TECHNIQUES FOR REMOTE CONTROLLED PHYSICAL TRANSACTIONS WITH DYNAMIC KEY GENERATION AND AUTHENTICATION
First Claim
Patent Images
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
- receiving a request for a cash transaction from a personal mobile device of a customer;
acquiring a unique serial number for an automated teller machine (ATM) that is in proximity to the customer;
presenting authentication screens typically presented on the ATM to the customer on a display of the personal mobile device;
authenticating the customer for the cash transaction via input data supplied by the customer in response to the authentication screens and via the personal mobile device; and
generating a secure code that the customer is to supply to the ATM to complete the cash transaction once the customer is authenticated via the input data.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for remote controlled physical transactions with dynamic key generation and authentication are provided. A portable device is accessed remotely and separately from an Automated Teller Machine (ATM). The portable device is used to authenticate and initiate a cash transaction. The portable device is supplied a dynamically generated key and the key is provided to the ATM to finalize the transaction and cash is dispensed via the ATM.
167 Citations
20 Claims
-
1. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
receiving a request for a cash transaction from a personal mobile device of a customer; acquiring a unique serial number for an automated teller machine (ATM) that is in proximity to the customer; presenting authentication screens typically presented on the ATM to the customer on a display of the personal mobile device; authenticating the customer for the cash transaction via input data supplied by the customer in response to the authentication screens and via the personal mobile device; and generating a secure code that the customer is to supply to the ATM to complete the cash transaction once the customer is authenticated via the input data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented and residing within a computer-readable storage medium that is executed by one or more processors of a network to perform the method, comprising:
-
receiving a request from a first device to process a cash transaction via a second device, the second device is in physical proximity to an Automated Teller Machine (ATM), the first and second device are separate physical devices and are physically remote from one another; acquiring a mechanism for communicating with the second device from the first device; uniquely identifying the ATM via interactions with the first device; verifying a customer account for processing the cash transaction, the customer provides verifying information via the first device; concluding the cash transaction via the first device; and sending a key to the second device, the key communicated to the ATM via an operator of the second device and once provided the ATM dispenses cash to the operator to finalize the cash transaction. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A multiprocessor-implemented system, comprising:
-
an Automated Teller Machine (ATM) server implemented in a computer-readable storage medium and to execute on a sever of a network; and an ATM; the ATM server configured to communicate with one or more portable devices over the network for purposes of authenticating a cash transaction that is concluded via the dispensing of cash at the ATM, the ATM server further configured to communicate with the ATM to alter screens appearing on an ATM display and to instruct the ATM to perform one or more actions including the dispensing of the cash. - View Dependent Claims (19, 20)
-
Specification