GB1576463A - System and method for verifying authorized holders of identification cards - Google Patents

System and method for verifying authorized holders of identification cards Download PDF

Info

Publication number
GB1576463A
GB1576463A GB457877A GB457877A GB1576463A GB 1576463 A GB1576463 A GB 1576463A GB 457877 A GB457877 A GB 457877A GB 457877 A GB457877 A GB 457877A GB 1576463 A GB1576463 A GB 1576463A
Authority
GB
United Kingdom
Prior art keywords
signal
data
holder
card
central computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
GB457877A
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Diebold Nixdorf Inc
Original Assignee
Diebold Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Diebold Inc filed Critical Diebold Inc
Priority to GB457877A priority Critical patent/GB1576463A/en
Publication of GB1576463A publication Critical patent/GB1576463A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Description

(54) IMPROVEMENTS IN OR RELATING TO SYSTEM AND METHOD FOR VERIFYING AUTHORIZED HOLDERS OF IDENTIFICATION CARDS (71) We, DIEBOLD. INCORPORATED, a corporation organised and existing under the laws of the State of Ohio, United States of America, of 818 Mulberry Road, S.E., Canton, Stark County, State of Ohio 44702, United States of America (assignee of DONALD ERNEST KINKER), do hereby declare the invention, for which we pray that a patent may be granted to us, and the method by which it is to be performed, to be particularly described in and by the following statement: The present invention relates generally to a method of and system for verifying that the holder of an identification card is an authorized holder of the card.
Machine-readable identification cards have become prevalent in such applications as gaining access to a restricted area and performing credit sales transactions. In commercial banking, unattended, on-line banking terminals permit the performance of certain transactions. These transactions include accepting deposits, dispensing cash, transferring funds from one account to another, and making payments on credit card, utility or other accounts, or on mortgage or installment loans and the like. The customer is required to present an identification card, often formed of a plastic medium, and which contains machine-readable information. The information includes, but is not limited to, the customer's account number, the identification number of the bank or institution, an expiration date, credit limit, account balance, and types of transactions authorized.Although the information is preferably contained on the card in the form of invisible magnetically recorded indicia, the information could be contained in embossed indicia, apertures, or electrically conducting segments.
The remote banking terminal contains a keyboard, as well as a card reader. The customer places his identification card in the card reader, and his account number and other data are read from the card and con verted into digital signals. Using the keyboard, the customer enters a secret number that is known to only the authorized holder of the identification card. The account number, read from the card, is transfonned to another number having no logical- rela- tionship to the account number, and the transformed number is compared to the keyboard-entered, secret number A positive comparison indicates that the customer is the authorized holder of the identification card.
The secret number is issued to the authorized holder of the identification card when the card is issued. The secret number is determined in accordance with the particular algorithm or transformation used to transform the account number.
Optionally, the keyboard-entered, secret number may be combined with an offset number, prior to comparison with the transformed account number. The offset number causes the keyboard-entered, secret number to correspond to the translated account number. This permits the customer to choose his own secret number when his card is issued.
A system for transforming a machineread, account number for comparison with a keyboard-entered secret number, and optionally combining an offset number with the secret number prior to comparison is disclosed in the complete specification of our Patent Application No. 4151/77 (Serial No. 1576232).
When the customer at the remote terminal is determined to be the authorized holder of the identification card presented at the terminal, the secret data along with account number and other data are transmitted to the host or central computer over a communication line. By monitoring the communication line, it is possible for an unauthorized person to "pick-up" the secret data of a customer and, with possession of the identification card, . effect unauthorized transactions at the terminal.
According to one feature of the present invention apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that a holder of an identification card bearing machine-readable data is an authorized holder, comprises, for use at a remote terminal of the system, means for converting said machine-readable data into a first electrical signal, means for entering a set of indicia known by only the authorized holder, means for converting said set of indicia into first and second signal portions, first means for comparing said first signal portion with a reference signal, means responsive to a favourable comparison in said first means for generating a first validation signal and means responsive to the first validation sigal for transmitting said second signal portion to a central computer of the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a second reference signal, and means responsive to a favourable comparison in said second means for generating a second validation signal indicating that the holder of the card is an authorized holder.
According to a further feature of the present invention apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that the holder of an identification card carrying machine-readable data including an account number is authorized to complete a transaction at a remote terminal, comprises, for use as a remote terminal of the system, card reader means for converting said account number to a first electrical signal, input means including a keyboard for storing second and third electrical signals representing, respectively, transaction data and secret data entered by the holder, said secret data being known by. only an authorized card holder, means for converting said third electrical signal to a first signal portion and a second signal portion, means for translating said first signal into a translated first signal, first means for comparing said translated first signal with said first signal portion, and means responsive to a favourable comparison in said first means for transmitting said first signal, said second signal portion and said second signal to the central computer the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a reference signal, and means responsive to a favourable comparison in said second means and to said second signal for enabling completion of a transaction in accordance with said second signal.
According to a still further feature of the present invention a method of verifying that a holder of an identification card bearing machine-readable data is an authorized holder for an on-line system including a central computer and at least one remote terminal, comprises, at a remote terminal, the steps of reading data from said card in a card reader, generating a first signal representing said card-read data, generating a second signal from a keyboard representing secret data entered therein by the holder, the secret data being known only to the authorized holder, converting said second signal into first and second signal portions, translating said first signal into a translated first signal having no readily ascertainable relationship to said first signal, comparing the translated first signal with the first signal portion, and, in response to a favourable comparison, transmitting the second signal portion to the central computer of the system; and at the central computer of the system, the steps of comparing the second signal portion with a reference signal, and, in response to a favourable comparison, generating a signal indicating that the holder is an authorized holder.
Thus in a method and system embodying the present invention for verifying that a customer at a remote terminal of an on-line banking system is authorized to complete a requested transaction, invisible account number data prerecorded on the card are machine read at the terminal and converted to a digital signal. A portion of the digital signal is supplied to a signal translator, such as that described in the complete specification of our Patent Application No. 4151/77 (Serial No. 1576232), to develop a translated signal having no readily ascertainable relationship to the account number data signal.
Secret data are keyboard-entered at the remote terminal by the customer, and the data are converted to a digital signal. The digital signal is then split up into first and second signal portions. The first signal portion of the secret data is compared with the translated portion of the account data sig n,al. If the result of that comparison is positive, that is to say favourable, the second signal portion, along with keyboard-entered transaction data and account number data is transmitted to the central computer along communication lines.
At the central computer, the second signal portion is compared with a reference signal, stored in the authorized card holder's file under his account number. The file is addressed by the account number data transmitted to the computer. If the result of this comparison is positive, the customer is considered to be authorized to perform the transaction requested, and the central computer transmits a signal back to the remote terminal, enabling the requested transaction to be completed.
The secret data keyboard-entered by- the customer may be formed of alphabetic characters, numerals or a combination there of. Furthermore, the secret data may be formed of any number of characters or numerals, within a predetermined range, and the secret data may be chosen by the customer when the identification card is issued. The keyboard is an alphanumeric keyboard or, as an option, a decoder may be provided to convert alphabetic characters, entered at the keyboard, into corresponding numerals.
As another option, an offset number may be combined with the keyboard-entered secret data, prior to comparison with the translated account number data. The offset number is recorded on the card when the card is issued. This permits the customer to choose his own secret data.
The invention will be further described by way of example with reference to the accompanying drawings in which: Figure 1 is a simplified block diagram of the system, in accordance with one embodiment of the present invention, and Figure 2 is a general flow diagram illustrating the method, in accordance with one embodiment of the present invention.
Referring to Figure 1, an apparatus 10 for verifying whether a customer presenting an identification card 12 at a remote terminal of an on-line banking system is authorized to conduct a transaction ,at the terminal, comprises a card reader 14 for reading data prerecorded on the card and a keyboard 16 for receiving data manually entered by the customer. The keyboardentered data include a secret alphanumeric code, known only to the authorized holder of the identification card. and transaction information, e.g., information relating to the type of transaction requested and the amount thereof. The types of transactions include depositing or withdrawing funds with respect to an account, transferring funds between accounts, paying bills, and the like.
In the preferred embodiment of the invention, two-step verification that the customer is authorized to complete a requested transaction is provided. A first portion of the keyboard-entered secret data is compared with the prerecorded data, machineread at the terminal. Then, if the result of this comparison is positive, the remaining portion of the secret data is transmitted to the central computer for comparison with reference data recorded in the authorized card holder's file. If the result of that comparison is positive, the cutomer is considered to be the authorized holder of the identification card. If the particular transaction requested is an authorized one, the central computer instructs the terminal to complete the transaction.Since only a portion of the secret data is transmitted to the central computer, the entire secret data cannot be determined by monitoring the communication line.
Identification card 12 is a conventional information bearing medium such as plastics and contains data stored in Field A, Field B and Field C. These data are machinc- readable, but not readable to a customer.
Although the data are preferably recorded on magnetizable material, the data could alternatively be recorded via embossed encoded indicia, apertures or electrically conducting strips.
Field A of identification card 12 contains data relating to use of the card, such as expiration date, amount and types of transactions authorized. Field B contains the account number of the authorized holder along with ,a bank or institution identification number. The account number read from Field B is- scrambled and then compared with a portion of the keyboard-entered secret data to determine whether the customer is the authorized holder of the identification card. Field C contains an offset number determined by the bank or institution when the identification card is issued. The offset number is determined so as to cause the secret data to correspond to the authorized holder's scrambled account number, and is combined with the secret data before comparison. This permits the authorized holder of the identification card to choose his own secret data.
Reader 14 is a conventional magnetic card reader that converts the data recorded on card 12 in Fields A, B and C into digital signals. Reader 14 also stores the signals derived from these fields, respectively, into registers 18, 20 and 22. The A-Field signal stored in register 18 as aforementioned, relates to authorized use of the card. This signal, transmitted to the host or central computer 24, is used as a preliminary check of the validity of the card, e.g., whether the card has expired. If the central computer 24 determines that the identification card 12 is invalid, e.g., has expired, the B and C Field data signals respectively stored in registers 20 and 22 are not processed to determine whether the holder of the card 12 is an authorized holder, or whether he is authorized to complete a requested transaction.Preferably, keyboard 16 is enabled to receive secret data and transaction data from the customer only if the preliminary check indicates that card 12 is valid.
Assuming that the result of the preliminary check of identification card 12 is positive, the account number (the account number includes a bank or institution identification number) in register 20 is supplied to a number translator 26 aling line 28. Number translator 26 convcrts (scrambles) that data to translated data having no readily ascertainable relationship to the data stored in register 20. This is a security feature and ensures that an unauthorized holder of the card cannot use the card to complete a transactions, even if he determines the account number recorded in Field B of the card 12. Number translator 26 is a pseudorandom number generator that scrambles the account number, stored as a digital signal in register 20, in a manner dependent on the bank or institution identification number.Number translator 26 is of a type described in the complete specification of our Patent Application No. 415/77.
In addition to being supplied to translator 26, the account and institution number signals are also supplied, along line 32, to one input of a buffer/switch 30. As described in detail in the complete specification of our Patent Application No. 4151/77 (Serial No. 1576232), as the holder of the card 12 is determined to be an authorized holder, the bank or institution identification number and account number along with transaction data and other data, are transmitted to central computer 24 over communication line 34. If the requested transaction is an authorized one, the transaction is carried out with respect to the authorized holder's account, identified by the account number and charged with respect to the bank or institution identified by the identification number.
Keyboard 16, located at the remote terminal, is preferably an alphanumeric pushbutton keyboard wherein the push-button keys represent alphabetic characters as well as numerals. For example, the upper lefthand push-button of keyboard 16 represents the alphabetic characters A, B and C, as well as the numeral 1, as shown. Keyboard 16 converts the data entered therein by the holder of identification card 12 into digital signals and stores these signals in registers 36 and 38. As described in detail below, the secret data entered into keyboard 16 by the customer comprise a word, a numeral, or a combination thereof. Also, the data comprises any number of characters and numerals within a predetermined total number thereof, e.g., 4-12. These data are converted into digital signals by the keyboard 16.Signals representing the secret data are stored in register 36 and signals representing the transaction data are stored in register 38.
Storage of the signals, respectively in registers 36 and 38, is controlled by central computer 24 or by a conventional sequencer (not shown) located at the terminal. Sequencing is preferably controlled at the terminal to minimize on-line time.
Preferably, the secret data stored in register 36 comprise a word such as CUS TOMER along with a numeral such as 8, as shown in Figure 1. The use of a word along with a numeral as the secret data aids the authorized holder of card 12 in remembering his secret data. For example, the authorized holder may use his own name as the word, and the year of his birth as his number.
In the preferred embodiment, the secret data are comprised of from four to twelve alphanumeric characters. Where fewer than twelve characters are used as the secret data, the numeral zero is stored in register 36 for each unused character, but the secret data are processed as a twelve-character block. This is an important feature, because it permits the secret data to be variable in length, determined by the authorized card holder or by the bank or institution.
The output of register 36 containing the alphanumeric data is supplied to an optional decoder 40 (shown in dotted lines) for converting the alphabetic characters of the secret data to numerals. Decoder 40, which is required where keyboard 16 is a type having alphabetic character keys as well as separate numeral keys and wherein each key corresponds to a unique digital code to be generated is conventional. For example, decoder 40 may be a read-only memory addressed by signals representing alphabetic characters and generating signals representing corresponding numerals. However, decoder 40 is omitted where keyboard 16 is an alphanumeric keyboard of the type shown in Figure 1, wherein each key represents alphabetic characters as well as corresponding numerals. For example, in keyboard 16 (Figure 1), the push-button key representing the letters A, B and C also represents numeral 1.Accordingly, when the holder of card 12 enters the letter A, B or C at keyboard 16, the digital word representing the numeral 1 is stored in register 36.
The data stored in decoder 40 are split up into two data portions or segments stored, respectively, in A-register 42 and B-register 44. In the example of Figure 1, the data in decoder 40 are split between numerals 6 and 8. The numerals 1, 7, 3 and 6 are stored in register 42 while the numerals 8, 7, 9, 1, 2 and 8 are stored in register 44. Optionally, other numerals could be stored in register 42 with the remaining numerals of the secret data being stored in register 44. For example, alternate numerals, i.e., 1, 3, 8 and 9 from the example of Figure 1 could be stored in register 42, and the remaining numerals 7, 6; 7, 1, 2 and 8 stored in register 44. As another variation, greater or fewer than four numerals could be stored in register 42 with the remaining numerals being stored in register 44. Only the numerals in register 42 are used at the remote terminal for comparison with the translated account number signal generated by number translator 26. The output of register 42 is supplied to one input of adder 46. The offset number, stored in register 22, is supplied to the other input of adder 46. These two numbers are added together without carry, and the resultant is supplied to one input of comparator 48. The output of number translator 26 is supplied to the other input of comparator 48.
As aforementioned, the purpose of the offset number stored in register 22 and read from Field C of the identification card 12, is to permit the authorized holder of the identification card to choose hist own secret data when the card is issued. The offset number recorded in Field C of card 12 at issuance, causes the portion of the secret data stored in register 42 to positively compare with the output of number translator 26 and is a function of the particular secret data chosen by the authorized holder of the card. This is described in detail in the complete specification of our Patent Application No. 4151/77 (Serial No. 1576232). The holder of identification card 12 also enters transaction data at keyboard 16, e.g., the type of transaction requested and the amount thereof.These data are converted to digital signals stored in register 38 under control of the sequencer (not shown). The output of register 38 is connected to one input of buffer/switch 30.
The output of B-register 44 containing the remaining portion of the secret data split out from register 40 is supplied to another input of buffer/switch 30. Buffer/switch 30 is controlled by the output of comparator 48. A positive comparison between the output of adder 46 and the output of number translator 26 enables buffer/switch 30 to transmit the data stored in register 20, register 44 and register 38 to central computer 24 over communication line 34. Buffer/ switch 30 amplifies the output of these registers for transmission over the relatively long communication line 34. Only the second portion of the secret data stored in register 44 is transmitted to central computer 24; the first portion of the secret code, stored in register 42, is retained at the remote terminal.
At central computer 24, a signal conditioner 50 receives the data signals transmitted by buffer/switch 30 at the remote terminal and amplifies and conditions these -signals for processing in the computer.
A signal splitter 52 located at central computer 24 is connected to the output of signal conditioner 50. Signal splitter 52 is a conventional signal demultiplexer circuit that detects the B-register data signal, the account number data signal, and the transaction data signal transmitted on line 34. The account number data are transmitted to computer 24 together with the B-register data, but the transaction data are preferably not transmitted until after the holder of card r 12 has been determined to be the. authorized holder.
The account number data signal is supplied to the input of a file memory 53 in the computer 24 as a file address. A reference data signal, associated with each authorized card holder's account, is stored in memory 53. The reference data signal, addressed in memory 52 by the account number signal, is supplied to one .input of a comparator 54. The B-register data, generated by signal splitter 52, is supplied to the other input of comparator 54.If there is a positive comparison between the reference data stored in memory 53 (addressed by the account number data signal) and the B register data, the comparator 5.4 generates a signal on line 56 indicating that the holder of card 12 is an authorized holder. The out put of comparator 54, along with the rans- action data signal generated. by signal split ter 52, is connected to a switch 58. Switch 58 in turn transmits a signal back to the remote terminal, instructing it to complete' the transaction requested by the card lioldér.
Of particular importance, only the por- tion of the secret data that is stored in B register 44 is transmitted to central com- puter 24 along communication line 34. The remaining portion of the secret data is retained in the remote terminal in A-register 42. It is thus impossible to determine' the entire secret data by monitoring the com munication line 34 since only a portion of the secret data is transmitted on the . line, Also of particular importance, is when secret data having fewer than the maximum preselected number of characters, e.g.
twelve, are chosen, the numeral zero is' used for the unchosen characters: The, zeros, along with the chosen characters, are stored in the file memory 53 as the;reference data when the file is created. The zeros stored in the file memory 53 are compared with the zeros transmitted to the central computer 24 as a secondary verification- of the card.
This provides flexibility in choice in secret data by the authorized card holder.
For example, in Figure 1, assuming that the secret data were chosen as 12340000000û, the data 123400000000 would be stored in register 36. Since there are no alphabetic characters in the secret data chosen, these data would be stored in decoder 40-withóut any modification. The data 1234 would then be stored in A-register 42 for comparison with the output of number translator 26 and the numerals 00000000 would be stored in B-register 44. If the result of the compari son is positive, the zeros in register 44 would be transmitted along with other data to com puter 24.The numerals 00000000 would then be compared with data stored in the card holder's file under his account number for the secondary verification.
Referring now to Figure 2, the method of ä preferred embodiment of the present invention will be described. At the remote terminal, identification card 12 offered by a customer is machine-read in step 60. By examining the data in Field A of card 12 (Figure 1), a preliminary check of the validity of the card is made in step 62. If, in.
accordance with the preliminary check, card 12 is determined to be invalid, e.g., expired, a card check message is transmitted to the host or central computer in step 64. The transmitted message is analyzed at the central computer along with the card-read data (step 66), and a decision is made whether to rèturn the card to the holder or to retain it (step 68). If it is determined to return the card, a message to return the card to the holder is transmitted back to the terminal in step 70. On the other hand, if it is determined to retain the card, a message to that effect instep 72, is transmitted back to the terminal.
.If the preliminary check (step 62) indicates that the ,,card 12 is valid, the keyboard is enabled (step 74) to determine whether the holder of the card is an authorized holder. The holder then enters the secret data via the keyboard in step 76. The customer account number and bank or institution number, read from the card in step 60, are translated (scrambled), and one portion of the scrambled number is compared with the secret data in step 78. If the result of this comparison is, negative, determined during step 80, the holder is permitted to re-enter the.'secret data, as in step 74. Re-entry is permitted a preselected number of times.
After a last re-entry, determined during step, 82, a message is transmitted to the central computer to determine whether to return the card to the user or to retain ,it If the result of the comparison in step 80 is positive, the keyboard is enabled (step 84) to receive data from the card holder.
The holder selects the transaction requested; e.g., depositing or withdrawing funds, etc., (step 86). The transaction data, along with the account number data (including the bank or institution number) and only the remaining portion of the secret data, are trans mitted to the central computer (step 88).
The data transmitted during step 88 are analyzed in the central computer in step 90.
The analys',is includes determination of whether the secret data, entered by the ;,bler.luring .step 76, is correct. This is done,. as described in detail with respect to F,,5,g,,,y,e,,, 1, s,,uprn, .by comparing only the transmitted portion of the secret data with reference data filed in memory at the com .puter! The reference data are filed in the authorized holder's account file, and are addressed with the account number data transmitted during step 88. If the reference data and the transmitted secret data compare positively in step 92, a message is transmitted back to the terminal (step 94) instructing the terminal to permit the holder of the identification card to complete the requested transaction.On the other hand, if the result of the comparison in step 92 is negative, optionally, the holder may be permitted to re-enter the secret data a preselected number of times (step 96). After the preselected number of times of re-entry has been reached, a decision is made (step 68) whether or not to retain the identification card. If the preselected number of reentries has not been reached, determined in step 96, a message is transmitted (step 98) back to the terminal to permit the holder to re-enter the secret data.
In summary, a method of and a system for determining whether the holder of an identification card at a remote terminal at an on-line banking system is an authorized holder of the card, and is authorized to complete a requested transaction at the terminal have been described. Of particular importance, only a portion of secret data, entered at the terminal by the holder, is transmitted to the central computer over the communication lines. The transmitted portion is verified at the central computer, and the remaining portion is verified at the terminal. No secret data are transmitted to the central computer unless there is a positive verification of the portion of the secret data retained at the terminal. Then only the remaining portion of the secret data is transmitted over the communication lines.
It is thus impossible to determine the entire secret data by monitoring the communication lines.
Also of particular importance, flexibility is provided in the choice of secret data by the customer when the identification card is issued. The customer is permitted to choose secret data having any number of characters within a predetermined range of number of characters. Any combination of alphabetic characters and numerals can be chosen. This functions as a memory aid for the' customer since he can choose a combination of alpliabetic characters and numerals having significance to him.
While there has been described and illustrated a specific embodiment of the invention, it will be clear that variations of details of construction and of the method which are specifically illustrated " and described may be made without departing from the scope of the invention. For example, it is apparent that the principles of the present invention can be used in conjunction with any security system using an identification card and secret data memorized by the authorized card holder, e.g. > gaining entry to a restricted area, point of sales credit transactions, and the like.
WHAT WE CLAIM IS: 1. Apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that a holder of an identification card bearing machine-readable data is an authorized holder, comprising, for use at a remote terminal of the system, means for converting said machine-readable data into a first electrical signal, means for entering a set of indicia known by only the authorized holder, means for converting said set of indicia into first and second signal portions, first means for comparing said first signal portion with a first reference signal, means responsive to a favourable comparison in said first means for generating a first validation signal and means responsive to the first validation signal for transmitting said second signal portion to a central computer of the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a second reference signal, and means responsive' to a favourable comparison in said second means for generating a second validation signal indicating that the holder of the card is an authorized holder.
2. Apparatus as claimed, in claim 1, wherein said means for entering said set of indicia includes a keyboard.
3. Apparatus as claimed in claim 2, wherein said keyboard is an alphanumeric keyboard.
4. Apparatus as claimed in claim 1, 2 or 3, including translator means for translating said first signal into a translated first signal constituting said first reference signal, said first means comparing said first signal portion with said translated first signal.
5. Apparatus as claimed in claim 4, in clouding offset means for modifying said first signal portion to a modified first signal portion prior to comparison with said translated first signal in said first means.
6. Apparatus as claimed in claim 5, wherein said offset means includes means responsive to offset data contained on said card for modifying said first signal portion.
7. Apparatus as claimed in any preceding claim, wherein said second reference signal for comparison with said second signal portion is stored in a memory contained in said central computer; said apparatus further including, for use at the central computer, means responsive to said first signal for addressing said second reference signal in said memory.
8. Apparatus as claimed in any preceding claim, wherein said set of indicia includes an alphabetic symbol, and said apparatus further includes means for decoding the alphabetic symbol to a corresponding numeral prior to translation in said translator means.
9. Apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that the holder of an identification card carrying machine-readable data including an account number is authorized to complete a transaction at a remote terminal, comprising, for use at a remote terminal of the system, card reader means for converting said account number to a first electrical signal, input means including a keyboard for storing second and third electrical signals representing, respectively, transaction data and secret data entered by the holder, said secret data being known by only an authorized card holder, means for converting said third elect trical signal to a first signal portion and a second signal portion, means for translating said first signal into a translated first signal, first means for comparing said translated first signal with said first signal portion, and means responsive to a favourable comparison in said first means for transmitting said first signal, said second signal portion and said second signal to the central computer of the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a reference signal, and means responsive to a favourable comparison in said second means and to said second signal for enabling completion of a transaction in accordance with said second signal 10. Apparatus as claimed in claim 9, including offset means for modifying said first signal portion into a modified first signal portion prior to comparison with said translated first signal in said first means.
11. Apparatus as claimed in claim 10, wherein said machine-readable data contained on said card further includes offset number data, and said offset means includes means responsive to said offset number data for generating an offset signal, and said apparatus further includes means for modifying said first signal portion in accordance with said offset signal prior to the comparison in said first means.
12. Apparatus of claim 9, 10 or 11, wherein said keyboard is an alphanumeric keyboard, and said apparatus further includes means for converting alphabetic symbols, keyboard-entered by the holder, into corresponding numerical symbols prior to comparison of said first signal portion of said third electrical signal, with said first signal in said first means.
13. A method of verifying that a holder of an identification card bearing machine-readable data is an authorized holder for an on-line system including a central computer and at least one remote terminal, comprising, at a remote terminal,
**WARNING** end of DESC field may overlap start of CLMS **.

Claims (19)

**WARNING** start of CLMS field may overlap end of DESC **. area, point of sales credit transactions, and the like. WHAT WE CLAIM IS:
1. Apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that a holder of an identification card bearing machine-readable data is an authorized holder, comprising, for use at a remote terminal of the system, means for converting said machine-readable data into a first electrical signal, means for entering a set of indicia known by only the authorized holder, means for converting said set of indicia into first and second signal portions, first means for comparing said first signal portion with a first reference signal, means responsive to a favourable comparison in said first means for generating a first validation signal and means responsive to the first validation signal for transmitting said second signal portion to a central computer of the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a second reference signal, and means responsive' to a favourable comparison in said second means for generating a second validation signal indicating that the holder of the card is an authorized holder.
2. Apparatus as claimed, in claim 1, wherein said means for entering said set of indicia includes a keyboard.
3. Apparatus as claimed in claim 2, wherein said keyboard is an alphanumeric keyboard.
4. Apparatus as claimed in claim 1, 2 or 3, including translator means for translating said first signal into a translated first signal constituting said first reference signal, said first means comparing said first signal portion with said translated first signal.
5. Apparatus as claimed in claim 4, in clouding offset means for modifying said first signal portion to a modified first signal portion prior to comparison with said translated first signal in said first means.
6. Apparatus as claimed in claim 5, wherein said offset means includes means responsive to offset data contained on said card for modifying said first signal portion.
7. Apparatus as claimed in any preceding claim, wherein said second reference signal for comparison with said second signal portion is stored in a memory contained in said central computer; said apparatus further including, for use at the central computer, means responsive to said first signal for addressing said second reference signal in said memory.
8. Apparatus as claimed in any preceding claim, wherein said set of indicia includes an alphabetic symbol, and said apparatus further includes means for decoding the alphabetic symbol to a corresponding numeral prior to translation in said translator means.
9. Apparatus for an on-line system including a central computer and at least one remote terminal, for verifying that the holder of an identification card carrying machine-readable data including an account number is authorized to complete a transaction at a remote terminal, comprising, for use at a remote terminal of the system, card reader means for converting said account number to a first electrical signal, input means including a keyboard for storing second and third electrical signals representing, respectively, transaction data and secret data entered by the holder, said secret data being known by only an authorized card holder, means for converting said third elect trical signal to a first signal portion and a second signal portion, means for translating said first signal into a translated first signal, first means for comparing said translated first signal with said first signal portion, and means responsive to a favourable comparison in said first means for transmitting said first signal, said second signal portion and said second signal to the central computer of the system; and, for use at the central computer of the system, second means for comparing said second signal portion with a reference signal, and means responsive to a favourable comparison in said second means and to said second signal for enabling completion of a transaction in accordance with said second signal
10. Apparatus as claimed in claim 9, including offset means for modifying said first signal portion into a modified first signal portion prior to comparison with said translated first signal in said first means.
11. Apparatus as claimed in claim 10, wherein said machine-readable data contained on said card further includes offset number data, and said offset means includes means responsive to said offset number data for generating an offset signal, and said apparatus further includes means for modifying said first signal portion in accordance with said offset signal prior to the comparison in said first means.
12. Apparatus of claim 9, 10 or 11, wherein said keyboard is an alphanumeric keyboard, and said apparatus further includes means for converting alphabetic symbols, keyboard-entered by the holder, into corresponding numerical symbols prior to comparison of said first signal portion of said third electrical signal, with said first signal in said first means.
13. A method of verifying that a holder of an identification card bearing machine-readable data is an authorized holder for an on-line system including a central computer and at least one remote terminal, comprising, at a remote terminal,
the steps of reading data from said card in a card reader, generating a first signal representing said card-read data, generating a second signal from a keyboard representing secret data entered therein by the holder, the secret data being known only to the authorized holder, converting said second signal into first and second signal portions, translating said first signal into a translated first signal having no readily ascertainable relationship to said first signal, comparing the translated first signal with the first signal portion, and, in response to a favourable comparison, transmitting the second signal portion to the central computer of the system; and at the central computer of the system, the steps of comparing the second signal portion with a reference signal, and, in response to a favourable comparison, generating a signal indicating that the holder is an authorized holder.
14. A method as claimed in claim 13, including the step of transmitting a transaction data signal along with said second signal portion to said central computer; and performing a requested transaction in response to a favourable comparison at the central computer and in accordance with said transaction data signal.
15. A method as claimed in claim 13 or 14, wherein said step of generating said second signal includes the steps of generating a signal representative of an alphabetic character, and converting the signal representative of the alphabetic character to a signal representative of a corresponding numeral.
16. A method as claimed in claim 13 or 14, wherein said step of generating said second signal includes the steps of generating a signal representative of an alphabetic character and a signal representative of a numeral, and converting said signal represenative of the character to a signal representative of a corresponding numeral.
17. A method as claimed in any of claims 13 to 16, including the step of addressing a memory at the central computer with said first signal to generate the reference signal corresponding to the card-read data.
18. Identification card verifying apparatus constructed and arranged and adapted to operate substantially as hereinbefore particularly described with reference to and as illustrated in the accompanying drawings.
19. A method of verifying identification cards substantially as hereinbefore particularly described with reference to the accompanying drawings.
GB457877A 1977-02-04 1977-02-04 System and method for verifying authorized holders of identification cards Expired GB1576463A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB457877A GB1576463A (en) 1977-02-04 1977-02-04 System and method for verifying authorized holders of identification cards

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB457877A GB1576463A (en) 1977-02-04 1977-02-04 System and method for verifying authorized holders of identification cards

Publications (1)

Publication Number Publication Date
GB1576463A true GB1576463A (en) 1980-10-08

Family

ID=9779803

Family Applications (1)

Application Number Title Priority Date Filing Date
GB457877A Expired GB1576463A (en) 1977-02-04 1977-02-04 System and method for verifying authorized holders of identification cards

Country Status (1)

Country Link
GB (1) GB1576463A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0032193B1 (en) * 1979-12-28 1983-10-19 International Business Machines Corporation Communication apparatus
GB2165381A (en) * 1984-10-04 1986-04-09 Rigby Electronic Group Plc A device for and method of reading from a substrate
GB2188762A (en) * 1986-04-04 1987-10-07 Philip Hall Bertenshaw Secure data communication system
GB2264377A (en) * 1990-09-06 1993-08-25 Abbud Salomon Dahbura System for preventing fraudulent use of credit card

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0032193B1 (en) * 1979-12-28 1983-10-19 International Business Machines Corporation Communication apparatus
GB2165381A (en) * 1984-10-04 1986-04-09 Rigby Electronic Group Plc A device for and method of reading from a substrate
GB2188762A (en) * 1986-04-04 1987-10-07 Philip Hall Bertenshaw Secure data communication system
GB2188762B (en) * 1986-04-04 1989-11-15 Philip Hall Bertenshaw Secure data communication system
GB2264377A (en) * 1990-09-06 1993-08-25 Abbud Salomon Dahbura System for preventing fraudulent use of credit card
GB2264377B (en) * 1990-09-06 1995-11-15 Abbud Salomon Dahbura System for preventing fraudulent use of credit card

Similar Documents

Publication Publication Date Title
US4023013A (en) On-line verification system for identification card or the like
US5214699A (en) System for decoding and displaying personalized indentification stored on memory storage device
US5259025A (en) Method of verifying fake-proof video identification data
US4304990A (en) Multilevel security apparatus and method
US5673320A (en) Method and apparatus for image-based validations of printed documents
US5585787A (en) Programmable credit card
CA1232684A (en) Electronic transaction security system
US4328414A (en) Multilevel security apparatus and method
US4357529A (en) Multilevel security apparatus and method
CA1252566A (en) Transaction system with off-line risk assessment
EP1107196B1 (en) A wireless electronic system for performing transactions
US5570465A (en) Apparatus, method and system for printing of legal currency and negotiable instruments
EP2287783A1 (en) Electronic credit card - ECC
US5239166A (en) Secure data interchange system erasing a card memory upon an invalid response
JP4309479B2 (en) A system for sending values to the magnetic stripe of a transaction card
US4904851A (en) Identification authenticating system
JP2001028038A (en) Method for simplifying use of plural cards
EP0379333A1 (en) Secure data interchange system
EP0172670A2 (en) An apparatus for effecting and recording monetary transactions
EA001415B1 (en) Conditional access method and device
JPS6149714B2 (en)
KR20050006131A (en) Method and system for conducting a transaction using a proximity device
EP1370999A1 (en) System for affecting orders for payment with identification by means of card data and fingerprint
KR20010086928A (en) A card for overall financial information
KR20160040731A (en) Verification of a transactor's identity

Legal Events

Date Code Title Description
PS Patent sealed
PCNP Patent ceased through non-payment of renewal fee