EP4097668A1 - Secure fiscal eftpos device, slave eftpos cradle and funds transfer method - Google Patents

Secure fiscal eftpos device, slave eftpos cradle and funds transfer method

Info

Publication number
EP4097668A1
EP4097668A1 EP21705607.6A EP21705607A EP4097668A1 EP 4097668 A1 EP4097668 A1 EP 4097668A1 EP 21705607 A EP21705607 A EP 21705607A EP 4097668 A1 EP4097668 A1 EP 4097668A1
Authority
EP
European Patent Office
Prior art keywords
fiscal
eftpos
secure
funds transfer
transfer method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP21705607.6A
Other languages
German (de)
French (fr)
Inventor
Ancuta STOICA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
One4retail Pos+ Corp Srl
Original Assignee
One4retail Pos+ Corp Srl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by One4retail Pos+ Corp Srl filed Critical One4retail Pos+ Corp Srl
Publication of EP4097668A1 publication Critical patent/EP4097668A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • G06F21/87Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/206Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/207Tax processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/209Specified transaction journal output feature, e.g. printed receipt or voice output
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • EFTPOS Electronic Funds Transfer at Point Of Sale
  • a secure fiscal EFTPOS device having a housing and comprising: an EFTPOS battery; computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory, or FM, configured for storing fiscal data; operating system software comprising EFTPOS software and fiscal software; a merchant display configured for facing a merchant operating the EFTPOS device, the merchant display comprising a touch screen; a client display configured for facing towards a client; a printer; a mechanical first anti-tampering mechanism configured for preventing unauthorized access, without marking, to at least the fiscal memory; and a mechanical second anti-tampering mechanism configured for preventing unauthorized access without marking, to at least the housing.
  • a hand-held fiscal system comprising a fiscal printer, a fiscal cash register and an EFTPOS device, the fiscal system comprising: a housing; computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory configured for storing fiscal data; cryptographic hardware; electronic journal hardware; operating system software comprising EFTPOS software and fiscal software; a merchant display configured for facing a user operating the EFTPOS device, the merchant display comprising a touch screen; and a client display configured for facing towards a client.
  • a slave EFTPOS cradle for holding and communicating with a secure fiscal EFTPOS device
  • the EFTPOS cradle comprising: a base portion having a client display; a non-removable EFTPOS holder being configured for removably holding an EFTPOS device, the EFTPOS holder being connected to the base portion via a non-removable leg portion; and wherein the EFTPOS cradle comprises a cradle battery located at the base portion.
  • a funds transfer method configured for use via a single physical fiscal EFTPOS device, the funds transfer method comprising: providing the fiscal EFTPOS device; registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a funds transfer method and performing, or accepting said funds transfer.
  • a funds transfer method configured for use via a single physical fiscal EFTPOS device, the funds transfer method comprising: providing the fiscal EFTPOS device; registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi -merchant ID application and choosing a third party merchant ID; choosing a funds transfer method and performing, or accepting said funds transfer.
  • a funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application choosing a funds transfer method hub choosing a funds transfer method and performing, or accepting said funds transfer.
  • a funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi-merchant ID application and choosing a third party merchant ID choosing a funds transfer method and performing, or accepting said funds transfer.
  • a funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is still loaded into the device’s RAM and receiving CPU time.
  • a funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded in the device’s RAM and receiving CPU time; the method further comprising using a multi-merchant application for switching between different merchant id on the same fiscal EFTPOS device having a single terminal id.
  • the printer can be a thermal printer.
  • the client display can be mounted on a detachable slave EFTPOS cradle.
  • the EFTPOS device can comprise an electronic interface to a cash drawer and/or barcode scanner.
  • the EFTPOS device is PCI and EMV compliant.
  • the EFTPOS device abides by Fiscal regulations at least in Eastern Europe.
  • the operating system software is based on Android, by Google.
  • the merchant display does not have physical buttons.
  • the merchant screen comprises a unitary, continuous, or non-divided, screen, configured for displaying information and receiving input from the merchant or user.
  • the housing comprises external and internal housing surfaces and the second anti tampering mechanism opens out at least partially to the external housing surface.
  • the first anti-tampering mechanism is entirely located within the housing, and is not visible from outside the housing.
  • the second anti -tampering mechanism is connected physically to the first anti-tampering mechanism; and wherein the second anti -tampering mechanism is configured for preventing unauthorized access to the first anti-tampering mechanism.
  • the first anti-tampering mechanism comprises a safe case.
  • the first anti-tampering mechanism comprises a safe case secured to the EFTPOS device via an internal securing screw; and wherein the second anti-tampering mechanism comprises an external securing screw which passes through the safe case of the first anti-tampering mechanism.
  • the EFTPOS device comprises cryptographic hardware which is used in the process of encrypting fiscal data and comprises a cryptographic key in the form of a removable card.
  • the EFTPOS device comprises electronic journal hardware in the form of a removable card which is configured to hold periodical fiscal data.
  • the removable card Upon removal or tampering, the removable card is configured self-lock such that all data becomes non-readable or encrypted.
  • the removable card Upon removal or tampering, the removable card is configured to trigger shut down and software lock of the EFTPOS device.
  • the EFTPOS device includes a security, or anti tampering, mechanism which is activated by a non-authorized removal of the removable electronic journal card, thus locking the data thereon or deleting it; and wherein the EFTPOS device shuts down as a result of the non-authorized removal of the card.
  • the EFTPOS device includes at least one a cellular SIM card.
  • the EFTPOS device can include a physical smart application memory (PS AM) card encryption key for enabling encryption of fiscal data from an electronic journal to be saved on the fiscal memory.
  • PS AM physical smart application memory
  • the leg portion can rotate s relative to the base portion.
  • Communication and power wires can pass through the leg portion and connect between the EFTPOS holder and the base portion.
  • the cradle battery is located withing a base housing of the base portion.
  • the EFTPOS cradle When connected to a power grid, the EFTPOS cradle is configured to charge an EFTPOS battery of the EFTPOS device via power pins located at the EFTPOS holder.
  • the EFTPOS cradle doesn’t comprise a CPU or a printer and is configured as a slave device for the master, EFTPOS device.
  • a secure funds transfer system can include the secure fiscal EFTPOS device and the EFTPOS cradle.
  • the secure fiscal EFTPOS device comprises: a mechanical first anti-tampering mechanism configured for preventing unauthorized access, without marking, to at least the fiscal memory; and a mechanical second anti-tampering mechanism configured for preventing unauthorized access without marking, to at least the housing.
  • Fig. 1 is a top isometric view of an assembled secure fiscal EFTPOS device
  • Fig. 2 is a bottom isometric view of the EFTPOS of Fig. 1 ;
  • Fig. 3 A is a plan view of the EFTPOS of Fig. 1 ;
  • Fig. 3B is a plan view of a stand-alone fiscal system, including the EFTPOS of Fig. 1 with a built-in client display, a fiscal cash register and a fiscal printer;
  • Fig. 4 is a bottom exploded view of the EFTPOS of Fig. 1 ;
  • Fig. 5 is a top isometric view of an EFTPOS PCB of the EFTPOS of Fig. 1 ;
  • Fig. 6 is a plan view of a service area of the EFTPOS of Fig. 1. with a service lid removed and showing a Fiscal Memory safe case;
  • Fig. 7 is a bottom isometric view of the safe case of Fig. 5 showing a securing extension with first and second securing ports;
  • Fig. 8 is a top isometric view of the safe case of Fig. 5 showing the securing extension with a wax-sealable internal securing screw located therein;
  • Fig. 9 is a side cross-sectional view of the EFTPOS device taken along line IX-IX of Fig. 3 A;
  • Fig. 10 is an isometric view of an EFTPOS cradle from a first angle
  • Fig. 11 is an isometric view of the EFTPOS cradle of Fig. 10 from a second angle;
  • Fig. 12 is a bottom isometric view of the EFTPOS cradle of Fig. 10 with a bottom panel removed, depicting the internal components.
  • a secure and mobile funds transfer device, or Electronic Funds Transfer at Point of Sale (EFTPOS) device 10 is a multi-use, cross-platform system that runs the popular “Android” by Google as a main Operating System.
  • the word secure is used herein in the sense that the EFTPOS device 10 also has Fiscal capabilities.
  • the EFTPOS device 10 has a housing 12 and includes at least one internal power supply means 13, computing hardware, communications hardware, printing hardware, storage hardware (removable and non-removable), imaging/optical hardware, audio input and/or output hardware, merchant display 15 with touch input, client display 17, software securing means, Fiscal memory (FM) 14, mechanical securing means for the FM 14, mechanical securing means for the EFTPOS device 10, biometric reading means, removable storage hardware and funds transfer scanning, or reading, hardware such as a magnetic strip reader and/or barcode reader and/or Near Field Communications (NFC) transceiver.
  • the current EFTPOS device 10 can have two SIM card slots 16A, 16B, at least one of which is used for cellular 3G/4G communication.
  • the EFTPOS device 10 can have first and second Physical Smart Application Memory (PS AM) card reader slots 18A, 18B with respective PS AM cards 20 A, 20B.
  • PSAM hardware can be in the form of ISO/IEC 7816 compliant mini SIM type cards 20 A, 20B.
  • the EFTPOS device 10 can have a Trans Flash (TF)/micro SD removable memory slot 21 which can hold a TF/Micro SD card 22 that is used as an Electronic Journal (EJ).
  • TF Trans Flash
  • EJ Electronic Journal
  • the EFTPOS device 10 based on the Android OS, can have various functionality based on the application software installed and hardware addons connected to it. These functionalities/Applications can include the following combinations: A. The EFTPOS device 10 is configured as an EFTPOS (Electronic Funds Transfer at Point Of Sale) for electronic payments. B. The EFTPOS device 10 is configured as a Fiscal Cash Register application with Fiscal Records capabilities for issuing receipts to costumers and recording and issuing fiscal documents required by tax legislation. C. The EFTPOS device 10 is configured as a Fiscal Cash Register with Fiscal Records capabilities and EFTPOS for issuing receipts, fiscal documents and for electronic funds transfer. D.
  • EFTPOS Electronic Funds Transfer at Point Of Sale
  • the EFTPOS device 10 is configured as an EFTPOS with any third party invoice payment application/platform and multi-merchant ID electronic payment of third-party consumer service provider invoices.
  • the EFTPOS device 10 is configured as a Cash Register with EFTPOS and third-party invoice payment applications/platforms for issuing receipts, fiscal documents and making electronic funds transfer and making electronic payments of invoices.
  • the EFTPOS device 10 is configured as an EFTPOS in an integrated ERP application
  • the EFTPOS device 10 is configured as a EFTPOS and third party invoice paying application in an integrated ERP H.
  • the EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP. I.
  • the EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP and EFTPOS for electronic funds transfer.
  • the EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP and EFTPOS and third-party invoice payment applications/platforms for electronic funds transfer and electronic payment of invoices.
  • Each functionality is realized via a at least one specialized Application created especially for the EFTPOS device 10 and was tested to correspond, communicate and work in combination and synchronize with the other Applications.
  • the EFTPOS device 10 can be sold with at least the abovementioned combinations of Applications pre-installed.
  • a merchant operating the EFTPOS device 10 can use/configure the EFTPOS device 10 simultaneously and/or independently, while abiding local tax regulations, for performing: money collection for a 3 rd party and money collection for multiple 3 rd parties and/or self-collection for the merchant.
  • the EFTPOS device 10 is normally used by a single merchant (current EFTPOS user/owner/leaser) who has a personal merchant ID, e.g., merchant ID A, with a certain bank.
  • the merchant ID A is then used by the merchant to accept payments via the EFTPOS device 10, which payment is then transferred/registered to the merchant’s account with the same bank.
  • the term third party paying application in the previous paragraph refers to a scenario where the EFTPOS device 10 can be used with more than one merchant ID, and accept + transfer payment via the EFTPOS device 10 for a third party with a merchant ID B or merchant ID C (etc.) that is different from merchant ID A.
  • the EFTPOS device 10 has a main Printed Circuit Board (PCB), or EFTPOS PCB 24, on which most of the abovementioned hardware is aggregated or at least connected to.
  • PCB Printed Circuit Board
  • the housing 12 has an external housing surface 26 and is separated into detachable front and rear housing portions 28, 30.
  • the housing 12 is preferably made of plastic.
  • the external housing surface 26 can include two EFTPOS power pins 27 for charging the internal power supply means 13.
  • the EFTPOS PCB 24 is rigidly secured to, and located between, the front and rear housing portions 28, 30.
  • the rear housing portion 30 has a service area 32 which opens out to the external housing surface 26.
  • the service area 32 is recessed inwardly in the external housing surface 26.
  • the service area 32 can have four service screws 34 which hold the EFTPOS PCB 24 and secure it to the rear housing portion 30.
  • the service area 32 is completely covered by a secured service lid 36.
  • the service lid 36 preferably has a flexible lid locking tongue 38, that enables holding the service lid 36 in place once an external securing screw 44 has been unscrewed.
  • the lid locking tongue 38 can be elastically pressed such that the service lid 36 can be removed, or released, exposing the service area 32.
  • the lid locking tongue 38 can include a locating recess 40, as will be further explained below.
  • the service area 32 has a second anti-tampering mechanism 42, or means, which includes a wax-sealed external securing screw 44 which is configured to secure at least the service lid 36.
  • the second anti -tampering mechanism 42 also includes means of securing the FM 14, as will be explained below.
  • anti-tampering means is used herein to refer to a mechanism which is designed to prevent access to an area it intended to protect, and if tampered with, it becomes broken, or exhibits physical and visible/noticeable change, which proves said tampering. In other words, it becomes impossible to tamper with, or access, an area protected by the anti-tampering mechanism without leaving a noticeable marking, or irreversible damage to the anti-tampering means.
  • Specialized wax is used to seal the external securing screw 44, to prove unauthorized access to the service area 32.
  • the seal imprint has an elliptical shape with dimensions 8mm x 6mm made of wax or lead.
  • the screws themselves themselves can have a hexagonal seal nut and a groove of 9mm in diameter. This way the seal pin fits well.
  • the service area 32 at an inward-most portion thereof, has a service bottom surface 46 which includes several hardware openings 48 which allow access to various hardware components of the EFTPOS PCB 24, as illustrated in Figs. 4 and 6.
  • the service area 32 can also accommodate, and hold a power source, such as a removable and rechargeable EFTPOS battery 13, allowing mobility and providing power to a Real Time Clock (RTC) of the EFTPOS device 10.
  • the EFTPOS battery 13 can be a Fithium-Ion type Battery.
  • the RTC Real Time Clock
  • the RTC Real Time Clock
  • This PMIC has the main role of providing supply voltages to the main CPU and to the additional hardware (cellular modem, etc.).
  • the PMIC has several secondary functions such as audio IN/OUT interfaces, battery charging, and RTC signalling to the main CPU.
  • This IC is powered from either charging pads (external power), or preferably by the EFTPOS battery 13, in this case - 7.4V, 2600mAh.
  • the PMIC also can also have a small cell coin-type battery for RTC functionality, however, this very small battery doesn’t have the ability to maintain the RTC for a required minimum hours (normally 60 days) in the absence of external power as required by some Fiscal Regulations.
  • the EFTPOS battery 13 is preferably used as a back up battery for the RTC, by limiting the use of the EFTPOS device’s 10 EFTPOS battery 13 only up to, e.g., 60% battery charge.
  • the EFTPOS device is the forced to auto shut-down.
  • the remaining battery percentage is therefore sufficient to maintain the RTC for more than 60 days in the absence of the external power.
  • the basic operation of an RTC circuit is to keep track of the current time and calendar of the unit, even when the EFTPOS device is powered down.
  • the RTC is needed according to Fiscal Regulations so that the operator of the Fiscal cash register should not be required to enter the current date and time each time he is powering the unit after it was disconnected from the power supply. This prevents the user to choose intentionally or not a wrong date and time, and to issue receipts, or daily reports with wrong date and time, which is against the law.
  • the FM 14 has an FM PCB 50 which has a physical data FM interface 52 at a bottom side thereof.
  • the FM interface 52 is preferably a rigid electric cable configured for transferring power and communication between the FM 14 and the EFTPOS PCB 24.
  • the FM 14 can include safeguards against data corruption and deletion.
  • the FM PCB 50 can include a microcontroller, a 4Mbit Flash memory to store fiscal data, and an EEPROM memory for local data processing. To ensure double protection of data, the Flash memory can be split into a main partition and a secondary partition. The same data is written into both partitions to ensure double data retention.
  • the data is preferably stored with a generated Cyclic Redundancy Check (CRC) to check for data integrity when data is read back. If a mismatch occurs between the computed CRC and the stored CRC data is read from back-up partition.
  • CRC Cyclic Redundancy Check
  • the EFTPOS device 10 abides by Fiscal Regulations of at least the eastern Europe countries, but capable to be extended to abide the legislation of any country.
  • the EFTPOS device 10 can have an internal first anti -tampering mechanism 54 which is configured to directly protect the FM 14 and includes at least a secured safe case 56 which is located within the service area 32.
  • the first anti-tampering mechanism 54 is not visible from outside the housing 12.
  • the safe case 56 is preferably located between the service bottom surface 46 and the service lid 36.
  • the FM 14 is located inside the safe case 56.
  • the safe case 56 can be box-shaped, and can appear rectilinear in a plan view.
  • the safe case 56 has an external safe case surface 58 which faces away from the FM 14. No portion oftheFM 14 ortheFMPCB 50 protrudes outwardly from the safe case surface 58.
  • the safe case surface 58 has opposite top and bottom case surfaces 60, 62.
  • the safe case surface 58 has a case data opening 64 which enables passage for the FM interface 52.
  • the safe case 56 further includes mechanical securing means.
  • the securing means can be at least in the form of a securing extension 66.
  • the securing extension 66 enables rigidly securing the safe case 56 in the service area 32.
  • the securing extension 66 enables securing the safe case 56 directly to the service bottom surface 46 within the service area 32.
  • the securing extension 66 extends outwardly from the safe case surface 58 and is a rigid, non-removable portion of the safe case 56.
  • the securing extension 66 has a wax-sealed internal securing screw 68 and can include through first and second securing ports 70, 72.
  • the first and second securing ports 70, 72 are through holes, each of which opens out to the top and bottom case surfaces 60, 62.
  • the external securing screw 44 passes through the second securing port 72 which enables a second layer of mechanical security to the FM 14.
  • the internal securing screw 68 passes through the first securing port 70 and secures the safe case 56 to the service bottom surface 46 within the service area 32.
  • Both the external and internal securing screws 44, 68 are screw-threaded into the service bottom surface 46.
  • the service bottom surface 46 preferably includes metal female threads 74 rigidly secured therein and configured to receive the external and internal securing screws 44, 68.
  • the electronic journal is configured to store all periodical fiscal transactions, until it needs to be transferred to the tax authorities via the internet or an external mobile storage device such, e.g., a memory stick.
  • the EJ is stored on the EJ TF card 22.
  • the EFTPOS device 10 and specifically, a dedicated fiscal cash register application, compiles and encrypts the data and saves it on the FM 14, such that it can be transferred securely via any appropriate medium.
  • EJ TF card slot 21 has a hot-swappable mechanism, which sends a signal to the EFTPOS device 10 once the EJ TF card 22 is removed or moved.
  • the fiscal application prevents the fiscal printer 29 to operate, and preferably the EFTPOS device 10 shuts down.
  • the EJ TF card 22 data cannot be accessed outside the EFTPOS device 10, or the TF card slot 21.
  • the hot-swappable mechanism is mechanical and has click-in and click-out positions which, amongst other advantages, ensures that the EJ TF card 22 is either removed, or is secured in its place and appropriately connected to the TF card slot 21. In other words, the EJ TF 22 has to be pushed all the way into the reader slot against a spring, until an audible click is emitted, confirming EJ TF card 22 reached its final location.
  • the EFTPOS device 10 can have an ISO/IEC 7816 compliant mini Smart Card Secure Access Module 20B.
  • a different card 20 A also in the shape of a ISO/IEC 7816 compliant mini Smart Card that is placed into SAM slot 18A and connects RESET pin, or jumper, of SAM card connector to VCC thus triggering software to special, service mode.
  • the EFTPOS device 10 can be sold together with, or separately from, a specialized EFTPOS cradle 74 configured for removably holding, connecting, charging and communicating with, the EFTPOS device 10.
  • the EFTPOS cradle 74 is a slave device and does not include any fiscal hardware.
  • the slave EFTPOS cradle 74 is controlled by the EFTPOS device 10.
  • the EFTPOS cradle 74 includes a base portion 76, a non-removable leg portion 78 connected to the base portion 76 and a non-removable EFTPOS holder 80 which is shaped and configured to removably hold, communicate and charge a mobile EFTPOS device 10.
  • the base portion 76 includes the client display 17, can include USB type A ports 82, Cash drawer connector in form of USB type C 83 and a cradle charging port 84.
  • the base portion 76 further includes a type USB-C male cable 86 configured at least for transferring data at least from the EFTPOS device 10 and for connecting the EFTPOS device 10 with the USB ports 82 and the client display 17 in a respective master-slave relationship.
  • the EFTPOS cradle 74 effectively operates as a slave USB hub with a screen.
  • the base portion 76 has a base housing 88.
  • the base housing 88 can include a rotation mechanism 90 to which the leg portion 78 can be connected.
  • the rotation mechanism 90 enables rotation of the leg portion 78 and the EFTPOS holder 80 with respect to the base portion 76.
  • the rotation mechanism 90 enables a merchant to rotate the EFTPOS holder 80 towards the client, e.g., to allow the client to enter a PIN/password into the EFTPOS device 10.
  • the base portion 76 further includes a main cradle PCB 92 to which the various electric components and wires are connected.
  • the main cradle PCB 92 is located internally, in its entirety, within the base housing 88.
  • the client display 17 is located at the base housing 88 and faces away therefrom. According to an embodiment shown in Fig. 3B, the client display 17 is located on the housing 12 which then enables the EFTPOS device 10 to be configured as, and operate as, a hand-held, stand alone mobile fiscal cash register and/or fiscal printer 29.
  • the phrase stand-alone is used in the sense of an all-in-one single fiscal and EFTPOS device/system which incorporates EFTPOS functions, as well as fiscal cash register and fiscal printer.
  • the base portion 76 has a rechargeable cradle battery 94 which is located internally, within the base housing 88.
  • the cradle battery 94 is configured to generally power the EFTPOS cradle 74, and specifically the main cradle PCB 92, which enables mobility for the EFTPOS cradle 74 and the EFTPOS device 10.
  • the cradle charging port 84 is configured to provide power to the main cradle PCB 92, which, in turn can charge the cradle battery 94.
  • the USB type A ports 82 are configured for providing communication and/or power to external, add-on devices such as, e.g., USB thumb drives, a barcode reader, etc.
  • the EFTPOS cradle 74 includes two USB ports 82. Beside the abovementioned characteristics, the main cradle PCB 92 also provides the signalling for cash drawer interfaces, with external connection 83.
  • the leg portion 78 is hollow, and enables passage for communications and power wires which connect the EFTPOS holder 80 to the main cradle PCB 92 located at the base portion 76.
  • the EFTPOS holder 80 has a holder top surface 96.
  • the holder top surface 96 can include two cradle power pins 98 which enable charging the EFTPOS device 10 via the EFTPOS power pins 27.
  • the EFTPOS holder top surface 96 can further include a locating means 100 which secures and locates the EFTPOS device 10 onto the holder top surface 96 in a specific location and orientation.
  • the locating means can be an EFTPOS holder protrusion 100 which protrudes outwardly from the EFTPOS holder top surface 96.
  • the EFTPOS holder protrusion 100 is configured to be received in the respective locating recess 40 of the lid locking tongue 38.
  • the EFTPOS holder 80 can include a hinge 102 located between the EFTPOS holder top surface 96 and the base portion 76, which connects the EFTPOS holder 80 to the leg portion 78.
  • the hinge 102 enables users to pivot the EFTPOS holder 80 to an optimal viewing position.
  • the main cradle PCB 92 includes the electronic circuits that allows the EFTPOS device 10, or a cash register, equipped with only one USB port to be connected to multiple USB peripherals at same time, such as USB barcode scanner, USB mass storage devices, USB Client display, etc.
  • the USB ports allows the main cradle PCB 92 to function as a USB hub and connect with up to 3 devices simultaneously: two external USB ports 82 via USB type A connector and one internal device - a USB Client display 17. Beside the USB ports 82, the main PCB also includes the electronics for driving, and/or operating, the USB Client display 17 and a Cash Drawer interface for a cash drawer.
  • the Cash Drawer commands are sent via USB Client display connection, using special commands. When the circuit is triggered it generates a pulse of about 28 V that energizes a Cash Drawer coil of the cash drawer.
  • a USB type C connector is used for Cash Drawer output interface.
  • the USB type C receptacle/female connector 83 is connected to a secondary cradle PCB 93 along with a large storage capacitor 95, due to space concerns.
  • the EFTPOS cradle is provided with a specialized and flexible adapter cable which has a male USB-C on one end, and a female RJ11 on the opposite end. Therefore, any cash register with an RJ11 type male connector may reliably and flexibly connect with the EFTPOS device 10.
  • the large storage capacitor 95 stores the energy that is delivered to the Cash Drawer electromagnet.
  • main cradle PCB 92 beside the circuits already mentioned are the electronics for charging the cradle battery 94 from the cradle charging port 84 and the circuits that converts the battery voltage to the voltage needed by USB hub and Client Display when operating only on battery power.
  • a first funds transfer method can be used with the single physical fiscal EFTPOS device 10, the funds transfer method includes the following steps: a. providing the fiscal EFTPOS device 10; b. registering a fiscal transaction using a fiscal cash register application; c. choosing a funds transfer method hub; d. choosing a funds transfer method and performing, or accepting said funds transfer.
  • a second funds transfer method which can be uses with the single physical fiscal EFTPOS device 10, the second funds transfer method includes the following steps: a. providing the fiscal EFTPOS device 10; b. registering a fiscal transaction using a fiscal cash register application; c. choosing a funds transfer method hub; d.
  • a third funds transfer method which can be used with the single physical fiscal EFTPOS device 10 which runs Android OS.
  • the third funds transfer method includes using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded into the device’s RAM and receiving CPU time.
  • a fourth funds transfer method which can be used with the single physical fiscal EFTPOS device, the fourth funds transfer method includes using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded in the device’s RAM and receiving CPU time; and further includes using a multi-merchant application for switching between different merchant id’s.

Abstract

A secure fiscal EFTPOS device includes a housing which includes an EFTPOS battery, computing hardware, fiscal hardware, an operating system software having EFTPOS software and fiscal software, a touch screen merchant display, a printer and at least a mechanical first anti-tampering mechanism for preventing unauthorized access, without marking, to at least the fiscal hardware.

Description

SECURE FISCAL EFTPOS DEVICE, SLAVE EFTPOS CRADLE AND FUNDS
TRANSFER METHOD
FIELD OF THE INVENTION
[001 ] The subject matter of the current application relates to Electronic Funds Transfer at Point Of Sale (EFTPOS) devices. Specifically, it relates to EFTPOS devices which include Fiscal hardware, abide by Fiscal regulations, and operate as a Fiscal cash register, and/or a Fiscal Printer and a cashier device.
SUMMARY OF THE INVENTION
[001 ] In accordance with a first aspect according to the subject matter of the present application there is provided a secure fiscal EFTPOS device, having a housing and comprising: an EFTPOS battery; computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory, or FM, configured for storing fiscal data; operating system software comprising EFTPOS software and fiscal software; a merchant display configured for facing a merchant operating the EFTPOS device, the merchant display comprising a touch screen; a client display configured for facing towards a client; a printer; a mechanical first anti-tampering mechanism configured for preventing unauthorized access, without marking, to at least the fiscal memory; and a mechanical second anti-tampering mechanism configured for preventing unauthorized access without marking, to at least the housing.
[002] In accordance with a second aspect according to the subject matter of the present application there is provided a hand-held fiscal system comprising a fiscal printer, a fiscal cash register and an EFTPOS device, the fiscal system comprising: a housing; computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory configured for storing fiscal data; cryptographic hardware; electronic journal hardware; operating system software comprising EFTPOS software and fiscal software; a merchant display configured for facing a user operating the EFTPOS device, the merchant display comprising a touch screen; and a client display configured for facing towards a client.
[003 ] In accordance with a third aspect according to the subject matter of the present application there is provided a slave EFTPOS cradle for holding and communicating with a secure fiscal EFTPOS device, the EFTPOS cradle comprising: a base portion having a client display; a non-removable EFTPOS holder being configured for removably holding an EFTPOS device, the EFTPOS holder being connected to the base portion via a non-removable leg portion; and wherein the EFTPOS cradle comprises a cradle battery located at the base portion.
[004] In accordance with a fourth aspect according to the subject matter of the present application there is provided a funds transfer method configured for use via a single physical fiscal EFTPOS device, the funds transfer method comprising: providing the fiscal EFTPOS device; registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a funds transfer method and performing, or accepting said funds transfer.
[005] In accordance with a fifth aspect according to the subject matter of the present application there is provided a funds transfer method configured for use via a single physical fiscal EFTPOS device, the funds transfer method comprising: providing the fiscal EFTPOS device; registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi -merchant ID application and choosing a third party merchant ID; choosing a funds transfer method and performing, or accepting said funds transfer.
[006] In accordance with a sixth aspect according to the subject matter of the present application there is provided a funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application choosing a funds transfer method hub choosing a funds transfer method and performing, or accepting said funds transfer.
[007] In accordance with an seventh aspect according to the subject matter of the present application there is provided a funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi-merchant ID application and choosing a third party merchant ID choosing a funds transfer method and performing, or accepting said funds transfer.
[008] In accordance with an eighth aspect according to the subject matter of the present application there is provided a funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is still loaded into the device’s RAM and receiving CPU time.
[009] In accordance with a ninth aspect according to the subject matter of the present application there is provided a funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded in the device’s RAM and receiving CPU time; the method further comprising using a multi-merchant application for switching between different merchant id on the same fiscal EFTPOS device having a single terminal id.
[0010] Any of the following features, either alone or in combination, may be applicable to any of the above aspects of the subject matter of the application: [0011 ] The printer can be a thermal printer.
[0012] The client display can be mounted on a detachable slave EFTPOS cradle.
[0013] The EFTPOS device can comprise an electronic interface to a cash drawer and/or barcode scanner.
[0014] The EFTPOS device is PCI and EMV compliant.
[0015] The EFTPOS device abides by Fiscal regulations at least in Eastern Europe.
[0016] The operating system software is based on Android, by Google.
[0017] The merchant display does not have physical buttons.
[0018] The merchant screen comprises a unitary, continuous, or non-divided, screen, configured for displaying information and receiving input from the merchant or user.
[0019] The housing comprises external and internal housing surfaces and the second anti tampering mechanism opens out at least partially to the external housing surface.
[0020] The first anti-tampering mechanism is entirely located within the housing, and is not visible from outside the housing.
[0021] In a secure state of the EFTPOS device, the second anti -tampering mechanism is connected physically to the first anti-tampering mechanism; and wherein the second anti -tampering mechanism is configured for preventing unauthorized access to the first anti-tampering mechanism. [0022] The first anti-tampering mechanism comprises a safe case.
[0023] Fiscal data is saved on a fiscal memory PCB, which is located within the safe case.
[0024] The first anti-tampering mechanism comprises a safe case secured to the EFTPOS device via an internal securing screw; and wherein the second anti-tampering mechanism comprises an external securing screw which passes through the safe case of the first anti-tampering mechanism. [0025] The EFTPOS device comprises cryptographic hardware which is used in the process of encrypting fiscal data and comprises a cryptographic key in the form of a removable card.
[0026] The EFTPOS device comprises electronic journal hardware in the form of a removable card which is configured to hold periodical fiscal data.
[0027] Upon removal or tampering, the removable card is configured self-lock such that all data becomes non-readable or encrypted.
[0028] Upon removal or tampering, the removable card is configured to trigger shut down and software lock of the EFTPOS device.
[0029] The EFTPOS device includes a security, or anti tampering, mechanism which is activated by a non-authorized removal of the removable electronic journal card, thus locking the data thereon or deleting it; and wherein the EFTPOS device shuts down as a result of the non-authorized removal of the card.
[0030] The EFTPOS device includes at least one a cellular SIM card.
[0031] The EFTPOS device can include a physical smart application memory (PS AM) card encryption key for enabling encryption of fiscal data from an electronic journal to be saved on the fiscal memory.
[0032] The leg portion can rotate s relative to the base portion.
[0033] Communication and power wires can pass through the leg portion and connect between the EFTPOS holder and the base portion.
[0034] The cradle battery is located withing a base housing of the base portion.
[0035] When connected to a power grid, the EFTPOS cradle is configured to charge an EFTPOS battery of the EFTPOS device via power pins located at the EFTPOS holder.
[0036] The EFTPOS cradle doesn’t comprise a CPU or a printer and is configured as a slave device for the master, EFTPOS device.
[0037] A secure funds transfer system can include the secure fiscal EFTPOS device and the EFTPOS cradle.
[0038] The secure fiscal EFTPOS device comprises: a mechanical first anti-tampering mechanism configured for preventing unauthorized access, without marking, to at least the fiscal memory; and a mechanical second anti-tampering mechanism configured for preventing unauthorized access without marking, to at least the housing.
BRIEF DESCRIPTION OF THE DRAWINGS
[002] For a better understanding of the subject matter of the present application and to show how the same may be carried out in practice, reference will now be made to the accompanying drawings, in which:
Fig. 1 is a top isometric view of an assembled secure fiscal EFTPOS device;
Fig. 2 is a bottom isometric view of the EFTPOS of Fig. 1 ;
Fig. 3 A is a plan view of the EFTPOS of Fig. 1 ;
Fig. 3B is a plan view of a stand-alone fiscal system, including the EFTPOS of Fig. 1 with a built-in client display, a fiscal cash register and a fiscal printer; Fig. 4 is a bottom exploded view of the EFTPOS of Fig. 1 ;
Fig. 5 is a top isometric view of an EFTPOS PCB of the EFTPOS of Fig. 1 ;
Fig. 6 is a plan view of a service area of the EFTPOS of Fig. 1. with a service lid removed and showing a Fiscal Memory safe case;
Fig. 7 is a bottom isometric view of the safe case of Fig. 5 showing a securing extension with first and second securing ports;
Fig. 8 is a top isometric view of the safe case of Fig. 5 showing the securing extension with a wax-sealable internal securing screw located therein;
Fig. 9 is a side cross-sectional view of the EFTPOS device taken along line IX-IX of Fig. 3 A;
Fig. 10 is an isometric view of an EFTPOS cradle from a first angle; and
Fig. 11 is an isometric view of the EFTPOS cradle of Fig. 10 from a second angle; and
Fig. 12 is a bottom isometric view of the EFTPOS cradle of Fig. 10 with a bottom panel removed, depicting the internal components.
DETAILED DESCRIPTION OF THE INVENTION
[003] In the following description, various aspects of the subject matter of the present application will be described. For purposes of explanation, specific configurations and details are set forth in sufficient detail to provide a thorough understanding of the subject matter of the present application. However, it will also be apparent to one skilled in the art that the subject matter of the present application can be practiced without some specific configurations and details presented herein.
[004] Reference is made to Figs. 1-4. According to an embodiment of the current Patent Application, a secure and mobile funds transfer device, or Electronic Funds Transfer at Point of Sale (EFTPOS) device 10 is a multi-use, cross-platform system that runs the popular “Android” by Google as a main Operating System. The word secure is used herein in the sense that the EFTPOS device 10 also has Fiscal capabilities. The EFTPOS device 10 has a housing 12 and includes at least one internal power supply means 13, computing hardware, communications hardware, printing hardware, storage hardware (removable and non-removable), imaging/optical hardware, audio input and/or output hardware, merchant display 15 with touch input, client display 17, software securing means, Fiscal memory (FM) 14, mechanical securing means for the FM 14, mechanical securing means for the EFTPOS device 10, biometric reading means, removable storage hardware and funds transfer scanning, or reading, hardware such as a magnetic strip reader and/or barcode reader and/or Near Field Communications (NFC) transceiver. Specifically, the current EFTPOS device 10 can have two SIM card slots 16A, 16B, at least one of which is used for cellular 3G/4G communication. The EFTPOS device 10 can have first and second Physical Smart Application Memory (PS AM) card reader slots 18A, 18B with respective PS AM cards 20 A, 20B. The PSAM hardware can be in the form of ISO/IEC 7816 compliant mini SIM type cards 20 A, 20B. The EFTPOS device 10 can have a Trans Flash (TF)/micro SD removable memory slot 21 which can hold a TF/Micro SD card 22 that is used as an Electronic Journal (EJ).
[005] The EFTPOS device 10, based on the Android OS, can have various functionality based on the application software installed and hardware addons connected to it. These functionalities/Applications can include the following combinations: A. The EFTPOS device 10 is configured as an EFTPOS (Electronic Funds Transfer at Point Of Sale) for electronic payments. B. The EFTPOS device 10 is configured as a Fiscal Cash Register application with Fiscal Records capabilities for issuing receipts to costumers and recording and issuing fiscal documents required by tax legislation. C. The EFTPOS device 10 is configured as a Fiscal Cash Register with Fiscal Records capabilities and EFTPOS for issuing receipts, fiscal documents and for electronic funds transfer. D. The EFTPOS device 10 is configured as an EFTPOS with any third party invoice payment application/platform and multi-merchant ID electronic payment of third-party consumer service provider invoices. E. The EFTPOS device 10 is configured as a Cash Register with EFTPOS and third-party invoice payment applications/platforms for issuing receipts, fiscal documents and making electronic funds transfer and making electronic payments of invoices. F. The EFTPOS device 10 is configured as an EFTPOS in an integrated ERP application G. The EFTPOS device 10 is configured as a EFTPOS and third party invoice paying application in an integrated ERP H. The EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP. I. The EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP and EFTPOS for electronic funds transfer. J. The EFTPOS device 10 is configured as a Fiscal Printer 29 with Fiscal Records capabilities for issuing receipts and fiscal documents and storing fiscal records made by an external cash register application/interface of an ERP and EFTPOS and third-party invoice payment applications/platforms for electronic funds transfer and electronic payment of invoices. Each functionality is realized via a at least one specialized Application created especially for the EFTPOS device 10 and was tested to correspond, communicate and work in combination and synchronize with the other Applications. For example, the Depending on the merchant’s business needs, the EFTPOS device 10 can be sold with at least the abovementioned combinations of Applications pre-installed.
[006] Stated generally, a merchant operating the EFTPOS device 10 can use/configure the EFTPOS device 10 simultaneously and/or independently, while abiding local tax regulations, for performing: money collection for a 3rd party and money collection for multiple 3rd parties and/or self-collection for the merchant.
[007] The EFTPOS device 10 is normally used by a single merchant (current EFTPOS user/owner/leaser) who has a personal merchant ID, e.g., merchant ID A, with a certain bank. The merchant ID A is then used by the merchant to accept payments via the EFTPOS device 10, which payment is then transferred/registered to the merchant’s account with the same bank. The term third party paying application in the previous paragraph refers to a scenario where the EFTPOS device 10 can be used with more than one merchant ID, and accept + transfer payment via the EFTPOS device 10 for a third party with a merchant ID B or merchant ID C (etc.) that is different from merchant ID A. Thus, advantageously expanding the range of actions that a single fiscal EFTPOS device can perform and negating the use of multiple EFTPOS devices. This is performed simply by switching between Payment Applications in the OS. A multi-merchant Application then switches between the current and chosen merchant ID and the selected merchant ID is transmitted to the bank. It is noted that the fiscal Application always runs in the background, and is loaded to the RAM, such that every fiscal transaction made with merchant ID A (direct payment to the owner) is automatically registered by the fiscal Application.
[008] The EFTPOS device 10 has a main Printed Circuit Board (PCB), or EFTPOS PCB 24, on which most of the abovementioned hardware is aggregated or at least connected to.
[009] Reference is made to Fig. 4. The housing 12 has an external housing surface 26 and is separated into detachable front and rear housing portions 28, 30. The housing 12 is preferably made of plastic. The external housing surface 26 can include two EFTPOS power pins 27 for charging the internal power supply means 13.
[0010] The EFTPOS PCB 24 is rigidly secured to, and located between, the front and rear housing portions 28, 30. [0011 ] The rear housing portion 30 has a service area 32 which opens out to the external housing surface 26. The service area 32 is recessed inwardly in the external housing surface 26. The service area 32 can have four service screws 34 which hold the EFTPOS PCB 24 and secure it to the rear housing portion 30.
[0012] The service area 32 is completely covered by a secured service lid 36. The service lid 36 preferably has a flexible lid locking tongue 38, that enables holding the service lid 36 in place once an external securing screw 44 has been unscrewed. The lid locking tongue 38 can be elastically pressed such that the service lid 36 can be removed, or released, exposing the service area 32. The lid locking tongue 38 can include a locating recess 40, as will be further explained below.
[0013] The service area 32 has a second anti-tampering mechanism 42, or means, which includes a wax-sealed external securing screw 44 which is configured to secure at least the service lid 36. The second anti -tampering mechanism 42 also includes means of securing the FM 14, as will be explained below.
[0014] The term anti-tampering means is used herein to refer to a mechanism which is designed to prevent access to an area it intended to protect, and if tampered with, it becomes broken, or exhibits physical and visible/noticeable change, which proves said tampering. In other words, it becomes impossible to tamper with, or access, an area protected by the anti-tampering mechanism without leaving a noticeable marking, or irreversible damage to the anti-tampering means. Specialized wax is used to seal the external securing screw 44, to prove unauthorized access to the service area 32. The seal imprint has an elliptical shape with dimensions 8mm x 6mm made of wax or lead. The screws themselves can have a hexagonal seal nut and a groove of 9mm in diameter. This way the seal pin fits well.
[0015] The service area 32, at an inward-most portion thereof, has a service bottom surface 46 which includes several hardware openings 48 which allow access to various hardware components of the EFTPOS PCB 24, as illustrated in Figs. 4 and 6. The service area 32 can also accommodate, and hold a power source, such as a removable and rechargeable EFTPOS battery 13, allowing mobility and providing power to a Real Time Clock (RTC) of the EFTPOS device 10. The EFTPOS battery 13 can be a Fithium-Ion type Battery. The RTC (Real Time Clock) available to users via the Android Operating System and is preferably implemented within the PMIC (Power Management Integrated Circuit). This PMIC has the main role of providing supply voltages to the main CPU and to the additional hardware (cellular modem, etc.). The PMIC has several secondary functions such as audio IN/OUT interfaces, battery charging, and RTC signalling to the main CPU. This IC is powered from either charging pads (external power), or preferably by the EFTPOS battery 13, in this case - 7.4V, 2600mAh. The PMIC also can also have a small cell coin-type battery for RTC functionality, however, this very small battery doesn’t have the ability to maintain the RTC for a required minimum hours (normally 60 days) in the absence of external power as required by some Fiscal Regulations. Thus, the EFTPOS battery 13 is preferably used as a back up battery for the RTC, by limiting the use of the EFTPOS device’s 10 EFTPOS battery 13 only up to, e.g., 60% battery charge. Once it reaches said charge, the EFTPOS device is the forced to auto shut-down. The remaining battery percentage is therefore sufficient to maintain the RTC for more than 60 days in the absence of the external power. The basic operation of an RTC circuit is to keep track of the current time and calendar of the unit, even when the EFTPOS device is powered down.
[0016] The RTC is needed according to Fiscal Regulations so that the operator of the Fiscal cash register should not be required to enter the current date and time each time he is powering the unit after it was disconnected from the power supply. This prevents the user to choose intentionally or not a wrong date and time, and to issue receipts, or daily reports with wrong date and time, which is against the law.
[0017]
[0018] The FM 14 has an FM PCB 50 which has a physical data FM interface 52 at a bottom side thereof. The FM interface 52 is preferably a rigid electric cable configured for transferring power and communication between the FM 14 and the EFTPOS PCB 24. The FM 14 can include safeguards against data corruption and deletion. The FM PCB 50 can include a microcontroller, a 4Mbit Flash memory to store fiscal data, and an EEPROM memory for local data processing. To ensure double protection of data, the Flash memory can be split into a main partition and a secondary partition. The same data is written into both partitions to ensure double data retention. The data is preferably stored with a generated Cyclic Redundancy Check (CRC) to check for data integrity when data is read back. If a mismatch occurs between the computed CRC and the stored CRC data is read from back-up partition.
[0019] The EFTPOS device 10 abides by Fiscal Regulations of at least the eastern Europe countries, but capable to be extended to abide the legislation of any country.
[0020] The EFTPOS device 10 can have an internal first anti -tampering mechanism 54 which is configured to directly protect the FM 14 and includes at least a secured safe case 56 which is located within the service area 32. The first anti-tampering mechanism 54 is not visible from outside the housing 12. The safe case 56 is preferably located between the service bottom surface 46 and the service lid 36. The FM 14 is located inside the safe case 56. The safe case 56 can be box-shaped, and can appear rectilinear in a plan view. The safe case 56 has an external safe case surface 58 which faces away from the FM 14. No portion oftheFM 14 ortheFMPCB 50 protrudes outwardly from the safe case surface 58. The safe case surface 58 has opposite top and bottom case surfaces 60, 62. The safe case surface 58 has a case data opening 64 which enables passage for the FM interface 52.
[0021 ] The safe case 56 further includes mechanical securing means. The securing means can be at least in the form of a securing extension 66. The securing extension 66 enables rigidly securing the safe case 56 in the service area 32. According to the present embodiment, the securing extension 66 enables securing the safe case 56 directly to the service bottom surface 46 within the service area 32. The securing extension 66 extends outwardly from the safe case surface 58 and is a rigid, non-removable portion of the safe case 56. The securing extension 66 has a wax-sealed internal securing screw 68 and can include through first and second securing ports 70, 72. The first and second securing ports 70, 72 are through holes, each of which opens out to the top and bottom case surfaces 60, 62. The external securing screw 44 passes through the second securing port 72 which enables a second layer of mechanical security to the FM 14. The internal securing screw 68 passes through the first securing port 70 and secures the safe case 56 to the service bottom surface 46 within the service area 32.
[0022] Both the external and internal securing screws 44, 68 are screw-threaded into the service bottom surface 46. Specifically, the service bottom surface 46 preferably includes metal female threads 74 rigidly secured therein and configured to receive the external and internal securing screws 44, 68.
[0023] The electronic journal (EJ) is configured to store all periodical fiscal transactions, until it needs to be transferred to the tax authorities via the internet or an external mobile storage device such, e.g., a memory stick. As mentioned, the EJ is stored on the EJ TF card 22. To transfer the generated Fiscal data, the EFTPOS device 10, and specifically, a dedicated fiscal cash register application, compiles and encrypts the data and saves it on the FM 14, such that it can be transferred securely via any appropriate medium. According to the present Application, EJ TF card slot 21 has a hot-swappable mechanism, which sends a signal to the EFTPOS device 10 once the EJ TF card 22 is removed or moved. As a direct result from that signal, and according to Fiscal regulations, in this scenario the fiscal application prevents the fiscal printer 29 to operate, and preferably the EFTPOS device 10 shuts down. The EJ TF card 22 data cannot be accessed outside the EFTPOS device 10, or the TF card slot 21. The hot-swappable mechanism is mechanical and has click-in and click-out positions which, amongst other advantages, ensures that the EJ TF card 22 is either removed, or is secured in its place and appropriately connected to the TF card slot 21. In other words, the EJ TF 22 has to be pushed all the way into the reader slot against a spring, until an audible click is emitted, confirming EJ TF card 22 reached its final location. To take out the EJ TF card 22, it also has to be pushed until another audible click is emitted, at which point the EJ TF card 22 is forced out of the slot by the spring, at which point, the EFTPOS device 10 shuts down. [0024] Aside from one or two SIM cards 16A and 16B used for cellular communications, in order to sign or encrypt the Fiscal data, and abide by Fiscal regulations, the EFTPOS device 10 can have an ISO/IEC 7816 compliant mini Smart Card Secure Access Module 20B. In order to secure access to specific service menus and operating mode a different card 20 A, also in the shape of a ISO/IEC 7816 compliant mini Smart Card that is placed into SAM slot 18A and connects RESET pin, or jumper, of SAM card connector to VCC thus triggering software to special, service mode.
[0025] The EFTPOS device 10 can be sold together with, or separately from, a specialized EFTPOS cradle 74 configured for removably holding, connecting, charging and communicating with, the EFTPOS device 10. The EFTPOS cradle 74 is a slave device and does not include any fiscal hardware. The slave EFTPOS cradle 74 is controlled by the EFTPOS device 10.
[0026] The EFTPOS cradle 74 includes a base portion 76, a non-removable leg portion 78 connected to the base portion 76 and a non-removable EFTPOS holder 80 which is shaped and configured to removably hold, communicate and charge a mobile EFTPOS device 10.
[0027] The base portion 76 includes the client display 17, can include USB type A ports 82, Cash drawer connector in form of USB type C 83 and a cradle charging port 84. The base portion 76 further includes a type USB-C male cable 86 configured at least for transferring data at least from the EFTPOS device 10 and for connecting the EFTPOS device 10 with the USB ports 82 and the client display 17 in a respective master-slave relationship. Thus, the EFTPOS cradle 74 effectively operates as a slave USB hub with a screen.
[0028] The base portion 76 has a base housing 88. The base housing 88 can include a rotation mechanism 90 to which the leg portion 78 can be connected. The rotation mechanism 90 enables rotation of the leg portion 78 and the EFTPOS holder 80 with respect to the base portion 76. The rotation mechanism 90 enables a merchant to rotate the EFTPOS holder 80 towards the client, e.g., to allow the client to enter a PIN/password into the EFTPOS device 10. [0029] The base portion 76 further includes a main cradle PCB 92 to which the various electric components and wires are connected. The main cradle PCB 92 is located internally, in its entirety, within the base housing 88.
[0030] The client display 17 is located at the base housing 88 and faces away therefrom. According to an embodiment shown in Fig. 3B, the client display 17 is located on the housing 12 which then enables the EFTPOS device 10 to be configured as, and operate as, a hand-held, stand alone mobile fiscal cash register and/or fiscal printer 29. The phrase stand-alone is used in the sense of an all-in-one single fiscal and EFTPOS device/system which incorporates EFTPOS functions, as well as fiscal cash register and fiscal printer.
[0031 ] The base portion 76 has a rechargeable cradle battery 94 which is located internally, within the base housing 88. The cradle battery 94 is configured to generally power the EFTPOS cradle 74, and specifically the main cradle PCB 92, which enables mobility for the EFTPOS cradle 74 and the EFTPOS device 10.
[0032] The cradle charging port 84 is configured to provide power to the main cradle PCB 92, which, in turn can charge the cradle battery 94. The USB type A ports 82 are configured for providing communication and/or power to external, add-on devices such as, e.g., USB thumb drives, a barcode reader, etc. According to the present example, the EFTPOS cradle 74 includes two USB ports 82. Beside the abovementioned characteristics, the main cradle PCB 92 also provides the signalling for cash drawer interfaces, with external connection 83.
[0033] The leg portion 78 is hollow, and enables passage for communications and power wires which connect the EFTPOS holder 80 to the main cradle PCB 92 located at the base portion 76. [0034] The EFTPOS holder 80 has a holder top surface 96. The holder top surface 96 can include two cradle power pins 98 which enable charging the EFTPOS device 10 via the EFTPOS power pins 27. The EFTPOS holder top surface 96 can further include a locating means 100 which secures and locates the EFTPOS device 10 onto the holder top surface 96 in a specific location and orientation. The locating means can be an EFTPOS holder protrusion 100 which protrudes outwardly from the EFTPOS holder top surface 96. The EFTPOS holder protrusion 100 is configured to be received in the respective locating recess 40 of the lid locking tongue 38.
[0035] The EFTPOS holder 80 can include a hinge 102 located between the EFTPOS holder top surface 96 and the base portion 76, which connects the EFTPOS holder 80 to the leg portion 78. The hinge 102 enables users to pivot the EFTPOS holder 80 to an optimal viewing position. [0036] The main cradle PCB 92 includes the electronic circuits that allows the EFTPOS device 10, or a cash register, equipped with only one USB port to be connected to multiple USB peripherals at same time, such as USB barcode scanner, USB mass storage devices, USB Client display, etc. The USB ports allows the main cradle PCB 92 to function as a USB hub and connect with up to 3 devices simultaneously: two external USB ports 82 via USB type A connector and one internal device - a USB Client display 17. Beside the USB ports 82, the main PCB also includes the electronics for driving, and/or operating, the USB Client display 17 and a Cash Drawer interface for a cash drawer. The Cash Drawer commands are sent via USB Client display connection, using special commands. When the circuit is triggered it generates a pulse of about 28 V that energizes a Cash Drawer coil of the cash drawer. To maintain a low profile, and to fit the base housing’s 88 relatively small size and slim form, for the connector female side 83, a USB type C connector is used for Cash Drawer output interface. The USB type C receptacle/female connector 83 is connected to a secondary cradle PCB 93 along with a large storage capacitor 95, due to space concerns. The EFTPOS cradle is provided with a specialized and flexible adapter cable which has a male USB-C on one end, and a female RJ11 on the opposite end. Therefore, any cash register with an RJ11 type male connector may reliably and flexibly connect with the EFTPOS device 10. [0037] The large storage capacitor 95 stores the energy that is delivered to the Cash Drawer electromagnet. On the main cradle PCB 92 beside the circuits already mentioned are the electronics for charging the cradle battery 94 from the cradle charging port 84 and the circuits that converts the battery voltage to the voltage needed by USB hub and Client Display when operating only on battery power.
[0038] According to embodiments of the present Application, a first funds transfer method can be used with the single physical fiscal EFTPOS device 10, the funds transfer method includes the following steps: a. providing the fiscal EFTPOS device 10; b. registering a fiscal transaction using a fiscal cash register application; c. choosing a funds transfer method hub; d. choosing a funds transfer method and performing, or accepting said funds transfer. [0039] There is further provided a second funds transfer method which can be uses with the single physical fiscal EFTPOS device 10, the second funds transfer method includes the following steps: a. providing the fiscal EFTPOS device 10; b. registering a fiscal transaction using a fiscal cash register application; c. choosing a funds transfer method hub; d. choosing a multi-merchant ID application and choosing a third-party merchant ID; e. choosing a funds transfer method and performing, or accepting said funds transfer. [0040] There is further provided a third funds transfer method which can be used with the single physical fiscal EFTPOS device 10 which runs Android OS. The third funds transfer method includes using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded into the device’s RAM and receiving CPU time.
[0041 ] There is further provided a fourth funds transfer method which can be used with the single physical fiscal EFTPOS device, the fourth funds transfer method includes using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded in the device’s RAM and receiving CPU time; and further includes using a multi-merchant application for switching between different merchant id’s.

Claims

1. A secure fiscal EFTPOS device (10), having a housing (12) and comprising: an EFTPOS battery (13); computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory (14), an operating system software comprising EFTPOS software and fiscal software; a merchant display (15) configured for facing a merchant operating the secure fiscal EFTPOS device (10), the merchant display (15) comprising a touch screen; a printer (29); and mechanical first anti-tampering mechanism (54) configured for preventing unauthorized access, without marking, to at least the fiscal memory (14).
2. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises a mechanical second anti-tampering mechanism (42) configured for preventing unauthorized access without marking, to at least the fiscal memory (14).
3. The secure fiscal EFTPOS device (10) according to claim 1, wherein the printer (29) is a thermal printer.
4. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises a client display (17) configured for facing a client.
5. The secure fiscal EFTPOS device (10) according to claim 1, wherein the client display (17) is located on a slave EFTPOS cradle (74).
6. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises an electronic interface (82, 83) to a cash drawer and/or barcode scanner.
7. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) is PCI and EMV compliant.
8. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) abides by Fiscal regulations at least in Eastern Europe.
9. The secure fiscal EFTPOS device (10) according to claim 1, wherein the operating system software is based on Android, by Google.
10. The secure fiscal EFTPOS device (10) according to claim 1, wherein the merchant display (15) does not include physical buttons.
11. The secure fiscal EFTPOS device (10) according to claim 1, wherein the merchant display (15) comprises a unitary, continuous, or non-divided, screen, configured for displaying information and receiving input from the merchant or user.
12. The secure fiscal EFTPOS device (10) according to claim 2, wherein the housing (12) comprises external housing surface (26) and the second anti-tampering mechanism (42) opens out at least partially to the external housing surface (26).
13. The secure fiscal EFTPOS device (10) according to claim 1 , wherein the first anti -tampering mechanism (54) is entirely located within the housing (12), and is not visible from outside the housing (12).
14. The secure fiscal EFTPOS device (10) according to claim 2, wherein in a secure state of the EFTPOS device (10), the second anti-tampering mechanism (42) is connected physically to the first anti-tampering mechanism (54); and wherein the second anti-tampering mechanism (42) is configured for preventing unauthorized access to the first anti-tampering mechanism (54).
15. The secure fiscal EFTPOS device (10) according to claim 1 , wherein the first anti -tampering mechanism (54) comprises a safe case (56).
16. The secure fiscal EFTPOS device (10) according to claim 15, wherein Fiscal data is saved on a fiscal memory PCB (50), which is located within the safe case (56).
17. The secure fiscal EFTPOS device (10) according to claim 2, wherein the first anti-tampering mechanism (54) comprises a safe case (56) secured to the EFTPOS device (10) via an internal securing screw (68); and wherein the second anti-tampering mechanism (42) comprises an external securing screw (44) which passes through the safe case (56) of the first anti-tampering mechanism.
18. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises cryptographic hardware which is used in the process of encrypting fiscal data and comprises a cryptographic key 16B in the form of a removable card.
19. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises electronic journal hardware in the form of a removable card (22) which is configured to hold periodical fiscal data.
20. The secure fiscal EFTPOS device (10) according to claim 18 or 19, wherein upon removal or tampering, the removable card is configured self-lock such that all data becomes non-readable or encrypted.
21. The secure fiscal EFTPOS device (10) according to claim 18 or 19, wherein upon removal or tampering, the removable card (16B, 22) is configured to trigger shut down and software lock of the secure fiscal EFTPOS device (10).
22. The secure fiscal EFTPOS device (10) according to claim 1, wherein the secure fiscal EFTPOS device (10) further comprises at least one cellular SIM card.
23. A slave EFTPOS cradle (74) configured for holding and communicating with a secure fiscal EFTPOS device (10), the EFTPOS cradle (74) comprising: a base portion (76) comprising a client display (17) configured for facing towards a client; a non-removable EFTPOS holder (80) being configured for removably holding a secure EFTPOS device (10); and a cradle battery (94) located at the base portion (76).
24. The slave EFTPOS cradle (74) according to claim 23, wherein the EFTPOS holder (80) is connected to the base portion (76) via a non-removable leg portion (78).
25. The slave EFTPOS cradle (74) according to claim 24, wherein the leg portion (78) can rotate s relative to the base portion (76).
26. The slave EFTPOS cradle (74) according to claim 24, wherein communication and power wires can pass through the leg portion (78) and connect between the EFTPOS holder (80) and the base portion (76).
27. The slave EFTPOS cradle (74) according to claim 23 wherein the cradle battery (94) is located withing a base housing (88) of the base portion (76).
28. The slave EFTPOS cradle (74) according to claim 23, wherein when connected to a power grid, the EFTPOS cradle (74) is configured to charge an EFTPOS battery (13) of the EFTPOS device (10) via power pins located at the EFTPOS holder (80).
29. The slave EFTPOS cradle (74) according to claim 23, wherein the EFTPOS cradle (74) doesn’t comprise a CPU or a printer and is configured as a slave device for the master, EFTPOS device (10).
30. A secure fiscal system comprising the secure EFTPOS device (10) according to claim 1 and the slave EFTPOS cradle (74) according to claim 23.
31. A funds transfer method comprising: a. providing a secure fiscal EFTPOS device (10) according to claim 1 and running android OS; b. using the OS user interface for registering a fiscal transaction using a fiscal cash register application software; c. choosing a funds transfer method hub; and d. choosing a funds transfer method and performing, or accepting said funds transfer.
32. The funds transfer method according to claim 31 , wherein the funds transfer method further comprises printing a fiscal receipt using the secure fiscal EFTPOS device (10).
33. The funds transfer method according to claim 31 , wherein the funds transfer method further comprises using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded into the device’s RAM and receiving CPU time.
34. The funds transfer method according to claim 31 , wherein the funds transfer method further comprising using a multi-merchant application for switching between different merchant id on the same fiscal EFTPOS device (10).
35. A hand-held, stand-alone, single fiscal system comprising a fiscal printer (29), a fiscal cash register and an EFTPOS device (10), the fiscal system comprising: a housing (12); computing hardware comprising at least communication hardware; fiscal hardware comprising at least a nonvolatile fiscal memory configured for storing fiscal data; cryptographic hardware; electronic journal hardware; operating system software comprising EFTPOS software and fiscal software; a merchant display (15) configured for facing a user operating the EFTPOS device, the merchant display (15) comprising a touch screen; and a client display (17) configured for facing towards a client.
36. A funds transfer method configured for use via a single physical fiscal EFTPOS device, the funds transfer method comprising: providing the fiscal EFTPOS device; registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi-merchant ID application and choosing a third party merchant ID; choosing a funds transfer method and performing, or accepting said funds transfer.
37. A funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application choosing a funds transfer method hub choosing a funds transfer method and performing, or accepting said funds transfer.
38. A funds transfer method configured for use via a single physical device running android OS, the funds transfer method comprising: providing the fiscal EFTPOS device; using the OS user interface for registering a fiscal transaction using a fiscal cash register application; choosing a funds transfer method hub; choosing a multi-merchant ID application and choosing a third party merchant ID choosing a funds transfer method and performing, or accepting said funds transfer.
39. A funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is still loaded into the device’s RAM and receiving CPU time.
40. A funds transfer method configured for use with a single physical fiscal EFTPOS device running android OS, the funds transfer method comprising using a fiscal application in parallel to an EFTPOS funds transfer application while the fiscal application is always loaded in the device’s RAM and receiving CPU time; the method further comprising using a multi-merchant application for switching between different merchant id on the same fiscal EFTPOS device having a single terminal id.
EP21705607.6A 2020-01-29 2021-01-27 Secure fiscal eftpos device, slave eftpos cradle and funds transfer method Withdrawn EP4097668A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202062967052P 2020-01-29 2020-01-29
PCT/IB2021/050601 WO2021152461A1 (en) 2020-01-29 2021-01-27 Secure fiscal eftpos device, slave eftpos cradle and funds transfer method

Publications (1)

Publication Number Publication Date
EP4097668A1 true EP4097668A1 (en) 2022-12-07

Family

ID=74626037

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21705607.6A Withdrawn EP4097668A1 (en) 2020-01-29 2021-01-27 Secure fiscal eftpos device, slave eftpos cradle and funds transfer method

Country Status (2)

Country Link
EP (1) EP4097668A1 (en)
WO (1) WO2021152461A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013021233A1 (en) * 2011-08-05 2013-02-14 Mt Bilgi Teknolojileri Dis Tic, A.S. Multi-communication featured, touch-operated or keyboard cash register with contact and non-contact credit card reader
EP2892161B1 (en) * 2012-08-31 2017-08-02 Bluebird Inc. Mobile terminal provided with security function
CN106796686A (en) * 2014-07-22 2017-05-31 Mt信息技术外贸有限公司 The biometric security for defining method using face recognition and fingerprint is sold and payment terminal

Also Published As

Publication number Publication date
WO2021152461A1 (en) 2021-08-05

Similar Documents

Publication Publication Date Title
US6817521B1 (en) Credit card application automation system
US6234389B1 (en) PCMCIA-based point of sale transaction system
US7949373B2 (en) Combined telephone and credit transaction enabler
US5521362A (en) Electronic purse card having multiple storage memories to prevent fraudulent usage and method therefor
US7424134B2 (en) Card-type biometric identification device and method therefor
KR100842484B1 (en) Contact and contactless smart card terminal and circuit of the terminal
US20140114861A1 (en) Hand-held self-provisioned pin ped communicator
CN101373552B (en) POS machine with intelligent memory card slot and uses thereof
US20060064391A1 (en) System and method for a secure transaction module
RU2459265C1 (en) Electronic device and method to control electronic device
KR20080039330A (en) Display and control device for contact and contactless smart card terminal and circuit of the device
US20080089182A1 (en) Timepiece
US10430791B2 (en) Biometric secure sales and payment terminal using face recognition and finger print definition methods
US9760881B2 (en) Portable e-pay system and method
BR112013014123A2 (en) electronic payment device capable of receiving and holding a mobile phone
WO2000026838A1 (en) Home point of sale (pos) terminal and electronic commerce method
EP4097668A1 (en) Secure fiscal eftpos device, slave eftpos cradle and funds transfer method
US8249988B2 (en) System and method for verifying payment
KR100872046B1 (en) Usb memory device of card type
US8770486B2 (en) Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of identification and informational storage
CN218332601U (en) Portable card sender
US20180204102A1 (en) A method and an apparatus for processing a transaction
TWI505208B (en) Portable e-pay system and method
US20070116279A1 (en) Secure terminal
Dollete et al. Implementation of magnetic strip/smart card technologies and their applications at NPS

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20220829

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20240205