CN112307780A - Card reader, card reader control method, and cash automaton - Google Patents
Card reader, card reader control method, and cash automaton Download PDFInfo
- Publication number
- CN112307780A CN112307780A CN202010046808.9A CN202010046808A CN112307780A CN 112307780 A CN112307780 A CN 112307780A CN 202010046808 A CN202010046808 A CN 202010046808A CN 112307780 A CN112307780 A CN 112307780A
- Authority
- CN
- China
- Prior art keywords
- card
- wireless communication
- card reader
- power supply
- power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000004891 communication Methods 0.000 claims abstract description 95
- 238000012545 processing Methods 0.000 claims abstract description 33
- 238000001514 detection method Methods 0.000 claims abstract description 23
- 238000007790 scraping Methods 0.000 description 45
- 238000003780 insertion Methods 0.000 description 13
- 230000037431 insertion Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 230000032258 transport Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000209202 Bromus secalinus Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0095—Testing the sensing arrangement, e.g. testing if a magnetic card reader, bar code reader, RFID interrogator or smart card reader functions properly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/04—Methods or arrangements for sensing record carriers, e.g. for reading patterns by mechanical means, e.g. by pins operating electric contacts
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/205—Housing aspects of ATMs
- G07F19/2055—Anti-skimming aspects at ATMs
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Conveying Record Carriers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
The invention relates to a card reader, a control method of the card reader and a cash automaton. The invention aims to improve safety. The card reader (1) detects whether wireless communication is generated when power is supplied to the IC card, and performs predetermined processing. The card reader may perform a predetermined process after confirming a relationship between detection of wireless communication and power supply to the IC card.
Description
Technical Field
The invention relates to a card reader, a control method of the card reader and a cash automaton.
Background
A crime called information scraping occurs in a cash transaction processing device such as an automatic cash payment machine (hereinafter, referred to as a cd (cash dispenser)) or an automatic cash prepayment machine (hereinafter, referred to as an atm (automated Teller machine)), and in a transaction processing terminal that further performs transaction processing using an IC card. A typical method of scraping information is to install a device for spoofing data in a card transport path and to transmit illegally acquired data by using wireless communication. As a countermeasure, a technique of detecting wireless communication around a card reader and confirming the presence or absence of an unauthorized device is disclosed (for example, see patent document 1).
Documents of the prior art
Patent document
Patent document 1: U.S. patent application publication No. 2015/0281236 specification
In the above-mentioned patent document 1, wireless communication around the card reader is monitored to detect an unauthorized device, but when wireless communication is detected, only the monitor warns of the wireless communication, and the determination of the cause of the detected wireless communication is requested to a human. Therefore, in the related art, it is impossible to determine whether or not the detected wireless communication is generated by the information scraping apparatus. Since this determination is passed to the user's determination, data spoofing is not always prevented.
Disclosure of Invention
Accordingly, an object of the present invention is to provide a card reader and a cash automaton which can improve security.
In order to solve the above problems, according to the card reader, the card reader control method, and the cash automaton including the card reader of the present invention, whether or not wireless communication occurs when power is supplied to the IC card is detected, and predetermined processing is performed. The card reader may perform a predetermined process after confirming a relationship between the detection of the wireless communication and the power supply to the IC card.
ADVANTAGEOUS EFFECTS OF INVENTION
According to the present invention, it is possible to perform a predetermined process by detecting whether or not wireless communication occurs when power is supplied to the IC card.
Drawings
Fig. 1 is a structural diagram of a card reader of the present embodiment.
Fig. 2 is an explanatory diagram showing a basic structure of an IC card.
Fig. 3 is an explanatory diagram showing a schematic configuration of the information scraping apparatus.
Fig. 4 is an explanatory diagram showing a state where the information scraping apparatus is in contact with the IC card.
Fig. 5 is an explanatory diagram showing an internal structure of a normal card reader, where (1) in fig. 5 shows a state after the IC card is inserted into the insertion port, and (2) in fig. 5 shows a state where the IC card is conveyed to a predetermined position and the IC contact point is pressed.
Fig. 6 is an explanatory diagram showing an internal structure of a card reader provided with an information scraping device, where (1) in fig. 6 shows a state immediately after an IC card is inserted into an insertion port, and (2) in fig. 6 shows a state where the IC card is conveyed to a predetermined position and an IC contact point is pressed.
Fig. 7 is a flowchart of the IC card reading process.
Fig. 8 relates to embodiment 2, and is a flowchart of the IC card reading process.
Fig. 9 relates to embodiment 3, and is a flowchart of IC card reading processing.
Fig. 10 relates to embodiment 4, and is a flowchart of IC card reading processing.
Description of reference numerals
1-card reader, 2-IC card, 3-information scraping device, 10-input port, 11-control part, 12-card conveying path, 13-card position sensor, 14-memory, 15-main interface, 16-IC card information reading part, 17-wireless communication detection part, 32-data cheating terminal, 33-antenna, 100-upper device (transaction processing device).
Detailed Description
Hereinafter, embodiments of the present invention will be described with reference to the drawings. The card reader according to the present embodiment detects the presence of an unauthorized device by monitoring wireless communication inside or in the vicinity of the card reader when power is supplied to the IC card, thereby ensuring reliability and security of the card reader.
Therefore, in the present embodiment, the card reader 1 includes a detection unit 17 that detects wireless communication in and around the card reader. In the present embodiment, it is monitored whether the information scraping apparatus 3 (see fig. 6) starts wireless communication at a timing after the IC contact point 22 of the IC card 2 presses the contact point 161 (see fig. 6) of the card information reading section 16 and power supply to the IC card 2 is started.
According to the present embodiment configured as described above, it is possible to determine that the wireless communication detected when power is supplied to the IC card 2 is abnormal wireless communication (or unauthorized wireless communication or illegal wireless communication) by the information scraping apparatus 3. The card reader 1 according to the present embodiment can suppress the data of the IC card 2 from being stolen by the information scraping apparatus 3 and transmitted to a receiving device (not shown) in the surroundings by executing a predetermined process when detecting such wireless communication which is not originally intended. Even when a part of the data of the IC card 2 is acquired by the information scraping device 3, it is assumed that the acquisition of the remaining data can be prevented, and thus the data of the IC card 2 can be prevented from being illegally used.
As described above, in the present embodiment, even when the information scraping device 3 is provided in the card reader 1, the presence of the information scraping device 3 can be detected, and therefore, data of the IC card 2 can be prevented from being cheated, and the reliability and the security of the card reader 1 can be ensured.
[ example 1]
The card reader 1 includes, for example: a control unit 11, a card conveyance path 12, a card position sensor 13, a memory 14, a host interface 15, an IC card information reading unit 16, and a wireless communication detection unit 17.
The control unit 11 includes, for example, a cpu (central Processing unit), and controls the operation of the card reader 1 based on a control program stored in advance. For example, the card conveyance control section 111 controls conveyance of the IC card.
The card transport path 12 transports the IC card 2 inserted into the card reader 1 to a predetermined position in accordance with an instruction from the control unit 11. The card position sensor 13 detects the position of the IC card 2 on the card conveyance path 12, and sends the position to the control unit 11.
The memory 14 stores data read from the IC card 2 by the IC card information reading section 16. The main interface 15 is an interface for communicating with the transaction processing device 100 as a host device.
The IC card information reading unit 16 supplies power to the IC card 2 by bringing the contact point 161 into contact with the IC card 2, and reads data recorded in the IC card 2 and transmits the data to the control unit 11. The control unit 11 causes the memory 14 to store the data read by the IC card information reading unit 16.
The wireless communication detection unit 17 detects wireless communication and transmits the result to the control unit 11. The wireless communication detecting unit 17 may be provided inside the card reader 1 or on the outer surface of the card reader 1, for example. Alternatively, the wireless communication detection unit 17 may be provided inside or outside the transaction processing device 100 as a separate device from the card reader 1 main body. In this case, the wireless communication detecting unit 17 may communicate with the control unit 11 wirelessly or by wire. The wireless communication detection unit 17 may be configured to detect a frequency of the radio wave transmitted from the information scraping apparatus 3, or may be configured to detect other frequencies.
Fig. 2 is a schematic diagram showing a basic structure of the IC card 2. The IC card 2 includes a card body 21 and IC contact points 22 provided on the surface of the card body 21. The IC contact point portion 22 electrically contacts the contact point 161 of the IC card information reading portion 16, thereby performing data communication.
Fig. 3 is a schematic diagram showing an example of the structure of the information scraping apparatus 3. The information scraping apparatus 3 includes, for example, a main body 31, a data spoofing terminal 32, and an antenna 33. The upper side of fig. 3 shows a plan view, and the lower side of fig. 3 shows a cross-sectional view. Fig. 4 is a plan view showing a state where the information scraping apparatus 3 is in contact with the IC card 2.
The data spoofing terminal 32 is a terminal which is interposed between the IC card information reading unit 16 and the IC contact point unit 22 of the IC card 2 and thereby acquires data (spoofing) communicated between the IC card 2 and the card reader 1. The data fraud terminal 22 includes connection terminals on both sides of the information scraping device 3 so that the IC card information reading unit 16 can be electrically connected to the IC contact point units 22.
The antenna 33 transmits data acquired from communication with the IC card 2 and the card reader 1 to an external receiving device. The information scraping apparatus 3 includes a data processing unit (not shown) for transmitting data spoofed by the data spoofing terminal 32 from the antenna 33. The information scraping apparatus 3 is not provided with a battery. The information scraping apparatus 3 is driven by stealing power supply from the IC card information reading section 16 to the IC contact point section 22.
Fig. 5 is a schematic diagram showing an internal structure of the card reader 1. An insertion opening 10 into which the IC card 2 is inserted is formed in the front surface of the card reader 1 main body. A card position sensor 13(1) for detecting the IC card 2 inserted into the insertion port 10 is provided as an insertion detection sensor in the vicinity of the insertion port 10. The insertion detection sensor 13(1) is, for example, a pressing sensor having a mechanical contact point, and outputs a signal to the control unit 11 when pressed by the IC card 2 inserted from the insertion port 10.
An example of the configuration of the card conveyance path 12 of the card reader 1 will be described. In the card conveyance path 12, a pair of conveyance rollers 121(1) to 121(4) for sandwiching and conveying the IC card 2 from above and below are disposed so as to be separated in the conveyance direction of the IC card 2. Hereinafter, the transport roller 121 is referred to as "transport roller" unless otherwise specified.
The card reader 1 forms a card conveyance path 12 as a conveyance path for the IC card 2 by these conveyance rollers 121. One of the pair of conveyance rollers 121 is a driving roller that transmits a rotational force of a motor (not shown), and the other is a driven roller that rotates in response to the driving roller. The motor that drives the conveying roller 121 is one.
The control unit 11 controls the rotation (including the rotation direction and the rotation speed) and stop of the motor, thereby loading the IC card 2 and discharging (returning) the card.
Card position sensors 13(2) to (5) for detecting the presence or absence of the IC card 2 are disposed in the card conveyance path 12 so as to be separated in the conveyance direction of the IC card 2. The arrangement intervals of the card position sensors 13(2) - (13 (5) are shorter than the length of the IC card 2 in the transport direction. The card position sensors 13(2) to 13(5) are, for example, transmissive photoelectric switches. The transmissive photoelectric switch is an optical sensor including a light emitting portion and a light receiving portion (both not shown), and the light emitting portion and the light receiving portion are arranged to face each other with a conveyance path therebetween. When the IC card crosses the light between the light emitting section and the light receiving section, a signal indicating that the IC card 2 is detected is transmitted to the control section 11.
As shown in fig. 5(1), the card position sensor 13(2) detects that the IC card 2 is pinched by the conveying roller 121(1) closest to the insertion port 10. The card position sensors 13(3) to 13(5) detect the positions of the IC cards 2 conveyed on the card conveyance path 12, respectively. The signals of the card position sensors 13(2) to 13(5) are transmitted to the control unit 11. The control unit 11 detects whether or not the IC card 2 is inserted into the card reader main body and the position of the IC card 2 on the card conveying path 12 based on the detection results of the insertion detection sensor 13(1) and the card position sensors 13(2) to 13 (5).
When the IC card 2 is inserted to the position of fig. 5(1), the control unit 11 of the card reader 1 starts the conveyance of the IC card 2 and conveys the IC card 2 into the card reader. When the IC card 2 is conveyed to the position of the IC card information reading unit 16, the control unit 11 lowers the IC card information reading unit 16 so that the contact point 161 thereof comes into contact with the IC contact point portion 22 of the IC card 2, as shown in fig. 5 (2). After that, the control unit 11 supplies power to the IC card 2 via the IC card information reading unit 16, and starts data communication with the IC card 2.
Fig. 6 is a schematic diagram showing an internal structure of the card reader 1 in a case where the information scraping device 3 is provided in the card reader. Fig. 6 (1) shows a state immediately after the IC card 2 is inserted into the insertion port 10. Fig. 6 (2) shows a state where the IC card 2 is conveyed to a predetermined position and the IC contact point portion 22 is pressed by the contact point 161 of the card information reading portion 16.
As shown in (2) of fig. 6, the information scraping apparatus 3 is arranged such that when the contact point 161 of the IC card information reading section 16 comes into contact with the IC contact point portion 22, the data spoofing terminal 22 is sandwiched by the contact point 161 and the IC contact point portion 22.
When the control unit 11 of the card reader 1 starts to supply power to the IC card 2 via the IC card information reading unit 16, the information scraping apparatus 3 also receives power supply via the data spoofing terminal 22. The information scraping apparatus 3 starts transmission from the antenna 23 toward an external receiving device with the stolen electric power as a driving source.
When the card reader 1 starts data communication with the IC card 2, the information scraping device 3 cheats the communication data via the data cheating terminal 22, and transmits the cheated data to the outside via the antenna 23.
Fig. 7 shows an outline of the IC card reading process. This processing shows an example of the procedure from the insertion of the IC card 2 to the start of communication with the IC card 2. Here, the wireless communication detecting unit 17 always monitors that wireless communication is not performed before power is supplied to the IC card 2.
The card reader 1 receives the IC card 2 from the insertion port 10 (S11). The card reader 1 conveys the IC card 2 to the position of the IC card information reading unit 16 (S12). The card reader 1 moves the IC card information reading unit 16 toward the IC card 2, thereby bringing the contact point 161 of the card information reading unit 16 into contact with the IC contact point portion 22 of the IC card 2 (S13).
The card reader 1 starts power supply to the IC card 2 via the IC card information reading unit 16 (S14). At this time, when the information scraping apparatus 3 is installed inside the card reader 1, power supply to the information scraping apparatus 3 is started. When power is supplied, the information scraping apparatus 3 starts wireless communication from the antenna 23.
Therefore, the card reader 1 detects whether or not wireless communication is started at the time of the start of power supply (S15). When the wireless communication detecting unit 17 detects wireless communication (yes in S15), the card reader 1 stops the transaction process with the IC card 2 without performing communication with the IC card 2, and notifies the higher-order device 100 of an error (S16). On the other hand, when the wireless communication is not detected by the wireless communication detecting unit 17 (no in S15), the card reader 1 starts communication with the IC card 2 as usual (S17) and performs transaction processing.
According to the card reader 1 of the present embodiment configured as described above, since whether or not wireless communication is performed when power is supplied to the IC card 2 is monitored, the presence of the information scraping device 3 can be detected, and data cheating can be prevented. Therefore, according to the present embodiment, the reliability and the security of the card reader 1 can be improved.
In addition, in the present embodiment, since illegal wireless communication of the information scraping device 3 can be prevented only by providing a configuration (the wireless communication detecting unit 17) for detecting wireless communication from the information scraping device 3, security and reliability can be improved without increasing manufacturing cost and the size of the card reader main body.
In the present embodiment, since the presence of the information scraping apparatus 3 is determined by the presence or absence of wireless communication when power is supplied to the IC card 2 and the transaction processing with the IC card 2 is stopped, there is no need for determination by a user such as a bank teller as in the related art. Therefore, in the present embodiment, the presence of the information scraping apparatus 3 can be stably determined at all times, so that criminal acts can be restrained.
[ example 2]
In the sequence of fig. 8, the wireless communication detecting unit 17 always monitors that wireless communication is not performed before power is supplied to the IC card 2.
Steps S21 to S24 in fig. 8 are the same as steps S11 to S14 described in fig. 7, and therefore, the description thereof is omitted. After step S24, the control unit 11 of the card reader 1 determines whether or not to start wireless communication (S25).
When wireless communication is performed (yes in S25), the control unit 11 temporarily stops power supply to the IC card 2 (S26). After stopping the power supply to the IC card 2, the control unit 11 determines whether or not wireless communication is available again (S27). When the wireless communication is also stopped when the power supply is stopped (no in S27), the control unit 11 determines that the wireless communication by the information scraping apparatus 3 is performed, does not perform communication with the IC card 2, stops the transaction processing, and notifies the higher-order device 100 of an error (S28).
On the other hand, when wireless communication is detected after the stop of power supply to the IC card 2 (yes in S27), the control unit 11 restarts power supply to the IC card (S29). Thereafter, the control unit 11 starts communication with the IC card as usual (S30), and performs transaction processing of the IC card 2.
The present embodiment thus configured also achieves the same operational effects as those of the above-described embodiment 1. In the present embodiment, when wireless communication is detected when power supply to the IC card 2 is detected, power supply to the IC card 2 is temporarily stopped, and whether or not wireless communication is present is determined. Therefore, in the present embodiment, it is possible to prevent the transaction processing of the IC card 2 from being stopped when the radio wave from the outside of the information scraping apparatus 3 is detected, so that it is possible to ensure reliability and security and improve convenience of use.
[ example 3]
In the processing of fig. 9, the wireless communication detecting unit 17 always monitors that wireless communication is not performed before power is supplied to the IC card 2. Since steps S41 to S43 in fig. 9 are the same as steps S11 to S13 in fig. 7, description thereof is omitted.
The control unit 11 of the card reader 1 repeatedly executes (S44) the power supply to the IC card 2 for a predetermined number of times (S45), the detection of the wireless communication (S46), and the power supply to the IC card 2 stopping (S47). The predetermined number of times may be "2" or more.
The control unit 11 starts power supply to the IC card 2 via the IC card information reading unit 16 (S45). The control unit 11 detects whether or not to start wireless communication by the information scraping apparatus 3 at the power supply start timing (S46). When wireless communication is performed (yes in S46), power supply to the IC card 2 is stopped (S47).
The control unit 11 repeatedly performs the processing of steps S24 to S26 a plurality of times (S44), and determines that the information scraping apparatus 3 is installed when it is confirmed that the wireless communication is started after the power supply to the IC card 2. The control unit 11 stops the transaction processing with the IC card 2 without performing communication with the IC card 2, and notifies the higher-order device 100 of an error (S48). On the other hand, when the wireless communication is not detected at the time when the power supply to the IC card 2 is started (no in S46), the control unit 11 starts the communication with the IC card 2 as usual (S49) and executes the transaction processing.
The present embodiment thus configured also achieves the same operational effects as those of embodiment 1. Further, according to the present embodiment, since it is possible to confirm that the start of wireless communication is linked to the power supply to the IC card 2, it is possible to prevent erroneous detection due to the radio wave environment around the card reader, and to further improve reliability, safety, and convenience of use.
[ example 4]
Steps S51 to S55 shown in fig. 10 are the same as steps S11 to S15 described in fig. 7, and therefore, the description thereof is omitted. When the wireless communication is performed (S55: YES), the control unit 11 of the card reader 1 transmits the pseudo IC card data via the IC information reading unit (S56). Further, as in the above embodiments, the control unit 11 stops the transaction processing with the IC card 2 and notifies the upper apparatus 100 of an error.
On the other hand, when wireless communication is not performed (no in S55), the controller 11 starts communication with the IC card 2 as usual (S57).
The present embodiment thus configured also achieves the same operational effects as those of embodiment 1. In the present embodiment, when wireless communication by the information scraping apparatus 3 is detected, the dummy IC card data is delivered to the information scraping apparatus 3 and transmitted to a receiving device, not shown. Thus, according to the present embodiment, not only the data spoofing by the information scraping device 3 can be suppressed, but also the data spoofing by the information scraping device 3 can be hindered by the dummy IC card data. If the information scraping device 3 continues to transmit data to an external receiving device without knowing the dummy IC card data, the memory in the receiving device is filled with the dummy IC card data, and unauthorized use of the IC card can be prevented. In addition, the financial institution monitors the pseudo IC card data, thereby enabling a criminal who uses the pseudo IC card data to be identified. This embodiment can also be used in combination with embodiment 2 and embodiment 3.
The present invention is not limited to the above-described embodiments. Those skilled in the art can make various additions, modifications, and the like within the scope of the present invention. The features described in the embodiments can also be combined as appropriate.
Claims (10)
1. A card reader is characterized in that a card reader is provided,
whether or not wireless communication is generated when power is supplied to the IC card is detected, and predetermined processing is performed.
2. The card reader of claim 1,
the predetermined processing is performed after confirming that there is a relationship between the detection of the wireless communication and the power supply to the IC card.
3. The card reader according to claim 1, wherein the card reader comprises:
a power supply unit for supplying power to the IC card,
Wireless communication detection unit for detecting wireless communication, and
a control part for controlling the operation of the display device,
the control section executes the predetermined processing when the wireless communication detection section detects wireless communication while the power supply section supplies power to the IC card.
4. The card reader of claim 3,
the control section executes the predetermined processing after confirming that there is a relationship between the power supply from the power supply section to the IC card and the detection of the wireless communication by the wireless communication detection section.
5. The card reader of claim 4,
the control unit performs stopping and resuming of power supply to the IC card by the power supply unit a plurality of times, confirms that there is a relationship between power supply to the IC card and detection of wireless communication by the wireless communication detection unit when it is confirmed that wireless communication is detected by the wireless communication detection unit only when power is supplied to the IC card from the power supply unit, and performs the predetermined processing.
6. The card reader according to any one of claims 1 to 5,
the predetermined process is a process of stopping a transaction with the IC card.
7. The card reader according to any one of claims 1 to 5,
the predetermined processing is processing of outputting pseudo IC card data.
8. The card reader of claim 1,
the power supply unit is a part of an IC card information reading unit that reads out data from the IC card.
9. A control method of a card reader is characterized in that,
power is supplied to the inserted IC card,
the generation of the wireless communication is monitored and,
when wireless communication is detected when power is supplied to the IC card, predetermined processing is executed.
10. An automatic cash machine is characterized in that,
a card reader according to any one of claims 1 to 5.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2019-135631 | 2019-07-23 | ||
JP2019135631A JP2021018745A (en) | 2019-07-23 | 2019-07-23 | Card reader, method for controlling card reader, and automatic teller machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112307780A true CN112307780A (en) | 2021-02-02 |
Family
ID=74336705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010046808.9A Pending CN112307780A (en) | 2019-07-23 | 2020-01-16 | Card reader, card reader control method, and cash automaton |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2021018745A (en) |
CN (1) | CN112307780A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1406365A (en) * | 2000-02-18 | 2003-03-26 | 西帕克公司 | Method and device for identification and authentication |
CN1739110A (en) * | 2003-01-14 | 2006-02-22 | 皇家飞利浦电子股份有限公司 | Detection of tampering of a smart card interface |
JP2007286782A (en) * | 2006-04-14 | 2007-11-01 | Oki Electric Ind Co Ltd | Automatic transaction device and automatic transaction device monitoring system |
US20110253786A1 (en) * | 2010-04-17 | 2011-10-20 | Andrew Campbell | Use of a wideband radio receiver within the device to detect transmissions from a parasitic shim or other unofficial circuitry implanted within the terminal |
WO2011128778A2 (en) * | 2010-04-17 | 2011-10-20 | Paypod, Ltd | Security techniques card payment terminal |
EP2722788A1 (en) * | 2012-10-18 | 2014-04-23 | Wincor Nixdorf International GmbH | Apparatus for reading a chip card and method for detecting a skimming module |
US20140158768A1 (en) * | 2012-11-27 | 2014-06-12 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that outputs interference signals to jam reading ability of unauthorized card reader devices |
JP2015022392A (en) * | 2013-07-17 | 2015-02-02 | アズビル株式会社 | Card reader and consumption power suppression method for card reader |
CN105580025A (en) * | 2013-09-06 | 2016-05-11 | 微软技术许可有限责任公司 | Verification that particular information is transferred by an application |
CN109239572A (en) * | 2017-06-29 | 2019-01-18 | Ncr公司 | Card steals the detection of brush device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7202140B2 (en) * | 2018-10-26 | 2023-01-11 | 日本電産サンキョー株式会社 | Information processing device and foreign matter detection method |
-
2019
- 2019-07-23 JP JP2019135631A patent/JP2021018745A/en active Pending
-
2020
- 2020-01-16 CN CN202010046808.9A patent/CN112307780A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1406365A (en) * | 2000-02-18 | 2003-03-26 | 西帕克公司 | Method and device for identification and authentication |
CN1739110A (en) * | 2003-01-14 | 2006-02-22 | 皇家飞利浦电子股份有限公司 | Detection of tampering of a smart card interface |
JP2007286782A (en) * | 2006-04-14 | 2007-11-01 | Oki Electric Ind Co Ltd | Automatic transaction device and automatic transaction device monitoring system |
US20110253786A1 (en) * | 2010-04-17 | 2011-10-20 | Andrew Campbell | Use of a wideband radio receiver within the device to detect transmissions from a parasitic shim or other unofficial circuitry implanted within the terminal |
WO2011128778A2 (en) * | 2010-04-17 | 2011-10-20 | Paypod, Ltd | Security techniques card payment terminal |
US20110253782A1 (en) * | 2010-04-17 | 2011-10-20 | Andrew Campbell | Loaded dummy track running alongside the card data lines carrying dummy data |
EP2722788A1 (en) * | 2012-10-18 | 2014-04-23 | Wincor Nixdorf International GmbH | Apparatus for reading a chip card and method for detecting a skimming module |
US20140158768A1 (en) * | 2012-11-27 | 2014-06-12 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that outputs interference signals to jam reading ability of unauthorized card reader devices |
JP2015022392A (en) * | 2013-07-17 | 2015-02-02 | アズビル株式会社 | Card reader and consumption power suppression method for card reader |
CN105580025A (en) * | 2013-09-06 | 2016-05-11 | 微软技术许可有限责任公司 | Verification that particular information is transferred by an application |
CN109239572A (en) * | 2017-06-29 | 2019-01-18 | Ncr公司 | Card steals the detection of brush device |
Non-Patent Citations (1)
Title |
---|
刘守义 等: "《现代物理与高新技术》", vol. 2004, 西安电子科技大学出版社, pages: 532 - 533 * |
Also Published As
Publication number | Publication date |
---|---|
JP2021018745A (en) | 2021-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101263507B (en) | Method for producing an electromagnetic protection field for a card-reading device | |
JP5629330B2 (en) | Magnetic recording medium reader | |
WO2005041116A1 (en) | Card processing device | |
US20150254534A1 (en) | Card medium processing device and card medium processing method | |
CN110619242B (en) | Card reader and foreign matter detection method | |
CN107735801A (en) | The control method of card reader and card reader | |
JP5341650B2 (en) | Medium processing apparatus and medium processing method | |
US9934641B2 (en) | Automatic transaction device | |
US7963443B2 (en) | Systems, methods, and computer program products for mitigating signal noise at a wireless smart device reader | |
CN112307780A (en) | Card reader, card reader control method, and cash automaton | |
WO2008057057A1 (en) | A state control sensor activating and/or deactivating an anti-fraud device and a magnetic card reader/writer for an sst or an atm | |
US6834809B2 (en) | Card processor | |
EP2196945B1 (en) | Card processing apparatus | |
CN103593921A (en) | Automatic transaction device and method for preventing card information from being stolen for automatic transaction device | |
CN105574987A (en) | Card insert/withdrawal port unit, card processing device, and automated transaction device | |
JP4945738B2 (en) | Medium processing apparatus and control method thereof | |
JP5421897B2 (en) | Card reader and information communication method in card reader | |
JP2022103544A (en) | Card reader and transaction apparatus | |
KR20070075724A (en) | Apparatus and method for distinguishing ic card in a mixing system | |
US20200004608A1 (en) | Information processing device and information processing method | |
US20200004706A1 (en) | Information processing device and information processing method | |
CN102171709B (en) | Card reader | |
CN102902988B (en) | Card reader | |
CN111801715A (en) | Method for detecting the presence of a smart card cloning device in an automatic payment and/or withdrawal terminal and corresponding automatic payment and/or withdrawal terminal | |
JP3683413B2 (en) | Medium conveying determination method and medium conveying apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Tokyo, Japan Applicant after: Hitachi Financial Systems Co.,Ltd. Address before: Tokyo, Japan Applicant before: HITACHI-OMRON TERMINAL SOLUTIONS, Corp. |
|
CB02 | Change of applicant information |