GB2272550A - Access/security device protection - Google Patents
Access/security device protection Download PDFInfo
- Publication number
- GB2272550A GB2272550A GB9223608A GB9223608A GB2272550A GB 2272550 A GB2272550 A GB 2272550A GB 9223608 A GB9223608 A GB 9223608A GB 9223608 A GB9223608 A GB 9223608A GB 2272550 A GB2272550 A GB 2272550A
- Authority
- GB
- United Kingdom
- Prior art keywords
- invalid
- user
- issued
- valid
- authorised user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/003—Details other than those peculiar to special kinds or types of apparatus displaying the inserted coins
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
An invalid access/security device is provided to the user of a valid access/security device. The authorised user is able to differentiate between valid and invalid devices by their physical characteristics and uses the valid device. The issuer is able to distinguish devices by using identifying characteristics recorded on the device. The use of an invalid device can be detected and assumed to be by an un-authorised user, security measures can therefore be instigated. An un-authorised user cannot determine which device gives access to a valuable resource or that which triggers security measures. There is a deterrent to un-authorised use and an increased chance of detection of unauthorised use.
Description
ACCESS/SECURITY DEVICE PRuaLrv This invention relates to the protection of devices, which provide access to resources, from theft or unauthorised use.
There are many types of device in existance which give the physical holder access to financial resources (such as credit cards, debit cards, cheque guarantee cards and charge cards) or access to physical resources (such as property or buildings). These devices are vulnerable to theft and/or use by un-authorised persons.
This invention deters theft and use of access devices by un-authorised persons and increases the likelihood of the detection of un-authorised use. It provides protection for one or more devices carried by an authorised user by causing security procedures to be instigated automatically under certain circumstances.
The invention consists of the technique of issuing, to an authorised user, an invalid device which would appear, to an un-authorised user, to be as valid as the device to be protected, but which has, or claims to have, the following two characteristics:
Firstly, one or more identifying characteristics are recorded on the device, sufficient to provide indication to the issuing authority, either directly or by reference to other data, that the device is invalid.
Secondly, the device is distinguishable, by the authorised user, from a valid device by appearance, taste, smell, sound or texture. So that the authorised user can distinguish an invalid device from a valid device.
If the device is used, it can be assumed that an unauthorised user is in possession and security measures can be invoked. Someone who comes into possession of one of the devices will not know if it can be used without triggering security measures.
A iboi6sst of the ìvention will now described by way of example:
A person applies for a credit card from a financial
institution, specifying that the card should be
predominantly blue in colour. The financial
institution provides a valid card accordingly. The
financial institution also provides a predominantly
red card which appears to be valid, but which
carries an invalid account number.
The authorised user knows which card is valid and
acts accordingly. An un-authorised person who
acquires one or both of the cards does not know
which is valid and which will trigger security
arrangements and is therefore deterred from using
either.
The invalid device could be detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer. The device could be retained by the reading machine or confiscated by the person relaying the details.
Security arrangements can include: immediate suspension of resources available to the authorised user, classification of other devices issued to the authorised user as invalid, transmission of warnings to personnel at the point of use, enable use of photographic or other evidence from the point of use to aid arrest and/or subsequent conviction of an un-authorised user, physical detention by closure of exits (eg. doors to a bank foyer, doors of an automobile).
An un-authorised user has a relatively small chance of escaping detection when using the device compared with conventional methods, there is therefore a significant deterrant to using any device protected in this way.
To prevent an un-authorised user from determining which device is valid by comparing the amount of wear-andtear, both valid and invalid devices can be issued in a part worn state.
Financial institutions can co-operate by one providing a valid card(s) and another providing an invalid card(s).
If an invalid card is used, the issuer of the invalid card could inform the issuer of the valid card.
Claims (13)
1 The technique of issuing, to an authorised user, an invalid device which would appear, to an un-authorised user, to be as valid as the device to be protected.
2 An invalid device as claimed in claim 1, wherein one or more identifying characteristics recorded on the device are sufficient to indicate to the issuing authority, directly or indirectly, that the device is invalid.
3 An invalid device as claimed in claim 1 and claim 2, wherein the device is distinguishable by the authorised user from a valid device by appearance, taste, smell, sound or texture.
4 An invalid device as claimed in claim 1 and claim 2, wherein, if it is used, it can be assumed that an unauthorised user is in possession.
5 An invalid device as claimed in claim 1 and claim 2, wherein the invalid device is detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer.
6 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will trigger suspension of resources available to the authorised user.
7 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will cause other devices issued to the authorised user to be classified as invalid.
8 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will trigger transmission of warnings to personnel at the point of use.
9 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will. enable use of photographic or other evidence from the point of use.
18 An invalid device as claimed in claim 1 and claim 2, wherein use of the device will physically restrain an unauthorised-user.
11 An invalid device as claimed in claim 1 and claim 2, wherein the invalid device is issued in a part worn state.
12 An invalid device as claimed in claim 1 and claim 2, issued by one institution to protect devices issued by another institution.
Amendments to the claims have been filed as follows 1 An invalid device which would appear, to an unauthorised user, to be as valid as a genuine device which is to be protected.
2 An invalid device as claimed in claim 1, wherein one or more identifying characteristics recorded on the device are sufficient to indicate to the issuing authority, directly or indirectly, that the device is invalid.
3 An invalid device as claimed in claim 1 or claim 2, wherein the device is distinguishable by the authorised user from a valid device by appearance or taste or smell or sound or texture.
4 An invalid device as claimed in claim 1 or claim 2 or claim 3, wherein, if it is used, it can be assumed that an unauthorised user is in possession.
5 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4, wherein the invalid device is detectable after its insertion into a machine (which may be linked to a computer) or after verbal or textual relay of the device details to the issuer.
6 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5, wherein use of the device will trigger suspension of resources available to the authorised user.
7 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6, wherein use of the device will cause other devices issued to the authorised user to be classified as invalid.
8 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7, wherein use of the device will trigger transmission of warnings to personnel at the point of use.
9 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8, wherein use of the device will enable use of photographic or other evidence from the point of use.
10 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9, wherein use of the device will physically restrain an unauthorised user.
11 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10, wherein the invalid device is issued in a part worn state.
12 An invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10 or claim 11, issued by one institution to protect a device issued by another institution.
13 The use of an invalid device as claimed in claim 1 or claim 2 or claim 3 or claim 4 or claim 5 or claim 6 or claim 7 or claim 8 or claim 9 or claim 10 or claim 11 or claim 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9223608A GB2272550A (en) | 1992-11-11 | 1992-11-11 | Access/security device protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9223608A GB2272550A (en) | 1992-11-11 | 1992-11-11 | Access/security device protection |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9223608D0 GB9223608D0 (en) | 1992-12-23 |
GB2272550A true GB2272550A (en) | 1994-05-18 |
Family
ID=10724891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9223608A Withdrawn GB2272550A (en) | 1992-11-11 | 1992-11-11 | Access/security device protection |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2272550A (en) |
-
1992
- 1992-11-11 GB GB9223608A patent/GB2272550A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB9223608D0 (en) | 1992-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6068184A (en) | Security card and system for use thereof | |
US6955294B1 (en) | Apparatus and method for preventing credit card fraud | |
Levi | Business, cities and fears about crimes | |
GB2272550A (en) | Access/security device protection | |
US20080136407A1 (en) | System and method for magnetic field exposure indication | |
Fischer et al. | Loss prevention and security procedures: Practical applications for contemporary problems | |
JP2932306B2 (en) | Automatic cash transaction method | |
Jain | ATM frauds: Detection & prevention | |
Revill | Library security | |
Sharma et al. | Digital data stealing from ATM using data skimmers: Challenge to the forensic examiner | |
Graziano et al. | Automated Teller Machines: Boon or Bane | |
Dasari | Is Bank Locker the Safest Option?(New Guidelines of Reserve Bank of India on Bank Safe Deposit Lockers) | |
WO1996007150A1 (en) | A method and apparatus for verifying a transaction | |
Arata Jr | Preventing Identity Theft for Dummies | |
Essinger | Computer Security in Financial Organizations | |
Joshi | Black Card Forensics | |
Yogodzinski | Electronic Funds Transfer Systems-An Analysis of Federal and State Criminal Law | |
Crime | The measurement of white-collar crime using Uniform Crime Reporting (UCR) Data | |
Lamberger et al. | Some dilemmas regarding payment card related crimes | |
Gul et al. | Crime of the millennium: Cyber crime | |
WO2000054195A1 (en) | Dual pin number silent alarm for atm machines | |
Brown | Computer crime in the Australian military environment | |
US20020195498A1 (en) | Method and device for preventing uncontrolled and unauthorized use of credit cards and like data devices | |
Hettinga | Internet banking and commerce: security | |
Wilson | The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |