GB2272550A - Access/security device protection - Google Patents

Access/security device protection Download PDF

Info

Publication number
GB2272550A
GB2272550A GB9223608A GB9223608A GB2272550A GB 2272550 A GB2272550 A GB 2272550A GB 9223608 A GB9223608 A GB 9223608A GB 9223608 A GB9223608 A GB 9223608A GB 2272550 A GB2272550 A GB 2272550A
Authority
GB
United Kingdom
Prior art keywords
invalid
user
issued
valid
authorised user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9223608A
Other versions
GB9223608D0 (en
Inventor
Robert Anthony Fairless
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB9223608A priority Critical patent/GB2272550A/en
Publication of GB9223608D0 publication Critical patent/GB9223608D0/en
Publication of GB2272550A publication Critical patent/GB2272550A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/003Details other than those peculiar to special kinds or types of apparatus displaying the inserted coins

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

An invalid access/security device is provided to the user of a valid access/security device. The authorised user is able to differentiate between valid and invalid devices by their physical characteristics and uses the valid device. The issuer is able to distinguish devices by using identifying characteristics recorded on the device. The use of an invalid device can be detected and assumed to be by an un-authorised user, security measures can therefore be instigated. An un-authorised user cannot determine which device gives access to a valuable resource or that which triggers security measures. There is a deterrent to un-authorised use and an increased chance of detection of unauthorised use.

Description

ACCESS/SECURITY DEVICE PRuaLrv This invention relates to the protection of devices, which provide access to resources, from theft or unauthorised use.
There are many types of device in existance which give the physical holder access to financial resources (such as credit cards, debit cards, cheque guarantee cards and charge cards) or access to physical resources (such as property or buildings). These devices are vulnerable to theft and/or use by un-authorised persons.
This invention deters theft and use of access devices by un-authorised persons and increases the likelihood of the detection of un-authorised use. It provides protection for one or more devices carried by an authorised user by causing security procedures to be instigated automatically under certain circumstances.
The invention consists of the technique of issuing, to an authorised user, an invalid device which would appear, to an un-authorised user, to be as valid as the device to be protected, but which has, or claims to have, the following two characteristics: Firstly, one or more identifying characteristics are recorded on the device, sufficient to provide indication to the issuing authority, either directly or by reference to other data, that the device is invalid.
Secondly, the device is distinguishable, by the authorised user, from a valid device by appearance, taste, smell, sound or texture. So that the authorised user can distinguish an invalid device from a valid device.
If the device is used, it can be assumed that an unauthorised user is in possession and security measures can be invoked. Someone who comes into possession of one of the devices will not know if it can be used without triggering security measures.
A iboi6sst of the ìvention will now described by way of example: A person applies for a credit card from a financial institution, specifying that the card should be predominantly blue in colour. The financial institution provides a valid card accordingly. The financial institution also provides a predominantly red card which appears to be valid, but which carries an invalid account number.
The authorised user knows which card is valid and acts accordingly. An un-authorised person who acquires one or both of the cards does not know which is valid and which will trigger security arrangements and is therefore deterred from using either.
The invalid device could be detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer. The device could be retained by the reading machine or confiscated by the person relaying the details.
Security arrangements can include: immediate suspension of resources available to the authorised user, classification of other devices issued to the authorised user as invalid, transmission of warnings to personnel at the point of use, enable use of photographic or other evidence from the point of use to aid arrest and/or subsequent conviction of an un-authorised user, physical detention by closure of exits (eg. doors to a bank foyer, doors of an automobile).
An un-authorised user has a relatively small chance of escaping detection when using the device compared with conventional methods, there is therefore a significant deterrant to using any device protected in this way.
To prevent an un-authorised user from determining which device is valid by comparing the amount of wear-andtear, both valid and invalid devices can be issued in a part worn state.
Financial institutions can co-operate by one providing a valid card(s) and another providing an invalid card(s).
If an invalid card is used, the issuer of the invalid card could inform the issuer of the valid card.

Claims (13)

1 The technique of issuing, to an authorised user, an invalid device which would appear, to an un-authorised user, to be as valid as the device to be protected.
2 An invalid device as claimed in claim 1, wherein one or more identifying characteristics recorded on the device are sufficient to indicate to the issuing authority, directly or indirectly, that the device is invalid.
3 An invalid device as claimed in claim 1 and claim 2, wherein the device is distinguishable by the authorised user from a valid device by appearance, taste, smell, sound or texture.
4 An invalid device as claimed in claim 1 and claim 2, wherein, if it is used, it can be assumed that an unauthorised user is in possession.
5 An invalid device as claimed in claim 1 and claim 2, wherein the invalid device is detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer.
6 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will trigger suspension of resources available to the authorised user.
7 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will cause other devices issued to the authorised user to be classified as invalid.
8 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will trigger transmission of warnings to personnel at the point of use.
9 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will. enable use of photographic or other evidence from the point of use.
18 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will physically restrain an unauthorised-user.
11 An invalid device as claimed in claim 1 and claim 2, wherein the invalid device is issued in a part worn state.
12 An invalid device as claimed in claim 1 and claim 2, issued by one institution to protect devices issued by another institution.
Amendments to the claims have been filed as follows 1 An invalid device which would appear, to an unauthorised user, to be as valid as a genuine device which is to be protected.
2 An invalid device as claimed in claim 1, wherein one or more identifying characteristics recorded on the device are sufficient to indicate to the issuing authority, directly or indirectly, that the device is invalid.
3 An invalid device as claimed in claim 1 or claim 2, wherein the device is distinguishable by the authorised user from a valid device by appearance or taste or smell or sound or texture.
4 An invalid device as claimed in claim 1 or claim 2 or claim 3, wherein, if it is used, it can be assumed that an unauthorised user is in possession.
5 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4, wherein the invalid device is detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer.
6 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5, wherein use of the device will trigger suspension of resources available to the authorised user.
7 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6, wherein use of the device will cause other devices issued to the authorised user to be classified as invalid.
8 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7, wherein use of the device will trigger transmission of warnings to personnel at the point of use.
9 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8, wherein use of the device will enable use of photographic or other evidence from the point of use.
10 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9, wherein use of the device will physically restrain an unauthorised user.
11 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10, wherein the invalid device is issued in a part worn state.
12 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10 or claim 11, issued by one institution to protect a device issued by another institution.
13 The use of an invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10 or claim 11 or claim 12.
GB9223608A 1992-11-11 1992-11-11 Access/security device protection Withdrawn GB2272550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9223608A GB2272550A (en) 1992-11-11 1992-11-11 Access/security device protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9223608A GB2272550A (en) 1992-11-11 1992-11-11 Access/security device protection

Publications (2)

Publication Number Publication Date
GB9223608D0 GB9223608D0 (en) 1992-12-23
GB2272550A true GB2272550A (en) 1994-05-18

Family

ID=10724891

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9223608A Withdrawn GB2272550A (en) 1992-11-11 1992-11-11 Access/security device protection

Country Status (1)

Country Link
GB (1) GB2272550A (en)

Also Published As

Publication number Publication date
GB9223608D0 (en) 1992-12-23

Similar Documents

Publication Publication Date Title
US6068184A (en) Security card and system for use thereof
US6955294B1 (en) Apparatus and method for preventing credit card fraud
Levi Business, cities and fears about crimes
GB2272550A (en) Access/security device protection
US20080136407A1 (en) System and method for magnetic field exposure indication
Fischer et al. Loss prevention and security procedures: Practical applications for contemporary problems
JP2932306B2 (en) Automatic cash transaction method
Jain ATM frauds: Detection & prevention
Revill Library security
Sharma et al. Digital data stealing from ATM using data skimmers: Challenge to the forensic examiner
Graziano et al. Automated Teller Machines: Boon or Bane
Dasari Is Bank Locker the Safest Option?(New Guidelines of Reserve Bank of India on Bank Safe Deposit Lockers)
WO1996007150A1 (en) A method and apparatus for verifying a transaction
Arata Jr Preventing Identity Theft for Dummies
Essinger Computer Security in Financial Organizations
Joshi Black Card Forensics
Yogodzinski Electronic Funds Transfer Systems-An Analysis of Federal and State Criminal Law
Crime The measurement of white-collar crime using Uniform Crime Reporting (UCR) Data
Lamberger et al. Some dilemmas regarding payment card related crimes
Gul et al. Crime of the millennium: Cyber crime
WO2000054195A1 (en) Dual pin number silent alarm for atm machines
Brown Computer crime in the Australian military environment
US20020195498A1 (en) Method and device for preventing uncontrolled and unauthorized use of credit cards and like data devices
Hettinga Internet banking and commerce: security
Wilson The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)