Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for preventing unauthorized analysis or copying of magnetically encoded data of an inserted card-shaped data carrier by a reading device of a card-shaped data carrier

A technology for data carriers and readout devices, applied in coinless or similar appliances, inductive record carriers, input/output to record carriers, etc., can solve problems such as failures, prevent illegal collection, and improve security.

Inactive Publication Date: 2015-08-05
KEBA GMBH & CO
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this measure can only be used with a limited selection of magnetic card readers with sufficiently deep construction types, in particular magnetic card readers in which the card completely disappears in the reading opening before the card's magnetic stripe reaches the internal or legitimate reading head. Only possible in the output
First of all, in the magnetic card reader of the short structure type favored by the access control system, the internal legal reading head is arranged closer to the card reading port than the school, and this remedy is impossible.
Especially in the case of plug-in readers or swipe readers (Durchzugsleser), this expedient generally fails completely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing unauthorized analysis or copying of magnetically encoded data of an inserted card-shaped data carrier by a reading device of a card-shaped data carrier
  • Method and device for preventing unauthorized analysis or copying of magnetically encoded data of an inserted card-shaped data carrier by a reading device of a card-shaped data carrier
  • Method and device for preventing unauthorized analysis or copying of magnetically encoded data of an inserted card-shaped data carrier by a reading device of a card-shaped data carrier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] figure 1A reading device 1 of a conventional card-shaped data carrier 2 is shown, on which information or data is stored at least magnetically. In particular, this reading device 1 is used to process magnetic cards 3 with at least one magnetic stripe 4 and / or chip cards with at least one magnetic stripe 4 . On these magnetic strips 4 , as is known, use-relevant or security-relevant data are stored, which data can be automatically read out from the reading device 1 and / or can be changed or updated. Such card-shaped magnetic data carriers 2 are in particular bank cards or debit cards and credit cards, which are used to authenticate the right to enter or use a specific device. That is, a given reading device 1 is often used in a bank or its automated machines or access control systems.

[0049] Such a reading device 1 usually has the following components: a housing 5; at least one insertion hole 6 or card reading slot for inserting and subsequently removing the data magn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and devices for protecting a reading device (1) for card-shaped data carriers (2) against unauthorized evaluation or copying of magnetically encoded data detected in the reading device (1) for card-shaped data carriers (2). To this end, an electromagnetic noise field (18) is generated by means of a noise field coil (17). The use or disposition of the at least one noise field coil (17) is such that the authorized magnetic field reading head (10) is also affected by the noise field (18) of the noise field coil (17) when the magnetically encoded data of a card-shaped data carrier (2) is being read. An output or sum signal of the authorized magnetic field reading head (10) generated from the wanted signal of a card-shaped data carrier (2) and from the effects of the noise field (18) is detected. The effect of the noise field (18) of the noise field coil (17) in the output or sum signal of the authorized magnetic field reading head (10) is then compensated or filtered out or the wanted signal is selectively filtered out of the output or sum signal of the authorized magnetic field reading head (10).

Description

technical field [0001] The invention relates to a method and a device for preventing unauthorized and undetected analysis or copying of information stored on a card-shaped magnetic data carrier. Background technique [0002] In particular when used in conjunction with debit cards, it has repeatedly occurred that automated teller machines or similar service machines equipped with corresponding reading devices for such debit cards are used by unauthorized third parties with the intention of defrauding The manipulation is carried out so that when a credulous user uses such an automatic device as intended, the data recorded on the magnetic tracks of the card-like data carrier are stolen without detection and with criminal intent. For this purpose, for example, an additional read head is mounted inconspicuously in front of the card insertion opening, and invisibly captures the data stored on the card when it is inserted. These data are stored and then misused by forging a copy o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06
CPCG07F19/20G07F19/2055G06K7/084
Inventor C·莱纳
Owner KEBA GMBH & CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products