Fraudulent card intercept system
First Claim
1. A method of securing credit card transactions against tampering and counterfeiting, the method comprising:
- encoding card blanks with at least account information and a verification code generated with an encoding algorithm to produce credit cards;
verifying authenticity of one of the credit cards by electronically operating on at least a portion of one of the verification code and the account information with a verification algorithm to generate an answer for comparison with at least a portion of the account information and the verification code, the verification algorithm being different from the encoding algorithm such that the authenticity verification is less than completely accurate to protect the encoding algorithm from being reverse engineered from the verification algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
Credit card blanks are manufactured with a plurality of random, secure codes (24) such as randomly applied infrared readable bits. A card encoding apparatus (B) includes a secure code reader (32) for reading the secure code from one of the blanks. The secure code and account information are operated on by an encoding algorithm (36, 38) to generate a verification code which is electromagnetically recorded (40) or embossed (42) on the card. In conjunction with a credit card transaction, the merchant passes the credit card past an electromagnetic read head (50) and an infrared read head (52) to read the electronically encoded account information, verification code, and secure code. A keyboard (54) enables the merchant to manually enter this data if the electromagnetic recording should be unreadable. The verification apparatus operates on the account information with a verification algorithm (66, 68, 70) to generate an answer corresponding to the verification code. If the answer and verification code match, an authentication code generator (82) generates an authentication code which is displayed on an LCD dot matrix display (56) and handwritten by the merchant on the receipt.
142 Citations
12 Claims
-
1. A method of securing credit card transactions against tampering and counterfeiting, the method comprising:
-
encoding card blanks with at least account information and a verification code generated with an encoding algorithm to produce credit cards; verifying authenticity of one of the credit cards by electronically operating on at least a portion of one of the verification code and the account information with a verification algorithm to generate an answer for comparison with at least a portion of the account information and the verification code, the verification algorithm being different from the encoding algorithm such that the authenticity verification is less than completely accurate to protect the encoding algorithm from being reverse engineered from the verification algorithm. - View Dependent Claims (2, 3, 4, 11)
-
-
5. A method of securing card transactions against tampering and counterfeiting, the method comprising:
-
(a) preparing card blanks, each card blank having one of a plurality of relatively permanent, machine-readable secure codes, the secure code being alterable only by physical alteration of the card blank; (b) machine-reading the secure code of a selected one of the card blanks; (c) receiving account information of a customer for when a card is to be prepared; (d) operating on at least a portion of the account information and the machine-read secure code with first and second encoding algorithms to generate first and second verification codes, the second verification code is in humanly-readable form, whereby the verification codes are unique to the selected card blank and the account information; (e) encoding at least a portion of the account information and the verification codes on the selected card blank to prepare a card; (f) electronically entering, such as by key entering or electronically reading, at least a portion of the account information and a verification code from the card; (g) machine-reading at least a portion of the secure code from the card; (h) electronically operating on at least a portion of the entered account information, the entered verification code, and the machine-read secure code with a verification algorithm to generate an answer; (i) comparing the answer with at least a portion of one of the entered verification code and the entered account information for coincidence; (j) subsequent to determining coincidence in the comparing step, operating on at least a portion of the entered account information and other electronic data with an authentication algorithm to generate an authentication code, the other electronic data including data indictive of at least one of an identification code for an electronic verification apparatus, a time code indicitive of when the credit card was verified, a currency amount of the sale, a random number, and the verification code from the card; and
,(k) placing the authentication code on a sales receipt.
-
-
6. An apparatus for securing credit card transactions against tampering and counterfeiting, the apparatus comprising:
-
means for encoding card blanks with primary encrypted data representative of at least account information; means for encoding the card blanks with secondary encrypted data representative of at least the account information, the secondary encrypted data being in humanly-readable form; verifying means for electronically operating on at least a portion of one of the primary encrypted data and the secondary encrypted data with a preselected verification algorithm to generate an answer for comparison with at least a portion of the account information and the secondary encrypted data to verify the authenticity of one of the cards. - View Dependent Claims (7, 8, 9, 12)
-
-
10. An apparatus for securing card transactions against tampering and counterfeiting, the apparatus comprising:
-
(a) a source of card blanks, each card blank having one of a plurality of relatively permanent, machine-readable secure codes; (b) secure code reading means for reading the secure code of a selected one of the card blanks; (c) first encoding algorithm means for operating on at least a portion of received account information and the machine-readable secure code with a first encoding algorithm to generate a first verification code, the first encoding algorithm means being operatively connected with the secure code reading means; (d) a second encoding algorithm means for operating on at least a portion of the account information and the secure code with a second encoding algorithm to generate a second verification code; (e) electromagnetic encoding means for encoding at least a portion of the account information and the first verification code electromagnetically on the selected card blank, the electromagnetic encoding means being operatively connected with the first encoding algorithm means; (f) embossing means for embossing at least a portion of the account information and the second verification code on the selected card blank in a humanly-readable format, the embossing means being operatively connected with the second encoding algorithm means; (g) an electromagnetic read head for reading the electromagnetically encoded account information and verification code from the card; (h) a keyboard for electronically entering at least a portion of the embossed account information and verification code from the card; (i) a secure code reader for machine-reading the secure code from the card; (j) a first verification algorithm means for electronically operating on at least a portion of the electromagnetically read account information and verification code and the machine-read source code with a first verification algorithm to generate a first answer, the first verification algorithm means being operatively connected with the electromagnetic read head; (k) a first comparing means for comparing the first answer with at least a portion of one of the electromagnetically read account information and verification code for coincidence, the first comparing means being operatively connected with the electromagnetic read head and the first verification algorithm means; (1) a second verification algorithm means for operating on at least a portion of the key entered account information and verification code and the machine-read secure code with a second verification algorithm to generate a second answer, the second verification algorithm means being operatively connected with the keyboard; (m) a second comparing means for comparing the second answer with at least a portion of the key entered account information and verification code for coincidence, the second comparing means being operatively connected with the second verification algorithm means; and
,(n) an authentication code generating means for operating on at least a portion of the account information and other electronic data with an authentication algorithm to generate an authentication code, the authentication code generating means being operatively connected with the first and second comparing means to be selectively enabled thereby.
-
Specification