[go: up one dir, main page]

MXPA99006053A - Cash loans without personal identification number - Google Patents

Cash loans without personal identification number

Info

Publication number
MXPA99006053A
MXPA99006053A MXPA/A/1999/006053A MX9906053A MXPA99006053A MX PA99006053 A MXPA99006053 A MX PA99006053A MX 9906053 A MX9906053 A MX 9906053A MX PA99006053 A MXPA99006053 A MX PA99006053A
Authority
MX
Mexico
Prior art keywords
customer
client
biometric information
information
biometric
Prior art date
Application number
MXPA/A/1999/006053A
Other languages
Spanish (es)
Inventor
C Stinson Michael
W Templer John Jr
Clower Dyron
Original Assignee
* Mr Payroll Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by * Mr Payroll Corporation filed Critical * Mr Payroll Corporation
Publication of MXPA99006053A publication Critical patent/MXPA99006053A/en

Links

Abstract

Automated cash loans, without a PIN (personal identification number), are provided by a device that includes an input device, a biometric device, a storage device and a processor. The input device is configured to generate an input signal corresponding to a customer identifier in response to the actuation of the input device by a client in response to the actuation of the input device by a client, and the biometric device is configured to receive biometric information. the client's. The storage device includes a database of customer information that includes stored biometric information. The electronic processor is configured to: receive the input signals from the input device, receive biometric information from the biometric device, access the customer information database to obtain customer information data to obtain customer information data for obtain data about the client, where the data includes biometric information stored from the client. The processor then compares the biometric information received with the stored biometric information, establishes contact with a verification network to request authorization for the cash loan, and approves the cash loan when the received biometric information matches the biometric information stored in a grade. sufficient to confirm the identity of the client and before receiving authorization from the verification network

Description

CASH LOANS WITHOUT PERSONAL IDENTIFICATION NUMBER TECHNICAL FIELD The invention relates to obtaining cash loans using a credit card or a debit card.
BACKGROUND In general, cardholders use an automated cash machine ("ATM") to obtain credit card or debit card loans. Cardholders insert the card into an ATM slot. The card includes a magnetic strip on which information about the card account is coded (for example, the account number). The ATM responds to the insertion of the card by requesting the card to enter the personal identification number of the ("PIN") of the cardholder. Next, the ATM uses the PIN to determine if the cardholder is actually authorized to use the card.
REF, 30712 BRIEF DESCRIPTION OF THE INVENTION The invention provides cash loans based on the credit card or debit card through the automatic ATM without requiring the use of a PIN and, in some cases without requiring the insertion of a credit card or card of debit. These transactions are designated, respectively, as cash loans without a PIN (without a personal identification number) and cash loans without a card. For ease of discussion, the following description refers to credit cards. However, a person familiar with the art will recognize that the described systems and techniques are also applicable to debit cards and similar devices. For example, instead of supplying cash, the described systems and techniques can be used to apply credits to a cash card. ATMs use biometric information instead of a PIN to confirm the identity of the client. For example, the ATM can produce an image of the customer's face as the customer types an identification number or inserts a card and can then compare the image with an image stored in association with the identification number or card number to verify the customer's identity . The use of biometric information promises to greatly improve the identification processes and reduce or eliminate the presentation of fraudulent cash loans. In addition, eliminating the need for PINs or cards when obtaining cash loans promises to increase the convenience of obtaining cash loans. In one aspect, generally, an apparatus for providing automated PINless cash loans includes an input device configured to generate an input signal corresponding to the identifier of a customer in response to the actuation of the input device by a client, a biometric device. configured to receive biometric information about the client, and a storage device that includes a database of customer information that includes stored biometric information. An electronic processor of the device is configured to receive the input signals from the input device, receive biometric information from the biometric device and have access to the client information database to obtain data about the client, the data include biometric information stored with respect to the client. The electronic processor then compares the received biometric information with the stored biometric information and contacts a verification network to request authorization for a cash loan. The processor approves the cash loan when the received biometric information matches the biometric information stored to a sufficient degree to confirm the identity of the customer, and upon receipt of authorization for the cash loan from the verification network. The modalities may include one or more of the following characteristics. The apparatus can also include a cash dispenser, wherein the electronic processor is configured to signal to the cash dispenser that supplies cash to the customer upon approval of a cash loan. - The input device can be further configured to provide input signals that indicate that a cash loan is desired and indicate the amount for the cash loan. For example, the input device can be a numeric keypad. The input device may also include a card reader configured to provide the electronic processor with an account number associated with the cash loan. The actuation of the input device may correspond to the insertion of a card into the card reader, and the customer identifier may be an account number associated with the card. The apparatus can be configured to contact a human operator to provide assistance when the client information database does not contain data about the client. For this purpose, the apparatus may include a communication port having a connection, such as a connection over the public telephony network, to a position in which the operator is located. The biometric device can be a camera such as a digital video camera, configured to obtain an image of the customer's face and the biometric information can be the image of the customer's face. The camera can be configured to obtain the image of the customer's face in response to the drive of the input device by the customer. The stored biometric information can include stored images of the customers' faces and compare the received biometric information with the stored biometric information which can include comparing an image of the customer's face of the customer's information database with the image of the client's face produced by the camera to confirm the client's identity. The apparatus may also include a second camera configured to obtain a second image of the customer's face, and the processor may be configured to compare the first and second images when the identity of the customer is confirmed. The device may also include lights placed to illuminate the client's face to improve the image obtained by the camera. The customer identifier may be an identification number, and may include multiple symbols. The input device can be configured to produce an input signal corresponding to a symbol in response to each actuation of the input device by the client. The apparatus may include an output device for providing information to the customer: For example, the input device and the output device may be provided by means of a touch screen screen. The output device can be a loudspeaker, and the apparatus can include a speech synthesizer connected to the loudspeaker and configured to provide spoken information to the customer through the loudspeaker. The input device can be a numeric keypad. The device can be configured to perform cash-check transactions. For this purpose, the apparatus may include a check reader configured to receive and read a check to be processed. The electronic processor can be configured to perform cash-check transactions by receiving the input signals from the input device, receiving information about the check to be processed from the check reader, accessing the customer information database to obtain information about the client, automatically determine if the check is accepted or rejected based on the input signals, information received about the check, and data about the customer, and upon acceptance of the check, indicate the supplier of Cash that provides cash to the customer.
The device can be configured to automatically determine whether the check is accepted or rejected by applying a set of business rules. Business rules can generally be defined to allow the processor to accept the check if the customer has previously used the device to exchange a previous check for a similar amount from a payer associated with the check to be processed. The apparatus can also be configured to accept the check when the customer information database includes a record for the customer and other criteria are satisfied. For example, the processor can be configured to accept the check when the criteria stored in the record with respect to the client are satisfied. The processor can be configured to reject the check when a criterion stored in the record for the customer is not satisfied. The storage device may also include a database of payer information, and the processor may be configured to accept the check when the customer information database includes a record for the customer, and the criteria stored in the customer are satisfied. the registration for the client, the payer information database includes a record for a payer of the check, and the criteria stored in the register for the payer are satisfied. The process can be configured to reject the check when a criterion stored in the register for the payer is not satisfied. A system for providing automated PINless cash loans can include one or more device cases together with a remotely located service center. Each apparatus may include a first communication device connected to the processor, and the service center may include a second communication device configured to communicate with the first communication device. For example, the second communication device can be configured to communicate with the first communication device using the public telephony network. The processor can be configured to confirm the identity of the client when the customer information database includes a record for the client and the received biometric information matches the stored biometric information, and to contact the remotely located service center to provide assistance when the customer information database does not include a record for the customer. The processor can also be configured to contact the remotely located service center to provide assistance when the received biometric information does not match the stored biometric information. The service center may include a storage device that includes a central customer information database, the customer information includes stored biometric information and an electronic processor connected to the second communication device and the storage device. The service center processor can be configured to receive information about a client from a second communication device, the information includes biometric information received for the client, and to access the client's central information database to obtain data. About the customer identified by the customer identifier, the data includes biometric information stored in the central database for the customer. The processor can then compare the biometric information received with the biometric information stored in the central database for the client, and control the second communication device to transmit to the first communication device an indication as to whether the received biometric information matches the biometric information stored in the base of central data for the client. The service center processor may be configured to contact a human operator at the -? O_- - _.- _ service center to provide assistance when the biometric information received does not match the biometric information stored in the database of central data for the client. The customer information database stored in the appliance storage device may include only a partial subset of customer information from the central customer information database. The service center may also include a display device for use by a human operator. The processor of the service center may be configured to display information about a transaction on the display device when the received biometric information does not match the biometric information stored in the central database for the customer, in order to allow the human operator to confirm the identity of the client. For example, the operator may request that the customer remove his hat or sunglasses and look directly at the camera. The operator can also verify the identity of the client by referring to a database that includes information about the customer's current and previous addresses, telephone numbers and neighbors. Access to the appropriate database for this purpose is available, for example, from Integrated Datábase Software, Inc. of Villa Park, Illinois.
The first communications device may be configured to initiate communications with the second communications device and to reject communications initiated by the second communications device. An apparatus for providing PIN-free cash loans can be implemented using a retroactive modification module connected to an automated teller machine having an input device and a cash dispenser. The retroactive modification module is configured to be connected to the ATM machine and includes an input / output port configured to receive an input signal from the input device of the automated teller machine. The input signal corresponds to the identifier of a client and is generated in response to the activation of the input device by the client. The retroactive modification module also includes a biometric device, a storage device and an electronic processor. The biometric device (e.g. a camera) is configured to receive biometric information about the client (e.g., an image of the customer's face). The storage device includes a database of customer information that includes biometric information stored with respect to the customer. The electronic processor is connected to the input / output port, the biometric device and the storage device, and is configured to receive the input signal from the input / output port and the biometric information from the biometric device. The processor then has access to the customer information database in response to the input signal to obtain data about the customer identified by the customer identifier, which includes biometric information stored with respect to the customer. The processor compares the biometric information received with the stored biometric information, and transmits a notification message to the input / output port. The notification message indicates that the identity of the client has been established when the received biometric information matches the stored biometric information. The systems can also be configured to provide short-term loans. When configured in this way, a system verifies the identity of the client using the biometric techniques described. After verifying the identity of the client, the system verifies that the client's checking account is in good condition. If this is the case, the system provides the client with a form that establishes the terms of the loan and asks the client to insert a check for the amount borrowed. After verifying that a check has been signed for the appropriate amount, the system provides the client with cash for the loan amount.
The system delays the cashing of the check for an agreed payment period (for example, a week). The customer can extend the payment period by making a payment before the period expires. If the client does not pay the loan or make the payment before the payment period expires, the system cashes the check. If the customer pays the loan, the system cancels the check and discards it. In some implementations, the system may return the canceled check to the customer. Other features and advantages of the invention will be apparent from the following description, including the drawings, and from the claims.
DESCRIPTION OF THE DRAWINGS Figures 1 and 2 are front and side views of an automated check-cash unit. Figures 3 and 3A are block diagrams of the check-cash unit of Figure 1. Figures 4, 5, 5A and 5B are block diagrams of the cash-check systems that use the cash-check unit of Figure 1. Figures 6A and 6B are flow charts of a procedure implemented by an ATM of the check-cash unit of Figure 1.
Figure 7 is a flowchart of a procedure implemented by a processor of the check-cash unit of Figure 1. Figures 8A and 8B are flowcharts of a procedure implemented by a centralized service center of the check system. -effective of Figure 5. Figure 9 is a table of business rules. Figure 10 is a mesh screen of the service center - centralized of the check-cash system of Figure 5. Figures 11A-11R are sub-screens of the mesh screen of Figure 10. Figures 12A and 12B are tables of figures shown in FIGS. references or sources of information and actions that will be taken by the central services center of the cash-check system of figure 5 in response to the references. Figures 13A-13S are flow charts of procedures implemented by the centralized service center in response to the references in Figure 12A. Figures 14A-14P are flow charts of procedures implemented by the centralized service center to perform the actions of Figure 12B. Figures 15A-15L are data structures used by the check-cash system of Figure 5.
Figures 16A-16F are mesh screens of a point-of-sale unit. Figures 17-19 are flow charts of procedures implemented to provide ATM transactions. Figure 20 is a flow diagram of a procedure implemented in providing loan transactions.
DETAILED DESCRIPTION OF THE INVENTION Loans can be made on credit card basis, without PIN (personal identification number) along with a check payment system such as the one described in the following. Loans can also be made using a system that performs traditional transactions or ATM without a card, or using a dedicated system. An automated check-cash unit 100, also referred to as a point-of-sale unit ("POS"), is illustrated in FIGS. 1 and 2. Cash-check unit 100 includes a touch screen screen 105, a numeric keypad 110 and a speaker 115 that allows the unit to communicate with a customer. A telephone handset 120 allows communication between the client and a remote operator. A pair of 125 digital video cameras - lfi_-. '* -_- - produce images of the client that are used to verify the identity of the client. The cash-check unit 100 also includes a check reader 130 in which a customer's check is inserted for processing. When unit 100 decides to change the customer's check, a cash dispenser 135 provides cash to the customer and a printer 140 provides the customer with a receipt. In general, the cash dispenser 135 may include four extractors or cash dispensers, where the extractors respectively contain denominations of $ 1, $ 5, $ 20 and $ 100. If desired, the cash dispenser 135 may also include a change spout. An optional card reader 145, although not necessary for the check-cash function of unit 100, allows unit 100 to provide cash loans based on the credit card and bank functions (e.g., withdrawals from an account). of checks or savings). The cash-check unit 100 also includes privacy screens 150 that provide the customer with a degree of privacy while using the check unit. Lights 155 are placed so as to illuminate the face of the client so as to allow the video cameras 125 to produce high quality images. An optional base 160 allows the cash-check unit 100 to be configured as a self-sustaining unit - 12_- - "'- - (as shown in Figures 1 and 2.) Base 160 can be removed to configure unit 100 of cash-check as a unit leaning against the wall (not shown) The cash-check unit can be mounted inside a wall, configured as a recessed unit or configured in some other way. With reference to Figure 3, the cash-check unit 100 is controlled by a processor 300. The processor 300 receives input from the client through the input portion of the touch screen 105 and through the keyboard 110. The processor provides information to the client through the screen portion of the touch screen 110. The processor may also use a speech synthesizer 305 to talk to the client through the speaker 115. A video card 310 allows the processor 300 to receive images from the cameras 125. The processor 300 uses the images to identify the client. In some cases, the processor may receive information about the identity of the client from the card reader 145. A deposit processing module 315 connected to the check reader 130 provides the processor with information about the customer's check. Using a database loaded from the storage device 320 in memory 325, the processor verifies the identity of the client and determines whether the processor is authorized to change the -? A_-. • "___ _ customer check." If the processor concludes that he is authorized to change the customer's check, the processor instructs the cash supply module 330 to supply the appropriate amount of cash to the customer through the cash dispenser 135. processor 300 provides the customer with a receipt through the printer 140. As indicated by the broken lines in figure 3 and as illustrated in figure 3A, the touch screen 105, the keyboard 110, the module 315 of deposit processing, the check reader 130, the cash dispenser module 330, the cash dispenser 135, the printer 140 and the card reader 145 can be implemented using a commercially available ATM 350 such as DPATM model number 5675 available from NCR Corporation The processor 300 can communicate with a processor 355 (FIG. 3A) of the ATM by, for example, an Ethernet connection provided by the 360 Ethe card rnet (figure 3A) and can communicate according to the TCP / IP protocol. When the processor 300 is unable to verify the identity of the customer, or is not authorized to change the customer's check automatically, the processor may transmit information about the customer and the customer's check to a centralized service center ("CSC") located remotely, through the public telephony network (see Figure 4). Staff at the CSC, or a computer at the CSC, attempt to verify the identity of the client and authorize the change of the client's check. An ISDN 335 card allows communication between the processor 300 and the CSC. The ISDN card 335 is also connected to a handset 120 to allow the customer to talk to the staff in the CSC, if necessary. In some circumstances, the ISDN 335 card can be replaced with a cellular modem or similar device. As indicated in the above, the optional card reader 145 has been included to allow the unit 100 to provide traditional ATM transactions, such as deposits, withdrawals and account statement requests. In addition, unit 100 can be configured to provide ATM transactions without a card. When the unit 100 is configured in this way, the unit 100 stores account information for clients. Unit 100 then identifies the client using biometric information as described above. When necessary, unit 100 asks the CSC or staff at the CSC to confirm the client's identity. After identifying the customer, the unit 100 contacts a gateway of a service network to determine whether the customer can perform a desired transaction (for example, to determine whether the client's account includes sufficient funds). When a unit 100 is used for ATM or credit card transactions, the security / identification aspect of the transaction processing network is isolated from the approval / processing aspect of the network. As indicated, unit 100 can provide cash loans based on the credit card. When the customer selects a cash loan based on the credit card from a menu of options and inserts a credit card into the card reader 145, the unit 100 asks the customer to enter the loan amount and the number -of Social security of the customer or other identification number. Optionally, the unit 100 may use the card number as the identification number so that the customer does not need to manually enter an identification number. If the customer requests a loan in cash for the first time (that is, if there is no record for the customer and the customer's credit card number), unit 100 contacts the CSC. An operator at the CSC confirms the identity of the customer and verifies that the customer is a person whose name appears on the credit card. While the identity of the customer is confirmed, the operator contacts the verification network for credit cards in order to obtain an authorization code for the cash loan. If the identity of the customer is confirmed and the approval for the transaction is obtained, the operator approves the cash loan upon notifying the unit 100 that supplies the requested amount of cash. A record is generated for the client in the CSC and unit 100. The record can be indexed according to the credit card number, the customer identification number, or both. The registration includes the customer's identification number, credit card number, customer's name and biometric information in the form of an image of the customer's face. The record can also include information about the credit card account, such as the credit limit. Based on the configuration of the system, the client can request subsequent cash loans based on the insertion of the credit card and the introduction of an identification number, before the insertion of the credit card (without entering an identification number) or by entering an identification number or a credit card number (without actually inserting a credit card). In each case, unit 100 uses the biometric information stored in the register to confirm the identity of the customer and makes contact with the credit card verification network by requesting an authorization code. The system can also be configured to request intervention from an operator for transactions that exceed a threshold or limit amount.
With reference to Figure 4, a large number of 100 POS units can communicate with CSC 400 via the public telephony network 405. The 100 POS units automatically change checks and perform transactions that meet certain criteria, while they differ from the CSC 400 by authorization to change checks or make transactions that do not meet the designated criteria. For security, the 100 POS units initiate all calls to the CSC and do not accept incoming calls. Similarly, the CSC accepts calls only from known 100 POS units. As shown in Figure 5, a server 500 in the CSC 400 receives and processes the calls from the 100 POS units. The server, which generally has more information available compared to a particular unit 100 POS, can determine that the check can be changed and can provide an indication for it to be made in this way to the calling unit 100 POS. When the server 500 is unable to automatically change a check and determines that a call needs the attention of the CSC staff, the server identifies an available operator and directs information about the call through an Ethernet 505 connection to the workstation 510 operator. The operator then decides whether to change the check and sends an appropriate signal to the 100 POS unit making the call. The server can direct calls based only on the availability of - 22_-. - "'-... __ operator, but you can also consider other criteria, for example, the server can direct a call to an operator who speaks in a language identified by the client when he has access to the 100 POS unit. In Figure 5A, in one implementation, the physical elements (hardware) of each 100 POS unit are implemented using an NCR 5675 ATM, two digital cameras, an Intel Pentium processor operating at 166 MHz, with 32 megabytes of memory, one disk 2.5 gigabyte hard drive, an Ethernet card that provides a coaxial cable connection between the ATM and the processor, an ISDN card, a Matrox video capture card, speakers, a telephone handset and a BRI ISDN telephone service. implementation, the physical elements (hardware) of the CSC are implemented using 23 PRI ISDN telephone service lines, a Lucent Definity phone switch, an Ascend router, two fast Ethernet hubs lOOBase T, an IBM 704 PC server configured as a call handler (2 x 200 MHz, 256 MB of memory, 2.14 GB of hard disk, redundant power supply, fast Ethernet card; an IBM 704 PC server configured as a file server (4 x 200 MHz, 256 MB of memory, 27.06 GB RAID-1 disk, a 24/48 GB internal tape autoloader, redundant power supply, fast Ethernet card); a 24-inch IBM server Rack (61 cm (35 cm (14") color screen) 101: an uninterruptible power supply Best (" UPS ") of 5.3 kVA with a capacity to operate 5 hours without power for the telephone switching, router, fast Ethernet hubs, a server rack, a file server and a call handler, and 40 workstations, each workstation can be implemented using an Intel Pentium processor operating at 200 MHz, with 32 MB of memory and a 2.5 GB hard drive, a 101 keyboard, a mouse, a fast Ethernet card, a 43 cm (17") touch screen monitor, a telephone handset and a UPS. The implementation of Figure 5A can be provided as shown in Figure 5B An ATM is connected to the POS processor through an Ethernet coaxial cable The POS unit marks within the CSC using an ISDN BRI line The CSC receives the calls in an ISDN PRI that moves inside the Definity switch. The Definity switch connects to the Ascend router using PRI ISDN. The Ascend router connects to the CSC call handler using a fast Ethernet hub lOOBaseT. Finally, the call handler, the file server and the workstations are connected by the separate fast Ethernet hub lOOBaseT. With reference to Figures 6A, 6B, 7, 8A and 8B when performing cash-check transactions, ATM 350, processor 300 and CSC 400 operate in accordance with the interaction procedures, with ATM 350 operating in accordance with a method 600, the processor 300 operates according to a method 700, and the CSC operates according to a procedure 800. As described in the following, these procedures can be modified when the system is configured to perform card transactions. credit or ATM. Initially, ATM 350 displays a screen that allows the customer to select an appropriate language (for example English or Spanish) and waits for a customer selection (step 605). When the customer selects the language (step 610), the ATM 350 asks the customer to enter the customer's social security number or other identification number. After the customer enters the social security number (step 615), the ATM 350 asks the customer to indicate the amount of the check and the customer enters the amount (step 620). Subsequently ATM 350 requests the client to endorse the check and insert the check into the check reader 130 (step 622) and the customer inserts the check (step 625). The check processing module 315 of the ATM 350 scans the check to produce images of the front and back of the check, valid the MICR code ("character recognition in magnetic ink") in the check, and reads the designated areas of the check (step 630). If the customer has not endorsed the check, as indicated by the image on the back of the check, or has incorrectly inserted the check (step 632), then the ATM returns the check to the customer and asks the customer to endorse the check (in if necessary) and reinsert the check (step 634). If the check has been endorsed and inserted properly, the ATM 350 then displays an image of the front of the check to the customer (step 635) and validates the content of the check using optical character recognition ("OCR") (step 640) . Using the recognized amount of the check, the ATM calculates the difference, if any, between the recognized amount of the check and the amount entered by the customer (step 645). Subsequently, the ATM 350 sends information to the processor 300 (step 650). The information sent includes the customer's social security number or other identification number, the images on the front and back of the check, information about whether the content of the check passes the validation stage, the amount of the check read by OCR, the amount of the check entered by the customer and the difference, if any, between the two amounts. The ATM then asks the customer to remove any hats, dark glasses or other items that may obscure the customer's face (step 652) and waits for a response from the 300 processor. The message may be accompanied by an animated character that removes the hat and dark glasses.
With reference to Figure 7, upon receipt and validation of ATM 350 information (step 705), processor 300 attempts to identify the client (step 710). For this purpose, the processor uses elements of programming (software) identification that identifies a person based on the image of a person's face. An example of programming elements (software) that is suitable for this purpose are the programming elements (software) TrueFace Cyber atch available from Miros, Inc., 572 Washington St. # 18, Wellesley, MA 02181. These programming elements (software) are described by Miros Inc., in the programmer's manual for TrueFace Version 2, which is incorporated as a reference. The identification programming (software) elements compare an image of the client produced by a camera 125 with a stored image together with the customer identification number in a database stored in the storage device 320. The image is produced when the customer enters the first digit of the customer's social security number or other identification number to ensure that the customer is observing the camera. The image from the second camera 125, although not used for comparison with the stored image, is used to verify that the image of the first camera is an image of the client instead of being an image of a photograph that is kept in - 2ß_ -. - = ..- -the front of the camera. The ATM shows a "remove hat and dark glasses" message, because the presence of a hat or sunglasses may reduce the ability of the identification (software) identification elements to identify the client. Identification (software) programming elements can also compare the image of the customer's face with a database of images associated with "bad" customers (ie, customer who have previously written bad checks or who present a record that They do this) . Other types of biometric identification programming (software) elements can be used. For example, identification (software) identification elements can identify the client using a fingerprint or palm print, DNA analysis, a retinal scanner or a voice analysis of the client. If the identification programming (software) elements approve the client (ie, if the client image matches the stored image with the customer identification number) (step 715), the processor determines whether the data associated with the client and the customer's check satisfy a set of business rules stored in the storage device 320 (step 720). - 23_- -.- .- Figure 9 illustrates the business rules 900 used by the processor in one implementation. These business rules, which are only designed to be illustrative, include a set of criteria 905 and a set of values 910. In general, when the business rules are verified, the processor refers to a payer database and a carrier database to obtain information about the customer (the carrier) and the client's employer (the payer). If the transaction violates any of the business rules, then the processor 300 is not authorized to automatically change the customer's check and must seek authorization from CSC 400. If the check satisfies the business rules (step 725), the processor 300 determines the right to charge the customer and the restitution amount (ie, the amount of cash the customer will receive) (step 730). The processor 300 then sends this information to the ATM 350 and waits for a response (step 732). With reference to Figure 6B, upon receipt of a number of rights and restitution (step 660), since the check has not yet been rejected (step 665), ATM 350 shows the amount of rights and restitution for verification by the customer (step 667). The ATM 350 then sends a transaction request message to the processor 300 (step 669). Based on the customer's response, the message - 3Q_-. - "_- _- of transaction request tells the processor that the transaction will continue or is to be canceled.If the customer has not accepted the transaction (step 671), ATM 350 returns the customer's check (step 673) ATM 350 then completes the transaction (step 675) and waits for another client (step 605) If the client has accepted the transaction (step 671), ATM 350 waits for a transaction response message from processor 300. Upon receipt of a transaction response (step 677), the ATM 350 manages the appropriate amount of money, the ATM 350 then sends a confirmation to the processor 300 (step 679) and ends the transaction '(step 675). discussed in the following, processor 300 sends a reject message in response to the first request (step 665), the ATM 350 displays a customer rejection message (step 685), returns the check to the customer (step 690) and ends the transaction as indicated above. In some cases, ATM 350 can retain the rejected check. For example, an operator in the CSC 400 can send the signal to ATM 350 to retain the rejected check if the operator determines that the check has been stolen. Referring again to Figure 7, upon receipt of a response from ATM 350 (step 734), processor 300 sends a response to ATM 350 (step 736) and waits for a confirmation. Upon receipt of the confirmation (step 738), the processor 300 registers the transaction and updates the database located in the storage device 320 (step 740). The processor then waits to receive a new data set from the ATM (step 705). If the identification programming (software) elements do not approve the client (ie, if the client image does not match the stored image, or if there is no stored image for the customer identification number) (step 715), the processor 300 initiates a call to the CSC 400 (step 745) and determines whether the data associated with the client and the customer's check satisfy the business rules (step 747). The processor 300 then acquires a bitmap file ("BMP") of the client image (step 749) for transmission to the CSC 400. The processor also initiates a call to the CSC (step 750) and obtains the BMP file for the client (step 749) if the programming elements identification software (software) approves the customer (step 715), but the check does not satisfy the business rules (step 725). After initiating a call, the processor 300 establishes a connection to the CSC 400 using an ISDN line (step 755). The processor uses a line channel to transmit data packets about the client and the client's check to the CSC 400 (step 759). The data packet includes the information sent from the ATM 350 to the processor 300 (i.e., the customer's security number or other identification number, the images of the front and back of the check, MICR information, information with respect to the content of the check has passed the validation stage, the amount of the check read by the OCR, the amount of the check entered by the customer, the difference, if any, between the two quantities), the BMP file includes an image of the client, the result of the identification procedure and the reason why the transaction is sent to the CSC. The processor uses the other channel in the line to establish a video conferencing connection between the 100 POS unit and the CSC 400. In one implementation, this connection includes bidirectional audio and unidirectional video, with fixed images that are periodically transferred from the unit 100 POS CSC 400. Other implementations may include unidirectional or multidirectional real-time video. Subsequently, the processor 300 waits for a response from the CSC with respect to the current client (step 760). While waiting for a response, the processor 300 uses any available bandwidth in the connection between the 100 POS unit and the CSC 400 to provide the CSC 400 with information about any transactions that the processor has independently processed (see, for example , step 738), from the last call of the processor to the CSC. With reference to Figure 8A, the CSC 400 processes each call from a 100 POS unit according to the procedure 800. Upon receipt of a call (step 805), the 500 server of the CSC 400 validates a security code associated with the call. Each 100 POS unit is coded with a unique serial number which is maintained in the CSC. This coded serial number serves as an authorization key to obtain CSC approvals and is transmitted in each transaction that originates from the 100 POS unit. At pre-set intervals, a new serial number is transmitted to the POS unit for additional security. If the security code is not valid, server 500 notifies POS 100 and ends the call. After validating the security code, the server 500 receives the data packet for the transaction from the unit 100 POS (step 815). The server 500 searches for a payer database for the payer of the check (for example the client's employer) (step 820). The server looks up the payer's database according to the addressing member and the account number printed on the check and provided by the ATM's check processing module.
If the server 500 finds that the payer is in the payer database (step 825), the server 500 determines whether the payer has a good payment status (step 827). If the payer does not have a good payment status, the server 500 indicates that the transaction must be rejected (step 829). If the payer has a good payment status, or if the server does not find the payer in the payer's database, the server 500 searches for a carrier database for the customer (step 831). The server 500 searches the bearer's database according to the customer's identification number. If the server 500 finds the client in the bearer database (step 833), the server 500 determines whether the bearer has a good state (ie, if the customer has a history of good check deposits) (step 835) . If the client does not have a good payment status, the server 500 indicates that the transaction must be rejected (step 837). If the client has a good state (step 835) and the payer is a payer established with a good status (step 839), the server verifies the transaction against a set of business rules (step 841). The business rules may be identical in content to the business rules 900 used by the processor 300 (see Figure 9). However, as discussed in the following, each business rule includes an identifier known as a "reference ratio", to be displayed to a CSC operator when the rule is violated, and a list of actions is taken by the operator in response to the reason for reference. In comparison, the processor 300 of the POS unit may seek to take the action of contacting the CSC in response to each reference ratio. If the transaction approves the business rules (step 843-), the server 500 indicates that the transaction must be accepted (step 845). Therefore, the 500 server can automatically accept transactions that the 100 POS unit is not authorized to accept. For example, if a customer who typically uses a POS unit in a first position changes to a POS unit in a second position, the POS unit in the second position may not have information regarding the customer in the POS unit database. . For this reason, the POS unit will be unable to identify the customer, and as a result, will not be authorized to change the customer's check. In contrast, server 500 will maintain a much larger database with information about customers who use any POS unit. For this reason, the 500 server will be able to identify the client and authorize the transaction. If the server 500 is unable to find in the bearer database (step 833), it is unable to find the - 3 £ _-. - * .- _-payer in the payer database (step 839) or if the transaction does not satisfy the business rules (step 843), the server sends the transaction to the workstation 510 of the next available operator (stage 847) and wait to receive a message from the operator. With reference to Figure 8B, upon receipt of a call from the call handler (step 849), the operator work station 510 provides the operator with a graphical user interface 1000 (§GUI§) illustrated in Figure 10. (step 850). The GUI 1000 provides the CSC operator with all the POS unit information it needs to make a decision about the validity of the transaction. The information includes information about the payer, information about the carrier, which includes a current image and file of the payer, an image of the check and an indication as to the reason for which the transaction is rejected. In general, a GUI is a series of labels that show the reasons why a transaction is not automatically approved. The GUI is in an inactive state until it receives a request for a POS unit for approval. Workstation 510 responds to operator actions by displaying appropriate GUI subscreens. These sub-screens are illustrated in Figures 11A-11R. Referring again to Figure 8B, the CSC operator responds to the references (step 855) by taking actions (step 860) which may include, among other actions, accepting the transaction, rejecting the transaction or requesting user identification. If the operator accepts the transaction, rejects the transaction or requests user identification, a message is sent to the call handler (step 862). As indicated above, although the CSC operator processes the transaction, the server 500 takes advantage of any available bandwidth of the connection between the 100 POS unit and the CSC 400 to obtain the processor 300 information about any transaction that the processor has processed independently from the last call from the processor to the CSC (step 865). After recovering all this data, the server 500 can use any other available bandwidth to update the databases of the 100 POS unit. References can be provided to the CSC and actions can be taken by the operator in response to these references, as illustrated in Figure 12A, where the actions are identified by the numbers in Figure 12A and are those identified in more detail in Figure 12B. Reference flow flowcharts are provided in Figures 13A-13S. The flow diagrams of the actions are provided in Figures 14A-14P.
Referring again to Figure 8A, upon receipt of a message from the CSC operator (step 870), or after accepting (step 845) or rejecting (step 829 or 837) the transaction, the call handler sends an appropriate message to unit 100 POS and wait for a response (step 872). Referring again to Figure 7, if the message received from the CSC is an identification request (step 767), the -100 POS unit makes an additional attempt to identify the client (step 769) and transmits a resulting BMP file to the client. CSC 500 (stage 771). If the additional attempt is unsuccessful, the server 500 may make an additional attempt to identify the client. The server 500 may be able to identify the client even if the unit 100 POS does not do so because the server has access to a larger database compared to the unit 100 POS. For example, a client who normally uses a different POS unit may not appear in the bearer database of the current POS unit, but it can be found in the bearer database of the CSC. Under these circumstances, the current POS unit may not have an image against which to compare the client's image, while the server may have this image. The server 500 then passes the BMP file and the identification results to the workstation 510-3a_- - - - _ _. of the operator for use by the operator to carry out additional actions (step 860 of Figure 8B). If the message received from the CSC is not an identification request (step 767), the processor 300 determines whether the transaction has been approved or rejected (step 773). If the transaction has been rejected, the processor 300 ends the call to the CSC 400 (step 775) and notifies the ATM 350 (step 779). If the transaction has been approved (step 773), the processor 300 determines the right for charges to the customer and the amount returned (ie, the amount of cash the customer will receive) (step 777). The processor 300 then sends this information to the ATM 350 and waits for a response (step 779). Since operator intervention is required, this right may differ from the right that has been calculated to have to approve the transaction automatically in the processor. Upon receipt of a transaction verification result from the ATM 350 (step 781), the processor 300 sends a transaction response message to the ATM 350 (step 783) and waits for a transaction confirmation message from the ATM. Upon receipt of a transaction confirmation message from the ATM, processor 300 registers the transaction and updates the database located in storage device 320 (step 787). The processor 300 then sends a completed or canceled transaction message to the CSC 400 (step 789) and ends the call to the CSC 400 (step 791). Referring again to Figure 8A, during receipt of a response from the processor 300 (step 874), the server 500 registers the transaction and updates the server databases (step 876). For tracking purposes, a check register associated with each check is handled by the CSC and includes a status code, a check provision code and an operator code. A status code of §¡Aͧ indicates that the check is waiting to be handled by an operator or a supervisor, and a status code of ¡C $? indicates that the check has been processed by an operator or a supervisor and that the POS unit has performed the appropriate function in response. The check disposition codes of 11, 12, 21, 22, 31, 32, 41 and 42 indicate that the check was accepted (§nl ") or rejected (gn2") by. the POS unit (glng), the automatic verification of CSC (Ipng), a CSC operator (? Fcng) or a CSC server (¡| 4n§). The operator code is the bank until the active check has been assigned to a specific operator, and subsequently that operator is identified. Other data structures used by the unit 100 POS and the CSC 400 are illustrated in Figures 15A-15L.
Touch sensitive screens produced by ATM 350 or a 100 POS unit are illustrated in Figures 16A-16F. The arrows between the various screens indicate the sequence and the conditions under which the screens are displayed. The programming elements (software) implemented by the CSC 400 can be described with reference to the various different modules. The first module, referred to as the call handler, includes one instance per active call and receives messages from the POS unit. The functions implemented by the call manager include reformatting and / or writing of a POS message to the CSC server and identification of the message type of the message. If the message is for a CSC operator, the handled call initiates an instant verification evaluator who attempts to automatically approve or reject the check associated with the message. If the message is for a CSC supervisor, the call manager places the message in the POS to CSC table. If the message is a photo or check image, and the related check is handled by an operator or a supervisor (ie, the check provision code for the related check is §30"or §40"), the handler calls updates an image display window for the operator or supervisor. The call handler also sends CSC mailbox items that are routed to the POS unit, and ends the call when the live call is completed by the CSC operator and all mail for the POS unit has been sent. As indicated in the above, the current check evaluator attempts to approve or reject a check automatically. the evaluator receives a storage number and a transaction number from the call handler and evaluates the business rules to determine if the check should be accepted or rejected automatically, and changes the check disposition code to show the result of the evaluation (ie §21"indicates automatic approval, §22" indicates automatic rejection, and §30"indicates that operator intervention is required.) An operator transaction manager module directs messages among the other modules." When one or more checks they need to be processed by an operator (that is, there are checks with disposition codes of §30"), and one or more operators are available, the transaction transaction manager reads from the oldest check that will be processed to the check more It will be processed, and determines for each check whether a qualified operator (that is, an operator who speaks the appropriate language) is available. In case a qualified operator is available, the operation transaction manager places the operator number in the operator code for the check and passes information about the check to the operator.
A CSC operator module provides information about the check to the operator. The CSC operator module also provides the operator with any other information necessary to evaluate the check. Once the operator makes a decision about the check, the CSC operator module changes the disposition code for the check to an appropriate value (ie, §31"if approved, §32" if rejected, and § 40"if a supervisor is required, and take appropriate action." A CSC supervisor module performs functions similar to those of the operator transaction manager and the CSC operator module, but does so for the supervisor or supervisors instead of the operator The various modules of programming elements (software) communicate with each other with messages passing between and through the modules The messages can be formatted as: module, module towards, date, time, type, priority, number of storage, transaction number and text, when the inputs of module from and module to can be equal: ATM (the ATM machine), POS (the point of sale unit), CAM (the camera) and CSC (the service center central service), and where §text§ is one or more fields delimited by commas. Figure 17 illustrates a method 1700 that can be implemented by an ATM of a POS unit that is configured to provide, in addition to the check-switching functions described above, ATM transactions without a card, traditional ATM transactions, and cash based loans on the credit card. Initially, as in procedure 600, the ATM displays a screen that allows the customer to select an appropriate language (for example, English or Spanish) and waits for the customer's selection (step 1705). When the customer selects the language (step 1710), the _ATM asks the customer whether it is a cash-check transaction, an ATM transaction or a cash loan based on a credit card (step 1715). And, some implementations, steps 1705-1715 can be eliminated by inserting a credit card or an ATM card. In these implementations, a record associated with the card indicates the type of card and the desired language. If the customer selects a check exchange transaction (step 1720), the ATM asks the customer to enter the customer's social security number or other identification number and proceed with the processing of the check as discussed in the foregoing with reference to Figures 6A, 6B, 7, 8A, and 8B (step 1725). In another variation, the ATM asks the customer for an identification number or a credit card number instead of asking the customer if a check exchange transaction, an ATM transaction or a cash loan is desired. The processor of the POS unit then determines whether the customer is a customer who wishes to exchange a check, an ATM client or a credit card client based on the customer record information which is indexed according to the identification number. of the customer or the credit card number. If the record indicates that the client performs multiple types of transactions, the processor instructs the ATM to request the client what type of transaction it wants. If the customer selects an ATM transaction or a credit card transaction, the ATM performs a credit / ATM card identification procedure to confirm the identity of the customer (step 1730). If the identification is successful (step 1735), the ATM asks the customer for instructions regarding the ATM or credit card transaction to be carried out (step 1740). The ATM then establishes contact with a network provider (step 1745) to determine if the requested transaction is authorized. For example, the ATM may contact a network provider to determine whether the customer's bank account includes sufficient funds to cover a withdrawal requested by the customer, or whether the customer has sufficient credit available to allow a cash loan. Finally, the ATM performs any authorized transaction, for example the provision of a withdrawal, acceptance of a deposit or providing a cash loan (step 1750).
If the identification is unsuccessful (step 1735), the ATM provides a rejection message to the customer (step 1755).
After processing a check (step 1725), performing authorized credit card transactions or ATM (step 1750) or rejecting an ATM or credit card customer (step 1755), the ATM waits for the next customer to arrive (step 1705). If, instead of selecting a language (step 1710), the customer inserts an ATM card in the card reader (step 1760), the ATM asks the customer to enter a personal identification number (PIN) (step 1765). If the customer enters the correct PIN for the inserted card (step 1770), the ATM asks the customer for instructions (step 1740) and proceeds as discussed above. If the customer enters an incorrect PIN for the inserted card (step 1770), the ATM determines whether the customer has exceeded an incorrect allowed number of entry (step 1775). For example, the system may allow the customer to make three attempts to enter the incorrect PIN. If the customer has not exceeded the allowed number of tickets, the ATM asks the customer to enter the PIN (step 1765). If the client has exceeded the allowed number of entries, the ATM provides a rejection message to the customer (step 1755). The ATM can be configured to return or maintain the customer's card by providing a rejection message. - 42--. "'_.- _- Instead of severing a language (step 1710) or inserting an ATM card (step 1760) the client can insert a credit card into the reader (step 1780), where the identity of the user can be determined. the card - like a credit card from the card number When this happens, the ATM attempts to identify the customer (step 1730) and proceeds as discussed in the above, ATM identification is performed (step 1730) in accordance with the method 1800 illustrated in Figure 18. Initially, the ATM asks the customer to enter the customer identification number (for example, the account number or a social security number) (step 1805) .This stage can be eliminated when the customer has inserted a credit card or an ATM card when they obtain the credit card or ATM account number directly from the card and use the account number as the customer's identification number. to the identification number to the processor of the POS unit (step 1810). The ATM then asks the customer to remove any hats, dark glasses or other items that may obscure the customer's face (stage 1815) and wait for a response from the processor. Upon receipt of the ATM identification number, the processor attempts to identify the customer (step 1820). For this purpose, the processor uses the elements of - 4fi_-. - __ _ identification programming (software) described before identifying a person based on the image of the person's face. As indicated in the above, the identification programming (software) elements compare an image of the client produced by a camera 125 with a stored image together with the customer identification number in a database stored in the storage device 320 . As also indicated in the above, other types of biometric identification programming (software) elements can be used. For example, identification (software) identification elements can identify the client using a fingerprint or palm print, DNA analysis, a retinal scanner or a voice analysis of the client. If the identification programming elements approve the customer (i.e., if the customer image matches the stored image with the customer identification number) (step 1825), the processor notifies the ATM of this approval and the ATM advances to the next step 1735 of figure 17. If the identification (software) identification elements do not approve the customer (ie, if the client image does not match the stored image, or if there is no image stored for the customer identification number), the processor initiates a call to the CSC (step 1830). The processor then obtains a - 45-- - "- = --- - bitmap file (§BMP§) from the client image (step 1835) for transmission to the CSC.After initiating a call the processor establishes a connection to the CSC using an ISDN line (step 1840) The processor uses a line channel to transmit a data packet relative to the client to the CSC (step 1845) .The data packet includes identification number, the BMP file which includes a picture of the client and an indication that the transaction is being sent to the CSC based on the results of the identification procedure.The processor uses the other channel of the line to establish a video conference connection between a POS unit and The processor then waits for a response from the CSC (stage 1850) While waiting for a response, the processor uses any available bandwidth of the connection between the POS unit and the CSC to provide to the CSC with information about any transaction that the processor has carried out independently since the last call from the processor to the CSC. With reference to Figure 19, the CSC processes the call from the POS unit according to the procedure 1900. Upon receipt of a call (step 1905), the CSC server validates a security code associated with the call, as describes in the above. After validating the security code, the server receives the data packet for the transaction from the POS unit (step 1910). The server 500 searches the carrier database or the similar databases for ATM or credit card transactions, according to the customer identification number (1915). If the server 500 is located to the client (step 1920), the server attempts to identify the client using the identification programming (software) elements to compare the BMP file sent with the data package with respect to the client image stored in the client. the database (stage 1925). If the identification is successful (step 1930) the server sends the results to the processor in the POS unit (step 1935). If the identification is not successful, the server sends an identification request to the processor in the POS unit and waits for a response (step 1940). Referring again to Figure 18, upon receipt of a message from the CSC (step 1855), the POS unit processor determines whether the message is an identification request (step 1860). If the message is an identification request, the processor makes an additional attempt to identify the customer (step 1865). If the attempt is not successful (step 1870), the processor transmits the resulting BMP file to the CSC (step 1875) and waits for a CSC response (step 1850).
The message received from the CSC is not an "identification" request (step 1860) or if the new identification is unsuccessful (step 1870), the processor ends the call (step 1880) and notifies the ATM of the content of the message. The ATM then proceeds to step 1735 of figure 17. With reference again to figure 19, upon receipt of a BMP file in response to an identification request, the server in the CSC makes an additional attempt to identify the client ( 1945 stage). The server must be able to identify the client even if the POS unit does not, because the server has access to a larger database compared to the POS unit. For example, a customer with whom he habitually uses a different POS unit may not appear in the carrier database of the current POS unit, but may appear in the bearer database of the CSC. In this circumstance, the current POS unit will have no image against which to compare the client's image, while the server will have such an image. If the identification is successful (step 1950), the server sends the results to the processor in the POS unit (step 1935). If the identification is unsuccessful (step 1950), the server sends the transaction to the workstation of the next available operator (step 1955) and waits to receive a message from the operator. The server also sends the transaction to the workstation when the customer identification number is not found in the server bearer database (step 1920). The operator's workstation shows information about the transaction to the operator (step 1960). When the identification is unsuccessful, this information may include the image stored for the client along with the image generated by the POS unit. The operator can compare these images and make a determination about whether the client erureality is who the client claims to be. The workstation can also provide the operator with other information about the client to allow the operator to ask the client about the client's identity. When the server has no records, the customer's identification number, the operator can communicate with the customer to determine if the customer has entered the correct number. In any case, the operator responds to the information received by sending an approval or rejection message to the server (step 1965), or by transferring the transaction to a supervisor as described above. The server then sends the response to the processor in the POS unit (step 1935). Other uses for which the system may be placed include, but are not limited to, payment of bills, making loans, drafting rental or sales contracts, return of presentation faxes, or provision of social security benefits or other governmental benefits. . For the payment of invoices, a cash acceptor or a similar device can be incorporated into the POS unit. Similarly, the system can be configured to make electronic transfers or to provide money orders or phone cards. Other embodiments are within the scope of the following claims. For example, in another embodiment, the check processing module of the POS unit can be deleted to form a POS unit without checks. The POS unit without checks can be located in the facilities of, for example, a large factory or refinery, and can be used to distribute the payment to employees without requiring the distribution of paychecks to employees. For such use, an employer transfers funds corresponding to the payroll to an account associated with the CSC and notifies the CSC system administrators of the payroll amounts for the different employees. The system administrators then enter these payroll amounts into the records for the employees and download the records to the appropriate POS units. An employee may use a POS unit without checks located at the employer's premises or at any other POS unit to receive their payment. When an employee uses the system to collect his payment, the POS unit, and when necessary, the CSC confirm the identity of the employee as discussed above. Then the POS unit distributes the payroll amount to the employee. In some implementations, the system can be configured to allow the employee to request less than the payroll amount from the employee and maintain the remainder of the payroll amount until a subsequent request is made. Another modality can be configured to provide short-term loans. To obtain such a loan, a client writes a check for the loan amount, which typically is from $ 100 increments. The system then provides the customer with the cash corresponding to the loan amount minus any processing rights. The system delays the cashing of the check until the loan period expires. The system also allows the customer to extend the loan period by paying an extension fee. Figure 20 illustrates a procedure 2000 that can be implemented by an ATM of a POS unit that is configured to provide short-term loans along with other functions, such as check cashing, ATM transactions without a card, traditional ATM transactions and cash loans based on credit card. For ease of discussion, the 2000 procedure only includes the stages associated with the provision of loans. However, it should be understood that the procedure can be expanded to provide additional types of transactions, and most systems will provide other transactions along with short-term loans. - £ 5_t -_ - '_._ .. Initially, as in procedure 600, the ATM displays a screen that allows the client to select an appropriate language (for example English or Spanish) and waits for a client selection ( stage 2005). When the client selects the language (stage 2010), the ATM notifies the client of the available transactions (stage 2015). In some implementations, stages 2005 and 2010 may be surrounded by the insertion of a credit card or an ATM card. In these implementations, a record associated with the card indicates the desired language. When the customer selects a loan transaction (stage 2020), the ATM asks the customer to enter the customer's social security number or other identification number (step 2025). The ATM then performs an identification procedure to confirm the identity of the client (step 2030). In particular, the system verifies the identity of the client using the biometric techniques described above. If the identification is successful (step 2035), the ATM prints a document that establishes the terms of the loan (step 2040). The document can be generated using a receipt printer, or it can be generated using a separate, dedicated printer. The ATM may further instruct the client that the insertion of a signed check constitutes acceptance of the terms of the loan.
Subsequently, the ATM asks the client to insert a signed check for the loan amount (step 2045). Generally, loans are made in increments of $ 100. This simplifies the generation of transaction rights and the subsequent verification of quantities. The ATM analyzes the check to make sure it is signed and determines the loan amount (stage 2050). In some implementations, the ATM may request the client to enter the loan amount separately. If the check is in order (step 2055), the ATM makes contact with the bank network (step 2060) to verify that the customer's checking account is in good condition (the account number for the checking account is obtained at from the analysis of the check). If the checking account is in good condition (step 2065), the ATM provides the cash to the customer (stage 2070). In general, the amount supplied is equal to the loan amount minus the processing fees. In general, the system returns to the language request screen (step 2005) after supplying cash (step 2070), determining that the account is not in good condition (step 2065), or determining that the check is not in effect. order (step 2055) or after an unsuccessful identification (step 2035). The system can carry out stages of suspending the transaction. For example, the system can contact a central service center to - 5Z_r _ - '_.- _ - try to confirm the identity of the client after an unsuccessful identification or to explain to the client how to control the check. The system keeps the check for a period that corresponds to the term of the loan (for example two weeks) before changing the check. The client can extend the period by paying additional rights that correspond to an interest rate associated with the loan. If the customer pays the loan in full, the system returns or destroys the customer's check. Automated cardless and PINless financial transactions, automated cardless payroll distribution, short-term loans and credit card-based, PIN-free cash loans can be provided by an ATM machine with retroactive modification. Traditional ATM machines include an input device, a card reader and a cash dispenser. Such machines can be modified retroactively to provide transactions without cards by connecting a retroactive modification module to the machine. In general, the retroactive modification module includes an input / output port, a biometric device, a storage device and an electronic processor. The input / output port is configured to receive an input signal from the input device of the automated teller machine. The input signal corresponds to a user identifier and is generated in response to the activation of the input device by the customer or the insertion of a credit card or an ATM card. The biometric device (for example a camera) is configured to receive biometric information about the client (for example, an image of the customer's face). The storage device includes a database of customer information, which includes biometric information stored for the customer. The electronic processor is connected to the input / output port, the biometric device and the storage device, and is configured to receive the input signal from the input / output port and the biometric information from the biometric device. The processor then accesses the customer information database in response to the input signal to obtain data about the customer identified by the customer's identifier, which includes biometric information stored for the customer. The processor compares the biometric information received with the stored biometric information and transmits a notification message to the input / output port. The notification message indicates that the identity of the client has been established when the received biometric information matches the stored biometric information. - 59 - a - '__- .. All components of the retroactive modification module can be placed in a single housing suitable for mounting on the top of the automated teller machine or on a wall above the ATM machine automated Alternatively, the input / output port, the storage device and the processor can be configured to be deposited inside the automated teller machine while the camera or other biometric device is placed in a convenient position near the automated teller machine. . When an ATM machine includes an internal video camera for surveillance purposes, the camera can be used to obtain an image of the client. In this case, the biometric device of the retroactive modification module will constitute a connection between the camera and the electronic processor of the module. The techniques described are not limited to a particular configuration of physical elements (hardware) or programming elements (software); You can find applicability in any computing or processing environment that can be used to change checks or perform similar transactions. The techniques can be implemented in physical elements (hardware) or programming elements (software) or a combination of the two. Preferably, the techniques are implemented in computer programs that run on programmable computers so that each includes a processor, a storage medium readable by the processor (which includes volatile and non-volatile memory and / or storage elements), by at least one input device and at least one output device. The program code is applied to data entered using the input device to perform the functions described and to generate output information. The output information is applied to one or more of the output devices. Each program is preferably implemented in a high-level or object-oriented programming language to communicate with a computer system. However, programs can be implemented by assembling the machine's language, if desired. In any case, the language can be compiled or interpreted. Such a computer program is preferably stored in a storage medium or device (e.g., CD-ROM, hard disk or magnetic disk) that is readable by a general-purpose or special programmable computer to configure and operate the computer when the computer Medium or storage device is read by the computer to perform the procedures described in this document. The system can also be considered to be - 61_-. - "..-.-Implement as a computer-readable storage medium, configured with a computer program, where the storage medium is configured in a way that causes a computer to operate in a specific and predefined manner. Other embodiments are within the scope of the following claims. It is noted that in relation to this date, the best method known to the applicant to carry out the aforementioned invention, is the conventional one for the manufacture of the objects or products to which it refers.

Claims (28)

  1. CLAIMS Having described the invention as above, claim as property is contained in the following claims: 1. An apparatus for providing automated cash loans, without PIN (personal identification number), characterized in that it comprises: an input device, the device for input is configured to generate an input signal corresponding to a client identifier in response to the drive of the input device by a client; a biometric device configured to receive biometric information about the client; a storage device that includes a database of customer information, customer information includes stored biometric information; and an electronic processor configured to: receive the input signals from the input device, receive biometric information from the biometric device, access the customer information database to obtain data about the client, the data include biometric information stored for the client, compare the biometric information received with the stored biometric information, contact a verification network to request authorization for a cash loan, and when the received biometric information matches the biometric information stored to a sufficient degree to confirm the identity of the client, and upon receiving authorization from the verification network, approve, the cash loan. The apparatus according to claim 1, characterized in that it comprises a cash dispenser, wherein the electronic processor is configured to signal to the cash dispenser that supplies cash to the customer upon approval of the cash loan. The apparatus according to claim 1, characterized in that the input device is further configured to provide input signals indicative that a cash loan is desired and indicate an amount for the cash loan. The apparatus according to claim 3, characterized in that the input device comprises a numeric keypad. The apparatus according to claim 4, characterized in that it comprises a card reader, wherein the card reader is configured to provide an electronic processor with an account number associated with the cash loan. 6. The apparatus according to claim 1, characterized in that. - the input device comprises a card reader, the actuation of the input device comprises the insertion of a card into the card reader, and the customer identifier comprises an account number associated with the card. The apparatus according to claim 1, characterized in that the apparatus is configured to contact a human operator for help when the client information database does not contain data about the client. The apparatus according to claim 1, characterized in that the biometric device comprises a camera configured to obtain an image of the customer's face, and the biometric information comprises an image of the customer's face. The apparatus according to claim 8, characterized in that the camera is configured to obtain the image of the face of the client in response to the actuation of the input device by the client. 10. The apparatus according to claim 8, characterized in that: the stored biometric information comprises stored images of the customers' faces, and when comparing the biometric information received from the stored biometric information comprises comparing an image of the customer's face from of the customer information database with the image of the customer's face produced by the camera to confirm the identity of the customer. 11. The apparatus according to claim 8, characterized in that the camera comprises a digital video camera. The apparatus according to claim 8, characterized in that it further comprises a second camera configured to obtain a second image of the customer's face, wherein the processor is configured to compare the first and second images when the identity of the client is confirmed. . 13. The apparatus according to claim 8, characterized in that it also comprises lights placed to illuminate the face of the client to improve an image obtained by the camera. 14. The apparatus according to claim 1, characterized in that it further comprises an output device for providing information to the customer. The apparatus according to claim 14, characterized in that the input device and the output device comprise a touch-sensitive screen. 16. The apparatus according to claim 14, characterized in that the output device comprises a loudspeaker, the apparatus further comprises a voice synthesizer connected to the loudspeaker and configured to provide spoken information to the customer through the loudspeaker. 17. A system for providing automated cash loans, without PIN, the system is characterized in that it includes the apparatus according to claim 1, and a remotely located service center, wherein: the apparatus further comprises a first connected communication device with the processor, and the service center comprises a second communication device configured to communicate with the first communication device. 18. The system according to claim 17, characterized in that the second communications device-62- to-'.- _ is configured to communicate with the first communication device using a public telephony network. The system according to claim 17, characterized in that the processor is configured to confirm the identity of the client when the client information database includes a record for the client and the received biometric information matches the stored biometric information, and to establish a contact with the remotely located service center for help when the customer information database does not include a record for the customer. The system according to claim 19, characterized in that the processor is configured to contact the remotely located service center for assistance when the received biometric information does not match the stored biometric information. The system according to claim 17, characterized in that the service center further comprises: a storage device that includes a central customer information database, the customer information includes stored biometric information; and - 6 £ _t. - ___ an electronic processor connected with a second communication device and with the storage device, and configured to: receive information about - a client from the second communication device, the information includes biometric information received for the client, access the central customer information database to obtain data about the customer identified by the customer identifier, the data include biometric information stored in the central database for the customer, compare the received biometric information with the biometric information stored in the customer's database. the central database for the client, and controlling the second communication device for transmitting to the first communication device an indication of whether the received biometric information matches the biometric information stored in the central database for the client. 22. The system according to claim 21, characterized in that the service center processor is configured to contact a human operator at the service center for assistance when the biometric information received does not match the -6S--. '_.- _-biometric information stored in the central database for the client. 23. The system according to claim 21, characterized in that - the customer information database stored in the storage device of the apparatus includes only a partial subset of the customer information of the central database of the information of the customer. client. 24. The system according to claim 21, characterized in that: the service center further comprises a display device for use by a human operator, and the service center processor is configured to: display information about the loan in cash on the display screen to allow a human operator confirm the identity of the client when the biometric information received does not match the biometric information stored in the central database for the client. 25. The system according to claim 21, characterized in that it further comprises a second instance of the apparatus according to claim 1. 26. A retroactive modification module for configuring an automated teller machine having a -7Q_-. --___ _ input device and a cash dispenser to provide cash loan transactions without PIN, the retroactive modification module is configured to be connected to an ATM machine, and comprises: a configured input / output port to receive an input signal from the input device of the ATM machine, the input signal corresponds to a user identifier and is generated in response to the drive of the input device by the customer; a biometric device configured to receive biometric information about the client; a storage device that includes a database of customer information; customer information includes biometric information stored for the customer; and an electronic processor connected to the input / output port, the biometric device and the storage device, the processor is configured to: receive the input signal from the input / output port, receive biometric information from the biometric device, access the database for customer information in response to the input signal to obtain data about the customer identified by the customer identifier, the data include biometric information stored for the customer, compare the biometric information received with the stored biometric information, and transmitting a notification message to the input / output port, the notification message indicates that the identity of the client has been established when the received biometric information matches the stored biometric information. The module according to claim 26, characterized in that the biometric device comprises a camera configured to obtain an image of the customer's face, and the biometric information comprises the image of the customer's face. 28. An apparatus for providing loans, characterized in that it comprises: an input device, the input device is configured to generate an input signal corresponding to the customer's identifier in response to the actuation of the input device by a client; a biometric device configured to receive biometric information regarding the client, - a storage device that includes a database of customer information, the client information includes stored biometric information;- v a check reader configured to read a check to determine a check amount and an account number associated with the check; and an electronic processor configured to: receive the input signals from the input device, receive biometric information from the biometric device, access the customer information database to obtain data about the client, the data include biometric information stored for the client, compare the biometric information received with the stored biometric information, contact a network provider to determine if an account associated with the account number is in good condition, and when the received biometric information matches the biometric information stored to a sufficient degree to confirm the identity of the user, and upon determination that the account is in good condition, approve the loan in an amount less than or equal to the amount of the check. SUMMARY OF THE INVENTION Automated cash loans, without a PIN (personal identification number), are provided by a device that includes an input device, a biometric device, a storage device and a processor. The input device is configured to generate an input signal corresponding to a customer identifier in response to the actuation of the input device by a client, and the biometric device is configured to receive biometric information about the client. The storage device includes a database of customer information that includes stored biometric information. The electronic processor is configured to: receive the input signals from the input device, receive biometric information from the biometric device, access the client information database to obtain data about the client, where the data includes biometric information stored by the customer. The processor then compares the biometric information received with the stored biometric information, establishes contact with a verification network to request authorization for the cash loan, and approves the cash loan when the received biometric information matches the biometric information stored in a grade. enough to confirm the identity of the client and before receiving authorization from the verification network.
MXPA/A/1999/006053A 1998-06-25 1999-06-25 Cash loans without personal identification number MXPA99006053A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/104702 1998-06-25
US104702 1998-06-25

Publications (1)

Publication Number Publication Date
MXPA99006053A true MXPA99006053A (en) 2000-10-01

Family

ID=

Similar Documents

Publication Publication Date Title
US6045039A (en) Cardless automated teller transactions
US12243025B2 (en) System for providing goods and services based on accrued but unpaid earnings
US6786398B1 (en) Method and apparatus for automatic cashing of a negotiable instrument
WO1998035298A9 (en) Biometric check verification system
US20080041942A1 (en) Biometric Multi-Purpose Terminal, Payroll and Work Management System and Related Methods
US20090127328A1 (en) Biometric multi-purpose biometric terminal, payroll and work management system and related methods
CA2276017A1 (en) Pinless cash advances
MXPA99006053A (en) Cash loans without personal identification number