The present invention relates generally to card reader systems, and more specifically to systems and methods for detecting and preventing tampering of card readers.
Card readers for facilitating various transactions have become central features of modern life and are prevalent in a number of environments. For example, during the course of a day, a user may use a card reader to conduct financial transactions at an automated teller machine, purchase gas from a point of sale terminal in the form of a fuel pump using a credit or debit card, and purchase food at the grocery store using a point of sale terminal also with a credit or debit card. In all of these instances, security is a prime concern, and an individual's data (card number, passwords, account numbers, etc.) should be kept secure and away from unintended parties. Efforts to obtain the financial information of others through tampering at these various sites employing card readers have become prevalent. As such, there is a need to counter and minimize the ability of unauthorized parties to obtain confidential information by tampering with card readers.
Aspects of the invention relate to systems and methods for detecting and preventing tampering of card readers. In one embodiment, the invention relates to a secure card reader for detecting and preventing tampering, the secure card reader comprising a reading head configured to extract recorded data from a data card, a processing circuitry coupled to the reading head, at least one printed circuit board comprising an inner surface and an outer surface, wherein the inner surface is closer to the processing circuitry than the outer surface, at least one secure trace coupled to the processing circuitry, and a security mesh coupled to the processing circuitry, wherein the security mesh is disposed between the secure trace and the outer surface, and a housing, wherein the housing and the at least one printed circuit board form a compartment substantially enclosing the processing circuitry.
In another embodiment, the invention relates to a secure card reader for detecting and preventing tampering, the secure card reader comprising a reading head configured to extract recorded data from a data card, a processing circuitry coupled to the reading head, a first printed circuit board and a second printed circuit board, each comprising an inner surface and an outer surface, wherein the inner surface is closer to the processing circuitry than the outer surface, at least one secure trace coupled to the processing circuitry, and a security mesh coupled to the processing circuitry, wherein the security mesh is disposed between the secure trace and the outer surface, and a housing, wherein the housing and the first printed circuit board and the second printed circuit board form a compartment substantially enclosing the processing circuitry.
Referring now to the drawings, embodiments of secure card readers employing various security features to detect and prevent tampering are illustrated. The secure card readers include processing circuitry protected by at least one printed circuit board and a housing and coupled to a card reader. The printed circuit board includes a security mesh on or near an outer surface thereof and at least one secure trace, where the security mesh is positioned between the outer surface and the secure trace. Together the printed circuit board and housing form a compartment that substantially encloses the processing circuitry.
In some embodiments, the secure card readers include first and second printed circuit boards positioned to be parallel to one another and to protect the processing circuitry in conjunction with the housing. Additional tamper detection components can be installed at various locations along the secure card reader. The components can include a push button sensor, a zebra connector, a microswitch, or other suitable tamper detection component. If any of the tamper detection components, including the security mesh, reports information indicative of tampering, the processing circuitry can take appropriate measures to protect itself. These measures can include erasing memory, rending itself inoperable, and other appropriate protective measures.
In one embodiment, the card reader 104 is a magstripe reader configured to extract information from the magnetic medium of the data card. As such, the information read from the magstripe data card can include a payment account number (PAN), other information commonly stored on track 1 or track 2 of a magstripe payment card, and a magnetic fingerprint indicative of an intrinsic magnetic characteristic of the magnetic medium of the magstripe card. Techniques for extracting and comparing magnetic fingerprints are described in U.S. Pat. Nos. 6,098,881, 7,478,751, 7,210,627, and 7,377,433 and U.S. patent application Ser. Nos. 11/949,722, and 12/011,301, the entire content of each document is hereby incorporated by reference. In another embodiment, the card reader 104 is a smart card reader, or a contact block for establishing electrical contact with a smart card where the processing circuitry 102 includes an ability to extract information from the smart card via the contact block. In some embodiments, the secure card reader system 100 includes both a magstripe reader and a smart card reader.
In several embodiments, the I/O pin block 106 provides a physical communication interface through which a number of signals indicative of the information extracted from one or more data cards can be communicated. In many embodiments, the extracted data card information is encrypted using one or more encryption keys for obfuscating confidential card holder or transaction information. In several embodiments, the microswitch 108 is positioned along a housing or a printed circuit board associated with the card reader system 100 and can detect removal of, or tampering with, a system component such as a housing or a PCB (e.g., unauthorized removal of the system component). In several embodiments, the zebra connector 110 is a multi-contact elastomeric connector having alternating conductive and insulating materials where the electrical connections to the conductive materials/contacts can be sustained through continued application of pressure and/or contact by a mating connector or PCB.
The one or more push button sensors 112 can be positioned at various locations along the card reader system 100 for detecting tampering. One or more of the components in the card reader system 100 are mounted on or routed through a PCB. In order to protect the components from potential tampering, the PCB security mesh 114 can be located at or near an outside surface of the PCB (e.g., outer surface of the card reader system 100). The security mesh 114, possibly in conjunction with the processing circuitry 102, can detect when someone attempts to tamper with components on the inside surface of the PCB by for example, drilling through, or cutting away a portion of, the PCB. In theory, the security mesh 114 can detect any attempted penetration of the PCB by covering much or all of the surface area of the PCB. The secure traces 116 are positioned on the inside surface of the PCB (e.g., surface facing components on the inside of the reader) or on a layer internal to the PCB. In such case, the secure mesh 114 is positioned between the outside surface of the PCB and the secure traces 116 or on the outside surface. In this way, the security mesh 114 can help prevent an attacker from gaining access to the secure traces 116 or other components located on the inside surface of the PCB. In a number of embodiments, many of the component to component electrical connections in the secure card reader 100 can be implemented using the secure traces 116.
In several embodiments, the processing circuitry 102 is implemented using one or more processing components that share information (e.g., processors, microprocessors, and/or various programmable logic devices). For example, the processing circuitry 102 can include one or more secure processors that are configured to react to suspected/detected tampering by erasing preselected information from memory and/or rendering themselves partially or completely inoperable. In one embodiment, for example, the secure processor can erase encryption keys or other information that might be considered confidential or sensitive. In some embodiments, the system 100 can include one or more volatile or non-volatile memory components that store information accessible to the processing circuitry and/or other components.
In one embodiment, the processor circuitry 102 responds to a breach or attempted breach by communicating the breach or attempted breach to devices connected to the magnetic read head. In one embodiment, the processor disables itself. In another embodiment, the processor erases all of its executable code stored in memory or elsewhere. In yet another embodiment, the processor reduces itself to a pseudo functional state where the only function the processor performs is reporting the breach or attempted breach. In such case, the processor can also report the type or method of the breach or attempted breach. In one embodiment of the pseudo functional state, only the executable code required to function in the pseudo functional state is preserved while all other information is erased.
In the embodiment illustrated in
A data card 307 is shown positioned in a card path of the reader 300. In some embodiments, the data card can be a magstripe card capable of storing information on a magnetic medium. In some embodiments, the data card can be a smartcard capable of storing information on one or more chips embedded within the data card. In such case, the information may be read by contacting a number of conductive terminals on the card using the appropriate protocols for accessing such stored information, as is known in the art. In a number of embodiments, the rear compartment 303 can contain a smart card reader. A I/O pin block 306 is mounted on the left PCB 312 and can be used to communicate with the secure card reader system 300.
In several embodiments, a schematic block diagram of the components of the secure fuel pump insertion card reader 300 is roughly equivalent to the schematic block diagram of
In the embodiment illustrated in
In a number of embodiments, additional components may be mounted to the inside surface of the left PCB 312 and/or on the inside surface of the transverse PCB 316. In some embodiments, the processor 302 can be located on another PCB such as the transverse PCB 316 or the right PCB 314 (not visible in
A microswitch 308 and one or more secure traces 314b are positioned on an inside surface of the right PCB 314 facing the left PCB 312 and coupled to a processor 302 (not visible in
In one embodiment, the security mesh 312a is a flexible grid capable of detecting puncture or other tampering. In several embodiments, the security mesh 312a is implemented as a matrix of conductive traces (e.g., copper). In another embodiment, the security mesh 312a is implemented as a matrix of conductive ink traces, such as with the Tamper Respondent Surface Enclosure of W.L. Gore and Associates of Elkton, Md.
In some embodiments, flexible circuits are used to connect various components with the card reader 300. For example, in one embodiment, a flexible circuit is used to couple the pad layout 310a of the zebra connector 310 with a smart card contact block 205. In several such embodiments, the flexible circuits can include a security mesh for detecting tampering. In one embodiment, the security mesh for the flexible circuits can be a matrix of flexible conductive traces (e.g., copper).
In the event that an attacker tampers with the security mesh 312a, the security mesh can send a signal to the processor 302 indicating the breach. In this case, tampering can include the puncture, tearing or other attempted breach of the mesh 312a. In one embodiment, the security mesh 312a can detect heat, electricity or other forms of tampering. The processor 302 can respond by initiating a destruction sequence that includes erasing encryption keys, memory and any other appropriate information. In such case, the processor 302 can also disable the encryption and/or magnetic sensor systems.
The zebra connector 310 can provide connectivity for one or more signals routed through the card slot housing 309, such as, for example, one or more signals passed from the smart card contact block (not visible in
In one embodiment, the housing 305 is made of one or more suitable polymer materials. In one embodiment, the left PCB 312, the right PCB 314, and the transverse PCB 316 are made of suitable PCB materials known in the art. In one embodiment, the microswitch 308 is a KSR223GNCLFG microswitch provided by C&K Components of Newton, Mass. or a CL-DA-1CB4-A2T microswitch provided by Copal Electronics of Torrance, Calif. In one embodiment, the zebra connector 310 is a 5002-08.170.475 connector provided by Fujipoly America of Carteret, N.J. In one embodiment, the board to board interconnects (313, 313-2) are MMT-106-01-L-DH-K-TR and SMM-106-02-L-D-K-TR interconnects provided by Samtec USA of New Albany, Ind. In one embodiment, the push button switches (312c, 314c, 316c) are SK 3024010154011260 switches provided by Abatek (Americas), Inc. of Duluth, Ga. In one embodiment, the processor 302 is a IC0400C778BF+ provided by Maxim of Sunnyvale, Calif.
While the above description contains many specific embodiments of the invention, these should not be construed as limitations on the scope of the invention, but rather as examples of specific embodiments thereof. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
The present application claims priority to and the benefit of Provisional Application No. 61/565,853, filed Dec. 1, 2011, entitled, “SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TAMPERING OF CARD READERS”, the entire content of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61565853 | Dec 2011 | US |