Security validation of machine components
First Claim
1. A method of validating machine components in an Automated Teller Machine, ATM, which includes a computer which controls operation of the ATM, comprising:
- a) providing at least one machine component with identity information in the form of a machine readable identifier;
b) using the computer, reading identity data from the machine readable identifier by way of a bus which connects between the computer and the identifier and which carries the identity data to the computer;
c) comparing the identity data with stored identity data to determine if the identity of a component has changed; and
d) if the identity has changed, comparing the identity data with source data which comprises a list of acceptable identities to determine if the component is from a trusted source, ande) if a component is found in the ATM which is not listed on the list of acceptable identities, then disabling the ATMin which method the stored identity data of paragraph (c) comprises a list of components within the ATM at a previous time.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of validating machine components in a self-service terminal is disclosed which comprises providing at least one machine component with a machine readable identifier and reading identity data from the machine readable identifier using a processing unit. The identity data is compared with identity data stored in the memory of the processing unit to determine if the identity of a component has changed. If the identity has changed, the processing unit compares the identity data with source data to determine if the component is from a trusted source. In one embodiment, the self service terminal is an ATM and the components are an encrypting Personal Identification Number (PIN) pad, a cash dispenser unit and a card reader.
-
Citations
7 Claims
-
1. A method of validating machine components in an Automated Teller Machine, ATM, which includes a computer which controls operation of the ATM, comprising:
-
a) providing at least one machine component with identity information in the form of a machine readable identifier; b) using the computer, reading identity data from the machine readable identifier by way of a bus which connects between the computer and the identifier and which carries the identity data to the computer; c) comparing the identity data with stored identity data to determine if the identity of a component has changed; and d) if the identity has changed, comparing the identity data with source data which comprises a list of acceptable identities to determine if the component is from a trusted source, and e) if a component is found in the ATM which is not listed on the list of acceptable identities, then disabling the ATM in which method the stored identity data of paragraph (c) comprises a list of components within the ATM at a previous time. - View Dependent Claims (2, 3)
-
-
4. A method of operating an Automated Teller Machine, ATM, which includes multiple components, including a computer which controls operation of the ATM comprising:
-
a) storing identifying data in some, or all, of the components; b) upon initial, first-ever, start-up of the ATM, using a computer within the ATM to read identifying data from components by way of a bus extending between the computer and the components, and store the identifying data within memory; c) upon a later start-up of the ATM after servicing by a technician, using the computer within the ATM to i) read identifying data from components and ii) compare the identifying data read with that stored within the memory; and d) if the comparing of paragraph (c) (ii) indicates that identifying data of a component is not stored within the memory, then using the computer to contact a remote data storage location, to ascertain whether the component originates from a predetermined source. - View Dependent Claims (5, 6)
-
-
7. A method, comprising:
-
a) maintaining an Automated Teller Machine, ATM, which i) is subject to a tampering operation in which a component is secretly replaced in the ATM to thereby allow a party to obtain security information of a user of the ATM; and ii) contains a computer which controls operation of the ATM, and a keypad, card reader, cash dispenser; b) storing identity data in the keypad and card reader; c) using the computer to read the identity data by way of a bus connecting between the computer and the keypad and card reader; and d) determining whether the identity data meets predetermined criteria and, if not, disabling the ATM, thereby preventing said party from obtaining customer data from the keypad and card reader.
-
Specification