This section provides background information related to the present disclosure which is not necessarily prior art.
1. Technical Field
The invention relates to an automated teller machine having a camera to detect manipulation. The invention relates in particular to an automated teller machine designed as a cash dispenser.
2. Discussion
In the area of self-service automats, in particular cash dispensers, criminal actions in the form of manipulation are frequently undertaken with the goal of spying out sensitive data, in particular PINs (personal identity numbers) and/or card numbers of users of the automated teller machine. Manipulation attempts are known specifically in which so-called skimming devices, such as keypad overlays and similar, are installed illegally in the operating area or on the control panel. Such keypad overlays often have their own power supply, as well as a processor, a memory and an operating program so that an unsuspecting user is spied on when entering his PIN or inserting his bank card. The data mined in this way are then sent over a transmitter integrated into the keypad overlay to a remote receiver or stored in a memory in the overlay. Many of the skimming devices encountered today can be distinguished only with great difficulty by the human eye from original controls (keypad, card reader, etc.).
In order to frustrate such manipulation attempts, monitoring systems are often used that have one or more cameras installed close to the site of the automated teller machine to capture images of the entire control panel and often the area occupied by the user as well. One such solution is described in DE 201 02 477 U1. Images of both the control panel and the user area immediately in front of said panel can be captured by means of camera monitoring. One additional sensor is provided in order to distinguish whether a person is in the user area.
An object of the present invention is to propose a solution for the simplest possible camera monitoring that likewise allows reliable detection of manipulation attempts.
Accordingly, an automated teller machine is proposed in which the camera is mounted inside a housing section surrounding the control panel and is oriented in such a way that the camera captures images of at least two of the elements arranged in the control panel.
As a result, detection of overlays on individual or several elements is improved. The camera can also be used to monitor the function of individual elements and/or their operation by the user in order to detect possible functional or operating errors. For example, the camera captures images of the money-dispensing compartment of the automated teller machine and can reliably detect not only manipulation attempts but also monitor, for example, whether a user has removed all the notes from the compartment when money is issued or whether notes were retracted again by the automated teller machine (the retract scenario). Many additional applications are possible.
Preferably the elements of which images are captured by the camera are elements suitable for manipulation and/or elements located in areas of the control panel suitable for manipulation, such as the money-dispensing compartment, keypad, card slot and/or monitor. The elements are therefore preferably operating elements in the stricter sense, but they can also be other elements, such as an installation panel in the control panel area, or a logo, information sign, lettering or something similar. The camera has an acquisition angle that preferably captures images of several control elements, such as the money-dispensing compartment and the keypad. To this end, the camera preferably has a wide-angle lens with an acquisition angle of at least 130 degrees.
Consequently, it is advantageous if the camera is installed in that housing section of the automated teller machine that (bounds) the control panel at the side or at the top. This can specifically be the surround of the control panel.
Furthermore, the camera can be connected to a data processing unit that processes the data generated by the camera. Provision can be made for the data processing unit to be integrated into the automated teller machine. In this context, provision can also be made for the data processing unit to have a first stage receiving the image data for image processing, specifically for shadow removal, edge detection, vectorizing and/or segmenting. Specifically, the data processing unit can have a second stage downstream from the first stage for feature extraction, wherein blob analysis, edge position and/or color distribution in particular is performed. In addition, a third stage downstream from the second stage can be provided for classification.
The data processing unit can also have interfaces for video monitoring systems or units (CCTV) and/or for security systems.
Preferably, the images of the elements captured by the camera have optically clearly recognizable features, in particular edges demarcated from homogenous surfaces.
Provision can also be made for an additional camera that is oriented to an area in which a user, more specifically his head, is located when using the automated teller machine.
Provision can also be made for the data processing unit, when it detects a manipulation attempt at the captured elements by processing the image data, to trigger an alarm, to disable the automated teller machine and/or to activate the additional camera.
The camera and/or the data processing unit are preferably deactivated during the operation and/or maintenance of the automated teller machine.
The invention and the advantages resulting therefrom are described hereinafter using embodiments and with reference to the accompanying schematic drawings.
The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations, and are not intended to limit the scope of the present disclosure.
Corresponding reference numerals indicate corresponding parts throughout the several views of the drawings.
Example embodiments will now be described more fully with reference to the accompanying drawings.
The camera has a lens optimized for this application and, as an example, a resolution of 2 megapixels and greater. The camera is connected to a special data processing unit 10 (refer to
In order to detect the presence of overlays, an optical measurement of the captured elements, such as the keypad, is performed inside the data processing unit 10 with the aid of the camera CAM, in order to detect discrepancies clearly in the event of manipulation. Tests on the part of the applicant have shown that reference discrepancies in the millimeter range can be detected clearly. The requisite image data processing is performed principally in the data processing unit described hereinafter.
A first stage 11 for image processing, a second stage 12 for feature extraction, and a third stage 13 for classifying the processed data. Stage 13 is, in turn, connected to an interface 14 over which the various alarm or monitoring devices can be activated or controlled. These devices, known henceforth as AISS, include image falsification or manipulation detection (IFD). The first stage 11 that serves for image processing is in turn connected to a second interface 15 over which a link is established to the CCTV unit 20. Remote monitoring or remote diagnosis, for example, can be performed with the help of this CCTV unit.
The data processing unit 10 is primarily responsible for processing the image data D generated by the camera CAM. The image data D arrive initially at the first stage 11 that performs a pre-processing of the incoming image data, when steps such as shadow removal, edge detection, vectorizing and/or segmenting in particular are carried out. The downstream second stage 12 is used for feature extraction, which can be carried out, for example, by means of blob analysis, edge positioning and/or color distribution. Blob analysis, for example, is used to detect cohesive areas in an image and to perform measurements on the blobs. A blob (binary large object) is an area of adjacent pixels having the same logical status. All pixels in an image that form part of a blob are in the foreground. All remaining pixels are in the background. In a binary image, pixels in the background have values that correspond to zero, while each pixel not equal to zero is part of a binary object.
Then, in stage 13, a classification is made which determines on the basis of the extracted features whether a hostile manipulation at the self-service terminal, or automated teller machine ATM, has been carried out or not.
The data processing unit 10 can, for example, be implemented by means of a personal computer that is linked to the automated teller machine ATM or is integrated into said ATM. Besides the camera CAM described that captures images of the areas of the control panel CP already mentioned, an additional camera CAMO can be installed on the automated teller machine ATM (refer to
The operator of the automated teller machine can configure the scope and the type of measures, or countermeasures, taken using the system described here.
Instead of an individual camera (refer to CAM in
All the cameras preferably have a resolution of at least 2 megapixels. The lenses used have an acquisition angle of about 140 degrees and greater. In addition, the exposure time of the cameras used can be freely adjusted over a broad range from 0.25 msec, for example, up to 8000 msec (8 secs.). In this way, it is possible to adjust to the widest possible range of lighting conditions. Tests by the applicant have shown that a camera resolution of about 10 pixels per degree can be obtained. Referred to a distance of one meter, it is possible to achieve an accuracy of 1.5 mm per pixel. This means, in turn, that a manipulation can be detected reliably using a reference deviation of 2 to 3 mm. The closer the camera lens is to the imaged element or observed object, the more precise the measurement. As a result, precision of less than 1 mm can be achieved closer up.
Depending on where the automated teller machine will be used, for example outside or inside, as well as on the existing light conditions, it may be of advantage to install the camera CAM in the lateral part of the housing of the automated teller machine ATM or in the upper part of the housing. Various possibilities for monitoring exist depending on the camera position. When monitoring the different elements, or partial areas, the following possibilities emerge:
Capturing images of the money dispensing compartment (shutter) 1 permits checking for manipulation in the form of cash trappers, i.e. special overlays. Capturing images of the keypad area makes it possible to determine manipulation attempts using overlays or changes to security lighting. Capturing images of the installation panel makes it possible in particular to detect complete overlays. Capturing images of the card slot 4, particularly using an integral camera, makes it possible to detect manipulations in this area.
It has been shown that discrepancies of 2 mm can be clearly detected in particular at the keypad and the card slot. Discrepancies at the rear outer edge of the installation panel can be detected starting at 4 mm. Discrepancies at the lower edge of the shutter can be detected starting at 8 mm.
The data processing unit 10 (refer to
Retrieving an image, adjusting the image rate, the color model, image resolution, triggering an event in the CCTV service when preparing a new image and/or possibly a visual enhancement of detected manipulations on a prepared image.
The system is designed such that in normal operation (e.g. withdrawing money, account status inquiry, etc.) no false alarms are created by hands or objects in the image. For this reason, manipulation detection is deactivated in the period of normal use of an ATM. Also, time periods of cleaning or other brief uses (filing bank statements, interaction before and after the start of a transaction) should not be used as examples of manipulation detection. Essentially, only fixed and immobile manipulation attempts are preferably analyzed and detected. The system is designed such that monitoring operates even under a great variety of light conditions (day, night, rain, cloud, etc.). Similarly, briefly changing light conditions, such as light reflections, passing shadows and the like are compensated for or ignored in the image processing in order to prevent a false alarm. In addition, events of a technical nature, such as a lighting failure and the like, can be taken into consideration. These and other special cases are detected for classification and solved in particular by the third stage.
The method carried out by the system described for detecting manipulation exhibits in particular the following stages (refer to
In a first step, an image is initially recorded (stage 11), wherein the camera parameters are adjusted to generate suitable images. In so doing, a series of images or corresponding image data D is recorded that serves as the basis, or reference, for pre-processing.
Then image data D are pre-processed (stage 11), wherein these data are processed such that they are suitable for further processing. For example, several images are combined into a target image and optimized using image enhancement algorithms. The following steps in particular are performed:
Shadow removal, deletion of moving objects, elimination of noise and/or combination of differently exposed photographs.
Some of the adjustments to the cameras are for different exposure times, to eliminate reflections and to assemble well lighted areas. The images are preferably assembled over a predetermined period in order to obtain the best possible images for manipulation detection. Feature extraction is performed in a third step (stage 12) in which image analysis methods are applied to the pre-processed images or image data in order to inspect said images or image data for specific features, such as edge positions or color distributions. A number or a value is assigned to each feature that indicated how well the corresponding feature was found in the scanned image. The values are collected in what is known as a features vector.
In a further step, a classification is carried out (Stage 13), i.e. the feature vector is passed on to a classification sequence to reach the decision whether manipulation exists or not. The types of classifiers are used that are able to indicate a confidence, i.e. a probability or certainty, with which the decision holds true. The classification mechanisms may include, for example:
Learning classifier systems, Bayes classifiers, support vector machines (SVM) or decision trees (CART or C 4.5).
The system described here is preferably modular in construction, in order to make different configurations possible. The actual image processing and the CCTV connection are implemented in different modules (refer to
The system presented here is also suitable for documenting the manipulations detected, or archiving said manipulations digitally. In the event of a detected manipulation, the images recorded, along with corresponding meta-information, such as time stamp, type of manipulation, etc., are saved on a hard disc in the system or on a connected PC. Messages can also be forwarded to a platform for the purposes of reporting, such as error reports, status reports (deactivation, change of mode), statistics, suspected manipulation and/or alarm reports. In the event of an alarm, a suitable message containing the specific alarm level can be transmitted to the administration interface or interface. The following possibilities can additionally be implemented at said interface:
Uploading camera data, such as the number of cameras, construction status, serial number, etc., master camera data, or adjustment of camera parameters and/or registration for alarms (notifications).
The invention presented here is specifically suitable for reliably detecting hostile manipulations at an automated teller machine, such as a cash dispenser. To this end, the control panel is continuously and automatically monitored by at least one camera. Using image data processing, the elements captured by the camera are measured optically to identify deviations from reference data. It has already been shown that discrepancies in the range of mere millimeters can be identified reliably. A combination of edge detection and segmenting is preferably used for detecting foreign objects so that contours of objects left behind can be clearly detected and identified. In the event of attempted manipulation, countermeasures or actions can be initiated.
The present invention was described using the example of a cash dispenser, but is not restricted thereto and can be applied to any type of self-service terminal.
The foregoing description of the embodiments has been provided for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention. Individual elements or features of a particular embodiment are generally not limited to that particular embodiment, but, where applicable, are interchangeable and can be used in a selected embodiment, even if not specifically shown or described. The same may also be varied in many ways. Such variations are not to be regarded as a departure from the invention, and all such modifications are intended to be included within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
10 2009 018 322.1 | Apr 2009 | DE | national |
This application is a National Stage of International Application No. PCT/EP2010/055008, filed Apr. 16, 2010, and published in German as WO 2010/121951 A1 on Oct. 28, 2010. This application claims the benefit and priority of German application 10 2009 018 322.1, filed Apr. 22, 2009. The entire disclosures of the above applications are incorporated herein by reference.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2010/055008 | 4/16/2010 | WO | 00 | 10/12/2011 |