GB2293476A - Magnetic card reader - Google Patents

Magnetic card reader Download PDF

Info

Publication number
GB2293476A
GB2293476A GB9519627A GB9519627A GB2293476A GB 2293476 A GB2293476 A GB 2293476A GB 9519627 A GB9519627 A GB 9519627A GB 9519627 A GB9519627 A GB 9519627A GB 2293476 A GB2293476 A GB 2293476A
Authority
GB
United Kingdom
Prior art keywords
card
magnetic
reader
information
magnetic card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9519627A
Other versions
GB9519627D0 (en
Inventor
Junji Ohwa
Kenji Hirasawa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nidec Sankyo Corp
Original Assignee
Nidec Sankyo Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nidec Sankyo Corp filed Critical Nidec Sankyo Corp
Publication of GB9519627D0 publication Critical patent/GB9519627D0/en
Publication of GB2293476A publication Critical patent/GB2293476A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/08Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
    • G06K7/082Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors
    • G06K7/083Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive
    • G06K7/084Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive sensing magnetic material by relative movement detecting flux changes without altering its magnetised state

Landscapes

  • Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Description

METHOD OF PREVENTING A MAGNETIC CARD FROM BEING FRAUDULENTLY USED, AND A
CARD READER
BACKGROUND OF THE INVENTION
Field of The inyention
2293476 This invention relates to a technique of preventing a magnetic card frequently used as a credit card or the like, from being fraudulently used, and more particularly to an improvement of a technique of preventing a magnetic card from being used by steal.
Backaround
Magnetic cards such as credit cards which are based an accounts of banks, etc. are widely used as cashless device. Usually, a single person uses a number of magnetic cards.
Such a magnetic card allows dealings for cash to be automatically performed. Therefore, there is a problem in that, when a magnetic card is used by steal, extensive damage may be caused.
To comply with this, a magnetic card is provided with security device such as an addition of a password. In practice, when the password of a magnetic card is once known, however, the magnetic card is easily used fraudulently.
In place of cash, prepaid cards such as phonecards are widely used. When such a prepaid card is once stolen, it is impossible to prevent the prepaid card from being used by 0 11 steal Furthermore, oblique dealings are often practiced in which the amount of a card is kept full by pulling out the card before settlement.
In order to prevent such fraud from occurring, a technique is proposed in JaFanese Utility Model publication No Hei. 4-28374 entitled "CARC READER'. The proposed technique can be applied to a card reader having a special ccnfiguration in which a magnetic card is placed on a card tr-zy and then introduced into the card reader, the trav is s--opoed at a normal position, and a magnetic head is caused to run on the card to read and write information such as an amount. According to the technique, a destruction unit which, when the tray is at the normal position, butts against a magnetic storage portion of the card is advanced into the vicinity of the card insertion slot. When the card is intentionally pulled out before the completion of the information reading and writing process, the destruction unit destroys the information of the magnetic storage portion so that the card is disabled to be again used.
In a card reader which is commonly used, however, a magnetic card is caused to run so as to be made slidingly contact with a magnetic head located at a normal position, thereby reading and writing information.
In card readers of this type, fraud has frequently been practiced in the following manner. A card reader is previously modified so that a card is intentionally stopped in the reader.
when a normal user inserts a magnetic card into the card reader, the card is stopped in the card reader and not returned to the user. After making sure that the user Igives up the recovery of the card and leaves the card reader, the stopped card is pulled out. Such fraud can be repeatedly conducted.
SUNIMARYOF THE INVENTION The problem to be solved by the invention is the above-described fraudulent use. Fundamentally, in the same manner as the above conventional example, the problem can be solved by, when a card is fraudulently pulled out, destroying information stored in the card. However, the above conventional example cannot attain a fraudulent use prevention method which can be applied to a magnetic card reader of the card running type, particularly to a magnetic card reader having a normal configuration.
The invention has an objection of providing a technique of destroying stored information which is to be conducted when a card is intentionally pulled out in a magnetic card reader of the card running type.
According to the invention there is provided a method of preventing a cared with stored information data from being fraudulently used in a card reader of the card running type, said method comprising the step of destroying at least a part of the information data stored in the card by an information destruction device when the card is fraudulently pulled out from the card reader.
Furthermore, there is provided a card reader device of the card runniner type for preventing a card with stored information data from being fraudulently used, said card reader comprising:
a stoppage detecting device for detecting an abnormal stoppage of the card, a movement detectin,, device for detectine a movement of the card after the abnormal stoppage. and 1 an information destruction device for destroying at least a part of the information data, said information destruction device beinR activated in response to the movement of the card detected by said movement detecting device.
BRIEF DESCRIPTION OF THE DPLAWINIGS
Fig. 1 is a diagram showing the fundamental configuration of the card reader of the invention and the length of a card, Fig. 2 is a block diagram of a circuit for controlling f I1 the operation of Fig. 1; Fig. 3 is a flowchart of a process of detecting the stoppage of the magnetic card; and Fig. 4 is a flowchart of a process of destrcying stored information.
DETAI, 1ED DESCRIPTION OF THE PREFERRED EMBOD--MENTS
Hereinafter, embodiments of the invention will now be described in detail with reference to Figs. 1 to 4.
Fig. 1 is a diagram showing the configuration of a card reader and the length of a card. In a card running path 0 which is disposed inside with respect to a card insertion slot 1, the following components are disposed: a card detection magnetic head 2 at a position corresponding to a magnetic stripe of an inserted magnetic card C; a magnetic head 8 for destroying magnetic information; a shutter 3 which can blocks the card insertion and, in the case of a normal card, is driven by driving device such as a solenoid 31 to open the card running path 0; card feeding rollers 41 to 43 which are arranged at intervals shorter than the length of the card and driven by a card feed motor 40; a pat roller 64 which opposes the magnetic head 2, driven rollers 61 to 63 which oppose the card feeding rollers 41 to 43, respectively; a magnetic head 5 which is adjacent to the side of the driven roller 63 and reads and writes magnetic information; and card sensors 71 to 73 which are arranged in a portion of the card 1 1 L_ running path 0 inner than the card feeding roller 41 and at intervals longer than the length of the card. The card sensor 72 is disposed so as to be adjacent to the side of the card feeding roller 42. These card sensors are photosensors each consisting of a light emitzing device and a light receiving device. Alternatively, the card sensors may be realized by using sensors of other types such as a switch.
Fig. 2 is a block d-Jagram of the circuit of the card reader. A central processi..-ig unit (CPU) 9 consists of a microcomputer which controls the whole of the card reader. The magnetic head 2, the card sensors 71 to 73, an encoder 45 which detects the rotation of the card feed motor 40, a driver 46 which drives the card feed motor 40, the solenoid 31 which drives the shutter 3, and the information destruction magnetic head 8 are connected to the CPU 9. A reset button 91 is connected to a reset terminal.
In place of the card detection magnetic head 2, a mechanical or optical switch may be used for detecting the card insertion.
Next, the operation of the card reader will be described.
The shutter 3 is normally closed (to shut the card running path 0). When a normal magnetic card C (a credit card or a prepaid card) is inserted through the card insertion slot, the magnetic head 2 detects the magnetic stripe (not shown) of the card and the solencid 311 is driven. This drive causes the shutter 3 to be opened so that the magnetic card C is inserted into the inner portion (the insertion is manually conducted). Simultaneously, the card feed motor 40 is driven so that the card feeding rollers 41 to 43 are rotated. When the front end of the magnetic card C reaches the card feeding roller 41, the magnetic card C is transported in the card running path 0 by the card feeding roller 41.
When the magnetic card C reaches the magnetic head 3 and further runs, magnetic information stored in the magnetic stripe is read. when the card sensor 72 does not detect the magnetic card C any longer, it is judged that the magnetic card C has passed over the magnetic head 5, and then the card feed motor 40 is caused to reversely rotate so that the magnetic card C is returned.
When information stored in the magnetic card C is to be updated, the magnetic card C is reciprocally moved two or three times with respect to the magnetic head 5 so as to be subjected to the processes of reading and writing information. This operation is well known, and therefore its detail description is omitted.
Next, the operation of detecting the stoppage of the magnetic card (the operation is controlled by the CPU 9) will be described with reference to a flowchart of Fig. 3.
The card reader is set to be in the operation enabled state, and L-he CPU 9 is set.
When the normal magnetic card C is inserted through the 7 card insertion slot 1 under this condition, the magnetic head 2 detects the card, the solenoid 31 is driven so that the shutter. 3 is raised in Fig. 1, and the card feed motor is driven. Therefore, the card running path 0 is opened and the magnetic card C can be inserted into the reader. When the front end of the card reaches the card feeding roller 41, the card is caused to run by the transporting force exerted by the rollers 41 and 61.
When the magnetic card C reaches the sensor 71, a timer incorporated in the CPU 9 starts the time count operation. When the magnetic card C fails to reach the sensor 72 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader. The time period is set to be 3 sec. because of the following reason. When the card reader operates normally, the time period required for a card to reach the sensor is about 1/10 times the preset emergency stop time period (i.e., 0.2 to 0. 3 sec.). In consideration of variations in operation, the time period is set so as to provide a margin.
If the magnetic card C runs normally, the sensor 72 detects the magnetic card C at an elapse of a time period as short as 0.2 to 0.3 sec. after the sensor 71 detects the magnetic card C, and therefore such an emergency stop never occurs.
When the magnetic card C reaches the sensor 72, a timer incorporated in the CPU 9 starts the time count operation.
01 When the magnetic card C fails to completely pass over the sensor 72 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader.
If the magnetic card C runs normally, the magnetic card C completely passes over the sensor 72 within a short time period after the sensor 71 detects the magnetic card C, and the sensor 72 is then turned off. Therefore, such an emergency stop never occurs.
When the magnetic card C completely passes over the sensor 72, a timer incorporated in the CPU 9 starts the time count operation and the card feed motor 40 is caused to reversely rotate so that the magnetic card C runs in the opposite direction. When the magnetic card C fails to reach the sensor 71 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader.
If the magnetic card C runs normally, the sensor.71 detects the magnetic card C within a short time period after the magnetic card C passes over the sensor 72, and therefore, such an emergency stop never occurs. Thereafter, this condition is kept until the card is discharged.
The card sensor 73 is located at a position which is inner than the card sensor 72, in order that, in the case where the magnetic card C is stopped at a position inner than the card sensor 72, the stoppage position is determined.
7 0 When magnetically stored information is to be updated as described above, the card feed motor 40 is caused to forward rotate in response to the card detection of the sensor 71, so that the above-mentioned operation is repeatedly conducted, whereby the card is reciprocally moved over the magnetic head 5 several times required for the update of magnetically stored information. Thereafter, the operation is finished.
Next, the operation of destroying stored information of a magnetic card (controlled by the CPU 9) will be described with reference to a flowchart of Fig. 4.
Under the initial condition shown in Fig. 3, the card reader is set to be in the operation enabled state, and the CPU 9 is set.
As described above, in this condition, the timers incorporated in the CPU 9 are turned ON/OFF in response to signals from the respective sensors 71 and 72 which detect the passage of the card C, and the CPU 9 monitors the magnetic card C to see whether the card is subjected to the emergency stop operation shown in Fig. 3 or not, on the basis of elapses of the preset time periods of the timers.
If the emergency stop operation is detected, the movement of the magnetic card C is monitored on the basis of the presence or absence of an output of the encoder 45. Specifically, the encoder 45 detects the rotation of the card feed motor 40 driven by the card feeding rollers 41 to 43 which are rotated in accordance with the movement of the card C, and produces an output. On the basis of the presence or absence of the output of the encoder 45, therefore, it is possible to monitor the movement of, the magnetic card C. When the output of the encoder 45 is supplied to the CPU 9 after an emergency stop, the information destruction magnetic head 8 is driven so as to generate a strong magnetic field.
This condition is kept until all the card sensors 71 to 73 do not detect the magnetic card C. When the magnetic card C is fraudulently pulled out, therefore, the magnetic stripe of the magnetic card C passes through the strong magnetic field of the information destruction magnetic head 8, and therefore stored information is destroyed by the strong magnetic field. It is sufficient for the destruction to be conducted on only a part of the stored information. The part of stored information can surely be destroyed by the operation of pulling out the card.
When the emergency stop is to be corrected, the operator presses the reset button so that the CPU is reset. This causes the information destruction magnetic head 8 not to be driven, and hence information stored in the magnetic card C is prevented from being destroyed.
The embodiment described above is a preferred example of executing the invention. However, the invention is not restricted to the embodiment, and may be executed in variously modified manner without departing from its spirit.
For example, the stored information destruction device 1 j L may be realized by conducting a deforming process such as punching, scratching, or projection (embossment or the like) on the stripe portion of the magnetic card C by using a punch which is intermittently driven, thereby disabling the card from being reused. When the magnetic stripe is once deformed or at least uneven portion is formed in the stripe, information cannot be read, and hence it is substantially impossible to reuse the magnetic card.
The intermittent driving of the punch is conducted because the timing when the magnetic card C passes below the punch cannot be specified.
When the magnetic card C is heated to a temperature higher than the Curie point, magnetic information of the stripe is destroyed. Consequently, heating device such as a heater which can heat the card to a temperature of about 200 IC may be used as the stored information destruction device.
Alternatively, the information destruction device may be realized by advancing a f ile or the like into the card running path so as to oppose the stripe, and then scratching the stripe.
As described above, according to the invention, a magnetic card reader of the card running type is constructed so that, when a magnetic card which stops in the reader is pulled out, the stored information destruction device destroys stored information. Even when device for stopping a card is intentionally disposed in the reader and a magne-LLc card of 1 1 another person which stops in the reader is stolen from the reader, therefore, it is possible to prevent the stealing from producing a victim. When a magnetic head or a heater is used as the stored information destruction device, particularly, it is possible to attain an effect that the stealer cannot recognize the fact that stored information is destroyed. The invention may be applied to a magnetic card reader which is already in operation.
)4- CLAlNiIS- A method of preventing a card with stored information data from being fraudulently used in a card reader of the card running type, said method comprising the step of destroying at least a part of the information data stored in the card by an information destruction device when the card is fraudulently pulled out from the card reader.
The method of claim 1 wherein said information destruction device is activated in response to a movement of the card detected by a movement detecting device after detecting an abnormal stoppage of the card by a stoppage detecting device.
The method of claim 2 wherein said stoppage detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a length of the card.
4 The method of claim 33 wherein the card fails to completely pass over one of said card sensors in a predetermined time, it is judged to be subjected to an J 2, abnormal stoppage, thereby the card reader being stopped.
5. The method of claim 4 wherein said movement detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a length of the card.
6. The method of claim 3 wherein when the card does not reach one of id card sensors in a predetermined time after being detected by the adjacent one. it is sai 1 judged to be subjected to an abnormal stoppage, thereby the card reader being stopped.
7. The method of claim 6 wherein said movement detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a lench of the card.
8. The method of claim 4 wherein said movement detecting device includes an encoder for detecting a rotation of a motor for feeding the card.
9. The method of claim 6 wherein said movement detectine device includes an encoder for detecting a rotation of a motor for feeding the card.
10. The method of claim 1 wherein said information destruction device includes an erasing member electromagnetically generating a strong magnetic field.
11. The method of claim 10 wherein said erasing member is on a side of a card insertion slot in a card running path of the card reader.
12. The method of claim 1 wherein said information destruction device includes a heater member generating a heat.
13. The method of claim 12 wherein said heater member is on a side of a card insertion slot in a card running path of the card reader.
14. The method of claim 1 wherein said information destruction device includes a deforming member deforming the card.
15. The method of claim 14 wherein said deforming member is on a side of a card insertion slot in a card running path of the card reader.
16. A card reader device of the card running type for preventing a card with stored information data ftorn being ftaudulently used, said card reader comprising..
a stoppage detecting device for detecting an abnormal stoppage of the card, a movement detecting device for detecting a movement of the card after the abnormal stoppage, and (6 an information destruction device for destroying at least a part of the information data, said information destruction device being activated in response to the movement of the card detected by said movement detecting device.
17. A method substantially as described herein with particular reference to Figures 3) and 4 of the accompanying drawings.
18. A device substantially as described herein with particular reference to Figures 1 and 2 of the accompanying drawings.
GB9519627A 1994-09-26 1995-09-26 Magnetic card reader Withdrawn GB2293476A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP22965794A JP2990485B2 (en) 1994-09-26 1994-09-26 Method for preventing unauthorized use of magnetic card and card reader

Publications (2)

Publication Number Publication Date
GB9519627D0 GB9519627D0 (en) 1995-11-29
GB2293476A true GB2293476A (en) 1996-03-27

Family

ID=16895646

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9519627A Withdrawn GB2293476A (en) 1994-09-26 1995-09-26 Magnetic card reader

Country Status (3)

Country Link
JP (1) JP2990485B2 (en)
DE (1) DE19535787A1 (en)
GB (1) GB2293476A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0784284A2 (en) * 1995-12-14 1997-07-16 Ncr International Inc. A card reader
EP0779599A3 (en) * 1995-12-14 1998-11-04 Ncr International Inc. A card reader system
GB2362013A (en) * 2000-05-04 2001-11-07 Ncr Int Inc Card reader module
EP1798668A1 (en) * 2005-12-13 2007-06-20 Hitachi-Omron Terminal Solutions, Corp. Card processor
US7451983B2 (en) * 2002-11-27 2008-11-18 Wincor Nixdorf International Gmbh Card-holding device in a card-processing apparatus
CN100437621C (en) * 2002-11-27 2008-11-26 温科尼克斯多夫国际有限公司 Card-holding device in a card-processing apparatus

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4064913B2 (en) 2003-12-02 2008-03-19 日本電産サンキョー株式会社 Card reader
DE102005043317B3 (en) * 2005-09-12 2007-04-12 Wincor Nixdorf International Gmbh Method and device for generating an electromagnetic protective field for a card reader
DE102008035915A1 (en) * 2008-07-31 2010-02-04 Wincor Nixdorf International Gmbh Tamper detection system for cash dispensers deployable in ATMs

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4322613A (en) * 1980-04-08 1982-03-30 Vendacopy, Inc. Method for tamper-proofing magnetic stripe card reader

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4322613A (en) * 1980-04-08 1982-03-30 Vendacopy, Inc. Method for tamper-proofing magnetic stripe card reader

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0784284A2 (en) * 1995-12-14 1997-07-16 Ncr International Inc. A card reader
EP0779599A3 (en) * 1995-12-14 1998-11-04 Ncr International Inc. A card reader system
EP0784284A3 (en) * 1995-12-14 1998-11-04 Ncr International Inc. A card reader
GB2362013A (en) * 2000-05-04 2001-11-07 Ncr Int Inc Card reader module
WO2001084486A1 (en) * 2000-05-04 2001-11-08 Ncr International, Inc Anti-fraud card reader module
US6588659B2 (en) 2000-05-04 2003-07-08 Ncr Corporation Card reader module
GB2362013B (en) * 2000-05-04 2004-03-31 Ncr Int Inc Card reader module
US7451983B2 (en) * 2002-11-27 2008-11-18 Wincor Nixdorf International Gmbh Card-holding device in a card-processing apparatus
CN100437621C (en) * 2002-11-27 2008-11-26 温科尼克斯多夫国际有限公司 Card-holding device in a card-processing apparatus
US7708274B2 (en) 2002-11-27 2010-05-04 Wincor Nixdorf International Gmbh Card-holding device in a card-processing apparatus
US7980474B2 (en) 2002-11-27 2011-07-19 Wincor Nixdorf International Gmbh Card-holding device in a card-processing apparatus
EP1798668A1 (en) * 2005-12-13 2007-06-20 Hitachi-Omron Terminal Solutions, Corp. Card processor

Also Published As

Publication number Publication date
JPH0896093A (en) 1996-04-12
DE19535787A1 (en) 1996-03-28
JP2990485B2 (en) 1999-12-13
GB9519627D0 (en) 1995-11-29

Similar Documents

Publication Publication Date Title
EP1067474B1 (en) Magnetic card transaction apparatus
EP1798668B1 (en) Card processor
US5317137A (en) Magnetic debit card reader fraudulent use prevention
US4612436A (en) Reading and writing apparatus for ID cards
US5796083A (en) Self-service terminal capable of detecting fraudulent use of an integrated circuit card
US4322613A (en) Method for tamper-proofing magnetic stripe card reader
US20070080231A1 (en) Card processing device
US20170061167A1 (en) Skimmer device detection
GB2293476A (en) Magnetic card reader
JP4464021B2 (en) Electric card reader module
EP1410314B1 (en) Anti-fraud card reader module and method for preventing fraud
US4007356A (en) Card retrieval means
JP3850595B2 (en) Magnetic card transaction device
US4288783A (en) Device for selectively authorizing passage through a door
JP2002150354A (en) Card reader module
JPH07244709A (en) Magnetic card reader
JPH0310393A (en) Card and processor for same
JPS6142313B2 (en)
JP2594476Y2 (en) Magnetic data collation device
JP4006940B2 (en) Wristband automatic payment machine
KR940009721B1 (en) Portable recording card for protecting counterfeit and it's reading and writing apparatus and method
JPH0752482B2 (en) How to prevent re-use of invalid cards
JPH083875B2 (en) Card payment method
JP2000099667A (en) Card processor
WO2011081610A1 (en) A device for a card jammed in a card reader

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)