WO2015005877A1 - Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires - Google Patents

Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires Download PDF

Info

Publication number
WO2015005877A1
WO2015005877A1 PCT/TR2013/000233 TR2013000233W WO2015005877A1 WO 2015005877 A1 WO2015005877 A1 WO 2015005877A1 TR 2013000233 W TR2013000233 W TR 2013000233W WO 2015005877 A1 WO2015005877 A1 WO 2015005877A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
control circuit
information
atms
connection
Prior art date
Application number
PCT/TR2013/000233
Other languages
English (en)
Inventor
Tuncer DUDUOGLU
Original Assignee
Duduoglu Tuncer
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Duduoglu Tuncer filed Critical Duduoglu Tuncer
Priority to PCT/TR2013/000233 priority Critical patent/WO2015005877A1/fr
Publication of WO2015005877A1 publication Critical patent/WO2015005877A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/205Housing aspects of ATMs
    • G07F19/2055Anti-skimming aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/205Housing aspects of ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/21Retaining of the payment card by ATMs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/28Countermeasures against jamming with jamming and anti-jamming mechanisms both included in a same device or system, e.g. wherein anti-jamming includes prevention of undesired self-jamming resulting from jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/42Jamming having variable characteristics characterized by the control of the jamming frequency or wavelength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/43Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/62Jamming involving special techniques by exposing communication, processing or storing systems to electromagnetic wave radiation, e.g. causing disturbance, disruption or damage of electronic circuits, or causing external injection of faults in the information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/86Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/14Jamming or countermeasure used for a particular application for the transfer of light or images, e.g. for video-surveillance, for television or from a computer screen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/20Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/30Jamming or countermeasure characterized by the infrastructure components
    • H04K2203/32Jamming or countermeasure characterized by the infrastructure components including a particular configuration of antennas

Definitions

  • This invention is in regards to the device which is used on ATMs and all similar financial machines, where cards with magnetic strips and chips can be used to deposit and/or withdraw money, in order to protect card information by integrating module for preventing skimming the information on customer cards, module for retaining customer cards to prevent stealing, communications module and event logging module. THE PRESENT STATE OF THE ART
  • This technique involves the use of such apparatus constructed from plastic so as to resemble the card slots of ATMs and all similar financial machines which can be easily attached onto ATMs to record information found on magnetic strips via a magnetic reader placed inside the apparatus and record the information to an analog or digital medium. Additionally, via a hidden camera on the ATM, undetectable by the client, clients' card passwords (PIN) are attained. After a duration, these apparatus are removed from the ATM by the fraudsters. Using the card information and passwords gained, counterfeit cards are produced. Similarly, through the use of an apparatus placed inside the card slot of ATMs, called a "Lebanese loop", clients' cards are trapped, preventing the card reader drawing the card in or ejecting it.
  • the client thinking that his/her card is captured by the ATM, leaves the ATM after which the fraudster retrieves the apparatus and gains the client's card. It is very difficult to detect the apparatus used in card skimming frauds after they have been placed on ATMs and all similar financial machines. Due to the nature of the fraud, even if the crime instrument is detected, it is impossible to prevent the apparatus from working (successfully committing the fraud) without human intervention.
  • Passive apparatus installed on card insertion slots to prevent the mounting of card copying and trapping apparatus on the surfaces ATMs and all similar financial machines have been developed. Fraudsters have altered the shapes of their crime instruments, manufactured so as to be able to be mounted on these passive apparatus.
  • Surface scan devices may lose calibration, cause false alarms or become unable to detect a real attack.
  • This method involves placing surface scanning sensors on surfaces likely to have the copying device be attached to and constantly scanning the surface capacitance or inductance while comparing results with an initial set- point.
  • sensor may be effected by such environmental variables as weather, surrounding devices, light and vibration; losing calibration, their inability to detect threats reliably and causing false alarms with no actual threat present.
  • the aforementioned invention resolves the disadvantages of the present technology which have been previously stated.
  • the aforementioned invention is related to a device which is used on ATMs and all similar financial machines, where cards with magnetic strips and chips can be used to deposit and/or withdraw money, in order to protect card information by integrating module for preventing skimming the information on customer cards, module for capturing customer cards physically, communications module and event logging module.
  • the aforementioned invention owing to its modular structure, overcomes the various fraud methods perpetrated on ATMs and similar money deposit/withdrawal devices.
  • the aforementioned invention prevents the hitherto unresolved card trapping fraud.
  • the aforementioned invention provides surveillance by transmitting whether it is active or inactive to a control panel. At the same time, it records the information internally, providing offline surveillance capability.
  • the aforementioned invention detects card trapping transgressions in real-time, physically blocking the card and thereby preventing the card from falling into the fraudsters' possession while also alerting the authorities.
  • the jammer broadcasting module of the aforementioned invention is more stable and functions on optimum levels in comparison to its equivalents.
  • the oscillator block providing three distinctive oscillations improves protection against filtering by variable methods. Broadcasting a focused field with its newly developed antenna structure, it minimizes the exposure of the ATM's peripheral units to the magnetic field.
  • the aforementioned invention is able to keep offline logs. Due to its remote programming property, the aforementioned invention's various properties related to end user's interest can be modified via the monitoring software.
  • the aforementioned invention integrates within it modules for the prevention of card skimming, the prevention of card trapping as well as communications and event logger modules. Thereby, it brings solutions to multiple problems.
  • the aforementioned invention has been designed to be easy to install and operate.
  • the installation process is short and can be done by anyone following basic training. Without the need for experts, it creates employment. Owing to its upgradeable structure, it allows the addition of new modules designed to combat security threats to ATMs and similar financial machines.
  • the aforementioned invention emits a jamming broadcast with focused field antenna, implemented for the first time in this field, increasing the effectiveness of the card skimming prevention system as well as minimizing adverse effects on peripheral units.
  • the aforementioned invention with, its successful solution to the problem, significantly increases card security against card trapping, widely accepted to be the future of ATM related crimes.
  • the aforementioned invention is a device with high traceability and accessibility due to its event logger and encrypted communication module.
  • a surface scanning module which works through a different perspective can be added to the aforementioned invention with modification.
  • Various upgrades can be made to be integrated with different types of security software and security systems (CCTV-Alarm systems).
  • the communication module can be upgraded for the reporting of information via different methods (Wi-Fi, GPS, etc.).
  • a module which disrupts the digital recording of spy camera footage used in card skimming can be added. Effectiveness can be improved by developing an apparatus, a bezel, matching the card slots of ATMs and all similar financial machines which house present and future apparatus.
  • the aforementioned invention can be utilized to prevent the unauthorized copying and physical theft of information on any magnetic card reader system which holds critical information.
  • FIG. 1 Schematic of the aforementioned invention
  • This invention is a device for protecting the card information on ATMs and all similar financial machines and it is comprised of the following parts: Control circuit
  • control circuit (1) is the unit which houses the aforementioned modular invention's power block (11) and main control elements.
  • the power block (11) converts the 24V power provided from the ATM's power supply through power inlet (9) to 5V to the relevant circuits. Additionally, it provides 24V power (13) to the oscillator block (14) for the generation of the necessary signals for the field focusing antenna (2) and to the relay block (17) for the card reader energy power outlet (22).
  • the control circuit microprocessor (16) controls the relevant units in accordance with the reference information from the ATM card reader.
  • This reference inlet (8) information is collected from the ATM's Shutter Switch or Card Switch pin. The reference information changes upon card entry and exit; this is detected by the reference inlet (8) via the Control Circuit microprocessor (16).
  • the Oscillator Block (14), controlled by the Control Circuit microprocessor (16) produces the necessary Frequency outlet (19) for the jamming broadcast which will be broadcast by the Field focusing antenna (2).
  • a status display (15) (LED or LCD) can display status information visually.
  • Field focusing antenna (2) is a separate unit connected to the control circuit (1) via a cable.
  • This is an antenna which copper wire wrapped around generally a C or E shaped ferrite or silicon steel sheet core, broadcasting a transmission preventing the acquisition of data.
  • This is a type of inductor.
  • By sending a square wave signal to the antenna a focused magnetic field is generated when power is turned on.
  • What sets it apart from Inductive Bar antenna is that instead of generating a homogenous amplitude magnetic field in all directions, it focuses the magnetic field in a specific direction. The magnetic field generated in directions other than the focus direction is negligibly low.
  • the Field focusing antenna's (2) broadcast frequency output varies between 1 kHz and 10kHz.
  • the Event Logger (3) and control circuit (1) are housed within the same box. This is the component which the malfunction, alarm and broadcast statuses of the invention are recorded and relayed to the communications module (4).
  • the status information received through the Serial communications link (21) is interpreted by the event logger microprocessor (23) and recorded to the memory block (25).
  • a real time circuit is used (24).
  • the request command for alteration requests in regards to the parameters which can be made by the end user, relayed by the communications module (4), is interpreted by the event logger microprocessor (23) and relayed to the control circuit microprocessor (16).
  • the data recorded to the Memory Block (25) is simultaneously relayed to the communication module (4).
  • the Communication Module (4) is a separate module; it is physically located in another box and connected to the event logger (3) via a cable. It is powered by the peripheral units power outlet (18) controlled by the control circuit (1).
  • the communications connection ( 0) established through the ATM computer (USB/RS232 connection) or an internet connection with the monitoring program will allow the relaying of status information to the relevant program.
  • a command for alteration requests in regards to the parameters which can be made by the end user can be received in this way.
  • the received alteration request command is relayed to the event logger microprocessor (23).
  • the card retainment control circuit (5) is a separate module; it is physically located in another box and connected to the control circuit (1) via a cable. It houses the electric motor (6) used by the card trapping prevention system and the Card retainment control microprocessor (28) which controls the mechanical card retaining mechanism (7). It is powered by the peripheral units power outlet (18) controlled by the control circuit (1).
  • the signal sent by the command relay link (20) makes Card retainment control microprocessor (28) generate the necessary signal for the electric motor (6). This weak current and amplitude signal is converted to the current and voltage level needed for the electric motor (6) by the motor driver circuit (29) and relayed to the motor.
  • the electric motor (6) is a part connected to the card retainment control circuit (5) by a cable. It is activated according to a signal from the card retainment control circuit (5).
  • the reductor (30) is comprised of an eccentric rod or gear system attached to the motor shaft and activates the mechanical card retaining mechanism (7).
  • the card retaining mechanism (7) is a module connected to the electric motor (6) via the reductor (30).
  • the cyclical motion from the electric motor (6) enables the vertical axis motion of the card retaining mechanism (7) via an eccentric rod-guide or gear mechanism located on the reductor (30) and immobilizing equipment (31).
  • the immobilizing equipment (31) and reductor (30) are designed to individually match the varying internal surfaces of ATMs and all similar financial machines.
  • the reductor (30) includes an eccentric rod or gear system.
  • the immobilizing equipment (31) is comprised of a hatch closing off the card exit path with the help of cutting blades or gear mechanism actuated by an eccentric rod connected to the internal surface of ATMs and all similar financial machines.
  • Card retaining circuit (card retainment function) steps are as follows:
  • the Card retainment control microprocessor (28) Upon receipt of the "IMMOBILIZE" command, the Card retainment control microprocessor (28) produces driver signals for the motor and relays them to the motor driver circuit (29),
  • the card retaining mechanism (7) is propelled via the mechanical system attached to the motor rod of the electric motor (6),
  • Card retaining mechanism (7) is propelled by the mechanical system connected to the motor rod of the electric motor (6),
  • Card retaining mechanism (7) moves linearly in the reverse direction until the opening limit switch is activated, resulting in the releasing of the client card
  • Event logger (3) - communication modules (4) steps are as follows:
  • the source is verified to be the remote request monitoring program or control circuit (1) microprocessor,
  • Control circuit microprocessor (16) records incoming parameters to the relevant section and uses new value beginning with the next program cycle
  • TTL The data relayed as TTL is adjusted by the converter unit (26) to suitable voltage levels and sent to the client (ATM Computer/Monitoring Program),
  • Control circuit (1) relays "WAITING" status information to the event logger (3), Checking for reference connection, if none found:
  • Control circuit (1) relays "REFERENCE ERROR” status information to the event logger (3),
  • Error state is displayed via the status display (15) on the control circuit (1), Card reader power is cut, rendering the ATM out of service and remains in this loop until connection is established,
  • control circuit (1) If a connection is successfully established, the control circuit (1) relays "ONLINE" status information to the event logger (3),
  • CTrapping value is checked: If the value is 1 , revert to the tenth step, reference control,
  • the weak current signal is generated via software at a random amplitude and with random frequency by the control circuit microprocessor (16),
  • the generated signal is strengthened by the Oscillator block (14) and the frequency is shifted according to the environment warmth via hardware, Counter value is increased,
  • Control circuit (1) relays "ALARM" status information to the event logger
  • Control circuit microprocessor (16) relays "IMMOBILIZE" command to the card retainment control circuit (5),
  • Card retainment control circuit (5) runs the Card Retainment function, Connection Query function is run,
  • Steps for the Connection Query function are as follows:
  • Control circuit (1) relays "ANTENNA ERROR" status information to the event logger (3),
  • Control circuit (1) relays "RETAINER ERROR" status information to the event logger (3),
  • Control circuit (1) relays "EVENT LOGGER ERROR" status information to the event logger (3), Error state is displayed via the status display (15) on the control circuit (1),
  • connection If the connection is successfully established, continue running the program, End connection query function and return to the main program.

Abstract

Cette invention concerne le dispositif utilisé dans les guichets automatiques bancaires et dans toutes les machines financières similaires dans lesquels des cartes à bandes magnétiques et à puces peuvent être utilisées pour déposer et/ou retirer de l'argent. Afin de protéger les informations relatives à la carte, l'invention consiste à intégrer un module pour empêcher l'écrémage des informations sur les cartes clients, un module pour retenir les cartes clients afin d'empêcher le vol, un module de communication et un module d'enregistrement chronologique d'évènements.
PCT/TR2013/000233 2013-07-12 2013-07-12 Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires WO2015005877A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/TR2013/000233 WO2015005877A1 (fr) 2013-07-12 2013-07-12 Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/TR2013/000233 WO2015005877A1 (fr) 2013-07-12 2013-07-12 Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires

Publications (1)

Publication Number Publication Date
WO2015005877A1 true WO2015005877A1 (fr) 2015-01-15

Family

ID=49305062

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2013/000233 WO2015005877A1 (fr) 2013-07-12 2013-07-12 Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires

Country Status (1)

Country Link
WO (1) WO2015005877A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113284303A (zh) * 2021-05-21 2021-08-20 深圳怡化电脑科技有限公司 一种吞卡处理方法、装置、银行设备及存储介质
CN113671880A (zh) * 2021-08-24 2021-11-19 中科亿海微电子科技(苏州)有限公司 一种金融数据加速系统及方法
US11276067B2 (en) * 2014-11-10 2022-03-15 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1992017856A1 (fr) * 1991-03-26 1992-10-15 Datacard Corporation Appareil et procede d'emission automatique de cartes de credit
WO1998019262A1 (fr) * 1996-10-29 1998-05-07 Electronic Data Systems Corporation Systeme et procede de traitement a securite integree de transactions declenchees par l'evenement
WO2000075861A1 (fr) * 1999-06-03 2000-12-14 Qi Technologies Corp. Lecteur de carte avec dispositif de blocage de carte
US20040178260A1 (en) * 2003-03-10 2004-09-16 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine with improved card retention capabilities and method
WO2006001781A1 (fr) * 2004-06-24 2006-01-05 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Appareil pour l'interdiction de lecture de cartes magnetiques
EP1798662A1 (fr) * 2005-12-14 2007-06-20 Hitachi-Omron Terminal Solutions, Corp. Processeur de carte
US20110135092A1 (en) * 2008-06-18 2011-06-09 Keba Ag Method and device for proctecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier
WO2011145940A1 (fr) * 2010-05-18 2011-11-24 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Circuit d'attaque destiné à la bobine de transmission d'un dispositif empêchant la copie active de cartes magnétiques
WO2012060690A1 (fr) * 2010-10-01 2012-05-10 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Terminal de libre-service, unité anti-fraude, dispositif de lecteur de cartes, cadran, procédé de brouillage et utilisation d'une unité anti-fraude

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1992017856A1 (fr) * 1991-03-26 1992-10-15 Datacard Corporation Appareil et procede d'emission automatique de cartes de credit
WO1998019262A1 (fr) * 1996-10-29 1998-05-07 Electronic Data Systems Corporation Systeme et procede de traitement a securite integree de transactions declenchees par l'evenement
WO2000075861A1 (fr) * 1999-06-03 2000-12-14 Qi Technologies Corp. Lecteur de carte avec dispositif de blocage de carte
US20040178260A1 (en) * 2003-03-10 2004-09-16 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine with improved card retention capabilities and method
WO2006001781A1 (fr) * 2004-06-24 2006-01-05 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Appareil pour l'interdiction de lecture de cartes magnetiques
EP1798662A1 (fr) * 2005-12-14 2007-06-20 Hitachi-Omron Terminal Solutions, Corp. Processeur de carte
US20110135092A1 (en) * 2008-06-18 2011-06-09 Keba Ag Method and device for proctecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier
WO2011145940A1 (fr) * 2010-05-18 2011-11-24 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Circuit d'attaque destiné à la bobine de transmission d'un dispositif empêchant la copie active de cartes magnétiques
WO2012060690A1 (fr) * 2010-10-01 2012-05-10 Kronik Elektrik Elektronik Ve Bilgisayar Sistemleri Sanayi Ticaret Limited Sirketi Terminal de libre-service, unité anti-fraude, dispositif de lecteur de cartes, cadran, procédé de brouillage et utilisation d'une unité anti-fraude

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11276067B2 (en) * 2014-11-10 2022-03-15 Mastercard International Incorporated Systems and methods for detecting compromised automated teller machines
CN113284303A (zh) * 2021-05-21 2021-08-20 深圳怡化电脑科技有限公司 一种吞卡处理方法、装置、银行设备及存储介质
CN113671880A (zh) * 2021-08-24 2021-11-19 中科亿海微电子科技(苏州)有限公司 一种金融数据加速系统及方法

Similar Documents

Publication Publication Date Title
US9342717B2 (en) Tamper detection system and method
US9379841B2 (en) Mobile device prevention of contactless card attacks
US8760296B2 (en) Access monitoring systems for use with consumer-operated kiosks and other enclosures
US20070034691A1 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
US10148691B2 (en) Detection of unwanted electronic devices to provide, among other things, internet of things (IoT) security
CN107666478B (zh) 认证标签、设备、系统和方法
US7966262B2 (en) Pay at pump encryption device
EP2157526A1 (fr) Lecteur RFID avec méthodes heuristiques de détection d'attaque incorporées
JP2007328388A (ja) Gpsを利用した測位手段によって不正使用防止を図る機能つき自動販売機及びgpsを利用した測位手段による自動販売機の不正使用防止方法
CN101923677B (zh) 资料保管系统及资料保管方法
CN103268652A (zh) 基于居住证门卡的门禁监控系统及方法
WO2015005877A1 (fr) Dispositif pour empêcher la capture de cartes clients et d'informations relatives à la carte dans des guichets automatiques bancaires et des machines bancaires similaires
CA2798626A1 (fr) Appareil, systeme et methode de guichet bancaire biometrique
CN114283510A (zh) 一种智能业务库系统及其存箱、取箱方法
US8622297B1 (en) Card reader anti-skimming assembly and method
CN111438690A (zh) 配送机器人、配送机器人的控制方法、装置及存储介质
US11100764B1 (en) Intrusion detection systems and methods
CN110219546A (zh) 智能专用存储机及其控制方法
US20180286211A1 (en) Systems and methods for foreign object detection
US20180374319A1 (en) A device for detection the foreign objects placed, jamming the data with disruptive signals, issuing warning notices and recording the events in order to protect the data on the cards used in the payment stations
CN101751727B (zh) 用于监测安装盗卡装置的方法、设备和自助终端
Narmada et al. Design and implementation of security based ATM using ARM11
Vikram et al. ATM Security and Privacy Preserving System
Srilatha et al. Safety and maintenance of ATM system using Internet of things
WO1994023163A1 (fr) Systeme et procede de declenchement d'un dispositif

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13773878

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13773878

Country of ref document: EP

Kind code of ref document: A1