GB2397800A - Card security system - Google Patents

Card security system Download PDF

Info

Publication number
GB2397800A
GB2397800A GB0230105A GB0230105A GB2397800A GB 2397800 A GB2397800 A GB 2397800A GB 0230105 A GB0230105 A GB 0230105A GB 0230105 A GB0230105 A GB 0230105A GB 2397800 A GB2397800 A GB 2397800A
Authority
GB
United Kingdom
Prior art keywords
card
transaction
data
code
financial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0230105A
Other versions
GB0230105D0 (en
GB2397800B (en
Inventor
Richard Gerald Enston
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0200040A external-priority patent/GB2372961B/en
Application filed by Individual filed Critical Individual
Publication of GB0230105D0 publication Critical patent/GB0230105D0/en
Publication of GB2397800A publication Critical patent/GB2397800A/en
Application granted granted Critical
Publication of GB2397800B publication Critical patent/GB2397800B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A security system for preventing cloning of cards includes a card - 1 with an encoded data storage medium, such as a magnetic strip synthesising code issue response from data base, and means for validating the card user. The validating means may include comparing the user's written questionnaire responses for code stored information, a signature scanner (17), and/or a photograph of the user. The users signature and questionnaire responses may be recorded on a paper receipt roll (26), which may include masked portions on an upper layer which conceal information on a lower layer. The data storage medium may include hybrid magnetic, laser, infrared, opto-electronic and/or holographic encoding. The system responds with financial transaction data base for receipting financial goods and service transactions, example provision mobile phone contractual service operation.

Description

AUTOMATED TRANSMISSION MACHINE CARD SECURITY SYSTEM
TECHNICAL FIELD
This card system development concerns a protected automated transmission machine card system for installation as an application for use as a clearing bank credit / debit card ( SWIPE / CHARGE / TOP-UP) security code issue; particular aspects of which are based on increased security composite to fraud pre vention anti card cloning measures, in card driven transactions.
BACKGROUND ART:
There is negligible background art in the precision codes articulated by this particular system; however, with a retro spective technical view; Much advanced technology is employed in the design and manufacture of automated teller machine cards and 'swipetcards, and the fast efficient assembly thereof, with the preferred elimination of quality control mistakes even on fraudulently cloned cards, in a clear attempt to procure and ensure high standards, for their respective functional tran sactions (financial). Criminal fraud generated by ATM (automated teller machine) general swipe card misuse, represent considerable financial loss and hazard; leading to, if not immediately apparent, successive criminal fraud. Prior - art development and designs deliberate on precautionary measures for ample security, related to systems on the main, rely solely through the incorporation of silicon integrated circuit chips, operating in unit construction sing Clarity, susceptible and often vulnerable to cloning, and reprogramming. The technical opportunity to perform this criminal act, is basically indefensible, as when the criminal fraternity acquisition a stolen card and gain access to the financial / transactional institution data base on- line.
Initial y, the prior - art of the past, does not have an automated alert system recognizing a cloned card, for cashier during financial transaction; where-in red light indicator comes on audibly / visually in this system. Further, there is no prior - art form automation of this feature, composite also as a complete system development.
This development for a multi-function ATM-Card data trans action receipt system optimizes its versatility; to sustain a complete financial transaction, principly with or without an automated teller machine. The fine art - form here-in disclosed, is the articulate unique method, with which the receipt of data is written / impressed down, in full legal fashion, and with which it is accepted, beyond the paint of any sustainable legal ranker;- initiated by a customer.
The unique cross feeding of feedback results, and cross comparison of coded information, and incorporation of optical electronic chips, and marked infra-red encoding, is part of this development. The design of the dual filament receipt, to be purposely torn by cashier;- in precise manner is the subject of this development -( CODED verification receipt issue).
SUMMARY OF TEE DISCLOSURE
The objectives of the present development;- is the clear legibility in legalistic fashion, to put together a secure credit card transaction; where-in principly, once the potential customer has yielded a legible answer, to a brought up validation character question, the impressed written legible answer, whether correct or incorrect, can not be argued, retracted, potentially in front of pcdice or retail executive. On the main, the validation questions will verify for example, date of birth, post code, age, colour, 6G nationality, etc; and personal identification or card code number.
For fast processing of transactions, the actual cclour video picture of bona fide card holder will automatically come up on screen; setting aside a percentage of transactions literally with a view to fast clearing, at the cashiers' legal discretion.
Further objectives of the development, are thus set to provide a highly efficient technique in the production technology, aspect of the ATM-Card, where-in part - component of the laser fabrication thereof is difficult to alter; inhibiting any further security code reprogram ming post origin, of its laser plastic and silicon component structure / fabrication incorporating crimping codes; the entire development of which, enables the ATM-Card to be versatile in a ml-function parameter, predominantly secure in practical use. ( Procuring an assurity of receipting a bona - fide correct non - fraud',lnt financial transaction) . According to the present development, there is provided a complete mono-formed pressed and extruded product; from an ideal material such as silicon reinforced nylon, or if transperancy is required - perspex - ( clear cast acrylic), combination for example;- appertaining a centre hale, bearing a concave inner groove, in reciprocal fabrication; accepting the insertion of a centre disc, bearing the bona - fide recipient cardhcider's calour photograph, Facial Image) ; offs xed clip pressed and plastic weld stiched.
For automated teller machine use, the card structure contains silicon integ rated circuit chips, with origin trip mechanism, and optical electronic chip, with the bona fide cardholders calour facts photograph encoded there-on.
In the hybrid development, the laser lineation encoded swipe line will proffer a final re-copy of personal image in a versatile development of crosschecking for fraud.
Subject to plastic extrusion production technolog y, it should be made clear that enhanced plastic injection manufacturing; wit procure moulding and extrusion techniques, there-by providing a predominantly seamless mono-formed ( unitpart) construction.
As a consumer / customer practical supply point of view, there is often a delay, in the procuration of the bona fide card holders photograph, but with this design, the later supplied picture disc can be press inserted into position, as it has a one way click fabrication technique, and thus cannot be removed without shattering the structure: - ( distortional decay) . On a multi-function parameter, a transcribed colour image can be electronically programmed in different forms, on integ rated circuit chip; then secondly onto opto-electronic chip, and thirdly electronically encoded onto laser lineation hybrid swipe strip in versatility. AN three images are thus available for cross comparison and can be compared against each other by cashier; for a fast initial assessment, as to the validation character, authenticity of bona-fide card holder.
Executive, at this critical point of financial transaction verification, an electronic signature comparison is taken; against actual customer signature, on back of receipt, through the pressure of pen, where-in the card holders signature is ascertained for an: ( example only approx - bias set at 9896) ;- validation characteristic at cashier counter.
The ratio of positive or negative counter - productive data comparisons; is cross fed against assimilated information; and combined to produce warning, - red light signal on receipt teller; ( Red light flashes indicating alert), procuring a paint - blank refusal, of transaction by cashier, and at discretion; the opportunity to ask for written answers, to information feedback questions.
Thus to this executive point in design, the art form development, particularly that which can be construed by the primary card, retains a degree of functionability, before the rest of this electronic mail system, is called upon for proof of final validation character, of bona-fide card harder. (i.e., Versatile parameter) . Importantly, an INFRARED HOLOGRAM invisible to naked eye, for example;- an infrared marked signature of card holders written, bona-fide signature, is opto- electronicaly compared.
Further, digits of the card serial number are marked, in INFRARED code; digitally structured with its' issue date; thereby producing a coded time scale trip code; - procuring generative origin trip close-down of chips on cards, and automated strike-down, on information release from financial institution data base: - ( Fore-closure of information availability. ) . It must be stressed that the art form in this technical development is principly pushed forward on electronic mail, the use thereof, and extent to which it can be guarded against, and its delivery system in a secure fashion:- ( Principly cipher coded electronic mail) . On the simple card structure, the fabrication build thus can be marginalised, (fabrication made simple) where-in the manufacturing process procures an instrumental degeneration, in the structured quality, and financial effort assimilated as a cost factor; primarily when for example, the structure of card is plain composite, but utilises electronic data -( mail), specifically encoded, to simply gain validation characteristics of bona - fide card holder.
The electronic ( mail)-data fully encoded validation characteristics, and the specific way with which the answers are taken, and deliberately sketched, represent the fraud proof art form to a significant extent in this development.
Thus in conglomeration, there are provided a m',ltiplicity of counter check feedback lines,itemised and transaction identity codes in coalition synthesis to substantiate transaction proof security in a clearly legal, legible unalterable fashion.
There is a definite, non technical requirement to subtlety, when dealing financial transactions with the general public;- as the human 'aspect' requires an easy flow of human activity to accord, with these financial transactions. Thus, the structured design of the paperwork is unique in this development to accord with the subtlety requisite; clearly, the procuration of the paperwork within the time frame, of the transaction; succinct in portfolio apparition.
BRIEF DESCRIPTION OF THE INFORMAL DRAWINGS:
A total embodiment of this substantiative automatic transmission code card system is here-in described with purely illustrative measurements and components for example purposes only; with reference to the accompanying drawing sheets in which: FIGURE 1/7; Illustrates a cross sectional view of a complete card traversing in its 'manual hand swipe', through a laser / magnetic teller machine reader / decoder figuratively numerated in accordance with the development.
FIGURE 2/7; Illustrates a side angled elevated view of card, with centre disc elevated above vacated centre hole, and appendage fabrications including opto-electronic chip, hybrid magnetic and laser lineation lines; figuratively numerated in accordance with the development.
FIGURE 3/7; illustrates a side angled elevated view of optical picture disc (or tertiary fingerprint) and horizontal cross sectional plan view of aforesaid disc; figuratively numerated in accordance with development.
FIGURE 4/7; Illustrates a top plan side angled elevation of procuration data /receipt printer in this development and electronic signature scanner between the two rollers; figuratively numerated in accordance with the development.
FIGURE 5/7; Illustrates a sketched top plan view of dual function procuration data/questionnaire receipt, bearing top darkened mask left hand filament, initial y covering data answers; figuratively numerated in accordance with the development.
FIGURE 6/7; Illustrates semi-articulated flow diagram of SWIPE card, in arrow direction being 'swiped' through lineation scanner; procuring automatic transmission of codes to and from data base, in arrow direction procuring operation of receipt printer; figuratively numerated in accordance with the development.
FIGURE 7/7; Illustrates side angled elevation of cash register development enveloping an 'all-in-one', colour video monitor, service item: ( Mobile Phone) assembling a complete initial function of automated Card security system linking straight through to auto teller receipt/ questionnaire printer (bearing signature scanner); 205 figuratively numerated in accordance with the development.
206 DETAILED DESCRIPTION OF THE TOTAL EMBODIMENT:
Referring to the drawings illustrated with text: 1, depicts an exterior card carcass, fabricated with plastic and requisite silicon layering, patterning pre-formatted 210 for encoding. The potential there-in for initially; electronic programming of silicon integrated circuit chip, further programming of ( Optical) opto-electronic chip, further programming of conventional magnetic strip, further cross programming of hybrid cross-combined magnetic and laser 215 lineation strip, and further encoding of crimped numerics, and infra red bar code or hologram onto card. Principly, the main validation characteristics will usually be card holders SIGNATURE; laid out in analogue lattice pattern or mobile phone hash key signal.In operation therefore, any numerical coded 220 feed-back results are available, to be transmitted in the equa tion of the validation character of card and recipient card hider, ( Infra Red DATA & Numerical body DATA) . Figure 2, depicts retrofit vacated fabrication cavities, for implants of chips and holographic encoded pictures, with 225 technique in press crimping fabrication, affixation for each unique design and individual customers requisite requirements.
Figure 3, depicts laser encoded 'hand swipe' card encoded information data line; hybrid in this particular art form, cross combined on fabrication integral with magnetic strip.
230 In operation therefore, the programming is difficult to tamper with, representing a dual configuration characteristic form, there representing capability to auto-feed trip in electronic programming in any other part of system.-( Feedback results).
Once all the above is co-ordinated and cross fed against 235 electronic data re-supplied from automated data base (through Electronic-Mail security encoded telephone network), the entire system is predominantly fraud proof. The cipher code with electronic attenuation in operation therefore signals;- producing description of fraud upon the over 240 charge by one or more number, negative or positive; standard coding or non standard.- ( DOS software technolog y) . Figure 4, depicts conventional magnetic strip encoding of card, sufficient enough in its conventional magnetic capacity to frequent / initiate request from financial database; 245 to initially set down one, of seven preferred questions; the more common of which for example is - post code ? ; leading on to the point of masked receipt request, to write the answer down on to receipt teller receipt. The receipt is thus torn apart by cashier, revealing correct answer 250 origin from database, electronically printed on underside.
On a pro-logic operational basis, logically, should the top sheet, hand scrolled - written answer be wrong, logically the cashier refuses transaction, in view of fraud.
In operation therefore; the financial transaction database is 255 distanced from computerized cash register / shop or bank; where in the branch is relieved and encodes a security coded location number;per financial transaction. Retrospectively, this location coding is never made available on card. The compilation logistic codes of the entire system thus fabricate a secure operation.
260 Figure 5, depicts conventional logo markings of relevant financial institution from which financial transactions may transpire and the logo can be over printed with infra red fingerprint lattice encoded pattern or security data bar code.
The lattice pattern, digital imprint or non digital 265 analogue hologram, can only be read / decoded by infra red scan, therefore remaining invisible to naked eye.
Figure 6, depicts optical laser light source beams and infrared optical pick-up intersecting / retrieving laser data encoded hybrid memory lineation, on card, and infrared 270 attenuation of infrared encoding.- ( multiple apparatus) Figure 7, depicts hybrid magnetic and laser lineation strip data decoder / reader, part of transaction teller equipment.
In operation therefore, as the 'SWIPE' card (1) is manually held within one's' index finger thumb,it is swiped latterally through 275 (7) magnetic / laser strip data decoder / reader. The automated transmission thus signals automated activity of telecommunications data base and mobile phone coded hash signal can combine to form a 'LOCKED' numerical security code; baring any further fraudulent pro-clone access to the cam puterised legislator data base.
280 This validation character may take the form of pure coded mathematic numerals interlocurtory from denomination of mobile phone swipe top up' card or a question, to appropriately hand scroll a legible answer on receipt roll, and in context procure a secure receipt issue.
As the card is fabricated with (4)-magnetic swipe strip, it 285 serves for conventional usage for the reason set forth; due to financial cost, and retail infra structure inertia, by many business owners: primary of multi function capability within conglomerate frame of artwork.
As opposed to primary, the mui-function use capability within 290 the entire framework of development, is conventional hand teller pressing of the card; methodically carbon camping letter proud plastic surface lettering or numerics of card. The conventional method becomes requisite to security scrutiny, where-in the cashier has to call up main finanri1 institution data base on-]ine.
295 In operation therefore and thus within a period of a few seconds, facilitated by a customers mobile phone security swipe card and telecommunications hash signal to data base; the computerized cash register will clear the positive transaction on feed-back code or a validation character question is purposed to prospective customer, 300 for cashier to witness answer - hand scrolled, written down on to receipt appendage invoice; where at cashier compares question with appropriate answers; and henceforth transaction is granted or refused.
The second function, which can be described as application per con vention, with-in the entire framework of this development, is stand 305 ard finanri1 institution AUTOMATED TELLER MACHINE use, where-in the card is entered conventionally, a personal identification number ( PIN) ,is selected, Thus ( par) operation granted ( in function) . In this art form development, the design of the 'ON - LINE' soft ware is cipher coded to prevent any cloning active objectives.
310 Further, customer has to re-enter nonfigurative answer on to automated teller machine keypad. The 'LOCK OUT'- art form neccessitates the observation that ANY of the answers are _ available on credit card itself, in cipher code.
Further the data base storing the answers will always 315 be (at a geographical range), more than several yards distant.- ( Procuring release of auto - teller station number) . A mobile phone second card designated numerical hash signal can be keyed with auto teller machine card to facillitate a secure 'compilation' synthesis code to secure a transaction.
320 In the track down of attempted fraud; the art form in this development appropriates hypothesis compilation codes, the subject of pure and applied mathematics in digital sequencing security encoding, initially a primary code illustrating definite geographical location and branch identity of automated 325 tranmission apparatus and numerical card identification code.
Primarilly, the geographical branch MUST be security code numbered, In conjunction, the data supply is security coded. This system then should yield one hundred per cent -(100%) bona - fide card holder security and block on-]ine access to cloning.
330 Figure 2/7: Illustrates a side angled elevated view of (1) unit card carcass with (8) centre disc rising above vacated disc emplacement; (2) cavity hoe in perspective position to accomodate (1) and (8) arrow pressed together - combining in fabrication. Figure (5) 335 indicates infra-red lattice programming, analogue / digital.
This development predominantly encoding bona-fide card holders signature pattern.- ( Digital data BODY numerical sequence code and fingerprint numerical data sequence); In operation therefore the written receipted signature, 340 or electronically retrievable, nu merical pattern of prospective purchaser is pro-logic statistically compared to sequence of electronical data, read against the (5)infrared encoded data.
Figures (14 and 15) illustrate combination of electronic and optoelectronic micro-chips which in this development 345 which procure in operation for auto-trip / post origin electronic computerized mechanism.
Figure 3/7: Illustrates a side angled elevated view of (8) Optical picture disc with light (10) passing - (arrow) passing there through illustrating genuine bona fide colour 350 picture of true card holder. The appendage lugs (9) firm to crimp disc into unit part card carcass.
In operation therefore, the colour picture of genuine bona fide cardholder is stored there in, and thus set for comparison by cashier of transaction, and can be superimposed 355 onto calour monitor screen, of checkout register. - ( Versatile parameter at cashiers discretion for fast transactions).
Fig ure 4/7: Illustrates a top plan side angled elevation of (l9)-validity procuration data / questionnaire receipt-teller in this development, and (17)electronic signature scanner built 360 in between the two (18) conveyor rulers; mounted in (28) chassis.
Mains power is supplied by plug (11); where-in plug (12) locks into chassis- ( 28) connecting ( 27) -transmission data lines for incremental pro-data operation of (l9)-receipt teller.
365 24 indicates point of serration, both points depicted on (19) spread surface and on twin pc,int of (26) receipt itself.
This (19) mechanism can stand by itself or be built into the hull chassis of (33)-combination till. A red alert neon light (36) is fitted to chassis adjacent signature scanner.
370 The construction is composite acrylic plastic, fabricated with metric machine thread chromium steel screws - standard production technology assimilation, alloy chassis, tuffnalt integrated circuit boards, rubber feet: - standard uniform production technology fabrication. Wiring copper braid and 375 machine stamped / soldered integrated circuits; Uniform standard, - UNIFORM PRODUCTION TECHNOLOGY application in specific art form development.
In operation therefore, this hybrid (l9)-receipt teller, is set adjacent cashier, for usage and operation during 380 financial card generated transactions. As part of the system operation the cashier is instructed to present dual filament receipt-(26) prepared / formated by receipt teller for customer to initially sign on receipt -(26) placed on (17)-electronic signature scanner for computer 385 comparison, in (33) till to evaluate; at an example preferential bias, of ninety per cent accuracy, as set against bona fide signature, both with data held on (l)-card, and again held at main (30)-financial institution data base. The (19) -receipt teller is digital operated 390 system ( DOS) - system cipher code cam municated with, and is electrically charged and rolled, on computer data logic circuitry; through (27) data transmission line, via-(11 & 12) electrical control / source and interconnection plugs, via standard computer interconnection cable (27). Should the 395 preset bias ratio NOT be achieved at (30)-database, and (33) till computer: - on the scan of the customers hand written signature, the red (36) alert light will flash as of logic control. In which event two computer driven logic functions, at (30)-database and (33)-till: 400 a series of electronic mail questions will be printed by ( l9)- receipt taller for customer to complete on right hand column of receipt / questionnaire -(26). Should all questions be answered correctly, at the cashiers disc retion, the financial transaction win be allowed to pass.
405 Figure 5/7; Illustrates a top plan view of dual function ( variable parameter) - (26) procuration data / questionnaire receipt - (in specific development art-form) to fit receipt-teller -(19); bearing (24)-serration edge profiling; profile machine coded set in aspect with 410 (16)-division mark. The (30)- database question and answers, are drafted down the underlying left hand column; with example annotation ( 20/1 and 21/1). The right hand (26/2) spread sheet column, is printed vacant for customer to write answers to; the questions and vacant space procurated for 415 visual example (20/2 - 21/2 - 22/2 - 23/2), in logic format.
Written answer vacany appendage zone is denoted - (29). A black darkened (13) - mask sheet is machine torsion held over (26 / 1) left hand column in prevention of observation view; potential customer witnessing machine encoded answers, whilst 420 customer is obliged to complete cipher coded computer generated questionnaire. Figure (25) indicates proximation of rollers.
In operation therefore, this development art-form of rail paper-(26), has been specially adapted to accept through put of pressure of pen on to (17) signature scanner, and in 425 every potential transaction retrieves a legible comparison both for cashier and in legal context; where-in the counter foil proof can NOT be retracted by customer. Once the questions and answers have been purposed, and the written acknowledgement given, the carbon filament paper is torn 430 by cashier at serration edges (24). The cashier evaluates a legible comparison on the underscore sheet ( 26/2), for verdict. Thus the operation is complete.
Figure 6/7; Illustrates semi-articulated flow diagram of SWIPE Card-(l), in arrow direction being swiped through (7)-]ineation 435 scanner; with pulse-(6) picking up automatic transmission codes feeding to security transaction data base attenuating information encoding on card; cash register automatically signalling branch identity codes; procuring deliberation of geographical location, through exacting compilation codes of mobile phone numerical hash 440 key appendage signal in sequence driving auto - telecommunication transmission fabricating an 'ON-LINE' data access compilation lock code preventing access to fraud cloning of card charge to main security transaction data base. Designate (40)-Mobile Phone.
In general retail transactions, the automated transmission card 445 is (7)-hand swiped at computerized cash register, transmitting immediately through to (30)-main security financial institution database in compilation / cipher code. Data transmission -(27) (computerized telecommunications linkage) then accords with (30) data logic feed back results procuring portfolio stance and 450 determination requirements at (19)- receipt trier operation In operation therefore, cashier fallows obligation of requesting written information from prospective customer and in the event of a projected large financial trans action, procures twin cross co-ordination from all system; 455 a cross combined effort of equipment listed in both Figure 6/7 and 7/7; cashier deliberating amount of data to evaluate. In operation, all question and answers would have to equal for transaction to proceed. In essence, (30) database is brought into full function for performance 460 parameter. - ( EFFICIENCY BALANCE OF FLOATING CODES).
Fig ure 7/7; Illustrates side angled elevation of art form (33) development cash register, incorporating integral colour (31) monitor and on board computer, with FLOATING CODE parameter soft ware operationally loaded, with full stage (34)-key board, and (1) 465 mobile phone hash key pad linked signal to main (30) database; by (27) -telecommunications data transmission line: (OPERATIONAL PRINTER INTEGRALconstruction to chassis hull of (33)-register; (in art form development). For clarification (40)-Mobile Phone.
Drawing illustrates non integral version where an individual 470 fig Ore (19) -receipt-teller is set adjacent cash register. A Figure 27-transmission line thus inter-connects in drawing.
The construction is based on uniform & universal production technology; where in the outer cover is com posite acrylic plastic, fabricated with metric machine thread 475 chromium steel screws, pressure location washers and clip pressings, - standard production technolog y. Wiring and circuitry copper braid and soldered connections, machine pressed and punched integrated tuffaalt circuit boards - uniform standard. In this development, (36)- red alert light may be brought up 480 on ( 31)
-ccdour monitor screen along with cam puter software directions generated on screen reminding cashier of procedure on card security system. An illuminated (32) cash amount register/screen faces forward to customers. Production technolog y standard ( DOS) digital operating system soft ware.
485 Electronic key, key dig;1 - Cash draw is denoted ( 35) . In operation therefore, the refinement of the total system can be brought to hand by cashier with every operational facillity at the touch of the ( 34) keypad, ( the cashier being skilled at standard keyboard operators 490 level), excepting the serration of (26)-receipt, and this can be automatically serrated at (24), except it it neccessary for cashier to check receipt appendage ( 24) carefully in view of security.
As a (l)-mobile phone top up 'SWIPE' card application, the auto 495 matic transmission signal to the main (30)-data base is brought in to operation exactly as mentioned previously concurrent with the 'manual hand swipe' of the (l)-automated transmission card upon the (7)-]ineation strips encoder. Concurrent to the level of co alition security codes building-up and being assimilated, the 500 'Floating balance of the sequential codes' is 'locked' by the hash key pad numerically transmitted signal;-( number) of the mobile phone top up swipe card applied multi digit code number.
In pro - logic formation, the compilation of sequential code numbers are thus accepted by the main (30)-data base or 505 rejected in view of an imbalance. In any event a primary objective is to bar access and cloning of cards.
In conclusion of system, operation therefore is subject to two primary facets; (31)-view of initial colour imagery of customers secondly, coded bias characteristics attenuated by customers 510 written answers; and then mobile phone card security involvement of the rest of the system as per requirement on code evaluation.
The procurement of the security coded attenuation throughout the automated transmission card system: - electronic balances being equal in favour of transactions and being unequal precluding 515 transactions; presenting a bar to card fraud card cloning.

Claims (21)

  1. 532 APPENDIX 'A';- CLAIMS: 1. An automated transmission machine card
    security system comprising a plastic unit SWIPE card, bearing a magnetic 535 strip reader line, emitting electro-magnetic pulse, in digital operating system logic code; initiating tele communications integrated code activity of financial / transaction data base procuring security data tenure; as a cross combination of co-l;;n codes, multiple num 540 erical sequences producing an equation, signifying identity of transaction, mobile phone numerical itemised code, trade location identity code and cam munication codes on receipt machine or receipt teller built integral as component part of computerized cash register with keyboard and coded soft 545 ware, and mobile phone key pad sequencing hash signal serving to lock the numerically edited sequence of floating balance of codes, producing automatic integration of numerical codes in a locked format to equate an acceptable balance of feedback results in procurement of transaction in receipt issue; 550 preventing data access for the cloning of cards and optimizing the security process of financial transactions.
  2. 2. A n automated transmission machine card security system comprising a unitary stratified card bearing hybrid magnetic and laser lineation encoding, infrared, opto 555 electronic / silicon chip circuitry, digital operating system software, and logic controlled receipt teller, evaluating validation characteristics of card carrier; in cipher code tenure thus preventing fraud cloned cards gaining efficiency in card driven transactions.
    560
  3. 3. An automated transmission machine card security system comprising an oblong plastic unified part card bearing lineation strip encoding of data information in digital system logic code; initiating cipher code activity of financial institution data base through auto-mated taller 565 machine farility and computerized cash register with full key board fai1lity to financial / transaction institution data-base,electronically programmed to print out branch identity code, mobile phone itemized bar hash code, tran section edit code on full receipt issue in full automated 570 sequence of mobile phone top up card registering 'manual hand swipe' procuring security data tenure on pre-programmed forma - -d computer software on to screen of cash register, issuing receipt, thus securing card driven transactions.
  4. 4. A n automated transmission machine card security system 575 comprising an oblong plastic injected / extrusion unit part card, bearing a conventional magnetic strip linear reader line for encoding electro-magnetic information; in digital operating system cipher code, cross combined coded infrared hcdographics - cipher 580 encoded information on card, triggering computer generated questionnaire from till, procuring the contour photograph of bona fide card holder to appear on video screen, for cashiers reference; thus optimizing validation character of card in the processing of financed 585 counter till & card driven transactions.
  5. 5. A n automated transmission machine card security system comprising an oblong plastic injected / extrusion unit part card, bearing a photo optical electronic chip; the card fabricating with conventional magnetic strip 590 linear reader line emitting electro-magnetic pulse, in digital operating system logic code; initiating coded activity of financial institution data base, procuring cipher coded security data - tenure on automated receipt teller machine and video screen requesting written 595 or digital key pad input and answer;-to coded logic questions preventative fraud and to cloning in its delivery system, and thus optimizing security of card driven transactions.
  6. 6. A n automated transmission machine card security system comprising an oblong plastic injected / extrusion unit 600 part card as described here in with reference to all accompanying drawings as described in specification; facillitating the computerized flow of electronic data transmission of security data base; data logic thus controling print-out of receipt teller dual filament 605 top masked, margin scrolled paper-rdll in term of art form - m',,ti- filament ( machine masked); and concurrent cross co-ordination of data codes sequenced in co-alition securely, locking out data to propective fraud, preventing clone card issue and use, optimizing financial security of card 610 driven transactions.
  7. 7. A n automated transmission machine card security system comprising an automated tidier machine card emitting and retrieving data and electronic identity - coded information, in digital operating system logic code; 615 initiating the processing of financial transaction data through the equipment of unitary colour vision monitor fabricated on to machine chassis; mobile phone key pad and automated Tyler machine key board controlling unitary receipt teller equipment, thus preventing fraud cloning of 620 card driven transactions.
  8. 8. A n automated transmission machine card security system as Eli med in any preceding claim comprising a card registering and encoding infrared holographics - numbered card, system signal key pad input facility, electronic 625 bar code reading fa;llity, programmed to reveal and confirm in- numerate cross-logic system identity codes; and cash register site and geographical location in progress, to main financial transaction / institution data-base;; in sequence machine code reading 'manual 630 hand swipe' of transaction in co-alition of mobile phone service (sale) receipt issue; in an effort thus preventing fraud optimizing financial security of card driven transactions; preventative to cloning in its delivery system.
    635
  9. 9. A n automated transmission machine card security system as 1; med in any preceding claim comprising a card; and swipe-data recorder in unitary affixed fabrication to (receipt / questionnaire / signature scanner printer) receipt teller reciprocating out turn of multiple 640 filament, masked portion, serrated scrolled paper real; thus optimizing financial security of transactions.
  10. 10. An automated transmission machine card security system as claimed in any preceding claim comprising a card; and automated teller machine fabricating with key pad 645 control, electronically producing the data logic input of proposed card transaction with cipher code data from data base on to video screen; preventative to cloning in its delivery system and thus optimizing validation characteristics by electronic mail, in financial transactions.
    650
  11. 11. A n automated transmission machine card security system as Chimed in any preceding Claim comprising a card; and computerized cash register equipment, purposely cipher coding card carrier numerical codes, to security coded data base; triggering alert, fabricated onto 655 hardware equipment or on video monitor, highlighting any abnormality; thus optimising validation characteristics of credit card and hu man carrier during process of financial transactions.
  12. 12. A n automated transmission machine card security system 660 as claimed in any preceding claim comprising a code numbered card; signal- key pad input facility, and infra red scanner delivering a numerical out-put into /online through to main transaction data base, digital operating system programmed to reveal station identity number and 665 infra red scanned itemized bar code; as the card driven transaction progresses to and from main financial trans action data-base, in sequence of reading 'manual hand swipe' of transaction in progress, issuing feedback result of receipted transaction; de-lineating print out on receipt 670 in an effort thus preventing fraud cloning, optimizing financial security of card driven transactions.
  13. 13. A n automated transmission machine card security system as claimed in any preceding claim comprising a numbered card; (signal) key pad input facility, electronically pro 675 gram med to reveal identity of station site number & geographical location of transaction in progress, to main financial transaction / institution data base; in sequence reading 'manual hand swipe' of transaction in co-alition of infra-red scanning of item code number; 680 in an effort thus preventing fraud cloning, optimizing financial security of card driven transactions.
  14. 14. A n automated transmission card security system as claimed in any preceding claim compr,;ng an itemized coded card; computerized cash register which emits cipher code of 685 geographical location and ff;l;te pre-program med shop, retail or financial institution station number, thus purposed, to 'manual hand swipe' magnetic or laser lineation of card in co-l;;n of infra-red scanning of item code number; sequentially revealling cash register location 690 and identity number during transaction in progress, sent to main finan - 1 transaction security data base upon the process of transaction, issuing written validation feedback result of receipted and printed transaction and triggering of any attempted fraud in 695 financial transaction; thus optimizing validation character of card driven transaction. v
  15. 15. A automated transmission machine card security system as Ace; med in any preceding claim comprising a card; bearing numerical strip encoding, registering infra-red scanned card 700 code, station number and cash register number, cipher inform ation and 'manual hand swipe' scan and key signaled on pad to on line data-base, issuing written feedback results to computer assisted cash register; reciprocating electronic itemized acknowledgement of positive attenuated transaction 705 and out turn of paper roll - in receipt context, subject to system format; thus issuing feedback result of key-pad receipted transaction, de- ]ineating print out on receipt; in an effort thus preventing fraud optimizing financial security of card driven transactions.
    710
  16. 16. A n automated transmission machine card security system as nisi med in any preceding claim comprising an oblong plastic injected / extrusion unit part card, and affixed cast acrylic disc with card holders body data dignity encoded numerical scan data information, 715 recorded there-on in analog ue or digital sequence, the transcdbable digitally encoded or anogue pant Mid there-on for reference; the image being retrievable by light source for comparison to card carder in the process of financial transaction at 720 the near p - Titian of cashiers register; trigging computerized comparison by way of electronic cipher code data-mail, to distanced data base, thus optimizing validation character of card in financial transactions.
  17. 17. A n automated transmission machine card security system 725 as claimed in any preceding claim comprising an oblong plastic injected / extruded unit part card, and ffi red cast acrylic fob, square or other shape, or one mono-formed cast card, bearing card holders accurate fingerprint; retrievable by electronic light 730 source at cash register approximate position, triggering computerized comparison by way of electronic digits data cipher code to financial institution data base; thus optimizing validation character of card and carrier, in the process of financial transactions.
    735
  18. 18. A n automated transmission machine card security system as ;med in any preceding claim comprising a receipt holler: directly phase linked by computer transmission cable to cashier till; the teller bearing independent (-in-one micro chip circuitry) as a separate unit, the micro pro 740 censors program med to evaluate a complete exacting per centage biased assessment function; upon the swipe of a credit card, triggering its automated function assessing validity of impressed signature of card carrier, the imprint purposed to be pressed through paper receipt, 745 in development art-form on to scanner face, in the event of the receipt being hand served for submission, compared to authentic signature of bona fide card horder; electronically emus ng clearance or counter- mend on transaction by flashing red light integral on unit or drafted;
    750 on receipt, or transmitted electronically audibly for notice; thus optimizing validation character of card and carrier in the process of finanri^1 transactions.
  19. 19. An automated transmission machine card security system as claimed in any preceding claim comprising paper r1 755 in development art form; fabricated to strenuous standards so as NOT to un-do along serrated edges, unless definite pulling pressure is applied to snap by cashier, with the application of stressed material or machine layered residual combination of gloue: in duplicate or triplicate multi-form, 760 the top layer of w hich is deliberately machine masked, to conceal imprint appendage of correct answers; thus optimizing efficiency of receipted transaction of credit card or card driven transaction
  20. 20. An automated transmission machine card security system 765 as claimed in any preceding claim comprising melted infrared holographic and infrared digital encoding of automated system machine card, key pad input facility, electronically programmed to reveal security identity of station cite and numerically registered security 770 bar code during transaction in progress, to main finanri1 transaction / institution data base; in sequence of system reading 'manual hand swipe' of transaction in co-in of infra-red scanning of item identification number; in an effort thus 775 preventing fraud optimizing financial security of card driven transactions.
  21. 21. A n automated systematic machine card security system as nisi med in any preceding claim substantially as described here in with reference to all relevant 780 figures of the accompanying drawings as described in
    781 specification.
GB0230105A 2002-01-03 2002-12-24 Automated transmission machine card security system Expired - Fee Related GB2397800B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0200040A GB2372961B (en) 2001-01-06 2002-01-03 Automated teller machine card security system

Publications (3)

Publication Number Publication Date
GB0230105D0 GB0230105D0 (en) 2003-01-29
GB2397800A true GB2397800A (en) 2004-08-04
GB2397800B GB2397800B (en) 2005-09-07

Family

ID=32670964

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0230105A Expired - Fee Related GB2397800B (en) 2002-01-03 2002-12-24 Automated transmission machine card security system

Country Status (1)

Country Link
GB (1) GB2397800B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111640239B (en) * 2020-06-08 2021-12-07 台州玖屹科技有限公司 Public transit device of punching a yard for electronic commerce data encryption based on silicon controlled rectifier principle

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5428210A (en) * 1992-01-10 1995-06-27 National Bancard Corporation Data card terminal with embossed character reader and signature capture
US6076731A (en) * 1997-04-10 2000-06-20 Intermec Ip Corp. Magnetic stripe reader with signature scanner
EP1018712A1 (en) * 1998-12-22 2000-07-12 Eastman Kodak Company Method and apparatus for transaction card security utilizing embedded image data
WO2001052180A1 (en) * 2000-01-10 2001-07-19 Tarian, Llc Device using histological and physiological biometric marker for authentication and activation
WO2001080193A1 (en) * 2000-04-17 2001-10-25 Cardsoft International Pty Limited Communications device with card facility
GB2370809A (en) * 2001-01-06 2002-07-10 Richard Gerald Enston Machine readable card with laser encoded data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5428210A (en) * 1992-01-10 1995-06-27 National Bancard Corporation Data card terminal with embossed character reader and signature capture
US6076731A (en) * 1997-04-10 2000-06-20 Intermec Ip Corp. Magnetic stripe reader with signature scanner
EP1018712A1 (en) * 1998-12-22 2000-07-12 Eastman Kodak Company Method and apparatus for transaction card security utilizing embedded image data
WO2001052180A1 (en) * 2000-01-10 2001-07-19 Tarian, Llc Device using histological and physiological biometric marker for authentication and activation
WO2001080193A1 (en) * 2000-04-17 2001-10-25 Cardsoft International Pty Limited Communications device with card facility
GB2370809A (en) * 2001-01-06 2002-07-10 Richard Gerald Enston Machine readable card with laser encoded data
GB2372961A (en) * 2001-01-06 2002-09-11 Richard Gerald Enston Card security system

Also Published As

Publication number Publication date
GB0230105D0 (en) 2003-01-29
GB2397800B (en) 2005-09-07

Similar Documents

Publication Publication Date Title
US6523741B1 (en) Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services
US5336871A (en) Holographic enhancement of card security
US8959029B2 (en) System, apparatus, and methods for currency processing control and redemption
US4636622A (en) Card user identification system
US6003763A (en) Method and apparatus for recording magnetic information on traveler's checks
US4745267A (en) Fraudulent card intercept system
EP0533829B1 (en) Security of objects or documents
EP0683471A1 (en) Enhancement of document security
US7016524B2 (en) System for authenticating and processing of checks and other bearer documents
US20150058217A1 (en) Automated Document Cashing System
US20030050891A1 (en) Method and system for registration and tracking of items
US3859508A (en) Method of control of legitimacy safe against forgery
WO1992016913A1 (en) Securing financial transactions
EP0152703A2 (en) Fraudulent card intercept system
KR19990077286A (en) Work management system
FR2480464A1 (en) DEVICE FOR CUSTOMIZING CHECK FORMULAS
US5661284A (en) Commercial transaction system
DE3721170A1 (en) PORTABLE STORAGE MEDIUM
CA2392024C (en) Bank cheque system with cheques having storage chips
US7040539B1 (en) Negotiable instrument with fraud protection
JP2001515809A (en) Improved security document
GB2397800A (en) Card security system
US20020039432A1 (en) Legal age limit and fingerprint verification system
GB2372961A (en) Card security system
EP0545580B1 (en) Portable storage and portable storage verifying device and method

Legal Events

Date Code Title Description
AT Applications terminated before publication under section 16(1)
710B Request of alter time limits

Free format text: EXTENSION APPLICATION: APPLICATION FOR EXTENSION OF THE PERIOD(S) PRESCRIBED BY RULE(S) 25(2) FILEDON 20040121.

9110 Period prescribed has been extended under rule 110(6)/1990

Free format text: EXTENSION ALLOWED: PERIOD(S) PRESCRIBED BY RULE(S) 25(2) EXTENDED UNDER RULE 110(6) IN ACCORDANCE WITH THE DECISION OF THE COMPTROLLER DATED 20040213.

ERR Erratum

Free format text: ERRATUM: PATENT APPLICATION NUMBER GB0230105.9 PREVIOUSLY ANNOUNCED AS TERMINATED IN PDJ NO. 5943 ON 20030416 HAS NOW BEEN REINSTATED UNDER THE PROVISIONS OF R.110(4).

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20061224