Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier

A technology of data carrier and readout device, applied in the direction of coinless or similar appliances, induction recording carrier, complete banking system, etc., can solve problems such as failure, achieve the effect of preventing illegal collection and improving security

Active Publication Date: 2011-06-22
KEBA
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this measure can only be used with a limited selection of magnetic card readers with sufficiently deep construction types, in particular magnetic card readers in which the card completely disappears in the reading opening before the card's magnetic stripe reaches the internal or legitimate reading head. Only possible in the output
First of all, in the magnetic card reader of the short structure type favored by the access control system, the internal legal reading head is arranged relatively close to the card reading port, and this remedy is impossible.
Especially in the case of plug-in readers or swipe readers (Durchzugsleser), this expedient generally fails completely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier
  • Method and device for protecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier
  • Method and device for protecting a reading device for card-shaped data carriers from unauthorized evaluation or copying of magnetically encoded data of an inserted card-shaped data carrier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] figure 1 A reading device 1 of a conventional card-shaped data carrier 2 is shown, on which information or data is stored at least magnetically. In particular, this reading device 1 is used to process magnetic cards 3 with at least one magnetic stripe 4 and / or chip cards with at least one magnetic stripe 4 . On these magnetic strips 4 , as is known, use-relevant or security-relevant data are stored, which data can be automatically read out from the reading device 1 and / or can be changed or updated. Such card-shaped magnetic data carriers 2 are in particular bank cards or debit cards and credit cards, which are used to authenticate the right to enter or use a specific device. That is, a given reading device 1 is often used in a bank or its automated machines or access control systems.

[0048] Such a reading device 1 usually has the following components: a housing 5; at least one insertion hole 6 or card reading slot for inserting and subsequently removing the data mag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and devices for protecting a reading device (1) for card-shaped data carriers (2) from the unauthorized evaluation or copying of magnetically encoded data which are acquired on the reading device (1) for card-shaped data carriers (2). According to said method, a magnetic noise field (18) is produced by means of a noise field coil (17). The at least one noise filed coil (17) is implemented or arranged in such a manner that the authorized magnetic field read head (10) is also influenced by the noise field (18) of the noise field coil (17) when the magnetically encoded data of a card-shaped data carrier (2) are read. An output signal or sum signal of the authorized magnetic field read head (10) produced from the useful signal of a card-shaped data carrier (2) and the influences of the noise field (18) is acquired. The influence of the noise field (18) of the noise field coil (17) in the output signal or sum signal of the authorized magnetic field read head (10) is compensated or filtered out and the useful signal is selectively filtered out from the output signal or sum signal of the authorized magnetic field read head (10).

Description

technical field [0001] The invention relates to a method and a device for preventing unauthorized and undetected analysis or copying of information stored on a card-shaped magnetic data carrier, as set forth in claims 1, 14, 24 and 26. Background technique [0002] In particular when used in conjunction with debit cards, it has repeatedly occurred that automated teller machines or similar service machines equipped with corresponding reading devices for such debit cards are used by unauthorized third parties with the intention of defrauding The manipulation is carried out so that when a credulous user uses such an automatic device as intended, the data recorded on the magnetic tracks of the card-like data carrier are stolen without detection and with criminal intent. For this purpose, for example, an additional read head is unobtrusively mounted in front of the card insertion opening, which invisibly captures the data stored on the card when it is inserted. These data are st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K7/08
CPCG07F19/20G07F19/2055G06K7/084
Inventor C·莱纳
Owner KEBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products