Ncr | Date: 2017-05-10
Systems and methods for deskewing a media object (400) may include receiving, at a deskew (104) of a self-service terminal (100), the media object (400). The method also includes engaging a drive member (206) to position the media object (400) into a first position within the deskew (104). A deskew member (208) is engaged in a first direction to position the media object (400) into a second position within the deskew (104). The deskew member (208) is engaged in a second direction to position the media object (400) into a third position within the deskew (104).
Ncr | Date: 2017-01-23
Various embodiments herein each include at least one of systems, methods, software, and devices for proximity-based transaction device selection. One embodiment in the form of a method performed on a mobile device includes receiving a positioning signal and identifying a terminal associated with the positioning signal. An instruction may then be transmitted to the identified terminal via a wireless data communication device of the mobile device.
Ncr | Date: 2017-05-03
During a pre-boot cycle of a device an algorithm is obtained from a first portion of a hard drive (115 or 402) (step 210). The algorithm is executed to obtain a key (step 220). The key is used to decrypt a second portion of the hard drive (115 or 402) to obtain a second key (step 230). The second key is used to dynamically decrypt a third portion of the hard drive (115 or 402). A new randomly generated version of the algorithm may be produced (step 250). The new version of the algorithm may be stored in the first portion of the hard drive (115 or 402). The new version of the algorithm may be executed to produce a new randomly generated version of the key. The new version of the key may be used to reencrypt the second portion of the hard drive (115 or 402) having the second key.
Ncr | Date: 2017-01-30
Events are securely packaged and transmitted from peripherals of terminals and from secure input/out modules (SIOMs) of terminals. The events are collected and mined in real time for security risk patterns and dynamic remedial actions are pushed back down to the terminals, peripherals, and SIOMs.
Ncr | Date: 2017-02-08
Providing security for a sensitive item is implemented using geo-fencing. A geo-fence may be established as a dynamic virtual perimeter defining the maximum allowable distance between a sensitive item for which security is provided, and a security providing entity. The sensitive item has a first trackable device associated with it and the security providing entity has a second trackable device associated with it. The first trackable device and the second trackable device are paired to each other and tracked. The dynamic virtual perimeter may encompass and move with the moving location of one of the trackable devices. A notification is provided when the first trackable device or the second trackable device is out of the virtual dynamic perimeter. The sensitive item may be a bank cash cassette and the security providing entity may be a person responsible for the bank cash cassette.
Ncr | Date: 2017-06-21
An input peripheral agent (114A or 402) intercepts input commands on a host machine (111 or 400) and enforces policy conditions and whitelist conditions before deciding whether to permit the commands to be processed by an operating system (115B) of the host (111 or 400) or whether to ignore the commands on the host machine (111 or 400). In an embodiment, the policy conditions and whitelist conditions can be dynamically changed by a remote network manager without changing, stopping, and/or restarting the input peripheral agent (114A or 402) and/or the host machine (111 or 400).
Ncr | Date: 2017-03-09
A Basic Input/Output System (BIOS) of a device is modified to: obtain a first value from a medium interfaced to the device, produce a second value from boot data resident on the medium, compare the first value to the second value, and boot from the boot data of the medium when the first value is equal to the second value.
Ncr | Date: 2017-03-06
Web session security techniques which protect displayed sensitive information. In one example embodiment, the method includes setting, by a processor, a timer following a last user action during use of a web application; determining, by the processor, that a threshold time period since the last user action exceeds a predetermined time period; and making, by the processor, displayed sensitive information unreadable.
Ncr | Date: 2017-07-19
A reversible I/O apparatus (100 or 301) for a POS terminal (300) includes a housing (100a) with a motherboard sled (114) removable from the housing (100a) to reverse the I/O peripheral ports (110) of the motherboard (111 a) to a front orientation or a rear orientation.
Ncr | Date: 2017-01-16
A method of optimizing a pick list using image data from a barcode scanner. An example method includes comparing a reference background image captured by a scanner to an image of a produce item to be purchased, calculating attributes from the image, comparing the calculated attributes to reference produce attributes in a produce database, selecting reference produce attributes associated with reference produce items that are closest to the calculated attributes as the top candidates in the pick list.