types ofautomated banking machines. For example in some arrangements theautomated banking machine which provides fulfillment may include atransaction terminal at a merchant location. The transaction terminalmay include, for example, a cash register from which a merchant mayremove cash and provide it directly to the user. Alternatively or inaddition, other fulfillment devices may include wearable computers wornby merchant representatives who can control the wearable computers so asto provide messages that document the delivery of cash or other value toa user from merchant representatives.

FIGS. 35-37 show schematically the program logic executed by one or morecomputers in an alternative system in which the user may receive cash orother value. The system described in connection with this exemplaryarrangement unlike the previously described embodiment, may enable auser to have cash or other things of value delivered to them rather thanthe user having to travel to a fulfillment location to receive therequested value. In this exemplary arrangement a user may operate a userdevice such as a mobile device including a smart phone or wearablecomputer of the types previously described. Alternatively in someexemplary arrangements the user device may include a tablet computer orpersonal computer or other type of transaction terminal that isaccessible by a user in connection with making transaction requests. Inthis exemplary arrangement the one or more devices that are operated byan entity that fulfills the user's transaction request are referred toas a delivery service. The transaction system utilized in connectionwith this exemplary arrangement may include one or more servers of thetype previously described that operate in accordance with theirprogramming and that may operate to cause financial transfers betweenthe accounts of the various entities involved.

In this exemplary arrangement the user requesting a transaction operatesa user device as represented in a step 426. In this exemplary embodimentthe user device may include a portable wireless device through which auser provides inputs corresponding to a request for the amount of cashor other value that a user wishes to receive. The device also operatesin accordance with its programming to recover from one or more datastores, data corresponding to an account. This may include an accountnumber or alternatively token data or other data from which thetransaction system can derive data corresponding to an account. Inaddition in this exemplary embodiment the user device operates toreceive a second user identifying factor. Such an identifying factor mayinclude, for example, a personal identification number from the user, ascan of a user's fingerprint, a user's voiceprint or spoken secretwords, an iris scan or other suitable identifying factor whichidentifies the user as an authorized user. Of course it should beunderstood that additional data or other data may also be provided inconnection with a particular transaction system.

The user device operates to send the transaction data to one or moreservers associated with the transaction system. The servers operate inaccordance with their programming to verify the account and otherinformation which identifies the user as an authorized user and/or asthe user of a valid account. This is represented by a step 428. Thetransaction system further operates in a step 430 to verify that theamount requested by the user is available. The transaction system thenoperates to generate a transaction identifier or other data that can beused to identify the user's requested transaction. This data is sent tothe user device as represented in a step 432. Of course in otherarrangements additional data such as data for authenticating thetransaction, encrypting the communications, or that is otherwise usablein connection with the transaction may also be sent by the transactionsystem to the user device.

In the exemplary arrangement the user device is operative to store thetransaction identifying data received from the transaction system asrepresented in a step 434. The user then may operate the user device ata time proximate to receiving the transaction identifying data or at alater time, to send the transaction identifying data and other data suchas the amount of the cash or value requested, to a terminal device ofthe delivery service. Further in the exemplary embodiment the userdevice operates in accordance with its programming to send to thedelivery service device, data corresponding to the current location ofthe user device and/or location data corresponding to a place ofdelivery. This is represented in a step 436.

In the exemplary arrangement the data communicated in step 436 from theuser device is transmitted via wireless or wired communication to aterminal device including at least one microprocessor and data storeoperated by the delivery service. The delivery service device receivesthe transaction data and communicates with the user device tocommunicate options for the delivery of goods and/or the cash or othervalue that is requested by the user. This is represented in a step 438.For purposes of this exemplary arrangement, the delivery service will bedescribed in connection with a service that provides food items fordelivery. In some exemplary arrangements the services which are offeredby entities who deliver food for consumption may be utilized to alsoprovide cash or other items of value so as to make better use of theresources that are commonly used for such delivery. Of course thisapproach is exemplary and in other arrangements the delivery service maybe solely dedicated to the delivery of cash or may deliver other typesof items or value.

In the exemplary arrangement the data communicated from the device ofthe delivery service is received by the user device and causes the userdevice to operate in accordance with its programming to prompt the userto select whether the user wishes to have certain types of goodsdelivered along with the requested cash. This is represented in a step440. The user provides inputs through one or more input devices of theuser device to select any goods that the user also wishes to havedelivered with their cash. Further as represented in a step 442 the useris prompted to provide inputs through the user device to indicatewhether the value of the goods that they wish to have delivered is to bededucted from the amount of cash that they have requested. Generally inexemplary embodiments because the transaction has been previouslyverified for a given amount, the user will be required to agree that thecost of the goods will be deducted from the cash or other form of valuethat the user will additionally receive. In alternative arrangements, ifthe user wishes to receive goods and cash or other value which have agreater value than that originally authorized, the user device and thetransaction system may operate in accordance with their respectiveprogramming to authorize the requested higher transaction amount.

In the exemplary transaction, the user agrees to have the value of thegoods deducted from the initially authorized amount and communicates thegoods information and such confirmation to the device operated by thedelivery service as represented in a step 444. The terminal device ofthe delivery service then operates in accordance with its programming tocause one or more messages to be sent by the delivery service device tothe transaction system. The messages in the exemplary arrangement areoperative to request verification of the transaction ID, the total valueof the transaction, and the location for delivery that has been providedto the delivery service device from the user device. This is representedin a step 446.

The data communicated from the delivery service device is then verifiedas correct through operation of the transaction system. This isrepresented in a step 448. Of course if the transaction data cannot beverified through operation of the transaction system, the exemplaryarrangement sends appropriate messages to the delivery service that thetransaction is not verified and should not proceed. In addition othersteps may be taken as well in accordance with the programming of theservers which comprise the transaction system and/or the terminal deviceof the delivery service.

If the transaction data is verified in step 448, the transaction systemof the exemplary embodiment operates in accordance with its programmingto cause one or more messages to be sent to the user device indicatingthe information concerning the requested transaction. This isrepresented in a step 450. The data sent to the user device may includedetails of the transaction, the delivery service, the amount involved,the goods involved or other information as is necessary for the useroperating the user device to evaluate whether the transaction shouldproceed. The data sent to the user device causes the user device topresent an interface to the user which requests that the user provideinputs to either authorize or disallow the transaction. This isrepresented in a step 452. If the user does not confirm the transaction,then the transaction does not proceed and an appropriate message is sentto the transaction system.

Assuming that the user confirms the transaction as acceptable, one ormore messages confirming such fact is sent to the transaction system isrepresented in step 454. The transaction system evaluates the messagesand confirms that the transaction is acceptable as represented in step456. The transaction system then operates in accordance with itsprogramming as represented in step 458 to send one or more messages tothe device of the delivery service to indicate that the transaction hasbeen verified as authorized. The device of the delivery service receivesthese messages and verifies the receipt of transaction verification asrepresented in a step 460. In response to verifying that the transactionshould proceed, the device of the delivery service operates inaccordance with its programming to communicate with the user device toconfirm the delivery location. This is represented by a step 462. Theuser device then provides communication to confirm the delivery locationas represented by a step 464.

In response to confirming the delivery location, the delivery servicedevice operates in accordance with its programming to send messages tothe transaction system. The data sent by the delivery service deviceincludes data corresponding to a fulfillment identifier (ID) associatedwith the delivery service as well as the transaction identifierassociated with the particular transaction. The sending of thisinformation is represented in a step 466. In response to receiving thedata from the delivery service device, the transaction system verifiesthat it recognizes the fulfillment ID associated with the deliveryservice and confirms that it can complete the transaction associatedwith the financial transfers involved. This is represented by a step468. In the exemplary arrangement if the transaction system determinesthat it cannot complete the financial transfers associated with thetransaction, appropriate messages are sent to the device associated withthe delivery service so as to prevent the transaction from proceeding.

In response to verifying the fulfillment ID and transaction ID by thetransaction system, the delivery service device receives confirmationmessages from the transaction system to proceed with delivery of thecash and the requested goods. The delivery service then transports therequested cash and goods to the location where the user is located. Thetransport of the goods and cash may be tracked through operation of adevice associated with the delivery service such as a portable terminal,wearable computer or other device which may be the same as or may be aseparate terminal device capable of being in communication with thedelivery service terminal receiving the other messages. The presentmentof the cash and goods is represented by a step 470. In the exemplaryarrangement when the goods and cash or other value is presented to theuser at the location, a portable terminal associated with the deliveryservice is operative to receive identifying data to identify that theuser receiving the goods and cash is the appropriate recipient. This mayinclude, for example, in some embodiments the portable terminal of thedelivery service receiving data such as card data from a data bearingrecord provided by the user. Alternatively the portable terminal mayreceive a biometric identifier such as a fingerprint of the user.Alternatively or in addition, the terminal associated with the deliveryservice may receive identifying data from the mobile device of the user.Various types of input information or combinations of information may beso received which can be verified as associated with the authorizeduser. The receipt of the identifying factor or factors by the deliveryservice terminal is represented by step 472.

As represented in a step 474, in the exemplary arrangement the portableterminal associated with the delivery service is operative to send dataindicative of the delivery of the cash and/or goods to the transactionsystem. In the exemplary arrangement the portable terminal of thedelivery service is further operative to send the transaction data anddata corresponding to at least a portion of the received useridentifying data to the transaction system. Of course it should beunderstood that in step 474 additional data and/or other informationthat is usable to verify that the delivery is completed or thetransaction is being fulfilled may also be sent to the transactionsystem.

As represented in a step 476, the transaction system of the exemplaryembodiment operates to confirm the user identifying data and thetransaction data associated with delivery of the goods and cash. Thetransaction system then operates in accordance with its programming in astep 478 to send one or more messages to the portable terminal of thedelivery service to indicate that the identifying data has beenconfirmed. In response to receiving the confirmation data from thetransaction system, the portable terminal of the delivery serviceprompts the individual making the delivery to complete the delivery asrepresented in a step 480. The delivery service terminal then promptsthe user from the delivery service to verify the delivery throughproviding at least one input to the terminal and sends at least onemessage to the transaction system verifying that delivery has beencompleted in accordance with a step 482. In the exemplary arrangementthe transaction system receives the data corresponding to theverification of delivery in a step 484. In response to receiving thisdata, the transaction system stores the data indicating delivery hasbeen made. The transaction system service further operates in accordancewith its programming to send to the user's portable device, one or moremessages asking the user to confirm delivery of the goods and cash. Thisis represented in a step 486.

In response to receiving the one or more messages from the transactionsystem, the user device operates in accordance with its programming topresent an interface to the user which prompts the user to provide aninput that the delivery of the requested goods and cash has beencompleted. This is represented in a step 488. If the transaction isproceeding properly, the user then provides one or more inputs to theuser device which causes one or more messages to be sent to thetransaction system confirming that the delivery has been made in asatisfactory manner. This is represented in a step 490. Responsive toreceiving the one or more messages sent by the user device in step 490,the transaction system operates to cause a charge or debit to be madeagainst the account of the user as represented in a step 492 and tocause a credit for the amount of cash and goods or other value deliveredby the delivery service as represented in a step 494.

Of course in the exemplary arrangement if the user does not confirmappropriate delivery of the goods, additional steps are taken so as toresolve the discrepancy. This may include, for example, additionalcommunications between the delivery service terminal, the user terminaland the transaction system so as to prevent or revoke the delivery ofthe goods, cash or other value to unauthorized persons. In addition, theuser terminal and delivery service terminal may include image capturedevices or other devices for obtaining information so as to document thecircumstances of delivery if the delivery is going to be completed sothat the recipient cannot deny delivery at a later date. The particularsteps taken will depend on the capabilities of the particular system andthe devices involved. Further it should be understood that additional ordifferent steps may also be taken through operation of the variousdevices in connection with the exemplary steps described. Furthernumerous different variations may be utilized in connection with variousembodiments. Further although cash and goods delivery has been describedas the form of value delivered in connection with this exemplaryembodiment, it should be understood that other types of delivery mayalso be made. This may include, for example, other types of value suchas prepaid cards, stored value cards, gift cards, scrip or other thingsthat can be redeemed for goods or services. Of course it should beunderstood that numerous different combinations of goods, services, cashor other items of value may also be delivered through systems of thistype.

FIG. 38 shows schematically a further alternative embodiment of anautomated banking machine 496. Automated banking machine 496 may includefeatures like the automated banking machines previously described andmay be used for carrying out transactions including transfers of value.The exemplary automated banking machine includes a controller 498including a microprocessor. The controller further includes one or moredata stores schematically indicated 500 which store computer executableinstructions, data and other information associated with operation ofthe automated banking machine. The automated banking machine furtherincludes a number of transaction function devices collectively referredto as 502 that are in operative connection with the controller. Thetransaction function devices may include, for example, in someembodiments card readers, key pads, printers, displays, cash dispensers,check acceptors, cash acceptors, input devices, output devices andvarious other types of devices that are used in connection with theparticular types of transactions that are carried out by the automatedbanking machine. The exemplary machine further includes a suitableinterface 504. Interface 504 is usable to provide communications withone or more networks 506. Networks 506 are in operative connection withone or more transaction systems including remote computers such asservers and other systems which enable carrying out transactions of thetype for which the automated banking machine is specifically adapted.

The exemplary automated banking machine 498 further includes a wirelessinterface 508. The wireless interface 508 of the exemplary embodiment issuitable for radio frequency communication with relatively nearby mobiledevices. Such mobile devices may include smart phones, tablet computers,wearable computers or other portable computing devices commonly carriedby users which may come into proximity with the machine. In theexemplary arrangement the terminal controller 498 or othermicroprocessor device in association with the machine may be operativeto provide communications with one or more types of mobile devices andapplications operating therein. Further in some exemplary arrangementsthe communication provided is operative to inform a user mobile devicethat the automated banking machine may provide a particular type ofservice or transaction function that a user associated with the mobiledevice may be seeking to obtain.

For example in an exemplary embodiment a mobile device of the user mayinclude a particular application or other suitable programming thatenables a user to establish parameters for things that they wish topurchase or otherwise acquire. Such an application may enable the userto indicate a request to obtain cash in a particular amount and to notincur a transaction fee for receipt of the cash above a particularthreshold. For example the user may program their mobile device to seekto obtain cash in the amount of $300 without incurring a transaction feein excess of $2.00. Of course it should be understood that this amountand transaction fee are merely exemplary.

The exemplary automated banking machine 496 may include data in its oneor more data stores 500 that it is willing to offer the dispense of cashin certain amounts for certain transaction fees. The controller of themachine may further include programming so as to communicate thisinformation when a request of this type is received by the machinethrough the wireless interface. Further in some exemplary embodimentsthe programming of the automated banking machine may be such that normaltransactions attract transaction fees that are higher than those thatthe owner of the machine is willing to offer to those which are seekinglower transaction fees through communications with transient mobiledevices through the wireless interface.

In the exemplary embodiment the mobile device of the user is carried bythe user and transmits wireless messages corresponding to those itemsthat the user is seeking nearby terminals which can receive suchmessages. The automated banking machine is operative to receive throughits wireless interface the messages from the user's mobile deviceincluding messages which indicate that the user is seeking to receivecash in the particular amount for a transaction fee that is no more thanthe indicated fee. In response to receiving these messages, thecontroller of the automated banking machine is operative to determinethat the machine is programmed to offer transactions that satisfy theparameters that the user is seeking. The controller then operates inaccordance with its programming to communicate with the user's mobiledevice through the wireless interface. The controller operates toindicate to the user device the fact that the requested transaction isavailable and the location where the machine is located. The user mayalso be prompted to receive directions to travel to the machine if theuser is interested in completing the transaction. Further in exemplaryembodiments the user may also be informed through messages from themachine that in order to obtain the cash for the requested fee, the usercan use a certain code or token which is provided by the machine to theuser device. In the exemplary embodiment the user operating the mobiledevice may operate the device to receive the data or token from themachine at the time of the initial communication. Alternatively in otherarrangements the user may be advised that they can obtain the discountedtransaction fees by taking other steps when they are present at themachine.

If the user elects to travel to the machine, the user may commence atransaction in the usual manner such as by presenting a card and PINnumber. In the exemplary arrangement the programming of the automatedbanking machine is configured to prompt the user to provide an input toindicate that they are conducting a transaction in response to apromotional offer received through their mobile device. In response toselecting this particular transaction selection, the user is enabled toprovide the code or token previously delivered to their mobile device.This can be provided by communication of the user's device with themachine or the user providing manual inputs to the machine.Alternatively the user can commence another communication sessionthrough their mobile device while at the machine so as to indicate tothe machine that they are responding to the promotional offer to receivethe cash for the reduced transaction fee. In response to receiving theinformation from the user, the machine operates in accordance with itsprogramming to fulfill the transaction requested by the user. This wouldinclude in the exemplary embodiment the delivery of cash with theassessment of only the $2.00 transaction fee as agreed to by the user.In this exemplary arrangement the machine is programmed to cause anyadditional charges that may be associated with the transaction to beabsorbed by the machine owner or the owner of the establishment in whichthe machine is located. Alternatively in some alternative arrangementsthe machine user may be assessed the usual transaction fee, but may beissued a receipt, token or instructions that allow the user to receivecash or other value from the establishment where the machine is locatedthat corresponds to the excess fee charged over what the user requested.The owner of the machine or the establishment may do this in order toobtain the benefit associated with having the user present in theirestablishment with cash that can be used to acquire goods and servicesfrom the merchant. Alternatively and/or in addition the user may berequired to watch certain advertising or other information output by themachine about goods and services of the establishment or the machineowner while receiving the cash for the discounted fee. In this mannerthe exemplary embodiment provides for the user to receive the discountedtransaction fee they requested and the operator of the machine and/orthe establishment in which the machine is located, to receive theadditional benefit associated with more customers present within theestablishment and/or reviewing advertising messages associated with theestablishment.

Although the particular mobile device request described that providesfor the receipt of cash for a discounted transaction fee may befulfilled through operation of exemplary automated banking machines,other mobile device request offers may also be responded to. This mayinclude, for example, offering to fulfill requests associated with othertypes of goods and services that can be obtained through operation ofthe automated banking machine. Such goods and services may include theprovision of items such as tickets for events, gaming materials or otheritems that can be offered through operation of the automated bankingmachine. Alternatively and/or in addition offers to fulfill requests maybe associated with the goods or services provided by the particularestablishment. For example if the particular mobile device userapplication enables the user to transmit requests to receive particulargoods or services at certain prices or within particular ranges, theautomated banking machine may be programmed to communicate with the userdevices that the particular establishment in which the machine islocated, will offer the particular things that the user is looking for.Further as can be appreciated, the programming of the automated bankingmachine may enable the machine to be programmed so as to identifyparticular thresholds at which the machine and/or establishment iswilling to offer particular goods and services.

Alternatively or in addition other exemplary embodiments may enablecommunications between the controller of the machine and other terminalswithin the merchant establishment to indicate that there is a user inproximity who is looking for something that may correspond to that whichthe merchant has to offer, but the user's request parameters do notcorrespond to that which the establishment has currently programmed themachine to offer. In such cases communication with a merchant terminalmay enable a merchant user to agree to meet the particular parametersbeing requested by the user of the mobile device. Inputs to the merchantterminal which operatively communicates with the machine may then enablethe machine to inform a user through their mobile device that theparticular merchant establishment is prepared to offer what it is thatthe user is looking for. Alternatively, in some arrangements themerchant terminal may communicate with the user's mobile devicedirectly. Those exemplary arrangements may enable a user of a mobiledevice to use the device to look for things at particular prices and toobtain those things from automated banking machines or from merchantestablishments as they travel in proximity to such locations. Of courseit should be understood that these approaches are exemplary and in otherembodiments other approaches may be used.

A further exemplary embodiment of an automated banking machine 510 isschematically represented in FIG. 39. The automated banking machine 510may include features and devices similar to those previously describedexcept as otherwise mentioned herein. The exemplary automated bankingmachine 510 may be used for carrying out transactions of the typespreviously discussed at a transaction user interface area 512. Interfacearea 512 of the exemplary embodiment may include items for communicatingwith a user during transactions such as a display, key pad, card reader,acceptor slot, printer delivery slot, cash accepting slot, cash deliveryslot, check accepting slot or other appropriate interface elements forcarrying out transactions with users.

Exemplary automated banking machine 510 further includes additionalvisual displays 514 and 516. In the exemplary embodiment, these visualdisplays are provided for purposes of facilitating activities byindividuals who carry mobile devices and wearable computers that do nothave visual displays and/or which may not have visual displays of asuitable size or configuration to carry out certain types of desiredfunctions. The exemplary automated banking machine includes one or morewireless interfaces that are suitable for communicating with such mobiledevices and which can facilitate the use of such devices or multipledevices that are carried by multiple users.

For example in some exemplary arrangements mobile devices may include adevice such as a watch-like wearable computer, pendant or other mobilecomputing device that includes no visual display or only a small visualdisplay. Bringing such a mobile device in proximity with a display suchas display 514 causes the automated banking machine to operate inaccordance with its programming to prompt the user to provide an inputif they wish to utilize the display on the machine in connection withtheir device. In the exemplary arrangement the displays comprise touchscreen displays which enable a user to select whether they wish toutilize the display or not. By selecting an option presented through thedisplay to connect to the mobile device, the mobile device can thenpresent a user interface to the user through the display which providesmultiple options and selections to the user. The user can then interfacewith their mobile device through the touch screen display on theautomated banking machine. Further in exemplary arrangements theinterface may also provide outputs from remote sources such as outputsproduced by various Internet or other network connections that the useris able to make through their mobile device. Thus the user is able toutilize their mobile device while using the display in connection withthe automated banking machine as the input and output user interface forthe mobile device.

Further in exemplary embodiments the automated banking machine mayprovide a printer which enables the user of the mobile device to printan item selected via the particular interface that is output through thedisplay. The printer of the automated banking machine may deliver to theuser the printed information that they have caused to be selectedthrough or presented on the display. The automated banking machine mayinclude one or more printer outlets 518 for this purpose. Further inexemplary embodiments the automated banking machine may operate inaccordance with its programming to charge the user for use of theprinting function or for other functions that a user may choose toexecute when using the display interface provided on the machine. Forexample if a user uses the display interface in order to request thatfunds be added to a mobile wallet associated with the mobile device, theautomated banking machine terminal controller may operate in response tothe user's selected inputs to cause data representative of value to beincluded in the mobile wallet and to cause communications withappropriate networks so as to cause the user's account to be charged.Alternatively or in addition the automated banking machine may operateto cause money to be transferred to or from stored value accountsassociated with the user's mobile device. Of course these approaches areexemplary and in other embodiments other approaches may be used.

In addition when the automated banking machine is located at a merchantestablishment, provision may be made to have user interfaces whichprovide visual outputs from user mobile devices and which can receiveuser inputs to such devices located in other devices within theestablishment. For example in some arrangements the automated bankingmachine may be located in a coffee shop or restaurant environment inwhich there are tables with input/output devices such as surfacecomputers 520. The surface computers 520 may comprise input and outputdevices which communicate with a user's mobile device and enable theuser to employ the surface computer of the table or similar structure asthe display and input device for the mobile device.

In still other exemplary embodiments the displays in operativeconnection with the automated banking machine may be usable for purposesof facilitating transfers of value between mobile devices of multipleusers. When mobile devices of users do not have suitable displays suchas certain wearable computers, visual outputs may be presented to theuser's mobile devices on the displays in communication with theautomated banking machine. In situations where a user wishes to transfervalue from a stored value account or other account, to another user whohas a mobile device, both users may bring their devices in proximity toa touch screen display associated with the automated banking machine. Insuch circumstances, devices may communicate with the machine to provideoutputs through the display and the users may provide inputs so as touse the interface presented by the machine for communication with one orboth devices. In such circumstances the display may be used to provideinputs and receive outputs to cause value to be transferred from onedevice to another and/or to the accounts of the respective users. Thusfor example if a user of a mobile device wishes to transfer funds to auser of another mobile device, they may do so using the interfaceprovided on or through communication with the automated banking machine.Further in exemplary embodiments the automated banking machine mayinclude encryption features or other security features that help toassure that the communication of the messages which communicate thevalue or cause the value to be transferred are secured in a manner thatis more effective than occurs when mobile devices communicate directly.Such encryption functions may be controlled or initiated through inputsprovided to the displays that are connected to the automated bankingmachine. For example the automated banking machine may have itscontroller operate in accordance with its programming to provide tomobile devices, one-time session keys and/or encryption keys that areusable to provide communication on a secure basis between the mobiledevices while they are operated in connection with the automated bankingmachine. Thus the automated banking machine may provide additional valuethat facilitates the carrying out of transactions between wearablecomputers, particularly such computers that do not include userdisplays.

Further in exemplary embodiments the automated banking machine 510 maybe utilized for purposes of providing electronic tokens to wearablecomputers that can be used as a substitute for account numbers oraccount verification data in connection with carrying out financialtransactions. For example it may be desirable in some transactionarrangements to use a token which can be used by a remote computersystem to resolve a user's account number, rather than the actualaccount number for purposes of carrying out transactions. In additiontokens may also be provided for other data such as data corresponding tobiometric data, PIN numbers or other values which a user may not want tohave available in transmissions which could be intercepted or utilizedby unauthorized persons if they are stored in a mobile device that islost or stolen.

The exemplary automated banking machine operates in accordance with itsprogramming to provide one or more tokens to users which can be storedin a user's mobile device. For example the automated banking machine mayoperate to receive a user's credit or debit card data as well as a PINnumber or biometric data that authenticates the identity of the user. Inresponse to the user providing inputs through the automated bankingmachine indicating that the user wishes to receive a token for a mobiledevice, the automated banking machine operates in accordance with itsprogramming to communicate with a remote transaction system. The remotetransaction system verifies the authenticity of the card data and PIN orother data to determine that the user is an authorized user. In responseto messages corresponding to token data from the remote system, theautomated banking machine may then deliver through the wirelessinterface, a token that is stored in the memory of the user's mobiledevice. As can be appreciated, the token corresponds to data which aremote transaction system may receive, validate and associate with theuser's account data. However, the token data has no relationship to theuser's account data and thus if the token data is compromised, theuser's account number is not obtained. Thus in exemplary arrangementsonce the user has received token data and stored it on their mobiledevice, the user can conduct transactions on their account using thetoken data in communications directly with the transaction systemwithout transmitting their account number directly.

In other exemplary embodiments the automated banking machine may alsooperate to dispense token data corresponding to parameters other than auser's account number. This may include for example, token datacorresponding to a user's biometric data, which token data may be storedin a user's mobile device. Such data may be sent from the mobile devicein lieu of actual biometric data when it is required for purposes ofverifying transactions. Alternatively or in addition the token data maybe used and correlated by a remote system to compare fingerprint datathat is scanned either on the user's mobile device or at a separatetransaction terminal, with the remote system stored data so as to verifythe user. Using a token stored on the mobile device instead of thebiometric data itself produces the risk of compromise of the data.

Further in other exemplary arrangements the automated banking machinemay be utilized to help users to avoid fraudulent transactions that maybe conducted via other methods. For example a user may prefer to ordergoods or services by phone or using a personal computer which uses onlythe user account data which can be read from a card. Such transactionswhere the actual card is not presented to the merchant or a merchant'stransaction terminal, can present risks because the data that is storedon a chip associated with a genuine card is not available to verify thatthe card is genuine. This is because in a transaction that is carriedout either on the phone or at a PC or other terminal that cannot readthe data from the chip on the card or communicate with the chip, onlythe visible data on the card can be used in connection with presentingthe transaction.

Exemplary embodiments of automated banking machines may operate toprovide the user with additional information or capabilities that can beused in transactions that are conducted with merchants when the card isnot present. This may include, for example, the automated bankingmachine operating to verify the authenticity of the user's cardincluding chip data included on the card. The user may also beauthenticated by other factors such as the user's PIN, biometricidentifiers or other data. With the user and their card authenticated,the terminal may operate to provide the user with an additionalauthenticating factor or a device that can provide such a factor thatcan be used when transactions are conducted with a merchant where thecard is not physically presented to the merchant. In some arrangementsthis may include an additional secret code that is provided to the userfrom the automated banking machine. The secret code may be stored in aremote system for use in connection with transactions that are conductedby a merchant when the card is not present. Thus for example if the userplaces an order for goods on the phone or through a PC, the user canadditionally provide the secret code in addition to the data on the cardso as to further authenticate the transaction as authorized.Alternatively in some embodiments the machine may provide the user withan article in a manner like that previously discussed, which article canoutput data which can be used as an additional authenticating factor.

Alternatively and/or in addition, if the user normally conductstransactions such as purchase transactions by phone, when using theautomated banking machine to receive transaction authenticatingcredentials for use in future “card not present” transactions, the usermay be requested to provide an input to the automated banking machine ofa spoken code word that the user will use in connection withtransactions that are conducted in the future by phone. The automatedbanking machine may operate in accordance with its programming tocommunicate data corresponding to the code word and/or a voice print tothe remote transaction system. The data is then securely stored inmemory. When the user later wishes to place an order for goods viatelephone, the communications by phone may include the user presentingthe code word verbally to the order system in addition to data that isread from the card. This provides an additional authenticating factorthat the merchant receiving the order can use to have higher assurancethat the transaction being presented by the user is authorized. Ofcourse these are but examples of things that an automated bankingmachine may provide as additional authenticating factors to help assurethat transactions requested of a merchant in circumstances where thecard is not present at the merchant location, are not fraudulent.

Thus the exemplary embodiments achieve improved operation, eliminatedifficulties encountered in the use of prior devices and systems, andattain the useful results described herein.

In the foregoing description certain terms have been used for brevity,clarity and understanding. However, no unnecessary limitations are to beimplied therefrom because such terms are used for descriptive purposesand are intended to be broadly construed. Moreover, the descriptions andillustrations herein are by way of examples and the invention is notlimited to the features shown and described.

Further in the following claims any feature described as a means forperforming a function shall be construed as encompassing any means knownto those skilled in the art as being capable of carrying out the recitedfunction and shall not be deemed limited to the particular means shownor described for performing the recited function in the foregoingdescription or mere equivalents thereof.

It should be understood that features and/or relationships associatedwith one embodiment can be combined with features and/or relationshipsfrom another embodiment. That is, various features and/or relationshipsfrom various embodiments can be combined in further embodiments. Theinventive scope of the disclosure is not limited to only the embodimentsshown or described herein.

It should be understood that language which refers to a list of itemssuch as “at least one of A, B, or C” (example 1) means “at least one ofA, B and/or C.” Likewise, it should be understood that language whichrefers to a list of items such as “at least one of A, B, and C” (example2) means “at least one of A, B and/or C.” The list of items in example 2is not required to include one of each item. The lists of items in bothexamples 1 and 2 can mean “only one item from the list or anycombination of items in the list.” That is, the lists of items (in bothexamples 1 and 2) can mean only A, or only B, or only C, or anycombination of A, B, and C (e.g., AB, AC, BC, or ABC).

The term “non-transitory” with regard to computer readable medium isintended to exclude only the subject matter of a transitory signal perse, where the medium itself is transitory. The term “non-transitory” isnot intended to exclude any other form of computer readable media,include, but not limited to, media comprising data that is onlytemporarily stored or stored in a transitory fashion. Should the lawchange to allow computer readable medium itself to be transitory, thenthis exclusion is no longer valid or binding.

Having described the features, discoveries and principles of theexemplary embodiment, the manner in which it is constructed and operatedand the advantages and useful results attained, the new and usefulstructures, devices, elements, arrangements, parts, combinations,systems, equipment, operations, methods, processes and relationships areset forth in the appended claims.

We claim:
 1. Apparatus comprising: an automated banking machine operableresponsive at least in part to read user data to cause financialtransfers, wherein the machine includes at least one user input device,wherein the at least one user input device includes at least one datareader, wherein the at least one data reader is operable to read userdata usable to identify a financial account of a machine user, whereinthe machine includes at least one display, wherein the machine includesat least one document reader, wherein the at least one document readeris operative to electronically read data from documents, wherein themachine includes a cash dispenser, wherein the cash dispenser isoperable to selectively dispense currency bills from the machine,wherein the machine is associated with at least one controller, whereinthe at least one controller is in operative connection with at least onedata store, wherein the at least one controller is configured to cause adetermination to be made that user data read by the at least one datareader is associated with a financial account on which a transaction isauthorized to be conducted through operation of the machine, wherein theat least one controller is operable responsive at least in part to thedetermination to cause the cash dispenser to operate to provide currencybills from the machine, the financial account to be assessed a valuecorresponding to the provided currency bills, wherein the at least onedocument reader is configured to read bill identifying data from machinedispensable currency bills, wherein the at least one controller isoperative to cause data corresponding to the bill identifying data to bestored in at least one data store, at least one wearable computer deviceconfigured to be at least one of worn or carried by an individual,wherein the at least one wearable computer device includes at least onewearable device reader, wherein the at least one wearable device readeris configured to read identifying data from an individual receivedcurrency bill, wherein the at least one wearable computer device is inoperative connection with the at least one data store, wherein the atleast one wearable computer device is configured to cause a bill sourcecomparison to be made concerning whether bill identifying data read fromthe received currency bill through operation of the at least onewearable device reader corresponds to identifying data of a billdispensed through operation of the automated banking machine within aset prior time period.
 2. The apparatus according to claim 1, whereinthe automated banking machine and the at least one wearable computerdevice are located within a single business establishment, wherein thewearable computer device is configured to be worn or carried by anindividual employee of the establishment.
 3. The apparatus according toclaim 1 wherein at least one of the bill identifying data corresponds toat least a portion of a bill serial number, and the set prior timeperiod is not greater than one day.
 4. The apparatus according to claim1 wherein the at least one wearable computer device includes at leastone output device, wherein the at least one output device is configuredto provide at least one output perceivable by the individual indicativeof a result of the bill source comparison.
 5. The apparatus according toclaim 1 wherein the at least one wearable computer device includes atleast one biometric feature reader, wherein the at least one biometricfeature reader includes an inward facing camera configured to read atleast one biometric feature of the wearer individual while being worn,wherein the at least one wearable computer device is configured to makean identity determination that a wearer individual is an authorizedoperator of the at least one wearable computer device responsive atleast in part to the at least one read biometric feature, enable atleast one function to be performed by the wearable computer deviceresponsive at least in part to the identity determination.
 6. Theapparatus according to claim 5, wherein the at least one functionenabled to be performed by the at least one wearable computer devicewhile being worn includes at least one of bill source comparison, billgenuineness evaluation, check image data production, and cardgenuineness determination.
 7. Apparatus comprising: a wearable computerdevice, wherein the wearable computer device is configured to be worn byan individual and includes a configuration of at least one of wearableglasses, a wrist watch, a medallion, a hat and an article of clothing,wherein the wearable computer device includes at least one wearablecomputer reader and at least one output device configured to provideoutputs perceivable by the individual, wherein the at least one wearablecomputer reader is configured to read bill indicia from a currency billwhile the device is being worn by the individual, and wherein thewearable computer device is configured to cause a bill genuinenessdetermination to be made for the currency bill responsive at least inpart to the read bill indicia, provide at least one output through theat least one output device responsive at least in part to the billgenuineness determination, which at least one output is perceivable bythe individual while the device is worn.
 8. The apparatus according toclaim 7 and further comprising: an automated banking machine, whereinthe automated banking machine is configured to dispense currency billsto a user and to cause a value to be assessed to an account associatedwith the user, wherein the automated banking machine includes at leastone machine bill reader, wherein the at least one machine bill reader isconfigured to read indicia from currency bills dispensable from themachine, wherein the automated banking machine includes at least onecontroller, wherein the at least one controller is in operativeconnection with at least one data store, wherein the at least onecontroller is in operative connection with the at least one machine billreader and is configured to cause dispensable bill identifying data tobe stored in the at least one data store, wherein the wearable computerdevice is in operative connection with the at least one data store,wherein the wearable computer device is configured to cause a billsource determination to be made responsive at least in part to the billindicia read through operation of the at least one wearable computerreader, that the currency bill was previously dispensed from theautomated banking machine within a set prior time period, at least onebill source output to be provided through the at least one output deviceresponsive at least in part to the bill source determination wherein theat least one bill source output is indicative that the bill waspreviously dispensed from the automated banking machine.
 9. Theapparatus according to claim 7 wherein the at least one wearablecomputer reader is configured to read card data from a card while thedevice is worn, wherein the card is usable as at least one of a creditcard and a debit card, wherein the wearable computer device isconfigured to cause a card genuineness determination to be madeconcerning the genuineness of the card responsive at least in part tothe card data, and at least one card output to be provided through theat least one output device, wherein the at least one card output isindicative of genuineness of the card.
 10. The apparatus according toclaim 7 wherein the at least one wearable computer reader is operativewhile the device is worn to read data from a financial check, whereinthe wearable computer device is operative to cause electronic image datato be produced, wherein the electronic image data corresponds to visualappearance of at least a portion of the check, and the electronic imagedata to be wirelessly sent from the wearable computer device to at leastone remote computer.
 11. The apparatus according to claim 7 wherein thewearable computer device includes at least one input device, wherein thewearable computer device is configured to detect at least one ofabnormal movement and abnormal sound adjacent the wearable computerdevice through operation of the at least one input device when thewearable computer device is not worn by an individual, and to causewhile the device is not worn at least one wireless alarm signal to besent to at least one remote computer responsive at least in part to thedetection of the at least one of abnormal movement and abnormal sound.12. Apparatus comprising: a wearable computer device configured to be atleast one of worn or carried by an individual, wherein the wearablecomputer device includes at least one input device, at least one outputdevice, at least one microprocessor, at least one data store, at leastone wireless transmitter, and at least one battery, wherein the at leastone input device includes at least one camera configured to captureimages of areas adjacent to the wearable computer device, wherein thewearable computer device is configured to capture image data throughoperation of the at least one camera while the wearable computer deviceis not worn or carried by an individual, cause evaluation of the imagedata for abnormal movement, and cause at least one wireless alarm signalto be sent from the wearable computer device responsive to adetermination that abnormal movement occurred, and while the wearablecomputer device is worn or carried by the individual, at least one ofevaluate a currency bill image captured through operation of the atleast one camera and cause at least one output through the at least oneoutput device perceivable by the individual, indicative of whether thecurrency bill is genuine, evaluate a currency bill image capturedthrough operation of the at least one camera and cause a determinationto be made that the currency bill was previously dispensed from anautomated banking machine, and to cause at least one output through theat least one output device perceivable by the individual indicative thatthe currency bill was previously dispensed from the automated bankingmachine, evaluate at least one image captured through operation of theat least one camera of a credit or debit card, and to cause at least oneoutput through the at least one output device perceivable by the userindicative of the genuineness of the card, and capture at least oneimage of a check through operation of the at least one camera, produceelectronic image data corresponding to visual appearance of at least aportion of the check, and cause the electronic image data to be sentwirelessly from the wearable computer device.
 13. Apparatus comprising:a mobile wireless device, wherein the device is configured to be atleast one of worn or carried by an individual, wherein the deviceincludes at least one reader and at least one output device configuredto provide outputs perceivable by the individual, wherein the at leastone reader is configured to read bill indicia from a currency bill,wherein the device is configured to cause a bill genuinenessdetermination to be made for the currency bill responsive at least inpart to the read bill indicia, provide at least one output through theat least one output device responsive at least in part to the billgenuineness determination, wherein the device includes at least oneinput device, wherein the device is configured to detect at least one ofabnormal movement and abnormal sound adjacent the device throughoperation of the at least one input device when the device is not wornor carried by an individual, and cause at least one wireless alarmsignal to be sent to at least one remote computer responsive at least inpart to the detection of the at least one of abnormal movement andabnormal sound.
 14. Apparatus comprising: an automated banking machineoperable responsive at least in part to read user data to causefinancial transfers, wherein the machine includes at least one userinput device, wherein the at least one user input device includes atleast one data reader, wherein the at least one data reader is operableto read user data usable to identify a financial account of a machineuser, wherein the machine includes at least one display, wherein themachine includes at least one document reader, wherein the at least onedocument reader is operative to electronically read data from documents,wherein the machine includes a cash dispenser, wherein the cashdispenser is operable to selectively dispense currency bills from themachine, wherein the machine is associated with at least one controller,wherein the at least one controller is in operative connection with atleast one data store, wherein the at least one controller is configuredto cause a determination to be made that user data read by the at leastone data reader is associated with a financial account on which atransaction is authorized to be conducted through operation of themachine, wherein the at least one controller is operable responsive atleast in part to the determination to cause the cash dispenser tooperate to provide currency bills from the machine, the financialaccount to be assessed a value corresponding to the provided currencybills, wherein the at least one document reader is configured to readbill identifying data from machine dispensable currency bills, whereinthe at least one controller is operative to cause data corresponding tothe bill identifying data to be stored in at least one data store, atleast one wearable computer device configured to be worn by anindividual, wherein the at least one wearable computer device includes aconfiguration of at least one of wearable glasses, a wrist watch, amedallion, a hat and an article of clothing, wherein the at least onewearable computer device includes at least one wearable reader, whereinthe at least one wearable reader is configured to read identifying datafrom an individual received currency bill while being worn by theindividual, wherein the at least one wearable computer device is inoperative connection with the at least one data store, wherein the atleast one wearable computer device is configured to cause a bill sourcecomparison to be made concerning whether bill identifying data read fromthe received currency bill through operation of the at least onewearable reader corresponds to identifying data of a bill dispensedthrough operation of the automated banking machine.
 15. The apparatusaccording to claim 14 wherein the at least one wearable computer deviceis configured to use data read from the currency bill by the at leastone wearable reader to evaluate genuineness of the currency bill. 16.The apparatus according to claim 15 wherein the at least one wearablecomputer device is configured to cause the at least one the wearablereader to produce check image data corresponding to visual appearance ofan individual received check.
 17. The apparatus according to claim 16wherein the at least one wearable computer device is operable responsiveat least in part to the wearable computer device produced image data, toresolve a user received check value associated with the individualreceived check, and to cause at least one financial transfercorresponding to the user received check value.
 18. The apparatusaccording to claim 17 wherein the at least one wearable computer deviceis operative to cause card data to be read through operation of the atleast one wearable reader from at least one of a credit or debit card, adetermination of genuineness of the card to be made responsive at leastin part to the read card data.
 19. The apparatus according to claim 18wherein the automated banking machine includes at least onecleaner/disinfecting device, wherein the at least onecleaner/disinfecting device is operable to remove narcotics residue fromat least one of currency bills, financial checks and other documents.20. The apparatus according to claim 15 wherein the at least onewearable computer device includes at least one output device, whereinthe at least one output device is configured to provide while being wornat least one output perceivable by the individual indicative of a resultof the genuineness evaluation of the currency bill.