FIELD OF THE INVENTION
[0001] The present invention relates to a control method for controlling a cash processing
apparatus, a corresponding computer program, a computer-readable storage medium storing
the program, a data carrier signal carrying the program, a data stream comprising
the program, a control apparatus comprising a computer executing the program, as well
as a cash processing system comprising the control apparatus and a cash processing
apparatus.
TECHNICAL BACKGROUND
[0002] Conventionally, cash processing systems (also called "money handling systems") are
used in banks and retail shops in the distribution industry. Such a cash processing
system includes a cash processing apparatus (also called a "money handling apparatus")
for performing a depositing process of cash objects (i.e., for example cash like banknotes
and/or coins). For example, in Europe, according to the regulations of the European
Central Bank (EBC), if a fake banknote (counterfeit note) is included in the cash
objects received from a customer at a bank branch, the bank is obliged to collect
the counterfeit note without returning to the customer.
[0003] EP 3 364 376 A1 relates to such a cash processing system and discloses that an amount of genuine
money equivalent to a total of the money recognized as counterfeit or suspected of
being counterfeit and the money recognized as genuine money in a transaction is returned
without returning the money recognized as counterfeit or suspected being counterfeit
(cf. claim 7).
SUMMARY OF THE INVENTION
[0004] The present invention has the object of providing an alternative way of removing
counterfeit cash objects from circulating cash objects (e.g., circulating money) by
specific replacement of counterfeit cash objects by genuine cash objects.
[0005] The present invention is defined by the independent claims. Further embodiments of
the present invention are described in the dependent claims.
[0006] Aspects of the present invention, examples and exemplary steps and their embodiments
are disclosed in the following. Different exemplary features of the invention can
be combined in accordance with the invention wherever technically expedient and feasible.
[0007] In this section, a description of the general features of the present invention is
given for example by referring to possible embodiments of the invention.
[0008] In general, the invention reaches the aforementioned object by providing, in a first
aspect, a control method for controlling a cash processing apparatus. The cash processing
apparatus is an apparatus which receives cash objects (with respect to the meaning
of "cash objects" see section "Definitions" below).
[0009] The control method according to the first aspect is a method for controlling a cash
processing apparatus. The control method is for example a computer implemented method.
For example, all the steps or merely some of the steps (i.e., less than the total
number of steps) of the control method can be executed by a computer (for example,
at least one computer). Such a computer may be included in a control apparatus for
controlling the cash processing apparatus. Such a computer or a control apparatus
may be in a cloud or local. Such a computer or control apparatus is preferable operatively
linked (e.g., directly, by LAN (local area network), WAN (wide area network), WLAN
(Wi-Fi) or by internet) to the cash processing apparatus.
[0010] For example, the control apparatus may be configured to have functions of a cash
register (such as a POS (Point of Sale) register communicably connected to a POS server).
Thus, the control apparatus can comprise a bar code scanner for scanning the bar code
of goods to be sold at the POS. Such a bar code scanner can work as the interface
of the user information input apparatus which can also be included int the cash register.
In other words, the control apparatus, and the cash register and optionally also the
user information input apparatus can be integrally constituted in a single apparatus.
Alternatively, one or two or all of the control apparatus, the cash register and the
user information input apparatus can be separately provided.
[0011] The cash processing apparatus is, for example, configured to be able to receive cash
objects such as banknotes and/or coins, from a user (such as a customer), and to be
able to dispense (or feed out) cash objects to the user.
[0012] Cash objects are received, by the cash processing apparatus, from a user for performing
a cash depositing transaction. The "cash depositing transaction" is a transaction
or process to deposit the cash objects received from the user in the cash processing
apparatus. For example, in particular after reception of the cash objects, the cash
depositing transaction can include a step of receiving input data which are input
by the user. The user input data can be cancellation data which describe a request
to cancel the cash depositing transaction before the completion of the transaction.
The user input data can be continuation data which describe a request to continue
with the transaction in order to complete (i.e., finalize) the cash depositing transaction.
For example, the cash depositing transaction is completed in case of receiving the
continuation data from the user to confirm completion of the transaction. Alternatively,
the cash depositing transaction can be automatically continued if no cancellation
data are received, for instance within a predetermined time interval.
[0013] For example, after the cash depositing transaction is completed, a step to send a
sum of denomination values of the cash objects deposited in the cash processing apparatus
to an account computer (see "Definition" below) of the user can be performed in order
to cause deposit of the sum in the account of the user.
[0014] When the cash processing apparatus receives cash objects from a user for performing
a cash depositing transaction, the cash processing apparatus preferably determines,
preferably for each of the cash objects, whether the cash object is a genuine cash
object or a potential counterfeit cash object (in the following also referred to as
"suspected cash object"). Furthermore, the cash processing apparatus preferably respectively
determines the denomination value represented by the respective received cash objects,
in particular by measuring physical properties of the cash objects (for further details
see section "Definition" below and in particular "measurement of cash objects" and
"determining a denomination value of cash objects"). The cash processing apparatus
then determines a sum of the denomination values of the suspected cash objects received
during the transaction process from the user based on the determination whether a
cash object is a counterfeit cash object or not and based on the denomination value
of the cash object. The sum of the denomination values of the suspected cash objects
is referred to as "suspected sum". Data describing the suspected sum are referred
to as suspected sum data. The suspected sum data are preferably stored in the cash
processing apparatus so that the suspected sum data can be acquired by a control apparatus
which performs the control method.
[0015] Measurement of cash objects is a technical analysis of the cash objects (for further
details see "Definitions" below).
[0016] For example, the cash processing apparatus comprises a recognition unit configured
to recognize the authenticity of the cash objects received from the user, for example,
by optical and/or magnetic measurements of the cash object. That is, the cash processing
apparatus is, for example, configured to determine, regarding each of the received
cash objects, the cash object to be a potential counterfeit cash object or a genuine
cash object, by comparing the result of the measurements with predetermined criteria.
The "potential counterfeit cash object" is a cash object being potentially of counterfeit.
The "potential counterfeit" can cover levels of counterfeit, for example determined
to be low risk up to certainly counterfeit or high probability of counterfeit. Assignment
to levels of counterfeit risks (suspiciousness levels) can be based on the results
of a plurality of comparisons with reference data.
[0017] In view of the above, the control method comprises steps described below. The sequence
in which the steps are described in the following does not represent an obligatory
sequence for performing those steps. However, if a particular step uses data provided
by another step, then the particular step is performed before the another step. The
steps describe in particular steps of operating the above-described control apparatus.
The control apparatus is in particular used for data exchange with, in particular
control of the cash processing apparatus.
[0018] The control method comprises the step of acquiring the suspected sum data from the
cash processing apparatus (with respect to meaning of "acquiring data" see section
"Definitions" below). The meaning of "acquiring suspected sum data from the cash processing
apparatus" for example encompasses the scenario in which the suspected sum data are
received directly or indirectly (i.e., via at least one computer) from the cash processing
apparatus or retrieved from input from the cash processing apparatus.
[0019] The suspected sum data having been preferably determined by measuring physical properties
of the potential counterfeit cash objects (for determining their denomination values)
as mentioned above. The acquired suspected sum data describe a sum of denomination
values of cash objects determined to be potential counterfeit cash objects by the
cash processing apparatus. The potential counterfeit cash objects have been received,
by the cash processing apparatus, from the user for performing the cash depositing
transaction. Those of the received cash objects which are determined to be potential
counterfeit cash objects are referred to as suspected cash objects and the sum of
denomination values of the suspected cash objects is referred to as suspected sum.
For example, the suspected cash objects may be stored in a suspected cash storing
unit of the cash processing apparatus.
[0020] Furthermore, the control method comprises the step of acquiring user identifying
data about the user from a user information input apparatus.
[0021] The user information input apparatus is for example a computer comprising a user
interface (with respect to the meaning of "user interface" see section "Definitions"
below) for inputting the user data. The user information input apparatus is communicatively
connected with the control apparatus. The connection can, for example be direct or
via a network or via the cash processing apparatus or via a cash register (see below).
The user information input apparatus is preferably configured to receive from the
user (e.g., via the interface) data identifying the user (for example, a user/customer
ID number used to manage customers in a retail shop where the cash processing apparatus
are used, a driver's license number, a social security number, a credit card number,
etc.). For example, the user information input apparatus can comprise a bar-code reader
to read a bar code printed on a user/customer ID card of the user or displayed on
a display of a mobile device of the user.
[0022] The user data received by the user information input apparatus are preferably user
identifying data which identify the user and which are suitable to be used by a remote
server (for further description of "remote server" see also section "Definition" below)
to retrieve credibility data from a data base included in the remote server. According
to an alternative embodiment, the user data are user identifying data which are suitable
for use by the remote server. In that case, the step of acquiring the user identifying
data comprises sending the received user data to another remote server and sending
a request to the another remote server to process the user data in order to retrieve
user identifying data suitable for the remote server. This is for example performed
by accessing a data base at the another remote server where the user data received
by the remote server are associated with user identifying data. Preferably, the step
of acquiring the user identifying data further includes a request for sending the
retrieved user identifying data back to the control apparatus. That is, the step of
acquiring the user identifying data preferably includes the step of receiving the
retrieved user identifying data from the another remote server.
[0023] The control method further comprises a step of sending the acquired user identifying
data and a request for requesting credibility data associated with the user identifying
data to the remote server (for further description of "remote server see also section
"Definition" below), in particular via a network (WAN, WLAN, or LAN or internet).
[0024] In case the user identifying data are acquired from the another remote server, the
sending step can include a step of causing the another remote server to send the user
identifying data retrieved by and at the another remote server directly from the another
remote server to the remote server. In that case, the step of acquiring the user identifying
data from the another remote server preferably does not include a step of requesting
the another remote server to send back the user identifying data.
[0025] The remote server is in particular a remote server of a third-party body, like an
institution, agency, or organization. The credibility data (such as a credibility
score indicating a degree of credibility of the user) about users are stored in the
remote server. For example, the credibility data have been determined based on a record
of a user's responsible repayment of debts, income etc. The third-party body may be
for example a credit information agency/credit rating agency or a bank. For example,
the third-party body may be the bank which has the bank account of the user for the
cash depositing transaction.
[0026] For example, the remote server can send, in response to the request from the control
apparatus, the requested credibility data to the control apparatus (for example to
the computer included in the control apparatus) which executes the control method
(for example, the computer included in the control apparatus).
[0027] The control method further comprises a step of acquiring the requested credibility
data from the remote server by receiving the credibility data sent from the remote
server.
[0028] The credibility data have been determined by the remote server based on the sent
user identifying data. For example, the remote server determines, in particular identifies
the credibility score corresponding to the user based on the user identifying data
(for example, credit card number, the user's name, etc.) by accessing a data base
in the remote server where the credibility data are stored in association with the
user identifying data. For example, the credibility data may be partially or entirely
encrypted.
[0029] Optionally, the control method can comprise a step of prompting the user to select
a cancellation of the transaction or continuation of the transaction, in case that
the received cash objects include the suspected cash objects. The selection of a cancellation
is an example for the step of receiving cancellation data. The selection of continuation
is an example for the step of receiving continuation data. The cancellation data and/or
the continuation data can be sent from the cash processing apparatus to the control
apparatus. For example, the cash processing apparatus can be configured to send cancellation
data to the control apparatus executing the control method (for example to the computer
included in the control apparatus), when the user cancels the transaction, i.e., when
the cancellation of the transaction is selected by the user.
[0030] The control method further comprises a step of determining a returnable sum. The
returnable sum is a sum to be returned with genuine cash objects to the user. The
returnable sum is to be returned in exchange for the received potential counterfeit
cash objects, i.e., the received suspected cash objects. According to the present
invention, the received potential counterfeit cash objects is not returned to the
user even in the case of cancellation of the cash deposit transaction.
[0031] The determination of the returnable sum is preferably performed based on the suspected
sum data and the credibility data. For example, the returnable sum can be determined
such that as the credibility of the user is higher, the returnable sum is higher.
That is, the returnable sum can be changeable depending on the credibility and can
be determined to be a value between zero and the suspected sum. That is, the credibility
data represent a parameter used for determining the returnable sum which in turn is
used to control the cash processing apparatus for determining the set of cash objects
to be returned. Thus, the credibility data have an effect on the composition of the
set of cash objects to be returned by the cash processing apparatus. The returnable
sum is zero if no suspected cash objects have been received.
[0032] The control method further comprises a step of determining a discharge sum. The discharge
sum is a sum of denomination values of genuine cash objects to be discharged. The
determination of the discharge sum is preferably performed based on the returnable
sum. "Based on" means that the returnable sum is used to determine the discharge sum.
For example, the discharge sum is determined to be equivalent to the returnable sum
or the discharge sum is determined to be equivalent to the returnable sum plus a trustworthy
sum (see "Definitions" below). In particular, the details on how the discharge sum
is determined depend on the kind of transaction which the cash depositing transaction
is part of. In particular, the cash depositing transaction can be part of an account
depositing transaction, a money exchange transaction, or a POS cash transaction.
[0033] The term "equivalent" covers not only "equal" (i.e., identical) but also in particular
the case where the discharge sum is smaller than the received sum or the returnable
sum, or the returnable sum plus the trustworthy sum due to a predetermined subtraction
process which subtracts an amount from the received sum. The amount to be subtracted
(referred to as subtraction amount) is in particular smaller than 10 % or 5 % of the
received sum or trustworthy sum. For example, in the framework of the predetermined
subtraction process, a predetermined percentage from the received sum or trustworthy
sum and/or a predetermined fixed amount is determined as the subtraction amount. A
subtraction amount is in particular subtracted if the cash depositing transaction
is part of a money exchange transaction exchanging money into different currency.
The subtraction process is preferably performed by the control apparatus.
[0034] The control method further comprising a step of determining control data to be issued
to the cash processing apparatus. The control data are constituted to cause the cash
processing apparatus to discharge genuine cash objects.
[0035] For example, the determined control data is issued to the cash processing apparatus.
In response to the reception of the determined control data, the cash processing apparatus
discharges, in accordance with the received control data, genuine cash objects the
sum of denomination of which is equal to the determined discharge sum.
[0036] Preferably, the control data comprise data describing the discharge sum. The sum
of denomination values of the genuine cash objects to be discharged is equal (i.e.,
identical) to the determined discharge sum. The discharge sum is used by the cash
processing apparatus to determine, in particular select individual cash objects (out
of a plurality of available cash objects of different denomination). The determined
individual cash objects represent a set of cash objects which is to be dispensed (output)
by the cash processing apparatus. The sum of denomination values of the cash objects
of the set is equal to the discharge sum. Preferably, the control data are constituted
to cause the above-described determination of the set of individual cash objects based
on the discharge sum and the output of the set of cash objects. Thus, the discharge
sum is a parameter used for controlling the dispense of the set of cash objects by
the cash processing apparatus. A set of cash objects can consist of one or more cash
objects.
[0037] It should be noted that according to the control method of the first aspect, only
genuine cash objects are returned but not any counterfeit cash objects (or suspected
cash objects). Thus, it is possible to remove counterfeit cash objects from circulation.
[0038] Thus, according to the control method of the first aspect, it is possible to remove
counterfeit cash objects by specific replacement (based on the credibility data) of
counterfeit cash objects by genuine cash objects.
[0039] In an example of the control method according to the first aspect, the cash depositing
transaction can be part of an account depositing transaction (see "Definitions" below)
and the determination of the control data is preferably (only) performed if cancellation
data are acquired by the control apparatus before the account depositing transaction
is completed. The cancellation data can, for example, be acquired via a user interface
(for example via the user interface of the user information input apparatus) which,
for example, directly sends the cancellation data to the control apparatus or sends
the cancellation data via the cash processing apparatus (and/or a cash register) to
the control apparatus.
[0040] The cancellation data describes (or represents, in particular indicates) a request
for cancellation of the cash deposit transaction acquired by the control apparatus,
and for example received via the user interface from the user. In other words, the
cancellation data are data for informing the control apparatus of the cancellation
of the cash deposit transaction. For example, the control apparatus can be configured
to prompt the user, via the user interface, to cancel the transaction or to ask the
user to select a cancellation of the transaction or continuation of the transaction,
in case that the received cash objects include the suspected cash objects.
[0041] For example, one of the above-described options (i.e., discharging trustworthy sum
plus returnable sum or discharging only the returnable sum) for determining the discharge
sum can be preset (in particular "hard wired") or can be made selectable. The preferred
option is to preset discharging the trustworthy sum plus the returnable sum. This
preferred option applies preferably if the cash depositing transaction is part of
an account depositing transaction, part of a money exchange transaction and/or part
of a POS cash transaction. That is, preferably in all three cases, in case of a cancellation,
the control data are determined to be constituted to cause the cash processing apparatus
to discharge genuine cash objects, the sum of their denomination values being equivalent
to the sum of the trustworthy sum and the returnable sum (optionally minus the subtraction
amount).
[0042] According to an example, in case of cancellation of the transaction, the cash depositing
transaction, which is in particular part of an account depositing transaction or a
money exchange transaction or a POS cash transaction, can be continued according to
a first option only based on the trustworthy sum and not based on the suspected sum,
or, according to a second option genuine cash objects equivalent to a total of the
determined returnable sum and the trustworthy sum can be discharged by the cash processing
apparatus, for example, depending on the user's selection. Thus, it is possible to
remove counterfeit cash objects from circulation.
[0043] In the following, it is for example described how the selection of one of the, for
example, two options can be performed by a user. For example, the determination of
the discharge sum can be made dependent on setting data. The setting data are constituted
to control whether the trustworthy sum is to be sent to the account computer for completing
the account depositing transaction or not. For example, a setting at the cash processing
apparatus whether the trustworthy sum is to be sent or not can be made at the cash
processing apparatus and the corresponding setting data can be acquired by the control
apparatus to determine the discharge sum. Preferably, the setting is made by means
of setting data included in the control data sent from the control apparatus to the
cash processing apparatus. The setting data can, for example, be preset at the control
apparatus or can be based on a selection of the user (performed for example by means
of a user interface, for example the user interface of the user information input
apparatus). As described below, for example, the discharge sum is equivalent to the
returnable sum if the account depositing transaction is to be completed with the trustworthy
sum, or the discharge sum is equivalent to the returnable sum plus the trustworthy
sum, if the account depositing transaction is to be not completed.
[0044] In an example of the control method according to the first aspect, the cash depositing
transaction can be part of a money exchange transaction (see "Definitions" below)
and the determination of the discharge sum can be further based on the trustworthy
sum. For example, the discharge sum can be determined, based on the returnable sum
and the trustworthy sum, to be equivalent to the trustworthy sum plus the returnable.
[0045] In an example of the control method according to the first aspect, the cash depositing
transaction can be part of a POS cash transaction (see "Definitions" below) and the
determination of the discharge sum can be further based on the trustworthy sum and
a purchase sum (see "Definitions" below). For example, the discharge sum can be determined,
based on the returnable sum, the trustworthy sum, and the purchase sum, to be equivalent
to the trustworthy sum plus the returnable sum minus the purchase sum.
[0046] In an example of the control method according to the first aspect, in the step of
determining the returnable sum, the returnable sum can be determined further based
on the trustworthy sum, in particular based on data describing the trustworthy sum
and referred to as "trustworthy sum data". That is, the determination of the returnable
sum can be performed based on the trustworthy sum data in addition to the suspected
sum data and the credibility data. For example, the returnable sum can be determined
such that as the credibility of the user and/or the trustworthy sum is higher, the
returnable sum is higher. That is, the returnable sum can be changeable depending
on the credibility and the trustworthy sum and can be determined to be a value between
the trustworthy sum and a total of the trustworthy sum and the suspected sum.
[0047] In particular, the returnable sum can be determined based on a function of the suspected
sum data and the trustworthy sum data or by using a look-up-table which identifies
a returnable sum in dependence on the suspected sum as well as the trustworthy sum.
Such a function can in particular depend on the ratio between the suspected sum and
the trustworthy sum or be such a ratio. The function is preferably constituted such
that a smaller ratio results in a higher returnable sum.
[0048] According to a first alternative of the present invention described herein, in particular
according to a first alternative of the first aspect, a control method which uses
the trustworthy sum data as described above is constituted as follows:
A control method for controlling a cash processing apparatus (2), comprising steps
of:
acquiring suspected sum data from the cash processing apparatus (2), the suspected
sum data describing a sum of denomination values of cash objects determined to be
potential counterfeit cash objects by the cash processing apparatus (2), the cash
objects having been received, by the cash processing apparatus (2), from a user for
performing a cash depositing transaction, wherein those of the received cash objects determined to be genuine cash objects by
the cash processing apparatus (2) are referred to as trustworthy cash objects and
the sum of denomination values of the trustworthy cash objects is referred to as trustworthy
sum; and
acquiring trustworthy sum data describing the trustworthy sum from the cash processing
apparatus;
wherein
those of the received cash objects which are determined to be potential counterfeit
cash objects are referred to as suspected cash objects and the sum of denomination
values of the suspected cash objects is referred to as suspected sum;
and
determining a returnable sum to be returned with genuine cash objects to the user
in exchange for the received potential counterfeit cash objects, the determination
of the returnable sum being performed based on the suspected sum data and trustworthy sum data; and
- determining control data to be sent to the cash processing apparatus (2), the control
data being constituted to cause the cash processing apparatus (2) to discharge genuine
cash objects, the sum of their denomination values being determined based on the returnable
sum.
[0049] The determination of the returnable sum is preferably performed by using the above-described
function (e.g., ratio) or look-up-table which depend on both the suspected sum and
the trustworthy sum.
[0050] That is, according to this first alternative, the following features a) and b) described
herein are not essential but only optional:
- a) acquiring user identifying data about the user from a user information input apparatus
(20);
- b) sending the acquired user identifying data and a request for requesting credibility
data associated with the user identifying data to a remote server; and
- c) acquiring the requested credibility data from the remote server, the credibility
data having been determined by the remote server based on the sent user identifying
data.
[0051] That is, any embodiments described herein (according to first to fourth aspect) which
include the a), b) and c) have to be understood in that the features a), b) and c)
are only optional according to the first alternative. In particular the communication
between the remote server of the credit information agency 1000 shown in Fig. 1 is
optional in case of the first alternative.
[0052] Any mentioning of the "first aspect", "second aspect", "third aspect", and "fourth
aspect" herein (above and below this paragraph) includes the first alternative if
not explicitly mentioned otherwise.
[0053] In an example of the control method according to the first aspect, the control method
further comprises a step of acquiring a return upper threshold for the returnable
sum based on the credibility data. In the step of determining the returnable sum,
if the suspected sum is greater than the return upper threshold, the returnable sum
can be determined to be a sum equivalent to the return upper threshold, and if the
suspected sum is equal to or less than the return upper threshold, the returnable
sum can be determined to be a sum equivalent to the suspected sum.
[0054] In an example of the control method according to the first aspect, the control method
may further comprise a step of acquiring suspiciousness level data from the cash processing
apparatus. The suspiciousness level data are data describing for the respective ones
of the suspected cash objects a level of risk of being a counterfeit cash object.
The suspiciousness level data have been determined based measurements of the received
cash objects by the cash processing apparatus. The measurements may be for example
optically or magnetically performed by the cash processing apparatus. In the step
of determining the returnable sum, the returnable sum can be determined further based
on the acquired suspiciousness level data.
[0055] In particular, the returnable sum can be determined based on a function of the suspected
sum data and the suspiciousness level data or by using a look-up-table which identifies
a returnable sum in dependence on the suspected sum as well as the suspiciousness
level. Such a function can, in particular, depend on the product of the suspected
sum and the suspiciousness level, and in particular be such a product. Assuming that
the suspiciousness level is higher if the risk of being a counterfeit cash object
is higher, then the function (e.g., product) is preferably constituted such that a
smaller product results in a smaller returnable sum.
[0056] According to a second alternative of the present invention described herein, in particular
according to a second alternative of the first aspect, a control method which uses
the trustworthy sum data as described above is constituted as follows:
A control method for controlling a cash processing apparatus (2), comprising steps
of:
acquiring suspected sum data from the cash processing apparatus (2), the suspected
sum data describing a sum of denomination values of cash objects determined to be
potential counterfeit cash objects by the cash processing apparatus (2), the cash
objects having been received, by the cash processing apparatus (2), from a user for
performing a cash depositing transaction, wherein
those of the received cash objects which are determined to be potential counterfeit
cash objects are referred to as suspected cash objects and the sum of denomination
values of the suspected cash objects is referred to as suspected sum; and
acquiring suspiciousness level data from the cash processing apparatus (2), the suspiciousness
level data describing for the respective ones of the suspected cash objects a level
of risk of being a counterfeit cash object, the suspiciousness level data having been
determined based on measurements of the received cash objects by the cash processing
apparatus (2),
determining a returnable sum to be returned with genuine cash objects to the user
in exchange for the received potential counterfeit cash objects, the determination
of the returnable sum being performed based on the suspected sum data and the suspiciousness level data; and
- determining control data to be sent to the cash processing apparatus (2), the control
data being constituted to cause the cash processing apparatus (2) to discharge genuine
cash objects, the sum of their denomination values being determined based on the returnable
sum.
[0057] That is, according to this second alternative, the following features a) and b) described
herein are not essential but only optional:
- a) acquiring user identifying data about the user from a user information input apparatus
(20);
- b) sending the acquired user identifying data and a request for requesting credibility
data associated with the user identifying data to a remote server; and
- c) acquiring the requested credibility data from the remote server, the credibility
data having been determined by the remote server based on the sent user identifying
data.
[0058] The determination of the returnable sum is preferably performed by using the above-described
function (e.g., product) or look-up-table which depend on both the suspected sum and
the suspiciousness level.
[0059] That is, any embodiments described herein (according to first to fourth aspect) which
include the a) and b) and c) have to be understood in that the features a) and b)
and c) are only optional according to the second alternative. In particular the communication
between the remote server of the credit information agency 1000 shown in Fig. 1 is
optional in case of the second alternative.
[0060] Any mentioning of the "first aspect", "second aspect", "third aspect", and "fourth
aspect" herein (above and below this paragraph) includes the second alternative if
not explicitly mentioned otherwise.
[0061] In the above example of the control method according to the first aspect, the credibility
data may include a credibility score indicating a degree of credibility of the user.
In this case, the returnable sum can be determined based on the acquired suspiciousness
level data as follows: if the credibility score is lower than a first credibility
score threshold, the returnable sum is determined to be zero; if the credibility score
is equal to or greater than the first credibility score threshold and less than a
second credibility score threshold, the returnable sum is determined to include a
sum of the suspected cash objects belonging to a first level category having a first
level of suspiciousness and not to include a sum of the suspected cash objects belonging
to a second level category having a second level of suspiciousness higher than the
first level of suspiciousness; if the credibility score is equal to or greater than
the second credibility score threshold, the returnable sum is determined to include
the sum of the suspected cash objects of the first and second level categories.
[0062] In an example of the control method according to the first aspect, the control method
can further comprise a step of prompting, by the cash processing apparatus, the user
to cancel the transaction in case that the received cash objects include the suspected
cash objects. Additionally or alternatively, the control method can further comprise
a step of prompting the user to input user identifying data. Additionally or alternatively,
the control method can further comprise a step of indicating to the user at least
one of the received sum, the suspected sum or the trustworthy sum.
[0063] For example, the control method can comprise a step of prompting the user to select
a cancellation of the transaction or continuation of the transaction, in case that
the received cash objects include the suspected cash objects. The selection of a cancellation
is an example for the step of receiving cancellation data. The selection of continuation
is an example for the step of receiving continuation data.
[0064] In an example of the control method according to the first aspect, the control method
can further comprise a step of receiving selection data from the cash processing apparatus.
The selection data are data describing whether the user selects a full cancellation
or an only suspected sum cancellation of the depositing transaction (which means that
the cash depositing transaction is completed with the trustworthy sum only). In case
that the full cancellation is selected (which means that the cash depositing transaction
is not completed, even not with the trustworthy sum), the control data may be determined
to be constituted to cause the cash processing apparatus to discharge genuine cash
objects, the sum of their denomination values being equivalent to a total sum of the
returnable sum and the trustworthy sum. In case that the only suspected sum cancellation
is selected, the control data may be determined to be constituted to cause the cash
processing apparatus to discharge genuine cash objects, the sum of their denomination
values being equivalent to the returnable sum.
[0065] In an example of the control method according to the first aspect, the control method
can comprise a step of storing the suspected sum data and the user identifying data
in association with (i.e., linked to) each other.
[0066] In an example of the control method according to the first aspect, the control method
can comprise a step of (in particular if the transaction is not cancelled) performing
a deposit process to deposit the determined returnable sum to a bank account of the
user.
[0067] In an example of the control method according to the first aspect, if the transaction
is not cancelled, and if the cash depositing transaction is part of an account depositing
transaction, then the account depositing transaction is continued with only with the
trustworthy sum by sending trustworthy sum data describing the trustworthy sum to
an account computer controlling an account associated with the user identifying data.
Alternatively, if the transaction is not cancelled, then the following steps may be
performed: acquiring received sum data from the cash processing apparatus; sending
the received sum data to the account computer associated with the user identifying
data for completing the account depositing transaction; and sending the suspected
sum data to the account computer for enabling the account computer to correct a sum
to be deposited by subtracting the suspected sum from the received sum.
[0068] In a second aspect, the invention is directed to a computer program comprising instructions
which, when the program is executed by at least one computer, causes the at least
one computer to carry out method according to the first aspect. The invention may
be alternatively or additionally directed to a computer-readable storage medium on
which the aforementioned program is stored. The program storage medium is for example
non-transitory. The invention can alternatively or additionally relate to a (physical,
for example electrical, for example technically generated) signal wave, for example
a digital signal wave, such as an electromagnetic carrier wave carrying information
which represents the program, for example the above-mentioned program, which for example
comprises code means which are adapted to perform any or all of the steps of the method
according to the first aspect. The signal wave is in one example for a data carrier
signal carrying the aforementioned computer program. The invention according to the
second aspect therefore can alternatively or additionally relate to a data carrier
signal carrying the program. A computer program stored on a disc is a data file, and
when the file is read out and transmitted it becomes a data stream for example in
the form of a (physical, for example electrical, for example technically generated)
signal. The signal can be implemented as the signal wave, for example as the electromagnetic
carrier wave which is described herein. For example, the signal, for example the signal
wave is constituted to be transmitted via a computer network, for example LAN, WLAN,
WAN, mobile network, for example the internet. For example, the signal, for example
the signal wave, is constituted to be transmitted by optic or acoustic data transmission.
The invention according to the second aspect therefore can alternatively or additionally
relate to a data stream representative of the aforementioned program, i.e., comprising
the program.
[0069] In a third aspect, the invention is directed to a control apparatus for controlling
the cash processing apparatus, the control apparatus comprising a computer on which
the computer program according to the second aspect is running or into the memory
of which the program is loaded.
[0070] The computer is preferably constituted to acquire the suspected sum data from the
cash processing apparatus; to (optional in case of first and second alternative) acquire
the user identifying data from the user information input apparatus; to send (optional
in case of first and second alternative) the acquired user identifying data and the
request for requesting credibility data; to acquire (optional in case of first and
second alternative) the requested credibility data from the remote server and optionally
to acquire the cancellation data from the cash processing apparatus. In particular
in case of the first alternative, the computer is further constituted to acquire the
trustworthy sum data from the cash processing apparatus. In particular in case of
the second alternative, the computer is further constituted to acquire the suspiciousness
level data from the cash processing apparatus.
[0071] In an example of the control apparatus according to the third aspect, the control
apparatus can comprise units for performing the above-described acquisition and (optional)
sending steps and for performing the step of determining the returnable sum.
[0072] In a fourth aspect, the invention is directed to a cash processing system comprising
the control apparatus of according to the third aspect. The cash processing system
according to the fourth aspect comprises the cash processing apparatus and/or the
user information input apparatus. That is, the cash processing system according to
the fourth aspect comprises the control apparatus of according to the third aspect,
and any one or both of the cash processing apparatus and the user information input
apparatus.
Definitions:
"cash objects"
[0073] The term "cash objects" covers genuine cash objects which are legal tender and counterfeit
cash objects which represent counterfeit money and have an outer appearance similar
to legal tender. The cash objects are for example banknotes (bills) and/or coins.
In particular, the cash objects are physical, in particular tangible objects having
a particular geometry (size and/or shape). In particular, the genuine cash objects
are constituted to be used as means for payment and the counterfeit cash objects are
constituted to appear to be usable as means for payment. Counterfeit cash objects
have in particular the same geometry as their genuine counterpart. In particular each
cash object respectively represents a specific denomination value. In the present
application, "cash objects" are in particular the cash objects received from a user
by the cash processing apparatus during the transaction process.
"measurement of cash objects"
[0074] The measurement of cash objects can in particular comprise at least one of the following,
capturing the image of the surface of the cash object, measuring of color values (e.g.,
Lab, or RGB or grey values) of parts of the surface of the cash object, recognizing
patterns in the captured image, detecting the geometry (size and/or shape) of the
cash objects, detecting infrared properties of the cash objects, or detecting magnetic
properties of the cash objects.
[0075] The measurement is preferably performed by analytical devices, in particular sensors
and/or signal (e.g. electromagnetic) emission devices, like light emission devices
(e.g. lasers, lamps,..) and electromagnets, radio sources, and covers, for example,
measurements of physical properties of the cash objects, optical and/or electrical
and/or magnetical and/or mechanical measurements of the cash objects and comparison
of the acquired measurement values with reference data, based on the comparison, the
cash objects are determined to be potential counterfeit cash objects.
[0076] The cash objects have characteristic physical properties which are particular for
a specific denomination value and/or for being a genuine or a counterfeit cash object.
The identification of one or more characteristic physical properties by means of the
aforementioned measurement allows to identify the denomination value and/or whether
the cash object is a genuine or counterfeit cash object.
[0077] For example, the cash processing apparatus comprises a recognition unit configured
to recognize the authenticity and/or denomination of the cash objects received from
the user, for example, by measuring physical properties of the cash objects as mentioned
above, that is for example by means of optical and/or magnetic measurements of the
cash object.
"determining a denomination value of cash objects"
[0078] The step of determining the denomination value of cash objects comprises in particular
a step of measurement of the cash objects as described above. The cash objects have
characteristic physical properties which are particular for a specific denomination
value. The identification of one or more characteristic physical properties by means
of the aforementioned measurement allows to identify the denomination value.
"acquiring" and "determining"
[0079] The expression "acquiring data" for example encompasses (within the framework of
a computer implemented method) the scenario in which the data are determined by the
computer implemented method or program. Determining data for example encompasses measuring
physical quantities (e.g., light reflected from a bill for determining whether the
bill is a counterfeit bill) and transforming the measured values into data, for example
digital data, and/or computing (and e.g., outputting) the data by means of a computer
and for example within the framework of the method in accordance with the invention.
A step of "determining" as described herein for example comprises or consists of issuing
a command to perform the determination described herein. For example, the step comprises
or consists of issuing a command to cause a computer, for example a remote computer,
for example a remote server, for example in the cloud, to perform the determination.
Alternatively or additionally, a step of "determination" as described herein for example
comprises or consists of receiving the data resulting from the determination described
herein, for example receiving the resulting data from the remote computer, for example
from that remote computer which has been caused to perform the determination. The
meaning of "acquiring data" also for example encompasses the scenario in which the
data are (passively) received (e.g., input to) or (actively) retrieved (e.g. by prompting
a remote entity to send it to the computer) by the computer implemented method or
program, for example from another program, a previous method step or a data storage
medium, for example for further processing by the computer implemented method or program.
Generation of the data to be acquired may but need not be part of the method in accordance
with the invention. The expression "acquiring data" can therefore also for example
mean waiting to receive data and/or receiving the data. The received data can for
example be inputted via an interface. The expression "acquiring data" can also mean
that the computer implemented method or program performs steps in order to receive
or retrieve the data from a data source, for instance a data storage medium (such
as for example a ROM, RAM, database, hard drive, etc.) or via the interface (for instance,
from another computer or a network). The data acquired by the disclosed method or
device, respectively, may be acquired from a database located in a data storage device
which is operably connected to a computer for data transfer between the database and
the computer, for example from the database to the computer. The computer acquires
the data for use as an input for steps of determining data. The determined data can
be output again to the same or another database to be stored for later use. The database
or database used for implementing the disclosed method can be located on network data
storage device or a network server (for example, a cloud data storage device or a
cloud server) or a local data storage device (such as a mass storage device operably
connected to at least one computer executing the disclosed method). The data can be
made "ready for use" by performing an additional step before the acquiring step. In
accordance with this additional step, the data are generated in order to be acquired.
The data are for example detected or captured (for example by an analytical device,
e.g., a light detector or magnetic detector, for measuring physical values). Alternatively
or additionally, the data are inputted in accordance with the additional step, for
instance via interfaces. The data generated can for example be inputted (for instance
into the computer). In accordance with the additional step (which precedes the acquiring
step), the data can also be provided by performing the additional step of storing
the data in a data storage medium (such as for example a ROM, RAM, CD and/or hard
drive), such that they are ready for use within the framework of the method or program
in accordance with the invention. In order to distinguish the different data used
by the present method, the data are denoted (i.e., referred to) as "XY data" and the
like and are defined in terms of the information which they describe, which is then
preferably referred to as "XY information" and the like.
"computer"
[0080] A computer for example comprises at least one processor and for example at least
one memory in order to (technically) process the data, for example electronically
and/or optically. The processor being for example made of a substance or composition
which is a semiconductor, for example at least partly n- and/or p-doped semiconductor,
for example at least one of II-, III-, IV-, V-, VI-semiconductor material, for example
(doped) silicon and/or gallium arsenide. The calculating or determining steps described
are for example performed by a computer. Determining steps or calculating steps are
for example steps of determining data within the framework of the technical method,
for example within the framework of a program. A computer is for example any kind
of data processing device, for example electronic data processing device. A computer
can be a device which is generally thought of as such, for example desktop PCs, notebooks,
netbooks, smart phones etc., but can also be any programmable apparatus, such as for
example a mobile phone or an embedded processor. A computer can for example comprise
a system (network) of "sub-computers", wherein each sub-computer represents a computer
in its own right. The term "computer" includes a cloud computer, for example a cloud
server. The term computer includes a server resource. The term "cloud computer" includes
a cloud computer system which for example comprises a system of at least one cloud
computer and for example a plurality of operatively interconnected cloud computers
such as a server farm. Such a cloud computer is preferably connected to a wide area
network such as the world wide web (WWW) and located in a so-called cloud of computers
which are all connected to the world wide web. Such an infrastructure is used for
"cloud computing", which describes computation, software, data access and storage
services which do not require the end user to know the physical location and/or configuration
of the computer delivering a specific service. For example, the term "cloud" is used
in this respect as a metaphor for the Internet (world wide web). For example, the
cloud provides computing infrastructure as a service (IaaS). The cloud computer can
function as a virtual host for an operating system and/or data processing application
which is used to execute the method of the invention. A computer for example comprises
interfaces in order to receive or output data and/or perform an analogue-to-digital
conversion. The data are for example data which represent physical properties and/or
which are generated from technical signals. The technical signals are for example
generated by means of (technical) detection devices (such as for example devices for
detecting marker devices) and/or (technical) analytical devices (such as for example
devices for performing (medical) imaging methods), wherein the technical signals are
for example electrical or optical signals. The technical signals for example represent
the data received or outputted by the computer. The computer is preferably operatively
coupled to a display device which allows information outputted by the computer to
be displayed, for example to a user. One example of a display device is a virtual
reality device or an augmented reality device (also referred to as virtual reality
glasses or augmented reality glasses) which can be used as "goggles" for navigating.
An augmented reality device or a virtual reality device can be used both to input
information into the computer by user interaction and to display information outputted
by the computer. Another example of a display device would be a standard computer
monitor comprising for example a liquid crystal display operatively coupled to the
computer for receiving display control data from the computer for generating signals
used to display image information content on the display device. The monitor may also
be the monitor of a portable, for example handheld, device such as a smart phone or
personal digital assistant or digital media player.
"account computer"
[0081] An "account computer" is a computer as defined herein in "Definition" and is thus
in particular a server. The account computer is used by a financial institution for
handling an account of the user. The financial institution is for example a bank or
credit institute. The financial institution accepts deposits from a user on an account
of the user by means of the account computer. In particular, the account computer
is constituted to increase or decrease the account balance of the account of the user.
"cash depositing transaction"
[0082] A cash depositing transaction is a process which covers receiving of cash objects
and registering the sum of denomination values of the received cash objects by the
cash processing apparatus. Preferably, there is a separate registering of the received
suspected sum and the trustworthy sum. Preferably, the cash depositing transaction
also comprises the step of storing the received cash objects, in particular if the
cash depositing transaction is not cancelled. In case cash objects are returned to
the user (for example if the cash depositing transaction is cancelled), then at least
a part of the received cash objects can be not stored but returned to the user. Preferably,
the suspected sum is registered, in particular in association with the user identifying
data, even if the cash depositing transaction is cancelled. However, in case of full
cancellation of the cash depositing transaction, the trustworthy sum is preferably
not registered.
"account depositing transaction"
[0083] An account depositing transaction is a process of increasing the account balance
of a user in accordance with data received from the cash processing apparatus (optionally
minus amount to be subtracted for the service of performing the cash depositing transaction).
The received data comprise a description of the sum of denomination values of cash
objects received from the user. The sum preferably corresponds to the trustworthy
sum plus the returnable sum determined in accordance with the method described herein.
The account depositing transaction is in particular performed remotely.
"money exchange transaction"
[0084] The term money exchange transaction is a process where received cash objects are
replaced by other cash objects. The other cash objects can be of a different currency
or can be of the same currency but having at least one denomination different from
the denominations of the received cash objects.
"POS cash transaction" and "purchase sum"
[0085] A POS cash transaction is a cash transaction at a Point Of Sales (POS). A POS is
a location, where buying and selling of goods or services is performed. At the POS,
cash objects of the user (customer) are received by the cash processing apparatus
for buying goods and/or services. If the received sum is higher than a purchase sum
which the user needs in order to buy goods and/or services (which he wants to buy),
then cash objects are discharged by the cash processing apparatus. The sum of the
denomination values of the discharged cash objects is the discharge sum. The discharge
sum is so that the received sum is equivalent to the sum of the purchase sum and the
discharge sum provided the received cash objects included no counterfeit cash objects.
"trustworthy cash objects", "trustworthy sum"
[0086] The "trustworthy cash objects" are those of the received cash objects determined
to be genuine cash objects by the cash processing apparatus. The "trustworthy sum"
is the sum of denomination values of the trustworthy cash objects. The sum of denomination
values of the trustworthy cash objects is zero if no trustworthy cash objects have
been received.
"remote server"
[0087] The remote server comprises in particular a data source, for example a data base
(see definition of acquiring above). The remote server is in particular an external
computer (e.g. server, in particular cloud server) which is operatively connected
to the control apparatus directly via a network (LAN, WLAN, WAN, internet etc.) or
indirectly via the cash processing apparatus which is connected to the remote server
via such a network.
"user interface"
[0088] A user interface is preferably constituted to generate and/or receive audio and/or
video and/or haptic signals for receiving data from giving information to the user
and/or for receiving data (in particular the user identifying data) from the user.
A user can in particular be prompted to input data by the user interface. A user interface
can be for example a scanner, screen, touch-screen, keyboard, mouse etc., microphone
with speech recognition, etc.
BRIEF DESCRIPTION OF THE DRAWINGS
[0089] In the following, the invention is described with reference to the appended figures
which give background explanations and represent specific embodiments of the invention.
The scope of the invention is however not limited to the specific features disclosed
in the context of the figures.
Fig. 1 is a schematic diagram of the cash processing system according to a first embodiment.
Fig. 2 is a schematic diagram of an external appearance of the cash processing system
according to the first embodiment.
Fig. 3 is a schematic diagram for explaining transport of cash objects fed in the
cash processing apparatus according to the first embodiment.
Fig. 4 is a flow diagram showing the steps of the control method according to the
first embodiment.
Fig. 5 is a flow diagram showing the flow of the determination of returnable sum according
to the first embodiment.
Fig. 6 is a flow diagram showing the flow of the determination of return upper threshold
according to the first embodiment.
Fig. 7 is a flow diagram showing the flow of the determination of returnable sum according
to a second embodiment.
Fig. 8 is a schematic diagram of the cash processing system according to a third embodiment.
DESCRIPTION OF EMBODIMENTS
<First Embodiment>
[0090] Fig. 1 is a schematic diagram of a cash processing system 1 according to a first
embodiment. Fig. 2 is a schematic diagram of an external appearance of the cash processing
system 1.
[0091] As shown in Figs. 1 and 2, the cash processing system 1 comprises a cash processing
apparatus 2, a control apparatus 10, a user information input apparatus 20 and a printer
30.
[0092] As shown in Fig. 2, the cash processing apparatus 2 includes a coin processing apparatus
100 and a banknote processing apparatus 200. The coin processing apparatus 100 is
configured to process coins and comprises a coin depositing unit 110 for feeding coins
and a coin dispensing unit 120 for discharging coins. The banknote processing apparatus
200 is configured to process banknotes and comprises a banknote depositing unit 210
for feeding banknotes and a banknote dispensing unit 220 for discharging banknotes.
The coins and banknotes are examples of the "cash objects" in the present invention.
Because the banknotes and the coins can be processed in the same manner, the details
of the cash processing apparatus 2 are explained below by taking any one of the coin
processing apparatus 100 and the banknote processing apparatus 200 as the cash processing
apparatus 2.
[0093] In Fig. 1, the cash processing apparatus 2, the control apparatus 10, the user information
input apparatus 20 and the printer 30 are communicably connected with each other.
[0094] The control apparatus 10 comprises a computer for controlling the cash processing
apparatus 2. In the present embodiment, the control apparatus 10 has functions of
a POS register communicably connected to a POS server not shown in the figures. The
control apparatus 10 may not have the functions of the POS register. That is, the
control apparatus 10 and a POS register may be provided separately or independently.
The control apparatus 10 comprises an operation unit 11 for inputting various information
and a display unit 12 comprising a liquid crystal display for displaying various information.
[0095] The control apparatus 10 is communicably connected with the user information input
apparatus 20 and the cash processing apparatus 2.
[0096] The control apparatus 10 is configured to send control data for controlling the cash
processing apparatus 2 to the cash processing apparatus 2. The control apparatus 10
is configured to receive various data regarding a cash depositing transaction to deposit
cash objects received from a user in the cash processing apparatus 2 (for example,
received sum data, suspected sum data, trustworthy sum data, suspiciousness level
data, etc.) from the cash processing apparatus 2.
[0097] Moreover, the control apparatus 10 is for example communicably connected with a computer,
in the following referred to as "account computer" (which is in particular a server)
of a financial institution handling an account of the user. The financial institution
is for example a bank 2000. The bank 2000 mentioned herein is to be understood as
an unlimiting example for the financial institution. The financial institution accepts
deposits from a user on an account of the user.
[0098] A connection between control apparatus 10 and the account computer of the bank 2000
is preferably provided if the control apparatus 10 is used for account depositing
transaction. A connection to the account computer of the bank 2000 can be provided
but is not essential if the control apparatus works is used for a POS cash transaction
or for a money exchange transaction. Preferably, the control apparatus 10 is communicably
connected with a computer (in particular server) of a credit information agency 1000
for acquiring the credibility data. The computer of the credit information agency
1000 is an unlimiting example of the "remote server" in the present invention and
the credit information agency 1000 is an unlimiting example for a data source which
provides the credibility data in response to the user identifying data. The control
apparatus 10 is preferably configured to send various data regarding the cash depositing
transaction (for example, received sum data, suspected data and trustworthy sum data)
to the bank 2000, in particular for performing the account depositing transaction.
The control apparatus 10 is preferably configured to send request data for requesting
credibility data to the credit information agency 1000. The control apparatus 10 is
preferably configured to receive credibility data from the remote server of for example
a credit information agency 1000.
[0099] The credit information agency 1000 is an agency for collecting of credit information
and for providing credit information. The credit information agency 1000 can determine,
based on user identifying data, credibility data of the user. The credibility data
of a respective user are preferably stored in a database of the remote server (e.g.,
of the credit information agency) in association with the user identifying data of
the respective user. In the present embodiment, the credibility data includes a credibility
score CS indicating a degree (or level) of credibility of the user. For example, a
credibility score having a value between 300-499 indicates that the credibility of
the user is "Very poor", a credibility score having a value between 500-599 indicates
that the credibility of the user is "Poor", a credibility score having a value between
600-659 indicates that the credibility of the user is "Fair", a credibility score
having a value between 660-779 indicates that the credibility of the user is "Good",
and a credibility score having a value between 780-850 indicates that the credibility
of the user is "Very good". According to an embodiment of the invention, this credibility
score has an effect on the returnable sum which in turn has an effect on the discharge
sum which in turn has an effect on the control data which have an effect on the composition
of the set of cash objects to be discharged and which cause the discharge of the set
of cash objects.
[0100] The user information input apparatus 20 functions as an input unit for inputting
information indicating the identity of the user (customer), such as a driver's license
number, a social security number, and a user number (customer number) used to manage
users (customers) in the shop. The user information input apparatus 20 comprises,
for example, a user interface (see "Definitions") for example a screen, for example
a touch screen-type liquid crystal display installed facing the user. The user information
input apparatus 20 functions, for example, as an operation unit for selecting approval
or non-approval when requesting approval to the user.
[0101] A printer 30 can be provided and is preferably configured to print a receipt on which
the information is printed. For example, information about the type and the number
(amount) of cash objects (i.e., coins and banknotes) inserted by the user into the
cash processing apparatus 2, and the like are printed on the receipt. When cash objects
determined, in particular recognized to be potential counterfeit are detected by the
cash processing apparatus 2, information about such cash objects is preferably also
printed on the receipt.
[0102] In Fig. 1, the cash processing apparatus 2 comprises the depositing unit 210, the
dispensing unit 220 (in particular used for discharging genuine cash objects in accordance
with the determined discharge sum), a transport unit 230, a recognition unit 240,
a suspected cash storing unit 260, a storing unit 270 and a collecting cassette 271.
Moreover, the cash processing apparatus 2 comprises a control unit 290 configured
to control these structural components, a memory 280 configured to store therein various
computer programs and data, and a communication unit 295 configured to transmit/receive
data to/from an external device.
[0103] The dispensing unit 220 discharges the cash objects, which were fed from the storing
unit 270, to the outside of the apparatus. The transport unit 230 transports the cash
objects on a transport path in the apparatus. When performing the cash deposit process,
the storing unit 270 stores the deposited cash objects therein by denomination. Preferably,
only cash objects determined as genuine by a recognition unit 240 are stored in the
storing unit 270. When performing the cash dispensing process, the storing unit 270
feeds out the stored cash objects one by one to the transport path. The collecting
cassette 271 stores therein the cash objects that could not be stored in the storing
unit 270, and the like. When performing the cash dispensing process to dispense the
cash objects, the storing unit 270 feeds the cash objects to the transport path, the
transport unit 230 transports the fed cash objects to the dispensing unit 220, and
the dispensing unit 220 discharges the cash objects to the outside of the apparatus.
[0104] The depositing unit 210 feeds the cash objects, which are received by the cash processing
apparatus for the cash depositing process, one by one to the transport path inside
the apparatus. The transport unit 230 transports the cash objects fed to the transport
path which is explained in more detail below with respect to Fig. 3.
[0105] Fig. 3 is a schematic diagram for explaining transport of cash objects fed in the
cash processing apparatus 2. As shown with arrows in Fig. 3, during the cash depositing
process, the received cash objects fed by the depositing unit 210 to the transport
path inside the apparatus are transported to the recognition unit 240.
[0106] The recognition unit 240 is configured to recognize at least one of the denomination,
the authenticity, the fitness, the version, the amount, or the like of the cash objects
being transported. The recognition unit 240 is preferably configured to perform measurements
of physical properties of the cash objects, like optical and/or magnetic measurements
of (each of) the cash objects and preferably to determine, regarding each of the received
cash objects, the cash object to be a potential counterfeit cash object or a genuine
cash object, for example by comparing the result of the measurements with predetermined
criteria.
[0107] Preferably, in addition, the recognition unit 240 is configured to determine, regarding
(each of) the received cash objects determined as the potential counterfeit cash objects,
a level of risk of being a counterfeit cash object (in other words, a level of suspiciousness)
based on the comparison between the result of the measurements and the predetermined
criteria. The level of risk can be continuous and, for example, can be a function
of the difference between a value describing one of the criteria and a measurement
value. Alternatively, the recognition unit is configured to classify, based on the
comparison, the cash objects determined as the potential counterfeit cash objects
into categories, for example a high-suspiciousness category "Cat. 2" and a low-suspiciousness
category "Cat. 3" according to the determined level of the risk of being a counterfeit
cash object (i.e., the determined level of suspiciousness). The high-suspiciousness
category "Cat. 2" is a category having a higher level of suspiciousness and the low-risk
suspiciousness "Cat. 3" is a category having a lower level of suspiciousness. The
recognition unit 240 is configured to classify, in particular categorize those of
the potential counterfeit cash objects determined as having a higher-level of suspiciousness
into the high-suspiciousness category "Cat. 2" and to classify, in particular categorize
those of the potential counterfeit cash objects determined as having a lower-level
of suspiciousness into the low-suspiciousness category "Cat. 3".
[0108] In the following explanation, a cash object that is determined, in particular recognized
by the recognition unit 240 as genuine is described as a "trustworthy cash object",
a cash object that is determined, in particular recognized by the recognition unit
240 as potential counterfeit is described as a "suspected cash object". The suspected
cash object is evaluated by a certain institution, such as the central bank, on a
later date. In this evaluation, the suspected cash object may be evaluated as genuine
or counterfeit.
[0109] Based on the recognition result obtained by the recognition unit 240, the transport
unit 230 transports the cash object to one of the dispensing unit 220, the suspected
cash storing unit 260, the storing unit 270 and the collecting cassette 271. Specifically,
the recognition unit 240 considers a cash object as a reject cash object when the
denomination and the like of the cash object cannot be recognized. The reject cash
object is discharged from the dispensing unit 220 and the reject cash object is returned
to the user. Preferably, a reject cash object is considered to belong not to the received
cash objects and does not contribute to the received sum. Among the cash objects whose
denomination and the like could be recognized by the recognition unit 240, those of
the trustworthy cash objects which can be reused for the cash dispensing process are
transported to the storing unit 270 and stored therein by denomination. Those of the
trustworthy cash objects which could not be stored in the storing unit 270 because
the storing unit 270 is full (full state) are stored in the collecting cassette 271.
Those (unfit cash objects) of the trustworthy cash objects which is not suitable for
the dispensing process because it is damaged or dirty, are also stored in the collecting
cassette 271. Among the cash objects whose denomination and the like could be recognized
by the recognition unit 240, the suspected cash objects are transported to the suspected
cash storing unit 260.
[0110] The suspected cash storing unit 260 is configured to store therein the suspected
cash objects.
[0111] With reference to Fig. 4, the control method according to the first embodiment is
explained. Fig. 4 is a flow diagram showing the steps of the control method according
to the first embodiment.
[0112] During a cash depositing transaction to deposit the cash objects received from the
user in the cash processing apparatus 2, the control apparatus 10 acquires suspected
sum data from the cash processing apparatus 2 (step S11). The suspected sum data is
a data describing suspected sum, which is a sum of denomination values of suspected
cash objects (i.e., those of the received cash objects which are determined by the
recognition unit 240 to be potential counterfeit). Preferably, in step S11, the control
apparatus 10 acquires, in addition to the suspected sum data, trustworthy sum data
describing the trustworthy sum from the cash processing apparatus 2.
[0113] Next, the control apparatus 10 acquires user identifying data (such as user's name,
address, credit card number, bank account, etc.) about the user from the user information
input apparatus 20 (step S12). Specifically, the control apparatus 10 may receive
information indicating the identity of the user from the user information input apparatus
20 and acquire user identifying data based on the received information indicating
the identity of the user by referring to a database storing the information indicating
the identity of the user and the corresponding user identifying data. Alternatively,
the control apparatus 10 may receive user identifying data corresponding to information
indicating the identity of the user from the user information input apparatus 20.
[0114] Next, the control apparatus 10 sends the acquired user identifying data and a request
for requesting credibility data associated with the user identifying data to the remote
server of the credit information agency 1000 (step S 13).
[0115] Next, the control apparatus 10 acquires the credibility data requested in step S13
from the remote server of the credit information agency 1000 (step S 14). The credibility
data is determined by the remote server of the credit information agency 1000 based
on the user identifying data in the step S13.
[0116] Next, if the control apparatus 10 is used for an account depositing transaction and
acquires cancellation data from the cash processing apparatus 2 before the depositing
transaction is completed (step S15: Yes), the control apparatus 10 determines a returnable
sum RS to be returned with genuine cash objects to the user in exchange for the received
potential counterfeit cash objects (step S16). That is, in case that cancellation
of the depositing transaction is selected by the user after receiving cash objects
from the user by the cash processing apparatus 2 and before the completion of the
depositing transaction, the control apparatus 10 determines the returnable sum. The
control apparatus 10 performs the determination of the returnable sum based on the
suspected sum data acquired in step S11 and the credibility data acquired in step
S13. The details of the determination of the returnable sum are described later referring
to Figs. 5 and 6.
[0117] The step S 15 is only optional, in particular if the control apparatus is not used
for account depositing transaction but for example for money exchange transaction
or POS cash transaction.
[0118] Next, the control apparatus 10 determines the discharge sum based on the returnable
sum and the trustworthy sum, preferably such that the discharge sum is equivalent
to the returnable sum plus the trustworthy sum (step S17). Then, based on the discharge
sum determined in step S17, the control data are determined (step S18). The control
data are to be issued to the cash processing apparatus 2 by the control apparatus
10. The control data are constituted to cause the cash processing apparatus 2 to discharge
genuine cash objects, the sum of their denomination values being equal to the determined
discharge sum (which is preferably equivalent to the returnable sum).
[0119] In the determination of the discharge sum in the step S17, "based on the trustworthy"
is only optional. For example, the control apparatus 10 can determine the discharge
sum based on the returnable sum but not on the trustworthy sum, preferably such that
the discharge sum is equivalent to the returnable sum.
[0120] Next, if the control apparatus 10 does not acquire cancellation data from the cash
processing apparatus 2 before the depositing transaction is completed (step S15: No),
then, according to the first embodiment, the cash depositing transaction is continued
only with the trustworthy sum by sending trustworthy sum data describing the trustworthy
sum to the account computer of the bank 2000 associated with the user identifying
data (step S20). That is, in case that cancellation of the depositing transaction
is not selected by the user (for example, continuation of the depositing transaction
is selected), the trustworthy sum data are sent to the account computer of the bank
2000 to perform depositing process only with the trustworthy sum.
[0121] According to the control method of the first embodiment, only genuine cash objects
are returned but not any counterfeit cash objects (or suspected cash objects). Thus,
it is possible to remove counterfeit cash objects from circulation. According to the
first embodiment, the sum of denominations of the discharged genuine cash objects
is preferably equivalent to the returnable sum. According to an alternative embodiment
the sum is equivalent to the returnable sum plus the trustworthy sum and no money
is deposited at the account server of the bank.
[0122] Thus, according to the control method of the first embodiment, it is possible to
removing counterfeits by specific replacement (based on the credibility data) of counterfeits
cash by genuine cash.
[0123] Referring to Figs. 5 and 6, the details of the determination of the returnable sum
are described. Fig. 5 is a flow diagram showing the flow of the determination of returnable
sum according to the first embodiment.
[0124] In Fig. 5, before or during the step of determining the returnable sum (step S16),
the control apparatus 10 acquires a return upper threshold for the returnable sum
based on the credibility data including a credibility score CS (step S41).
[0125] Fig. 6 is a flow diagram showing the flow of the determination of return upper threshold
according to the first embodiment.
[0126] As shown in Fig. 6, the control apparatus 10 determines a return upper threshold
RTH for the returnable sum based on the credibility score CS included in the credibility
data.
[0127] Specifically, in Fig. 6, the control apparatus 10 determines whether the credibility
score CS is less than a first credibility score threshold CSTH1 (for example, 600)
(step S411). If the credibility score CS is less than the first credibility score
threshold CSTH1 (step S411: Yes), the control apparatus 10 determines the return upper
threshold RTH to be a first return upper threshold RTH1 (for example, EUR 100) (step
S413). If the credibility score CS is not less than the first credibility score threshold
CSTH1 (step S411: No), the control apparatus 10 determines whether the credibility
score CS is lower than a second credibility score threshold CSTH2 (for example, 660)
which is greater than the first credibility score threshold CSTH1 (step S411). If
the credibility score CS is less than the second credibility score threshold CSTH2
(step S412: Yes), the control apparatus 10 determines the return upper threshold RTH
to be a second return upper threshold RTH2 (for example, EUR 500) which is greater
than first return upper threshold RTH1 (step S414). If the credibility score CS is
not less than the second credibility score threshold CSTH2 (step S412: No), the control
apparatus 10 determines the return upper threshold RTH to be a third return upper
threshold value RTH3 (for example, EUR 1000) which is greater than first return upper
threshold RTH1 (step S415).
[0128] That is, in the present embodiment, when the credibility score CS is less than the
first credibility score threshold CSTH1 (CS < CSTH1 (for example, 600), i.e., the
case that the credibility of the user is "Very poor" or "Poor"), the return upper
threshold RTH is determined, in particular set to be the first return upper threshold
RTH1 (RTH = RTH1 (for example EUR 100)); when the credibility score CS is not less
than the first credibility score threshold CSTH1 and less than the second credibility
score threshold CSTH2 (CSTH1 (for example, 600) ≤ CS < CSTH2 (for example, 660), i.e.,
the credibility of the user is "Fair"), the return upper threshold RTH is determined,
in particular set to be the second return upper threshold RTH2 (RTH = RTH2 (for example,
EUR 500)); and when the credibility score CS is not less than the second credibility
score threshold CSTH2 (CSTH2 (for example, 660) ≤ CS, i.e. the case that the credibility
of the user is "Good" or "Very good"), the return upper threshold RTH is determined,
in particular set to be the third return upper threshold RTH3 (RTH = RTH3 (for example
EUR 1000)).
[0129] In Fig. 5, the control apparatus 10 determines whether the suspected sum is greater
than the return upper threshold RTH determined in the step S41 (including the steps
S411 to S415 in Fig. 6) (step S42). If the suspected sum is greater than the return
upper threshold RTH (step S42: Yes), the returnable sum is determined to be a sum
equivalent to the return upper threshold RTH (step S43). If the suspected sum is not
greater than the return upper threshold RTH (step S42: No), the returnable sum is
determined to be a sum equivalent to the suspected sum.
[0130] That is, in the present embodiment, the return upper threshold RTH is determined
according to the credibility of the user as the maximum limit of the returnable sum,
the returnable sum does not exceed the return upper threshold RTH.
[0131] According to the control method of the first embodiment as explained above, only
genuine cash objects are returned but not any counterfeit cash objects (or suspected
cash objects). Thus, it is possible to remove counterfeit cash objects from circulation.
[0132] Furthermore, the control method can control the set of returned genuine cash objects
in dependence on the credibility data via the determined discharge sum.
<Second Embodiment>
[0133] With reference to Fig. 7, the control method according to a second embodiment is
explained. Fig. 7 is a flow diagram showing the flow of the determination of returnable
sum according to a second embodiment.
[0134] The control method of the second embodiment is different from those of the first
embodiment in that the returnable sum is determined based on suspiciousness level
data in addition to the suspected sum data and the credibility data. The other steps
of the second embodiment are the same as those of the first embodiments shown in Fig.
4.
[0135] In Fig. 7, before or during the step of determining the returnable sum (Fig. 4, step
S16), the control apparatus 10 acquires suspiciousness level data from the cash processing
apparatus 2. The suspiciousness level data are data describing for the respective
ones of the suspected cash objects a level of risk of being a counterfeit cash object.
The suspiciousness level data are determined based on measurements of the received
cash objects by the cash processing apparatus 2. Specifically, the suspiciousness
level data includes data on the result of the classification of the cash objects determined
as the potential counterfeit cash objects by the recognition unit 240 of the cash
processing apparatus 2.
[0136] Next, the control apparatus 10 determines whether the credibility score CS is less
than the first credibility score threshold CSTH1 (for example, 600) (step S52). If
the credibility score CS is less than the first credibility score threshold CSTH1
(step S52: Yes), the control apparatus 10 determines the returnable sum to be zero
(step S54). If the credibility score CS is not less than the first credibility score
threshold CSTH1 (step S52: No), the control apparatus 10 determines whether the credibility
score CS is less than the second credibility score threshold CSTH2 (for example, 660)
(step S53). If the credibility score CS is less than the second credibility score
threshold CSTH2 (step S53: Yes), the control apparatus 10 determines the returnable
sum to include a sum of the suspected cash objects belonging to the low-suspiciousness
category "Cat. 3" and not to include a sum of the suspected cash objects belonging
to the high-suspiciousness category "Cat. 2". If the credibility score CS is not less
than the second credibility score threshold CSTH2 (step S53: No), the control apparatus
10 determines the returnable sum to include a sum of the suspected cash objects of
the low-suspiciousness category "Cat. 3" and the high-suspiciousness category "Cat.
2" (step S56).
[0137] That is, in the present embodiment, when the credibility score CS is less than the
first credibility score threshold CSTH1 (CS < CSTH1 (for example, 600), i.e., the
case that the credibility of the user is "Very poor" or "Poor"), the returnable sum
is determined to be zero (the returnable sum = 0); when the credibility score CS is
not less than the first credibility score threshold CSTH1 and less than the second
credibility score threshold CSTH2 (CSTH1 (for example, 600) ≤ CS < CSTH2 (for example,
660), i.e., the credibility of the user is "Fair"), the returnable sum is determined
to be the sum of the suspected cash objects belonging to the low-suspiciousness category
"Cat. 3" (the returnable sum = the sum of the category "Cat. 3"); and when the credibility
score CS is not less than the second credibility score threshold CSTH2 (CSTH2 (for
example, 660) ≤ CS, i.e., the case that the credibility of the user is "Good" or "Very
good"), the returnable sum is determined to be the sum of the suspected cash objects
of the low-suspiciousness category "Cat. 3" and the high-suspiciousness category "Cat.
2" (the returnable sum = the sum of the categories "Cat. 3" and "Cat. 2").
[0138] According to the control method of the second embodiment as explained above, only
genuine cash objects are returned but not any counterfeit cash objects (or suspected
cash objects). Thus, it is possible to remove counterfeit cash objects from circulation.
[0139] Furthermore, the control method can control the set of returned genuine cash objects
in dependence on the credibility data via the determined discharge sum.
<Third Embodiment>
[0140] With reference to Fig. 8, the cash processing system according to a third embodiment
is explained. Fig. 8 is a schematic diagram of the cash processing system according
to a third embodiment.
[0141] The cash processing system of the third embodiment is different from that of the
first embodiment in that the control apparatus 10 and a cash resister 500 including
the operation unit 11 and the display unit 12 are separately provided, while in the
first embodiment the control apparatus 10 has functions of the POS register.
[0142] In the present embodiment, the control apparatus 10 is connected communicably to
the cash processing apparatus 2 via a network such as a LAN and may be installed,
for example, in the backyard of the shop. The cash register 500 can be installed next
to the cash processing apparatus 2 in the shop.
1. A control method for controlling a cash processing apparatus (2), comprising steps
of:
acquiring suspected sum data from the cash processing apparatus (2) (S11), the suspected
sum data describing a sum of denomination values of cash objects determined to be
potential counterfeit cash objects by the cash processing apparatus (2), the cash
objects having been received, by the cash processing apparatus (2), from a user for
performing a cash depositing transaction, wherein
those of the received cash objects which are determined to be potential counterfeit
cash objects are referred to as suspected cash objects and the sum of denomination
values of the suspected cash objects is referred to as suspected sum;
acquiring user identifying data about the user from a user information input apparatus
(20) (S12);
sending the acquired user identifying data and a request for requesting credibility
data associated with the user identifying data to a remote server (S13);
acquiring the requested credibility data from the remote server (S14), the credibility
data having been determined by the remote server based on the sent user identifying
data;
determining a returnable sum to be returned with genuine cash objects to the user
in exchange for the received potential counterfeit cash objects, the determination
of the returnable sum being performed based on the suspected sum data and the credibility
data (S16);
determining, based on the returnable sum, a discharge sum describing a sum of denomination
values of genuine cash objects to be discharged (S17); and
determining control data to be sent to the cash processing apparatus (2) (S18), the
control data being constituted to cause the cash processing apparatus (2) to discharge
genuine cash objects, the sum of their denomination values being equal to the discharge
sum.
2. The control method according to claim 1, wherein those of the received cash objects
determined to be genuine cash objects by the cash processing apparatus (2) are referred
to as trustworthy cash objects and the sum of denomination values of the trustworthy
cash objects is referred to as trustworthy sum;
a) if the cash depositing transaction is part of an account depositing transaction,
then the determination of the control data is performed if cancellation data are acquired
from the cash processing apparatus before the depositing transaction is completed,
the cancellation data describing a request for cancellation of the cash deposit transaction,
wherein, if the transaction is cancelled, then
• the account depositing transaction is continued only with the trustworthy sum, and
the discharge sum is determined to be equivalent to the returnable sum; or
• the account depositing transaction is not continued, and the discharge sum is determined
to be equivalent to the trustworthy sum plus the returnable sum;
b) if the cash depositing transaction is part of a money exchange transaction, then
the determination of the discharge sum is further based on the trustworthy sum; or
c) if the cash depositing transaction is part of a POS cash transaction, then the
determination of the discharge sum is further based on the trustworthy sum and a purchase
sum.
3. The control method according to claim 1 or 2, wherein those of the received cash objects
determined to be genuine cash objects by the cash processing apparatus (2) are referred
to as trustworthy cash objects and the sum of denomination values of the trustworthy
cash objects is referred to as trustworthy sum;
wherein, in the step of determining of the returnable sum,
the returnable sum is determined further based on the trustworthy sum.
4. The control method according to any one of the preceding claims, further comprising
a step of
acquiring a return upper threshold for the returnable sum based on the credibility
data (S41), wherein in the step of determining the returnable sum,
if the suspected sum is greater than the return upper threshold, the returnable sum
is determined to be a sum equivalent to the return upper threshold (S43), and
if the suspected sum is equal to or less than the return upper threshold, the returnable
sum is determined to be a sum equivalent to the suspected sum (S44).
5. The control method according to any one of the preceding claims, wherein
the control method further comprises a step of
acquiring suspiciousness level data from the cash processing apparatus (2) (S51),
the suspiciousness level data describing for the respective ones of the suspected
cash objects a level of risk of being a counterfeit cash object, the suspiciousness
level data having been determined based on measurements of the received cash objects
by the cash processing apparatus (2), wherein
in the step of determining of the returnable sum,
the returnable sum is determined further based on the acquired suspiciousness level
data.
6. The control method according to claim 5, wherein
the credibility data includes a credibility score indicating a degree of credibility
of the user,
in the step of determining of the returnable sum,
the returnable sum is determined based on the acquired suspiciousness level data so
that
if the credibility score is lower than a first credibility score threshold, the returnable
sum is determined to be zero (S54),
if the credibility score is equal to or greater than the first credibility score threshold
and less than a second credibility score threshold, the returnable sum is determined
to include a sum of the suspected cash objects belonging to a first level category
having a first level of suspiciousness and not to include a sum of the suspected cash
objects belonging to a second level category having a second level of suspiciousness
higher than the first level of suspiciousness (S55),
if the credibility score is equal to or greater than the second credibility score
threshold, the returnable sum is determined to include the sum of the suspected cash
objects of the first and second level categories (S56).
7. The control method according to any one of the preceding claims, wherein
the control method further comprises a step of
prompting, by the cash processing apparatus (2), the user to cancel the transaction
in case that the received cash objects include the suspected cash objects; and/or
prompting the user to input user identifying data; and/or
indicating to the user at least one of the received sum, the suspected sum or the
trustworthy sum.
8. The control method according to any one of the preceding claims, wherein those of
the received cash objects determined to be genuine cash objects by the cash processing
apparatus (2) are referred to as trustworthy cash objects and the sum of denomination
values of the trustworthy cash objects is referred to as trustworthy sum; and
the control method further comprises a step of receiving selection data from the cash
processing apparatus (2), the selection data describing whether the user selects a
full cancellation or an only suspected sum cancellation of the cash depositing transaction,
wherein
in case that the full cancellation is selected, the control data are determined to
be constituted to cause the cash processing apparatus (2) to discharge genuine cash
objects, the sum of their denomination values being equivalent to a total sum of the
returnable sum and the trustworthy sum,
in case that the only suspected sum cancellation is selected, the control data are
determined to be constituted to cause the cash processing apparatus (2) to discharge
genuine cash objects, the sum of their denomination values being equivalent to the
returnable sum.
9. The control method according to any one of the preceding claims, further comprising
a step of
storing the suspected sum data and the user identifying data in association with each
other.
10. The control method according to any one of the preceding claims, further comprising
a step of
if the transaction is not cancelled, then performing an account depositing transaction
to deposit the determined returnable sum to an account of the user.
11. The control method according to any one of the preceding claims, wherein those of
the received cash objects determined to be genuine cash objects by the cash processing
apparatus (2) are referred to as trustworthy cash objects and the sum of denomination
values of the trustworthy cash objects is referred to as trustworthy sum;
wherein, if the transaction is not cancelled, then
• an account depositing transaction is performed with only with the trustworthy sum
by sending trustworthy sum data describing the trustworthy sum to an account computer
controlling an account associated with the user identifying data; or
• acquiring received sum data from the cash processing apparatus (2), the received
sum data describing a sum of denomination values of cash objects received by the cash
processing apparatus (2), sending the received sum data to the account computer associated
with the user identifying data for completing the account depositing transaction,
and sending the suspected sum data to the account computer for enabling the account
computer to correct a sum to be deposited by subtracting the suspected sum from the
received sum.
12. A computer program comprising instructions which, when the program is executed by
a computer, cause the computer to carry out the method according to any one of the
preceding claims;
and/or a computer-readable storage medium on which the program is stored;
and/or a data carrier signal carrying the program;
and/or a data stream comprising the program.
13. A control apparatus for controlling a cash processing apparatus, the control apparatus
comprising a computer on which the computer program according to claim 12 is running
or into the memory of which the program is loaded, the computer being constituted
to acquire the suspected sum data from the cash processing apparatus (2);
to acquire the user identifying data from the user information input apparatus (20);
to send the acquired user identifying data and the request for requesting credibility
data;
to acquire the requested credibility data from the remote server; and,
to send the control data to the cash processing apparatus (2).
14. A cash processing system (1) comprising
the control apparatus of claim 13,
the cash processing apparatus (2) and/or
the user information input apparatus (20).