This invention relates to a method of limiting fraud in connection with coin or note operated machines.
Coin and banknote acceptors are well known. WO-A-0048138 discloses acceptors which detect fraud attempts and modify their acceptance conditions in dependence thereon. However, each machine makes its own determination of the presence of fraudsters.
According to the present invention, there is provided an acceptor for money items or the like, e.g. coins, tokens, bank notes and tickets, comprising sensing means for sensing parameters of an item submitted to the acceptor, processing means for determining the acceptability of an item submitted to the acceptor in the basis of the parameters thereof sensed by the sensing means and communication means, wherein the processing means is configured to respond to a condition indicative of a fraud attempt by sending an alarm signal using said communication means and to respond to such an alarm signal, received by said communication means, to modify its acceptance criteria. Said condition may be an actual fraud attempt or a condition which is suggestive of, but not determinative of, a fraud attempt, for example a sensed parameter being at the edge of an acceptance range.
Preferably, said condition relates to a sensed parameter value. However, it could be generated by fraud detection means such as means for detecting stringing.
Preferably, said modification comprises reducing an acceptance range for a sensed item parameter. However, the modification could extend to rejection of all offered items.
The nature of the communication to and from an acceptor according to the present invention will vary in dependence on circumstances. For instance, in an arcade environment or an automated ticket office, it is desirable for acceptors to be alerted to attempted frauds in real time. In such a situation, a data network, employing for example Ethernet, Bluetooth, or 802.11, protocols would be appropriate. However, in the event of the introduction of a new slug or counterfeit bank note, it would be desirable to employ acceptors according to the present invention, even if the alarm signalling were not in real-time but with alarms being transmitted and received during periodic administrative data transfers, e.g. using landline or mobile telephone connections. Furthermore, the alarm may be conveyed in a data storage means, such as the memory of a handheld acceptor administration unit, intended to be take to acceptors in turn for data transfer, rather than as signals in a network.
Preferred embodiments of the present invention will now be described, by way of example, with reference to the accompanying drawings.
Referring to
Overview of Coin Acceptor
The coin sensing station 4 includes four coin sensing coil units S1, S2, S3 and S4 shown in dotted outline, which are energised in order to produce an inductive coupling with the coin. Also, a coil unit PS is provided in the accept path 6, downstream of the gate 5, to act as a credit sensor in order to detect whether a coin that was determined to be acceptable, has in fact passed into the accept path 6.
The coils are energised at different frequencies by a drive and interface circuit 10 shown schematically in
In order to determine coin authenticity, the coin parameter signals produced by a coin under test are fed to a microcontroller 11 which is coupled to a memory in the form of an EEPROM 12. The microcontroller 11 processes the coin parameter signals x1-x4 derived from the coin under test and compares the outcome with corresponding stored values held in the EEPROM 12. The stored values are held in terms of windows having upper and lower value limits. Thus, if the processed data falls within the corresponding windows associated with a true coin of a particular denomination, the coin is indicated to be acceptable, but otherwise is rejected. If acceptable, a signal is provided on line 13 to a drive circuit 14 which operates the gate 5 shown in
The microcontroller 11 compares the processed data with a number of different sets of operating window data appropriate for coins of different denominations so that the coin acceptor can accept or reject more than one coin of a particular currency set. If the coin is accepted, its passage along the accept path 6 is detected by the post acceptance credit sensor coil unit PS, and the unit 10 passes corresponding data to the microcontroller 11, which in turn provides an output on line 15 that indicates the amount of monetary credit attributed to the accepted coin.
The sensor coil units S each include one or more inductor coils connected in an individual oscillatory circuit and the coil drive and interface circuit 10 includes a multiplexer to scan outputs from the coil units sequentially, so as to provide data to the microcontroller 11. Each circuit typically oscillates at a frequency in a range of 50-150 kHz and the circuit components are selected so that each sensor coil S1-S4 has a different natural resonant frequency in order to avoid cross-coupling between them.
As the coin passes the sensor coil unit S1, its impedance is altered by the presence of the coin over a period of ˜100 milliseconds. As a result, the amplitude of the oscillations through the coil is modified over the period that the coin passes and also the oscillation frequency is altered. The variation in amplitude and frequency resulting from the modulation produced by the coin is used to produce the coin parameter signals X1-x4representative of characteristics of the coin.
The microcontroller 11 is coupled to a network interface card 23 which interfaces the microcontroller 11 to the network 101.
Processing Circuitry
The graph of
As shown in
When a first coin under test exhibits a parameter signal xf within either the upper or lower safety margin, USM, LSM of the normal acceptance window NAW, the coin is accepted as a true coin (assuming that its other detected parameters are satisfactory) but the acceptor then switches to a restricted access window RAW for subsequent coins and broadcasts this to the other machines 100 on the network 101. The occurrence of the first coin with parameter value xf sets a flag which may comprise a counter in the microcontroller 11. The acceptor continues to use the restricted access window for a predetermined number of coins set by the counter, and the flag remains set until a number of coins with parameter signals x1 lying within the restricted window RAW occur in succession. The number is dependent upon the distribution of coin data and the probability of a true coin legitimately falling at the limits of the distribution 20. This will vary from coin to coin but typically might be six or eight insertions of coin or could be as few as one or as many as twenty.
If another coin produces a value x1 outside of the restricted access window prior to expiry of the count, the flag is reset and the count begins again.
Additionally, an upper security barrier USB and a lower security barrier LSB are disposed above and below the upper and lower window limits w1, w2 respectively. If a coin produces a parameter signal x1 lying within either the upper or lower security barrier regions USB, LSB, the previously described process is carried out and the acceptor switches from the normal acceptance window NAW to the restricted access window RAW. This process is carried out in order to reject potentially fraudulent coins that form part of a distribution such as the fraudulent distribution 21. For example, it may be possible to find a coin of a foreign denomination which has a close, similar distribution to the true distribution 20, the foreign coin having a distribution 21. The fraudster may attempt to defraud the validator by feeding a series of the foreign coins of the same denomination through the acceptor. With the described arrangement according to the invention, the first foreign coin would be rejected if its parameter signal fell within USB because it is outside of the normal acceptance range NAW, and would cause the system to switch to the RAW to reject subsequent coins of the fraudulent coin distribution. If the first fraudulent coin's parameter signal fell within USM, it would be accepted and again would cause the system to switch from NAW to RAW for subsequent coins. Since for most of the fraudulent foreign coins, their parameter signal is more likely to be in USB than other parts of the distribution 21, there is a high probability that the first fraudulent coin will be rejected.
The acceptor may also include a timer which, after the restricted access window RAW has been adopted, returns the acceptor back to the normal acceptance window NAW after a given time period. The fraudster may insert a fraudulent coin, get it accepted by the coin acceptor which then switches to use of the restricted access window RAW. If the fraudster then gives up after a few more tries, and goes away, the timer can then time-out in time for an honest user to come and use the acceptor on the basis of the normal acceptance window.
The routine followed by the microcontroller 11 is shown in more detail in
At step S1, successive values of the parameter signal x1 1, x1 2, . . . x1N are shown. These occurrences of the parameter signal are produced in response to the acceptor testing successive coins one after the other. The successive occurrences of the parameter signal are tested one after the other by the remainder of the routine as will now be explained.
Considering the first occurrence of the parameter signal x1 1, produced in response to a first coin, at step S2, a test is carried out to see if the timer is active. If it is not active, t=0. This means that a sufficiently long period of time has elapsed since the acceptor was last used, indicating that it is safe to use the relatively wide, normal acceptance window NAW.
At step S3, the status of the flag counter is checked. If the flag parameter n=0, this means that the flag is not set and that it is safe to use the normal acceptance window NAW. However, if the flag counter is set whilst the timer is running, it is not safe to use the normal acceptance window because the conditions indicate that a coin, previously accepted by the acceptor 1 or the acceptor of one of the other machines 100, has triggered the flag counter of an acceptor whilst its timer is running. As a result, the value of x1 1 needs to be compared with the restricted access window RAW. This is carried out at step S4. If the value of x1 1, falls within the restricted access window RAW, the coin is accepted at step S5 but otherwise is rejected at step S6.
As previously mentioned, if the timer or the counter flag are set to 0, it is safe to use the normal acceptance window NAW. This test is carried out at step S7 and the coin is either accepted or rejected at step S5 or S6.
In addition to comparing the parameter value against either of the acceptance windows, each occurrence of the parameter value is compared with the upper and lower safety margins and safety barriers. These tests are performed at steps S8 and S9. If the parameter value signal x1 1 falls within any of the barriers or margins USB, USM, LSB, LSM, this indicates that the aforementioned flag needs to be set and that the timer t should be set running and an alert must be broadcast to the other machines 100. These activities are carried out at steps S10, at which the count parameter n is set to a predetermined maximum value nmax, and S11 at which the alert is broadcast. It will be understood that nmax and an integer number corresponding to the successive number of coins which subsequently need to be found to be true when using the relatively narrow restricted access window RAW. The value of the timer interval t is set to tmax which corresponds to the period of time for which the timer will run until reaching a value t=0. This, therefore sets the time after which the acceptor will recover and switch back to use the normal acceptance window NAW after a period of using the restricted access window RAW (step S2).
If the value of the parameter signal x1 1 does not fall within any of the margins or barriers tested by step S8, S9, this indicates that the parameter signal x1 1, on the assumption that the coin has been accepted, falls within the restricted access window RAW. In this situation, the counter parameter n needs to be decremented, if it is not already zero. This occurs at step S12.
Considering the situation where the first occurrence of the coin parameter signal x1 1 falls within the upper safety margin USM. In this situation, t=0 and n=0 so that the routine passes to step S7 at which the value is compared with the normal acceptance window NAW. The value of x1 1 falls within the window and hence the coin is accepted at step S5.
Additionally, the value of x1 1 is found to be within the upper safety margin USM, at step S9. As a result, the flag counter parameter n is set to nmax and the timer parameter t is set to tmax at step S10.
When a second coin is entered a second occurrence of the coin parameter signal x1 is produced, namely x1 2. At step S2, the timer is now set to t≠0 and so the process moves to step S3. The parameter n≠0 and so the value of x1 2 is compared with the restricted access window RAW at step S4. The value is either accepted or rejected. Assuming it is accepted, and falls outside of the margins and barriers tested at step S8 and S9, the counter parameter n is decremented at step S11. The timer t is running all the time towards zero.
The process continues with the subsequent occurrences of the parameter x1 until the timer t=0 or the counter flag n=0. The acceptor then reverts to the use of the normal acceptance window NAW.
Referring to
The previously described process thus relates to one of the coin parameter signals x1. However, as previously explained, four different coin parameter signals x1-x4 are produced in this example and in fact, in practice, up to fourteen different individual parameter signals may be processed. The routine performed according to
Other modifications are possible. In the routine shown in
In another modification, the routine may switch from the normal acceptance window NAW to the RAW in response to a coin parameter signal falling within a very narrow portion of the NAW itself, which may signify a fraudulent coin in certain circumstances.
Banknote Acceptor
The previously described routines are also applicable to banknote acceptors and an example is shown in
Thus, in accordance with the invention, the banknote acceptor is provided with increased security to discriminate against a fraudster inserting a series of fraudulent banknotes all made according to the same design, which individually would fall within the normal acceptance window for an acceptable denomination of banknote.
Whilst the invention has been described by way of example in relation to a coin acceptor and a bank note acceptor it will be understood that it is applicable to other money items such as tokens which are sometimes used instead of coins and other sheet members which have an attributable money value including, but not limited to, credit and debit cards.
Number | Date | Country | Kind |
---|---|---|---|
0218259.0 | Aug 2002 | GB | national |