[go: up one dir, main page]

WO1989003314A1 - Security system - Google Patents

Security system Download PDF

Info

Publication number
WO1989003314A1
WO1989003314A1 PCT/GB1988/000834 GB8800834W WO8903314A1 WO 1989003314 A1 WO1989003314 A1 WO 1989003314A1 GB 8800834 W GB8800834 W GB 8800834W WO 8903314 A1 WO8903314 A1 WO 8903314A1
Authority
WO
WIPO (PCT)
Prior art keywords
validity
viewer
code
data
card
Prior art date
Application number
PCT/GB1988/000834
Other languages
French (fr)
Inventor
David Robert Brown
Original Assignee
Vistramark Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vistramark Limited filed Critical Vistramark Limited
Priority to BR888807747A priority Critical patent/BR8807747A/en
Publication of WO1989003314A1 publication Critical patent/WO1989003314A1/en
Priority to DK083490A priority patent/DK83490D0/en
Priority to NO90901577A priority patent/NO901577L/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/08Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
    • G06K7/089Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes hand-held scanners

Definitions

  • This invention relates to a security system, and more particularly to a security system which enables one or more selected credentials of anyone seeking to use the system to be readily verified.
  • identity or security card Another use of such security systems is as an alternative form of identity or security card.
  • Such cards are used for example where entry to an area or building is to be restricted to selected personnel.
  • identity cards it can be fairly simple and cheap to forge authentic-looking cards with readily available materials.
  • Such cards may also be used to identify the card carrier as a member of a club or library etc and so on.
  • a validity viewer for establishing the identity of an authorised user of the viewer, said viewer including:- identification means storing image data and operable selectively to display an image repesenting a selected credential of an authorised user;
  • data input means for allowing a data code to be input into the viewer
  • code store means for storing at least one preset code
  • processor means for receiving the data code input via said data input means and the preset code in said code store means and for causing said identification means to display said selected credential only when said inputted data code corresponds with said preset code.
  • Then invention also extends to a security system including a security card in combination with a validity viewer as defined above for identifying the authorised user of the card.
  • Figure 1 is a top plan view of a validity viewer in accordance with this invention prior to insertion therein of a security card;
  • Figure 2 is a section view taken on lines II— II of Figure 1;
  • Figure 3 is a top plan view of the validity viewer of Figure 1 with the security card inserted therein, and
  • Figure 4 is a block diagram showing the interrationship between the components of the validity viewer of Figures 1 and 2.
  • the validity viewer illustrated in the drawings is intended to be used with security cards to allow the authorised user of the card to be identified. Exar ⁇ ples of such security cards include cheque cards, credit cards, charge cards, membership cards, security passes etc.
  • the validity viewer provides a means by which the proper identity of the authorised user of the security card may be readily checked. To do this, the validity viewer reads a data code from the security card and, if the code agrees with a pre-stored code held in the validity viewer, the image of the authorised user is displayed on the validity viewer.
  • the validity viewer may also be used otherwise than in combination with a security card.
  • a security card instead of providing personnel with laminated photo-cards as security passes, they may instead be provided with a validity viewer of the form illustrated in the Figures.
  • the validity viewer would be programmed so that the image of the authorised user of the validity viewer was revealed only when an appropriate personal identification number (P.I.N.) was entered by the authorised user.
  • P.I.N. personal identification number
  • the validi ty viewer 10 comprises a casing 12 of slim rectangular form having on its upper surface a keyboard/alpha ⁇ numeric display area 14 and an identification display area 16.
  • the keyboard/alpha-numeric display area 14 includes a membrane keypad 18 by which the usual alpha-numeric symbols may be keyed into the viewer, a solar cell panel 20 for generating the power required for operation of the validity viewer and a conventional numerical display, e.g. digital display panel 22 having several characters of seven segment form.
  • the identification display 16 comprises an image 24 representing a selected credential of an authorised user located beneath a screen 26.
  • the image 24 is in the form of a photograph of the head of a user with a facsimile of the signature of the authorised user beneath the photograph.
  • the screen 26 is electronically operable and made of a material which may be rendered opaque or substantially transparent dependent on the electrical signals applied thereto.
  • Such a screen could, for example, be made of a liquid crystal display which is normally opaque but which, on application of an energising current, is rendered transparent. The construction and operation of such screens will be well known to those skilled in the art.
  • the validity viewer includes a reader 32 for reading a code from the security card.
  • a code for example, many forms of security card now available include a magnetic stripe containing coded information including a P.I.N. code.
  • the reader 32 incorporated in the validity viewer reads this code and supplies it to the processor 28 of the validity viewer.
  • Such readers are well known to those skilled in the art. It will be understood that other forms of data transfer for transferring data stored on the security card to the processor 28 may be used. For example, the data may be stored on the security card in the form of a bar code or similar optically readable code.
  • the security card may be a "smart card" of the type including a processor and means for transferring data to or from the smart card by means of magnetic induction.
  • the validity viewer may include a receiver loop for receiving data transmitted from the smart card.
  • Figure 3 shows the validity viewer when the card having a code corresponding to that held in the validity viewer has been inserted in the slot 28. It will be seen that the screen 26 has been rendered transparent to reveal the photograph and signature of the authorised user.
  • the processor 30 is operable both to perform various validation checks on data fed into the viewer as well as to perform the usual arithmetic calculations of a standard calculator. Data may be input to the processor by means of the membrane keyboard 18 or a card reader 32 associated with the slot 28. Power for the processor and the peripheral equipment is supplied by means of the solar cell panel 20. Power may also be supplied by means of a battery (not shown).
  • a code store 34 for storing one or more codes, such as P.I.N. codes associated with the authorised user of the validity viewer.
  • the processor controls the numerical display panel 22 and the screen 26.
  • a seal sensor 36 is associated with the casing 12 of the validity viewer and in particular with the identification display 16 and detects if these are tampered with. Should tampering be detected, the seal 36 sensor inputs to the processor 30 a signal which disables the processor and renders it inoperable.
  • the processor 30 is preferably programmed to return the screen 26 to an opaque state a preset period after it has been made transparent.
  • a printed image representing a selected credential of the authorised user is inserted behind the screen 26.
  • a code or codes identifying the authorised user are entered into the code store 34. At least one of these codes corresponds to the coded information held in the magnetic strip on the back of the security card.
  • the validity viewer 10 There are various levels of of security offered by the validity viewer 10. At one level all that is necessary to reveal the image and signature beneath the screen 26 is for the user to punch in the membrane keypad 18 the correct personal code. If the digits of the code entered by the user of the card correspond to the code held in the code store , the processor will activate the screen 26 to make it transparent so that the photograph and signature of the user are displayed.
  • the validity viewer acts as a form of security pass card with an enhanced level of security in that the viewer provides protection against unauthorised removal of the selected credential or tampering with the housing. Also, display of the selected credential is dependent on the correct P.I.N. code being punched into the card by the authorised user.
  • a data code from a card entered into the slot 28 is read by the card reader 32. If the data code from the card corresponds to that held in the code store 34, the screen 26 is activated to display the photograph and signature of the authorised user.
  • An advantage of this arrangement is that it constitutes a major improvement in security against credit card fraud since it allows the authorised user to be visually identified at the point of sale. Also, since the validity viewer reads the P.I.N. code normally carried on the reverse of cheque cards or credit cards, no special modification of the cards themselves is required to provide this enhanced level of security.
  • a data code from a security card is read by the card reader and supplied to the processor which also receives via the membrane keypad 18 a separate code manually entered by the user.
  • the two codes are compared with respective codes stored in the code store 34. If the input codes correspond to the respective stored codes, the screen 26 is rendered transparent.
  • the security card Whilst in the illustrated example of the validity viewer the security card is read by inserting it into slot 38, other forms of reader may be used. For example, the security card may be "wiped" past a sensor head on the reverse of the validity viewer. Alternatively, as mentioned above, the validity viewer may include an inductor loop or antenna which receives data transmitted from a similar antenna on a smart card. Other forms of data transfer for transferring data representing a code from the security card to the validity viewer will be apparent to those skilled in the art. Where the validity viewer relies on a code inserted via the membrane keypad 18, the code in the code store 34 with which the k ⁇ yed- in code is compared may be changed by the user of the validity viewer. For example, by pressing a special symbol (not shown) on the membrane keypad 18 or entering a preset sequence of symbols, the appropriate code in code store 34 may be altered at will by the user.
  • the code may be allocated to the validity viewer and entered with the code store by the issuer of the validity viewer, for example the credit card company or securi ty company etc.
  • the code may be selected by the authorised user of the card and then entered into the code store by the issuer of the validity viewer. The validity viewer and the card will usually be sent separately to the authorised user.
  • the authorised user's photograph and signature are inserted into the validity viewer during manufacture.
  • the authorised user may himself insert the appropriate photograph and signature on receipt of the validity viewer.
  • the validity viewer is preferably constructed so that once the photograph and signature have been inserted, a seal sensor device becomes armed so that any attempt to remove the photograph or tamper with the viewer renders the processor inoperable.
  • the selected credentials which identify the authorised user may be stored digitally instead of in the form of a photograph.
  • the Identification Display 16 will be a screen which is capable of displaying a two dimensional image under the control of the processor 30.
  • the image and signature of the authorised user may be stored in scrambled or encrypted form and the processor may include a decoder for decoding the scrambled image prior to its display on the identification display 16.
  • the validity viewer may also be used as a conventional calculator.
  • the complementary security card Whilst the invention has been described in relation to a security card and a validity viewer actuated by the complementary security card - that is one carrying the identical code, clearly the complementary security card can carry other actuating numbers such as those which added to the card numbers total 9 for each column.
  • the invention is not limited to a card, since a key inserted into or turning a lock, or other suitable combinations of components can act to reveal a personal characteristic as above described above.
  • the principles disclosed herein may also be used for customs and similar security documents, and passports.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Credit Cards Or The Like (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

A validity viewer stores an image representing a selected credential of an authorised user, for example a head and shoulders portrait. The image is not normally visible but is revealed when the appropriate code is input to the viewer. In one exemple, the code is carried on a card associated with the validity viewer and is read into the viewer by a reader. In another example, the code is input via a keyboard on the validity viewer.

Description

SECURITY SYSTEM
This invention relates to a security system, and more particularly to a security system which enables one or more selected credentials of anyone seeking to use the system to be readily verified.
With the moves towards a cashless society, a principal use of such security systems is likely to be at a point of sale, where the till operator is required to make instant judgements upon requests for credit from credit holders. With the increasing use of credit cards, the till operator is presently required to compare a signature - often written whilst standing -with the signature on the credit card which may have been written whilst seated. Furthermore, an unauthorised user of the credit card may have had ample time to practice the signature which is fully visible on the card. Many credi t cards never reach their rightful owners, being intercepted before delivery; and counterfeiters continually seek to reproduce cards, to which signatures of non-existent persons can then be added so as to defraud the credit card company and raise the cost of credit to all users.
Another use of such security systems is as an alternative form of identity or security card. Such cards are used for example where entry to an area or building is to be restricted to selected personnel. Depending on the particular form of currently available identity cards, it can be fairly simple and cheap to forge authentic-looking cards with readily available materials. Such cards may also be used to identify the card carrier as a member of a club or library etc and so on.
A need exists for a security system which can overcome at least some of the problems outlined above and which allows the identity of the card carrier to be checked quickly and easily and which also has a relatively high degree of security.
According to one aspect of this invention, there is provided a validity viewer for establishing the identity of an authorised user of the viewer, said viewer including:- identification means storing image data and operable selectively to display an image repesenting a selected credential of an authorised user;
data input means for allowing a data code to be input into the viewer;
code store means for storing at least one preset code;
processor means for receiving the data code input via said data input means and the preset code in said code store means and for causing said identification means to display said selected credential only when said inputted data code corresponds with said preset code.
Then invention also extends to a security system including a security card in combination with a validity viewer as defined above for identifying the authorised user of the card.
The invention will be further described by way of non-limiting example only, with reference to the accompanying drawings, in which:
Figure 1 is a top plan view of a validity viewer in accordance with this invention prior to insertion therein of a security card;
Figure 2 is a section view taken on lines II— II of Figure 1;
Figure 3 is a top plan view of the validity viewer of Figure 1 with the security card inserted therein, and
Figure 4 is a block diagram showing the interrationship between the components of the validity viewer of Figures 1 and 2.
The validity viewer illustrated in the drawings is intended to be used with security cards to allow the authorised user of the card to be identified. Exarηples of such security cards include cheque cards, credit cards, charge cards, membership cards, security passes etc. The validity viewer provides a means by which the proper identity of the authorised user of the security card may be readily checked. To do this, the validity viewer reads a data code from the security card and, if the code agrees with a pre-stored code held in the validity viewer, the image of the authorised user is displayed on the validity viewer.
The validity viewer may also be used otherwise than in combination with a security card. For example, instead of providing personnel with laminated photo-cards as security passes, they may instead be provided with a validity viewer of the form illustrated in the Figures. In this instance, the validity viewer would be programmed so that the image of the authorised user of the validity viewer was revealed only when an appropriate personal identification number (P.I.N.) was entered by the authorised user.
Referring to the Figures, the validi ty viewer 10 comprises a casing 12 of slim rectangular form having on its upper surface a keyboard/alpha¬ numeric display area 14 and an identification display area 16. The keyboard/alpha-numeric display area 14 includes a membrane keypad 18 by which the usual alpha-numeric symbols may be keyed into the viewer, a solar cell panel 20 for generating the power required for operation of the validity viewer and a conventional numerical display, e.g. digital display panel 22 having several characters of seven segment form. Referring especially to Figure 2, the identification display 16 comprises an image 24 representing a selected credential of an authorised user located beneath a screen 26. In this example, the image 24 is in the form of a photograph of the head of a user with a facsimile of the signature of the authorised user beneath the photograph. The screen 26 is electronically operable and made of a material which may be rendered opaque or substantially transparent dependent on the electrical signals applied thereto. Such a screen could, for example, be made of a liquid crystal display which is normally opaque but which, on application of an energising current, is rendered transparent. The construction and operation of such screens will be well known to those skilled in the art.
At one end of the casing 12, the right hand end in Figure 1, there is provided a slot 28 into which a security card may be inserted. The validity viewer includes a reader 32 for reading a code from the security card. For example, many forms of security card now available include a magnetic stripe containing coded information including a P.I.N. code. The reader 32 incorporated in the validity viewer reads this code and supplies it to the processor 28 of the validity viewer. Such readers are well known to those skilled in the art. It will be understood that other forms of data transfer for transferring data stored on the security card to the processor 28 may be used. For example, the data may be stored on the security card in the form of a bar code or similar optically readable code. In another arrangement, the security card may be a "smart card" of the type including a processor and means for transferring data to or from the smart card by means of magnetic induction. In this instance, the validity viewer may include a receiver loop for receiving data transmitted from the smart card.
Figure 3 shows the validity viewer when the card having a code corresponding to that held in the validity viewer has been inserted in the slot 28. It will be seen that the screen 26 has been rendered transparent to reveal the photograph and signature of the authorised user.
Referring now to Figure 4, the processing and control of the validity viewer will now be described. Processing and control of the viewer is carried out by a processor 30 located within the validity viewer. The construction, programming and operation of the processor to carry out the tasks described below is within the competence of one skilled in the art and a detailed description thereof will not therefore by given here. The processor 30 is operable both to perform various validation checks on data fed into the viewer as well as to perform the usual arithmetic calculations of a standard calculator. Data may be input to the processor by means of the membrane keyboard 18 or a card reader 32 associated with the slot 28. Power for the processor and the peripheral equipment is supplied by means of the solar cell panel 20. Power may also be supplied by means of a battery (not shown). Associated with the processor 30 is a code store 34 for storing one or more codes, such as P.I.N. codes associated with the authorised user of the validity viewer. The processor controls the numerical display panel 22 and the screen 26. A seal sensor 36 is associated with the casing 12 of the validity viewer and in particular with the identification display 16 and detects if these are tampered with. Should tampering be detected, the seal 36 sensor inputs to the processor 30 a signal which disables the processor and renders it inoperable. The processor 30 is preferably programmed to return the screen 26 to an opaque state a preset period after it has been made transparent.
In use, a printed image representing a selected credential of the authorised user, for example his or her photograph and signature, is inserted behind the screen 26. A code or codes identifying the authorised user are entered into the code store 34. At least one of these codes corresponds to the coded information held in the magnetic strip on the back of the security card. Having programmed the validity viewer for the particular authorised user by inserting the selected credential and the code or codes in the code store, the validity viewer 10 is sealed and the seal sensor 36 made active.
There are various levels of of security offered by the validity viewer 10. At one level all that is necessary to reveal the image and signature beneath the screen 26 is for the user to punch in
Figure imgf000007_0001
the membrane keypad 18 the correct personal code. If the digits of the code entered by the user of the card correspond to the code held in the code store , the processor will activate the screen 26 to make it transparent so that the photograph and signature of the user are displayed. At this level, the validity viewer acts as a form of security pass card with an enhanced level of security in that the viewer provides protection against unauthorised removal of the selected credential or tampering with the housing. Also, display of the selected credential is dependent on the correct P.I.N. code being punched into the card by the authorised user.
At another level of security, a data code from a card entered into the slot 28 is read by the card reader 32. If the data code from the card corresponds to that held in the code store 34, the screen 26 is activated to display the photograph and signature of the authorised user. An advantage of this arrangement is that it constitutes a major improvement in security against credit card fraud since it allows the authorised user to be visually identified at the point of sale. Also, since the validity viewer reads the P.I.N. code normally carried on the reverse of cheque cards or credit cards, no special modification of the cards themselves is required to provide this enhanced level of security.
At a further level of security, a data code from a security card is read by the card reader and supplied to the processor which also receives via the membrane keypad 18 a separate code manually entered by the user. The two codes are compared with respective codes stored in the code store 34. If the input codes correspond to the respective stored codes, the screen 26 is rendered transparent.
Whilst in the illustrated example of the validity viewer the security card is read by inserting it into slot 38, other forms of reader may be used. For example, the security card may be "wiped" past a sensor head on the reverse of the validity viewer. Alternatively, as mentioned above, the validity viewer may include an inductor loop or antenna which receives data transmitted from a similar antenna on a smart card. Other forms of data transfer for transferring data representing a code from the security card to the validity viewer will be apparent to those skilled in the art. Where the validity viewer relies on a code inserted via the membrane keypad 18, the code in the code store 34 with which the kεyed- in code is compared may be changed by the user of the validity viewer. For example, by pressing a special symbol (not shown) on the membrane keypad 18 or entering a preset sequence of symbols, the appropriate code in code store 34 may be altered at will by the user.
In other applications, the code may be allocated to the validity viewer and entered with the code store by the issuer of the validity viewer, for example the credit card company or securi ty company etc. Alternatively, the code may be selected by the authorised user of the card and then entered into the code store by the issuer of the validity viewer. The validity viewer and the card will usually be sent separately to the authorised user.
In the example described above, the authorised user's photograph and signature are inserted into the validity viewer during manufacture. In other applications, the authorised user may himself insert the appropriate photograph and signature on receipt of the validity viewer. In this case, the validity viewer is preferably constructed so that once the photograph and signature have been inserted, a seal sensor device becomes armed so that any attempt to remove the photograph or tamper with the viewer renders the processor inoperable.
In another example of validity viewer (not shown) the selected credentials which identify the authorised user may be stored digitally instead of in the form of a photograph. In this instance, the Identification Display 16 will be a screen which is capable of displaying a two dimensional image under the control of the processor 30. To provide an enhanced level of security, in this instance, the image and signature of the authorised user may be stored in scrambled or encrypted form and the processor may include a decoder for decoding the scrambled image prior to its display on the identification display 16. As well as serving as a means of identifying the authorised user of a security card, the validity viewer may also be used as a conventional calculator.
Whilst the provision of both a card and a validity viewer will be more expensive initially than merely the card, the reduction in fraudulent losses, and the longer time between card changes possible with this more secure system, will soon recoup the extra expenditure. To entice more users to adopt the system and carry and use the validity viewer, the card companies can select those of the allocated card numbers which have been used during a selected usage period for entry into a free draw, with suitable prizes.
Whilst the invention has been described in relation to a security card and a validity viewer actuated by the complementary security card - that is one carrying the identical code, clearly the complementary security card can carry other actuating numbers such as those which added to the card numbers total 9 for each column. The invention is not limited to a card, since a key inserted into or turning a lock, or other suitable combinations of components can act to reveal a personal characteristic as above described above. The principles disclosed herein may also be used for customs and similar security documents, and passports.

Claims

1. A validity viewer for establishing the identity of an authorised user of the viewer, said viewer including:-
identification means storing image data and operable selectively to display an image representing a selected credential of an authorised user;
data input means for allowing a data code to be input into the viewer;
code store means for storing at least one preset code;
processor means for receiving the data code input via said data input means and the preset code in said code store means and for causing said identification means to display said selected credential only when said inputted data code corresponds with said preset code.
2. A validity viewer according to claim 1, wherein said identification means stores and selectively displays an image of the authorised user.
3. A vlaidity viewer according to claim 1 or claim 2, where said identification means stores and selectivity displays a facsimile of the signature of the authorised user.
4. A validity viewer according to any one of the preceding claims, wherein said identification means stores said image in pictorial form.
5. A validity viewer ace to claim 4, wherein said identification means includes screen means located over said image, said screen means being renderable opaque or subsequently transparent whereby said image may be selectively obscured or displayed respectively.
6. A validity viewer according to claim 5, wherein said screen means is electronically actuated.
7. A validity viewer according to any one of claims 1 to 3, wherein said identification means stores said image in the form of digital data.
8. A validity viewer according to claim 7, wherein the digital data representing said image is in encrypted form and said identification means
J. includes indues means for decoding said encrypted digital data.
9. A validity viewer according to any of the preceding claims, wherein said data input means comprises a keypad .
10. A validity viewer according to any of the preceding claims wherein said data input means comprises reading means for reading data stored remotely from said validity viewer.
11. A validity viewer according to any one of claims 1 to 8, wherein said data input means comprises a keypad and reading means for reading data stored remotely from said validity viewer, and said processor means is responsive to said keypad and said reading means to cause said identification means to display said selected credential only when the data codes inputted via said keypad and said reading means correspond with said stored preset code.
12. A validity viewer according to claim 11, wherein said store means stores two preset codes, and said processor means compares one of said preset codes with data input via said keypad and compares the other of said preset codes with data input _ia_ said reading means.
13. A validity viewer according to any one of claims 10 to 12, wherein said reading means comprises a magnetic strip reader for reading a magnetic strip on, for example, a value card.
14. A validity viewer according to any on of claims 10 to 12 wherein said reading means includes an induction loop.
15. A validity viewer according to any one of claims 10 to 14 wherein the validity viewer is arranged to read data stored on a card, and said validity viewer includes slot means for receiving at least a part of said card.
16. A validity viewer according to any one of the preceding claims, wherein the identification means is a sealed area and means is provided for disabling said identification means if the identification means is tampered with.
17. A validity viewer according to claim 16 wherein breaking of said seal causes said processor means to become inoperative.
18. A security system including a security card and a validity viewer according to any one of claims 10 to 17 wherein said validity viewer stoife, image data representing a selected credential of the authorised user of the security card.
19. A validity viewer substantially hereinbefore described, with reference to and as illustrated in, any of the accompanying drawings.
20. A security system substantially hereinbefore described, with reference to and as illustrated in, any of the accompanying drawings.
PCT/GB1988/000834 1987-10-13 1988-10-06 Security system WO1989003314A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
BR888807747A BR8807747A (en) 1987-10-13 1988-10-06 VALIDITY CHECKER
DK083490A DK83490D0 (en) 1987-10-13 1990-04-03 SECURITY SYSTEM
NO90901577A NO901577L (en) 1987-10-13 1990-04-06 APPLICATION FOR VALIDITY CHARACTERISTICS OF IDENTITY CHARACTERISTICS.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8723957 1987-10-13
GB878723957A GB8723957D0 (en) 1987-10-13 1987-10-13 Security system

Publications (1)

Publication Number Publication Date
WO1989003314A1 true WO1989003314A1 (en) 1989-04-20

Family

ID=10625214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1988/000834 WO1989003314A1 (en) 1987-10-13 1988-10-06 Security system

Country Status (7)

Country Link
EP (1) EP0395659A1 (en)
JP (1) JPH03501418A (en)
AU (1) AU2536688A (en)
BR (1) BR8807747A (en)
DK (1) DK83490D0 (en)
GB (1) GB8723957D0 (en)
WO (1) WO1989003314A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4138131A1 (en) * 1991-10-19 1993-04-22 Provera Ges Fuer Projektierung Non-contact chip card with integrated microprocessor - has read/write facility provided by optical capacitive or inductive coupling to card, and display powered by solar energy
DE4213797A1 (en) * 1992-04-27 1993-10-28 Bavaria Med Tech Medical history information system using personal data card - has memory card containing key information that is required for further treatment and processor based reader receives card at hospital

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU694912B3 (en) * 1998-02-26 1998-07-30 Coms21 Limited Reader

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2181582A (en) * 1985-10-11 1987-04-23 Victor Campbell Blackwell Personal identification device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2181582A (en) * 1985-10-11 1987-04-23 Victor Campbell Blackwell Personal identification device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4138131A1 (en) * 1991-10-19 1993-04-22 Provera Ges Fuer Projektierung Non-contact chip card with integrated microprocessor - has read/write facility provided by optical capacitive or inductive coupling to card, and display powered by solar energy
DE4213797A1 (en) * 1992-04-27 1993-10-28 Bavaria Med Tech Medical history information system using personal data card - has memory card containing key information that is required for further treatment and processor based reader receives card at hospital

Also Published As

Publication number Publication date
EP0395659A1 (en) 1990-11-07
BR8807747A (en) 1990-08-07
JPH03501418A (en) 1991-03-28
AU2536688A (en) 1989-05-02
DK83490A (en) 1990-04-03
GB8723957D0 (en) 1987-11-18
DK83490D0 (en) 1990-04-03

Similar Documents

Publication Publication Date Title
US5214699A (en) System for decoding and displaying personalized indentification stored on memory storage device
US5259025A (en) Method of verifying fake-proof video identification data
US4707592A (en) Personal universal identity card system for failsafe interactive financial transactions
US20080099556A1 (en) Card Having Password Input Key
US5416306A (en) Method for comparing and verifying security codes at point of sale
US4202626A (en) Signature verification and authentication systems
EP0729120A2 (en) Method and apparatus for image based validations of printed documents
US3859508A (en) Method of control of legitimacy safe against forgery
EP0960395B1 (en) Identity card, information carrier and housing designed for its application
NO303474B1 (en) Method and apparatus for simplifying the use of an otherwise relatively large number of credit cards and the like
EP0152703A2 (en) Fraudulent card intercept system
WO2007033100A1 (en) Secure credit card and method and apparatus for utilizing the same
GB2255934A (en) Integrated circuit card with display.
WO2004079643A1 (en) Secure steganographic biometric identification
MXPA05003268A (en) Identification system.
US5326136A (en) Check book with forgery and theft inhibiting features
JPS5952358A (en) Verification of use of document specified by user and document and apparatus for executing same
CN101069187B (en) Secure cards and methods
US4621188A (en) Data card and data strip measuring means
WO1989003314A1 (en) Security system
CA2195681A1 (en) Methods and systems for creating and authenticating unalterable self-verifying articles
EP0420466A1 (en) Credit supply system
EP0638880B1 (en) A method of verifying fake-proof video identification data
KR20010067697A (en) Personal security assurance Device using Citizen Card
GB2291237A (en) Credit card or the like and system utilising same

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AT AU BB BG BR CH DE DK FI GB HU JP KP KR LK LU MC MG MW NL NO RO SD SE SU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BJ CF CG CH CM DE FR GA GB IT LU ML MR NL SE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 1988908729

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1988908729

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1988908729

Country of ref document: EP