Patent classifications
G07F19/2055
Information processing device and foreign matter detection method
An information processing device structured to process information of an information recording medium having been inserted inside may include a communication part which receives a radio wave of a specific frequency band, and a foreign matter detection part structured to detect that a foreign matter has been attached in response to an intensity of the radio wave received by the communication part being greater than or equal to a threshold value for a predetermined time.
SYSTEM AND METHOD FOR TOUCHLESS PIN ENTRY
A system and method is described for the touchless entry of a personal identification number (PIN) at a self-service terminal such as an automated teller machine (ATM). A mobile device includes a PIN entry application. The self-service terminal includes a wireless interface for communicating wirelessly with the PIN entry application in the mobile device. A communication channel is established between a particular customer's mobile device and the self-service terminal. The PIN entry application verifies a public key for the self-service terminal at the mobile device. The customer's PIN is encrypted by the PIN entry application at the mobile device using either an ephemeral symmetric encryption key or a one-time RSA PIN transport public key. The encrypted PIN is transmitted to an encryption processor at the self-service terminal. The encryption processor decrypts the PIN using the appropriate encryption key.
FRAUD DETECTION SYSTEM AND METHOD
A system and method is described for detecting a foreign object such as a skimmer placed adjacent to a bezel for a magnetic card reader device, as used in automatic teller machines and gas pumps. At least two sensors are mounted adjacent to the bezel. Each sensor provides a signal that varies when a skimmer is mounted adjacent to the bezel. A controller receive measurement signals from the sensors, and generates an alarm signal when the measurement signals differ from associated predetermined baseline signals by at least associated predetermined thresholds. The alarm signal indicates that a foreign object has been detected adjacent he bezel. The sensors may be capacitive, time of flight, spectral, radar, and/or inductive. The capacitive sensors may include three or more plates, forming multiple capacitive pairs, each capacitive pair effectively forming a separate sensor.
ATM Frauds Detection by Machine Learning System: SentryWare and SentryManager
A SentryWare apparatus comprising Vibration/Accelerometer Sensors deployed on ATM Cash Dispenser, ATM Card Reader, ATM Cash Reject Bin, ATM Cash Tray, ATM Cash Dispenser Door, ATM base, and ATM card intake, Electric/Magnetic (Reed) Switch sensors deployed at Network Cable-Modem interface, Network Cable-Computer interface, Hard Disk Drive-Computer interface, ATM Keyboard Cable-Computer Interface, Power Clamp meter wrapped around the power cable serving the ATM cash dispenser, and NEC sensor deployed near the NEC reader of the ATM is used to detect bank ATM frauds. The sentryWare apparatus has a microcontroller that can read sensor data from which bank ATM frauds can be deduced.
[Problem to be solved]: Billions of dollars are lost around the world due to ATM (Automated Teller Machine) fraud. These frauds need to be detected and stopped. The ATM frauds are: 1. Skimming: Fraudsters attach a wireless device to the ATM card reader, which reads the personal and card information on the magnetic stripe of the cards that are used at the ATM. 2. Shimming: Fraudsters insert a thin electronic device inside the ATM card reader so that the data read and written to the EMV (Europay, Mastercard, and Visa) chip on the ATM/Credit card can be accessed by the fraudsters. This enables them to duplicate the ATM/Credit card with EMV data. 3. Jackpotting: Fraudsters either connect a black box to the cash dispenser of the ATM, access the ATM network by tapping the network cable, or installing a virus onto the ATM computer. This will enable them to access the cash dispenser of the ATM. The fraudsters can then activate the cash dispenser to dispense cash on demand. 4. Internal Service Person Theft: ATM service representatives who either steal directly from the cash dispenser or alter the BIOS/Hard Disk image(OS) in the ATM. 5. ATM Theft: The ATM itself can be stolen. One of the dangerous methods fraudsters use is to place explosives into the ATM, explode it, and then get away with the cash dispenser. 6. Network cable, Keyboard, Hard Disk, NFC Card Reader and other ATM Computer component Tampering: Fraudsters physically tamper with the ATM so that they can attach a keyboard or access the network cable so that they can install a virus software or replace the hard disk on the ATM computer with a virus on it or tamper with any other component of the ATM computer. 7. Transaction Reversal: The fraudster initiates a cash dispense transaction. However, in the middle of the cash dispensing, the fraudster can terminate the transaction by pulling out the ATM card but access the cash before the cash is returned to the reject bin of the cash dispenser. 8. Cash Trapping: Fraudsters attach a d
Fraud detection system and method
A system and method is described for detecting a foreign object such as a skimmer placed adjacent to a bezel for a magnetic card reader device, as used in automatic teller machines and gas pumps. At least two sensors are mounted adjacent to the bezel. Each sensor provides a signal that varies when a skimmer is mounted adjacent to the bezel. A controller receive measurement signals from the sensors, and generates an alarm signal when the measurement signals differ from associated predetermined baseline signals by at least associated predetermined thresholds. The alarm signal indicates that a foreign object has been detected adjacent the bezel. The sensors may be capacitive, time of flight, spectral, radar, and/or inductive. The capacitive sensors may include three or more plates, forming multiple capacitive pairs, each capacitive pair effectively forming a separate sensor.
MOBILE APPLICATION-BASED ERROR REPORTING
An apparatus is configured to receive a complaint initiation signal that includes an indication that a card reader may be compromised, and initiation date and time of the complaint, and geolocation data related to the reporting party. The apparatus is further configured to identify a street address closest to the geolocation data in the complaint using a geolocation application programming interface and the set of geolocation data. The apparatus is also configured to determine that the identified street address is associated with an entity. The apparatus then calculates a confidence interval as to whether that entity is the type of entity that uses a card reader. The apparatus is further configured to determine that the confidence interval exceeds a threshold. The apparatus is also configured to determine an identifier of the entity. Further, the apparatus is configured to publish an alert to a data feed.
METHOD, APPARATUS, AND SYSTEM FOR DETECTING CARD SKIMMING DEVICES
Provided herein is a method, apparatus, and system for detecting conditions indicative of an attempt to attach a skimming device to a payment device. Methods may include monitoring at least one wire among a plurality of wires between a card reader device and a motherboard; determining voltage consumption; determining current consumption; identifying a change in voltage consumption or current consumption satisfying a predetermined value; and providing for transmission of an alert of a condition indicating possible attachment of a card skimming device. Methods may include generating a status message periodically and transmitting the status message to a remote entity. The change in voltage consumption or current consumption satisfying the predetermined value may include a voltage instability exceeding a predetermined range about an anticipated voltage. The change in voltage consumption or current consumption satisfying the predetermined value may include a decrease in current satisfying the predetermined value.
COMPUTER-BASED SYSTEMS CONFIGURED TO DETECT FRAUDULENT ACTIVITIES RELATED TO CARD-TRANSACTING DEVICES AND METHODS OF USE THEREOF
Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.
Tamper detection
A financial transaction system includes sensors, a tamper detection module, and circuitry configurable to control which sensors are used, and the circuitry is configurable after the tamper detection module has been manufactured.
End user protection against ATM keypad overlay
Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.