Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DISPENSING & ACCEPTING AUTOMATION PRODUCTS WITH ENHANCED PORTABILITY AND SECURITY
Document Type and Number:
WIPO Patent Application WO/2016/113753
Kind Code:
A1
Abstract:
An automatic portable media processor, a dispensing and accepting cash machine; specially designed of varying size portable models; designed to charge the user interface from the machine itself; drawing electricity only when in transaction mode; a hybrid model capable of working on both solar and conventional electricity; having unique features to prevent skimming, jamming, hacking; the machine capable of communicating to predetermined persons through radio frequency; the machine itself being multidirectional to facilitate ease of use depending upon the direction of the user, with multi layer security features based on proprietary software.

Inventors:
KHADEER PEER SHARIFF S S (IN)
Application Number:
PCT/IN2016/000013
Publication Date:
July 21, 2016
Filing Date:
January 13, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LEO PRIME PAYMENT SOLUTIONS PVT LTD (IN)
International Classes:
G06Q20/18; G06F21/00; G07F19/00
Foreign References:
US7959072B12011-06-14
US6505774B12003-01-14
Attorney, Agent or Firm:
Mr T .K. Ramkumar & Ms ,Sumitha Vibhu (Patent & Trade Mark AttorneysRam & Rajan Associates,No.12/42,Vedantha Desikar Swamy Street, Mylapore Chennai 4, IN)
Download PDF:
Claims:
Apart from ATM activities, these machines are also designed to be used as vending machines, ticketing machines etc.

The present invention reduces the costs substantially if used as ATM machines.

The present day ATM's come in one only size and are of higher cost. By means of changing the size and shape without compromising on the functionality, the present invention offers differential reduced prices. Furthermore specifically designated separate rooms have been done away with, contributing to further reduction in establishment costs. The present invention has drastically brought down the Capex of ATM implementation. Usage of Hybrid power Sources reduces electrical power costs and technology driven security cam replace the Security guards at the ATM, these features ensure that the operation running cost of ATM deployment is also brought down substantially.

What is claimed is:

An automatic portable media processor machine which dispenses and accepts cash; a vending machine of various products on accepting cash for the products; of varying sizes to be fitted onto a desk as a fixed desktop model or onto vehicles as a mobile model or as a standalone model; the machine itself being multidirectional for easy transactions in any direction as desired by the user; the location of the machine determined through GPS while in transit; the small size directly resulting in lower costs of manufacture as well as lower establishment, CAPEX, OPEX costs, resulting in an economically beneficial model with reduced space requirements and associated infrastructure costs; comprising of inbuilt hardware features of a CPU, USB ports; a SCB; a Battery Back up; a Shutter Door switch; a PCB; vibration sensors; a surveillance camera; a Safe Door Switch; a GSM module; an Emergency Button; a Hooter; an anti jammer; a Radio Frequency button to activate the receiver and Transmitter; an opaque cover for protecting the pin encryption pad; an Encryption Board; a Central Distribution and Regulator Control Printed Circuit Board CDRC-PCB; a specially designed user interface; an inverter; solar panels; a Know Your Customer reader; the machines fitted with a reader for accepting standard Know Your Customer documents for verifying and storing the same in a secure manner; fitted with a uniquely designed self contained card reader slot inside the machine such that only user hand accesses the card reader slot, reducing the probability of loading any skimmers into the machine, resulting in an anti skimming measure; the encrypted pin pad having an opaque cover with sufficient space for the user to type the pin; reducing the probability of identification of pin by unscrupulous persons; the anti skimming precaution and protection, of pin number theft, leading to a more secure machine; the machine designed to consume power only when in transaction mode such as accepting or dispensing, the power consumption is controlled by use of an inverter board designed to supply power from batteries to machine when not in transaction mode, directly resulting in lower power consumption and lower running costs; the machine designed to operate by drawing power from within through the CRDC-PCB; the power supply being constant or intermittent; the machine uses small solar cells making payable power consumption zero on idle condition, switching over to Public Electricity Board only during transaction; the desktop model having a constant source of power being designed to operate from a power supply, wherein the voltage is stepped up/ down to desired voltage; the power then supplied to the CDRC-PCB; the CDRC-PCB in turn supplies power to the user interface gadget for charging; the power supply for the user interface gadget for the mobile machine being supplied from the battery of the vehicle via the CDRC-PCB; the CDRC-PCB in both models shutting off power supply once the user interface gadget reaches its maximum charging capacity, the CDRC-PCB constantly checking for decrease in the power levels of the user interface gadget, automatically charging the user interface gadget when the gadget reaches its minimum designated threshold; the machines designed to run on both electricity and other natural resources; the user interface gadget transmits a user command to the CDRC PCB, and the CDRC PCB controlling all the internal components based on the received command, checking the power level of the user interface gadget, starts the charging process when the power level reaches its minimum designated threshold; the machines when run on natural resources result in zero power consumption, resulting in direct lower running costs; the machines comprising inbuilt wireless broad band backed by batteries, capable of being charged by natural resources resulting in standalone, wireless machines; the machines being fitted with self opening and closing shutters for easy loading of cash; the machines being built with an emergency switch to be operated by the user in the event of any emergency, the said emergency switch activated manually, triggering the security features; the machines being fitted with an inbuilt camera to capture more than one person while transaction is taking place; the camera located in the device is set into motion to capture images; the captured images being sent by pictures or videos to the CPU and from the CPU to the SCB through a live GSM module to predetermined persons; the predetermined persons being able to communicate to the machine by means of Radio Frequency Transmitter and Receiver through the GSM module; the machine also being fitted with vibration sensors and three axis tilt sensors connected to a bidirectional live GSM module, such that when the machines are tapped or moved, an email, SMS/MMS is sent to CPU and from CPU to SCB through GSM module to predetermined persons; bypassing the need to use the RF button; the GSM module being triggered to set off an alarm, seal the premises by operating the shutter switch which closes the shutters when the machine is in a confined location protected by shutters; the predetermined persons communicating by means of an SMS to enable the machine to protect itself by setting off the hooter to sound an alarm; generation of electric shocks preventing the physical removal of the machines; activating the shutters, all these security features from a remote location; all commands issued by predetermined persons, in series to be acted upon , by the machine, resulting in a two way communication between the machine and pre-determined persons; the commands ceasing only when the predetermined persons authorize the same; the customer interface of the machine being designed in such a manner that the machine can also communicate with the machine by using the peripherals of the user through an interface application between devices, compatible in all OS platforms, wherein the user completes the transactions steps including verification and plugs in his device only to dispense; the machine being provided with an anti jamming feature for wireless radio transmissions and wireless networks, enabling the machine to detect, prevent and counteract signal jamming attacks by third parties transmitting targeted jamming signals that disrupt wireless communication between devices; all the aforementioned features using Encryption and Authenticated device communication; Repulsing on non compliance based device attachment; Device Execution Traces and Device Tallies; Device Transaction Analytics and Failure Detection; Security Management; Soft/ Printed Transaction logs; No transaction no cost; operable on user's own device; Interoperability of operating system; Port monitoring; Two-factor authentication (2fa) service; Log-manager and analyzer; monitoring of User behavior/ environment, communications between the CPU, SCB, predetermined persons through the GSM module; resulting in a secure portable machine of lower manufacturing as well as establishment costs, directly resulting in higher returns.

A machine as claimed in Claim 1 , wherein the commands issued from the predetermined persons to machine as claimed in Claim 1 to secure the safety of the machine is simultaneous.

3. A machine as claimed in Claim 1, wherein the Radio Frequency means of communication is triggered by physically using the RF Button.

4. A machine as claimed in Claim 1, wherein the user interface having only a single port for both charging and communication, the PCB charges the user interface to a pre-determined threshold level to ensure that the user interface gadget has sufficient power to complete the transaction through the CDRC- PCB.

5. A machine as claimed in Claim 1, wherein the user interface charge level reduces to that of the predetermined threshold level, the SCB triggers to turn on a switching device to start charging the user interface till the predetermined threshold level is reached; the SCB triggers to turn off the switching device, ensuring that communication happens even while charging.

6. A Method of ensuring cyber security of the machine as claimed in Claim 1, defined by the entire machine components being corn-port serially connected, being accessed by using standard commands; the encryption board encrypting these commands in a unique code, allowing the device access, based on the unique code, resulting in increased cyber security due to anti hacking feature.

7. A method of ensuring unauthorized access of the machine as claimed in Claim 1 by authorized personnel, using a two factor authentication required for access to the machine, protecting the machine from intruders; restricting access only to designated areas and disallowing unauthorized access; comprising of two means of identification to be provided by the authorized personnel for access of the machine; one being a physical token and the other a one time password; both used in combination; access granted only when these two tally when fed in by the by the authorized personnel; restricting areas of access of the machine to the authorized personnel.

8. A method of interoperability of software as claimed in Claim 1, wherein the applications that run on the machines platform works on operating systems like IOS, Android, Windows and Linux.

9. A method of preventing hackers as claimed in Claim 1, wherein the application includes a Software Security Manager (SSM), an electronic tool to monitor, configure, the level of the security provided to the system through effective monitoring and updating the an ti- virus, the operative system, the SCB, the USB Port and Security Configuration, all configured to repulse non- compliant devices attached to the machine, preventing the hackers from retrieving the transaction logs, which prevents hacking.

10. A method of preventing unauthorized access as claimed in Claim 1, wherein the USB ports being monitored, by means of installation of specialized drivers to monitor the operations of the connected devices to the USB ports, permitting communication only between authorized devices to communicate, blocking all the operations done by the unauthorized devices and port manipulations.

1 1. A method of managing and analyzing logs as claimed in Claim 1 , wherein the application includes a log manager and analyzer, configured to search and read Electronic Journals; the application configured to perform device execution traces and device tallies, enabling machine owners to have real-time visibility into their machine's media consumption; helping machine owners to prioritize their media replenishment schedules; thereby simplifying media management.

12. The invention as substantially described herein with specific reference to the accompanying drawings.

Description:
DISPENSING & ACCEPTING AUTOMATION PRODUCTS WITH ENHANCED PORTABILITY AND SECURITY

FIELD OF INVENTION: The present invention relates generally to an automatic portable media processor, a dispensing and accepting automation product, specially designed of varying sizes including portable models with enhanced security features; a hybrid model capable of working on both solar and conventional electricity; anti skimming shield; special charging features from within the source itself; all the aforementioned being contained in the machine itself. The present invention includes -machines, which can accept and Deposit cash, popularly called as Automatic Teller Machine or known by its acronym 'ATM'.

BACKGROUND TO THE INVENTION The usage of automatic media acceptance and dispensing machine in recent times has drastically increased due to its access and convenience and in many instances due to regulatory requirements. For example: these machines are used in banking and other financial sectors for express banking services— cash withdrawals, up-to-the-minute account balances, deposits, transfers, electronic bill payments, etc., in hospitals and healthcare facilities for accepting and dispensing reports, tokens, documents, OTC (Over-the-counter) medication, condoms, personal products, and much more.

However, the existing ATMs used world over require a certain amount of secure and enclosed floor space, set aside for the infrastructure and installation of these machines and they need to be located in stores, malls, banks etc.

Though convenient, these machines are increasingly targets of tampering and thefts. The theft can be physical theft, software/ network theft, internal fraud, and other fraud. The present invention apart from unique design and size also has multiple security features both hardware and software driven to minimize the losses due to the thefts

The present invention seeks to do away with this need for space and seeks to provide standalone ATM machines without the necessary infrastructure associated with the existing ATM machines. The ATM machines of the present invention are machines on the go, i.e. machines which can be fitted into the side of a two wheeler, wall mounted or mounted on public transport systems such as buses, trains etc., or even as a standalone machines , with a unique feature of multidirectional access installed in parks, open areas or located on minimum space like a cash counter in convenience stores etc., saving space and expanding the areas of accessibility to the public. BRIEF DESCRIPTION OF THE DRAWINGS:

Fig 1 : SCB Structure

1- 1 : Computer/ CPU

1-2: SCB

1-3: Battery

1-4: ATM shutter control switch

1-5: PCB

1-6: Vibration Sensor

1-7: Camera

1-8: Safe Door Switch

1-9: GSM Module

1- 10: Emergency Button

1- 1 1 : High Decibel Hooter

1-12: Anti-jammer

1- 13: Radio Frequency Transmitter

Fig. 2: Flowchart of SCB Functionality

Fig. 3: 2-Way communication using Radio Frequency

Fig. 4: Encrypted Board

4- 1 : EBC

4-2: Machine Component

Fig. 5: Flowchart of Encryption Board Functionality

Fig. 6: Machine with Anti-skimming design

6- 1 : Video Camera

6-2: User Interface

6-3: Hooter 6-4: Receipt slot

6-5: Card Slot

6-6: Media dispensing slot

6-7: Encrypted Pin pad (EPP)

Fig. 7: Two Factor Authentication (2fa)

Fig. 8: CDRC PCB

8-1 : CDRC-PCB

8-2: Tablet

8-3: Regulator

8-4: Power Supply

8-5: SMPS

8-6: Solar Cell

8-7: Bus/ Bike /Train /other Batteries

8-8: Continuous supply control

8-9: Device 2 (EPP)

8-10: Device 1 (CDU cash dispensing unit)

8- 11 Device 3 (card reader)

8-12: SCB

8- 13: GSM

Fig. 9: Circuit Diagram of the CDRC PCB

Fig. 10: Flowchart illustrating charging method of the tablet in a desktop mode

Fig. 11: Flowchart illustrating charging method of the tablet in mobile mode

Detailed description of the drawings:

Fig 1: SCB Structure The present invention comprises a CPU (1- 1) and USB ports, ensuring USB communication for the entire SCB (1-2), an inbuilt surveillance camera (1-7) to take pictures 24x7, allowing streaming of videos, (1-7) detection of more than one face doing transactions, or a masked person or unwanted violent actions noticed in and around the machine, and transmitting an alert from the CPU (1-1) to the SCB (1-2), the SCB (1-2) in turn issuing commands to the GSM module (1-9) triggering messages to the authorized personnel, including the Bank authorities, the local police, the nearest service provider and other pre-determined persons. The SCB (1-2) also triggers the Hooter (1- 1 1) which generates an alarm. Battery Backup (1-3) is also inbuilt as an alternate source of power. The PCB (1-5) also monitors the life of the batter and sends back communications based on which the batteries can be replaced or serviced. Safe Door Switch (1-8) is also inbuilt as an additional feature to seal the cash dispensing unit (CDU). Vibration Sensor (1-6) also inbuilt gets activated when the machine is moved or tampered with physically, communicating with the GSM Module, the Hooter etc. Shutter Door Switch (1-4) is activated when the GSM Module is triggered and the premises are sealed to trap the intruder. Emergency Button (1-10) also inbuilt can be activated by a user in case of emergencies and triggers the GSM Module and Hooter etc. Anti-jammer (1- 12) is also inbuilt to overcome communication jamming. When the messages are communicated through the GSM Module (1-9) to the authorized personnel, the said personnel can in turn communicate to the machine over Radio Frequencies through the Radio Frequency transmitter and receiver (1- 13). Instructions to trigger a mild electric shock, close the ATM door shutter etc can be communicated by the authorized personnel to the ATM machine resulting in directly talking to the ATM machine from remote locations.

Fig 2: SCB Functionality

The SCB continuously monitors the sensor and triggers the security components, including but not limited to: a door shutter motor to close the machine door and trap the attacker, a High-decibel hooter to alert the surroundings, and GSM module to call and /or send email, SMS, MMS of the captured image to authorized personnel & the GPS Location to authorized personnel.

Further, the GSM module is configured to receive the commands from the authorized personnel to activate a standard allowed electric shock to prevent further touch of the machine. The above security actions can be stopped only after receiving predefined actions from the authorized personnel. Further, in the event the machine is physically removed, the inbuilt GPS will help to track the machine. All these actions can be done simultaneously if required or in predefined sequences, thus, making the machine highly safe and secure and suitable to be deployed in offshore locations like convenience stores, financial institutions, airports, shopping centers and other venues such as hotels and restaurants. Also, the need for additional security guards can be avoided, reducing the operational expenses.

Fig: 3 Radio frequency Communication In addition the machines of the present invention make use of Radio waves, as configured. The software is programmed to use a defined frequency of radio signals used by law and order and or authorized authorities to communicate and alert them immediately. The machines of the present invention are enabled with an RF button such that when the user presses it, the radio waves of the machine connect to the defined frequency of radio signals used by law and order authorities and bank authorities, i.e. the pre-determined authorized personnel to communicate and alert them immediately. In turn the authorized personnel, can issue commands such as shutting the ATM premises, communicate with the intruder by issuing direct commands to the intruder etc., thereby enabling a two way communication with the concerned authorities. Used in an ATM, this feature would be known as the "TALKING ATM". The Radio Frequency option can be triggered even by the motion sensor, vibration sensor etc., without physically using the RF Button.

Fig: 4 Encryption Board

In the present invention, the entire machine components are corn-port serially connected, which can be accessed using standard commands. An encryption board encrypts these commands in a unique code. The present invention allows device access based on the unique code, preventing the machine from hacking activities and ensuring cyber security.

Fig 5: Encryption Board functionality:

In particular the invention comprises accessing the device by sending the actual command to a HID driver which encrypts the command data and sends it to the device through USB port. The encryption board attached to the machine component/ equipment decrypts the command and sends the command to the machine component/ equipment. The machine component/ equipment executes the command and returns the response to the encryption board through the USB port. The encryption board encrypts the response and sends back to the Host through USB port. The HID driver then decrypts the response and feeds it to machine to process the command in a machine recognisable language. Thus, with this additional layer of security, the machine can be secured from the hackers.

Fig 6: Machine with anti-skimming device

In addition, skimming is by far the most popular method of machine network attack, accounting for over 80% of machine fraud. Skimming readers have been developed that are placed over a card reader slot on the machine or the card reader for entering the vestibule. These skimming readers read the magnetic strip on the card are inserted in the slot; the skimming reader scans the magnetic strips and gathers the information regarding each individual and their account. By using a hidden camera or a secretly located individual, the user's access code (i.e., a manually entered PIN) can be gathered. That information combined with the information gathered by the skimming reader allows an unauthorized individual to gain unauthorized access to the individual's bank account or accounts and make illegal fund withdrawals.

The machines of the present invention are uniquely designed to ensure that skimmers don't get into the machine in such a way that the card reader slot is designed such that the card reader is self-contained inside the machine and only user hand can access the card reader slot. This makes it harder to fix any skimmers into the machine. Furthermore, the encrypted pin pad is designed to have an opaque cover with a space for the entry of the user hand to type the pin, thus making it very difficult for the pin to be noted and reused.

Pig .7: 2 factor authentication

Yet another layer of security is provided by this two factor authentication for service engineers during service period and/ or preventive maintenance period. The machine uses a two-factor authentication (2fa) service, in which the authorized personnel are provided two means of identification, one of which is typically a physical token, such as a card and the other of which is typically something memorized such as a security code such as a one time password. This makes it harder for potential intruders to gain access and steal data and money thus providing a trusted environment.

Fig 8 and 9: Block Diagram and Circuit Diagram of Central Distribution and Regulator Control Printed Circuit Board CRDC PCB: The present invention has a specially designed Central Distribution and Regulator Control Printed Circuit Board - CDRC - PCB. This innovative feature enables the machine to operate and at the same time recharges its power sources with alternate systems like batteries/ Solar.

In the event of use of the user interface having only a single port for both charging and communication and in the event of the user interface having low charges, the PCB of the present invention can charge the user interface to a pre-determined threshold level and ensure that the user interface gadget has sufficient power to complete the transaction through the CDRC-PCB. When the user interface charge level is reduced to that of the predetermined threshold level, the SCB triggers on a switching device to start charging the user interface gadget. When the user interface charge level reaches the predetermined threshold level, the SCB triggers the off switch of the switching device so as to interrupt the user interface charging. This feature ensures that communication happens even while charging.

Fig: 10: Flow chart illustrating charging in Desktop Mode:

Under the present invention, the charging is done when the machine is in a fixed location namely convenience stores, shops, malls etc., where the power source is constant. This is referred to as the Desk top mode. The machine under the present invention is designed to operate in different power sources like Switched mode power source (SMPS), electricity, solar and others based on its operating modes. In the desktop mode the machine uses power supply. In case of desktop mode, 230 volt from a power supply SMPS is stepped down to desired voltage and then it is supplied to the CDRC-PCB. In the event the voltage has to be stepped up, this is also done. The voltage is stepped up or down as per requirement. The CDRC-PCB supplies power to the user interface gadget for charging and once the user interface gadget reaches its maximum charging capacity the CDRC-PCB stops supplying power. While in operation, the user interface gadget transmits a user command to the CDRC PCB, and the CDRC PCB controls all the internal components based on the received command. The CDRC PCB checks the power level of the user interface gadget and starts the charging process when the power level reaches its minimum designated threshold.

Fig: 11: Flow chart illustrating charging in mobile mode:

Under the present invention, when the machine is fixed onto a train, bus, two wheelers etc, the charging is described as being in mobile mode. In case of mobile mode, Power Supply from any battery (BUS / TRAIN / BIKE / SOLAR / Others) is supplied to the user interface gadget via a CDRC PCB for charging. The machine stops charging the user interface gadget once it reaches its maximum charging capacity. While in operation, the user interface gadget transmits a user command to the CDRC PCB, and the CDRC PCB controls all the internal components based on the received command. When the user interface gadget reaches its minimum designated threshold it triggers a signal to the CDC PCB to start charging process.

BRIEF DESCRIPTION OF THE INVENTION: The present day machines consume power irrespective of whether they are accepting/ dispensing or not but the present invention consumes power only when accepting/ dispensing, thus saving a lot of electricity consumed. In case of low availability of other alternate power sources, this invention seeks to utilize electricity only when there is a transaction and not otherwise. This power consumption is controlled by the use of an inverter board, which supplies power from solar batteries to the machine when it is not in transaction mode. When the machine is in transaction mode, then power , is drawn from regular_electricity supply...or, ' -thus- reducing the consumption over all.

Furthermore, the present invention is equipped to run on a combination of solar power and electricity, thus further cutting the cost of electricity down in the long run.

Yet another feature is that the machines are wireless and stand alone and compact in size.

Yet another feature is that the user interface is designed in such a manner that it can communicate with the machine either by using the peripherals of the vendor /user. The present invention has applications that are developed on cross platforms such that it can work on operating systems like IOS, Android, Windows and Linux.

Apart from the design angle, the present invention also has several layers of security features starting from alarms being generated on the occurrence of an abnormal behavior captured by the camera located on the machine itself to having encryption boards which secure the serial port communications, to port monitoring which has specialized drivers to monitor the malicious operations to service authentication by a two step method for access by service engineers.

Furthermore, the present invention also has anti skimming features, log manager and analyser.

KYC reader is also attached with the present invention in the machine making it easy for the user to provide documents instantaneously and also securely.

The present invention is a software /hardware driven product which provided various Security features to the user and the machine.

The primary focus of the machine is user safety and has the following features, to ensure user safety:

- Trusted Environment, Cyber Security

- Network Security

- Anti-Phishing and Anti-Skimming

- User behavior/ environment monitoring

- Soft/ Printed Transaction logs

From the security perspective of the machine, the following technology is used:

- USB based, Encrypted and Authenticated device communication (Command / Response)

- Keep-alive (Heart beat) based device monitoring - Repulsive on non-compliant devices attached

- Device Execution Traces and Device Tallies

- Device Transaction Analytics and Failure Detection

The present invention uses a Software Security Manager (SSM), a highly scalable and flexible network management tool, to maximize network security through effective monitoring and updating anti-virus, operative system, SCB, USB Port, and Security Configuration. The SSM is also configured to repulse non-compliant devices attached to the machine, preventing the hackers from retrieving the transaction logs, which makes the machine anti-hacking.

The present invention also includes anti-jammer for wireless radio transmissions and wireless networks. Hence, the machine can detect, prevent, and counteract signal jamming attacks in which a third party transmits targeted jamming signals that disrupt wireless communications between devices.

In addition the machines of the present invention makes use of Radio waves, as configured. Used in an ATM, this feature would be known as the "TALKING ATM".

The machines of the present invention are uniquely designed to ensure that skimmers don't get into the machine, wherein, the card reader slot is designed such that the card reader is self-contained inside the machine and only user hand will be made accessible to the card reader slot, this makes harder to fix any skimmers into the machine. Furthermore, the encrypted pin pad is designed to have an opaque cover with a space for the entry of the hand to type the pin, thus making it very difficult for the pin to be noted and reused.

Log manager and analyzer

The log manager and analyzer is software that is configured to search and read Electronic Journals (EJs). In addition, the log manager and analyzer is configured to perform device execution traces and device tallies, enabling machine owners to have real-time visibility into their machine's media consumption and to prioritize their media replenishment schedules, this simplifies media management.

The present invention seeks to offer the followings: Cash on Demand - Since these machines can dispense money and follows the banking formats and also at the same time can be loaded in two wheelers, buses, trains etc., this machine which acts like an ATM can come to cardholder, drastically changing the way how an individual transacts. Value Added Service - These machines, when hung on a Bus or train, will have the functionality of dispensing money and also at the same time can be used to dispense tickets, vending products etc using the latest technologies of Touch and Go as well.

DETAILED DESCRIPTION OF THE INVENTION:

The present invention is a full-fledged, compact machine designed to be installed in small Retail locations, Government offices, BFSI locations, Super markets, Healthcare, Hospitality and similar areas, parks, open spaces, drive in areas. The present invention relates to four different verticals:

1. Desktop Machine: .A small vending machine that can be easily accumulated in small retail shops, Post office, financial solutions, super markets and similar areas. Spray dispenser with all other features of a full-fledged ATM are inbuilt into this model.

2. Table top Machine: Tablets/ laptops/ mobile phones powered vending machine with similar spray dispenser as mentioned

- herein above, relate to a very small sized machine.

3. Drive in Machine: The entire machine can be rotated in multiple angles making it comfortable for the users to use them as their comfort zone, while one is driving in or out.

4. Mobile Machine: A small size machine is mounted on a two wheeler/four wheeler vehicles, making it mobile, as it helps to cover business at remote places more securely.

These machines in different line of businesses have innovative concepts making it unique from others that are currently available

Machines which are standalone and wireless:

These machines have inbuilt wireless broad band and are battery backed up. These batteries are recharged with solar cells and consume power from EB only during lack of sun light. With higher battery rating it is run completely on natural resource making it standalone /wireless.

1. No Transaction No Cost

Generally all machines consume electricity even during idle conditions leading to higher electrical cost. The present invention is designed in such a way that the machine consumes very low power during idle condition and requires increased power only during a transaction. The present invention seeks to provide power by using small solar cells making payable power consumption zero on idle condition. It switches over to EB only during transaction and that too only when complete solar power is not available. In the event, solar power is available, the entire machine as mentioned hereinabove can be run on pure solar energy itself, which takes the machine off the grid completely. The charging is by solar as well as battery or conventional electricity means and the uniqueness of the invention is that power is consumed only when the transaction is in process and otherwise, only minimal power is consumed. This is controlled by the inverter board in the machine itself.

2. Design your own machine

The present invention seeks to be flexible enough to accommodate user design changes this is in addition to the mass production. This provides lot of flexibility to the user to differentiate himself from the competition with respect to design functionality and technology.

3. BYOD ( Bring your own device)

The consumer interface of the machine is designed in such a manner that it can communicate to the vending machine either by using vending machines peripherals or by using consumers own peripherals. This is achieved through an interface application between devices which is compactable in all OS platforms.

Consumer has to complete the transaction steps including his verification from his device and needs to plug in to the machine under the present invention only to dispense. A wide range of devices running in multiple operating systems are supported.

4. Interoperability of OS

The applications that run on our machines are developed on cross platform such that it works on operating systems like IOS, Android, Windows and Linux.

5. The present invention is uniquely designed to fit on any two-wheeled/ four wheeled vehicles, and can be hanged on the walls of Buses, Trains etc and intelligently Consumes power from their sources itself through the CDRC. PCB. (From Bike /Bus /train batteries, or other batteries). The present invention has a specially designed Central Distribution and Regulator Control Printed Circuit Board - CDRC - PCB. This innovative feature enables the machine to dispense and accept media and at the same time can be used in multiple places like (BUS/BIKES/Trains/others). Under the present invention it is used in two modes i.e. the Desktop Mode and Mobile Mode. The Desktop Mode is referred to when the machine is fixed and when the machine is fixed onto vehicles it is referred to as Mobile Mode. The machine under the present invention is designed to operate in different power sources like Switched mode power source (SMPS), electricity, solar and other based on its operating modes. For example, in the desktop mode the machine uses SMPS while in the mobile mode it uses Battery - Bus/Train/ Bike and/or Hybrid power. In case of desktop mode, 230 volt from a power supply SMPS is stepped down to desired volt and then it is supplied to the CDRC PCB. The CDRC PCB supplies power to the user interface gadget for charging once the user interface gadget reaches its maximum charging capacity the CDRC PCB stops supplying power to the user interface gadget. While in operation, the user interface gadget transmits a user command to the CDRC PCB, and the CDRC PCB controls all the internal components based on the received command. The CDRC PCB checks the power level of the user interface gadget and starts the user interface gadget charging process when the power level of the user interface gadget reaches its minimum designated threshold. In case of mobile mode, Power Supply from any battery (BUS /TRAIN/ BIKE / SOLAR/ Others) is supplied to a user interface gadget via a CDRC PCB for charging. The machine stops charging the user interface gadget once the user interface gadget reaches its maximum charging capacity. While in operation, the user interface gadget transmits a user command to the CDRC PCB, and the CDRC PCB controls all the internal components based on the received command. When the user interface gadget reaches its minimum designated threshold it triggers a signal to the CDRC PCB to start charging process.

In addition to the above system there is another supply system that ensures a regular supply is given to all the components and it is used to charge the batteries when required, this operation is taken care by "CDRC- -PCB". This is taken care of when the machine is connected to continuous power source. The surveillance camera in the present invention is inbuilt into the machine and the special application created allows the video to be streamed to an external system or mobile device through the GSM Module. In retail sectors existing surveillance cameras can be attached to the present invention, which not only provides security to the machine but also to the surroundings. The present vending machines do not offer this as part of the OEM product. A reader is also inbuilt with the present invention in the machine making it easy for the user to provide Know Your User documents instantaneously and also securely. Generally KYC document collected at different levels may not reach the concerned organization securely. Also there may be delay and duplications involved these can be avoided using our reader it also makes many banking process done on the machine of the present invention without the need of teller. 9. Safety and Security

The present invention has a lot of safety features including vibrations, three axis tilt senses which is connected to a bi-directional live GSM module. Thus when the machine of the presen invention is tapped/ hit/ moved a. An emergency SMS/MMS can be send to multiple persons.

b. During the process the camera is initiated and pictures of the person trying to abuse our machine is captured and sends via MMS.

c. Hooter also provided for alerting the neighborhood.

d. An emergency switch is provided at an easily accessible to place to the users to activate it, manually, during emergency situations. This again activates the hooter and also sends a SMS/MMS to concerned peoples which are configurable.

e. When machines are placed in many remote places where possibility of theft is more due to absence of public in those cases a SMS/MMS along with the call can be placed to the concerned people. In case they are not able to attend the problem due to other works they can reply back via SMS few command sets activating the electric shock on our machines. These shocks are not a threat to any human and do not harm there are life. The voltage and current are below the level of human body acceptance.

f . The software is also programmed to initiate closing the shutter door of the room at emergency time and thus trapping the intruder. g. The machines of the present invention themselves are equipped with a self opening & closing shutters which is required for cash loading in open areas.

h. The present invention is also further programmed to stop transaction on noticing any abnormal behavior in front of the display such as a. In case of more than one person trying to transact.

b. In case of masked p erson trying to transact.

c. In case of violent action noticed in and around the ATMs.

Further, the GSM module is configured to receive the commands from the authorities to activate a standard allowed electric shock to prevent further touch of the machine. The above security actions can be stopped only after receiving predefined actions from the authorized person. Further, in worst case if the machine gets lifted, the inbuilt GPS will help to track the machine. All these action can be done simultaneously if required. Thus, making the machine high safe and secure and suitable to be deployed in offshore premises like convenience stores, financial institutions, airports, shopping centers and other venues such as hotels and restaurants. Also, the need for additional security guards can be avoided, reducing the machine operational expenses.

10. Software Security Manager (SSM)

The present invention uses a Software Security Manager (SSM), a highly scalable and flexible tool, to monitor, configure, the level of the security provided to the system through effective monitoring and updating anti-virus, operative system, SCB, USB Port, and Security Configuration. The SSM is also configured to repulse non- compliant devices attached to the machine, preventing the hackers from retrieving the transaction logs, which makes the machine anti- hacking. Port monitoring is done by means of specialized drivers to monitor the operations on connected devices on the USB ports. It will allow only the authorized devices to communicate and will block all the operations done by the unauthorized devices and port manipulations. Communication encryption - To secure the serial port (COM) communications which are possible to manipulate if anyone knows the command set of any particular Serial device like CDM, EPP, Card reader etc. In the present invention, the entire machine components are corn-port serially connected, which can be accessed using standard commands. An encryption board encrypts these commands in a unique code. The Leo shield allows device access based on the unique code, preventing the machine from hacking activities, and ensuring cyber security. The SCB determines a user interface gadget charge level via the CDC PCB. When the User interface gadget charge level is reduced to that of the predetermined threshold level, the SCB switch-on a switching device to start charging the user interface gadget. When the User interface gadget charge level reaches the predetermined threshold level, the SCB switch-off the switching device so as to interrupt the user interface gadget charging. Even while charging user interface gadget communication happens In particular the method of the invention comprises accessing the device by sending the actual command to a HID driver which encrypts the command data and sends it to the device through USB. The encryption board attached to the machine component/ equipment decrypts the command and sends the command to the machine component/ equipment. The machine component/ equipment executes the command and returns the response to the encryption board. The encryption board encrypts the response and sends back to the Host through USB. The USB HID driver then decrypts the response and feeds it to the Application. Thus, the machine can be secured from the hackers.

12. Two-factor authentication (2fa) service: In addition, the present invention uses two-factor authentication (2fa) service, in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. This makes it harder for potential intruders to gain access and steal that data, providing a trusted environment. These are typically used by service engineers during service period and/ or preventive maintenance period. The machines of the present invention allow authorized engineers only to service by two factor authentications (2fa) thereby increasing security of the data and avoiding unauthorized access to the various modules in the software and restricting access only to the designated area of the machine.

The present invention also includes anti-jammer for wireless radio transmissions and wireless networks. Hence, the machine can detect, prevent, and counteract signal jamming attacks in which a third party transmits targeted jamming signals that disrupt wireless communications between devices.

In addition the machines of the present invention makes use of Radio waves, as configured. This will use a defined frequency of radio signals used by law and order authorities to communicate and alert them immediately. The machines of the present invention are enabled with a RF button such that when the user presses it, the radio waves of the machine connect to the defined frequency of radio signals used by law and order authorities and bank authorities to communicate and alert them immediately. The authorized personnel can communicate through oral warning/ alert at the ATM or to the intruder too, thereby enabling a two way communication with the concerned authorities. Used in an ATM, this feature would be known as the "TALKING ATM". In the event of any untoward incident sensed by the camera or vibrations sensed by the vibration sensors, an alert is issued to predetermined persons by the CPU, SCB through GSM module, not relying upon the RF button. . Anti-skimming features

In addition, skimming is by far the most popular method of machine network attack, accounting for over 80% of machine fraud. Skimming readers have been developed that are placed over a card reader slot on the machine or the card reader for entering the vestibule. These skimming readers read the magnetic strip on the card are inserted in the slot; the skimming reader scans the magnetic strips and gathers the information regarding each individual and their account. By using a hidden camera or a secretly located individual, the user's access code (i.e., a manually entered PIN) can be gathered. That information combined with the information gathered by the skimming reader allows an unauthorized individual to gain unauthorized access to the individual's bank account or accounts and make illegal fund withdrawals. The machines of the present invention are uniquely designed to ensure that skimmers don't get into the machine, wherein, the card reader slot is designed such that the card reader is self-contained inside the machine and only user hand will be made accessible to the card reader slot, this makes harder to fix any skimmers into the machine. Furthermore, the encrypted pin pad is designed to have an opaque cover with a space for the entry of the hand to type the pin, thus .making it very difficult for the pin to be noted and reused.

16. Log manager and analyzer

The log manager and analyzer is software that is configured to search and read Electronic Journals (EJs). The EJ is an electronic record of all transactions, errors and some programming changes made to the machine. These EJ recordings are done for a predefined duration, once it reaches that duration, an alert will be configured and allows further transaction only after resetting the EJ.

In addition, the log manager and analyzer is configured to perform device execution traces and device tallies, enabling machine owners to have realtime visibility into their machine's media consumption and to prioritize their media replenishment schedules, this simplifies media management. The present invention seeks to offer the followings:

Cash on Demand - Since these machines can dispense money and follows the banking formats and also at the same time can be loaded in a. Bike, this machine which acts like an ATM can come to cardholder, drastically changing the way how an individual transacts. Earlier, cardholder goes to an ATM to withdraw money, which has ATM functionalities will come to the cardholder on Demand.

Value Added Service - These machines, when hung on a Bus or train, will have the functionality of dispensing money and also at the same time can be used to dispense tickets using the latest technologies of Touch and Go as well.

The present invention with its ATM functionality has a huge cost advantage with respect to Capex and Opex, and also helps to improve more Fee transactions using concepts like Cash on Demand and Value Added Services.

The cost of these machines is substantially lower as compared to the traditional ATM models which are available commercially. Furthermore, smaller spaces are needed to locate these machines.