Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY DISK CAPABLE OF HOLDING AN IDENTIFICATION CARD THAT CAN BE READ WHEN DISK IS INSERTED IN A CD OR DVD READER
Document Type and Number:
WIPO Patent Application WO/2006/024151
Kind Code:
A1
Abstract:
A compact disk device allowing for the reading of a standard credit card or other identification card for, imagery signature, magnetic data and associated methods for notarizing and accepting signatures and locations, allowing for this information to be sent over the Internet. Consisting of a round disk with a computer storable medium area, a card holder, a battery source, a signature writing area, with imbedded electronics for reading magnetic media, radio frequency data, Global Positioning Data (GPS) data and a computer display device suitable for being read by any existing compact disk reader or writing computer device.

Inventors:
DOYLE BRIAN PETER (CA)
Application Number:
PCT/CA2005/001313
Publication Date:
March 09, 2006
Filing Date:
August 31, 2005
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DOYLE BRIAN PETER (CA)
International Classes:
G11B7/00; G06K17/00; G07F7/12; G11B7/24; (IPC1-7): G11B7/00; G06K17/00; G07F7/12; G11B7/24
Domestic Patent References:
WO2002041236A22002-05-23
WO1994008318A11994-04-14
Foreign References:
US6179209B12001-01-30
US20040030904A12004-02-12
US20020073029A12002-06-13
Download PDF:
Description:
SECURITY DISK CAPABLE OF HOLDING AN IDENTIFICATION CARD THAT CAN BE READ WHEN DISK IS INSERTED IN A CD OR DVD READER

This application claims priority from, and the benefit of, the filing date of United States Patent Application No. 60/606,122 filed 1 September 2004 under title Remote Point of Purchase Security Device. The contents of the above application is hereby incorporated by reference into the MODE(S) FOR CARRYING OUT THE INVENTION herein. TECHNICAL FIELD The invention relates to remote security methods and devices. BACKGROUND ART The Internet has established a new and innovative methodology for the movement of goods and services throughout the world. The inception of broad based use of the Internet is generally thought to be about 1990. The Internet is considered by many to be a technology in its infantile stage. The Internet has also established in these early years many unforeseen difficulties and problems relating to the financial transactions of the sale of a good or service. It is well understood the risks involved with the use and storage of Credit Cards and other such financial tools attached to the Internet. Many companies have developed new transaction models, specifically for the Internet and have spent great deal of time and money explaining and proving their technologies ability to protect the validation of the financial or identification transactions. These new technologies are often primitive in comparison to existing financial transaction security features and often require massive changes in existing company's infrastructure and work process and procedures. The implementation of new technologies is expensive and quite often, unable to be tested to a certainty, as by definition, the experience with the new technology and the Internet, is not great. Alternatively, credit and debit cards, have many features, patented or not with many trade secrets, already in place, in conjunction with many years of use, allowing the companies who have developed these technologies a full and complete understanding of the in field performance of these devices. In this these companies have the ability to determine the risk factors, theft and abuse incidents, to a scientific certainty. The new technologies designed for financial transactions on the internet, fall short of the standards set by credit card companies and other security card. More importantly, with such little experience in comparison to existing financial security features, the trial and error in the field, where failure can become very costly, is now the norm. On any given day, the news media is reporting on some theft of credit card information and or scheme allowing a fraudulent perpetrator to steal millions of dollars from unsuspecting companies and individuals. * Over the years Credit and debit card, along with other card security companies have created a simple and unique method of securing financial transactions by telephone or wire type medium. The key elements in these protection methods are the user account number; their signature and a magnetic strip which allows for certain key data to be encoded on the card for security reasons. As most people are aware, the first from of security is a terminal used to swipe the card for security features and confirmation of card number and account holder. This terminal has a physical location and agreement with the retailer for its specific use allowing the credit card company to verify the physical location of the transaction. The retailer of the product is then able to create the second form of security, the creation of a credit card receipt which amounts to an agreement to pay by the purchaser. The third level of the security feature is the verification by the retailer by review of the back of the card signature matching that of the signed agreement or receipt. The culmination of signature, visual inspection of signature, magnetic data, and receipt copy combine to achieve a legal infrastructure to protect the purchaser, retailer and issuer of the card. On the Internet, creation of a safe and secure transaction mechanism meeting the existing • standards has been determined to be the key component missing from the expanding the use of the Internet for commercial purposes. Many technologies have been developed which scan a signature, equally these technologies have encryption methods for transferring of the signature and card information. A receipt can be assembled and hand scanned in to a computer with equal success. The problem with these technologies is that they are not capable of assuring to the Credit Companies that the individual who is requesting the transaction is the same individual who is the owner of the account. Many methods have been created to assemble the information, transfer it to a Credit Card company, have the good or service rendered only for the retailer and credit card service supplier at a later date, determines the individual, in fact, had falsified the information and was not the owner of the card and account.

This level of deceit is costing millions of dollars in losses, and scaring away potential users of the Internet out of fear of their information being used, without their knowledge, resulting in financial losses and identity theft. Credit Card companies, to their detriment, have allowed transactions to take place, where the only know information is the card number. This allows hackers to gain access to large data bases of credit card numbers allowing rampant abuse of this financial transaction method. The Credit Card companies have relinquished some of their control based on their need to be part of the new economy. It also must be noted that this level of fraudulent activity is on the increase, and even more difficulty, very hard to trace, complicated by the intrinsic nature of the Internet itself. The biggest advantage of the Internet is that if one portion of the system fails, another portion can take over in a seamless fashion. This means that the sender of data can be anywhere in the world, and can be in contact with anybody else on the planet. Unfortunately, one of the key benefits and problems of this is that this prevents anyone from knowing where they sender is located. This, of course, is a serious threat to the use of the Internet for financial transactions. Not only can you not verify the individual, to a legal certainty, you cannot even determine the legal jurisdiction he or she may be physically located. This also removes the first level of protection existent in the old technology, location of transmitting terminal. It is obvious to many that the verification of signature of the card is also key to the success of the existing system. Not only does the retailer do a visual inspection, but the signed receipt copy provides a lasting guarantee of authenticity of the transaction. Current Internet transactions do not have any method of verifying the signature on the back of the card as that of the purchaser. This second level of security, available and common on the old technology, is therefore of no use as a protection level when using the Internet for commercial purposes. Many credit card companies embed technology into the magnetic strip, commonly swiped at the time of a transaction as an additional layer of protection. It is clear and understood that this method of protection is not used at all when an Internet transaction takes place. In light of these facts and considerations the standards of security achieved on the Internet to manage financial transactions are costly and ineffective and place the Credit card company, the purchaser and the retailer at some financial and identity risk each and every time a transaction takes place. The basic achieved standards for security protection of a wired non Internet based transaction have yet to be achieved by the Internet. Improvements to, or alternatives for, existing security devices are desirable. DISCLOSURE OF THE INVENTION In a first aspect the invention provides a security device including a disk physically compatible with a CD or DVD reader, and a card holder on the disk such that the card can be read by the CD or DVD reader when the card is in the holder and the disk is in the CD or DVD reader. The disk may have software programs that are readable by the CD or DVD reader, and that are executable on a computer to allow the computer to reconstruct the image of a card face read by the card reader from a card and read from the disk by the CD or DVD reader. The disk may have a signature pad that allows a human signature to be scanned from it by an optical processing unit of the CD or DVD reader. The disk may have software programs that are readable by the CD or DVD reader, and that are executable on a computer to allow the computer to reconstruct the image of a signature read by the CD or DVD reader from the card when in the disk holder. The card holder may be compatible with cards having the physical layout of a credit card. -The card may be selected from a credit card, health card, identification card, business card, club card, association card and other like card. The disk may have software programs readable by the CD or DVD reader, and and that are executable on a computer to allow the computer to reconstruct the image of a card face or human signature read by the CD or DVD reader. The device may include a signature capture system allowing a handwritten signature to be converted to electronic means. The device may include a radio frequency receiver and transmitter for communicating to a computer by means of radio frequency. The device may include Light Emitting Diodes (LEDs) that can be read by the CD or DVD reader. The disk may include an electronic chip for storage, communication and execution of computer programs. The electronic chip may be read externally from the device. The card reader may include a magnetic strip reader. The disk may include an embedded Global Positioning System. The disk may include an embedded battery power source. The disk may include an embedded antenna. The disk may include a dynamic balancing system. The disk may include a static balancing system. The disk may be configurable such that it can be folded or rotated to change shape when not inserted into a CD or DVD reader. The disk may be capable of automatically communicating over a communications network with other computers. The disk may include encrypted information allowing the device to be associated with a specific card. The disk may include a signature verification program to confirm the authenticity of the signature written on the pad. The device may utilize current computer technology, current credit and debit cards and associated security to allow Internet financial transactions to be as secure and problem free as existing non-Internet transactions. The device may be a compact disk with an area of the medium to hold computer instructions for security, controlling the compact disk reader laser, instructions for display information on the computer screen, communication with Internet and the credit card company. This area may be embedded with security features allowing only the card holder to use their own issued disk reader. This area may also have a writeable area for updating of such instruction, storing of all confirmation of transaction and embedding of security codes arbitrarily loaded to check usage of the financial card. The device may have a card holder to the disk in which a Credit or debit card may be placed on the disk reader card area. This area may hold the card in place while the disk is spinning. This area may be cut out to allow the laser to "see" all the information on the credit/debit card directly. The card holder may also allow the mass balance of the disk reader to be maintained thereby not straining the mechanism of the compact disk reader. The card holder may be usable by any card, such as a diver's license with a photograph to assure the users identity for legal purposes. Another area of interest is a signature area on the disk. This can allow an individual to approve the purchase. This can be clear plastic, written on by any pen. This may be readable read by the laser in the compact disk reader or it may be a write once, read once technology, such as a magnetic medium which when signed would hold this signature until a computer instruction allows it to be removed. This may be done simply by de-powering the magnetic area. There may be a GPS receiver area on the security disk, embedded into the innovation disk. This technology may be existing technology inserted onto the disk; however, purpose designed and built electronic circuitry, embedded into the plastic is preferable. The receiver may be connected to an area where electronic signals are converted into LED output, easily read by the compact disk reader. There may be electronic to light conversion technology. This technology may allow for data which changes on an on-going basis, such as the GPS co-ordinate signal, RF data or the like to be converted into a light source readable by the compact disk. This may allow the security disk design to be interactive with the computer without any new hardware or adjustments to the existing hardware. This technology would be a new form of input to computers not yet in existence. The security disk device may have the inclusion of RF receivers or other such devices used by credit card companies for the purpose of ease of use and protection. This may allow the security disk design to remain current at all times with the changing needs of the credit card companies. Due to the innovation in the communicating with the computer, as outlined above, this area could be changeable on an on-going basis. It can also be noted that this security disk design may be as light as an existing compact disk, and may be balanced for rotational purposes as a compact disk and thus would provide no physical impediment to the existing compact disk reader. Other than some computer instructions changes when initially placed in the CD or DVD reader, no changes or modifications, alterations of physical adjustments are required. This allows the security device to be inexpensive and easy to mass produce and deliver with the minimum instruction to the user. The various features of novelty which characterize the invention are pointed out more particularly in the claims annexed to and forming part of this disclosure. Other aspects of the invention will be evident from the detailed description, drawings and claims herein. BRIEF DESCRIPTION OF THE DRAWINGS For a better understanding of the present invention and to show more clearly how it may be carried into effect, reference will now be made, by way of example, to the accompanying drawings that show the preferred embodiment of the present invention and in which: FIG. 1 is a top illustration in schematic form of a disk device in accordance with a preferred embodiment of the present invention, with a standard credit card in place and a signature of an individual purchaser across the bottom. FIG. 2 is a schematic bottom view of the disk device of FIG. 1 with the standard credit card in place, showing the location of lightening holes, battery location, electronic location circuitry traces to accept RF data and Global positioning data, and communication LEDs for laser reading. FIG. 3 is a schematic top view of the disk device of FIG. 1. FIG. 4 is a schematic in the section view through a centre line of the disk device of FIG. 1. FIG. 5 is a block diagram of the disk of FIG. 1. FIG. 6 is a perspective view of a disk device in accordance with an alternate embodiment of the present invention. FIG. 7 is a top illustration in schematic form of the disk device of FIG. 6. FIG. 8 is a schematic in the section view through a centre line of the disk device of FIG. 6. MODE(S) FOR CARRYING OUT THE INVENTION Referring to the FIGS., a security device utilizes current computer technology, to work with current credit and debit cards and associated security to allow Internet financial transactions to be as secure and problem free as existing non-Internet transactions technology. This provides a compact disk with an area of the medium to hold computer instructions for security, controlling the compact disk reader laser, instructions for display information on the computer screen, communication with Internet and the credit card company. This area is embedded with security features allowing only the card holder to use their own issued disk reader. This area also has a writeable area for updating of such instruction, storing of all confirmation of transaction and embedding of security codes arbitrarily loaded to check usage of the financial card. There is a card holder embedded to the disk. The credit or debit card is placed on the disk reader card area. This area holds the card in place while the disk is spinning. This area is cut out to allow the laser to "see" all the information on the credit/debit card directly. The mass balance of the disk reader is maintained not to strain the mechanism of the compact disk reader. This card reader can be used by any card, such as a driver's license with a photograph to assure the users identity for legal purposes. There is a signature area on the security disk. This allows an individual to approve the purchase. This can be clear plastic, written on by any pen. This is then read by the laser in the compact disk reader; however, this is not preferable. The better solution is a write once, read once technology, such as a magnetic medium which when signed would hold this signature until a computer instruction allows it to be removed. This is done simply by de-powering the magnetic area. There is a GPS receiver area on the security disk, embedded into the disk. This technology can be existing technology inserted onto the disk; however, purpose designed and built electronic circuitry, embedded into the plastic is preferable. The receiver is connected to the area below where electronic signals are converted into LED output, easily read by the compact disk reader. There is an electronic to light conversion technology area. This technology allows for data which changes on an on-going basis, such as the GPS co-ordinate signal, RF data or the like to be converted into a light source readable by the compact disk. This allows the security disk design to be interactive with the computer without any new hardware or adjustments to the existing hardware. This technology provides a new form of input to computers not yet in existence. The disk can include RF receivers or other such devices used by credit card companies for the purpose of ease of use and protection. This allows the security disk design to remain current at all times with the changing needs of the credit card companies. Due to ongoing innovation in communicating with the computer, as outlined above, this area could be changeable on an on-going basis. It can also be noted that this security disk design, can be as light as an existing compact disk, and would be balanced for rotational purposes as a compact disk and thus would provide no physical impediment to the existing compact disk reader. Other than some computer instructions changes when initially placed in the CD or DVD reader, no changes or modifications, alterations of physical adjustments are required. This allows the security device to be inexpensive and easy to mass produce and deliver with the minimum instruction to the user. The various features of novelty which characterize the invention are pointed out more particularly in the claims annexed to and forming part of this disclosure. This disk device utilizes all the security features currently available in credit cards, to obtain a legal certainty, and adds to those features additional mechanisms allowing for location and signature verification in addition to new and novel additional security features. This disk device also takes advantage of the millions and millions of computers on-line to the Internet to allow use of their current compact disk readers without physical alteration of modification. The ability to turn any computer, any where in the world, including while, driving, flying, sailing or merely moving, converting a computer into a known point of purchase, with the ability to use all existing financial transactions, security features, will change the acceptance and use of the Internet, into a common commercial tool used by one and all. This technology concept is also applicable to re-issue of documentation, for instance, a birth certificate, as the original document would be scanned, the individual's signature, photo and document number would be transferred in a fashion very similar to handing over the documents at a government office. This is a multi-function disk device that allows for the reading of any card or magnetic media, picture, signature, account number, expiry date, location (of the device) and also provides a new and higher level of authenticity, by matching the card data to an embedded coding on the disk device. The purchaser may take his or her existing credit card, placed into the receptacle of the compact disk, sign the disk in the allocated signature area, place the disk in the compact disk reader and press the mouse of the computer on the appropriate Icon to read the card, the signature of the back of the card, the magnetic data, the signature on the disk, and the physical location of the disk, all at the same time. This data can then be encrypted and sent over the Internet to the credit card company allowing the transaction to be completed with a certainty, equal to that of the traditional and standard process currently used by existing retailers. Importantly this disk is inexpensive to make and sell. Based on existing Compact disk technology the disk reader has a section for downloading, to the computer, computer instructions for the user interface software, the control of the Compact disk reader and the instructions to talk to the operating system. Therefore, the user need only insert the disk into any computer, where the computer instructions would set up the computer for the task, inform the credit card company of the location of the transactions, confirm authenticity and verify use, all virtually instantaneously, and without intervention from the purchaser. The disk reader also has the write ability to allow the computer to record a copy of the transaction including the time, date, location, price and product and other such information useful to either the purchaser of the credit card company. An example of this is when the transaction is complete, a verification file is sent by both the retailer and the credit card company back to the purchaser's computer where this file is copied to the disk reader. At the end of each month the disk reader under instruction brings the verified transactions in the form of a monthly statement eliminating many unnecessary paper transactions. Under computer instructions this encrypted and encoded segment of the disk is updated and modified by the credit card company upon every transaction. It is also understood that each disk only functions with the card(s) of that individual. It is programmed to allow access only when the signature verification on the card is complete. This process removes the uncertainty of the inability to the retailer to verify the purchaser's signature as that on the back of the card. Once again all the experience and safety features which are in conventional transactions now available to be used by the Internet purchaser and supplier of Credit. Equally important is the need to know the location of the purchaser when the purchase is requested. This geophysical location is important to the protection of the purchase process as many Credit Card companies run many programs comparing the purchase profile of the user to help determine the validity of the purchase locations. An example of this, of course, is that if a purchase is located in Toronto, Canada, at 11 :00 am local time and a minute later another purchase is attempted in Moscow, Russia, the Credit Card company is fairly certain there is something wrong. Embedded in the disk reader there is a miniature GPS receiver, which only needs to convert the location of the disk into a format suitable to pass to the Credit Card company or other institution, thus assuring yet another piece of the security puzzle is determined to the existing standards. The disk reader has a chip set embedded and communicates to the computer via series of emitting diodes, or such technology which is read by the compact disk drive of the computer. As the location of the-reader changes, the Global Positioning Receiver lights up the LEDs to allow the scanner to determine the computer location and thus the location of the transaction. Once again this puts in place the same level of protection seen the old technology with the use of a wire terminal. This technology of course, is even more important as the use of wireless network access systems takes place and in particular if a legal disagreement arises as the result of the transaction. One of the elements of existing security is the purchaser's signature on the back of the card and a signature on a transaction paper. The signing of the signature area on the disk reader with, for example, a special magnetic pen will allow for a write once, read once and remove permanently process similar to that of signing a copyable receipt. The signature area is powered by a small battery allowing the signature area to retain a signature until such time as a computer instructions is received resulting in the destruction of the signature. This means that each image of the signature is unique to the purchase event as every individual signs their name slightly different each time. This eliminates the possibility of re-suing the same signature over and over again. An example of this would prevent an individual's disk device card and signature from being taken and reused without their permission. The signature area has to be signed each and every time the device is to be used or the transaction could not be completed.

The signature area can use any number of existing on/off medium technologies to achieve this. Of course the legal implications of this are profound as for the first time a signature is verifiable to legal certainty when used on the Internet.

It is important to understand that many new card features are being created, an example of this is a radio frequency card used to transmit data directly to a terminal. A receiver and translator on the disk device serve this new innovation as well. This disk device receives and translates the data from the card to be included in the transaction process. Using the same or similar LED or the like method of communication through the compact disk reader the data embedded in the RF signal. In this disk device, incorporating the features, no new infrastructure change is required by the Vendor, Purchaser or credit card company, resulting in a new technology leveraging all the existing old financial experience, technology and security features while utilizing the very best features of the Internet. It provides and promotes ease of use, accessibility and security, un¬ paralleled by any existing technology. This disk device multiples the number of existing computers, now in excess of 500 million active world wide, by the number of sellers of goods and services around the world turning each computer into a point of purchase anywhere on the planet and doing so in a secure and safe fashion. It is to be understood that, although the disk device has been described with numerous integrated security features, a limited feature set could be used in any particular disk device. For example, a disk device may utilize a card reader and signature verification, but not a GPS. Alternatively, there may be a card reader with GPS locating and no signature verification. Other such embodiments based upon the principles described herein will be evident to those skilled in the art. Although this may not provide all of the benefits of the totally integrated disk device described herein, it provides some of the benefits and falls within the claims that follow this description. Referencing first to FIG 1 it can be seen that the physical device, 10, has a computer instruction stored data area, 20, readable by any CD or DVD player and other physical features including methods for holding of the card, 12, an area to contain an antenna 24, for the purposes of accommodating an embedded GPS system. It can clearly be seen in FIG 1. The signature captures area 18, for the purposes of authorization of any type of financial transaction. Below the signature capture area, and not necessarily required to be located as such is the communications system, 16, to transfer information via the CD or DVD's optical processing unit. This is how the device looks in use with a card prior to inserting into any computer compact disk reader. In FIG 2 the back side of the physical device is shown including the computer instruction storage area using standard CD storage technology. At the center of the device is a hole, 32, suitable for the use of any CD of DVD clamping mechanism. Also illustrated here is the on board battery system, 26 for the purpose of powering the on-board electronics. An example of this is shown through the magnetic strip reader as drawn in 14 and a area clear of structure to allow the CD or DVD reader's optical processing unit to see the back of the card, 28, being held by the holder 12. In FIG 3 it can be seen to better understand the disk device, a sectional view showing the embodiment of the disk as not being manufactured in a single plane. In both FIG 3 and FIG 4 the on-board computer chip (central processing unit CPU), 30, can be clearly seen. The signature capture area 18 is illustrated on the face of the physical device on the same side as the card holder 12, although this may not necessarily be the case. The communications system to transfer information to the CD or DVD 16 shows the preferred method, LEDs situated on the top surface, although once again, it is not necessarily a requirement to do so. In FIG 5, a schematic of the electronic layout for the device is illustrated. On the physical device is included, a stored data area, 20, a magnetic strip reader, 14, an on-board Global Positioning System 22, with an antenna area, 24, battery system for powering the electronics, 26, and the communications to the CD or DVD optical processing unit shown as LEDs, 16. As previously mentioned, there is no need for the physical device to be round in general shape, as illustrated in 10, nor of a single plane as seen in cross section 4-4. FIG 6 shows the physical device in a configuration which is square, in general shape, however is still contains the features of FIG 1, FIG 2, FIG 3, FIG 4, and FIG 5. In FIG 6, is can be seen the cut out area, allowing the optical processing unit of the CD or DVD reader to scan the back of the card, 28. A GPS antenna is embedded in area 24, with GPS processing unit shown in area 22. The center hole for clamping the device in a CD or DVD reader is shown, 32, with a rotational element, 42 for the purposes of closing or sliding the two halves of the device together. The on-board CPU is illustrated as 30, with the communications system 16 shown on bother sides of the device. The signature capture area is illustrated as 18 with the power for the on-board electronics system, the battery system 26. The magnetic card reader 14 is show at the top of the device. The dynamic balancing system is shown, in this case, at the center of the device at 44. In FIG 7 and FIG 8 a plan and section view of the device can be seen, in the non-round and foldable configuration. The hinge line or folding line can be seen in 46. Section 8-8 once again illustrates the device as not requiring to be in a single plane. The relative positioning of the embedded components are shown on the top side of the device, although this is not necessary. The batteries, 26, could in fact be, like the signature capture area, on the opposite side, as illustrated. Likewise the magnetic strip reader 14, and the antenna, 24 could be located on the sides or opposite face to as illustrated. It will be understood by those skilled in the art that this description is made with reference to the preferred embodiment and that it is possible to make other embodiments employing the principles of the invention which fall within its spirit and scope as defined by the following claims.