WO1998011714A2 - Systeme de securite pour guichet automatique - Google Patents

Systeme de securite pour guichet automatique Download PDF

Info

Publication number
WO1998011714A2
WO1998011714A2 PCT/US1997/016357 US9716357W WO9811714A2 WO 1998011714 A2 WO1998011714 A2 WO 1998011714A2 US 9716357 W US9716357 W US 9716357W WO 9811714 A2 WO9811714 A2 WO 9811714A2
Authority
WO
WIPO (PCT)
Prior art keywords
image
transaction
security system
images
atm
Prior art date
Application number
PCT/US1997/016357
Other languages
English (en)
Other versions
WO1998011714A3 (fr
Inventor
Kenneth R. Hackett
Kenneth G. Van Horn
William H. Wickman, Jr.
Original Assignee
Katatel, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Katatel, Inc. filed Critical Katatel, Inc.
Priority to AU43500/97A priority Critical patent/AU4350097A/en
Publication of WO1998011714A2 publication Critical patent/WO1998011714A2/fr
Publication of WO1998011714A3 publication Critical patent/WO1998011714A3/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/201Accessories of ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/207Surveillance aspects at ATMs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • This invention relates generally to the field of security systems for Automated Teller Machines (hereinafter ATMs) and, more particularly, to an inventive system for capturing optical images in response to the initiation of a transaction at the ATM, digitally storing the images for transaction-based, random access, and transferring the captured images to a remote location such that the images are viewable at the remote location.
  • the system may also readily be configured to respond to alarm signals and/or other input signals and to provide a range of outputs including, for example, system status indications.
  • One risk relates to fraudulent card use.
  • a stolen card may be used by an unidentified person in an attempt to withdraw money from the account of a bank customer.
  • the bank and law enforcement authorities are interested in information which may identify the person attempting the illegal transaction.
  • Another risk is claims by customers that they did not make a particular transaction, even though the transaction in question was properly recorded against a customer's account and the card was not lost or stolen. In such a case, the customer possibly made the transaction and then simply forgot about it. Alternatively, a member of the customer's immediate family may have borrowed the card and originated the transaction without telling the customer. Either way, the bank would find information establishing the identity of the person initiating the transaction as being of great value. Still another risk relates to physical protection of the ATM. Aside from the money which the ATM contains, there is a considerable investment in the machine itself. Since most ATMs are generally unattended and are open 24 hours a day, there are potentially many times during the course of a day or night when the machine goes unobserved for substantial periods of time.
  • videotape recording system which is located at the ATM site.
  • This system detects a transaction initiated at the ATM and then records one or more frames of analog video information of the person initiating the transaction on videotape. While this system will provide an image of the person initiating the transaction, it is subject to the limitations that are imposed by an analog videotape system. For example, videotape does not provide for ready, selective access to the images recorded thereon. Locating a particular recorded image may require an arduous, time consuming review of the contents of the tape. Further, the system does not readily provide for immediate or meaningful response to, for example, a theft by way of unauthorized access to the ATMs safe or to the use of a stolen card.
  • the present invention represents a significant improvement in the art by virtue of its ability to provide the following: • A security system for an ATM that captures/digitally stores images in corresponding relation to a triggering transaction and/or responsive to an alarm input. • A security system for an ATM that readily transfers/captures images from the ATM to at least one remote location wherein the images are viewable at the remote location.
  • a security system for an ATM that digitally stores captured images on removable media at the ATM such that the removable media can be transported to a remote location where the images may be selectively viewed via random access at the remote location.
  • the ATM is connected to and cooperates with an ATM network for processing a transaction initiated at the ATM by a person.
  • the security system generally includes at least one image capture unit or camera at the ATM for capturing at least one image of the person, storage media for digitally storing images captured by the camera, and means for transferring the images from the imaging means to image storage media for storage as digitized image data and from the imaging means to at least one remote location wherein the images are viewable at the remote location.
  • the image is captured as electrical pixel signals utilizing, e.g., a CCD camera board or on-chip arrangement, thus facilitating efficient digitization, transfer and image data storage.
  • CCD cameras can provide a variable image resolution that is selectable. Resolution can be controlled by appropriate application of voltages to electrodes of the CCD chip during image capture.
  • the cameras may continuously capture images. A predetermined number of these images may be temporarily stored by the camera or by storage media. At completion of capture of a new image, the oldest temporarily stored image may be replaced by the new image.
  • the temporarily stored images comprise pre-event images.
  • the system may be configured such that a particular camera then captures a predetermined number of post-event images. Thereafter, pre-event and post- event images may be digitally stored, in relation to that particular transaction or alarm event, at the ATM and/or immediately transferred to the remote monitoring station.
  • This latter feature advantageously permits the system operator to see the state of the monitored area or zone before, during and after the actual event.
  • the storage media may comprise a hard drive which stores images in a non-volatile manner.
  • the image transfer means includes removable storage media which may be removed from the ATM and transported to the remote location whereby to accomplish transfer of the images. The images may then be viewed at the remote location in a way which provides random access to the images.
  • viewing transferred images using a random access format allows an operator to perform searches based on parameters associated with a transaction or alarm event.
  • parameters include, but are not limited to, the transaction number, the account number, the amount and the date and time at which the transaction or alarm event occurred.
  • transaction information is obtained from the ATM network during processing of the transaction.
  • the transaction information is stored in a way which correlates the transaction information with one or more images which are captured and digitally stored responsive to the transaction processing.
  • the transaction information and the transaction images are stored in separate, but associated file locations such that images may be located by searching the stored transaction data without searching the stored image data.
  • the transaction and image files are correlated using their respective file names. Accordingly, a search may identify a particular transaction file by locating therein, for example, an account number or transaction number. Once the transaction file is identified, the name of that transaction file is in a format which specifically identifies all images correlated therewith such that the system may directly retrieve the image files.
  • the transaction information and image information are stored in a first file and a control index table is stored in a second file. The control index table includes certain portions of the transaction information for each transaction, correlated with the specific location of the transaction information within the first file.
  • the system responds to specific data which may form part of the transaction data by transferring one or more transaction images to the remote monitoring station when that specific data is identified.
  • the system can be configured to respond in this way to an account number which is obtained from the ATM network upon initiation of a transaction by a customer at the ATM.
  • the system responds to data obtained from the ATM network which indicates that a cash withdrawal transaction currently being processed, i.e., the person initiating the transaction is present at the ATM, is of an amount which is greater than a predetermined threshold amount. Response may include the immediate transfer of images to the remote monitoring station.
  • the system is configured to respond to one or more inputs wherein the input may trigger the capture of images or wherein the system may respond to the input by providing indications or by actuating a particular device.
  • image capture in accordance with this aspect may be triggered by inputs such as intrusion sensors or motion detectors.
  • An intrusion sensor may monitor a door such as a vault door.
  • the intrusion sensor outputs a signal directly to a camera which captures an image of the area of the subject door if the latter is opened.
  • these images are stored at the ATM and transmitted to the remote monitoring station at a convenient time for review by security personnel.
  • these images are stored at the ATM and promptly transferred to the remote monitoring station for immediate review.
  • the system provides an output signal responsive to the input signal.
  • the input signal can be provided by an intrusion sensor or other such device.
  • the output signal may be used to actuate an alarm bell.
  • the input signal arms or disarms a security section which comprises one or more cameras that are responsive to signals other than the initiation of transactions.
  • the input signal can be provided from a device such as a key switch at the ATM and or from the remote monitoring station via telephone line.
  • the system monitors at least one of its elements and provides an output indication responsive to the status of the monitored element.
  • the system includes either permanent or removable storage media as the monitored element.
  • the output indication is provided in the form of an illuminated indication lamp at the ATM responsive to image storage media being filled to a predetermined image storage capacity.
  • a watchdog module monitors the overall security system at the ATM to insure that it has not "locked up.”
  • the watch dog module includes a timer which is automatically reset at regular intervals. In the event that the timer "times out," the system is automatically rebooted by the watch dog module. In one feature, after rebooting, the remote monitoring station is notified that a system malfunction occurred.
  • each camera digitizes and compresses the electrical pixel signals for an image before the image is transferred. Once the images are transferred to the remote location they are subsequently decompressed for display to an operator. In this manner, the physical amount of data required to transmit an image(s) is decreased and the corresponding time required to transfer the image(s) is thereby decreased.
  • each camera digitizes and compresses the image data, as in the above-noted aspect, and further includes compression identification information with the transmitted image data.
  • the monitoring station decompresses the image data responsive to the compression identification information.
  • the monitoring station includes a plurality of decompression algorithms with one of the decompression algorithms being selected for use in decompressing the image data by the associated compression identification information.
  • the compression identification information includes information that is used by the decompression algorithm to decompress the corresponding image data.
  • the compression identification information can include a compression table that is generated by a camera for image data having a selected image resolution. The compression table is transmitted along with the associated image data to the remote location for use in a decompression algorithm during decompression of the image data.
  • FIG. 1 is an explanatory diagram illustrating a first embodiment of a security system for use in capturing optical images in areas associated with an ATM and for transferring the images to a remote location in one of several different ways.
  • FIG. 2 is a block diagram illustrating the components which make up the embodiment of the system of FIG. 1 at the ATM and at the remote monitoring station.
  • FIG. 3 is a flow chart describing and showing the system of the present invention in accordance with the first embodiment.
  • FIG. 4 is an explanatory diagram illustrating a second embodiment of a security system for use in capturing optical images in areas associated with an ATM and for transferring the images to a remote location in one of several different ways.
  • FIG. 5 is a block diagram illustrating the components which make up the second embodiment of the system in FIG. 4 at the ATM and at the remote monitoring station.
  • FIG. 6 is a chart illustrating a directory tree used for storing image data in accordance with a directory structure utilized by the second embodiment of the present invention.
  • FIG. 1 illustrates a diagrammatic plan view of a security system, generally indicated by reference numeral 50, constructed in accordance with the present invention.
  • System 50 monitors an ATM 52 housed in a structure 54.
  • Structure 54 includes a customer access door 56 which provides access to a customer lobby 58. Since most ATMs are open 24 hours, customer access door 56 is normally unlocked, however, in some applications it may be desirable to lock this door during certain time periods.
  • a service door 60 provides access to a maintenance area 62.
  • Service door 60 is normally closed and locked unless it is being used by service personnel, however, it is shown in its opened position in the present example for illustrative purposes.
  • ATM 52 includes a customer console 64 at which a customer may insert an appropriate card (not shown) into a slot 66 whereby to initiate a transaction on ATM 52.
  • ATM 52 Transactions are conducted by the ATM in cooperation with an ATM network (not shown) to which ATM 52 is connected via a network modem 68 and a network cable 70 dedicated to servicing the ATM.
  • Network cable 70 leaves structure 54 in an underground conduit 72 in order to prevent unauthorized access to the network cable and any other critical cables.
  • the outward appearance of ATM 52 may take on many different configurations. Functionally, however, ATMs are generally very similar in that they communicate with the ATM network so as to allow customers to perform typical transactions such as, for example, deposits to savings or checking accounts and cash withdrawals.
  • the customer interacts with a display screen 74 and a plurality of buttons 76 which are associated with the display screen.
  • a vault 78 stores money 80 which may be provided to a customer from a dispenser slot 82 on customer console 64 in a manner which is well known to those familiar with ATM operation.
  • Vault 78 includes an access door 84 which opens to maintenance area 62 and which is typically in a closed and locked position, but is shown in its opened position for purposes of illustration.
  • Camera 90a and 90b form part of a transaction monitoring section of system 50 while cameras 90c and 90d form part of alarm event monitoring section of the system. It should be noted that the system can readily be provided with or without the alarm monitoring section dependent upon a particular application.
  • Camera 90a is mounted at customer console 64 for providing an image from the console of the face of a person standing in zone 92a directly before the console during a transaction.
  • camera 90a is hidden from the view of customers in a well known manner by, for example, being concealed behind a plastic panel which is specifically configured for that purpose. Due to its well- concealed location and close proximity to persons initiating transactions, images provided by camera 90a are typically very useful.
  • Camera 90b provides an image of zone
  • Camera 90c is positioned for providing images of maintenance area 62 towards vault 78 and the remainder of the ATM equipment which is accessible from maintenance area 62.
  • Camera 90d is positioned for imaging maintenance area 62 towards service door 60 and anyone entering this door.
  • Cameras 90b, 90c and 90d are each housed in housings 94b, 94c and
  • housings normally permit the cameras to be concealed from obvious view whereby to protect the cameras from vandalism or from a person who wishes to disable the cameras in order to prevent further image capture.
  • arrangement and number of cameras may be modified in an unlimited number of ways within the scope of the present invention and that the depicted arrangement is shown for illustrative purposes.
  • the arrangement and number of cameras at a particular site will depend on the configuration of the site itself in conjunction with application specific monitoring considerations.
  • the system is configured to respond rapidly to events which trigger the capture of images. For example, if an alarm event and a transaction occur at essentially the same time, the cameras independently capture images. In this way, images are captured immediately after the occurrence of each triggering event.
  • System 50 further includes, a component enclosure 96, which is installed at a suitable location within the ATM site and a remote monitoring station 98 at a remote location.
  • component enclosure 96 is shown positioned directly adjacent an ATM electronics package 100.
  • a network interface module 101 which will be described at an appropriate point below, is spliced into a network data cable 102 which interconnects the ATM electronics package with network modem 68.
  • network data cable 102 which interconnects the ATM electronics package with network modem 68.
  • component enclosure 96 is shown adjacent ATM electronics package 100, other locations may also be found to be suitable. For example, even in cases where the component enclosure is designed to be tamper resistant, access to the enclosure by unauthorized persons should be limited whenever possible.
  • enclosure 96 includes a door 103 with a lock 104 whereby to permit controlled access to the interior of enclosure 96 by authorized personnel only.
  • a plurality of RS-485 data cables 105 interconnects cameras 90 with component enclosure 96.
  • the sizes of enclosure 96 and of cables 105 have been exaggerated for illustrative purposes.
  • these cables as with all components of the system located at the ATM, should be hidden and/or arranged in a way which avoids unauthorized access thereto. Cables 105 are only partially shown for purposes of simplicity and since they are readily provided.
  • Still further components of the system include two intrusion sensors 106 and 107 which are positioned to monitor service door 60 and vault access door 84, respectively.
  • sensors are of a type which are well known in the art and typically include magnetic members, 106a and 107a, mounted on the door and sensing members, 106b and 107b, mounted on the frame of their respective doors.
  • the sensing members sense the magnetic fields from their associated magnets when the doors are in their closed positions using, for example, reed switches in the sensing members which close or open a pair of contacts in the presence of the magnetic field.
  • the signal from each sensing member is coupled directly to a respective camera 90c or 90d, as will be described.
  • Many other types of sensors known in the art for sensing the position of a door or window are suitable for use with the present invention.
  • system 50 is adaptable for use with virtually all types of sensors including, but not limited to, motion detectors and smoke alarms.
  • a remotely actuable locking mechanism 108 is attached to customer service door 60.
  • Remote lock 108 is of a type which is well known in the art. As noted previously, this lock is useful in denying customer access to the ATM during certain hours, for example, when the machine is out of service or closed.
  • remote lock 108 may be provided with a card reader (not shown) into which a customer inserts his or her card. The card reader reads a magnetic strip on the card and, upon verification of predetermined parameters read from the magnetic strip, unlocks lock 108.
  • security is enhanced by permitting only card holders to enter the ATM customer lobby.
  • An alarm bell 109 also of a standard type, is located on the exterior of structure 54 at a position which is generally inaccessible.
  • a key switch 1 10 is positioned on the exterior of the ATM structure adjacent service door 60.
  • Components including remote lock 108, alarm bell 109 and key switch 1 10 are connected with component enclosure 96 using appropriate and readily providable cables. These cables are not shown in the present figure for purposes of simplicity. At this time, however, it is sufficient to note that these cables, as with many other cables at an ATM site, should be hidden whereby to prevent unauthorized access. As a further precaution, such cables may also incorporate protective jacketing which resists severing.
  • remote monitoring station 98 includes a display monitor 113, a keyboard 1 14, a computer 1 16 and a modem 1 18 connected with a standard telephone line 119 which is, in turn connected with a standard switched telephone network.
  • a printer 121 is also connected with computer 1 16.
  • the printer should be of a type which is capable of printing text or high resolution graphics for image reproduction. Alternatively, two printers (not shown) may be used wherein one printer is dedicated to textual printing and the other printer is dedicated to rendering image data.
  • the latter may be a standard personal computer and includes a mass memory 122, I/O circuitry 124, a CPU 126, and a memory 128.
  • An image transfer/search program 130 which is designed in accordance with the present invention, is stored in mass memory 122.
  • a removable hard drive bay 132 is accessible from the front of computer 1 16 and is configured to receive an appropriate removable hard drive.
  • the components which make up computer 116 are interconnected in a standard way, as is well known in the art, using data busses which are not shown for purposes of simplicity.
  • a monitoring station operator 134 is seated at monitoring station 98.
  • the operation of image transfer/search program 130 will be described later in conjunction with a general discussion of the overall operational features of the present invention. It is to be understood that the configuration of remote monitoring station 98 can be modified in an unlimited number of ways within the scope of the invention and that this specific configuration is shown for illustrative purposes only.
  • FIG. 2 in conjunction with FIG. 1.
  • Each camera 90 includes a respective image capture section 138a, b, c and d, a respective processing section 139a, b, c and d, and a respective temporary image storage section 140a, b, c and d.
  • temporary image storage section 140 for each camera may be located at other points within the system. Images are digitally captured by the cameras. That is, these cameras transduce the images to the form of electrical pixel signals, convert the electrical pixel signals to a digital format and store the digitized images.
  • the digitized images can be compressed in accordance with a number of formats, several of which will be described below. It should be understood that image compression is useful in increasing the rate at which images may be transmitted and in conserving space on digital storage media such as, for example, a fixed disk.
  • One type of camera which is particularly useful in the present application is a solid state CCD camera.
  • CCD cameras in addition to being solid state, resides in the fact that captured image resolution is readily controllable by the proper application of voltages to the electrodes of the CCD chip itself, as is known to those of ordinary skill in the art.
  • CCD cameras, as well as other camera types capture light in individual picture elements or pixels.
  • the pixels are arranged in the form of an array of 320 by 240 pixels for the highest resolution images which can be captured.
  • An array of 156 by 100 pixels may be captured to comprise a medium resolution image or an array of 80 by 48 pixels may be captured to comprise a low resolution image.
  • a range of image resolutions facilitates optimization of high transmission throughput (since lower resolution images contain less data), providing the highest image quality or a combination thereof.
  • the digital format provides for a wide variety of image processing options which are well known to those having ordinary skill in the art and which are continuously undergoing improvement. For example, digitized images may be enlarged, reduced and enhanced in a wide variety of ways.
  • RS-485 data lines 105 are, in turn, connected with a bi-directional RS-232 to RS-485 converter 144.
  • the latter converts the standard full duplex RS-232 COM 2 interface of a personal computer 146 to a fully bidirectional half duplex RS-485 interface in order to enable communication from computer 146 to the cameras and, conversely, from the cameras to computer 146.
  • each camera is assigned a unique address within a predetermined range of possible addresses. The camera address may be set, for example, by a set of DIP switches located in each camera. Any communications transmitted through the RS- 485/RS-232 interface to or from a respective camera will contain that camera's unique address.
  • variable image resolution provided by the cameras is selectable by software commands from personal computer 146.
  • the variable image resolution may be achieved as described above.
  • variable image resolution may be achieved in many other ways.
  • processing section 139 at each camera may select a subset of the full array (320 by 240 pixels) of image data for each image to provide the selected image resolution.
  • Processing section 139 compresses the image data before it is transmitted to personal computer 104. The compressed image data is subsequently decompressed for viewing at the remote monitoring station.
  • One or more data compression decompression algorithms can be included in image processing sections 139 and in computer 1 16.
  • the compression algorithm used by processing section 139 is selectable by a command from personal computer 146.
  • the image processing portion includes compression identification information with the compressed image data that selects the decompression algorithm used by computer 1 16 to decompress the image at the remote location.
  • the compression/decompression algorithm can include a differential pulse-code modulation (DPCM) standard algorithm.
  • DPCM differential pulse-code modulation
  • the image processing portion transmits substantially all of the image data in the first image transmitted and, thereafter, transmits only the image data that changes in subsequent images.
  • the compression/decompression algorithm can be a discrete cosine transformation (DCT) compression algorithm with run length encoding (RLE) data reduction or a Huffman algorithm such as used in the Joint Photographic Experts Group (JPEG) standard.
  • DCT discrete cosine transformation
  • RLE run length encoding
  • JPEG Joint Photographic Experts Group
  • the data compression/decompression algorithms are adapted to support the variable image resolutions as provided by processing sections 139.
  • the image processing portion transmits compression identification information that includes information developed by the compression algorithm for image data having a selected image resolution.
  • the compression identification information is used by the decompression algorithm in computer 1 16 to decompress the transmitted image data.
  • a main hard drive 148 and a removable hard drive 150 are interfaced with personal computer 146.
  • Removable hard drive 148 is positioned within enclosure 96 so as to facilitate its removal through door 103.
  • Main hard drive 148 stores a basic operating system 152, a software control program 154 for controlling the overall operation of system 50, a group of transaction data files 156 and a group of digital transaction image files 158.
  • Each transaction image file 158 is derived from an image initially captured by either transaction monitoring camera 90a or 90b and, thereafter, converted to digital form for transfer to main hard drive 148.
  • the transaction data file group contains transaction data files which are associated with the digital image files contained by the image file group.
  • image data file group 158 and transaction data file group 156 an identical file structure is maintained on removable hard drive 150.
  • Specific details of the operation of software control program 154 including a discussion of the way in which image transfer from cameras 90 to the drives may be accomplished will be provided at an appropriate point below in conjunction with an overall discussion of system operation. Initially, however, system operations will be described in general terms whereby to facilitate a basic understanding by the reader.
  • the total number of images storable by each of the main and removable hard drives is determined by a number of factors such as, for example, the number of pixels for which corresponding digital data is stored per image and the physical storage size in megabytes of the respective drives.
  • a 120 megabyte hard drive is capable of storing approximately 8000 images wherein each image is represented digital data corresponding to pixel arrays of 320 by 240.
  • Various sizes of hard drives may be utilized in implementing the system based upon specific operational parameters, as determined for a particular system.
  • the main hard drive may contain some images which are not present on the removable hard drive.
  • an input/output module (hereinafter I/O module) 160 handles inputs and provides outputs for controlling the system.
  • I/O module 160 is connected to printer port LPT1 of personal computer 146 by a data cable 162.
  • One input to module 160 is provided in the form of an arm/disarm signal on line 164. This signal in one embodiment is provided from key switch 1 10 which is located adjacent service door 60.
  • Another input is provided by a switch closure from a card insertion sensor 165 (FIG. 2). The latter closes upon insertion of a card into slot 66 on the front panel of the ATM.
  • I/O module 160 in the present example, is configured to provide three different outputs.
  • line 166 outputs a signal which illuminates an indicator lamp 168 responsive to removable hard drive 150 being filled to its storage capacity.
  • Lamp 168 will normally be mounted on component enclosure 96 in a conspicuous location so as to be noticed during servicing of the ATM.
  • Another line 170 is connected from I/O module 160 to alarm bell 109 whereby to activate the latter in the event of unauthorized access, for example, to maintenance area 62 or vault 78 responsive to intrusion sensors 106 and/or 107. This alarm activation feature is useful, for example, during hours when the ATM is not typically serviced, such as at night.
  • Still another output is provided from a line 172 which is connected with remotely actuable lock 108.
  • Network interface module 101 detects this information and provides it to COM 1 of personal computer 146 via line 178.
  • Personal computer 146 then stores all or preselected portions of this information in a transaction data file which forms part of transaction data file group 156 on both main hard drive 148 and removable hard drive 150.
  • a modem 180 is interfaced with serial port COM 3 of personal computer 146 via an RS-232 data line 182. The modem is then connected with a dedicated telephone line 184 for providing communication with remote monitoring station 98.
  • telephone line 184 Since telephone line 184 is of critical importance, it leaves the ATM site via underground conduit 72 and is connected with switched telephone network 120. It is to be understood that wireless communication may readily be used as an alternative to switched telephone network 120.
  • the system may be implemented using a cellular telephone transceiver.
  • Previously described sensing members 107b and 106b are connected to respective cameras 90c or 90d by cables 186 and 188, as shown in FIG. 2. Responsive to a signal on cable 186 or 188 caused, for example, by a contact closure in sensing member 106b or 107b, when either service door 60 or vault door 78 is opened, the associated camera is triggered or forced to capture at least one alarm image of its associated zone.
  • Alarm images are stored on main hard drive 148 in an alarm image file group 190.
  • each alarm image is stored in a file within alarm image file group 190 which is named using a particular advantageous format which incorporates the date and time at which the image was captured as an integral part of the file name. This format will be described in conjunction with a discussion of the transaction file name format at an appropriate point below.
  • Alarm image file group 190 is also recorded on removable hard drive 150. Alarm and transaction images may be transferred to monitoring station 98 in a number of different ways, as will be described.
  • software control program 154 prepares files on the main and removable hard drives for storing both the transaction information and the images which are being captured. Thereafter, program 154 produces software commands selectively addressing and instructing cameras 90a and 90b to capture transaction images in digital electrical pixel signal form.
  • the cameras may be instructed to capture one or more transaction images or, in a particular application, only one of the cameras may be instructed to capture one or more transaction images, as specified by software command. It should be understood that cameras 90 which capture transaction images may continuously capture and store images. For example, each camera may be configured to store four images such that the oldest image is continually being replaced by a newer image.
  • a particular camera may capture two new images immediately following transaction initiation while continuing to store the two newest images which were captured prior to initiation of the transaction. These four images may then be stored on the hard drives or transferred to the remote monitoring station.
  • the system advantageously provides the operator with the ability to see images recorded before, during and after the initiation of the transaction.
  • the system may instruct the transaction cameras to continuously capture images and the system may temporarily store these images on either the main or removable hard drive (as opposed to storage by temporary image storage sections 140). Once a transaction is initiated, the temporarily stored images are readily available on the drive as pre-event images.
  • pre-event images are then stored on the hard drive(s), in accordance with the file structure, as transaction image files correlated with that transaction along with post-event transaction image files.
  • transaction images post-event
  • these commands may be issued prior to creating the appropriate files.
  • the specific file-naming formats used on the main and removable hard drives will be described immediately hereinafter.
  • the network interface module obtains transaction information directly from the network in an autonomous manner which does not affect the operation of the network.
  • the transaction data file is named using a date/time stamp.
  • the date/time stamp is obtained from the standard clock which forms part of personal computer 146. This feature is particularly useful when initiation of a transaction is detected by card insertion sensor 165 in the instance where information is not available from the ATM network due, for example, to incompatibility.
  • the date/time stamp is created from the transaction information provided by network interface module 101. Other relevant information is then incorporated into the file name along with the date/time stamp.
  • Any other desired pieces of information such as, for example, the customer's name, the transaction number, the account number, the type of transaction and its amount may be stored as digital data within the transaction data file itself such that all of the information relating to each transaction is available for searching.
  • the following format is used for the transaction data file name:
  • C: ⁇ DATA ⁇ is the directory on the main hard drive in which the file is stored.
  • Succeeding information then comprises the date/time stamp wherein "YYYY” indicates the year, "MM” indicates the month, HHMM is the time in hours and minutes based upon a twenty-four hour clock.
  • C indicates the ATM number which can range from A to Z ("A” will be used in the following examples for purposes of simplicity) and CMP is the file extension which is unique to a transaction file. Accordingly, a transaction file for images captured at 22:19 (10:19 p.m.) on
  • the associated transaction image data files are named using the format: C: ⁇ DATA ⁇ YYYYMMDD ⁇ HHMMCn.CMP
  • transaction images are processed and available, they are downloaded from temporary storage sections 140 through RS-485 bus cables 105 and converter 144 to personal computer 146. The latter then stores the images in digital form in image group 156 on each of the main and removable hard drives.
  • the number of captured images per camera may be set from 0 to 5, as desired. It should be noted that setting a camera to capture no images effectively disables that camera.
  • Alarm image files are named in a manner consistent with transaction files except, of course, there is no corresponding transaction file, since information for alarm image files cannot be obtained from the ATM network. Accordingly, an alarm image captured by camera 90c (camera 3) at 13:40 (1 :40 p.m.) on April 3, 1996 and stored on main hard drive 148 would be named:
  • corresponding file names may derived for removable hard drive 150 by replacing the leading "C" with a "D". Furthermore, when a camera is instructed to capture multiple images, these images are stored in a single alarm image file.
  • this file structure may be modified in any number of ways while continuing to embody the concepts of the present invention. Additionally, this file structure is readily adaptable for use on systems which use operating systems other than DOS.
  • alarm images are captured by cameras 90c and 90d, which comprise part of the alarm reporting section of system 50.
  • this alarm reporting section is armed or disarmed responsive to key switch 1 10 and/or from remote monitoring station 98.
  • capture of alarm images by these cameras is triggered responsive to intrusion sensors 106 and 107 which monitor service door 60 and vault 78, respectively.
  • a signal from one of these sensors causes its associated camera to immediately begin capturing one or more alarm images.
  • cameras which are part of the alarm reporting section may continuously capture images for temporary storage either at the camera or on the hard drive(s) so as to provide the previously described advantage of seeing the condition of the monitored zone before, during and after receipt of the alarm event.
  • Software control program 154 routinely checks these cameras whereby to ascertain whether alarm image capture is underway or whether images are compressed and ready for transfer to the main and removable drives. Once alarm images are ready, they are then stored in alarm image data files in file group 190 along with alarm image data files corresponding to a specified number (if any) of pre- event images in accordance with the file-naming format described above.
  • System 50 may be configured for handling the alarm images in a variety of different ways after storage, as will be described at an appropriate point below.
  • the cameras may be instructed to capture images at a predetermined interval during periods of inactivity. This surveillance feature may, of course, be interrupted by other system activities such as the receipt of alarm or transaction events.
  • main hard drive 148 and removable hard drive 150 are each capable of storing a predetermined number of alarm image files, transaction image files and transaction data files. In the event that either the main hard or removable hard drive becomes full, new images are written over the oldest images which are present on each respective drive. While the system of the present embodiment is configured to store image and transaction files on main hard drive 148 and removable hard drive 150 directly from temporary image storage sections 140 many alternatives are possible in accordance with the scope of the present invention. For example, image files may be transferred to main hard drive 148 directly from the temporary image storage sections, as above. Thereafter, the image files may be transferred from the main hard drive to the removable hard drive.
  • the removable hard drive may be allowed to remain installed at the ATM for a period of time, continuing to accumulate transaction files and alarm images from day to day until such time that it has nearly reached its storage capacity. At this point, the removable hard drive should be removed. After the removable hard drive is removed from enclosure 96 via door 103, it is taken to monitoring station 98 or a similar such station. If a review of the images on the transported removable hard drive is necessary, the drive may be placed in removable hard drive bay 132 within computer 1 16. Image transfer/search program 130 then provides monitoring station operator 134 with complete and random access to transaction data files 156, transaction image files 158 and alarm image files 190 stored by the removable hard drive.
  • station operator 134 can immediately begin a search for an alarm image captured at that time using random access, as provided by the hard drive in cooperation with image search/transfer program 130. If a particular image satisfies the search requirements entered by the operator, image transfer/ search program 130 will indicate the presence of this particular file to the operator and, upon request, prepare the file for viewing. Thus, operator 1 4 can quickly move about at will among the captured images. Other features are provided for rapidly locating images. For example, up to ten separate images may be viewed at once along with associated transaction data.
  • transaction data files may be searched for by date and time based on the name of the file or based on any other information contained in the file such as, for example, a transaction number. Once the search locates a transaction data file, per these parameters, the system can quickly access the associated transaction image files based upon the previously described file name formats. The located information can then be presented to operator 134 on display monitor 113 in a number of different ways.
  • one tool automatically cycles through all of the images gathered, displaying one image at a time on the operator's display monitor. During cycling, the operator may vary the rate at which the image cycling occurs or terminate cycling with the display of one of the images.
  • any image and associated transaction data may be printed by printer 121.
  • files may be saved in well known formats such as, for example, bitmapped images (.BMP) so as to able information distribution and exchange with the authorities or, possibly, other financial institutions. If immediate review of the images present on a particular removable hard drive is not required, the drive can be archived for later reference.
  • bitmapped images .BMP
  • Image transfer/search program 130 also permits random access to information on both the main and removable hard drives from the remote location using modem 1 18 at the remote monitoring station and modem 180 at the ATM. Access to a particular ATM is gained by calling the ATM on telephone line 119 from computer 1 16 at the remote location. Program 130 stores site specific configuration information for each ATM that it services.
  • Such information may include, but is not limited to the following: (1) an ATM site ID which may be a unique eight character alphanumeric string, (2) a text description of the location of the ATM, (3) the ATM address, (4) telephone numbers for the modems at the remote monitoring station and at the ATM site, (5) user ID's and passwords which are required for remote access, (6) a problem reporting number through which system malfunctions may be automatically reported, (7) camera ID's including a description of the type of image provided by each camera, for example, an image of the customer's face or a general surveillance image, (8) the number of images which each camera is instructed to capture in response to a transaction event or an alarm event, (9) a list of cameras which are assigned to operate in a surveillance mode, and (10) specification of an inter-image interval between successive surveillance images.
  • operator 134 will typically be required to enter his or her specific user password prior to being allowed access to the ATM data. Upon entry of the correct password, operator 134 is able to perform searches, view transaction data and view images which are associated with transaction data files in essentially the same manner and using appropriate ones of the tools described above with regard to the removable hard drive. Additionally, the transaction images, transaction files and surveillance images may be selectively transferred to computer 116 at the remote monitoring station by specifying a known file name or a range of file names. For example, the operator may specify a search for all transactions made under a specific card number. The system then searches the transaction data files for that card number.
  • the entirety of transaction information available for each identified transaction is made available to the operator.
  • the operator may then order the system to selectively retrieve transaction images in accordance with the file-naming structure described previously wherein the name of the identified transaction data file is used to provide direct and random access to the image file without the need for further data searching.
  • the retrieved images may then be printed, if so desired.
  • the system operator may instruct one or more cameras at a specific ATM site to immediately capture images and, thereafter, transfer these images to the remote location for evaluation by the operator. This feature facilitates checking the overall operation of the system and may be useful in other instances as well, for example, if continued monitoring of a particular person present at an ATM is desired.
  • image transfer/search program 130 includes capabilities for modifying appropriate portions of the ATM site configuration data. For example, new user ID's and passwords may be entered and the number of images captured per camera may be changed, as needed. The changed information is then transferred to the affected ATM site via telephone.
  • Image data files typically store relatively large amounts of information.
  • high resolution data files that is 320 by 240 pixels, comprise approximately 10 to 15 kilobytes per image on a hard drive.
  • a transaction data file stores far less information.
  • a typical transaction data file may be as small as 100 bytes.
  • transaction data may makeup less than 1% of the information stored relating to transactions.
  • System 50 may be configured to process alarm images in any number of different ways.
  • ATMs require regular service during which, for example, door 84 of vault 78 is opened. It may be advantageous, at least from the viewpoint of a bank, to record one or more images of anyone who opens vault 84, as a security record.
  • This feature is readily provided by camera 90c in cooperation with intrusion sensor 107, which monitors the vault door.
  • a similar feature is provided by camera 90d in cooperation with intrusion sensor 106 which primarily images service door 60.
  • alarm images are being used as a security record
  • the occurrence of an alarm based on intrusion sensors 106 or 107 may not necessitate immediate notification of the remote monitoring station.
  • the system may be configured to handle these alarm images in different ways at different times. For example, during the ATM's normal operational hours, alarm images responsive to maintenance may simply be recorded locally on the main and/or removable hard drives. These images may then be transferred to the monitoring station (which may be at the bank) at a convenient predetermined time so that security personnel may review the alarm images. Alternatively, alarm images collected at night, when maintenance is not generally performed, may dictate the need for immediate attention.
  • these images may be stored locally in addition to being immediately transferred to the monitoring station. Security personnel at the monitoring station may then determine if a response to the alarm is warranted.
  • software control program 154 may be configured to monitor transaction data during its transfer to the hard drives whereby to respond in predetermined ways upon detection of certain information in the transaction data. For example, virtually every bank or financial institution has a "hot list" of cards which are not valid for various reasons such as being expired, lost or stolen. To that end, a hot list file 192 may be stored on main hard drive 150. The hot list file is transferred from the remote monitoring station to the ATM using image transfer/ search program 130 at regular intervals such as, for instance, each morning whereby to keep the hot list up to date. The cards may be identified in hot list file 192 using account numbers. When a person attempts to use a card which is identified on the hot list, the system captures images, as with a normal transaction.
  • the system may respond to withdrawal transaction amounts which are greater than or equal to a certain threshold amount such as $300.00.
  • a certain threshold amount such as $300.00.
  • a withdrawal transaction above this amount may illicit immediate transfer of images and transaction data to remote monitoring station 98.
  • This threshold amount is presetable within image transfer/search program 130.
  • the present invention provides other advantages in that various outputs can be provided by software control program 154 via I/O module 160. It is to be understood that these outputs can be used for actuating a wide variety of components including, but not limited to, turning power on or off, activating lighting, activating indicator lamps, actuating remote locking mechanisms and sounding alarm signals. The latter three items are implemented in the embodiment of FIGS. 1 and 2, as indicator lamp 168, remote lock 108 and alarm bell 109. Indicator lamp 168, in the present example, illuminates when the removable hard drive is full. It should be appreciated that the capability for providing such indications is significant since a monitor or other such display device will not typically be used at the ATM.
  • the remote lock described previously, is used in locking customer access door 56. However, it may be moved, for example, to service door 60 or additional locks may be added, as needed.
  • the alarm bell as noted, may be actuated responsive to unauthorized access to the vault, however, it should be appreciated that the alarm bell may be disabled, actuated responsive to different inputs at different times, or actuated responsive to multiple sensors at the same time. For example, during the day the alarm bell may be disabled.
  • the bell may sound responsive to sensors 106 or 107.
  • the bell may sound responsive to a sensor (not shown) positioned on the customer access door in addition to sounding responsive to sensors 106 or 107.
  • system 50 is readily adaptable for use in monitoring more than one ATM at one site by appropriately arranging the cameras and providing separate I/O functions for each machine.
  • Step 200 the main program is entered.
  • Step 204 then performs housekeeping in which inputs are monitored and outputs are updated.
  • indicator lamp 168 is updated by illuminating the lamp if the removable hard drive is full and the arm/disarm status is updated by checking key switch 110 and activating or deactivating the alarm section consistent with the update.
  • Step 206 is then entered in which the COM 1 buffer is checked for transaction data placed in the buffer by network interface module 101 responsive to a transaction. If there is no transaction data, step 208 is performed. If, on the other hand, there is transaction data in the COM 1 buffer or if card insertion sensor 165 detects the initiation of a transaction, step 210 is next performed in which the transaction processing branch of the program begins by first creating a Date/Time stamp from the real time clock of personal computer 146 for use in naming files in accordance with the file-naming format previously described. Alternatively, as previously described, date and time information for the transaction may be had directly from the transaction data on the ATM network when data is obtained from the COM 1 buffer.
  • step 212 creates a date directory on the main and removable hard drives in the form C: ⁇ DATA ⁇ YYYYMMDD, as described.
  • this directory will be created only once, typically with the occurrence of the first transaction for that date. It is to be understood that when operations are referred to using the "C" nomenclature of the main hard drive that an equivalent step is also performed on the removable hard drive,
  • step for the removable hard drive is performed immediately after carrying out the step for the main hard drive.
  • the program may carry out all the steps of transaction processing, presently being described, and then loop through the branch a second time whereby to perform the steps for the removable hard drive.
  • Step 214 the transaction data file, C: ⁇ DATA ⁇ YYYYMMDD ⁇ HHMMC.TRN is opened in transaction data file group 156.
  • Step 216 opens the transaction image files,
  • step 212 the transaction data is written into the transaction data file.
  • Step 220 sends out software command packets including the address of each respective camera (90a and 90b) via COM 2 of personal computer 146 whereby to cause a software initiated forced capture of one or more transaction images by each camera.
  • step 220 responds to requirements for storage of pre-event images by retrieving temporarily stored and previously compressed images from either the cameras or one of the hard drives, dependent upon the configuration of the system.
  • step 222 the images captured following transaction initiation are compressed by processing sections 139 of the cameras and stored in temporary storage sections 140.
  • the transaction images captured responsive to software command are downloaded onto main hard drive 148 and removable hard drive 150.
  • transaction processing is completed for one transaction.
  • step 226 the system moves to step 208 if transaction data is not present in the COM 1 buffer of personal computer 146.
  • Step 208 checks for an incoming telephone call on modem 180. If no call is detected, the system goes to step 226. However, if a call is detected, it is answered at step 228.
  • a timer is started.
  • this timer is implemented in software in a manner which is well known in the art and may form part of software control program 154.
  • Step 232 monitors the timer. If the timer times out, the system goes to step 234 and hangs up, having not made a connection with modem 1 18 at the remote monitoring station. Thereafter, step 236 returns to housekeeping step 204. Until such time that the timer times out, however, steps 232 and 238 form a loop in which step 238 checks for a connection between the modems. If a connection is accomplished, step 240 is performed. Step 240 then checks the data transfer rate at which the modems have connected. If the rate is slower than a predetermined minimum transfer rate, step 234 is performed wherein the system hangs up.
  • step 240 determines that the data rate is above the minimum, step 244 is next performed in which COM 3 (the port to which modem 180 is connected) is connected with STDIN, which is the standard input for the PC, such that the remote monitoring station can take control of personal computer 146 in a manner which is well known in the art.
  • STDIN which is the standard input for the PC
  • Step 226 may be entered following any of steps 208, 224 or 246.
  • Step 226 checks the cameras whereby to ascertain whether they are active or idling. If a camera is active, it may be in the process of compressing an image or the image may be ready for transfer to the main and removable hard drives via personal computer 146.
  • Step 248 determines whether each camera, if it is not idling, has an image ready for transfer. If the image is not ready, a jump to the main program loop at step 204 is made and the image or images will be downloaded on a subsequent pass through these steps. If an image is ready, it is downloaded to personal computer 146 at step 250 and then saved on the main and removable drives in step 252.
  • the alarm section in the present example comprises cameras 90c and 90d which may be armed using key switch 1 10 or, alternatively, remotely from monitoring station 98. If the alarm section is enabled and if alarm images have been recorded, these alarms are reported in step 256 in accordance with the system settings, for example, by immediately transferring one or more alarm images and associated transaction data to the remote monitoring station.
  • FIG. 4 illustrates a diagrammatic plan view of a second embodiment of a security system, generally indicated by reference numeral
  • System 300 monitors a first ATM 302 and a second ATM 304. Since ATMs 302 and 304 are similar to ATM 52, which was described in detail in the discussion above, descriptions of like components will not be repeated. For purposes of clarity, however, reference numbers of like components applied to ATM 302 end in an "a" while reference numbers of like components applied to ATM 304 end in a "b". For example, structure 54 for ATM 302 is indicated by the reference number 54a while for ATM 304 the reference number 54b is applied to the structure.
  • System 300 may just as readily be configured to monitor a single ATM. In the case where two ATMs are monitored, the physical separation therebetween is limited since electrical cabling must run between the two ATMs. Separation between the ATMs is determined by factors such as, for example, signal loss in this cabling.
  • system 50 includes two video cameras 310a and 31 Ob in ATM 302 which capture images of zones 312a and 312b, respectively.
  • ATM 304 two video cameras 314a and 314b capture images of zones 316a and 316b, respectively.
  • Cameras 310a and 314a are mounted in a similar manner to camera 90a of the first embodiment, while cameras 310a and 314b are mounted in a similar manner to camera 90b of the first embodiment.
  • this particular camera arrangement is not required and may be changed in an unlimited number of ways in view of a particular application.
  • Cameras 310b and 314b are each housed in housings 318 and 320, respectively. The latter housings being similar to housings 94 of the first embodiment. It should also be appreciated that, like system 50, system 300 is configured to respond rapidly to events which require the storage of images, as will be seen hereinafter.
  • System 300 further includes a component enclosure 322, which is installed at a suitable location within ATM 302 and a remote monitoring station 324 at remote location. It is to be understood that component enclosure 322 may just as readily be located within ATM 304 or, in another alternative, this component enclosure may be housed in an altogether separate structure (not shown) which is configured for this application. For purposes of clarity, component enclosure 322 is shown positioned directly adjacent ATM electronics package 100a.
  • Network data cables 102a,b connect ATM electronics packages 100a,b with network modems 68a,b at ATMs 302 and 304, respectively.
  • a plurality of video cables 326 interconnects cameras 310 and 314 with component enclosure 322. Cables 326 are illustrated only partially since they are readily provided. Moreover, these cables, as with all components of the system located at the
  • underground conduits 328 extending between the two ATMs may be utilized for cables 326 and other signal cables to be described below.
  • system 300 is adaptable for use with virtually all types of sensors including, but not limited to, door sensors, motion detectors, smoke alarms and any form of contact closure. While not all of the sensors shown and described with regard to system 50 are depicted as part of system 300, it is to be understood that these sensors are not illustrated in system 300 for purposes of brevity only and that system 300 may readily be configured to include any of these sensors.
  • motion detectors 330 and 332 are positioned so as to monitor the ATM customer lobbies. The signal from each motion detector is coupled directly to component enclosure 322 using appropriate, readily provided cables (not shown).
  • system 300 provides a great deal of flexibility in the specified response of the system to sensors such as motion detectors 330 and 332.
  • remote monitoring station 324 includes previously described display monitor 1 13, keyboard 1 14, computer 1 16, modem 1 18 connected with standard telephone line 1 19 and printer 121. The reader is referred to descriptions of these components appearing above, if needed. Reference numbers of other like components at monitoring station 324, which appear above, will also be applied whenever possible.
  • An image control program 327 which is designed in accordance with the present invention, is stored in mass memory 122 of computer 1 16. The operation of image control program 327 will be described later in conjunction with a general discussion of the overall operational features of system 300.
  • FIG. 5 illustrates, in diagrammatic block diagram form, the internal components of enclosure 322 and the interconnections formed between other components which are located at ATM 302 and/or 304.
  • Each camera 310 or 314 transmits a standard video signal, for example, NTSC or CCIR to a frame grabber board 336 that is connected with a personal computer 338.
  • Frame grabber board 336 is of a type which is known to those of ordinary skill in the art and is readily available.
  • the cameras are labeled as CAM 1 through 4 in FIG. 2.
  • Main fixed disk 340 stores a basic operating system 342, a control program 344 for controlling the overall operation of system 300 at the ATM site and a directory structure 346 which stores image frames collected from the cameras along with correlated information in a predetermined and highly advantageous way, as will be described at an appropriate point below.
  • an input/ output (I/O) module 348 designed in accordance with the present invention is connected with LPTl of computer 338.
  • a modem 350 is connected with computer 338 and with a standard switched telephone network line 352.
  • I/O module 348 handles inputs and provides output indications for controlling the system.
  • inputs to module 348 include previously described motion detectors 330 and 332. Two more inputs are provided by card insertion sensors 165a (ATM 54a) and 165b (ATM 54b) which close upon insertion of a card into the card slot on the respective ATM front panels.
  • control program 344 may include settings which dictate that a series of four frames is stored which are taken by CAM 1 in response to motion detector 328 wherein each of the frames are separated by one specified interval while, at the same time, CAM 2 captures a series of only two image frames wherein these images are separated by another specified interval.
  • no images taken by CAM 2 may be stored.
  • Captured image frames are stored in directory structure 346 on main fixed disk 340.
  • I/O module 348 in the present example, is configured to provide three different output indications.
  • system 300 of the present invention is configured to provide a great deal of flexibility with regard to its I/O capabilities. In this way, the system can be readily configured to accommodate a wide range of I/O applications. For example, outputs may be used to actuate alarm 109 which was shown and described with regard to the first embodiment, or for power control, also described above.
  • System 300 further includes one network interface module 101a which is connected to COM 1 of personal computer 338 and another network interface module 101b which is connected to COM 2. Details regarding operation of the network interface module provided for the first embodiment of the invention remain applicable here.
  • cameras 310 and 314 continuously provide analog video signals to frame grabber 336 of the selected format (NTSC or CCIR).
  • the frame grabber is capable of capturing any individual frame or series of frames at specified intervals for one or more designated cameras, converting the analog frame signal to a digital electrical pixel signal image format and providing the digitized image to computer 338.
  • a transaction may be detected by the presence of transaction information in either the COM 1 or COM 2 buffers of personal computer 338.
  • card insertion sensors 165a or 165b may also initiate a transaction in the case where no transaction data is present in the Com port buffers.
  • control program 344 causes personal computer 338 to transfer one or more specified video images from frame grabber 336 to directory structure 346 on main fixed disk 340.
  • System 300 is configured so as to store a predetermined number of images from each camera in accordance with settings stored by control program 344. It is also mentioned that these settings along with many other aspects of system configuration may be changed from remote monitoring station 324 using image control program 327.
  • FIG. 6 illustrates a directory tree which corresponds to directory structure 346.
  • program 344 creates a date directory 364 for storing all of the information collected during each day.
  • Directory 364a corresponds to one day while directory 364b corresponds to the day immediately thereafter.
  • the date directory may be named using an eight digit integer. For instance, a date directory corresponding to June 25, 1996 might be named "19960625.???".
  • date directory 364 includes first and second ATM sub-directories 336 and 338, respectively, for separately storing data from ATMs 302 and 304. These sub-directories may simply be named "ATM 1.???” and "ATM2.???”.
  • Two files are stored in each ATM sub-directory. Specifically, one file is a data file 370 which carries a "DAT" file extension while the other file comprises an index control table 372 which carries an "IDX" file extension. Data file 370 and index control table 372 for each day are organized in a cooperative manner which facilitates random and/or direct access to the stored images and associated information using a software tool set 374 forming part of control program 327 provided at remote station 324.
  • data file 370 stores all of the digitized images gathered during one particular day using data fields or records.
  • Each video image contained by the data file is stored in a digital image frame format using the fields below:
  • the frame number may be assigned based upon the position of a frame within an overall series of frames.
  • Image data in the "frame data" field may be compressed to form the digital image frame data so as to maximize image storage on main fixed disk 340 using, for example, the previously mentioned Huffman algorithm and, thereafter, stored in the JPEG format.
  • image compression is not a requirement herein and that video images may be stored in many digitized formats in accordance with the present invention.
  • Each frame group includes a "Camera ID” field which identifies the camera that took the images within the group and a "Frame Total” field which specifies the total number of image frames within the group. For example, a group of four images taken by camera 310a (CAM 1) might be identified by the camera ID field "0001", and the Frame Total field "4".
  • the "time stamp” field is a time string converted to an integer value.
  • the "transaction text” field includes the specific details of the transaction. As an example, a record header for a cash withdrawal transaction in the amount of $60.00 processed on ATM 302 which took place at 10:33 p.m. on June 25, 1996, assuming that images are captured by cameras 310a and 310b in response to this transaction, might appear as: 06/25/96 22:33:00 00302*****7g 16-004 2222 S. Buckley Record No. 85 Withdrawal $60.00 from checking. Two frame groups, one for each camera, are referenced by this record header.
  • index control table 347 constitutes a "look-up" table which describes locations of all the fields which make up its related data file. That is, the index control table and data file which occupy the same ATM sub-directory 336.
  • Each index control table includes a time stamp field that is copied directly from the field of the same name appearing in the record header within its associated data file. For the exemplary cash withdrawal transaction above, the time stamp for 10:30 p.m. might appear as the integer "2230".
  • the index control table provides a "record offset" field which indicates a position in the related data file specified as a number of characters from the beginning of the data file. These positions mark the beginnings of the fields within the data file.
  • information contained by a particular field in a data file may quickly be located by first looking up its record offset in the index control table and, thereafter, moving directly to the precise position of the field of interest in data file 370. In this manner, the much slower task of searching the entire data file for the field of interest is avoided.
  • record headers for these event triggered images are structured slightly different than record headers described above for transaction images. More specifically, these record headers include the following fields:
  • FRAME TRAILER char Frame data terminator While the time stamp fields for these event triggered images may appear as being identical to time stamp fields associated with transaction images, the actual time at which the event occurred must be derived from a source other than transaction data since no information is available from the ATM network for event triggered images.
  • computer 338 includes an internal clock 345 which provides the needed time data.
  • the "event" field indicates specifically what caused the associated images to be captured such as, for example, an alarm event or interval recording of a sequence of surveillance images. Entries in the previously described index record file 372 for event triggered images, like those for transaction images, utilize the time stamp field and associated offset. It is noted that transactions initiated by card insertion sensors 165 include record headers as described immediately above. However, the "event" field therein may specifically indicate that the frame(s) relate to a sensor initiated transaction, as opposed to other types of event images.
  • Remote access to system 300 is gained via public telephone line 352. Once the operator has entered a valid user ID and password, remote monitoring station 324 is permitted access to the data stored by main fixed disk 340. Thereafter and as mentioned above, configuration settings contained by control program 344 at the ATM site may be altered using tool set 374. For example, computer 338 may be instructed to store a different number of images for a particular camera and type of event. Remote access also provides for performing system testing without actually having to travel to the physical location of the ATM site. For example, the system operator can instruct computer 338 to store images from any combination of the cameras at a particular ATM site. These images are immediately transferred to the remote monitoring station and reviewed. In dris manner, an out of focus or inoperative camera is readily identifiable.
  • control program 344 is configured to reset a timer 380 which forms part of watchdog module 362 at a regular predetermined interval.
  • timer 380 will time out and "System OK" lamp 360 will be extinguished.
  • I/O module 348 may be configured to reboot computer 338. Then, the malfunction can be reported to the remote monitoring station.
  • This feature provides a simple, yet effective method for handling a "locked-up" system which is unattended. As in the first embodiment, other malfunctions such as, for example, main fixed disk failure may be reported to the remote monitoring station or to a station having similar capabilities. Thereafter, the system operator can be notified of the malfunction.
  • System 300 can perform a wide variety of searches of the data stored at the ATM site using image control program 327 at remote station 324. Searches may be based on essentially any of the data recorded at the ATM site. For example, a time range or a range of transaction numbers may be specified. However, it is mentioned that searches are performed most efficiently using the "time stamp" field since every field within the data files of directory structure 346 at the ATM site is correlated with a unique time stamp contained by the index control table. Retrieved images may be displayed as contemplated by the first embodiment and described above. Moreover, tool set 374 facilitates image enhancement, enlargement and other such features. It is also noted that cameras useful herein include either black and white or color cameras.
  • system 300 proceeds generally in accordance with the logical sequence depicted by the flow chart of FIG. 3 with only a few exceptions, as follows.
  • image compression is performed at the cameras by system 50.
  • compression is performed by personal computer 146.
  • steps 212 through 218 utilize the file structure described above with regard to system 300.
  • a system for monitoring an ATM may be embodied in many other specific forms and modified in an unlimited number of ways without departing from the spirit or scope of the present invention.
  • forms of storage media other than hard drives may be found to be useful with the present invention including, for example, properly configured RAM modules such that images may be stored in RAM without the need for a hard drive or such similar media.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Alarm Systems (AREA)

Abstract

Cette invention se rapporte à un système de sécurité servant à surveiller un guichet automatique (ATM). Ce système comprend plusieurs caméras situées au niveau du guichet automatique et disposées de façon à prendre au moins une image d'une personne initialisant une transaction sur le guichet automatique. Des supports d'enregistrement sont installés dans le guichet automatique pour stocker numériquement les images prises par les caméras. Ce système est configuré pour transférer numériquement les images vers les supports d'enregistrement et vers au moins un point distant, où les images sont visualisées. Dans un premier aspect de cette invention, ce système permet un accès sélectif aux données d'image stockées dans le guichet automatique et une possibilité de recherche de ces données. Dans un second aspect de cette invention, les informations sont stockées dans le guichet automatique selon un mode qui permet une meilleure efficacité de recherche. Dans un troisième aspect de cette invention, ledit système peut comporter une section de sécurité ayant des caméras qui prennent des images ou fournissent des indications en réponse à un ou plusieurs évènements autres que l'initialisation de transactions.
PCT/US1997/016357 1996-09-13 1997-09-12 Systeme de securite pour guichet automatique WO1998011714A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU43500/97A AU4350097A (en) 1996-09-13 1997-09-12 Security system for an automated teller machine

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US71340296A 1996-09-13 1996-09-13
US08/713,402 1996-09-13

Publications (2)

Publication Number Publication Date
WO1998011714A2 true WO1998011714A2 (fr) 1998-03-19
WO1998011714A3 WO1998011714A3 (fr) 1998-07-09

Family

ID=24865997

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/016357 WO1998011714A2 (fr) 1996-09-13 1997-09-12 Systeme de securite pour guichet automatique

Country Status (2)

Country Link
AU (1) AU4350097A (fr)
WO (1) WO1998011714A2 (fr)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1041523A2 (fr) * 1999-04-01 2000-10-04 Ncr International Inc. Enregistrement et validation de transaction
EP1073022A2 (fr) * 1999-07-26 2001-01-31 Fujitsu Limited Machine à transactions automatique
WO2001013346A1 (fr) * 1999-08-17 2001-02-22 Webgate Inc. Camera de surveillance et procede de traitement d'images de camera de surveillance
WO2003069569A1 (fr) * 2002-02-05 2003-08-21 Wayk Co. Ltd. Bancomat comportant des fonctions de prise, enregistrement et reconnaissance, de photos numerique
US20050259801A1 (en) * 2004-05-19 2005-11-24 Bullard Charles C Machine and process for accepting customer payments and placing orders
EP1704514A2 (fr) * 2003-09-03 2006-09-27 Spectrum Tracking Systems, Inc. Systeme d'identification et de recuperation des fraudes
US7183915B2 (en) 2004-08-05 2007-02-27 3Si Security Systems, Inc. Wireless ATM security system
WO2007093977A1 (fr) * 2006-02-13 2007-08-23 Fraudhalt Limited Procédé et dispositif de vidéosurveillance automatique
WO2008061553A1 (fr) * 2006-11-24 2008-05-29 Maku Informationstechnik Gmbh Automate de distribution d'argent, de caisse ou de change
CN100418111C (zh) * 2004-09-23 2008-09-10 中国工商银行股份有限公司 对银行atm终端安全隐患实时预警监控的方法和系统
US7533805B1 (en) 1998-10-09 2009-05-19 Diebold, Incorporated Data bearing record based capture and correlation of user image data at a card reading banking system machine
US7604165B2 (en) 2001-03-19 2009-10-20 Diebold, Incorporated Automated banking machine processing system and method
CN103247101A (zh) * 2013-04-25 2013-08-14 天津大学 一种多信息关联的票据稽核方法
EP2963911A1 (fr) * 2014-07-02 2016-01-06 Maku Informationstechnik Gmbh Distributeur automatique de billets
EP3422308A1 (fr) * 2017-06-26 2019-01-02 Honeywell International Inc. Procédé pour détecter la menace/l'attaque éventuelle dans un distributeur automatique par extraction des déviations de l'état de volet/porte de distributeur automatique et par modification cms et premiers intervenants
US11062412B2 (en) * 2004-05-19 2021-07-13 Touchpay Holdings, Llc Machines and process for managing a service account

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4511886A (en) * 1983-06-01 1985-04-16 Micron International, Ltd. Electronic security and surveillance system
US4845636A (en) * 1986-10-17 1989-07-04 Walker Mark E Remote transaction system
US5010238A (en) * 1988-03-18 1991-04-23 Hitachi, Ltd. Automatic cash transaction system and method
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4511886A (en) * 1983-06-01 1985-04-16 Micron International, Ltd. Electronic security and surveillance system
US4845636A (en) * 1986-10-17 1989-07-04 Walker Mark E Remote transaction system
US5010238A (en) * 1988-03-18 1991-04-23 Hitachi, Ltd. Automatic cash transaction system and method
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ASSOCIATION OF COMPUTING MACHINERY, October 1994, CRUZ et al., "Capturing and Playing Multimedia Events With Streams", pp. 193, 196, 199. *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7950573B1 (en) * 1998-10-09 2011-05-31 Diebold, Incorporated Data bearing record based capture and correlation of user image data at a card reading banking system machine
US7533806B1 (en) 1998-10-09 2009-05-19 Diebold, Incorporated Reading of image data bearing record for comparison with stored user image in authorizing automated banking machine access
US7533805B1 (en) 1998-10-09 2009-05-19 Diebold, Incorporated Data bearing record based capture and correlation of user image data at a card reading banking system machine
EP1041523A2 (fr) * 1999-04-01 2000-10-04 Ncr International Inc. Enregistrement et validation de transaction
EP1041523A3 (fr) * 1999-04-01 2000-10-11 Ncr International Inc. Enregistrement et validation de transaction
EP1073022A3 (fr) * 1999-07-26 2005-02-02 Fujitsu Limited Machine à transactions automatique
EP1073022A2 (fr) * 1999-07-26 2001-01-31 Fujitsu Limited Machine à transactions automatique
WO2001013346A1 (fr) * 1999-08-17 2001-02-22 Webgate Inc. Camera de surveillance et procede de traitement d'images de camera de surveillance
US7604165B2 (en) 2001-03-19 2009-10-20 Diebold, Incorporated Automated banking machine processing system and method
WO2003069569A1 (fr) * 2002-02-05 2003-08-21 Wayk Co. Ltd. Bancomat comportant des fonctions de prise, enregistrement et reconnaissance, de photos numerique
EP1704514A2 (fr) * 2003-09-03 2006-09-27 Spectrum Tracking Systems, Inc. Systeme d'identification et de recuperation des fraudes
EP1704514B1 (fr) * 2003-09-03 2013-04-03 Spectrum Tracking Systems, Inc. Systeme d'identification et de recuperation des fraudes
US11062412B2 (en) * 2004-05-19 2021-07-13 Touchpay Holdings, Llc Machines and process for managing a service account
US20050259801A1 (en) * 2004-05-19 2005-11-24 Bullard Charles C Machine and process for accepting customer payments and placing orders
US11908029B2 (en) 2004-05-19 2024-02-20 Touchpay Holdings, Llc Machine and process for managing a service account
US7183915B2 (en) 2004-08-05 2007-02-27 3Si Security Systems, Inc. Wireless ATM security system
CN100418111C (zh) * 2004-09-23 2008-09-10 中国工商银行股份有限公司 对银行atm终端安全隐患实时预警监控的方法和系统
WO2007093977A1 (fr) * 2006-02-13 2007-08-23 Fraudhalt Limited Procédé et dispositif de vidéosurveillance automatique
WO2008061553A1 (fr) * 2006-11-24 2008-05-29 Maku Informationstechnik Gmbh Automate de distribution d'argent, de caisse ou de change
CN103247101A (zh) * 2013-04-25 2013-08-14 天津大学 一种多信息关联的票据稽核方法
EP2963911A1 (fr) * 2014-07-02 2016-01-06 Maku Informationstechnik Gmbh Distributeur automatique de billets
EP3422308A1 (fr) * 2017-06-26 2019-01-02 Honeywell International Inc. Procédé pour détecter la menace/l'attaque éventuelle dans un distributeur automatique par extraction des déviations de l'état de volet/porte de distributeur automatique et par modification cms et premiers intervenants

Also Published As

Publication number Publication date
WO1998011714A3 (fr) 1998-07-09
AU4350097A (en) 1998-04-02

Similar Documents

Publication Publication Date Title
WO1998011714A2 (fr) Systeme de securite pour guichet automatique
US5751345A (en) Image retention and information security system
US7116353B2 (en) Digital video recording system
US20090201372A1 (en) Method and apparatus for integrated atm surveillance
US5926210A (en) Mobile, ground-based platform security system which transmits images that were taken prior to the generation of an input signal
US5689442A (en) Event surveillance system
EP1332479B1 (fr) Systeme de securite integre
CN106780009A (zh) 一种自助银行防范系统
CN107707929A (zh) 视频分析系统
JPH01296398A (ja) 自動処理機の不正使用防止用監視装置
WO1997041686A1 (fr) Systeme de securite pour plate-forme mobile se deplaçant sur le sol
IES20010144A2 (en) Device for the purpose of protecting self-service machines from being tampered with
EP0661677A2 (fr) Méthode et dispositif pour l'identification du client à un guichet de banque automatique
US7806316B1 (en) Transaction system for video matching
CN112466085A (zh) 一种安防智能综合研判系统及方法
EP0908851A2 (fr) Système pour contrÔler et surveiller le passage de véhicules légers dans les parcs de stationnement public
US8297494B1 (en) Alarm and indicating system for preventing burglary and theft
EP1073022A2 (fr) Machine à transactions automatique
EP0724235A2 (fr) Système pour surveiller visuellement et pour enregistrer l'accès contrÔlé
EP0970443B1 (fr) Armoire a cles pour equiper un systeme de controle d'acces, et procede et systeme de controle d'acces mettant en oeuvre cette armoire a cles
CA2441106C (fr) Systeme d'enregistrement video numerique
JP2005094642A (ja) 監視カメラシステム
KR100367965B1 (ko) 무선원격 제어에 의한 감시카메라의 선택위치 집중촬영시스템
RU2172021C1 (ru) Способ эксплуатации системы автоматизированных камер хранения
KR100679678B1 (ko) 바코드를 이용한 물품보관 시스템 및 그 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT

AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase in:

Ref country code: JP

Ref document number: 1998513964

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: CA