This invention relates in general to security systems and more particularly to a security system including a card reader adapted to accept identification information from a card to prevent the theft of the use of a related good or service, particular for use in a retail fueling station environment to prevent drive-offs for payment of fuel.
In particular to service station environments where customers fuel their own vehicles in a self-service environment, theft of fuel by non-payment and drive-offs is particularly a problem that causes substantial loss of revenue. Service station operators do have the ability to configure their systems to only allow fuel to be dispensed by a fuel dispenser after payment has been made first, up-front, known as “pre-pay.” However, some service station owners are hesitant to configure their fuel dispensers to require “pre-pay” due largely to the inconvenience and alienation to the customer.
For example, some customers may not want to have to go inside the convenience store to leave a deposit or pre-payment. These same customers may also not want to then go back outside to dispense fuel, and then go back inside the convenience store again a second time to settle up the difference between the deposit or prepayment and the actual charge for the fuel dispensed. Some service station operators are willing to take a chance on theft or drive offs by not implementing strict pre-pay rules on the fuel dispensers in fear that doing so might alienate customers, but the theft or drive-offs that occur as a result cost the service station significant losses in revenue profits thereby putting the service station owner in a predicament in how they decide to handle payment for their customers.
One solution to this problem has been possible due to the advent of credit and debit card presentation and payment at the fuel dispenser, also known as a CRIND®-equipped fuel dispenser in the case of Gilbarco's fuel dispensers, the assignee of the present invention. A CRIND®-equipped fuel dispenser can be configured to require pre-payment for fuel, but the system can be configured to be overridden to allow fueling if a credit or debit card is presented and authorized. Thus, this solves part of the problem in that customers having and desiring to pay for fuel using their credit or debit card can do so without having to go inside the convenience store to pre-pay and/or leave a deposit even if the service station is configured for pre-payment for cash transactions. However, not all customers have a credit or debit card, and a substantial amount of service station customers still desire to use cash for payment.
In order to prevent or deter drive-offs, some service station operators have employed cameras that are used by in-store operators. The cameras are used to view customers at the fuel dispensers and to record the license plate of a vehicle if a drive off occurs. However, problems exist with these systems. For example, such systems require the operator to quickly detect a drive off, and then capture a license plate number, which is very difficult due to the reaction time required between detection of drive off and before the vehicle departs from the service station. If a camera system is employed that can automatically recognize and decipher license plate numbers, such systems rely on optical sight and detection which are costly and imperfect and may not be able to readably detect a license plate. Further, the customer that dispensed fuel and drove off may not be the actual owner the car, and thus the true owner of the car cannot necessarily be held responsible legally or due to lack of evidence.
Therefore, there exists a need to provide a system and method of allowing a service station operator to not require pre-payment for cash transactions or other transactions where payment cannot be presented at the dispenser before dispensing is authorized, but still provide a manner of deterring, preventing and/or capturing data of the offending customer in the event of a drive-off and/or to recover lost sales.
A security system for preventing the theft of the use of goods or services, including fuel dispensed from a fuel dispenser. The security system includes a card reader that is operable to read identification card data. Identification card data is data that is reasonably certain to identify the user or customer or characteristics indicative of the identity of the user, is present in a common readable medium so that such can be universally used in different localities or regions, and is reliable to be used from an evidentiary standpoint for law enforcement purposes. In this manner, the identification data can be used to detect fraud and/or is preferable since such identification card is widespread and possessed by all individuals that can legally operate a vehicle.
The card reader may be operable to read data stored in a variety of media and media technologies. In one embodiment, the identification card data is read from a state issued identification card in a known data format that may be read by the card reader when the identification card is inserted into the card reader. In a further embodiment, the identification card data is read from a state issued driver's license. The stated issued driver's license may include the person's name, address, date of birth, gender, driver's license number, digital photograph, signature and physical security features to prevent tampering, counterfeiting or duplication of the document for fraudulent purposes.
The card reader is communicably connected to a controller. The controller is operable to receive the identification card data from the card reader. The controller is operable to store and retrieve data from a memory device. The controller is further operable to store and retrieve the identification card data in the memory device. Preferably, the controller may be operable to store multiple instances of the identification card data within a user identification card database stored within the memory device. Additionally, information about the goods or services that have been requested, such as the location and time and date of the request may be stored with the identification card data in the user identification database so that the identification card data may later be matched to a particular attempted sale or transaction. It will be appreciated that the controller may only store the current or most recent identification card data within the memory device and the invention may then be practiced without the user identification database.
Access to the data stored within the user identification card database may be restricted by the controller, such that only certain data may be retrievable from the memory device or the controller. Access to the data stored within the user identification card database may also be restricted by password or by encryption technology, such that only certain users, such as law enforcement officers, may retrieve the data stored in the user identification card database. The controller and/or the memory device may be configured such that the controller may write data to the memory device, but the controller and/or memory device will only retrieve data from the user identification card database for a user that is verified as an authorized user. For example, at least a portion of the data from the user identification card database may only be retrievable from the security system by a member of a law enforcement agency that enters a password or other verification code into the controller. Thus, the security system 10 may record identification card data with minimal risk of personal information being improperly collected or used by the operator of the security system.
The memory device may additionally contain an identification format database that contains stored acceptable identification data formats. The controller may access the identification format database to compare the format of identification card data read by the controller to the acceptable formats stored within the identification format database. If the controller locates an acceptable format in the identification format database that matches the identification card data read by the controller, then the controller has verified that the identification card data is in a valid format and the controller may store the identification card data 14 to the identification card database. In a preferred embodiment, the identification format database contains the format for all U.S. state issued driver's licenses.
The controller may further verify the identification card data against an external data source, such as an identification database. The controller may be communicably connected to the identification database, such that the controller may not only verify the format, but also the authenticity or accuracy of the identification card data. It will be appreciated that the controller may store the identification card data within the memory and verify the identification card data against the identification format database and/or the identification database simultaneously or in any order.
The controller is further operable to control a locking mechanism. The locking mechanism is operable to restrict access to goods or services. The locking mechanism may be any mechanism that prevents the distribution of goods or services, and may preferably be electrical and/or mechanical. The controller is operable to engage and release the locking mechanism. In a preferred embodiment, the locking mechanism is engaged until the controller commands the locking mechanism to release, allowing a user to use the desired goods or services. The controller issues such a command to release the locking mechanism after receiving identification card data that is verified and stored in any manner described above.
The locking mechanism is operable to allow at least one pump 28 to prevent or allow the release the contents of the at least one pump. In a preferred embodiment, the at least one pump includes at least one gasoline pump. It will be appreciated that the locking mechanism may be operable to prevent or allow access to any type of goods or services contained in any manner or in any type of container. It will further be appreciated that a card reader may be provided for each pump of the at least one pumps, or that a particular pump of the at least one pumps may be selected by a user when the user desires to use one of the at least one pumps.
In one operational embodiment, the locking mechanism is engaged to restrict access to the pumps. When access to the pumps is desired, an identification card, such as a driver's license, should be entered by a prospective user into the card reader. After the controller 16 receives an indication from the card reader that a card has been inserted and read by the card reader, the controller verifies the format of the identification card data read by the card reader after the identification card has been entered into the card reader. If the identification card data is verified by the controller by any verification method described above, the controller commands the locking mechanism to release, allowing the user access to at least one of the pumps. If the identification card data cannot be verified by the controller, the controller does not command the locking mechanism to release, and the locking mechanism continues to prevent access to the pumps.
Once the user is granted access to use one of the at least one pumps, the user must successfully pay for the use of the goods or services provided, i.e. the gasoline pumped from the at least one pump. If the user does not successfully pay for all of the goods or services used, the identification card data or the corresponding data stored in the identification card database may be used by the operator of the security system or by law enforcement officers or others to determine the identity of the user that has unlawfully absconded with the goods or services used. Thus, if a theft of the goods or services occurs, the identification card data of the user that permitted such use can be used to recover the loss of goods or services from the user. Additionally, the security system allows a user to request use of secured goods or services without the necessity of providing a credit card or other payment method prior to beginning the transaction. The security system, via the controller, may also generate an alarm to inform the operator of a non-payment or drive-off by the user as well as mark the identification data for such user in the identification card database and/or identification database. This allows the controller to reject a request for goods if the user comes back to the security system since the controller can determine if the customer has not paid in the past by checking the identification card data against the identification card database and/or identification database.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
Referring now to the drawings, there is illustrated in
The card reader 12 may be operable to read data stored in a variety of media and media technologies, such as magnetic, bar code, optical, and radio-frequency based technologies, including but not limited to transponders, RFID, and Smartcard technologies. In a preferred embodiment, the identification card data 14 is read from a state issued identification card in a known data format that may be read by the card reader 12 when the identification card is inserted into the card reader 12. In a further preferred embodiment, the identification card data 14 is read from a state issued driver's license. The stated issued driver's license may include the person's name, address, date of birth, gender, driver's license number, digital photograph, signature and physical security features to prevent tampering, counterfeiting or duplication of the document for fraudulent purposes. It is important that the identification data
The card reader 12 is communicably connected to a controller 16. The controller 16 is operable to receive the identification card data 14 from the card reader 12. The controller 16 is operable to store and retrieve data from a memory device 18. The controller 16 is further operable to store and retrieve the identification card data 14 in the memory device 18. Preferably, the controller 16 may be operable to store multiple instances of the identification card data 14 within a user identification card database 20 stored within the memory device 18. Additionally, information about the goods or services that have been requested, such as the location and time and date of the request may be stored with the identification card data 14 in the user identification database 20 so that the identification card data 14 may later be matched to a particular attempted sale or transaction. It will be appreciated that the controller 16 may only store the current or most recent identification card data 14 within the memory device 18 and the invention may then be practiced without the user identification database 20.
Access to the data stored within the user identification card database 20 may be restricted by the controller 16, such that only certain data may be retrievable from the memory device 18 or the controller 16. Access to the data stored within the user identification card database 20 may also be restricted by password or by encryption technology, such that only certain users, such as law enforcement officers, may retrieve the data stored in the user identification card database 20. The controller 16 and/or the memory device 18 may be configured such that the controller 16 may write data to the memory device 18, but the controller 16 and/or memory device 18 will only retrieve data from the user identification card database 20 for a user that is verified as an authorized user. For example, at least a portion of the data from the user identification card database 20 may only be retrievable from the security system 10 by a member of a law enforcement agency that enters a password or other verification code into the controller 16. Thus, the security system 10 may record identification card data 14 with minimal risk of personal information being improperly collected or used by the operator of the security system 10.
The memory device 18 may additionally contain an identification format database 22 that contains stored acceptable identification data formats. The controller 16 may access the identification format database 22 to compare the format of identification card data 14 read by the controller 16 to the acceptable formats stored within the identification format database 22. If the controller 16 locates an acceptable format in the identification format database 22 that matches the identification card data 14 read by the controller 16, then the controller 16 has verified that the identification card data 14 is in a valid format and the controller 16 may store the identification card data 14 to the identification card database 20. In a preferred embodiment, the identification format database 22 contains the format for all U.S. state issued driver's licenses.
The controller 16 may further verify the identification card data 14 against an external data source, such as an identification database 24. The controller 16 may be communicably connected to the identification database 24, such that the controller 16 may not only verify the format, but also the authenticity or accuracy of the identification card data 14. It will be appreciated that the controller 16 may store the identification card data 14 within the memory 18 and verify the identification card data 14 against the identification format database 22 and/or the identification database 24 simultaneously or in any order.
The controller 16 is further operable to control a locking mechanism 26. The locking mechanism 26 is operable to restrict access to goods or services. The locking mechanism 26 may be any mechanism that prevents the distribution of goods or services, and may preferably be electrical and/or mechanical. The controller 16 is operable to engage and release the locking mechanism 26. In a preferred embodiment, the locking mechanism 26 is engaged until the controller 16 commands the locking mechanism 26 to release, allowing a user to use the desired goods or services. The controller 16 issues such a command to release the locking mechanism 26 after receiving identification card data 14 that is verified and stored in any manner described above.
The locking mechanism 26 is operable to allow at least one pump 28 to prevent or allow the release the contents of the at least one pump 28. In a preferred embodiment, the at least one pump 28 includes at least one gasoline pump. It will be appreciated that the locking mechanism 26 may be operable to prevent or allow access to any type of goods or services contained in any manner or in any type of container. It will further be appreciated that a card reader 12 may be provided for each pump of the at least one pumps 28, or that a particular pump of the at least one pumps 28 may be selected by a user when the user desires to use one of the at least one pumps 28.
A method of preventing theft of the use of goods or services using the security system 10 will now be described and is illustrated in the flowchart in
Once the user is granted access to use one of the at least one pumps 28, the user must successfully pay for the use of the goods or services provided, i.e. the gasoline pumped from the at least one pump 28 (decision 214). If the user does not successfully pay for all of the goods or services used, the identification card data 14 or the corresponding data stored in the identification card database 20 may be used by the operator of the security system 10 or by law enforcement officers or others to determine the identity of the user that has unlawfully absconded with the goods or services used (step 216). Thus, if a theft of the goods or services occurs, the identification card data 14 of the user that permitted such use can be used to recover the loss of goods or services from the user. Additionally, the security system 10 allows a user to request use of secured goods or services without the necessity of providing a credit card or other payment method prior to beginning the transaction. The security system 10, via the controller 16, may also generate an alarm to inform the operator of a non-payment or drive-off by the user (step 218) as well as mark the identification data for such user in the identification card database 20 and/or identification database 24 (step 220). This allows the controller 16 to reject a request for goods if the user comes back to the security system 10 since the controller 16 can determine if the customer has not paid in the past by checking the identification card data against the identification card database 20 and/or identification database 24.
Another advantage of the present invention is that if the identification card is a state or government issued driver's license, a person that is not authorized to drive a vehicle may not be able to purchase fuel if all dispensing systems are required to read the identification card as a prerequisite to allow fueling. This may prevent or cut down on the number of unauthorized, illegal, unlicensed, or persons having revoked licenses, from driving a vehicle.
The central building 32 need not be centrally located within the fueling environment 30, but rather is the focus of the fueling environment 30, and may house a convenience store 44 and/or a quick serve restaurant 40 therein. Both the convenience store 44 and the quick serve restaurant 40 may include a point of sale 42, 46, respectively. The central building 32 may further house the controller 16, which may be a site controller (SC) 16, which in an exemplary embodiment may be the G-SITE® sold by Gilbarco Inc. of Greensboro, N.C. The site controller 16 may control the authorization of fueling transactions and other conventional activities as is well understood. The site controller 16 may be incorporated into a point of sale, such as point of sale 42, 46, if needed or desired, such that the site controller 16 also acts as a point of sale device. The memory 18, comprising the identification format database 22 and the identification card database 20, may be provided as part of the site controller's memory 18 as illustrated in
Further, the site controller 16 may have an off site communication link 48 allowing communication with a remote location for credit/debit card authorization via a host processing system 25, and the identification database 24, content provision, reporting purposes or the like, as needed or desired. The off site communication link 48 may be routed through the Public Switched Telephone Network (PSTN), the Internet, both, or the like, as needed or desired.
The car wash 36 may have a point of sale 38 associated therewith that communicates with the site controller 16 for inventory and/or sales purposes. The car wash 36 alternatively may be a stand alone unit. Note that the car wash 36, the convenience store 44, and the quick serve restaurant 40 are all optional and need not be present in a given fueling environment.
The fueling islands 34 may have one or more pumps 28 or fuel dispensers 28 positioned thereon. The fuel dispensers 28 may be, for example, the ECLIPSE® or ENCORE® fuel dispenser sold by Gilbarco Inc. of Greensboro, N.C. The fuel dispensers 28 are in electronic communication with the site controller 16 through a LAN, pump communication loop, or other communication channel or line, or the like.
The fueling environment 30 also has one or more underground storage tanks 50 adapted to hold fuel therein. As such, the underground storage tank 50 may be a double-walled tank. Further, each underground storage tank 50 may include a liquid level sensor or other sensor (not shown) positioned therein. The sensors may report to a tank monitor (TM) 52 associated therewith. The tank monitor 52 may communicate with the fuel dispensers 28 (either through the site controller 16 or directly, as needed or desired) to determine amounts of fuel dispensed, and compare fuel dispensed to current levels of fuel within the underground storage tanks 50 to determine if the underground storage tanks 50 are leaking. In a typical installation, the tank monitor 52 is also positioned in the central building 32, and may be proximate the site controller 16.
The tank monitor 52 may communicate with the site controller 16 and further may have an off site communication link 54 for leak detection reporting, inventory reporting, or the like. Much like the off site communication link 48, the off site communication link 54 may be through the PSTN, the Internet, both, other communication line, or the like. If the off site communication link 48 is present, the off site communication link 54 need not be present and vice versa, although both links may be present if needed or desired. As used herein, the tank monitor 52 and the site controller 16 are site communicators to the extent that they allow off site communication and report site data to a remote location.
For further information on how elements of a fueling environment 10 may interact, reference is made to U.S. Pat. No. 5,956,259, which is hereby incorporated by reference in its entirety. Information about fuel dispensers may be found in commonly owned U.S. Pat. Nos. 5,734,851 and 6,052,629, which are hereby incorporated by reference in their entirety. Information about car washes may be found in commonly owned U.S. Patent Application Publication No. 2004/0079799, entitled “Service Station Car Wash,” which is hereby incorporated by reference in its entirety. An exemplary tank monitor 52 is the TLS-350R manufactured and sold by Veeder-Root. For more information about tank monitors 36 and their operation, reference is made to U.S. Pat. Nos. 5,423,457; 5,400,253; 5,319,545; and 4,977,528, which are hereby incorporated by reference in their entireties.
As illustrated in
The fuel delivery line 62 fluidly communicates with a fuel delivery hose 68, which extends outside the dispenser 28 and has a delivery nozzle 70. The delivery nozzle 70 provides manual control of fuel delivery to the vehicle. The delivery nozzle 70 is contained inside a housing that includes a pump handle 71 or other device to detect when the nozzle 70 has been removed an thus a request for refueling is being made by a customer.
The dispenser 10 also includes a control system 100 (also illustrated in more detail in
In one embodiment of the present invention, the dispenser 28 is equipped with the identification card reader 12, a payment card reader 91, a cash acceptor 72, and printer 76. The payment card reader 91 may be any kind of reader, including magnetic stripe, optical, etc., and the payment card reader 91 and identification card reader 12 may be provided as the same reader if the data input mediums accepted for the identification card reader 12 are the same as for the payment card reader 91. The payment card reader 91 is typically for a credit or debit card for payment of fuel.
With these options, the dispenser control system 100 may read data from the magnetic strip of a card inserted into the payment card reader 91 as well as account for cash received from a customer during a transaction. As shown in
The dispenser 28 may include one or more displays, such as a transaction display 86 and a graphics display 88. The transaction display 86 displays the amount of fuel dispensed and the price to be charged to the customer. The graphics display 88 is preferably a liquid crystal display or cathode-ray tube configured to display graphics, video, or a combination thereof, and instructions to the customer for interaction with the dispenser 28. Either of these displays may be associated with one or more keypads, such as soft keys 90 or the hard keypad 84. Either of these keypads may be integrated with the graphics display 88 to provide a touch-activated interface.
The dispenser 28 may also be equipped with a scanner or code reader 74, such as a bar code reader, to receive additional information from a customer. The information may come from a printout received from another location, or a code on an associated card or like medium. The dispenser 28 may also include a biometric reader 78 for reading fingerprints, retinal information, or like biometric indicia to help identify a user and facilitate secure transactions, including identification of the customer for fraud prevention and drive off reporting similar to that of the identification card data discussed above.
The dispenser 28 may also be equipped with an audio system with one or more speakers 92 in order to provide various beeps, tones and audible messages to a customer. These messages may include warnings, instructions, and advertising.
With the above described, several other operational embodiments of the present invention with respect to a service station 30 and fuel dispensers 28 will not be described in the flowcharts in
In the operational embodiment illustrated in the flowcharts of
The process starts (step 600), and the control system 100 waits until an identification card has been inserted into the card reader 12 (decision 602). Once an identification card has been inserted and read by the card reader 12, the identification card data obtained is communicated to the site controller 16, where it determines if the identification card data was properly read and is a correct format by comparing such to the identification format database 22 (decision 604). If not, the site controller 16 communicates to the dispenser control system 100 to cause the control system 100 to display an error message on the display 88 informing the user that the identification card was not successfully read or not an accepted format (step 606), and the process returns to waiting for the user to insert the identification card into the card reader 12 again (decision 602).
If the site controller 16 is able to verify that the identification data was successfully read and is of an acceptable format (decision 604), the site controller 16 determines whether it is configured to also require verification of the identification data before unlocking the pump 28 and allowing dispensing (decision 608). In this manner, the operator of the site controller 16 can configure it such that either verification is required or not. It may be advantageous to not require verification in order to improve efficiency and throughput of the service station 30 in the user being able to dispense fuel more immediately, but with the security that the user's identification data is captured in the event the user does not pay after dispensing properly and/or drive offs.
If the identification data is required to be verified, such as to ensure that the identification data is correct and that the identification data has not been previously associated with a failure to pay and/or drive off as discussed previously above, the site controller 16 either verifies the data using the identification card database 20 and/or the identification database 24 located remotely to determine if the identification data is valid and/or authorized (decision 610). If not, the site controller 16 communicates same to the dispenser control system 100, which in turn displays an error message on the display 88 to the user and does not unlock the pump 28 for dispensing (step 612), and the process returns to wait for an identification card to be inserted into the card reader (602).
However, if the identification data is verified (decision 610), then the site controller 16 will inform the dispenser control system 100 to unlock the locking mechanism 26, which may be flow control valve 63 as illustrated in
If the site controller 16 is not configured to require verification of the identification data (decision 608), then site controller 16 will inform the dispenser control system 100 to unlock the locking mechanism 26, which may be flow control valve 63 as illustrated in
In either case, whether the verification of the identification data as a further step is required or not, if the customer or user does not pay for the fuel dispensed using a post pay function properly (decision 618), the dispenser control system 100 and/or site controller 16 will store the identification data in database 20 as a drive off and/or generate an alarm (step 620). The site controller 16 may also send the identification data over link 48 to the host processing system 25 and/or identification database 24 to report the drive off, send such to law enforcement authorities automatically or with human intervention, and/or store the identification data as a drive off so that future verifications performed on the identification data can be denied, reported, and/or the location of the user tracked (step 622). The site controller 16 may use a variety of methods to determine if a user or customer has properly made a post pay when the identification data is not required to be verified. For example, the site controller 16 could determine if the user or customer has not paid for fuel within a prescribed period of time after the fueling transaction has finished, or after a certain number of fueling transactions have occurred on the same dispenser 28 previously used by the user.
The process starts (step 700), and the dispenser control system 100 waits until the nozzle 70 is either removed and/or the pump handle 71 is lifted by the user or customer signifying a request to dispense fuel (decision 702). Once this occurs, the control system 100 determines if the system, via the site controller 16, is configured for automatic authorization of dispensing regardless of whether a payment card or identification is presented (decision 704). If so, the dispenser control system unlocks the locking mechanism 26 to allow fuel to be dispensed (step 706), and waits until the nozzle 70 is returned back and/or the pump handle 71 returned down to its original position (decision 710). Once returned, the fueling transaction has been terminated, and the system repeats the process (step 702).
If the site controller 16 and/or dispenser 28 are not configured for automatic authorization (decision 704), the dispenser control system 100 determines if a payment card, such as a credit or debit card, has been inserted into the card reader 91 (decision 712). If not, the dispenser control system prompts the user to enter their identification card into the card reader 12 on the display 88 (step 714). Once the identification card is successfully read by the card reader 12 and the format compared against known and acceptable formats by the site controller 16 using identification format database 22 (decision 716), the identification card data is stored in memory in one or more databases 18, 24, 25 (step 718). If the site controller 16 and/or dispenser control system 100 requires the identification card data to be verified (decision 720), the site controller 16 verifies the identification using either the local database 20 or the remote identification database 24 (decision 722), and if not valid or allowed, the dispenser control system 100 displays an error message on the display 88 (step 724).
If valid or allowed, the dispenser control system 100 allows fueling once the nozzle 70 and/or pump handle 71 are lifted (decision 728), by unlocking the locking mechanism (step 726) (similar to step 706 as previously described above), and waiting until the nozzle 70 is returned and/or the pump handle 71 put down (decision 730). Once returned, the user then pays for the fuel using a post payment process. If the site controller 16 determines that the user has not properly paid for the fuel, as described previously, with the prescribed rules or time limit (decision 732), the identification data is stored in database 20 as a drive-off or non-payment user and/or an alarm is generated to alert operators at the service station 30 (step 734). Further, the identification data may be sent over communication link 48 to the host processing system 25 and/or identification database 24 to report such to operators, and/or law enforcement authorities, either automatically or by human intervention, and/or stored so that if the same identification data is read for a subsequent transaction, it can be recorded, denied, and/or the location of the user tracked (step 736).
If in decision 712 the user did insert a payment card, such as a credit or debit card for payment of fuel, the dispenser control system 100 receives the account information from the payment card reader 91 and determines if the card account is authorized via communication with the host processing system 25 (decision 738). If not, the site controller 16 may be configured to still allow the user to dispense fuel and pay after fueling if an identification card is presented or not (decision 740). If not, the dispenser control system 100 will unlock the locking mechanism 26 to allow dispensing by going to step 706, as previously described above. If an identification card data is required in decision 740, since the payment card was not authorized for payment, the process will go to step 214 to read, verify the format, and/or verify the identification card data just as previously described above before fueling can occur.
If in decision 738 the payment card was authorized, the site controller 16 and/or dispenser 28 may still be configured to require reading of an identification card for fueling (decision 742). If so, the process goes to decision 714 to read, verify the format, and/or verify the identification card data just as previously described above before fueling can occur. If not, the process will go ahead and allow fueling by the dispenser control system 100, unlocking the locking mechanism 26 to allow the dispenser 28 to dispense fuel by going to step 706, as previously described above.
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present invention. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
This application claims the benefit and priority to U.S. Provisional Application No. 60/569,681, filed on May 10, 2004, entitled “System and method for a security system for preventing theft of the use of goods and services,” which is incorporated hereby by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
60569681 | May 2004 | US |