EP0097203B1 - Recognition method for counterfeit data carriers, and data carrier for carrying out the method - Google Patents

Recognition method for counterfeit data carriers, and data carrier for carrying out the method Download PDF

Info

Publication number
EP0097203B1
EP0097203B1 EP82109732A EP82109732A EP0097203B1 EP 0097203 B1 EP0097203 B1 EP 0097203B1 EP 82109732 A EP82109732 A EP 82109732A EP 82109732 A EP82109732 A EP 82109732A EP 0097203 B1 EP0097203 B1 EP 0097203B1
Authority
EP
European Patent Office
Prior art keywords
data carrier
machine
transactions
stored
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
EP82109732A
Other languages
German (de)
French (fr)
Other versions
EP0097203A3 (en
EP0097203A2 (en
Inventor
Hans-Jürgen Walter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MICO DATENSYSTEME GmbH
Original Assignee
MICO DATENSYSTEME GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MICO DATENSYSTEME GmbH filed Critical MICO DATENSYSTEME GmbH
Priority to AT82109732T priority Critical patent/ATE35335T1/en
Publication of EP0097203A2 publication Critical patent/EP0097203A2/en
Publication of EP0097203A3 publication Critical patent/EP0097203A3/en
Application granted granted Critical
Publication of EP0097203B1 publication Critical patent/EP0097203B1/en
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • the invention relates to a method described in the preamble of claim 1 for detecting counterfeit data carriers, in particular copied magnetic cards, on which a financial credit can be stored in addition to identification data and other data.
  • the invention further relates to a data carrier for carrying out the method according to the invention as set out in the preamble of claim 9.
  • a method and a data carrier of the type mentioned above are known from US-A-4 048 475.
  • a serial number is used to identify the data carrier.
  • the number of previous usage processes is recorded on the data carrier and updated each time the card is used. This is intended to prevent the use of illegally duplicated cards, since the different number of uses on copied cards can be recognized.
  • a similar method, which allows the detection of counterfeit magnetic cards is from IBM Technical Disclosure Bulletin, Vol. 16, No. 1, June 1973, p. 286.
  • the invention has for its object to provide a method for detecting counterfeit data carriers and associated data carriers of the type mentioned in the introduction, with which at least such a high level of security against the use of counterfeit data carriers can be achieved with very little expenditure on equipment that practically none There is more incentive to use counterfeit media.
  • the invention provides for the following method steps:
  • the sequence number noted on the present data carrier of at least one other data carrier is read, which was applied to the present data carrier by the machine used during a previous use process of the present data carrier;
  • the number of previous uses of the at least one other data carrier noted on the present data carrier is read, which was applied to the present data carrier by the machine used in the previous use process of the present data carrier;
  • the number of uses of the at least one data carrier previously used in the machine currently in use is stored on the present data carrier and
  • the number of previous uses of the present data carrier stored in the machine currently in use is compared with the read number of its previous uses and a counterfeit detection signal is triggered if the read number is less than the stored number of uses.
  • serial number stored in the machine currently in use and the number of uses of a single data carrier previously used in the machine currently used are applied to the present data carrier.
  • a larger number of data carriers previously used in the machine currently in use can be used.
  • a particularly preferred embodiment of the method according to the invention provides that after a counterfeit detection signal has been triggered, the data carrier recognized as a counterfeit is retained by the machine and is therefore withdrawn from the user's access. This not only ensures reliable preservation of evidence, it also prevents any further misuse with a forged data carrier from the outset. In addition, the psychological effect on the user of a counterfeit data carrier should also be particularly strong in that the counterfeit data carrier is withdrawn from its access.
  • a particularly rapid and effective dissemination of the fact that a certain data carrier has been identified as a forgery can preferably be achieved by temporarily recognizing the sequence number and number of uses of the counterfeit data carrier for a predeterminable number of subsequent uses after the detection of a counterfeit data carrier be applied to the data carrier present in each case during use. It can preferably be provided that the sequence number and number of uses of the counterfeit data carrier are applied in ten subsequent uses.
  • a particularly reliable detection of the counterfeit data carrier in the other machines is favored by the fact that immediately after the detection of a counterfeit data carrier, the number of use processes is set to “0”.
  • the dissemination of the information about the data carrier recognized as a forgery to the other machines within a certain According to the invention, th area is achieved in that the following memories are present on the data carrier:
  • a memory for an operation counter, in which the number of uses of the data carrier of the machine previous user can be stored.
  • the information about a data carrier recognized as a forgery is transmitted at an increasing speed like an avalanche to all other machines in the area of use.
  • the likelihood that a counterfeit remains undetected is arbitrarily low.
  • a certain data medium for example a checking card
  • a certain data medium for example a checking card
  • All machines in the approved area only accept data carriers with a valid authorization code.
  • counterfeiting of a data carrier can be reliably detected at the central point and excluded from further misuse.
  • a data carrier which is particularly suitable for carrying out the method according to the invention is distinguished in that the data carrier is designed as a magnetic card on which the data are stored magnetically coded, specifically in the memories already mentioned above.
  • the arrangement is advantageously such that the data can be stored in a predefinable map track.
  • a data carrier is also briefly referred to below as a magnetic card or also as a checking card.
  • the card sequence number of a specific magnetic card is assigned continuously during the initial issuance and thus enables each magnetic card issued to be clearly identified.
  • the process counter is set to "one" when a magnetic card is first issued and is increased by “one” each time the magnetic card is used in the machine.
  • a machine pre-user is understood to mean a user who happened to have used a particular machine in front of the holder of a magnetic card who currently has a magnetic card for obtaining machine service.
  • the transaction counter of the present magnetic card is increased by "one", apart from the debiting of the corresponding goods price. This increase takes place in the memory cell which is assigned to the associated card run number.
  • the transaction counter updated in this way is written back to the magnetic card together with the other data required for handling the transaction.
  • process counter and the card run number of the machine user are also transferred to the magnetic card currently in use.
  • a magnetic card or generally a data carrier is considered correct if the counter reading of the process counter on the data carrier is equal to or greater than the counter reading of the process counter stored in the machine that is currently being used for this data carrier.
  • a data carrier is forged, for example a magnetic card has been copied
  • the original and the copy have the same counter reading of the transaction counter and of course the same card sequence number.
  • the update procedure described above is carried out. As soon as the copy is presented to the machine after using the original, this copy can be recognized as a forgery by the fact that the counter reading of the process counter is smaller than the counter reading stored in the machine.
  • the magnetic card or generally the data carrier is then retained in accordance with the above explanations.
  • the process counters are updated independently of the habits of a particular user and without his influence in that each user, without being able to prevent this, also includes the process counter and the card run number of the machine user written on his magnetic card. This results in indirect communication, which is beyond the influence of the user, between all the machines in the approved application area, so that the information about a possibly counterfeited data carrier, such as a copied magnetic card, is quickly disseminated.
  • the process counter is set to "zero" and this counter reading is registered in the machine together with the associated card sequence number.
  • a counterfeit counter is set to “10”, which is reduced by “1” for each use transaction is reduced. As soon as the counterfeit counter returns to "0", the previous user data are used again.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

A method of detecting false data recording media and a data recording media therefor useful in the cash-free procurement of products or service from automatic service rendering or product vending machines. For each data recording medium, the number of uses thereof is encoded on the data recording medium itself and memorized by each automatic service machine. A data recording medium is deemed correct by the automatic service machine if the number of uses encoded on the medium itself is not lower than the number of uses previously memorized in the automatic service machine; otherwise, the medium will be deemed false and can be withheld or otherwise rejected by the machine. Dissemination of information relative to a false data recording medium is achieved on presentation of the medium by encoding in addition to the aforesaid data, the number of uses of a data recording medium previously presented to the machine. Subsequent use thereof will of necessity cause that information to be transmitted to another automatic service machine.

Description

Die Erfindung betrifft ein im Oberbegriff des Anspruchs 1 beschriebenes Verfahren zur Erkennung von gefälschten Datenträgern, insbesondere von kopierten Magnetkarten, auf denen ausser Identifikationsdaten und anderen Daten ein finanzielles Guthaben speicherbar ist.The invention relates to a method described in the preamble of claim 1 for detecting counterfeit data carriers, in particular copied magnetic cards, on which a financial credit can be stored in addition to identification data and other data.

Die Erfindung bezieht sich weiterhin auf einen Datenträger zur Durchführung des erfindungsgemässen Verfahrens, wie er im Oberbegriff des Anspruches 9 niedergelegt ist.The invention further relates to a data carrier for carrying out the method according to the invention as set out in the preamble of claim 9.

Ein Verfahren sowie ein Datenträger der vorstehend genannten Art ist aus der US-A-4 048 475 bekannt. Hierbei wird zur Verhinderung einer unberechtigten Benutzung des Datenträgers bzw. einer unberechtigten Abberufung von Automatenleistungen eine zur Identifikation des Datenträgers dienende Laufnummer ausgewertet. Ferner wird auf dem Datenträger die Anzahl der bisherigen Benutzungsvorgänge festgehalten und bei jeder Kartenbenutzung aktualisiert. Auf diese Weise soll die Benutzung von unerlaubt duplizierten Karten verhindert werden, da die unterschiedliche Anzahl von Benutzungsvorgängen auf kopierten Karten erkannt werden kann. Ein ähnliches Verfahren, welches das Erkennen von gefälschten Magnetkarten erlaubt, ist aus IBM Technical Disclosure Bulletin, Vol. 16, No. 1, June 1973, S. 286, bekannt.A method and a data carrier of the type mentioned above are known from US-A-4 048 475. In order to prevent unauthorized use of the data carrier or unauthorized removal of machine services, a serial number is used to identify the data carrier. Furthermore, the number of previous usage processes is recorded on the data carrier and updated each time the card is used. This is intended to prevent the use of illegally duplicated cards, since the different number of uses on copied cards can be recognized. A similar method, which allows the detection of counterfeit magnetic cards, is from IBM Technical Disclosure Bulletin, Vol. 16, No. 1, June 1973, p. 286.

Der Erfindung liegt die Aufgabe zugrunde, ein Verfahren zur Erkennung von gefälschten Datenträgern sowie von zugehörigen Datenträgern der eingangs näher genannten Art zu schaffen, mit welchen bei sehr geringem gerätetechnischem Aufwand eine zumindest so hohe Sicherheit gegen die Verwendung von gefläschten Datenträgern erreichbar ist, dass praktisch kein Anreiz mehr zur Verwendung von gefälschten Datenträgern besteht.The invention has for its object to provide a method for detecting counterfeit data carriers and associated data carriers of the type mentioned in the introduction, with which at least such a high level of security against the use of counterfeit data carriers can be achieved with very little expenditure on equipment that practically none There is more incentive to use counterfeit media.

Zur verfahrensmässigen Lösung dieser Aufgabe sieht die Erfindung folgende Verfahrensschritte vor:To achieve this object in terms of the method, the invention provides for the following method steps:

Es wird die auf dem vorliegenden Datenträger vermerkte Laufnummer wenigstens eines anderen Datenträgers gelesen, die bei einem vorhergehenden Benutzungsvorgang des vorliegenden Datenträgers von dem dabei benutzten Automaten auf den vorliegenden Datenträger aufgebracht worden ist;The sequence number noted on the present data carrier of at least one other data carrier is read, which was applied to the present data carrier by the machine used during a previous use process of the present data carrier;

es wird die auf dem vorliegenden Datenträger vermerkte Anzahl der bisherigen Benutzungsvorgänge des wenigstens einen anderen Datenträgers gelesen, die bei dem vorhergehenden Benutzungsvorgang des vorliegenden Datenträgers von dem dabei benutzten Automaten auf den vorliegenden Datenträger aufgebracht worden ist;the number of previous uses of the at least one other data carrier noted on the present data carrier is read, which was applied to the present data carrier by the machine used in the previous use process of the present data carrier;

es wird auf den vorliegenden Datenträger die im gegenwärtig benutzten Automaten gespeicherte Laufnummer wenigstens eines im gegenwärtig benutzten Automaten zuvor verwendeten Datenträgers aufgebracht;the sequence number of at least one data carrier previously used in the machine currently being used is applied to the present data carrier;

es wird auf den vorliegenden Datenträger die im gegenwärtig benutzten Automaten gespeicherte Anzahl der Benutzungsvorgänge des wenigstens einen im gegenwärtig benutzten Automaten zuvor verwendeten Datenträgers aufgebracht undthe number of uses of the at least one data carrier previously used in the machine currently in use is stored on the present data carrier and

es wird die im gegenwärtig benutzten Automaten gespeicherte Anzahl der bisherigen Benutzungsvorgänge des vorliegenden Datenträgers mit der gelesenen Anzahl seiner bisherigen Benutzungsvorgänge verglichen und ein Fälschungserkennungssignal ausgelöst, wenn die gelesene Anzahl kleiner ist als die gespeicherte Anzahl der Benutzungsvorgänge.the number of previous uses of the present data carrier stored in the machine currently in use is compared with the read number of its previous uses and a counterfeit detection signal is triggered if the read number is less than the stored number of uses.

Für die meisten praktischen Anwendungsfälle wird es ausreichend sein, dass auf den vorliegenden Datenträger die im gegenwärtig benutzten Automaten gespeicherte Laufnummer und die Anzahl der Benutzungsvorgänge eines einzigen zuvor im gegenwärtig benutzten Automaten verwendeten Datenträgers aufgebracht werden. Natürlich können zur Gewährleistung einer noch höheren Sicherheit eine grössere Anzahl von zuvor im gegenwärtig benutzten Automaten verwendeten Datenträgern herangezogen werden.For most practical applications it will be sufficient that the serial number stored in the machine currently in use and the number of uses of a single data carrier previously used in the machine currently used are applied to the present data carrier. Of course, to ensure an even higher level of security, a larger number of data carriers previously used in the machine currently in use can be used.

Wen jedoch ein einziger zuvor benutzter Datenträger als ausreichend angesehen wird, lässt sich eine besonders wirksame Aktualisierung dadurch erreichen, dass die Laufnummer und Anzahl der Benutzungsvorgänge des unmittelbar zuvor verwendeten Datenträgers aufgebracht werden.However, if a single previously used data carrier is considered sufficient, a particularly effective update can be achieved by applying the sequence number and number of uses of the data carrier used immediately before.

Eine besonders bevorzugte Ausführungsform des erfindungsgemässen Verfahrens sieht vor, dass nach der Auslösung eines Fälschungserkennungssignals der als Fälschung erkannte Datenträger vom Automaten einbehalten und somit dem Zugriff des Benutzers entzogen wird. Auf diese Weise wird nicht nur eine zuverlässige Beweissicherung gewährleistet, es wird vielmehr auch jeder weitere Missbrauch mit einem gefälschten Datenträger von vorneherein ausgeschlossen. Zusätzlich dürfte auch die psychologische Wirkung auf den Benutzer eines gefälschten Datenträgers dadurch besonders stark sein, dass der gefälschte Datenträger seinem Zugriff entzogen wird.A particularly preferred embodiment of the method according to the invention provides that after a counterfeit detection signal has been triggered, the data carrier recognized as a counterfeit is retained by the machine and is therefore withdrawn from the user's access. This not only ensures reliable preservation of evidence, it also prevents any further misuse with a forged data carrier from the outset. In addition, the psychological effect on the user of a counterfeit data carrier should also be particularly strong in that the counterfeit data carrier is withdrawn from its access.

Eine besonders rasche und wirksame Verbreitung der Tatsache, dass ein bestimmter Datenträger als Fälschung erkannt wurde, lässt sich vorzugsweise dadurch erreichen, dass nach der Erkennung eines gefälschten Datenträgers vorübergehend, für eine vorgebbare Anzahl von nachfolgenden Benutzungsvorgängen jeweils die Laufnummer und Anzahl der Benutzungsvorgänge des gefälschten Datenträgers auf den bei einer Benutzung jeweils vorliegenden Datenträger aufgebracht werden. Dabei kann vorzugsweise vorgesehen sein, dass die Laufnummer und Anzahl der Benutzungsvorgänge des gefälschten Datenträgers bei zehn nachfolgenden Benutzungsvorgängen aufgebracht werden.A particularly rapid and effective dissemination of the fact that a certain data carrier has been identified as a forgery can preferably be achieved by temporarily recognizing the sequence number and number of uses of the counterfeit data carrier for a predeterminable number of subsequent uses after the detection of a counterfeit data carrier be applied to the data carrier present in each case during use. It can preferably be provided that the sequence number and number of uses of the counterfeit data carrier are applied in ten subsequent uses.

Eine besonders zuverlässige Erkennung des gefälschten Datenträgers in den übrigen Automaten wird dadurch begünstigt, dass unmittelbar nach der Erkennung eines gefälschten Datenträgers, dessen Anzahl der Benutzungsvorgänge auf «0» gesetzt wird. Die Verbreitung der Information über den als Fälschung erkannten Datenträger auf die übrigen Automaten innerhalb eines bestimmten Bereiches wird erfindungsgemäss dadurch erreicht, dass folgende Speicher auf dem Datenträger vorhanden sind:A particularly reliable detection of the counterfeit data carrier in the other machines is favored by the fact that immediately after the detection of a counterfeit data carrier, the number of use processes is set to “0”. The dissemination of the information about the data carrier recognized as a forgery to the other machines within a certain According to the invention, th area is achieved in that the following memories are present on the data carrier:

Ein Speicher (MBKLN) für die Laufnummer eines Automaten-Vorbenutzers undA memory (MBKLN) for the sequence number of a machine previous user and

ein Speicher (MBVGZ) für einen Vorgangszähler, in welchem die Anzahl der Benutzungsvorgänge des Datenträgers des Automaten-Vorbenutzers speicherbar ist.a memory (MBVGZ) for an operation counter, in which the number of uses of the data carrier of the machine previous user can be stored.

Es wird gemäss der Erfindung die Information über einen als Fälschung erkannten Datenträger mit lawinenartig anwachsender Geschwindigkeit auf alle übrigen Automaten in dem Benutzungsbereich übertragen. Es wird dadurch die Wahrscheinlichkeit beliebig gering, dass eine Fälschung unerkannt bleibt.According to the invention, the information about a data carrier recognized as a forgery is transmitted at an increasing speed like an avalanche to all other machines in the area of use. As a result, the likelihood that a counterfeit remains undetected is arbitrarily low.

Es ist jedoch theoretisch denkbar, dass eine Anzahl von Datenträgern gefälscht wird, in denen beispielsweise Magnetkarten, die auch als Girokarten bezeichnet werden können, einfach kopiert werden. Es könnten dann solche Kopien (Fälschungen) zu einer Zeit in verschiedenen Automaten verwendet werden, in welcher eine gemäss der Erfindung vorgesehene indirekte Übertragung und Verbreitung der Fälschungs-Information dadurch verhindert wird, dass keine anderen Personen anwesend sind. Dieser theoretisch denkbare Fall widerspricht jedoch grundsätzlich dem Sinn des Aufstellens von Automaten und kann als Sonderfall betrachtet werden, dem auch mit gesonderten Massnahmen wirksam begegnet werden kann. Es kann beispielsweise vorgesehen sein, dass grundsätzlich das in einem zugelassenen Bereich vorhandene Berechtigungssystem in vorgegebenen Zeitabständen aktiviert werden muss. Dies kann beispielsweise folgendermassen geschehen: An einer zentralen Stelle wird ein Berechtigungscode mit Hilfe von Zufallszahlen ausgegeben. Es muss zu diesem Zweck ein bestimmter Datenträger, beispielsweise eine Girokarte an der zentralen Stelle vorgelegt werden, an welcher sie überprüft und mit einem für eine bestimmte Zeit gültigen Berechtigungscode versehen wird. Sämtliche Automaten im zugelassenen Bereich akzeptieren nur noch Datenträger mit einem gültigen Berechtigungscode. Bei diesem System kann an der zentralen Stelle eine Fälschung eines Datenträgers zuverlässig erkannt und von der weiteren missbräuchlichen Benutzung ausgenommen werden.However, it is theoretically conceivable that a number of data carriers are forged, in which, for example, magnetic cards, which can also be called checking cards, are simply copied. Such copies (counterfeits) could then be used in different machines at a time at which an indirect transmission and distribution of the counterfeiting information provided for by the invention is prevented by the fact that no other people are present. However, this theoretically conceivable case fundamentally contradicts the sense of setting up machines and can be regarded as a special case that can also be effectively countered with separate measures. For example, it can be provided that the authorization system present in an approved area must be activated at predetermined time intervals. This can be done, for example, as follows: An authorization code is issued at a central point using random numbers. For this purpose, a certain data medium, for example a checking card, must be presented at the central point, at which it is checked and provided with an authorization code that is valid for a certain time. All machines in the approved area only accept data carriers with a valid authorization code. With this system, counterfeiting of a data carrier can be reliably detected at the central point and excluded from further misuse.

Ein zur Durchführung des erfindungsgemässen Verfahrens besonders gut geeigneter Datenträger zeichnet sich dadurch aus, dass der Datenträger als Magnetkarte ausgebildet ist, auf welcher die Daten magnetisch kodiert gespeichert sind, und zwar in den oben bereits genannten Speichern. Vorteilhafterweise ist die Anordnung dabei derart getroffen, dass die Daten in einer vorgebbaren Kartenspur speicherbar sind.A data carrier which is particularly suitable for carrying out the method according to the invention is distinguished in that the data carrier is designed as a magnetic card on which the data are stored magnetically coded, specifically in the memories already mentioned above. The arrangement is advantageously such that the data can be stored in a predefinable map track.

Insgesamt lässt sich feststellen, dass gemäss der Erfindung ein ausserordentlich flexibles und im praktischen Gebrauch zuverlässiges System zur Erkennung von gefälschten Datenträgern wie Magnetkarten erreicht ist. Es kann das erfindungsgemässe Verfahren auch den Erfordernissen des Einzelfalls problemlos angepasst werden, und zwar auch im Hinblick auf den zur Erkennung von Fälschungen jeweils gerechtfertigten Aufwand.Overall, it can be stated that, according to the invention, an extraordinarily flexible and, in practical use, reliable system for detecting counterfeit data carriers such as magnetic cards has been achieved. The method according to the invention can also be easily adapted to the requirements of the individual case, also with regard to the effort justified in each case for the detection of forgeries.

Die Erfindeung wird nachfolgend beispielsweise anhand der Zeichnung beschrieben; in dieser zeigt die einzige Figur ein Flussdiagramm in welchem diejenigen Vorgänge veranschaulicht sind, welche dann ablaufen, wenn ein Datenträger zum Bezug einer Automatenleistung bei einem Automaten vorgelegt wird.The invention is described below, for example with reference to the drawing; in this the only figure shows a flowchart in which those processes are illustrated which take place when a data carrier for obtaining machine power is presented to a machine.

Ein Datenträger wird nachfolgend auch kurz als Magnetkarte oder auch als Girokarte bezeichnet.A data carrier is also briefly referred to below as a magnetic card or also as a checking card.

Neben anderen Daten enthält jede Girokarte wenigstens vier Speicherplätze, auf denen zur Erkennung von Fälschungen verwendbare Daten speicherbar sind. Nachfolgend werden für die vier vorzugsweise verwendeten Speicher die im Flussdiagramm verwendeten Kurzbezeichnungen und der jeweils zugehörige Speicherinhalt angegeben:

  • 1. MBKLN enthält die Kartenlaufnummer des Automatenvorbenutzers,
  • 2. MBVGZ enthält den Vorgangszähler des Automatenvorbenutzers,
  • 3. MKKLN enthält die Kartenlaufnummer der gegenwärtig verwendeten Magnetkarte und
  • 4. MKVGZ enthält den Vorgangszähler der gegenwärtig verwendeten Magnetkarte.
In addition to other data, each checking card contains at least four storage locations in which data that can be used to identify counterfeits can be stored. The abbreviations used in the flowchart and the associated memory contents are given below for the four memories that are preferably used:
  • 1. MBKLN contains the card run number of the previous machine user,
  • 2. MBVGZ contains the process counter of the machine previous user,
  • 3. MKKLN contains the card sequence number of the currently used magnetic card and
  • 4. MKVGZ contains the process counter of the currently used magnetic card.

Die Kartenlaufnummer einer bestimmten Magnetkarte wird bei der Erstausstellung fortlaufend vergeben und ermöglicht somit eine eindeutige Identifizierung jeder ausgegebenen Magnetkarte.The card sequence number of a specific magnetic card is assigned continuously during the initial issuance and thus enables each magnetic card issued to be clearly identified.

Der Vorgangszähler wird bei der Erstausstellung einer Magnetkarte auf «Eins" gestellt und bei jeder Verwendung der Magnetkarte im Automaten um «Eins" erhöht.The process counter is set to "one" when a magnetic card is first issued and is increased by "one" each time the magnetic card is used in the machine.

Unter einem Automatenvorbenutzer wird ein solcher Benutzer verstanden, der zufällig vor demjenigen Inhaber einer Magnetkarte einen bestimmten Automaten benutzt hat, welchem gegenwärtig eine Magnetkarte zum Bezug einer Automatenleistung vorliegt.A machine pre-user is understood to mean a user who happened to have used a particular machine in front of the holder of a magnetic card who currently has a magnetic card for obtaining machine service.

Wenn eine bestimmte Magnetkarte einem Automaten zur Benutzung, d. h. zum Bezug einer Automatenleistung vorgelegt wird, laufen folgende Vorgänge ab:

  • Es wird der Inhalt der gesamten Magnetkarte vom Automaten gelesen.
If a certain magnetic card is presented to a machine for use, that is, for the purchase of a machine service, the following processes take place:
  • The content of the entire magnetic card is read by the machine.

Nachdem der gewünschte Bezugsvorgang für den Automaten freigegeben wurde, wird der Vorgangszähler der vorliegenden Magnetkarte, ausser der Abbuchung des entsprechenden Warenpreises, um «Eins" erhöht. Diese Erhöhung erfolgt in derjenigen Speicherzelle, welche der zugehörigen Kartenlaufnummer zugeordnet ist.After the desired reference process has been released for the machine, the transaction counter of the present magnetic card is increased by "one", apart from the debiting of the corresponding goods price. This increase takes place in the memory cell which is assigned to the associated card run number.

Der auf diese Weise aktualisierte Vorgangszähler wird mit den übrigen für die Abwicklung des Geschäftes erforderlichen Daten auf die Magnetkarte zurückgeschrieben.The transaction counter updated in this way is written back to the magnetic card together with the other data required for handling the transaction.

Zusätzlich werden der Vorgangszähler und die Kartenlaufnummer des Automatenvorbenutzers, genauer gesagt einer entsprechenden Magnetkarte, ebenfalls auf die gegenwärtig in der Benutzung befindliche Magnetkarte übertragen.In addition, the process counter and the card run number of the machine user, more specifically a corresponding magnetic card, are also transferred to the magnetic card currently in use.

Eine Magnetkarte oder allgemein ein Datenträger gilt als korrekt, wenn der Zählerstand des Vorgangszählers auf dem Datenträger gleich oder grösser ist als der im Automaten, der gerade benutzt wird, für diesen Datenträger abgespeicherte Zählerstand des Vorgangszählers.A magnetic card or generally a data carrier is considered correct if the counter reading of the process counter on the data carrier is equal to or greater than the counter reading of the process counter stored in the machine that is currently being used for this data carrier.

Wenn ein Datenträger gefälscht ist, beispielsweise eine Magnetkarte kopiert wurde, so haben das Original und die Kopie den gleichen Zählerstand des Vorgangszählers und natürlich auch die gleiche Kartenlaufnummer. Bei der Benutzung des Originals oder der Kopie erfolgt die oben beschriebene Vorgehensweise der Aktualisierung. Sobald nach der Benutzung des Originals die Kopie dem Automaten vorgelegt wird, kann diese Kopie dadurch als Fälschung erkannt werden, dass der Zählerstand des Vorgangszählers kleiner ist als der im Automaten abgespeicherte Zählerstand. Die Magnetkarte oder allgemein der Datenträger wird dann gemäss den obigen Erläuterungen einbehalten.If a data carrier is forged, for example a magnetic card has been copied, the original and the copy have the same counter reading of the transaction counter and of course the same card sequence number. When using the original or the copy, the update procedure described above is carried out. As soon as the copy is presented to the machine after using the original, this copy can be recognized as a forgery by the fact that the counter reading of the process counter is smaller than the counter reading stored in the machine. The magnetic card or generally the data carrier is then retained in accordance with the above explanations.

Da von einer unterschiedlichen Frequentierung der verschiedenen Automaten durch die einzelnen Benutzer auszugehen ist, werden die Vorgangszähler unabhängig von den Gewohnheiten eines bestimmten Benutzers und ohne seinen Einfluss dadurch aktualisiert, dass jeder Benutzer, ohne dies verhindern zu können, den Vorgangszähler und die Kartenlaufnummer des Automatenvorbenutzers mit auf seine Magnetkarte geschrieben bekommt. Dadurch erfolgt eine indirekte und dem Einfluss der Benutzer entzogene Kommunikation zwischen allen Automaten im zugelassenen Anwendungsbereich, so dass dadurch auch die Information über einen unter Umständen gefälschten Datenträger wie eine kopierte Magnetkarte rasch verbreitet wird.Since it is to be assumed that the different machines are used differently by the individual users, the process counters are updated independently of the habits of a particular user and without his influence in that each user, without being able to prevent this, also includes the process counter and the card run number of the machine user written on his magnetic card. This results in indirect communication, which is beyond the influence of the user, between all the machines in the approved application area, so that the information about a possibly counterfeited data carrier, such as a copied magnetic card, is quickly disseminated.

Sobald eine Magnetkarte als Kopie erkannt worden ist, wird der Vorgangszähler auf «Null» gesetzt, und es wird dieser Zählerstand zusammen mit der zugehörigen Kartenlaufnummer im Automaten registriert.As soon as a magnetic card has been recognized as a copy, the process counter is set to "zero" and this counter reading is registered in the machine together with the associated card sequence number.

Es werden dann bei den nächsten zahn Benutzungsvorgängen anstatt der Kartenlaufnummer und der zugehörigen Vorgangszähler des jeweiligen Automatenvorbenutzers bzw. seines Datenträgers die Kartenlaufnummer, deren Kopie entdeckt wurde, mit dem Zählerstand «Null» des Vorgangszählers eingeschrieben.In the next tooth usage processes, instead of the card run number and the associated process counter of the respective machine user or his data carrier, the card run number, the copy of which has been discovered, is written with the counter reading "zero".

Auf diese Weise wird dafür gesorgt, dass die Kartenlaufnummer der kopierten Magnetkarte (Fälschung) auf schnellstem Weg an alle weiteren Automaten gelangt. Auf Grund der Mitteilung, dass der Zählerstand des Vorgangszählers den Wert «Null» aufweist, wird nun auch jeder andere Automat, also nicht derjenige Automat, der die Fälschung entdeckt hat, dazu veranlasst, seinerseits zehn mal die Kartenlaufnummer der als Fälschung entdeckten Kopie mit dem Zählerstand «Null» des Vorgangszählers anstatt der Daten des Automatenvorbenutzers in die Speicher MBKLN und MBVGZ einzuschreiben.This ensures that the card run number of the copied magnetic card (counterfeit) reaches all other machines as quickly as possible. On the basis of the message that the counter of the process counter has the value “zero”, every other machine, not the machine that discovered the counterfeit, is now prompted to in turn copy the card run number of the copy discovered as a counterfeit with the Write the “zero” counter reading of the process counter instead of the data of the machine user in the MBKLN and MBVGZ memories.

Die verschiedenen Möglichkeiten, wie ein Benutzungsvorgang bei der Vorlage eines Datenträgers bei einem Autmatne ablaufen kann, gehen unmittelbar anschaulich aus dem in der Zeichnung dargestellten Flussdiagramm hervor.The various possibilities of how a usage process can be carried out when presenting a data carrier with an autmatne can be seen clearly from the flowchart shown in the drawing.

Um nach einer erkannten Kopie für die nächsten zehn Benutzungsvorgänge anstatt der Kartenlaufnummer mit dem zugehörigen Vorgangszähler des jeweiligen Vorbenutzers die oben erläuterten Daten der Kopie an die übrigen.Automaten weiterzugeben, wird ein Fälschungszähler auf «10» gestellt, der bei jedem Benutzungsvorgang um «1» vermindert wird. Sobald der Fälschungszähler wieder auf «0» steht, werden wieder die Vorbenutzer-Daten verwendet.In order to pass on the above-mentioned data of the copy to the other vending machines after a recognized copy for the next ten uses instead of the card run number with the associated transaction counter of the respective previous user, a counterfeit counter is set to “10”, which is reduced by “1” for each use transaction is reduced. As soon as the counterfeit counter returns to "0", the previous user data are used again.

Claims (12)

1. Method for the recognition of counterfeit data carriers, particularly copied magnetic cards, on which, apart from identification data and other data can be stored a financial balance and with which it is possible to call on a selectable machine service at a predeterminable number of machines set up in an allowed area during a use transaction by presenting a data carrier, the machine service being deducted from the previous balance and the residual balance being stored on the data carrier, whereby, on presenting a data carrier to a machine, apart from the measures necessary for providing the chosen machine service and the associated balance deduction, the following working steps are performed by the presently used machine:
1.1 the serial number noted on the present data carrier and serving for the identification thereof is read and stored,
1.2 the number of previous use transactions noted on the present data carrier is read and stored,
1.3 on the present data carrier the number of noted transactions is increased by "one", characterized by the following method steps:
1.4 the serial number noted on the present data carrier of at least one other data carrier is read and which was applied to the present data carrier during a previous use transaction thereof by the then used machine,
1.5 the number of previous transactions of the at least one other data carrier noted on the present data carrier is read, having been applied during the preceding transaction for the present data carrier by the then used machine;
1.6 to the present data carrier is applied the serial number of at least one data carrier previously used in the presently used machine and which is stored in the latter ;
1.7 to the present data carrier is applied the number of transactions of the at least one data carrier previously used in the presently used machine and stored in the latter; and
1.8 the number of previous use transactions of the present data carrier stored in the presently used machine is compared with the read number of its previous transactions and a counterfeiting recognition signal is initiated if the read number is smaller than the stored number of transactions.
2. Method according to claim 1, characterized in that to the present data carrier are applied the serial number stored in the presently used machine and the number of transactions of a single data carrier previously used in the presently used machine.
3. Method according to claim 2, characterized in that the serial number and number of use transactions of the immediately previously used data carrier are applied.
4. Method according to one of the preceding claims, characterized in that after initiating a counterfeiting recognition signal the data carrier recognized as counterfeit is retained by the machine and can consequently no longer be used by the user.
5. Method according to one of the preceding claims, characterized in that following the recognition of a counterfeit data carrier for a predeterminable number of follwing transactions in each case the serial number and number of transactions of the counterfeit data carrier are applied to the data carrier being presently used.
6. Method according to claim 5, characterized in that the serial number and number of transactions of the counterfeit data carrier are applied during ten successive transactions.
7. Method according to one of the preceding claims, characterized in that immediately following the recognition of a counterfeit data carrier, its number of transactions is set to "zero".
8. Method according to claim 7, characterized in that each machine which finds in a data carrier to be used a "zero" as the number of transactions of the previously used data carrier, for a predeterminable number of following transactions in each case applies the number "zero" of the transactions and the associated serial number to the data carrier being presently used in the form of prior user data.
9. Data carrier for performing the method according to one of the preceding claims which, apart from the data necessary for the correct performance of a transaction for obtaining a machine service, carries for preventing counterfeiting
a memory (MKKLN) for an individual serial number of the data carrier and
a memory (MKVGZ) for a transaction counter of the data carrier, which can store the number of its use transactions,
characterized in that there are a memory (MBKLN) for the serial number of a machine prior user and
a memory (MBVGZ) for a transaction counter, in which it is possible to store the number of transactions of the data carrier of the machine prior user.
10. Data carrier according to claim 9, characterized in that the data carrier is in the form of a
magnetic card, on which the data are stored in magnetically coded form.
11. Data carrier according to claim 10, characterized in that the data can be stored in a predeterminable card track.
EP82109732A 1982-06-19 1982-10-21 Recognition method for counterfeit data carriers, and data carrier for carrying out the method Expired EP0097203B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT82109732T ATE35335T1 (en) 1982-06-19 1982-10-21 PROCEDURE FOR DETECTING COUNTERFEIT DISC AND DISC FOR IMPLEMENTING THE PROCEDURE.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE3223034A DE3223034C2 (en) 1982-06-19 1982-06-19 Procedure for the detection of counterfeit data carriers
DE3223034 1982-06-19

Publications (3)

Publication Number Publication Date
EP0097203A2 EP0097203A2 (en) 1984-01-04
EP0097203A3 EP0097203A3 (en) 1986-01-29
EP0097203B1 true EP0097203B1 (en) 1988-06-22

Family

ID=6166424

Family Applications (1)

Application Number Title Priority Date Filing Date
EP82109732A Expired EP0097203B1 (en) 1982-06-19 1982-10-21 Recognition method for counterfeit data carriers, and data carrier for carrying out the method

Country Status (5)

Country Link
US (1) US4510382A (en)
EP (1) EP0097203B1 (en)
JP (1) JPS5936873A (en)
AT (1) ATE35335T1 (en)
DE (1) DE3223034C2 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3410937A1 (en) * 1984-03-24 1985-10-03 Philips Patentverwaltung Gmbh, 2000 Hamburg Method for identifying the unauthorised use of an identifier
US4800520A (en) * 1985-10-29 1989-01-24 Kabushiki Kaisha Toshiba Portable electronic device with garbage collection function
FR2592510B1 (en) * 1985-12-31 1988-02-12 Bull Cp8 METHOD AND APPARATUS FOR CERTIFYING SERVICES OBTAINED USING A PORTABLE MEDIUM SUCH AS A MEMORY CARD
ATE82418T1 (en) * 1986-08-26 1992-11-15 Siemens Ag PROCEDURE FOR DETECTING CHIP CARD MISUSE.
US4908521A (en) * 1987-01-06 1990-03-13 Visa International Service Association Transaction approval system
US5239166A (en) * 1989-01-17 1993-08-24 Graves Marcel A Secure data interchange system erasing a card memory upon an invalid response
US5251259A (en) * 1992-08-20 1993-10-05 Mosley Ernest D Personal identification system
DE19604876C1 (en) * 1996-02-10 1997-09-04 Deutsche Telekom Ag Process for transaction control of electronic wallet systems
DE19611632A1 (en) * 1996-03-25 1997-10-02 Deutsche Telekom Ag Off-line data stations with virtual on-line capability
DE19627534A1 (en) * 1996-07-09 1998-01-15 Deutsche Telekom Ag Procedures to prevent module abuse
US7403922B1 (en) 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US7096192B1 (en) * 1997-07-28 2006-08-22 Cybersource Corporation Method and system for detecting fraud in a credit card transaction over a computer network
US6029154A (en) * 1997-07-28 2000-02-22 Internet Commerce Services Corporation Method and system for detecting fraud in a credit card transaction over the internet
US6317650B1 (en) * 1999-04-29 2001-11-13 Softcard Systems, Inc. System and method employing portable cards to monitor a commercial system
JP4101420B2 (en) 1999-12-27 2008-06-18 株式会社日立製作所 Electronic authentication method and apparatus for implementing the same
US7044394B2 (en) * 2003-12-17 2006-05-16 Kerry Dennis Brown Programmable magnetic data storage card
US7865427B2 (en) 2001-05-30 2011-01-04 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
DE502006000840D1 (en) * 2006-01-30 2008-07-10 Skidata Ag System with several power devices with access control devices

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1285445A (en) * 1968-08-30 1972-08-16 Smiths Industries Ltd Improvements in or relating to access-control equipment and item-dispensing systems including such equipment
US3662343A (en) * 1970-07-29 1972-05-09 Docutel Corp Credit card automatic currency dispenser
US3657702A (en) * 1970-08-19 1972-04-18 Digital Data Systems Corp Transaction accumulator for a credit verification system
JPS5213245B2 (en) * 1973-05-18 1977-04-13
US4048475A (en) * 1974-03-07 1977-09-13 Omron Tateisi Electronics Company Apparatus for checking the user of a card in card-actuated machines
FR2386080A1 (en) * 1977-03-31 1978-10-27 Cii Honeywell Bull ACCOUNTING SYSTEM FOR PREDETERMINED HOMOGENEOUS UNITS
US4295041A (en) * 1977-08-26 1981-10-13 Compagnie Internationale Pour L'informatique Cii-Honeywell Bull (Societe Anonyme) Device for the protection of access to a permanent memory of a portable data carrier
JPS5828277Y2 (en) * 1977-12-02 1983-06-20 オムロン株式会社 automatic transaction processing equipment
DE2924325B2 (en) * 1979-06-15 1981-06-11 Hermann 7742 St. Georgen Stockburger Method and device for the secret identification and evaluation of machine-readable data carriers
FR2496294B1 (en) * 1980-12-15 1987-01-02 Thomson Csf PROTECTED DEVICE FOR AUTHENTICATING USERS OF A MESSAGE TRANSMISSION TERMINAL AND TRANSACTION SYSTEM COMPRISING SUCH DEVICES

Also Published As

Publication number Publication date
JPH0421226B2 (en) 1992-04-09
EP0097203A3 (en) 1986-01-29
ATE35335T1 (en) 1988-07-15
US4510382A (en) 1985-04-09
DE3223034C2 (en) 1986-12-11
JPS5936873A (en) 1984-02-29
EP0097203A2 (en) 1984-01-04
DE3223034A1 (en) 1983-12-22

Similar Documents

Publication Publication Date Title
EP0097203B1 (en) Recognition method for counterfeit data carriers, and data carrier for carrying out the method
DE2041853C3 (en) Device for determining the validity of identification cards
DE69014817T2 (en) System for paying or transferring information with an electronic memory card serving as a wallet.
DE4200254C2 (en) Gaming machine
DE2318263A1 (en) FALSE-PROOF CONTROL PROCEDURE FOR LEGITIMATION
CH654940A5 (en) METHOD FOR PROTECTING DATA CARRIER ON A REGISTERED INFORMATION AGAINST RUECKUEBERTRAGUNG AND DEVICE FOR SINGLE AND / OR READING A COUNTER RUECKUEBERTRAGUNG protected information.
DE2502305A1 (en) DEVICE ACTUATABLE DEPENDING ON A DATA MEDIA
DE1599016C3 (en) Arrangement of automatic, card-controlled accesses with devices for reading identification and authenticity data located on a card
DE3114669A1 (en) DEVICE AND METHOD FOR PERSONALIZING CHECKS
DE3041393C2 (en) Method for creating a predetermined number of authorization cards having a storage medium
DE2215628B1 (en) Banknote or security with metal security thread or credit card with security strip
DE2119491A1 (en) System for the distribution of units of value
DE2059332A1 (en) Access control device
DE19608757A1 (en) Method and device for checking the authenticity of documents in the form of chip cards
DE3528199A1 (en) Automatic issuing machine for cheque cards
DE19604876C1 (en) Process for transaction control of electronic wallet systems
EP1122696A1 (en) Method and device for the automatic depositing and dispensing of banknotes
EP0257596A2 (en) Method for recognizing the misuse of an IC card
DE68910258T2 (en) System for scanning and encoding a magnetic track carried by a document when the document is moved by hand.
DE2509313C3 (en) Device for checking the authorization of the user to use a card
DE2302020A1 (en) DISPENSING SYSTEM FOR AUTOMATIC DISPENSING OF MONEY OR THE LIKE
EP1178452B1 (en) Method for a secure data transmission in product vending
EP0074382B1 (en) Data processing installation
EP0586852B1 (en) Mobile data carrier and data exchange system
CH604290A5 (en) Construction of fraud-proof credit card

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19830809

AK Designated contracting states

Designated state(s): AT CH FR GB IT LI NL SE

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): AT CH FR GB IT LI NL SE

17Q First examination report despatched

Effective date: 19870107

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT CH FR GB IT LI NL SE

REF Corresponds to:

Ref document number: 35335

Country of ref document: AT

Date of ref document: 19880715

Kind code of ref document: T

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)
ITF It: translation for a ep patent filed
ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
ITTA It: last paid annual fee
EAL Se: european patent in force in sweden

Ref document number: 82109732.6

REG Reference to a national code

Ref country code: FR

Ref legal event code: TP

Ref country code: FR

Ref legal event code: CD

Ref country code: FR

Ref legal event code: CA

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 19991130

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20000825

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20000928

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20000929

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20001013

Year of fee payment: 19

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001021

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20001026

Year of fee payment: 19

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20011021

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20011022

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20011031

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20011031

REG Reference to a national code

Ref country code: GB

Ref legal event code: IF02

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20020501

EUG Se: european patent has lapsed

Ref document number: 82109732.6

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20011021

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20020628

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20020501

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST