Patent classifications
G07F19/2055
Card reader
In a card reader (1), if a shutter member (10), being located at a block position for blocking a card transfer path (3), rotates toward a deep side of the card reader, the shutter member moves to an open position. In a part within a surface of a side of the card transfer path in a thickness direction of the card (2), at a side deeper than the shutter member, there are formed only an open part (31) and an open part (32); the open part being for preventing an interference of the shutter member, rotating toward the open position, with the main body frame (4), as well as ejecting a foreign object out of the card transfer path; the open part being for preventing an interference of a movable component (21), placed so as to face the card transfer path, with the main body frame.
Method and apparatus for passively detecting card skimmers based on EMI fingerprints
A system is provided that detects a card skimmer in a target system, wherein the card skimmer surreptitiously gathers credit/debit card information during operation of the target system. This system first gathers target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target system through an external scanner with a directional antenna. Next, the system generates a target EMI fingerprint from the target EMI signals. The system then compares the target EMI fingerprint against a reference EMI fingerprint for the target system to determine whether the target system contains a card skimmer.
ATM skimmer detection based upon incidental RF emissions
The disclosed embodiments include methods and systems for detecting ATM skimmers based upon radio frequency (RF) signal. In one aspect, the disclosed embodiments include a system for detecting ATM skimmers including a memory storing instructions and one or more processors that execute the instructions to perform one or more operations for detecting ATM skimmers. The operations may include, for example, receiving radio frequency (RF) signal data corresponding to one or more RF signals detected by an antenna located within communication range of the ATM. The operations may also include determining one or more unidentified RF signals of the detected ATM RF signals that differ from one or more baseline RF signals. The operations may also include determining whether the one or more unidentified RF signals are present for a predetermined period of time, and determining whether a skimmer is present at the ATM based on a determination that the one or more unidentified RF signals are present for the predetermined period of time.
Providing an augmented reality overlay to secure input data
A device may receive an input that indicates a request to initiate a transaction at an ATM device. The device may instruct the user to capture one or more images of the ATM device. The device may determine that an image has been captured and process the image to determine first information that identifies the ATM device. The device may send the first information to a server device and receive a signal that indicates the ATM device has been validated. The device may cause an augmented reality (AR) overlay to be displayed, wherein the AR overlay includes second information related to authenticating the user to the ATM device. The device may determine whether a user action is performed with respect to the second information included in the AR overlay, and perform a device action related to the second information, the ATM device, or the AR overlay.
SECURE AUTOMATED TELLER MACHINES
A method for improved security at automated teller machines (ATMs) comprising: capturing, by a first camera at an ATM, one or more images of a bank card; reading card information from the bank card by processing the one or more images of the bank card, wherein the card information comprises an account number and an expiration date; receiving, from an input device at the ATM, a personal identification number (PIN) entered by a user; sending a request to a server device to verify the card information and the PIN; and in response receiving a response from the server device, allowing the user to transact with the ATM.
METHODS AND SYSTEMS FOR VERIFICATION OF OPERATIONS OF COMPUTER TERMINALS AND PROCESSING NETWORKS
A verification computing system for verifying operation of a payment terminal and a payment processing network linking the payment terminal to a payment processor is provided. The verification computing system includes at least one verification computing module including at least one processor. The verification computing module is programmed to receive a test request message corresponding to a test payment card transaction from the payment terminal, identify a void flag included in the test request message, and bypass a settlement process for the test payment card transaction based on the identified void flag. The verification computing module is further configured to determine an operating status of the payment terminal and the payment processing network, generate a test response message based upon the determination, and transmit the test response message to the payment terminal for notifying a user.
SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF AND DETECTING AN INTRUSION INTO AN AUTOMATED TELLER MACHINE
The disclosed embodiments provide systems, methods, and articles of manufacture for detecting an intrusion of a product (e.g., an ATM) via an electronic tattletale. The disclosed embodiments may provide an ATM comprising a housing comprising an interior surface and a substance adhered to the interior surface, the substance comprising a piezoelectric element. The ATM may further comprise a detection circuit coupled to the substance, which may be configured to receive a first response signal generated by the substance and generate an indication of an intrusion into the housing, based on a comparison of the received first response signal to a predefined second response signal.
End user protection against ATM keypad overlay
Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
SYSTEM TO IDENTIFY VULNERABLE CARD READERS
Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.
Security system for EPOS terminal
The combination of an EPOS terminal and a security system. The terminal has a housing with a reader for identifying information on a user card. The housing has an external surface defining an original outer configuration. The security system has at least one component configured to be fixed to the housing. The at least one component substantially effectively alters a contour of the original outer configuration of the external surface so as to block placement of a skin, with a skimming component and at least nominally matched in shape to at least a portion of the original outer configuration of the external surface, conformingly over the external surface of the housing.