GB2293476A - Magnetic card reader - Google Patents
Magnetic card reader Download PDFInfo
- Publication number
- GB2293476A GB2293476A GB9519627A GB9519627A GB2293476A GB 2293476 A GB2293476 A GB 2293476A GB 9519627 A GB9519627 A GB 9519627A GB 9519627 A GB9519627 A GB 9519627A GB 2293476 A GB2293476 A GB 2293476A
- Authority
- GB
- United Kingdom
- Prior art keywords
- card
- magnetic
- reader
- information
- magnetic card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/08—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
- G06K7/082—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors
- G06K7/083—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive
- G06K7/084—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive sensing magnetic material by relative movement detecting flux changes without altering its magnetised state
Landscapes
- Engineering & Computer Science (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Description
METHOD OF PREVENTING A MAGNETIC CARD FROM BEING FRAUDULENTLY USED, AND A
CARD READER
BACKGROUND OF THE INVENTION
Field of The inyention
2293476 This invention relates to a technique of preventing a magnetic card frequently used as a credit card or the like, from being fraudulently used, and more particularly to an improvement of a technique of preventing a magnetic card from being used by steal.
Backaround
Magnetic cards such as credit cards which are based an accounts of banks, etc. are widely used as cashless device. Usually, a single person uses a number of magnetic cards.
Such a magnetic card allows dealings for cash to be automatically performed. Therefore, there is a problem in that, when a magnetic card is used by steal, extensive damage may be caused.
To comply with this, a magnetic card is provided with security device such as an addition of a password. In practice, when the password of a magnetic card is once known, however, the magnetic card is easily used fraudulently.
In place of cash, prepaid cards such as phonecards are widely used. When such a prepaid card is once stolen, it is impossible to prevent the prepaid card from being used by 0 11 steal Furthermore, oblique dealings are often practiced in which the amount of a card is kept full by pulling out the card before settlement.
In order to prevent such fraud from occurring, a technique is proposed in JaFanese Utility Model publication No Hei. 4-28374 entitled "CARC READER'. The proposed technique can be applied to a card reader having a special ccnfiguration in which a magnetic card is placed on a card tr-zy and then introduced into the card reader, the trav is s--opoed at a normal position, and a magnetic head is caused to run on the card to read and write information such as an amount. According to the technique, a destruction unit which, when the tray is at the normal position, butts against a magnetic storage portion of the card is advanced into the vicinity of the card insertion slot. When the card is intentionally pulled out before the completion of the information reading and writing process, the destruction unit destroys the information of the magnetic storage portion so that the card is disabled to be again used.
In a card reader which is commonly used, however, a magnetic card is caused to run so as to be made slidingly contact with a magnetic head located at a normal position, thereby reading and writing information.
In card readers of this type, fraud has frequently been practiced in the following manner. A card reader is previously modified so that a card is intentionally stopped in the reader.
when a normal user inserts a magnetic card into the card reader, the card is stopped in the card reader and not returned to the user. After making sure that the user Igives up the recovery of the card and leaves the card reader, the stopped card is pulled out. Such fraud can be repeatedly conducted.
SUNIMARYOF THE INVENTION The problem to be solved by the invention is the above-described fraudulent use. Fundamentally, in the same manner as the above conventional example, the problem can be solved by, when a card is fraudulently pulled out, destroying information stored in the card. However, the above conventional example cannot attain a fraudulent use prevention method which can be applied to a magnetic card reader of the card running type, particularly to a magnetic card reader having a normal configuration.
The invention has an objection of providing a technique of destroying stored information which is to be conducted when a card is intentionally pulled out in a magnetic card reader of the card running type.
According to the invention there is provided a method of preventing a cared with stored information data from being fraudulently used in a card reader of the card running type, said method comprising the step of destroying at least a part of the information data stored in the card by an information destruction device when the card is fraudulently pulled out from the card reader.
Furthermore, there is provided a card reader device of the card runniner type for preventing a card with stored information data from being fraudulently used, said card reader comprising:
a stoppage detecting device for detecting an abnormal stoppage of the card, a movement detectin,, device for detectine a movement of the card after the abnormal stoppage. and 1 an information destruction device for destroying at least a part of the information data, said information destruction device beinR activated in response to the movement of the card detected by said movement detecting device.
BRIEF DESCRIPTION OF THE DPLAWINIGS
Fig. 1 is a diagram showing the fundamental configuration of the card reader of the invention and the length of a card, Fig. 2 is a block diagram of a circuit for controlling f I1 the operation of Fig. 1; Fig. 3 is a flowchart of a process of detecting the stoppage of the magnetic card; and Fig. 4 is a flowchart of a process of destrcying stored information.
DETAI, 1ED DESCRIPTION OF THE PREFERRED EMBOD--MENTS
Hereinafter, embodiments of the invention will now be described in detail with reference to Figs. 1 to 4.
Fig. 1 is a diagram showing the configuration of a card reader and the length of a card. In a card running path 0 which is disposed inside with respect to a card insertion slot 1, the following components are disposed: a card detection magnetic head 2 at a position corresponding to a magnetic stripe of an inserted magnetic card C; a magnetic head 8 for destroying magnetic information; a shutter 3 which can blocks the card insertion and, in the case of a normal card, is driven by driving device such as a solenoid 31 to open the card running path 0; card feeding rollers 41 to 43 which are arranged at intervals shorter than the length of the card and driven by a card feed motor 40; a pat roller 64 which opposes the magnetic head 2, driven rollers 61 to 63 which oppose the card feeding rollers 41 to 43, respectively; a magnetic head 5 which is adjacent to the side of the driven roller 63 and reads and writes magnetic information; and card sensors 71 to 73 which are arranged in a portion of the card 1 1 L_ running path 0 inner than the card feeding roller 41 and at intervals longer than the length of the card. The card sensor 72 is disposed so as to be adjacent to the side of the card feeding roller 42. These card sensors are photosensors each consisting of a light emitzing device and a light receiving device. Alternatively, the card sensors may be realized by using sensors of other types such as a switch.
Fig. 2 is a block d-Jagram of the circuit of the card reader. A central processi..-ig unit (CPU) 9 consists of a microcomputer which controls the whole of the card reader. The magnetic head 2, the card sensors 71 to 73, an encoder 45 which detects the rotation of the card feed motor 40, a driver 46 which drives the card feed motor 40, the solenoid 31 which drives the shutter 3, and the information destruction magnetic head 8 are connected to the CPU 9. A reset button 91 is connected to a reset terminal.
In place of the card detection magnetic head 2, a mechanical or optical switch may be used for detecting the card insertion.
Next, the operation of the card reader will be described.
The shutter 3 is normally closed (to shut the card running path 0). When a normal magnetic card C (a credit card or a prepaid card) is inserted through the card insertion slot, the magnetic head 2 detects the magnetic stripe (not shown) of the card and the solencid 311 is driven. This drive causes the shutter 3 to be opened so that the magnetic card C is inserted into the inner portion (the insertion is manually conducted). Simultaneously, the card feed motor 40 is driven so that the card feeding rollers 41 to 43 are rotated. When the front end of the magnetic card C reaches the card feeding roller 41, the magnetic card C is transported in the card running path 0 by the card feeding roller 41.
When the magnetic card C reaches the magnetic head 3 and further runs, magnetic information stored in the magnetic stripe is read. when the card sensor 72 does not detect the magnetic card C any longer, it is judged that the magnetic card C has passed over the magnetic head 5, and then the card feed motor 40 is caused to reversely rotate so that the magnetic card C is returned.
When information stored in the magnetic card C is to be updated, the magnetic card C is reciprocally moved two or three times with respect to the magnetic head 5 so as to be subjected to the processes of reading and writing information. This operation is well known, and therefore its detail description is omitted.
Next, the operation of detecting the stoppage of the magnetic card (the operation is controlled by the CPU 9) will be described with reference to a flowchart of Fig. 3.
The card reader is set to be in the operation enabled state, and L-he CPU 9 is set.
When the normal magnetic card C is inserted through the 7 card insertion slot 1 under this condition, the magnetic head 2 detects the card, the solenoid 31 is driven so that the shutter. 3 is raised in Fig. 1, and the card feed motor is driven. Therefore, the card running path 0 is opened and the magnetic card C can be inserted into the reader. When the front end of the card reaches the card feeding roller 41, the card is caused to run by the transporting force exerted by the rollers 41 and 61.
When the magnetic card C reaches the sensor 71, a timer incorporated in the CPU 9 starts the time count operation. When the magnetic card C fails to reach the sensor 72 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader. The time period is set to be 3 sec. because of the following reason. When the card reader operates normally, the time period required for a card to reach the sensor is about 1/10 times the preset emergency stop time period (i.e., 0.2 to 0. 3 sec.). In consideration of variations in operation, the time period is set so as to provide a margin.
If the magnetic card C runs normally, the sensor 72 detects the magnetic card C at an elapse of a time period as short as 0.2 to 0.3 sec. after the sensor 71 detects the magnetic card C, and therefore such an emergency stop never occurs.
When the magnetic card C reaches the sensor 72, a timer incorporated in the CPU 9 starts the time count operation.
01 When the magnetic card C fails to completely pass over the sensor 72 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader.
If the magnetic card C runs normally, the magnetic card C completely passes over the sensor 72 within a short time period after the sensor 71 detects the magnetic card C, and the sensor 72 is then turned off. Therefore, such an emergency stop never occurs.
When the magnetic card C completely passes over the sensor 72, a timer incorporated in the CPU 9 starts the time count operation and the card feed motor 40 is caused to reversely rotate so that the magnetic card C runs in the opposite direction. When the magnetic card C fails to reach the sensor 71 before an elapse of, for example, 3 sec., it is judged that the card is stopped, and an emergency stop operation is conducted on the card reader.
If the magnetic card C runs normally, the sensor.71 detects the magnetic card C within a short time period after the magnetic card C passes over the sensor 72, and therefore, such an emergency stop never occurs. Thereafter, this condition is kept until the card is discharged.
The card sensor 73 is located at a position which is inner than the card sensor 72, in order that, in the case where the magnetic card C is stopped at a position inner than the card sensor 72, the stoppage position is determined.
7 0 When magnetically stored information is to be updated as described above, the card feed motor 40 is caused to forward rotate in response to the card detection of the sensor 71, so that the above-mentioned operation is repeatedly conducted, whereby the card is reciprocally moved over the magnetic head 5 several times required for the update of magnetically stored information. Thereafter, the operation is finished.
Next, the operation of destroying stored information of a magnetic card (controlled by the CPU 9) will be described with reference to a flowchart of Fig. 4.
Under the initial condition shown in Fig. 3, the card reader is set to be in the operation enabled state, and the CPU 9 is set.
As described above, in this condition, the timers incorporated in the CPU 9 are turned ON/OFF in response to signals from the respective sensors 71 and 72 which detect the passage of the card C, and the CPU 9 monitors the magnetic card C to see whether the card is subjected to the emergency stop operation shown in Fig. 3 or not, on the basis of elapses of the preset time periods of the timers.
If the emergency stop operation is detected, the movement of the magnetic card C is monitored on the basis of the presence or absence of an output of the encoder 45. Specifically, the encoder 45 detects the rotation of the card feed motor 40 driven by the card feeding rollers 41 to 43 which are rotated in accordance with the movement of the card C, and produces an output. On the basis of the presence or absence of the output of the encoder 45, therefore, it is possible to monitor the movement of, the magnetic card C. When the output of the encoder 45 is supplied to the CPU 9 after an emergency stop, the information destruction magnetic head 8 is driven so as to generate a strong magnetic field.
This condition is kept until all the card sensors 71 to 73 do not detect the magnetic card C. When the magnetic card C is fraudulently pulled out, therefore, the magnetic stripe of the magnetic card C passes through the strong magnetic field of the information destruction magnetic head 8, and therefore stored information is destroyed by the strong magnetic field. It is sufficient for the destruction to be conducted on only a part of the stored information. The part of stored information can surely be destroyed by the operation of pulling out the card.
When the emergency stop is to be corrected, the operator presses the reset button so that the CPU is reset. This causes the information destruction magnetic head 8 not to be driven, and hence information stored in the magnetic card C is prevented from being destroyed.
The embodiment described above is a preferred example of executing the invention. However, the invention is not restricted to the embodiment, and may be executed in variously modified manner without departing from its spirit.
For example, the stored information destruction device 1 j L may be realized by conducting a deforming process such as punching, scratching, or projection (embossment or the like) on the stripe portion of the magnetic card C by using a punch which is intermittently driven, thereby disabling the card from being reused. When the magnetic stripe is once deformed or at least uneven portion is formed in the stripe, information cannot be read, and hence it is substantially impossible to reuse the magnetic card.
The intermittent driving of the punch is conducted because the timing when the magnetic card C passes below the punch cannot be specified.
When the magnetic card C is heated to a temperature higher than the Curie point, magnetic information of the stripe is destroyed. Consequently, heating device such as a heater which can heat the card to a temperature of about 200 IC may be used as the stored information destruction device.
Alternatively, the information destruction device may be realized by advancing a f ile or the like into the card running path so as to oppose the stripe, and then scratching the stripe.
As described above, according to the invention, a magnetic card reader of the card running type is constructed so that, when a magnetic card which stops in the reader is pulled out, the stored information destruction device destroys stored information. Even when device for stopping a card is intentionally disposed in the reader and a magne-LLc card of 1 1 another person which stops in the reader is stolen from the reader, therefore, it is possible to prevent the stealing from producing a victim. When a magnetic head or a heater is used as the stored information destruction device, particularly, it is possible to attain an effect that the stealer cannot recognize the fact that stored information is destroyed. The invention may be applied to a magnetic card reader which is already in operation.
)4- CLAlNiIS- A method of preventing a card with stored information data from being fraudulently used in a card reader of the card running type, said method comprising the step of destroying at least a part of the information data stored in the card by an information destruction device when the card is fraudulently pulled out from the card reader.
The method of claim 1 wherein said information destruction device is activated in response to a movement of the card detected by a movement detecting device after detecting an abnormal stoppage of the card by a stoppage detecting device.
The method of claim 2 wherein said stoppage detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a length of the card.
4 The method of claim 33 wherein the card fails to completely pass over one of said card sensors in a predetermined time, it is judged to be subjected to an J 2, abnormal stoppage, thereby the card reader being stopped.
5. The method of claim 4 wherein said movement detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a length of the card.
6. The method of claim 3 wherein when the card does not reach one of id card sensors in a predetermined time after being detected by the adjacent one. it is sai 1 judged to be subjected to an abnormal stoppage, thereby the card reader being stopped.
7. The method of claim 6 wherein said movement detecting device includes card sensors arranged in a card running direction and at intervals which are shorter than a lench of the card.
8. The method of claim 4 wherein said movement detecting device includes an encoder for detecting a rotation of a motor for feeding the card.
9. The method of claim 6 wherein said movement detectine device includes an encoder for detecting a rotation of a motor for feeding the card.
10. The method of claim 1 wherein said information destruction device includes an erasing member electromagnetically generating a strong magnetic field.
11. The method of claim 10 wherein said erasing member is on a side of a card insertion slot in a card running path of the card reader.
12. The method of claim 1 wherein said information destruction device includes a heater member generating a heat.
13. The method of claim 12 wherein said heater member is on a side of a card insertion slot in a card running path of the card reader.
14. The method of claim 1 wherein said information destruction device includes a deforming member deforming the card.
15. The method of claim 14 wherein said deforming member is on a side of a card insertion slot in a card running path of the card reader.
16. A card reader device of the card running type for preventing a card with stored information data ftorn being ftaudulently used, said card reader comprising..
a stoppage detecting device for detecting an abnormal stoppage of the card, a movement detecting device for detecting a movement of the card after the abnormal stoppage, and (6 an information destruction device for destroying at least a part of the information data, said information destruction device being activated in response to the movement of the card detected by said movement detecting device.
17. A method substantially as described herein with particular reference to Figures 3) and 4 of the accompanying drawings.
18. A device substantially as described herein with particular reference to Figures 1 and 2 of the accompanying drawings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP22965794A JP2990485B2 (en) | 1994-09-26 | 1994-09-26 | Method for preventing unauthorized use of magnetic card and card reader |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9519627D0 GB9519627D0 (en) | 1995-11-29 |
GB2293476A true GB2293476A (en) | 1996-03-27 |
Family
ID=16895646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9519627A Withdrawn GB2293476A (en) | 1994-09-26 | 1995-09-26 | Magnetic card reader |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2990485B2 (en) |
DE (1) | DE19535787A1 (en) |
GB (1) | GB2293476A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0784284A2 (en) * | 1995-12-14 | 1997-07-16 | Ncr International Inc. | A card reader |
EP0779599A3 (en) * | 1995-12-14 | 1998-11-04 | Ncr International Inc. | A card reader system |
GB2362013A (en) * | 2000-05-04 | 2001-11-07 | Ncr Int Inc | Card reader module |
EP1798668A1 (en) * | 2005-12-13 | 2007-06-20 | Hitachi-Omron Terminal Solutions, Corp. | Card processor |
US7451983B2 (en) * | 2002-11-27 | 2008-11-18 | Wincor Nixdorf International Gmbh | Card-holding device in a card-processing apparatus |
CN100437621C (en) * | 2002-11-27 | 2008-11-26 | 温科尼克斯多夫国际有限公司 | Card-holding device in a card-processing apparatus |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4064913B2 (en) | 2003-12-02 | 2008-03-19 | 日本電産サンキョー株式会社 | Card reader |
DE102005043317B3 (en) * | 2005-09-12 | 2007-04-12 | Wincor Nixdorf International Gmbh | Method and device for generating an electromagnetic protective field for a card reader |
DE102008035915A1 (en) * | 2008-07-31 | 2010-02-04 | Wincor Nixdorf International Gmbh | Tamper detection system for cash dispensers deployable in ATMs |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4322613A (en) * | 1980-04-08 | 1982-03-30 | Vendacopy, Inc. | Method for tamper-proofing magnetic stripe card reader |
-
1994
- 1994-09-26 JP JP22965794A patent/JP2990485B2/en not_active Expired - Fee Related
-
1995
- 1995-09-26 GB GB9519627A patent/GB2293476A/en not_active Withdrawn
- 1995-09-26 DE DE1995135787 patent/DE19535787A1/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4322613A (en) * | 1980-04-08 | 1982-03-30 | Vendacopy, Inc. | Method for tamper-proofing magnetic stripe card reader |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0784284A2 (en) * | 1995-12-14 | 1997-07-16 | Ncr International Inc. | A card reader |
EP0779599A3 (en) * | 1995-12-14 | 1998-11-04 | Ncr International Inc. | A card reader system |
EP0784284A3 (en) * | 1995-12-14 | 1998-11-04 | Ncr International Inc. | A card reader |
GB2362013A (en) * | 2000-05-04 | 2001-11-07 | Ncr Int Inc | Card reader module |
WO2001084486A1 (en) * | 2000-05-04 | 2001-11-08 | Ncr International, Inc | Anti-fraud card reader module |
US6588659B2 (en) | 2000-05-04 | 2003-07-08 | Ncr Corporation | Card reader module |
GB2362013B (en) * | 2000-05-04 | 2004-03-31 | Ncr Int Inc | Card reader module |
US7451983B2 (en) * | 2002-11-27 | 2008-11-18 | Wincor Nixdorf International Gmbh | Card-holding device in a card-processing apparatus |
CN100437621C (en) * | 2002-11-27 | 2008-11-26 | 温科尼克斯多夫国际有限公司 | Card-holding device in a card-processing apparatus |
US7708274B2 (en) | 2002-11-27 | 2010-05-04 | Wincor Nixdorf International Gmbh | Card-holding device in a card-processing apparatus |
US7980474B2 (en) | 2002-11-27 | 2011-07-19 | Wincor Nixdorf International Gmbh | Card-holding device in a card-processing apparatus |
EP1798668A1 (en) * | 2005-12-13 | 2007-06-20 | Hitachi-Omron Terminal Solutions, Corp. | Card processor |
Also Published As
Publication number | Publication date |
---|---|
JPH0896093A (en) | 1996-04-12 |
DE19535787A1 (en) | 1996-03-28 |
JP2990485B2 (en) | 1999-12-13 |
GB9519627D0 (en) | 1995-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1067474B1 (en) | Magnetic card transaction apparatus | |
EP1798668B1 (en) | Card processor | |
US5317137A (en) | Magnetic debit card reader fraudulent use prevention | |
US4612436A (en) | Reading and writing apparatus for ID cards | |
US5796083A (en) | Self-service terminal capable of detecting fraudulent use of an integrated circuit card | |
US4322613A (en) | Method for tamper-proofing magnetic stripe card reader | |
US20070080231A1 (en) | Card processing device | |
US20170061167A1 (en) | Skimmer device detection | |
GB2293476A (en) | Magnetic card reader | |
JP4464021B2 (en) | Electric card reader module | |
EP1410314B1 (en) | Anti-fraud card reader module and method for preventing fraud | |
US4007356A (en) | Card retrieval means | |
JP3850595B2 (en) | Magnetic card transaction device | |
US4288783A (en) | Device for selectively authorizing passage through a door | |
JP2002150354A (en) | Card reader module | |
JPH07244709A (en) | Magnetic card reader | |
JPH0310393A (en) | Card and processor for same | |
JPS6142313B2 (en) | ||
JP2594476Y2 (en) | Magnetic data collation device | |
JP4006940B2 (en) | Wristband automatic payment machine | |
KR940009721B1 (en) | Portable recording card for protecting counterfeit and it's reading and writing apparatus and method | |
JPH0752482B2 (en) | How to prevent re-use of invalid cards | |
JPH083875B2 (en) | Card payment method | |
JP2000099667A (en) | Card processor | |
WO2011081610A1 (en) | A device for a card jammed in a card reader |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |