Automated banking machine component authentication system and method
First Claim
1. An automated banking machine comprising:
- a computer, wherein the computer includes a processor;
a transaction function device in operative connection with the computer, wherein the transaction function device includes a processor;
a first component operative in the processor of the computer, wherein the first component is operative to cause at least one first identity data to be accessed; and
a second component operative in the processor of the transaction function device, wherein the first component is operative to cause to be generated at least one first authentication hash from the at least one first identity data and at least one hashing argument, wherein the first component is operative to cause a randomly generated secret key to be generated, wherein the first component is operative to cause the randomly generated secret key to be encrypted using a public key associated with the second component, wherein the first component is operative to cause at least one message to be sent to the second component which includes the encrypted secret key and the at least one first authentication hash, wherein the second component is operative to cause the secret key to be decrypted with a private key that corresponds to the public key, wherein the second component is operative to cause at least one second authentication hash to be compared to the first authentication hash, wherein when the at least one first authentication hash corresponds to the at least one second authentication hash, the second component is operative to enable the transaction function device to perform a transaction function in response to at least one encrypted message received from the first component.
21 Assignments
0 Petitions
Accused Products
Abstract
An automated banking machine is provided which includes a first component and a second component. The first component is operative generate a first hash of a first identity data and a public key associated with the second component. The first component is operative to encrypt a randomly generated secret key using the public key associated with the second component. The second component is operative to receive at least one message from the first component which includes the encrypted secret key and the first hash. The second component is operative to decrypt the secret key with a private key that corresponds to the public key. The second component is operative to permit information associated with a transaction function to be communicated between the first and second components which is encrypted with the secret key when the first hash is determined by the second component to correspond to the first component.
-
Citations
55 Claims
-
1. An automated banking machine comprising:
-
a computer, wherein the computer includes a processor; a transaction function device in operative connection with the computer, wherein the transaction function device includes a processor; a first component operative in the processor of the computer, wherein the first component is operative to cause at least one first identity data to be accessed; and a second component operative in the processor of the transaction function device, wherein the first component is operative to cause to be generated at least one first authentication hash from the at least one first identity data and at least one hashing argument, wherein the first component is operative to cause a randomly generated secret key to be generated, wherein the first component is operative to cause the randomly generated secret key to be encrypted using a public key associated with the second component, wherein the first component is operative to cause at least one message to be sent to the second component which includes the encrypted secret key and the at least one first authentication hash, wherein the second component is operative to cause the secret key to be decrypted with a private key that corresponds to the public key, wherein the second component is operative to cause at least one second authentication hash to be compared to the first authentication hash, wherein when the at least one first authentication hash corresponds to the at least one second authentication hash, the second component is operative to enable the transaction function device to perform a transaction function in response to at least one encrypted message received from the first component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method comprising:
-
a) accessing at least one first identity data with a computer in an automated banking machine from at least one hardware device of the computer; b) generating with the computer at least one first authentication hash from the at least one first identity data and at least one hashing argument; c) generating with the computer a randomly generated secret key; d) encrypting with the computer the secret key using a public key associated with a transaction function device of the automated banking machine; e) sending at least one message from the computer to the transaction function device which includes the encrypted secret key and the at least one first authentication hash; f) decrypting the secret key with the transaction function device using a private key that corresponds to the public key of the transaction function device; g) comparing with the transaction function device, the at least one first authentication hash to at least one second authentication hash; and h) responsive to step (g) enabling the transaction function device to perform at least one transaction function in response to at least one encrypted message received from the computer. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
Specification