Banking system controlled responsive to data bearing records

ABSTRACT

A banking system operates to allocate funds in accounts in response to data bearing records in the form of paper financial checks. A mobile phone has a camera and a programmable memory. The memory stores phone user data, including a bank account number and an electronic signature. The camera can be used to capture an image of a paper check which has the phone user as the payee. The phone can wirelessly transmit the account number, the electronic signature, and the check image to a bank deposit system. The system can store the check image and the electronic signature in correlated relation in a deposit transaction record. The system can cause the phone user&#39;s bank account to be credited a cash value corresponding to the check value. Confirmation of the check deposit can be transmitted to the user&#39;s phone.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 12/229,318 filed Aug. 21, 2008, now U.S. Pat. No. 8,104,676, which both claims benefit pursuant to 35 U.S.C. §119(e) of Provisional Application 60/966,053 filed Aug. 24, 2007 and is a continuation-in-part of U.S. application Ser. No. 11/983,163 filed Nov. 7, 2007, now U.S. Pat. No. 7,537,154, which is a divisional of U.S. application Ser. No. 11/714,606 filed Mar. 6, 2007, now U.S. Pat. No. 7,344,066, which is a divisional of U.S. application Ser. No. 10/795,761 filed Mar. 8, 2004, now U.S. Pat. No. 7,207,477, which is a continuation-in-part of U.S. application Ser. No. 09/826,675 filed Apr. 5, 2001, now U.S. Pat. No. 6,702,181, which is a divisional of U.S. application Ser. No. 09/076,051 filed May 11, 1998, now U.S. Pat. No. 6,315,195, which claims benefit pursuant to 35 U.S.C. §119(e) of U.S. Provisional Application 60/082,299 filed Apr. 17, 1998, and the disclosure of each Application is herein incorporated by reference.

TECHNICAL FIELD

This invention relates to banking systems controlled by data bearing records and which may be classified in U.S. Class 235, Subclass 379.

BACKGROUND OF INVENTION

The most common type of credit and debit cards in use today are magnetic stripe type cards. The standardized format used for such cards includes indicia on a front side of the card. Such indicia identifies the card owner, an account number, a card type, a card issuer, an expiration date as well as possibly other information. Such indicia is presented as raised letters and numbers which can be used to make an impression on a multipart carbon or carbonless form. The rear of such cards have a magnetic stripe supported thereon. The magnetic stripe includes several tracks of information. This information includes magnetic indicia representative of the information found on the front of the card as well as other information that is used in processing transactions electronically. Magnetic stripe cards are commonly used for credit card types such as MasterCard®, VISA®, Discover®, American Express®, Diner's Club® and others.

Most people also carry debit cards which allow them to access money in their checking and savings accounts using automated banking machines. Some debit cards also function as credit cards. Most debit cards in use today are magnetic stripe cards similar in format to credit cards.

Due to the convenience of using credit and debit cards most people carry several such cards in their wallet. Because of financial incentives associated with the issuance and sponsorship of credit cards, many users are offered cards by different banks, clubs, fraternal organizations and merchandising organizations. As a result it is common for people to have several different MasterCard® and VISA® accounts. This gives consumers the opportunity to take advantage of premiums such as frequent flyer miles and rebates offered by card sponsors. Having several different credit cards also enables consumers to take advantage of the credit limits on all their cards. While having many credit and debit cards is a benefit to consumers, it also requires them to carry several cards. It also exposes consumers to a greater risk if their wallet or purse, which includes all their credit and debit cards, is lost or stolen.

Most individuals also carry a number of other objects or cards which include machine readable indicia. These often include, for example, a health insurance card which indicates that a person is a member of a particular group insurance plan. Such cards are often magnetic stripe cards similar to credit cards. Alternatively such health insurance cards may include bar code indicia or other visible indicia which can be read with a scanner. Some health insurance cards include both visible and magnetic indicia. Persons who are members of a health insurance plan can identify themselves and their account to medical providers by showing their card which can be read or scanned by appropriate devices.

Persons also commonly carry other types of cards with visible or magnetic indicia. These may include for example, library cards, identification, or access cards, employee identification cards, student identification cards, driver's license cards, professional license cards and other types of cardlike objects. The magnetic or visible indicia on these cards is usually read when presented by the card holder to identify the person as an authorized user of services or facilities.

Another type of card which has been developed is the stored value card commonly referred to as a “smart card.” Stored value cards are similar to credit and debit cards in construction in that they include a front side which has raised identifying indicia which can be transferred to a carbon or carbonless multipart form. Such cards also commonly include a magnetic stripe including magnetic indicia which enables the card to work like any other credit or debit card. Stored value cards also include a programmable memory mounted on the card. Such programmable memory stores data representative of cash value. The value on the stored value card can be used like cash by the bearer to purchase goods or services. The stored value data on the card is also often encrypted or stored using schemes to prevent fraud or tampering therewith.

Stored value cards, like debit and credit cards, require the customer to interact with a stationary terminal device to utilize the card. For example, in the case of credit cards, credit is obtained when the customer presents their card to a merchant. The merchant (unless they process transactions manually) utilizes a point of sale or electronic funds transfer terminal to charge an amount to the customer's account and credit the merchant's account. Similarly the use of a debit card requires that the user present their card to an automated banking machine such as an ATM. The ATM operates to add or deduct amounts from the user's account as funds are deposited or received by the user. Similarly, stored value cards are used in connection with a stationary terminal device such as an electronic funds transfer terminal or automated banking machine which has the special capabilities to handle the particular type of stored value card used. The terminal modifies the value information stored in memory on the card to reflect the addition or subtraction of value represented thereon as transactions are conducted.

Having to use a stationary terminal device to conduct transactions is often inconvenient. Most merchants only accept certain types of credit cards. Locating an ATM that accepts the debit card of a person's financial institution can be difficult. Often the use of a “foreign” card at another bank's ATM results in a significant service charge. It is also difficult to find a merchant or ATM that can process stored value cards.

OBJECTS OF EXEMPLARY EMBODIMENTS

Thus there exists a need for an apparatus and method that can reduce the number of credit, debit and other cards or cardlike objects that a person must carry while still obtaining the benefit of carrying all such cards and objects individually.

There further exists a need for an apparatus and method which changes the character of the indicia on a card, such as a stored value card, so as to give a single card the ability to be used as a substitute for any one of a plurality of credit, debit, or other cards.

There further exists a need for an apparatus and method for carrying out transactions using a hand-held device that enables a user to remotely interact with a transaction terminal device, such as an automated banking machine, electronic cash register, electronic funds transfer terminal, or other financial system.

It is an object of an exemplary embodiment to provide a novel transaction apparatus.

It is a further object of an exemplary embodiment to provide a transaction apparatus which enables a user to use a single card which can be changed to conduct transactions using a plurality of the user's accounts.

It is a further object of an exemplary embodiment to provide a transaction apparatus which can be used in lieu of a plurality of credit, debit and other cards and objects.

It is a further object of an exemplary embodiment to provide a transaction apparatus that selectively displays visible indicia reproduced from a card or object, which visible indicia can be read by individuals or with a machine.

It is a further object of an exemplary embodiment to provide a transaction apparatus which can transfer value to or from a stored value card without the use of a stationary terminal device.

It is a further object of an exemplary embodiment to provide a transaction apparatus that is compact, portable and lightweight.

It is a further object of an exemplary embodiment to provide a transaction apparatus that can be configured in a manner which conforms to the shape of a conventional purse, wallet or keyfob and which may perform the functions thereof as well as the functions associated with carrying out transactions.

It is a further object of an exemplary embodiment to provide a transaction apparatus that authorizes operation based on a physical characteristic of an authorized user.

It is a further object of an exemplary embodiment to provide a transaction apparatus which includes a rechargeable power supply.

It is a further object of an exemplary embodiment to provide a transaction apparatus that is economical to produce and easy to operate.

It is a further object of an exemplary embodiment to provide a method for storing data about a plurality of accounts held by user in a single memory carried on a card.

It is a further object of an exemplary embodiment to provide a method for accessing data corresponding to plurality of accounts from the memory on a single card and selectively transferring such data to a magnetic stripe or visual display in connection with the card.

It is a further object of an exemplary embodiment to provide a method for selectively deleting and writing indicia corresponding to any one of a plurality of selected accounts onto the magnetic stripe of a single card.

It is a further object of an exemplary embodiment to provide a method for transferring value between a plurality of accounts and the memory of a stored value card without using a stationary terminal device.

It is a further object of an exemplary embodiment to provide an apparatus and method for carrying out transactions using a portable hand-held device that enables a user to remotely interact with a transaction terminal device.

It is a further object of an exemplary embodiment to enable a portable hand-held device to wirelessly transmit account information during a transaction.

It is a further object of an exemplary embodiment to enable a portable hand-held device to wirelessly transmit account information to an electronic check generating system.

It is a further object of an exemplary embodiment to enable a portable hand-held device to capture and transmit an image of a merchandise item identifier during the purchase of the item in a self-service checkout.

It is a further object of an exemplary embodiment to enable a portable hand-held device to capture and transmit an image of an automated banking machine identifier during a self-service cash withdrawal transaction.

It is a further object of an exemplary embodiment to enable a portable hand-held device to store electronic signature data in a memory thereof.

It is a further object of an exemplary embodiment to enable a portable hand-held device to wirelessly transmit electronic signature data during a transaction.

It is a further object of an exemplary embodiment to enable a portable hand-held device to capture and transmit an image of a paper check.

It is a further object of an exemplary embodiment to provide a check transaction system that can receive electronic check image data and electronic signature data sent from a portable hand-held device via wireless communication.

Further objects of exemplary embodiment will be made apparent in the following Detailed Description of Exemplary Embodiments and the appended claims.

Some of the foregoing objects are accomplished in an exemplary embodiment by an apparatus which includes a card which is of a type which includes a magnetic stripe supported thereon. The magnetic stripe may be of a conventional configuration and capable of having magnetic indicia recorded or written thereon. The card also includes a programmable memory which is supported on the card. The programmable memory preferably includes data representative of a plurality of accounts which the user has, such as various credit card accounts, debit card accounts and other accounts.

The apparatus further includes a portable terminal. The portable terminal is preferably sufficiently small so as to be readily portable. The terminal may be incorporated into a wallet, purse or keyfob. The portable terminal is releasably engageable with the card and includes a memory reading device which is operative to read the account data from the memory on the card. The portable terminal also includes an input device which enables the user to select data from the card memory corresponding to any one of the plurality of the user's accounts. The portable terminal preferably further includes a magnetic writing device which enables the user to write magnetic indicia corresponding to a selected account in the programmable memory to the magnetic stripe on the card. This enables the user to use the card in place of the dedicated credit card for that particular account. The portable terminal further preferably includes a magnetic stripe erasing device which enables the user to erase the indicia from the magnetic stripe so that the user may subsequently write data corresponding to a different account to the magnetic stripe when desired.

The card memory may further include data representative of a stored amount. This amount represents a monetary value which the user may use as a cash substitute. The portable terminal device preferably includes a communications device which enables the user to make the transfers between the accounts for which data is held in memory and the monetary amount stored on the card. In addition the monetary amount stored on the card may be transferred using stationary terminals such as ATMs and point of sale terminals which have stored value card capabilities.

The card memory may further include data representative of visual indicia which are found on a plurality of cards or other objects associated with the user. The visible indicia may include for example, bar code indicia representative of a user's account with a group health plan. Alternatively such visible indicia may include bar code or other indicia associated with a student I.D., employee access card, driver's license, or other types of objects. The visible indicia may also include a reproduction of the user's signature or other identifying characteristics. The portable terminal may include a display upon which the stored visible indicia may be reproduced in response to inputs to an input device. This enables visible indicia to be read with a machine from the display, which serves as a substitute for scanning off the card or object which the user is no longer required to carry. The card memory may also include data representative of icons or other graphics as well as data representative of instructions which are used by a processor in the portable terminal for carrying out transactions.

In some embodiments the portable terminal may further include object reading devices such as a magnetic stripe reader and a bar code scanner. Such devices are used to read magnetic indicia from the original credit and debit cards and to transfer such information may be stored in the programmable memory of the card used in connection with the invention. Similarly the object reader in the form of a scanner may read the visible indicia such as a bar code from an object so that such indicia may be stored in the memory on the card. The input device of the exemplary terminal is used to input designators which are stored in correlated relation with the data which corresponds to the various types of magnetic stripes and bar codes. The memory on the card may further include data representative of an access code as well as instructions to minimize the risk that an unauthorized user may gain access to the data stored in memory. Alternatively, the card memory may further include data uniquely associated with the user such as fingerprint data or other biometric data. The terminal may include a reader for reading such data to assure that the user is the person authorized to use the card.

Some exemplary embodiments enable a user to carry a single card which the user may use in lieu of a plurality of cards or other objects which the user would otherwise be required to carry. Some exemplary embodiments further enable a user to transfer amounts between a stored value card and their various accounts without having to use a stationary terminal such as a point of sale terminal or an automated banking machine.

Other exemplary embodiments may be operated to carry out other types of banking or other transactions. Of course these approaches are exemplary.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 shows a top plan view of an exemplary form of a transaction apparatus including a multifunction card and a portable terminal.

FIG. 2 shows an isometric view of the portable terminal of the type shown in FIG. 1.

FIG. 3 shows an isometric view of the portable terminal shown in FIG. 2 in combination with a wallet structure.

FIG. 4 shows a schematic view of the components of the portable terminal as well as a system through which the portable terminal communicates.

FIGS. 5-14 show views of exemplary function selection screens through which a user may select functions to be executed using the transaction apparatus.

FIGS. 15-24 show examples of screens displayed on the portable terminal and associated with the logic flow for adding a new card type to the programmable memory on the multifunction card.

FIGS. 25-31 show a series of screens displayed on the programmable terminal and associated with the logic flow for deleting a card from the programmable memory on the multifunction card.

FIGS. 32-42 show screens displayed on the portable terminal and associated with the logic flow for writing selected card information to the magnetic stripe of the multifunction card.

FIGS. 43-52 show screens displayed on the portable terminal and associated with the logic flow for adding a bar code to the programmable memory on the multifunction card.

FIGS. 53-56 show screens displayed by the programmable terminal and associated with the logic flow for displaying a bar code corresponding to information stored on the programmable memory of the multifunction card.

FIGS. 57-61 show screens displayed on the portable terminal and associated with the logic flow for deleting a bar code from the programmable memory on the multifunction card.

FIGS. 62 and 63 show screens displayed on the portable terminal and associated with the logic flow for checking the stored cash value represented by the data stored in the programmable memory on the multifunction card.

FIGS. 64-74 show screens displayed on the portable terminal and associated with the logic flow for transferring cash value to the programmable memory on the multifunction card.

FIGS. 75-88 show screens displayed on the portable terminal and associated with the logic flow for transferring value from the programmable memory on the multifunction card to a selected user account.

FIGS. 89-95 show screens displayed on the portable terminal and associated with the logic flow for assuring that a user is authorized to use the terminal.

FIG. 96 shows an electronic check-generating arrangement.

FIG. 97 shows an example of an electronic check format prior to adding entries.

FIG. 98 shows an example of a completed electronic check.

FIG. 99 shows an exemplary form of a transaction payment arrangement for an item purchase.

FIG. 100 shows steps included in an exemplary self-service checkout during an item purchase.

FIG. 101 shows steps included in an exemplary cash withdrawal transaction.

FIG. 102 shows an exemplary form of an arrangement for a cash withdrawal transaction.

FIG. 103 shows an exemplary form of an arrangement enabling a wireless check deposit transaction.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring now to the drawings and particularly to FIG. 1 there is shown therein a transaction apparatus of one exemplary embodiment generally indicated 10. The apparatus includes a multifunction card 12 and a portable terminal 14. The exemplary portable terminal and multifunction card are releasably engageable in a manner later discussed to enable carrying out a plurality of functions and transactions.

The multifunction card 12 may have the dimensional configuration of conventional credit and debit cards. It includes a magnetic stripe 16 on a rear face thereof. The magnetic stripe is capable of holding magnetic indicia similar to the magnetic stripes on conventional debit, credit and similar cards. Like the stripes on such cards, magnetic stripe 16 is also preferably capable of having the magnetic indicia thereon erased with an erase head or similar device, and having new indicia recorded or written thereon.

Multifunction card 12 further includes a programmable memory 18 supported thereon. Programmable memory 18 includes a plurality of electrical or other contacts 20 which are accessible on the front of the card. In the exemplary embodiment the card and programmable memory are a type and configuration such as is commercially available from a number of suppliers including Diebold, Incorporated, the Assignee of the present invention. The contacts 20 and the magnetic stripe 16 are positioned in predetermined locations on the card to enable the card to be used with a variety of devices. Of course in other embodiments nonconventional orientations and configurations of the magnetic stripe and the programmable memory contacts may be used.

As later explained, multifunction card 12 is designed to be used as a substitute for a plurality of varied types of credit, debit and other cards. However in some embodiments, card 12 may include information on the face or rear thereof so as to identify the particular user to whom the card belongs, an issuer of the card, as well as other data. In some embodiments, the front side of the card may include raised numbers and letters corresponding to a particular credit card account and from which an impression may be made onto a carbon or carbonless form. For example information on the face of the card may correspond to a user's MasterCard®, VISA®, American Express®, Discover®, Novus®, Diner's Club® or other card. This enables the exemplary multifunction card to be used as the user's regular credit card when purchasing goods or services in establishments that do manual processing of credit card transactions. Of course while in the embodiment discussed, conventional credit card indicia may be included on the front of the multifunction card, in other embodiments special indicia may be presented on the card.

Portable terminal 14 includes a display 22 on the front face thereof. In one exemplary embodiment display 22 is an LCD type display or other suitable display that may be used for displaying words, graphics and other visible indicia in a manner later explained. Portable terminal 14 further includes at least one input device that may be used to input information by a user. In the embodiment shown, the input device includes a manual input device which consists of a plurality of buttons. These buttons include a scroll up button 24 and a scroll down button 26. These scroll up and scroll down buttons 24, 26 which may be referred to hereafter as “up button” and “down button” respectively, are pressed by a user to selectively display items on the display.

The input device of the terminal further includes an enter button 28. The enter button is used in a manner later explained to initiate execution of a function corresponding to the information displayed on display 22. Terminal 14 further includes an on/off button 30. Button 30 is preferably used in the manner later explained to initiate a transaction or to signify completion of a transaction and to turn the terminal off. It should be understood that the input device comprising manual input buttons 24, 26, 28 and 30 are exemplary only and that other embodiments may incorporate other arrangements of manual and other types of input devices.

As shown in FIG. 2 portable terminal 14 further includes a slot 32. Slot 32 extends through the body of the terminal and is sized to enable multifunction card 12 to be passed therethrough. An exemplary embodiment of the portable terminal includes an external object reading device 34 positioned on the exterior of the terminal body. In one embodiment the external object reading device may include a bar code reader which enables reading bar code off of cards and other objects so that information corresponding to such visible indicia may be read and stored in the memory of the multifunction card.

The components which comprise an exemplary embodiment of the portable terminal 14 are schematically indicated in FIG. 4. Terminal 14 includes at least one onboard processor 36 which is in operative connection with the other components of the portable terminal. Processor 36 is also in connection with at least one data store or memory 38. Memory 38 may be a volatile or nonvolatile memory which is capable of holding and recovering data which is received from or delivered to the processor 36.

Processor 36 is in operative connection with other components within the portable terminal 14. These components are represented schematically in FIG. 4 and are indicative of hardware and software components operatively connected with the processor. These components include the display component 40. Display component 40 includes display 22 as well as the other hardware and software devices which enable the display to provide visual outputs in response to processor 36. A manual input component 42 corresponds to a manual input device which in the described exemplary embodiment of the terminal includes buttons 24, 26, 28 and 30. Component 42 includes the hardware and software which enables communicating the inputs from the user through the buttons to the processor so that the processor may carry out the functions of the portable terminal in response thereto.

Portable terminal 14 further includes a magnetic stripe read and write component 44. In the exemplary embodiment this component includes magnetic heads which are selectively operated to read magnetic indicia from the stripe of a card as well as to write magnetic indicia thereto. It should be understood while component 44 shows these functions as combined, it actually represents two separate functions. These are the functions of reading magnetic indicia from a card and writing magnetic indicia to a card stripe. These functions may be separate in other embodiments. Component 44 includes the necessary hardware and software interfaces to the processor 36 to carry out these functions in a manner later discussed. A magnetic stripe erase component 46 is further indicated schematically as part of the portable terminal FIG. 4. This magnetic stripe erase component includes an erase head or other comparable device as well as the hardware and software devices that may be used to selectively erase or otherwise clear magnetic indicia from the magnetic stripe of the multifunction card. In some embodiments the magnetic stripe erase component may be combined with the components which function to read and write indicia to the magnetic stripe of cards. In the exemplary embodiment the heads, which operate to read, write and erase magnetic stripe indicia from credit cards are positioned in the interior of terminal 14 and adjacent to slot 32. This enables the reading, writing and erasing functions to be carried out as a card is passed manually therethrough. It should be understood however that in other embodiments other methods may be provided for reading, writing and erasing magnetic stripe data.

As shown in FIG. 4 portable terminal 14 further includes a card memory read/write component 48. Component 48 serves to read and write data to the programmable memory 18 on multifunction card 12. In the embodiment shown, the memory reading and writing functions are combined. However it should be understood that these are separate functions and may be carried out through separate arrangements of hardware and software. Component 48 also includes electrical contacts which are positioned adjacent to slot 32 in the portable terminal. These electrical contacts are configured to engage the contacts 20 which enable communication with the programmable memory 18 of the multifunction card 12. Component 48 further includes the hardware and software devices required to read data from and write data into the programmable memory on the card.

Portable terminal 14 in the embodiment shown includes a scanner component 50. Scanner component 50 includes bar code scanner 34 or similar device for reading visible indicia from an object. Component 50 further includes the hardware and software devices necessary to communicate with processor 36 and the other components of the portable terminal. It should be understood that while the embodiment of the portable terminal shown includes object reading devices for reading magnetic stripe indicia, visual indicia and indicia stored in the programmable memory of cards, other embodiments may include other types of object reading devices. Likewise other types of object writing devices may be included depending on the particular uses made of the portable terminal.

For example in some embodiments scanner 50 may be a scanner suitable for scanning and reading written indicia. This may include the signature of an authorized user. Data representative of such a signature may be input and produced with the scanning device and stored in the programmable memory of the card. The signature may then be reproduced on the display or transmitted to a remote location for purposes of identifying the authorized user or the authenticity of a transaction.

It should be understood that data representative of a signature can also include an electronic signature, such as a digital signature or a digital certificate that is associated with the user and serves to identify the user. The stored electronic signature can be used as a legally binding signature. Thus, a memory of a hand-held device can include electronic signature data representative of a legally binding user-identifying (written) signature.

Alternative embodiments may include a biometric reader component 47. The biometric reader component may include hardware and software components that can be used to sense a characteristic of a user which uniquely identifies the person as an authorized user. In some embodiments the biometric reader component 47 may include a fingerprint reading device. Alternatively, the reader may include an audio input device which can be used to identify a user by voice. Alternatively, visual readers for identifying unique visible features, or a combination of identifying features of the user may be used. The programmable memory of the card may include data representative of the identifying biometric features of the authorized user or users. This stored data is used to enable authorized users of the card to operate the terminal with the card while others are prevented from such operation.

Terminal 14 in the embodiment shown includes a communications component 52. Communications component 52 may include a modem or other communications devices that are selectively operative under the control of the processor to communicate with other systems and devices located outside and preferably remote from the portable terminal. In some embodiments the communications component 52 may include a connector for communicating through a network 54 to a computer or similar device at a remote location, schematically indicated 56. A connection to the remote location may be selectively made based on an address which is used by the communications component 52 to selectively communicate to the desired remote location.

In one exemplary embodiment the communications component includes a wireless type modem. In such an embodiment network 54 includes a cellular phone network which enables communicating to a transaction network. This is done through computers located at one or more remote addresses which are accessed via a phone number which serves as the address. Alternatively communications component 52 may communicate through a conventional telephone access port which includes a telephone connector on the body of the portable terminal. In other embodiments the communications network 54 may include communications intranets or public networks such as the internet, which selectively enable communication by the portable terminal to selected nodes in the network. In such environments the addresses to which the portable terminal communicates are the addresses of the network nodes which may properly receive transaction messages.

As shown in FIG. 4 the portable terminal includes a power source schematically indicated 58. Power source 58 may include any suitable source of power for the components in the portable terminal. Suitable power sources may include rechargeable or nonrechargeable batteries or connectors to external power sources such as the cigarette lighter of a vehicle. The power source 58 may further include a renewable energy source, such as a solar panel 60 which may be used to provide energy from the sun or other available light source.

As shown in FIG. 3 portable terminal 14 may be integrated into a carrier 62 which may take the form of a wallet such as that shown in FIG. 3. Alternatively the carrier may be of a type which performs other functions such as those of a purse, personal digital assistant (PDA), notebook computer, keyfob, pager, mobile phone (e.g., cellular phone, satellite phone, wireless VOIP, etc.) or other component carried by a user.

As demonstrated by the carrier 62 shown in FIG. 3, the portable terminal 14 may be integrated into a wallet type device which includes spaces for holding the multifunction card as well as other credit cards and identification cards. The carrier may further include spaces for holding cash, keys and other items in a manner of a conventional wallet. Similarly the carrier 62 may include a supporting surface for the solar panel 60 as well as other features and components which may be desired by a user. The small size and portability of the terminal 14 of the exemplary embodiment enables it to be integrated into any one of a plurality of carrier type devices while still enabling such devices to carry out their traditional and/or nontraditional functions.

In an exemplary embodiment, the portable terminal 14 operates to perform a plurality of functions. These functions are carried out based on instructions which may be included in whole or in part in the programmable memory 18 of the multifunction card 12. The processor 36 of the portable terminal 14 carries out instruction steps in response to the inputs provided by the user of the card and portable terminal. In exemplary embodiments, the memory 38 in connection with the portable terminal may also include certain programmed instructions which are permanently stored therein so as to facilitate certain operations of the terminal. The programmable memory on the card may also include the data representative of accounts, indicia, access codes, monetary values, graphics, location data and other information which is used in the operation of the apparatus.

In one exemplary embodiment the functions which are enabled to be executed include adding a new card to the memory. This is accomplished by reading information off of a magnetic stripe of an existing dedicated card with the portable terminal and storing it in the programmable memory of the multifunction card. This information can be recovered later and the magnetic indicia written on the magnetic stripe of the multifunction card.

Another function executed in an exemplary embodiment is to selectively delete card data from the memory on the card. This could be done for example when a user no longer desires to use the multifunction card as a substitute for the dedicated card.

Another function or an exemplary embodiment is to write the indicia stored in the memory of the magnetic stripe card onto the magnetic stripe of the multifunction card or perhaps another magnetic stripe card.

Another function which is carried out in an exemplary embodiment is to add visual indicia such as a bar code to the memory of the multifunction card. Likewise, another function is to delete a bar code or other visual indicia stored in the card memory. A further function is to display one of the selected visual indicia such as a bar code or a user's signature which is stored in the memory of the card.

Other functions of embodiments may be to carry out financial transactions without the need to use a stationary terminal. Such functions include checking the cash equivalent value stored in the memory of the multifunction card. Another transaction is to transfer value stored in the memory of the multifunction card to another account. The transfer of funds from an account to the programmable memory on the multifunction card so that it can be used as a cash equivalent therefrom is a further transaction which may be carried out by embodiments.

The various functions which the described embodiments of the transaction apparatus may carry out and the logic associated therewith are now explained with reference to FIGS. 5-95 which disclose transaction steps carried out by a user in executing the various functions. In the embodiment described, the programmable memory 18 on the card includes data representative of prompt messages. When the multifunction card 12 is extended in the terminal so that the contacts 20 thereon can be read by the connectors of the card memory read/write component 48, the stored instructions which include the prompt messages and the associated logic may be read. The processor 36 then operates the display component 40 to selectively display prompt messages on the display 22 of the terminal 14.

In an exemplary embodiment, security measures are provided to assure that only a proper authorized user is enabled to operate the system. This may be accomplished by requiring a user to input an access code which is known only to them before the terminal functions may be accessed. This access code may be programmed in the programmable memory 18 using a separate terminal device. Alternatively provisions may be made for executing a software program which enables the user to select their access code the first time that the multifunction card is used in connection with the portable terminal. This program may be stored in the memory of the terminal or on the card. In alternative embodiments the card holds biometric data related to authorized users. The biometric data of a user is input through the biometric reader 47. For example, when the reader 47 includes a fingerprint reader a user may place a predetermined finger adjacent to the reader. If the input data corresponds to an authorized user, the terminal may be operated. In some embodiments the user may scan a single fingerprint to gain access. The particular finger selected may be one chosen by and known only to the user. In other embodiments a plurality of fingerprints from one or both hands, may need to be read in a selected order. This may increase the security level.

One form of the logic flow associated with assuring that an authorized user uses the apparatus is demonstrated with reference to FIGS. 89-95. In initiating the operation of the terminal the user is first required to place the multifunction card 12 in the slot 32 of the portable terminal 14. The card is preferably inserted into the slot in a manner which enables the electrical connectors associated with component 48 to engage the contacts 20 on the card. The slot corresponds closely to the width of the card and serves as a guide for positioning the card as it is passed therethrough. A spring loaded finger or other releasable stop may be positioned adjacent the slot to stop the card at the proper depth inside the terminal to engage the contacts. The user preferably knows how to insert the card into the slot in order to achieve this connection based on experience. Alternatively, instructions printed on the face of the card and/or the terminal may instruct the user in how to insert the card. The memory 38 in the terminal 14 may also include data representative of prompts which are displayed on the screen 22 which instruct the user on how to properly insert the multifunction card.

For purposes of this example, the sign on process for a user preferably begins with the display screen 100 shown in FIG. 89. Screen 100 is a blank screen which indicates that the terminal is off. When the user presses the on/off button 30, a screen 102 as shown in FIG. 90 is displayed. Screen 102 preferably includes a prompt which instructs the user to enter their access code.

The entry of the user's personal access code is demonstrated in FIG. 91-94. In entering the access code of the embodiment shown, the user starts with a screen 104 shown in FIG. 91. Screen 104 includes seven spaces in which the user may input alphabetical or numerical characters which make up the access code. Pressing the up button 24 when screen 104 is displayed begins a scrolling process in the first space for input of the access code. This causes the screen to change the first space from a blank space to the letter “a.” This is shown in FIG. 92 and is represented by a screen 106. Pressing the up button 24 again (or continuing to hold it) changes the first character to the letter “b” as indicated by a screen 108 in FIG. 93. The user may move to subsequent letters by holding or repeatedly pushing the up button, thus scrolling through the alphabet and/or numerical values until the desired first character of the access code is displayed in the first space. Of course the user may scroll backwards by pushing the down button. In this example the letter “b” is the first character of the user's access code and the user indicates that fact by pressing the enter button 28 as schematically indicated in FIG. 93.

After the first character is entered, the user selects the second character of the access code in a similar manner. This is again done by selectively pressing the up and down buttons 24 and 26 until the desired alphabetical or numerical character is displayed in the second space. Once the desired character is displayed in the second space the user presses the enter button 28 to move to the next character. This is represented by screen 110 in FIG. 94. In the embodiment shown the user may enter up to seven characters as the access code. However in the exemplary embodiment the user may not require seven characters and may simply choose to leave certain characters as blanks. In the embodiment shown the user's access code is the five letter word “broom” and the two final characters are simply left blank. After the user indicates this by pressing the enter button 28 to leave blanks for the last two characters, a screen 112 shown in FIG. 95 is displayed.

In screen 112 the user is given the option of either changing their access code or proceeding to a main menu. The user may select the option of changing their access code by pressing the up button 24. This will lead the user through a series of prompt screens to enter a new access code. This series of prompt screens may lead the user through appropriate steps in accordance with the instructions stored in the memory on the card or in the terminal so as to enter a new code. In alternative embodiments a biometric identifier may be used as an access code. In such a system the user would be prompted through the display 40 to input identifying biometric data to the biometric reader 47. For example, if the biometric reader is a fingerprint reader, the user may be prompted to bring a finger that they have preselected adjacent to the reader. The reader 47 would read the fingerprint and produce suitable signals to compare the input data to the data stored on the card. If the input data corresponds to an authorized user, the user is authorized to further operate the terminal. The user may be given the option to change the biometric data, such as to add data for another authorized user, or to change the finger used for providing fingerprint data in the accessing process or to use a sequence of fingerprints to obtain access.

Alternative embodiments may use other processes and criteria to access the card data. Once the user has properly gained access they may be given the option of changing the access code or other sign on procedures. For purposes of this example however the user chooses the option of displaying a main menu which is selected by pressing the down button 26 as indicated schematically in FIG. 95.

The prompt messages in FIGS. 5-13 represent a main menu showing the various transactions that can be conducted with the apparatus. FIG. 5 shows a screen 64 which includes a prompt which queries a user as to whether they wish to add a new card to the memory on the multifunction card. In the embodiment shown the fact that additional options are available by scrolling up or scrolling down are indicated by a dual pointed arrow adjacent to the text displayed. By pressing the down button 26 as indicated schematically, the user may move to screen 66 shown in FIG. 6. This screen indicates the availability of the selection of the transaction to delete a card from memory. Pressing the down button again causes the display of the terminal to provide the screen 68 shown in FIG. 7. This screen provides a prompt corresponding to the transaction in which data stored in the programmable memory of the multifunction card is written to a magnetic stripe.

Scrolling with the down button 26 from screen 68 causes screen 70 in FIG. 8 to be displayed. Screen 70 includes a prompt corresponding to a transaction in which bar code is added to the programmable memory of the multifunction card. FIG. 9 discloses a screen 72 which may be displayed by scrolling with the down button from screen 70. Screen 72 corresponds to deleting a bar code from the memory on the multifunction card. Screen 74 shown in FIG. 10 includes a prompt to the user which enables selection of a transaction in which bar codes stored in the memory may be displayed.

FIG. 11 shows a screen 76 which includes a prompt which corresponds to a transaction in which a user may check the cash value represented by data stored on the programmable memory of the card. Such data corresponds to a cash value which enables the multifunction card to be used in a manner identical to cash. From FIG. 11 a user may scroll to a screen 78 shown in FIG. 12 which prompts the user to select an available transaction in which value may be transferred from the stored value on the multifunction card. FIG. 13 shows a screen 80 with a prompt which enables the user to select a transaction in which value will be transferred onto the memory of the multifunction card.

In the exemplary embodiment the prompts in the screens of the main menu enable scrolling back to prior screens either by pushing the up or down buttons. As shown in FIG. 13 by pressing the down button from screen 80 the user causes the first screen 64 to again be displayed. Of course the user can move up and down by pressing buttons 26 and 24 which enables them to select any of the transactions available in the main menu. For purposes of a first example if a user wishes to add a new card to memory they can manually depress the enter button 28 of the input device as represented schematically in FIG. 14. Pressing the enter button 28 from screen 64 causes the processor 36 to begin executing the instructions stored in the programmable memory of the card and/or memory 38 of the terminal to add a new card into the memory.

This routine begins as schematically indicated in FIG. 15 with screen 64. FIG. 15 is identical to FIG. 14, the screen being repeated herein for the sake of clarity. In response to a user pressing the enter button 28 a screen 80 of the type shown in FIG. 16 is presented. This screen includes a screen prompt which prompts the user to identify the type of card to be added. The memory on the multifunction card or the terminal preferably includes data representative of icons of major card types. These may include for example the icons representative of the logos for MasterCard®, VISA®, American Express®, Novus®, Discover® and/or other common card types which a user is likely to want to enter. In screen 80 a MasterCard® logo is displayed by way of example, with an arrow indicating that other selections are available by pressing the down button 26.

By pressing the down button from screen 80, screen 82 shown in FIG. 17 is displayed. This prompt screen includes the VISA® designator and logo, and allows the user to indicate that the card they are about to add is a VISA® card. The arrows adjacent to the VISA® logo displayed on the screen pointing both up and down indicates that the user may press the up or down buttons to display other card types. For purposes of this example it will be assumed that the card that the user wishes to add to the memory is a VISA® card. To indicate this, the user presses the enter button 28 as indicated in FIG. 17.

In the operation of the described embodiment the user is now requested to input a card identifier to distinguish the particular type of VISA® card which they are about to add to memory. This is done through a screen 84 which prompts a user to input a plurality of alphabetical or numerical characters which serve as a designator to identify the particular card. As shown in FIG. 18 the interface described enables a user to select letters of the alphabet to identify this particular type of card. For example by pressing and holding the up and down buttons the user is enabled to scroll through letters of the alphabet until they find the first letter of the designator they wish to input. When the letter is displayed, they can enter that as the first letter of the designator by pressing the enter button 28. They can then move on to the next letter of the designator selecting it with the up and down buttons. When a space is desired to be entered the user can leave the blank space which is preferably included as the initial option. In the case of screen 84 the designator is BP_VISA which may be a designator for a VISA® card provided by British Petroleum. Once the user has entered their desired designator any leftover spaces may be simply left blank by repeatedly pushing the enter button 28. After all the spaces are filled the input of the designator is complete.

Screen 86 shown in FIG. 19 indicates the input of an alternative designator. In this screen the designator input is “KEY_BANK_ATM.” This may indicate for example that the card which is being input is the debit card which corresponds to the user's account at Key Bank. It should be understood that the particular designator used is purely in the discretion of the user and the user is free to use highly descriptive terminology or a secret code which is known only to them to identify their various cards. In the exemplary embodiment sufficient security is provided for accessing the memory on the multifunction card that the user is enabled to use descriptive terminology as a designator if they wish to do so.

Once the designator has been input, the instructions read from the memory on the card or in the terminal causes a screen 88 shown in FIG. 20 to be displayed on the display 22. Screen 88 includes a prompt message to remove the stored value card from engagement with the portable terminal 14. Once the terminal senses that the stored value card has been removed by the disengagement of the contacts thereon with the portable terminal, a screen 90 as shown in FIG. 21 is displayed. Screen 90 includes a prompt for the user to pass their original BP_VISA card through the portable terminal. As shown in the exemplary embodiment the display further visually instructs the user on how to pass the original card through the terminal so that it is properly read by the magnetic stripe reading device. In response to the screen 90 a user preferably passes their original card through the slot 32 in the portable terminal. On sensing the proper reading of the magnetic stripe on the card, screen 92 shown in FIG. 22 is displayed. Screen 92 indicates to the user that the stripe has been properly read and that they should now reinsert the multifunction card face up.

It should be understood that the stored instructions may include provisions for a time out routine. In the event that the user fails to proceed to the next step at any point in the transaction, the time out returns the terminal to the main menu or to an off condition. Such a time out routine or failure routine may be accompanied by appropriate user prompts to advise the user why the terminal has proceeded to shut itself off or return to the main menu.

If from screen 92 the user reinserts the multifunction card into the slot 32, the logic flow next moves to display a screen 94 shown in FIG. 23. Screen 94 prompts the user as to whether they wish to add the BP_VISA card to the memory of the multifunction card. As shown in FIG. 94 the screen includes the default response which is “yes” with an arrow adjacent thereto which indicates to the user that they may change to other than the default response by pressing the down button 26. In this example the user wishes to add the card to the memory of the multifunction card, in which case the enter button 28 is pressed while screen 94 is displayed. This results in screen 96 shown in FIG. 24 being displayed, which indicates that the function has been carried out successfully. The user may press button 30 once to turn the terminal off or twice to return to the main menu.

The logic associated with deleting information concerning a card from the memory of the multifunction card is now demonstrated with reference to FIGS. 25-31. This process begins with a screen 98. Screen 98 corresponds to screen 66 shown in FIG. 6 of the main menu. To choose this operation the user presses the enter button 28 as schematically indicated in FIG. 25. This causes the screen 114 shown in FIG. 26 to be displayed.

Screen 114 prompts a user to select which of the cards that are stored in the programmable memory on the card is to be deleted. The cards are referenced through displayed the designators which have been previously input by the user. Screen 114 displays the first one of these cards which has the designator “KEY_BANK_ATM.” The arrows next to the designator indicate that the user may select other cards by pressing the up or down button. As shown in FIG. 26 the user presses the down button 26 which causes the display to move to a screen 116 shown in FIG. 27. Screen 116 displays the next card designator which is “MBNA_MC” which the user has previously input to designate an MBNA MasterCard. Assuming that the user wishes to select this card as the card to be deleted, they press the enter button 28 as schematically indicated in FIG. 27. Pressing the enter button from screen 116 causes a confirmation screen 118 shown in FIG. 28 to be displayed. This screen prompts the user to confirm that they want to delete that card. An arrow displayed next to the default option which is “yes” advises a user that they can change to another option by pressing the down button.

In screen 118 shown in FIG. 28 if the user presses the enter button 28 as schematically indicated therein the terminal next displays screen 120 shown in FIG. 29 in which the terminal outputs an indication that the card has been deleted.

Alternatively if from screen 118 shown in FIG. 28 the user presses the down button 26 as schematically indicated in FIG. 30, a screen 122 shown in FIG. 21 as displayed. Screen 122 shows that the selected card will not be deleted and pressing the enter button 28 from this screen will return the terminal to the main menu. Alternatively, pressing the up button 24 in the screen 122 returns to the screen 118. It can be appreciated that the stored programmed instructions enable a user to correct errors that are made in the course of operating the input devices on the terminal.

The execution of the steps which enable the exemplary apparatus to configure the multifunction card so it may be used as a substitute for any one of a plurality of original magnetic stripe credit or debit cards, is now explained with reference to FIGS. 32-42. The logic executed to carry out this function begins with a screen 124. Screen 124 is identical to screen 68 of the main menu. As shown schematically with reference to FIG. 32, pressing the enter button 28 from screen 124 causes a screen 126 shown in FIG. 33 to be displayed. Screen 126 includes a prompt requesting that the user identify the card in the memory whose identifying indicia is to be transferred to the magnetic stripe of the multifunction card. The user is enabled to scroll through the designators for the cards stored in memory by pushing the buttons 24 and 26.

As indicated by a screen 128 in FIG. 34, the user selects the card data stored in correlated relation with the designator “BP_VISA” in the memory of the multifunction card by scrolling with the buttons until this designator is displayed and then pressing the enter button 28.

In response to the selection of the particular card in memory the indicia corresponding to the magnetic indicia on the “BP_VISA” card which has been stored in the memory of the multifunction card is transferred to the memory 38 of the terminal. Similarly the instructions which the processor will need to execute to complete the steps of writing the magnetic indicia onto the multifunction card are transferred temporarily into the memory of the terminal so that the steps may be completed with the memory of the multifunction card disengaged from the terminal.

Once the necessary information has been loaded into the memory of the terminal a screen 130 shown in FIG. 35 is displayed. Screen 130 includes a prompt instructing the user to remove the multifunction card from engagement with the portable terminal. Upon sensing the disengagement of the multifunction card the screen 132 shown in FIG. 36 is presented by the portable terminal. Screen 132 includes a prompt for the user to pass the stored value card through slot 32 in the terminal. The prompt preferably includes instructions on the orientation of the card and the magnetic stripe. This is done so that any indicia that has been previously been recorded on the magnetic stripe of the multifunction card is erased.

In response to screen 132 the user preferably passes the multifunction card through the portable terminal such that the magnetic stripe passes through an area of the slot in connection with an erase head which clears the magnetic stripe. Upon sensing that the card has been passed through the terminal, a screen 134 shown in FIG. 37 is displayed by the portable terminal. The sensing can be done with the spring loaded finger in the slot or with another suitable stripe or card sensing device in the slot.

The portable terminal then further operates under control of the processor and the instructions stored in its memory 38 to display the screen 136 shown in FIG. 38. Screen 136 includes a prompt which includes an instruction for the user to now pass the multifunction card through the slot 32 in a different orientation so that the magnetic indicia corresponding to the selected BP_VISA card may be written to the magnetic stripe of the multifunction card. It should be noted that in the embodiment shown, the orientation of the card for erasing the stripe and for writing indicia to the stripe are different. This is done because a different head is used for erasing as opposed to reading and writing. In alternative embodiments a single head may perform both the erasing and writing functions or alternatively multiple heads may be aligned in the slot so that the card is passed in the same manner to carry out both the erasing, reading and writing functions.

The exemplary embodiment includes appropriate sensors and instructions so that if the multifunction card is inserted wrong, the screen such as screen 138 shown in FIG. 39 is displayed. This may be done based on the sensing finger sensing the card but the magnetic head not sensing the stripe which indicates an improper card orientation, or in other ways. This screen is displayed so that if the user begins to insert the card improperly they are prompted to make a correction. Removal of the card may return the terminal to the screen 136 or may abort the instruction sequence such as by displaying the screen 140 shown in FIG. 42.

If however the card has been passed through the portable terminal properly a screen 142 shown in FIG. 40 is presented. This screen indicates that the indicia corresponding to the magnetic indicia on the original BP_VISA card has been written to the magnetic stripe on the multifunction card. From screen 142 the terminal then moves to display a screen 144 shown in FIG. 41 indicating that the transaction is complete and the user may turn off the portable terminal by pressing the on/off button 30.

If for any reason an error has been sensed in carrying out the transaction, a screen 140 shown in FIG. 42 preferably appears. The user may then select either the option to retry the transaction to write the material to the card by pressing the up arrow, or may quit by pressing the down arrow which will return the terminal to the main menu. Alternatively, in an exemplary embodiment, pressing the on/off button 30 from screen 140 is also a suitable way to end the transaction.

Assuming that the selected card data has been written to the magnetic stripe on the multifunction card 12, the user may now take the multifunction card and present it to any standard transaction terminal which accepts that type of magnetic stripe card. For example if a user wishes to charge goods or services to their BP_VISA account, they may present that card to a merchant who passes the stripe through a point of sale terminal, electronic cash register or other appropriate terminal. This will result in the user's BP_VISA account being charged for those goods or services. Similarly if a user wishes to get cash out of an ATM and charge it to their BP_VISA account they may present the multifunction card to an ATM. The ATM may be operated in the usual manner as one would operate it using the original BP_VISA card.

The multifunction card may be configured to include the user's signature in a space on a face of the card. This would enable a merchant accepting the card to compare a user's signature on a transaction receipt to the signature on the card. Alternatively, or in addition, a reproduction of the user's signature may be stored in the memory on the card. The user could display a reproduction of their signature on the screen of the terminal so that a merchant could verify the signature. Alternatively, user identifying electronic signature data may be transmitted through a communications device such as modem or infrared transmitter, or otherwise read from the terminal into the merchant's system, so that the merchant may store the electronic signature data from the terminal with the transaction data.

In alternative methods of operation the merchant may use an electronic signature capture system for transaction receipts. In such a system the merchant's computer system may include software to compare the signals generated by the user's actual signature on an electronic signature pad to the signature data stored on the card. Such comparisons would provide an indication where the signature data does not correspond to a sufficient degree, which may suggest that the user of the card is not the authorized user.

After completing a transaction the user may choose to leave the magnetic stripe data for the selected card on the stripe. Alternatively the user may choose to change the magnetic stripe to a different card. For example if the multifunction card has embossed data on the front corresponding to one particular card, the user may choose to return the magnetic stripe indicia to correspond with the indicia embossed on the front of the card. Alternatively the user may choose to completely erase the magnetic stripe data as may be done by returning the multifunction card to the terminal and repeating the steps associated with writing card data to the magnetic stripe up through the point in the steps where the magnetic indicia is erased from the magnetic stripe. The user may then exit the routine by pressing the on/off button leaving the card with a blank stripe. In embodiments where no information is embossed on the front of the multifunction card users may find this advantageous as the multifunction card is of absolutely no value as a credit or debit card unless the access code has been appropriately entered.

Some exemplary embodiments may also be used to selectively record and display visible indicia such as a bar code. These functions are graphically represented and the logic flow associated therewith explained with reference to FIGS. 43-61.

FIG. 43 shows a screen 146. Screen 146 is identical to screen 70 shown in FIG. 8 of the main menu. To select this function a user presses the enter button 28 from the main menu as schematically indicated in FIG. 43. From screen 146 a screen 148 is presented as shown in FIG. 44. Screen 148 prompts a user to enter a bar code ID or designator corresponding to a bar code that is to be read from an object. This is done in a manner similar to the entry of designators for credit or debit cards or entry of the access code. The user scrolls through alphabetical and numerical characters by pressing the up and down buttons 24 and 26 as represented by screens 150 and 152 shown in FIGS. 45 and 46 respectively, until a desired character is displayed in a desired position. When the desired character is reached, the enter button 28 is pressed at which point the user moves on to the next character.

For purposes of this example it will be assumed that the user is going to scan a bar code off of a medical benefits identification card which the user has chosen to designate “BLU_CROSS ID.” This is represented in FIG. 47 by a screen 154. The user indicates that they have completed the designator by pressing the enter button 28 a sufficient number of times to null any remaining spaces in the available spaces entry for characters.

Once the terminal is advised that the entire ID has been entered, the logic flow operates to display the prompt shown in screen 156 and FIG. 48. This prompt instructs a user to scan the bar code off the object such as their Blue Cross® identification card. The process also operates to initiate operation of the scanner component 50. The user then brings their identification card in proximity to the scanning device 34 on the housing of the portable terminal and the processor operates in response to the stored instructions to capture the bar code data on the card. When the bar code data has been captured, the screen 158 shown in FIG. 49 is displayed. As previously discussed, if the bar code cannot be read or is not read in a sufficient time, the instructions may include provisions for returning the terminal to screen 146 or providing a screen such as screen 160 shown in FIG. 52 in which the user is given the option to either quit or retry scanning the bar code.

Assuming that the bar code is properly read as indicated by screen 158, the terminal then displays screen 162 shown in FIG. 50 which prompts a user as to whether they wish to add this bar code to the memory on the multifunction card. As is the case with prior prompts the default value is “yes”, but the user is enabled to change the default to a “no” by pressing button 26. For purposes of this example it will be assumed that the user wishes to add the bar code for their medical identification card to the memory which they do by pressing button 28 in response to screen 162. In response to the user pressing the enter button the screen 164 shown in FIG. 51 is displayed. The user can now turn the terminal off by pressing button 30.

It should be understood that while the type of visual indicia added to the memory on the multifunction card in the foregoing example is bar code associated with a medical plan, other types of bar code may be added. For example the multifunction card may be used to store data representative of bar code associated with a driver's license, student identification card, employee access card, library card or any other type of bar code. In addition the system may be configured to read and store other types of visual indicia which are capable of being read, stored and reproduced.

When a user desires to use the terminal to display one of the bar codes or other indicia stored in memory, they may do so from a screen 166 shown in FIG. 53. Screen 166 is identical to screen 74 in the main menu. To proceed with the display of a selected bar code the user presses the enter button 28 as schematically indicated.

In response to the user selecting the display bar code routine from the main menu, the terminal proceeds to display a screen 168 shown in FIG. 54. Screen 168 asks the user to identify the bar code that they wish to display. The user is enabled to select designators for the various bar codes stored in the memory of the multifunction card. This is done using the up and down buttons on the terminal device.

Assuming for purposes of this example that the user wishes to display their medical plan ID, the designators for the various stored bar code indicia are scrolled through by pressing the buttons until the medical plan ID designator is displayed, which is represented by a screen 170 in FIG. 55. In response to pressing the enter button 28 the processor is operative to retrieve the data corresponding to the bar code in the memory and to display a reproduction of the bar code on the terminal. This is represented by a screen 172 in FIG. 56. The displayed reproduction of the bar code may be scanned from the display 22 of the portable terminal using the scanner or similar bar code reading device which is schematically represented by a scanner 174 in FIG. 56. Thus the user may identify themselves to a medical provider as a participant in their medical plan and the user may input their identifying information in the conventional manner using the same scanner that is used for scanning a regular identification card. When the scanning process is finished, the user can discontinue the display of the bar code by pressing on/off button 30.

The bar codes which have previously been stored in the memory associated with the multifunction card may also be selectively erased therefrom. This may be done for example when a user's regular card is replaced such that a new bar code or other visual indicia is associated therewith. Alternatively a user may simply wish to discontinue the use of a particular card. This may happen for example with regard to a library card which a user had been using in a city where they previously resided. Once the user moves they no longer use that library. Likewise a user may delete their driver's license data when they move to another state and obtain a new license.

The deletion of a bar code from the memory is represented by the logic flow associated with FIGS. 57-61. The screen 176 corresponds with the screen 72 in the main menu, and includes a prompt which enables a user to select the logic which operates to delete a bar code from the memory. The user selects this transaction by pressing the enter button 28. A screen 178 is then displayed which asks a user to identify the bar code they wish to delete from the memory. The user selects the bar code by pressing the up and down buttons 24 and 26. As shown in FIG. 59 the user selects a card which has the associated designator “CLE_LIB_CARD” stored in association therewith in the memory of the multifunction card. This is represented by a screen 180. Pressing the enter button 30 with the bar code designator displayed causes a screen 182 shown in FIG. 60 to be displayed. Screen 182 queries the user as to whether they in fact wish to delete that particular bar code. The user is enabled to change from the default setting by pressing the down button. As schematically represented in FIG. 60, assuming the user wishes to delete that particular bar code from memory they press the enter button 28. This causes a screen 184 shown in FIG. 61 to be displayed on the portable terminal. This screen includes the prompt message to indicate that the bar code has been deleted. The user may then exit the routine by pressing the on/off button 30.

It should be understood that while the described embodiment operates to store and to reproduce visible indicia corresponding to bar code, other embodiments may produce other forms of indicia. This may include visual indicia that is intended to be read by machines for identification purposes as well as indicia intended to be read by the human eye. Any form of indicia which can be read, stored in the memory of the multifunction card and/or displayed on the portable terminal is intended to be encompassed by the present invention. As previously discussed, a user's signature is a further example of visual indicia that may be stored and selectively reproduced. Such indicia may also be transmitted by the terminal to a remote system and used to verify the authenticity of a transaction or for other purposes.

The exemplary embodiment also operates as a stored value card system and transaction apparatus which operates to store value equivalent to a cash value in the memory of the multifunction card, as well as to transfer value between the card and various accounts. The programmable memory 18 on the multifunction card 12 may include therein any one of a number of different public or proprietary schemes for storing information representative of cash value. This value storage method may be compatible with other terminals which may read the memory and transfer data representative of value to or from the memory, while also operating to transfer funds between accounts of the user and providers of goods, services or cash.

It should be understood that the multifunction card of exemplary embodiments may store value in one or several forms of proprietary schemes. For example the card may have cash value stored and associated with a Mondex® scheme. It may have a different cash value stored and associated with a VISA® CASH scheme. The card may also store data representative of cash values in any one of several other schemes. Although the exemplary embodiment will be described with respect to a card in which value representative of cash is stored thereon with respect to a single scheme, it should be understood that multiple schemes may be used. Further in the following description in which amounts may be transferred between accounts of the user, it is within the contemplated capabilities to transfer amounts between one stored value proprietary scheme stored in the programmable memory of the card to another proprietary scheme stored within the card. Such transfers may be made in a manner similar to transfers between accounts which are carried out by the terminal as described hereafter, although it should be understood that in such situations additional steps are carried out by the processor in the portable terminal so as to decrement and increment the various stored value amounts stored in the memory of the card.

To facilitate accounting for such transactions it will also be desirable for the portable terminal to connect to various remote locations which provide gateways to electronic transaction systems and networks which assure that funds are properly accounted for. For example communication will be carried out with various remote systems to assure that indications are provided that a user has transferred cash value on their card from one stored value card scheme to another.

One of the common functions that a user will execute in connection with the exemplary apparatus is to check the stored value representative of cash that is stored on the programmable memory of the multifunction card. This is represented by the logic flow described with reference to FIGS. 62 and 63. FIG. 62 shows a screen 186. Screen 186 corresponds to screen 76 of the main menu. Screen 186 prompts a user as to whether they wish to check the stored value balance on their multifunction card. To do so the user presses the enter button 28. In response to the user selecting this item from the main menu the memory of the card is read and processor 36 causes a screen 188 shown in FIG. 63 to be displayed on the portable terminal. This screen indicates to the user the current cash value stored on the card. If the multifunction card includes stored value schemes for several different programs, intermediate screens may be provided to prompt the user to select one of the several stored value schemes which are employed on the card. As shown in FIG. 63 when a user has finished displaying the stored value amount they may exit by pressing the on/off button 30.

The transfer of funds to the memory of the stored value card is represented by FIGS. 64-74. FIG. 64 shows a screen 190. Screen 190 corresponds to screen 80 in FIG. 13 of the main menu. A user selects the transaction which includes a transfer of value to their stored value card (which is the multifunction card) by pressing the enter button 28 when screen 190 is displayed.

To transfer value representative of cash value onto the memory of the multifunction card, a source of the money to be transferred is identified. This is done by the processor operating in response to the instructions stored on the card to display a screen 192 shown in FIG. 65. Screen 192 prompts a user to identify the source of the money to be added into the memory of the card. The user is enabled to select the source by pressing the up and down buttons which causes the various sources of available funds to be selected. Such sources may include money stored in stored value schemes on the memory of the card itself. In the case of screen 192 if the user indicates that they want the source of funds to be their BP_VISA card, this is indicated by pressing the enter button 28 when this card designator is displayed.

After the source of the funds is designated, a screen 194 shown in FIG. 66 is displayed. This screen prompts the user to enter the amount of money to be added to the card. This is done by the user entering a numerical amount in a manner similar to the way that access codes and designators have been previously entered. However in the exemplary embodiment only numerals may be entered in this step. The user enters the numerical values by scrolling to the particular numerical value desired and then hitting the enter button 28. This causes the program logic to move to the next value. After all the value characters have been entered as represented by screen 196 in FIG. 67 the user is prompted through a screen 198 shown in FIG. 68 as to whether they want to add the amount input to their stored value card. As shown in screen 198 the default value is “yes” however the user may change this to “no” by pressing the down button. For purposes of this example it will be assumed that the user wishes to add that amount and so indicates by pressing the enter button 28.

In response to the user indicating that they wish to add this amount to the data representative of value in the memory of the multifunction card, the processor operates in response to instructions stored on the card memory to contact the remote location appropriate to obtain funds from the user's BP_VISA account, and to indicate that the amount has been transferred onto the user's stored value card. In one embodiment this is accomplished by the processor causing the communications component 52 to dial up the remote location. This is done using the address appropriate for making the connection which is preferably stored in memory on the card. In this case the address may be a telephone number. In alternative forms the address which the communications component uses to contact the appropriate location may be a node or TCP/IP address in a computer system such as a private intranet or public system such as the internet. The particular approach depends on the nature of the system in which the portable terminal 14 is intended to operate.

The portable terminal exchanges messages with the remote location and the computer system therein, which operates to charge the user's account for the funds which are to be transferred as cash value onto the stored value card. Alternatively the terminal may communicate to a number of locations to indicate both the charge to the user's account as well as to track accounting entries, so that it is recorded that the user now has such funds available in their particular stored value scheme. Various transaction messages are transferred between one or more remote locations and the portable terminal so as to accomplish the transfer of funds. These messages may be in an ISO 8583 format or appropriate variants thereof, or other proprietary message formats of suitable types, so as to accomplish the transfer of funds and a record thereof. In one exemplary embodiment, while the remote terminal is connecting to the address a screen 200 shown in FIG. 69 is presented on the display of the remote terminal. As the remote terminal exchanges messages with the remote locations to transfer the funds after the connection has been made, the display of the remote terminal may present the screen 202 shown in FIG. 70 to indicate that the transaction is going forward.

If the transaction is successfully completed the remote terminal displays a screen 204 shown in FIG. 71 to indicate a transaction has been approved. The logic next moves to cause a screen 206 to be displayed. Screen 206 which is shown in FIG. 72 is operative to show the user the new stored value balance stored on the multifunction card.

If for some reason the terminal is unable to make connections to the remote location, either because it is unable to make a connection or because of some other malfunction, a screen 208 shown in FIG. 73 may be displayed. This screen prompts a user to select whether to retry the transaction or to quit. Similarly the user may decide to turn the terminal off by pressing the on/off button 30. Alternatively the user's request to transfer the funds may be denied by the remote location, such as because it would put the user over their credit limit. In such circumstances the instructions stored in the multifunction card are received from the remote location and causes screen 210 shown in FIG. 74 to be presented on the terminal. This screen shows the user that the transaction was denied and that their card balance remains at the prior amount. Of course the user is free to again attempt the transaction using a different source of funds, or alternatively to transfer funds from a different stored value scheme stored on the memory of the card.

The exemplary embodiment also enables transferring the value from the stored value card to one of the user's accounts. This may include for example a checking or savings account which the user maintains with a financial institution. Alternatively this may include transferring value from one stored value scheme stored on the card to another stored value scheme stored on the card.

The transfer of value from the stored value card is commenced in an exemplary embodiment from a screen 212 shown in FIG. 75. Screen 212 corresponds to screen 78 in the main menu. Pressing the enter button from this screen causes the processor to execute various instructions on the multifunction card associated with this transaction.

In executing the transfer from the card the user is next prompted through a screen 214 shown in FIG. 76 to identify a destination of the funds. This is done by user using the up and down buttons to select one of the available destinations. In this case the user has selected the account associated with the designator “KEY_BANK_ATM.” The selection is made by pressing the enter button 28.

As shown in FIG. 77 the user must next enter an amount to be transferred from the memory of the stored value card into the designated account. The user must enter an amount which is prompted through a screen 216. The entry of an amount is accomplished in the manner previously described by using the up and down buttons and the enter button. In the case of this example the user enters an amount to transfer of $200 as indicated by screen 218 in FIG. 78.

In response to the user entering the transfer amount the terminal next operates to display a screen 220 shown in FIG. 79 in which the user is asked to confirm that they wish to make the transfer to the particular account. In the situations where the user is obtaining funds from financial institutions or other sources where they may have multiple accounts, the user may be prompted through additional screens to select particular accounts that may be held at the institutions which are sources of funds. This is demonstrated in FIGS. 80 and 81. For example in screen 222 the user is first prompted to state whether they wish to transfer funds to savings. By pressing the down button the user may cause screen 224 to be displayed which then asks them if they prefer to transfer the funds into checking. For purposes of this example it will be assumed that the user wishes to transfer the funds to checking, which they select by pressing button 28 as shown in FIG. 81.

When the user is transferring funds to or from a debit card account, the PIN number uniquely associated with the user's account is required to be input to gain access. The nature of the account which the user has identified as the destination or source of funds, is generally indicative that a PIN number is required for access thereto. The instructions stored in memory on the card or the memory of the terminal may cause screens associated with the entry of a PIN number and/or the selection of various accounts to be displayed when particular accounts are selected.

In the present example because a bank account which requires the entry of a PIN number is being used as the destination of the funds, the stored instructions cause a screen 226 shown in FIG. 82 to be displayed. Screen 226 prompts the user to input a PIN number. The user inputs their PIN number either by alphabetic or numerical characters in the manner previously described for entry of designators and numerical values into the remote terminal. Once the user has completed the input of their PIN number as indicated by a screen 228 in FIG. 83, they are presented with a prompt that asks them to confirm the PIN number input. Confirming the input in response to this prompt is done by pressing the enter button 28. In embodiments where the biometrics reader is used, biometric data may be used in addition to or in lieu of a PIN to identify the user to a remote system. Alternatively, a user's PIN number may be stored on the card. If the user has first identified themselves with an access code or biometric data to operate the terminal with the card, the level of security may be considered already sufficient that the PIN may be recalled from memory and forwarded by the terminal. Alternatively, the user may be required to input biometric data and in response to the proper biometric input the PIN is recovered from the card memory and output by the terminal.

After the data required to conduct a transaction has been input, the user is questioned concerning whether they wish for the transaction to proceed. As shown in FIG. 84 a screen 230 is presented which prompts the user to confirm that they wish the transaction to go forward. Confirmation is presented by pressing the enter button. In response thereto the remote terminal contacts the appropriate computer address to transfer the funds to the account designated. While this is being done, the screens 232 and 235 shown in FIGS. 85 and 86 are displayed. As previously discussed contact may be via a phone system or by computer network to the appropriate address.

If the transaction is successfully completed the instructions cause the screen 236 shown in FIG. 87 to be displayed. In the exemplary embodiment the instructions then cause the display of the screen 237 which shows the user the amount of value remaining on the card.

While various methods of communicating between the remote terminal and the remote locations may be used, in one exemplary embodiment it is desirable for the communications device to include a wireless modem. The wireless modem enables communication over a cellular telephone network. Appropriate encryption is provided to enhance security. This enables a user to transfer funds between the multifunction card and their various accounts from any convenient location where the user happens to be. This may be particularly advantageous when a user finds that they are in need of cash and do not have an automated teller machine or a telephone line readily available. The user is enabled to load cash value onto the multifunction card so they can complete their transactions.

In addition while the exemplary embodiment has been described as being used to make transactions from value stored on the card to various accounts of the user, exemplary embodiments may also be used to transfer funds from the stored value card of one user to the stored value card of another user. This enables users to carry out the equivalent of cash transactions using stored value cards. In such circumstances the terminal would contact the appropriate remote locations for recording the transfers of funds for accounting purposes, if necessary. Alternatively if sufficient security is provided, the electronic information corresponding to cash value may be deemed sufficiently self-authenticating so that no independent accounting of the cash value need be kept in an external system.

Alternative embodiments can permit cards to be used in various ways. For example, an authorized user can create duplicate credit or debit cards. These additional cards can be provided to trusted friends or family members on a temporary basis. This will enable such individuals to access funds of the user when needed. This may be appropriate, for example, when family members are traveling and are separated from the primary card user.

Also, as previously discussed, a user is able to continue to use a large number of credit cards, debit cards, and other various forms of cards and objects bearing indicia, without having to physically carry those cards on their person. As a result, the user is enabled to keep such cards at home or another secure location where they are less likely to be lost or stolen.

Furthermore, an exemplary form is highly flexible in configuration and can accommodate a number of different types of transactions depending on the instructions stored in the memory of the multifunction card and/or the portable terminal. As a result, the apparatus and method of an exemplary embodiment is highly and readily adaptable to the carrying out of different or additional transaction types, whether financial or otherwise.

Furthermore, a financial transaction may require plural types of information from a customer. Such required transaction data may include the customer's financial account information and the customer's signature. As previously discussed, a user's signature can be stored in a programmable memory for later use in transactions. The stored signature can be used as a legally binding electronic signature. The stored electronic signature can comprise data representative of a handwritten signature. For example, the electronic signature can be a reproduction of a signature, such as a scanned handwritten signature. Alternatively, the signature may be data which a user has agreed will have the legal effect as a written signature, or data which identifies the user. For example, as previously discussed, data representative of a signature can include an electronic signature, such as a digital signature or a digital certificate. The electronic signature can be linked with the user's identification in a data store, and thus can be used to uniquely identify the user. Thus, signature data (e.g., data representative of a signature) can be stored in the programmable memory of a user's portable hand-held device (e.g., a phone).

In an exemplary embodiment, user account data can also be stored along with the signature data. That is, account data and signature data (and other data) can be stored in the programmable memory of a user's portable hand-held device (e.g., multifunction card, terminal, phone). Hand-held devices have been previously discussed.

The stored account data can comprise checking account data. In an exemplary embodiment, a merchant transaction system is operative to receive account data stored in a customer's portable hand-held device. Data representative of the user's signature and/or the user's financial account information can be transmitted from the user's (customer's) portable hand-held device to the merchant's transaction system. Wireless communication can be used to transmit/receive data between the user's hand-held device (or the user's terminal) and the transaction system. For example, data may be transmitted/received via a communications device (e.g., modem, infrared transmitter, RFID, blue tooth device, or similar technology). In an exemplary embodiment the range of communication between the user's hand-held device and the transaction system can be limited to a specific distance, such as a few inches to a few feet. The use of a limited wireless communication range can avoid interference and permit communication only with the other device. The communication may also be encrypted to ensure confidentiality of data. The merchant system can store the received financial account data and signature data.

The account data stored in the hand-held device can be used in generating an electronic check. A merchant transaction system includes an electronic check template in storage in a computer (which may be a local computer or a network host computer in operative connection with the local computer). Alternatively, the merchant system can be operative to communicate with a third party which has the electronic check template and can generate electronic checks (and/or carry out the transaction) for the merchant. The check template includes software operative to receive customer account data to create an electronic check. The customer account data can include the necessary information required by a merchant to accept a check as payment for a purchase. For example, the account data may include checking account number (and/or bank routing number), check number, name, address, phone number, bank name, or combinations thereof.

The electronic check-generating template can also have the check made payable to the merchant. The template can be programmed to set the payee as the merchant by default but have the ability to allow the merchant to change the payee. The template can also receive purchase data from the merchant computer. This enables the template to automatically insert the amount of a purchase into the electronically generated check. That is, the purchase amount data can be used as the check amount. The check template can also insert the current date (and other information, e.g., time, store identification number, etc.) into the generated check.

FIG. 96 shows an electronic check-generating arrangement. A customer owns or has access to a portable hand-held device, e.g., a card 250, terminal 252, or phone 254. The hand-held devices include a programmable memory 256. A hand-held device may also include other features, such as a display screen 258, 260, function buttons or keys 262, and/or a camera 264. The phone 254 may comprise a video cell phone. The customer's account data and/or signature 266 can be remotely wirelessly transmitted or read from the hand-held device (e.g., phone 254) to a merchant's terminal 270, e.g., a checkout terminal or computer. As previously discussed, the merchant terminal 270 may be connected to a network. The merchant terminal 270 is in operative connection with an electronic check generating template 274.

As shown in FIG. 97, the base electronic check template 274 can include a starting check format 276 having the sections or fields 278 empty. The template software is able to fill these check fields 278 with the data necessary to generate a legal financial check. The check fields to be filled may include the check value, the customer bank account number, payee, date, and the signature.

As previously discussed, a reproduction of the user's signature may be stored in the memory of a user's portable hand-held device (e.g., card or phone). The user can display a reproduction of their signature on a display screen of the user's hand-held device (or terminal) so that the merchant can verify the signature. Verification may include visually comparing the electronic signature to a handwritten signature already on a user card or to a sample of the user's signature freshly handwritten in view of the merchant.

Alternatively, with the merchant system having the customer's signature data, the merchant can display a reproduction of the signature on the merchant's own display screen for use in signature verification. Of course, if the signatures lack acceptable correspondence in the verification process, then the merchant can end the transaction. In other arrangements, signature comparison software may be used to determine the validity of the customer's signature. Alternatively, in other embodiments other approaches to signature verification, such as ways of validating electronic signatures, may be used.

After the merchant system obtains the account data and signature from the user, then the electronic check (with user account data and signature) can be completed. The merchant system can store the received financial account data and signature data along with the transaction data (e.g., purchase amount). The check-generating template software in the merchant's system is able use the obtained electronic signature as the signature in generating the electronic check. That is, the electronic check template can insert the user's electronic signature or other corresponding data into the electronic check. The merchant system can display an image of the completed check on a display screen for viewing by the customer and the merchant for final approval.

The electronic check template can also insert a check number into the generated check. The check number can be received from the customer. The programmable memory of the customer's hand-held device can increment check numbers. For example, the last check number can be stored in the memory. The value of one can be added to the stored check number prior to transmission of the check number to the merchant system. Alternatively, the last check number can be incremented to create the next check number prior to storage of the check number in the programmable memory. This next check number can then be stored with the other checking account data. The next check number (along with the other account data) can then be received by the merchant system. Thus use of check numbering enables a customer to more efficiently maintain a record of the checks drawn from their checking account.

FIG. 98 shows a completed electronic check 280 generated by the merchant system. The check 280 has entries in the check fields. Respective entries include the written check value 282, the numeric check value 283, the customer checking account/routing number 284, the merchant as payee 286, the date 288, and the customer's signature 290. The check generating software is also operative to insert other entries, such as customer address 292, bank name and address 294, check number 296, and merchant transaction number 298. The completed check is acceptable by the merchant as payment for a transaction.

The merchant system can transmit the completed electronic check to a bank or electronic clearing house for account settlement. The electronic check can be transmitted in electronic format. In an exemplary arrangement, the check is transmitted by the merchant terminal, the check is processed by the check clearing house, and the canceled (i.e., cleared) check is returned to the merchant terminal, all in a short time period. A canceled electronic check can contain a (unique) marking indicative of its cancellation. Of course this approach is exemplary and in other embodiments other approaches may be used.

The merchant system can have a printer device capable of printing a copy of the check (which may be canceled) for the customer. Merchants can also add their own indicia to a printed check, with the indica (e.g., a stamped marking) acknowledging receipt of customer payment. A canceled check image can be stored in memory of the hand-held device (e.g., phone). The storage of a canceled check in the hand-held device can serve as receipt of payment.

There are many processes in which the hand-held device may receive the check image data. A check image may be received into the hand-held device via the user's terminal or via other known transmission methods. Wireless data transmission can be carried out. For example, blue tooth technology can be implemented.

Also, it should be understood that the customer can receive (from the merchant terminal) and store an image of a completed check in the hand-held device (e.g., phone). This enables the customer to view the legally binding check using the hand-held device, have the check print out in paper form, and/or transmit the electronic check to a bank for account settlement. Thus, a customer can have a merchant generate a check on their behalf, and then have the generated check stored in their hand-held device (for later use).

As discussed in more detail later, a check image can also be received or captured into a user's hand-held device via a camera built into the hand-held device (e.g., phone or videophone). For example, as previously discussed, a merchant system can display an image of a generated check on a display screen. Thus, an image of the displayed check can be captured by the camera. Likewise, an image of an original check (e.g., a paper check) can also be captured by the camera. A captured check image can be stored in memory of the hand-held device.

A user's portable hand-held device can also be used in a self-service checkout transaction. The portable hand-held device enables self-service checkout in retail establishments not normally associated therewith. A retail store can have purchasable items (e.g., clothing) with an identification (e.g., bar code, RFID tag) and an anti-theft tag associated therewith. The anti-theft device needs to be neutralized before the item can properly leave the store, otherwise an alarm will be tripped (via sensors adjacent store exits). The anti-theft tag may be of the type that can be sensed and neutralized at a distance (e.g., using magnetic sensed tag, RF backscatter tag, RFID tag, or other tag types that can be “neutralized” on contact or from a short distance). The bar code (or similar identification indicia) may be attached to the item. Alternatively, a single bar code may correspond to a plurality of like items. For example, the bar code may be located on a common support device (e.g., shelf) for a plurality of the items.

As shown together in FIG. 99 and FIG. 100, an exemplary embodiment a self-service checkout for an item purchase can be accomplished using the customer's portable hand-held device 300 (e.g., phone). The user operates the phone to dial a phone number to establish communication (step 400) with a transaction payment system associated with a particular retail store (or the particular retail item). The phone number can be the phone number assigned to that particular store which has the item that the customer desires to purchase. The store's phone number and instructions can be readily displayed throughout the store for the customer's benefit. The transaction payment system may be located in the store and/or on a network linked with a plurality of other stores so they can share a common network host. That is, at least part of the transaction system (which can include a host with one or more computers) may be remotely located from the store. The transaction system can match the phone number that the customer called to the particular retail facility assigned to that phone number. Therefore, the transaction system is able to know the exact merchandise establishment at which the customer is attempting to purchase an item. The transaction system is able to accept purchase payment and cause the item's anti-theft tag to be neutralized or disabled or inactive. The transaction system can also handle billing for the purchase.

The customer has a camera 302 which can communicate with the phone 300, e.g., the camera may be part of the phone (e.g., videophone). After the customer's phone has established communication (step 400) with the store's network host 310, the purchaser points the phone camera at the bar code 320 corresponding to the item. An image of the bar code 320 (or data representative of the image) is captured and sent (step 402) to the transaction system (e.g., host) 310. The transaction system can resolve the bar code data and process the data to determine the price of the item corresponding to the bar code (step 404). For example, the transaction system may convert the digital image of the bar code to numerical data, and then make a comparison of this numerical data to price data to determine the item's price. Data in a data store 312 can be utilized to make the corresponding data comparison. This price information can be transmitted back for display (or by audible quote) on the purchaser's phone (step 406). The customer can verify and agree (step 408) to the price as being correct to continue the transaction. Alternatively, the price information may be displayed on a purchaser-viewable display screen in the store. If the purchaser disagrees with the determined price (or decides not to continue the purchase) then the customer has the capability of terminating the transaction.

In other embodiments, if a customer ends a transaction process the transaction system can call back the customer via the phone and offer a lower or discounted price for the item. The lower price may be calculated by using statistical analysis based on a variety of customer factors, such as demographics, types of accounts, account balances, purchase history, credit history, etc. The discounted price may also be linked to other factors, such as the customer being required to open a new line of credit. Information about the customer may be obtainable via the customer's phone number, or the customer may be requested to provide more information to determine if a discounted price applies to that customer. In other embodiments, a loyal (repeat) customer may also be presented price discounts.

Continuing with the purchase, the transaction payment system requests the buyer to transmit their account billing data. As previously discussed, a customer account may be associated with MasterCard®, VISA®, American Express®, Novus®, Discover®, or other common accounts, such as checking, savings, mutual fund, and money market accounts. The account data is stored in memory in the user's hand-held device. The stored account data (and electronic signature if necessary) may be transmitted in a manner previously discussed, e.g., the user's phone (or other hand-held device) transmits the user's account data.

The account data may be transmitted (step 410) wirelessly from the customer's hand-held device to an in-store merchant terminal 330. The transaction system can include the merchant's terminal. The transaction may be handled locally via the merchant's in-store terminal, which can comprise a computer, communication devices, and communicate with the host. Alternatively, the merchant's terminal can pass the received account data (and signature if necessary) to another (network host) computer located remotely from the store. The merchant's terminal can have access to the identification of the store in which the terminal is located, and access to identification(s) of the store's neutralizer(s). The identification data may be stored locally in terminal memory. The merchant's network terminal can transmit the stored (store and neutralizer) ID data to the network host. This ID data may be sent along with the customer's account data from the merchant's terminal to the host.

In other embodiments the account data may be transmitted from the phone directly (e.g., via a phone network) to the remote host computer, without use of the merchant's terminal. For example, the account data (and a PIN if necessary) may be transmitted by entering data via the phone keys. Thus, a transaction system can be located only locally (e.g., as the in-store terminal), or partially located both locally and remotely (e.g., as a combination of the in-store terminal and remote host), or completely located remotely.

The transaction system can communicate with other finance systems 314 to determine whether the user-provided account data is acceptable in paying for an item. It should be understood that in some embodiments other data or information (e.g., store location/ID, more customer identification, yes/no prompts) may be communicated between the customer's phone and the transaction system in order to carry out the purchase transaction. Upon the customer's account data being approved for the transaction, the customer's account 316 can be charged the cost of the item (step 412).

After payment for the purchase has been approved by the transaction payment system, the security tag can be neutralized (step 414). The user places the purchased item adjacent to an in-store tag neutralizer device (if not already adjacent thereto). The neutralizer device may be on an item shelf, or at a self-service checkout area of the store, or part of an in-store merchant transaction system. The transaction system can communicate with the tag neutralizing device. The transaction system can cause the neutralizing device to neutralize the security tag corresponding to the particular purchased item.

In other embodiments the transaction system may communicate with the tag neutralizer via the customer's phone. For example, the transaction system can send a code to the customer's phone. The code may comprise a unique audible frequency tone that is recognizable by the tag neutralizer as an instruction to cause neutralization of a particular item's tag. The code may be stored in the phone and later played when the customer is ready to exit the store, or the customer may be instructed to place the phone adjacent the neutralizer prior to sending the tone.

In the exemplary embodiment the anti-theft tag cannot be neutralized until after the user's account has been charged for the item. However, the tag may be neutralized simultaneously with the user's account getting billed for the item. Once the item has been neutralized, the user can carry the purchased item out of the store without the item tripping the alarm. The arrangement enables a person to check out items at a store shelf, at a self-service check out area, or anyplace a device for neutralizing the anti-theft tag can be located.

As previously discussed, the transaction system can communicate with the tag neutralizing device. In other arrangements there can be feedback between the neutralizer device and the transaction system. The transaction system can use the feedback to verify usage of the neutralizer device (and authenticity of the transaction). The transaction system can also use the feedback to ensure that the customer is using the correct neutralizing device.

In an exemplary feedback arrangement, the neutralizer has an identifier (e.g., number, symbol, marking, etc.) which the customer's phone camera can capture and send to the transaction payment system. The neutralizer may have a permanently assigned number as an identifier. Alternatively, the neutralizer may have a changeable identifier. For example, the neutralizer can have an output device that can display the latest identifier sent from the transaction system (e.g., host). The displayed identifier may comprise a transaction symbol or number (e.g., random number, date, time, or any combination thereof).

The transaction system has the neutralizer's identifier stored in memory. If the image of the identifier received from the phone camera does not match or correspond to an identifier currently stored in the transaction system's memory for that particular neutralizer, then the transaction system does not recognize the neutralizer (or the transaction) as valid. Hence, the transaction system does not attempt to neutralize the tag. The purchase transaction is terminated and nullified. The feedback arrangement reduces the risk of the system being tricked, and ensures that the customer is at the proper neutralizer.

In other arrangements the transaction process can be carried out with the item's identifier being read with a device other than a phone camera. For example, the customer's hand-held device (e.g., phone) may include a bar code reader. Thus, a bar code may be read with the bar code reader, instead of via a camera. The bar code can be read as a number, and the number transmitted as data (instead of an image) to the transaction system. Alternatively, the phone may have a processor and software that can convert an image to data. Thus, the phone can transform a captured bar code image into data (e.g., a number) prior to transmitting the data (e.g., number) to the transaction system. Likewise, if an item's identifier comprises an RFID tag, then the customer's hand-held device (e.g., phone) may include an RFID tag reader. Again, the customer's hand-held device (e.g., phone) can transmit an item's identifier as a number instead of as an image. It should be understood that other communication arrangements between the hand-held device and the transaction payment system may be used. For example, one-way or two-way Internet communication between the hand-held device and the transaction system may be used. The hand-held device may transmit an item's identifier information to the transaction payment system via the Internet. The hand-held device can have wireless link with the Internet. Thus, the hand-held device can transmit data (image and/or numerical data) to the Internet address of the transaction system.

In another exemplary embodiment the item to be purchased includes at least one RFID tag as an anti-theft tag. The neutralizer can be operated to change the programming of the item's RFID tag. For example, the RFID tag can be changed to a unique number (e.g., transaction number) for that shopping visit. The unique number can be recognized as acceptable by the security system. If any other RFID value other than the unique number is sensed as the item goes by the store's exit sensor, then the alarm sounds.

In other embodiments the anti-theft tag neutralizing (or reprogramming of an RFID tag) can be accomplished through the user's portable hand-held device (e.g., phone). The phone is placed adjacent to the item having the tag. The transaction system sends a specific signal or code through the phone which is receivable by the anti-theft tag to cause neutralization (or reprogramming) thereof.

As previously discussed, the transaction system can send the charge transaction. In other arrangements an in-store computer can be used to send the charge transaction, and the store computer can also be used to confirm that the store received payment for the item. If the phone is dialed into the store computer for providing pictures and account data, then the store computer can route the transaction to the bank. Alternatively, a store computer can accrue what is being bought and total the payment owed. When the user is ready to leave the store they disconnect their call with the store computer. The store computer has the bank computer call back the user's phone. The bank, such as through a person or through an automated system such as an interactive voice response system, advises the user that they will owe so much to the store. The user can authorize the purchase agreement with the bank via inputs to the phone, such as spoken inputs and/or the pressing of phone keys. Once the store is notified that authorization for payment has occurred, then the store can let the item (or items) out of the store without the alarm sounding. For example, the store can let an item having an (RFID) number corresponding to the bar code pass through the security system without requiring tag neutralization or modification.

A further exemplary operation of purchasing a merchant item via a self-service checkout using a customer's phone 300 can also be described with regard to FIG. 99. The customer uses their phone to call the store's (toll free) phone number. As previously discussed, the phone number may be displayed throughout the store. The phone number may be assigned to that particular store or it may be a phone number shared by several stores. Nevertheless, the call is answered by the transaction system host 310, and communication is established between customer's phone and the host. The customer is instructed to transmit an image of the item's identifier (e.g., bar code 320). The identifier image is captured by the phone's camera 302 and transmitted via the phone to network host. The host 310 obtains a price corresponding to the received identifier. As previously discussed, the price assigned to the item's identifier may be determined by the host computer or it may be provided from a secondary data source 312. Nevertheless, a price is matched with the item via the item's identifier (e.g., bar code). The price of the item transmitted from the host (or secondary source) back to the customer's phone and displayed thereon. The customer then must agree to the displayed price to continue the purchase, else the transaction is terminated by the host. A termination may include notifying the customer of such act. It should also be understood that the customer may also terminate the transaction at any time prior to payment. Agreement can be acknowledged via the pressing of a particular phone button(s), providing voice input(s), or both depending on the particular system.

Following agreement, the customer is requested by the host to transmit an image of an identification (ID) 332 of the in-store terminal/neutralizer 330 at which the customer wants to make the payment. The ID image is captured by the phone camera and transmitted to host. The host must recognize the ID as valid to continue the checkout, else the purchase transaction is terminated by the host. After ID validation, the host places transaction data (e.g., description of item, price of item, etc.) that corresponds to the customer's purchase in the payment queue of the particular terminal/neutralizer corresponding to the ID. The customer is notified (e.g., by the host and/or the terminal/neutralizer) that the terminal/neutralizer is ready to accept payment for their purchase. The terminal/neutralizer is able to display the transactions in the payment queue. The payment queue contains the order in which the transactions are to be paid. The payment queue may be a first-in first-out type of queue. For example, the transaction in the queue may be ordered based on time. Only one transaction can be paid for at a time. That is, the terminal/neutralizer views only one transaction as being “active” for payment. Any account data received by the terminal/neutralizer will be applied toward the currently active transaction. The payment queue can be adjusted by the customer (if necessary) to ensure that their transaction is displayed as the active transaction.

The customer then transmits account data from their phone 300 to the terminal/neutralizer 330. The terminal/neutralizer 330 transmits this received account data to the host 310. The host seeks approval of the account data as being acceptable for the transaction payment. The process of approval may include other financial sources 314, as is well known. If the transaction is denied payment approval, then the host terminates the transaction.

If the customer's account data is approved for payment, then the customer's account 316 is correlated with payment for the item(s) in the purchase. After the host is notified of payment, then the host instructs the particular terminal/neutralizer 330 to function to neutralize the item's anti-theft tag. This act may range from simply turning on the neutralizer to having the neutralizer only neutralize a specific tag. The various types of security tag neutralizers may be used. The customer can next place (e.g., locate, wave, scan) the item adjacent to the terminal/neutralizer (if not already placed) and the item's tag is neutralized. The customer can then exit the store with the purchased item, without the item tripping any security alarms.

The portable hand-held device (e.g., phone) may also enable a user thereof to obtain cash in a manner similar to making an item purchase. A user of the portable hand-held device can obtain cash from an ATM located in a retail establishment (e.g., merchant store, restaurant, sporting facility). For example, an in-store ATM can be on the store's computer network. The ATM can be a recycler type of ATM that can both receive currency and dispense received currency. A recycler ATM enables the retail establishment to efficiently make use of excess cash.

An exemplary operation of purchasing cash with a hand-held device will now be described with respect to FIG. 101 and FIG. 102. Communication is established between the customer's phone 600 and the store network 610 (step 500). The customer requests a cash withdrawal (step 502). The amount of cash requested may be included in the initial request, or the amount may be transmitted later. The customer has to transmit the necessary information in order to have the cash request granted. The required information may include customer account data, customer signature, account PIN, identity of the ATM, and/or amount of requested cash.

An ATM 620 has an identifier 622, such as a machine ID number or a bar code ID, visibly located thereon. Likewise, the ATM's display screen may have an identifier (e.g., random number, symbols) displayed thereon. The user can point their phone camera 602 at the ATM to obtain an image of the ATM's identifier 622, else the user can enter the identifier (if it is a number) via the phone keys. Hence, the customer can transmit their requested amount of cash along with the ID of an in-store ATM to the host (step 504). The requested amount of cash can likewise be entered via the phone keys. Of course, other known ways of entering data may be used, such as voice to data conversion.

Continuing with the cash purchase, the customer can transmit (step 508) any necessary transaction data (e.g., customer account data, signature, PIN) not already provided via wireless communication from the phone 600 to a transaction system computer 630, such as in a manner previously discussed. The transaction computer can be a local in-store self-checkout terminal 630 which is in communication with the store network 610. The transaction data may or may not be stored in the phone memory prior to its transfer to the store network.

Alternatively, the customer may initially transmit transaction data from the phone to the in-store terminal 630. This data may correspond to just the customer account, signature, and/or PIN. In such a scenario, at this point in the cash purchase process the customer may be requested to provide (via their phone to the network) how much cash they want and the identity of the particular ATM. As previously discussed, the customer can uses their phone to transmit the ATM identifier and the desired amount of cash to the store network. The transmitting may involve a phone line network or the Internet. The phone can be used to transmit the ATM identifier and the cash amount to a network device (or location) remote from the store.

The store network (which may include a secondary financial network) checks the received transaction data to determine 614 whether the requested cash withdrawal should be permitted. With network approval (step 510) of the requested cash withdrawal, the requested cash may then be dispensed via a cash dispenser in the ATM. Responsive to the approval, the store network 610 correlates (e.g., charges, debits, bills, etc.) the customer's account 616 with the cash purchase (step 512), similar to a merchandise purchase. The store network instructs the in-store ATM 620 (i.e., the ATM corresponding to the customer-provided ATM identifier 622) to dispense the requested cash amount. The instruction to the ATM may cause the ATM to immediately dispense the requested cash (step 514). The store may receive a service fee for providing the cash.

Furthermore, instead of instructing the ATM to immediately dispense the cash, the store network can provide (via the phone or a receipt) a code to the customer (step 516). This code (e.g., a number or a combination of numbers/letters) can later be inputted by the customer into the in-store ATM to receive the requested cash. The store network authorizes the ATM to dispense the requested cash amount upon receiving the inputted code (step 518). The ATM may also have a walk-up code input device that does not require conventional user verification input to operate, or other suitable input device. That is, the user does not have to insert an ATM card into the ATM prior to obtaining their cash. For example, the customer can approach the ATM, the customer inputs only the code, the ATM dispenses the cash corresponding to the code, and the customer takes their purchased cash. The ATM input device can have keys that are operative to accept manual input of the code. The ATM input device can also be operative to accept wirelessly communicated input via the phone. Furthermore, the code provided to the customer may be a network code. The network code may be used by the customer at any ATM in any store on the network. Alternatively, other identifiers, such as a biometric feature associated with the user or another type of associated identifier, may be used.

An alternative exemplary operation of purchasing cash will now be described also with respect to FIG. 101 and FIG. 102. This operation includes the additional step (step 506) of the host determining whether the selected ATM is able to perform the requested cash dispensing.

Communication is established (step 500) between the customer's portable hand-held device 600 (e.g., phone) and the store network 610. The customer requests a cash withdrawal (step 502). The customer is instructed to transmit request data (e.g., amount of cash withdrawal and/or ATM identifier). Instructions to the customer may be received via the customer's phone.

Continuing with the cash purchase, the customer transmits (step 504) the cash request data (e.g., amount of cash and/or ATM identifier). The customer may transmit data to the network (or an in-store terminal thereof) via the customer's phone. As previously discussed, the phone camera 602 may be used to transmit an image of an ATM identifier 622.

In certain arrangements the store may be assigned a default ATM. This is particularly useful when the store has a single ATM. The network uses the store's only ATM as the default ATM. Therefore, when the customer calls the store's phone number, the network matches the phone number to the store and determines the identity of the store's ATM from a data file. Hence, when a customer initially calls in an in-store cash withdrawal request, the phone number called informs the network which ATM to use. This arrangement can alleviate a customer from having to identify the ATM.

The network 610 may be programmed to check 612 the status and/or ability of the identified ATM to dispense the requested cash amount (step 506). The network confirms the ATM status as valid. Otherwise, the transaction is terminated. In other arrangements, the customer may be given additional options instead of terminating the transaction. For example, the customer may be provided the option of requesting a specifically different (e.g., nearby) ATM on the network, or the option of receiving a network code which enables the customer to receive their cash at any ATM on the network.

After the network confirms the ATM(s) involved in the cash dispense, then the customer is instructed to transmit (step 508) their account data that is to be used for payment. Again, the customer can transmit the account data (e.g., customer account data, signature, PIN) via wireless communication from the phone 600 to an in-store terminal 630 on the network. The network determines 614 (or has another system verify) whether the received account data is valid for payment of the requested cash purchase. The account data is deemed acceptable for payment (step 510), else the transaction is terminated. In other arrangements, the customer may be given another chance to continue the transaction. For example, the customer may be provided the opportunity to transmit different account data (e.g., a different customer account) for payment. If so, the network would again check the validity of the account for purposes of payment.

After the customer's account data is deemed acceptable for payment (step 510), then the store network (or another system with which the network can communicate) correlates (e.g., charges, debits, bills, etc.) the customer's account 616 with the cash purchase (step 512). The store network enables (e.g., authorizes) the indicated ATM to dispense the requested cash. This enablement may include instructing the indicated in-store ATM to immediately dispense the requested cash (step 514). Alternatively, the customer may be provided a code (step 516). The code may be received by the customer via the customer's phone or in some other manner, such as by a paper receipt. Hence, the enablement may include instructing or authorizing the indicated ATM to dispense the requested cash only in response to receiving the inputted code (step 518). Also, if the code is a network code (instead of a code only useable at a specific ATM) then the enablement may include instructing all the ATMs on the store network to dispense the requested cash upon receiving the inputted code. As previously discussed, the ATMs may also have a walk-up code input device or other suitable input device.

It should be understood that in some embodiments a user may purchase merchandise or cash from a store using stored value in a user's portable hand-held device (e.g., phone). That is, a purchase can also be made using a phone's stored cash value instead of (or in combination with) the phone's customer account data (and signature and PIN). The phone's stored value can be directly reduced, or the phone can hold the transaction data for later use in providing a charge against the user's account.

Likewise a purchase (of merchandise or cash) can be made with an electronic check, as previously discussed. The store can accrue the total cost of purchase. The user's portable hand-held device (e.g., phone) can send checking account and signature data (e.g., via IF or IR link) to the store computer's check-generating template. As previously discussed, the store computer can have the bank computer seek authorization from the user to carry out the transaction. After confirmation that an electronic check payment has occurred, then the store can complete the purchase, such as by letting the merchandise out of the store without tripping the alarm, or causing the ATM to dispense the requested cash withdrawal. Likewise, a purchase deposit can be made with an electronic check. A bank can receive an imaged check as payment in exchange for a credit/deposit to an account. After confirmation that the electronic check payment has occurred, then the account can be credited the check amount.

Thus, the portable hand-held device (e.g., a phone) also enables a user thereof to make a deposit request instead of or in addition to making a cash withdrawal request. A deposit transaction process can be carried out in a manner similar to making an item/cash transaction purchase process. That is, in a deposit transaction process, an image of an item can be captured by the hand-held device, then a request that includes the image and signature data can be transmitted to a proper authority for processing.

For example, a check deposit request can include an image of the check along with signature data (e.g., check payee/customer signature). As previously discussed, an image of a (paper or electronically displayed) check can be captured by a camera of the hand-held device. The captured check image can be stored in memory of the hand-held device, along with the user's signature data. Additionally, a check deposit request can include account data (e.g., a financial account which is to receive the credited/deposited funds) and/or the check amount. The check deposit request can be transmitted via wireless communication from the hand-held device to a transaction system computer (e.g., a server), such as in a manner previously discussed. The hand-held device can comprise a mobile phone (e.g., cellular phone, satellite phone, portable wireless VOIP, etc.).

The transaction computer can be part of a financial network, home banking system, a check deposit system, a bank, an automated check handling system, a check processing system, a check clearing house, or another financial entity which used to provide appropriate authority in check deposit transaction processing. Likewise, a previously discussed item purchase transaction or cash withdrawal transaction can be paid for by using the hand-held device to transmit (to a merchant, bank, or ATM) an imaged check as payment therefor. Data can be transmitted from the hand-held device to a computer, such as a server.

An exemplary operation of depositing a check with a hand-held device will now be described with respect to FIG. 103. The check 704 may be a payroll check (i.e., paycheck). The customer's hand-held device (phone 700) has an image capturing device (e.g., camera 702). The camera 702 can be used to capture an image of the check 704. The phone 700 also includes at least one computer or processor. The phone 700 can store the captured check image in the phone's programmable memory.

Communication is established between the phone 700 and a financial entity, such as a bank 706 that allows customers to make electronic deposits involving imaged checks. The customer requests a check deposit. The customer has to transmit by phone to the bank 706 the information necessary to enable the bank to carry out the check deposit request. The bank 706 can include or be affiliated with a check deposit transaction system 708 and a data store 710. The system 708 can include a server and the data store 710 can comprise a server data store, where the server is operatively connected to the server data store. The bank 706 can also communicate with its host computer and with other financial/business entities via financial networks 712 for purposes such as data gathering, authorization, account reconciliation, check clearing, etc.

It should be understood that for reasons of brevity, a “bank” as used herein may comprise either a financial bank, a check deposit transaction system, or another entity that receives data from a user phone during a transaction involving an imaged check. Also, the financial bank may comprise the check deposit transaction system, or the system may instead be an entity separate from the financial bank.

In an exemplary arrangement, the information required from the customer to deposit/cash the check includes at least one image of the check along with data representative of a signature. For example, a check made out to the customer (payee) would require signature data that is representative of the customer's signature. As previously discussed, signature data may include an electronic representation of an individual's written signature, data (such as a digital signature) corresponding to an individual that is associated with the individual and/or their device (such as a hand-held device), combinations thereof, or other data that serves as a signature. This signature data can reside in the phone memory.

The check image data and signature data can be wireless sent together to the bank 706 (or associate thereof) as a whole in one communication, or portions of the necessary information may be separately sent (separate phone transmissions). Also, a third-party business entity may be contracted to act on behalf of the bank to handle deposit transactions involving imaged checks transmitted by customer phones.

As previously discussed, user account data can be stored along with the user signature data in the programmable memory of the user's phone 700. The stored account data can comprise data that is representative of an account (e.g., a checking/savings account number) which is to receive the deposit. Therefore, in an exemplary embodiment, each of signature data representative of the user's signature, account data representative of the user's financial account information, and image data representative of the check are all stored in phone memory.

The account data can also be sent to the bank. Thus, the check image data, signature data, and account data can each be wirelessly transmitted from the user's portable phone 700 to the bank's check deposit transaction system 708. All of the data can be transmitted during a deposit transaction. The bank's transaction system is operative to receive this data transmitted from the customer's phone 700. Wireless communication can be used to transmit/receive data between the customer's phone 700 and the bank's transaction system. By prior agreement, the bank 706 is operative to accept the electronic signature data as customer authorization to cash the check in the check deposit transaction.

The bank computer(s) can review the check data received in an imaged check. Apparatus and process to retrieve and analyze data from imaged checks can be of the type and configuration set forth in U.S. application Ser. No. 11/728,882 filed Mar. 27, 2007, which is incorporated herein by reference in its entirety. The check image processing may include use of (character) recognition software. Following review of the check data, the bank computer can accept/reject the requested deposit transaction. Alternatively, the bank computer may conventionally seek further data/authorization from other financial resources before making a final determination on whether to accept the customer's imaged check for deposit.

The customer's signature (signature data) can then be associated with the check's image by the bank computer in a record of the check deposit transaction. The signature data can be stored in a manner that indicates that the check was legally “signed” by the customer, rendering the check from being legally signed/cashed again by the customer. The record can be stored in a bank data store.

The check image may also be modified by the bank prior to storage thereof. For example, an electronic image may be created that includes both the check image and the signature. A signature image may be made to overlie or overwrite a portion of the original check image. Also, a check image may be electronically “marked” in a manner indicating that the check has been canceled. A canceled mark image may be made to overly or overwrite a portion of an imaged check.

In other embodiments the electronic signature data (e.g., digital signature or digital certificate) may first need to be verified by the bank computer during the transaction prior to approval of the check deposit. One or more data stores may be used in the signature verification process. For example, the signature data transmitted by the phone may be compared to signature data previously stored in a bank data store, or compared to data which is calculated as a function of the transmitted data, the stored data, or both. A substantially positive match of the compared signature data can be a factor in granting the deposit request.

Confirmation of the check deposit into the customer's bank account can be transmitted from the bank (or the check deposit transaction system) to the user's phone. The phone is operative to wirelessly receive this confirmation. The confirmation can be communicated in any communication format, such as e-mail, voice mail, text message, Internet/network protocol, etc. A confirmation with an image file may include an image of the check being marked as canceled by the bank.

In another check deposit embodiment, the customer's account data does not need to be transmitted from the phone to the bank. This is also indicated in FIG. 103, where the wireless transmission of account data is shown in parentheses as being an option. Nor does the account data need to be stored in the phone. Instead, other methods for the bank to identify the customer's deposit account can be used. For example, the customer could be assigned a unique PIN (or code/password) which is linked to a specific deposit account of the customer. Only that customer has that assigned PIN. The bank computer has access to a bank data store which has correlated therein the particular account number with that particular PIN. Thus, the bank computer can retrieve from the data store the account number for that PIN. Therefore, responsive to receiving the customer's PIN, the bank computer can determine which account is to receive the deposit.

The PIN may also be stored in phone memory and transmitted along with the check image and signature to the bank. Alternatively, the PIN can be input into the phone by the customer during the transaction. Such a deposit transaction would require that only the customer signature the financial check image be stored in and transmitted from the phone memory.

In another check deposit embodiment where the customer's account data does not need to be transmitted, the customer's deposit account number can be prelinked to the phone number of the customer's phone. For example, the bank computer could recognize the customer's phone number via caller ID or some other manner. The bank computer can then use a data store to retrieve the particular (customer) deposit account correlated with that particular phone number.

In still other embodiments, a PIN and/or phone number and/or other input may be required by the bank (or other financial/business entity) to determine the deposit account of the imaged check depositor. For example, a bank computer may ask a caller (customer) to confirm the first few letters of the customer's last name, and/or may ask the caller to answer a predetermined question. Customer input can be provided to the bank via phone keys, speech/voice, and/or other known manners of phone input. A biometric identifier may also be used to determine the deposit account.

In another check deposit transaction embodiment only the check image data needs to be provided to the bank. That is, neither the customer's account data nor the customer's signature data needs to be transmitted from the phone to the bank. As a result, neither the account data nor the signature data needs to be stored in phone memory. For example, a bank may permit a check to be deposited with wording similar to “For Deposit Only” written on the rear side of the check. In such situations, the previous embodiments apply sans the need to transmit any signature data.

Without the need for a customer signature, a customer can simply send to their bank an image of the check needing depositing. The customer/bank can have a preauthorized agreement that any electronic check received by the bank from that customer is to be treated by the bank as already having “For Deposit Only” written thereon (whether or not the back side of the paper check actually has this wording physically written thereon). The bank can identify the appropriate deposit account in a manner previously discussed (e.g., by caller ID, PIN inputted via phone keypad/buttons, etc.). That is, the bank can identify the deposit account to use in the deposit transaction from user-provided data that was not stored in the phone memory, which may comprise manually (keypad) entered input.

Alternatively, instead of transmitting their electronic signature to the bank, the customer can send “For Deposit Only” to the bank. That is, in a check deposit transaction the customer can send (along with the imaged check) an electronic “For Deposit Only” statement in place of their signature. In such situations, the bank can store the statement in linked correlation with the customer via a transaction number, phone number, date/time, etc. The correlated storage of the statement provides retrievable evidence that the statement was indeed provided by the customer. The bank can also overwrite or overlie the customer's statement on a part of an image of the check.

The bank may also require a separate confirmation message from the phone user authorizing that the “For Deposit Only” statement is to be used in regard to their transmitted imaged check. This confirmation can also be stored by the bank in correlated relation with the other data involving the deposit transaction to provide additional evidence of customer authorization.

As previously discussed, an electronic check image can be supplied via a cell phone by a customer to a business entity (bank, deposit transaction system, merchant, etc.) in a transaction involving a financial check, such as a check deposit transaction or payment/purchase by check transaction. The check image may be provided along with electronic signature data, or along with both electronic signature data and deposit account data. Similarly, a check image may be provided along with statement data corresponding to an electronic “For Deposit Only” statement, or along with both statement data and customer account data. As previously discussed, a wireless deposit transaction may entail that the customer provides only the check image. Alternatively, other arrangements may require that much other data be provided by a customer, including authorization input such as a PIN, biometric data, answers to queries, etc. Thus, it should be understood that there are many different arrangements involving the amount and type of data that may need to be provided by a customer in order to conduct a transaction with an imaged check.

The necessary transaction data (image, text, and/or XML format data) can be wirelessly provided via a customer phone by any communication format capable of being sent from the phone to a bank's computer or server. For example, communication formats may comprise e-mail, text messaging (e.g., SMS), and/or an Internet/network communication protocol (e.g., HTTP, FTP).

A bank may charge a service fee for providing an electronic deposit transaction. The fee may be taken from the value of the check. Thus, the value credited to a user's account may be the check value sans the service fee (and any other fee). Also, the account credit may only be a temporary non-accessible credit or a partially accessible credit. After a predetermined period of time has passed, then the full credit becomes available for use by the account holder (e.g., the phone user). The time delay enables the bank to record the deposit on the actual date of deposit, yet allow for fraud prevention, check clearing time, etc.

In another embodiment, a bank data store (instead of the user's phone) can store the bank customer's signature. By prior customer/bank agreement, the customer authorized the bank to apply their stored electronic signature to check deposits made by that customer. The customer's signature can be stored in correlated relation with any combination of a customer's PIN, phone number, account number, and/or other phone provided input to the bank computer. In response to receiving the unique/correct customer input via the customer's phone, the bank computer can retrieve the correlated customer's signature from its data store. The retrieved signature can then be associated with the check image in performing the check deposit transaction. For example, the bank can store the retrieved signature data in correlation with the received check image data (along with other data, e.g., date, transaction number, amount, etc.) in a transaction record in a bank database.

Of course additional user input may also be required to initially enable the bank to determine (if necessary) the authority of the user to conduct a transaction with the bank. As previously discussed in regard to card memory, a phone memory can also hold data related to an authorized user. A phone can store data related to one or more authorized users of a check deposit transaction system. As previously discussed, such authorizing data can include biometric data. Thus, a biometric identifier may be used as a system access input or password/code.

A phone can include a biometric reading device that is operative to receive biometric data from a phone user. Software operating in the phone (or in a host computer) can determine whether the user can conduct a transaction with the check deposit transaction system. In an exemplary arrangement, the bank provides an outside phone (such as at an ATM) which can be shared by different bank customers authorized access to the check deposit transaction system. A customer can pick up the commonly shared phone, be biometrically recognized through physical contact with the phone as an authorized user, and then proceed with their check deposit transaction. As discussed in more detail later, the ATM can also be used to provide cash to the customer for the deposited/cashed check.

Alternatively, software in a user's phone (or a shared phone) can cause biometric data read by the phone's biometric reading device to be sent to a computer of the check deposit transaction system. The system computer is operative to cause the biometric data to be compared with user authorizing data stored in a data store. The system can determine whether the phone user's biometric data substantially corresponds to or matches the user authorizing data. Responsive to a positive determination, the phone user is then authorized to use their phone to conduct transactions with the check deposit transaction system. This arrangement also allows a customer to use someone else's phone (other than their own) which has a biometric reader and camera in a deposit transaction that does not require transmission of account data or signature data.

Also, an ATM can be part of a check depositing/cashing transaction. A customer can provide a transaction system an ATM identifier, as previously discussed. In return for the check, the system can provide the customer a code (as previously discussed) to use at the identified ATM. The customer can then use the code to retrieve cash from the ATM. Thus, some exemplary arrangements allow a customer to essentially cash a check (via an ATM) using wireless transmission of an image of that check (and other data).

Furthermore, a check transaction involving an ATM with a shared phone (as previously discussed) would not need use of a code. Instead, upon approval of the check cashing transaction, cash could be automatically dispensed from the ATM while the customer is still on the shared phone (and located at the ATM).

An exemplary arrangement/system for carrying out a check transaction includes a portable hand-held user device that includes a memory, where the memory has stored therein check image data representative of a check, where the memory has stored therein electronic signature data representative of a signature of a user of the device, wherein the device is operative to wirelessly transmit the check image data and the electronic signature data, where a check deposit transaction system is operative to wirelessly receive the check image data and the electronic signature data transmitted from the device during a check deposit transaction, where the check deposit transaction system is operative to accept the electronic signature data as user-authorized check-signing signature in the check deposit transaction.

An exemplary method of carrying out a check transaction includes storing check image data representative of a check in memory of a portable phone; storing electronic signature data representative of a signature of a user of the device in the memory; transmitting the check image data and the electronic signature data from the portable phone to a check deposit transaction system via wireless communication during a check deposit transaction; accepting the electronic signature data as a user-authorized check-signing signature in the check deposit transaction; and crediting an account for a value associated with the value of the check.

Another exemplary method includes operating a mobile phone to store in phone memory a user signature; operating the phone to take a picture of a financial check; operating the phone to send the picture and the signature to a predetermined location (e.g., bank processor, phone number, etc.) that is operative to perform a check deposit transaction using the picture and the signature.

As can be seen, the exemplary embodiments enable a person to wirelessly deposit a check into their account via a phone (e.g., videophone, picture phone, etc.). The person's transmitted signature can be used by the check cashing/depositing entity as the legally binding check-signing (endorsement) signature in the check deposit transaction. Thus, in an exemplary embodiment only an image of the front face of the check needs to be sent to the check depositing entity. As a result, the back side of the check need not be physically signed (via hand written cursive signature) by the person (payee). Nor does the back side of the check need to be imaged.

The exemplary check depositing embodiments also eliminate the need for mechanical check readers. That is, an automated system can carry out a customer transaction involving a check (e.g., check deposit) without the need to mechanically read a tangible check.

Thus the new transaction apparatus and methods described herein achieve at least some of the above stated objectives, eliminate difficulties encountered in the use of prior devices and systems, solve problems and attain the desirable results described herein.

In the foregoing description certain terms have been used for brevity, clarity and understanding. However no unnecessary limitations are to be implied therefrom because such terms are used for descriptive purposes and are intended to be broadly construed. Moreover the descriptions and illustrations given herein are by way of examples and the invention is not limited to the exact details shown and described.

In the following claims any feature described is a means for performing a function shall be construed as encompassing any means capable of performing the recited function known to those skilled in the art, and shall not be limited to the particular means shown in the foregoing description as performing the recited function or means merely equivalent thereto.

Having described the features, discoveries and principals of the invention, the manner in which it is constructed, operated and utilized, and the advantages and useful results attained; the new and useful structures, devices, elements, arrangements, parts, combinations, systems, equipment, operations, methods, and relationships are set forth in the appended claims. 

1. A method comprising: (a) operating at least one computer of a check deposit system to receive data transmitted from a mobile phone having an address, wherein the data includes check image data that corresponds to an image of a financial check having a financial value, wherein the check deposit system includes at least one data store, wherein the at least one data store includes a plurality of phone addresses, wherein each respective phone address is correlated in the at least one data store with a respective financial account,  wherein each respective financial account is associated in the at least one data store with a respective endorsing manner in which a check is to be endorsed for deposit by the check deposit system on behalf of a holder of the respective financial account; (b) operating the at least one computer to determine from use of the data received in (a), the phone address of the mobile phone; (c) operating the at least one computer to determine from use of the at least one data store, the financial account correlated with the phone address determined in (b); (d) operating the at least one computer to determine from use of the at least one data store, the endorsing manner associated with the financial account determined in (c); (e) operating the at least one computer to endorse the check according to the endorsing manner determined in (d), wherein the endorsing includes associating endorsement data with the check image data received in (a); and (f) operating the at least one computer to cause the financial account determined in (c) to be credited an amount corresponding to the financial value.
 2. The method according to claim 1 wherein the data received in (a) includes biometric data, and further comprising (g) operating the at least one computer to determine that the biometric data received in (a) substantially corresponds to user authorizing data stored in the at least one data store; and (h) responsive at least in part to the determination in (g), operating the at least one computer to authorize use of the phone to conduct a check deposit transaction with the check deposit system.
 3. The method according to claim 1 wherein in (a) the check image data comprises an image of a paper check captured through operation of the phone.
 4. The method according to claim 3 wherein the check deposit system is associated with a bank, and wherein the financial account determined in (c) comprises a customer account held with the bank.
 5. The method according to claim 1 wherein the phone has a phone number associated therewith, wherein the phone address comprises the phone number, wherein the check deposit system comprises caller ID, and further comprising (g) prior to (c), operating the at least one computer to determine the phone number using the caller ID; wherein (c) includes operating the at least one computer to determine from the at least one data store through use of the phone number determined in (g), the financial account.
 6. The method according to claim 5 and further comprising (h) operating the at least one computer to cause to be transmitted to the phone via the phone number determined in (g), confirmation that the financial account was credited the amount.
 7. The method according to claim 1 wherein the phone address comprises a network address, and further comprising (g) prior to (c), operating the at least one computer to determine from use of the data received in (a), the network address; wherein (c) includes operating the at least one computer to determine from the at least one data store through use of the network address determined in (g), the financial account, (h) operating the at least one computer to cause to be sent to the network address determined in (g), confirmation that the financial account was credited the amount.
 8. The method according to claim 1 wherein the endorsing manner determined in (d) includes using an electronic signature to endorse the check for deposit, wherein the financial account determined in (c) is associated in the at least one data store with an electronic signature of the holder of the financial account, and further comprising (g) operating the at least one computer to determine from the at least one data store through use of the financial account determined in (c), the electronic signature of the holder of the financial account; wherein (e) includes associating the electronic signature determined in (g) with the image.
 9. The method according to claim 1 wherein in (a) the check image data comprises an electronic check generated through operation of the phone.
 10. The method according to claim 1 wherein (a) includes wirelessly receiving the check image data from the mobile phone.
 11. The method according to claim 10 and further comprising (g) operating the at least one computer to cause confirmation that the financial account was credited the amount, to be wirelessly transmitted from the check deposit system to the phone.
 12. At least one computer readable medium comprising non-transitory computer executable instructions that when executed by at least one computer of a check deposit system, causes the at least one computer to carry out a method comprising: (a) operating the at least one computer of the check deposit system to receive data transmitted from a mobile phone having an address, wherein the data includes check image data that corresponds to an image of a financial check having a financial value, wherein the check deposit system includes at least one data store, wherein the at least one data store includes a plurality of phone addresses, wherein each respective phone address is correlated in the at least one data store with a respective financial account,  wherein each respective financial account is associated in the at least one data store with a respective endorsing manner in which a check is to be endorsed for deposit by the check deposit system on behalf of a holder of the respective financial account; (b) operating the at least one computer to determine from use of the data received in (a), the phone address of the mobile phone; (c) operating the at least one computer to determine from use of the at least one data store, the financial account correlated with the phone address determined in (b); (d) operating the at least one computer to determine from use of the at least one data store, the endorsing manner associated with the financial account determined in (c); (e) operating the at least one computer to endorse the check according to the endorsing manner determined in (d), wherein the endorsing includes associating endorsement data with the check image data received in (a); and (f) operating the at least one computer to cause the financial account determined in (c) to be credited an amount corresponding to the financial value.
 13. At least one computer readable medium comprising non-transitory computer executable instructions that when executed by at least one computer of a check deposit system, causes the at least one computer to carry out a method comprising: (a) operating the at least one computer of the check deposit system to both receive data corresponding to an image of a paper check captured through operation of a mobile phone, wherein the check has a financial value, and receive data sent from the mobile phone corresponding to a financial account associated with a user of the mobile phone; and (b) operating the at least one computer of the check deposit system to cause the financial account to be credited an amount corresponding to the financial value.
 14. The at least one computer readable medium according to claim 13 and further comprising: (c) operating the at least one computer of the check deposit system to receive signature data sent from the mobile phone, wherein the signature data corresponds to an electronic signature of at least one of the user and the phone.
 15. The at least one computer readable medium according to claim 14 wherein (c) includes receiving an electronic signature of the user, and further comprising: (d) operating the at least one computer to endorse the check for deposit by using the electronic signature of the user.
 16. The at least one computer readable medium according to claim 15 wherein (d) includes providing user endorsement of the check by associating the image with the electronic signature of the user.
 17. The at least one computer readable medium according to claim 13 wherein the check deposit system includes at least one data store, wherein the at least one data store associates the financial account with an electronic signature of the user, and further comprising: (c) operating the at least one computer to access the electronic signature from the at least one data store; (d) operating the at least one computer to associate the electronic signature with the image, wherein the association provides user endorsement of the check for deposit.
 18. The at least one computer readable medium according to claim 13 wherein (a) includes receiving the data corresponding to a financial account from a mobile phone having an address, and further comprising (c) operating the at least one computer to determine the address.
 19. The at least one computer readable medium according to claim 18 wherein the address determined in (c) comprises a phone number associated with the mobile phone, and further comprising (d) operating the at least one computer to cause to be transmitted to the mobile phone via the phone number determined in (c), confirmation that the financial account was credited the amount.
 20. The at least one computer readable medium according to claim 18 wherein the address determined in (c) comprises a network address of the mobile phone, and further comprising (d) operating the at least one computer to cause to be sent to the network address determined in (c), confirmation that the financial account was credited the amount. 