Automated banking machine system and method
First Claim
1. A method comprising:
- a) loading at least one public key and private key pair in an automated banking machine that includes a cash dispenser, wherein the automated banking machine is operative to use at least one symmetric cryptography key to encrypt data with a symmetric cryptography algorithm, wherein the data is associated with at least one transaction being performed at the automated banking machine;
b) enabling the automated banking machine to use at least one asymmetric cryptography algorithm with the at least one public key and private key pair;
c) receiving with the automated banking machine at least one message that includes data representative of at least one second symmetric cryptography key;
d) using the at least one asymmetric cryptography algorithm to decrypt and verify the at least one second symmetric cryptography key;
e) receiving with the automated banking machine at least one second message that includes data representative of an encrypted at least one first symmetric cryptography key; and
f) using the at least one second symmetric cryptography key to decrypt with the automated banking machine the encrypted at least one first symmetric cryptography key.
20 Assignments
0 Petitions
Accused Products
Abstract
An automated banking machine (12, 200, 302) is provided. The machine may be operative to install a terminal master key (TK) therein in response to at least one input from a single operator. The machine may include an EPP (204) that is operative to remotely receive an encrypted terminal master key from a host system (210, 304). The machine may authenticate and decrypt the terminal master key prior to accepting the terminal master key. The machine may further output through a display device (30) of the machine a one-way hash of at least one public key associated with the host system. The machine may continue with the installation of the terminal master key in response to an operator confirming that the one-way hash of the public key corresponds to a value independently known by the operator to correspond to the host system.
-
Citations
13 Claims
-
1. A method comprising:
-
a) loading at least one public key and private key pair in an automated banking machine that includes a cash dispenser, wherein the automated banking machine is operative to use at least one symmetric cryptography key to encrypt data with a symmetric cryptography algorithm, wherein the data is associated with at least one transaction being performed at the automated banking machine; b) enabling the automated banking machine to use at least one asymmetric cryptography algorithm with the at least one public key and private key pair; c) receiving with the automated banking machine at least one message that includes data representative of at least one second symmetric cryptography key; d) using the at least one asymmetric cryptography algorithm to decrypt and verify the at least one second symmetric cryptography key; e) receiving with the automated banking machine at least one second message that includes data representative of an encrypted at least one first symmetric cryptography key; and f) using the at least one second symmetric cryptography key to decrypt with the automated banking machine the encrypted at least one first symmetric cryptography key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
a) sending from an automated banking machine including a cash dispenser to a remote computer, at least one message that comprises a public key associated with the automated banking machine; b) receiving with the automated banking machine from the remote computer, at least one message that comprises a key encrypted using the public key; c) through operation of at last one processor in the automated banking machine, causing the key encrypted in (b) to be decrypted using an asymmetric cryptography algorithm and a private key stored in the automated banking machine; d) receiving with the automated banking machine from the remote computer, at least one message that comprises at least one further key encrypted using the key received in (b); e) through operation of the at least one processor in the automated banking machine, causing the at least one further key received in (d) to be decrypted using at least one symmetric cryptography algorithm and the first key; f) receiving through operation of an input device included in the automated banking machine, at least one first input; and g) through operation of the at least one processor in the machine, causing the at least one first input to be encrypted using the at least one symmetric cryptography algorithm and the at least one further key received in (d). - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. At least one article bearing computer executable instructions which are operative to cause at least one processor included in an automated banking machine to cause the automated banking machine to carry out a method comprising:
-
a) sending from the automated banking machine including a cash dispenser to a remote computer, at least one message that comprises a public key associated with the automated banking machine; b) receiving with the automated banking machine from the remote computer, at least one message that comprises a key encrypted using the public key; c) through operation of the at least one processor in the automated banking machine, causing the key encrypted in (b) to be decrypted using an asymmetric cryptography algorithm and a private key stored in the automated banking machine; d) receiving with the automated banking machine from the remote computer, at least one message that comprises at least one further key encrypted using the key received in (b); e) through operation of the at least one processor in the automated banking machine, causing the at least one further key received in (d) to be decrypted using at least one symmetric cryptography algorithm and the key; f) receiving through operation of an input device included in the automated banking machine, at least one first input; and g) through operation of the at least one processor in the machine, causing the at least one first input to be encrypted using the at least one symmetric cryptography algorithm and the at least one further key received in (d).
-
Specification