CA2420800A1 - Biometric identification and security system associated with cash register - Google Patents
Biometric identification and security system associated with cash register Download PDFInfo
- Publication number
- CA2420800A1 CA2420800A1 CA002420800A CA2420800A CA2420800A1 CA 2420800 A1 CA2420800 A1 CA 2420800A1 CA 002420800 A CA002420800 A CA 002420800A CA 2420800 A CA2420800 A CA 2420800A CA 2420800 A1 CA2420800 A1 CA 2420800A1
- Authority
- CA
- Canada
- Prior art keywords
- cash register
- check out
- out station
- station system
- cash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/02—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
Abstract
A wholesale and/or retail check out station system includes a biometric finger print reader and storage for reading and storing biometric data of employees having access to the cash registers of the check out stations in the system. Authorization to use a cash register in the system is programmed into the microprocessor in the system, limiting use of a cash register to authorized employees. Employees are identified by linger print using biometric technology. Limitations of use is extended to access to operate particular cash register(s); handling returned merchandise at a cash register; refunds on returned purchases require authorization of the manager and the cashier; cashing checks at a cash register, where the limitation includes only cashing of employer drawn payroll checks of employees; and, clearing errors made in tabulations ai a cash register. Unauthorized persons attempting to gain access to cash registers to which they are not authorized serves to activate an alarm.
Description
BIOMETRIC IDENTIFICATION AND SECURITY
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to security and access control systems and apparatus for check out stations and cash registers used in commerce at the wholesale and retail level.
Prior Art The check out stations which include cash registers of wholesale and retail commercial establishments that are open, to essentially, the public are multi-function stations. The cash register normally included as a part of the check out station is often a complex, mufti-function, intelligent machine. The machine is basically a cash register with an alphanumeric key board through which data is entered into the machine. Transactions are calculated and displayed to both the operator and the customer. The machine handles multiple transactions. The type of transaction could be a wholesale or a retail sale, for example. Taxes on the sale are accordingly calculated. The transaction could be a cash, a check, a credit card, a debit card or a line of credit sale, for example, either wholesale or retail.
The transaction could be a sale or a return of merchandise purchased for cash return or credit return or exchange of merchandise in kind or some other kind. These and other commercial transactions are handled at mufti-function commercial check out stations along with inventory update and record keeping and check cashing. An example of a currently manufactured electronic, mufti-function cash register is the ROYAL model 9170 Cash Management System available from Staples, Inc. of Framingham. Massachusetts. This mufti-function cash register does automatic tax computation, prints out written receipt identifying the purchase made and price charged, has a dual alphanumeric display with programmable store logo, maintains a two-station alphanumeric journal and has a locking cash draw.
Whether the commercial establishment has a mufti-station check out system or a single station check out system, most check out stations have a locking feature which effectively limits access to the mufti-functions of the check out stations. The locking feature may be over come by use of the proper key inserted into a lock tumbler in the cash register or may be a code or pin number punched into a key board. But the problem of these key devices is security. Keys, pin numbers, pass words or other codes may be readily stolen and used by unauthorized persons.
Further, because the check out station has a great plurality of functions, some of the functions of the system may be unauthorized to certain persons, who have authorized, but limited use of the mufti-function machine, use limited to certain specific functions of the machine. Some persons may not have the training or ability to use all the functions of a mufti-function machine. On the other hand, some persons may intentionally use unauthorized functions of the machine for dishonest purposes. Other persons may have full authorized use of the machine.
The United States Patent #5,615,277; issued to Hoffinan. teaches a tokenless security system and method for authorizing access to a computer system.
Personal identification, using unique biometric sample comparison, integrated into a computer security system is taught.-Comparison provides authentication of an individual entitled to access to the computer system. A second coded input by the authorized person indicates whether the act of access is voluntary on the part of the authorized person or if the authorized person is being forced by another person to request access. In the case of voluntary access, unlimited access to the computer is provided. In the case of coerced access, limited access to the computer is pro~~ided. Hoffinan requires that the individual first be idenfiified as an authorised person or user and then that the authorized user inform the security system whether the access by the user is a voluntary act on the user's part or the user is being coerced or forced by a third part to request access to the computer.
Identification and/or verification of identity using biometric comparison techniques is well known. A few examples of U.S. patents that teach techniques and/or apparatus for biometric comparison for identification and/or personal verification are:
U.S. #3,576,583 issued to Miller April 1971 ('583) U.S. #4,690,554 issued to Froelich Sept. 1987 ('554) U.S. #5,073,949 issued to Takeda Dec. 1991 ('949) et al U.S. #5,815,252 issued to Price-FrancisSept. 1998 ('252) U.S. #6,002,785 issued to Ucida Dec. 1999 ('785) U.S. #6,028,950 issued to MerjanianFeb. 2000 ('950) U.S. #6,148,094 issued to Kinsella Nov. 2000 ('094) U. S. #US6,185,318issued to Jain et Feb. 2001 ( '3 B 1 al 7 8) U.S. #US6,208,264 issued to Bradney Mar. 2001 ('264) U.S. #US6,219,439 issued to Burger April 2001 ('439) U.S. #US6,241,288 issued to Bergenek June 2001 1;'288) B 1 et al Miller, in his '383 patent teaches a personal identification biometric comparison system, compares selected features of the contour or outer dimensions of the forgers of an individual with previous data on identical body parts.
Froelich.
in his '554 patent teaches a device for comparing a real time forger print image with finger print images already on file. The apparatus includes a pair of self correcting relay lens systems arranged symmetrically about a common image plane. The '949 patent to Takeda et al teaches a personal verification apparat~zs that identifies or verifies an individual by the proportional relationship of the joints of the forgers by comparing previously taken and filed data with current data of the same body parts of the same person. The '252 patent to Price-Francis teaches an apparatus and system for verifying that a card held or possessed by a person us owned by that person. One or more of the card owner's finger print, are encoded on the card. The person possessing the card provides his or her finger prints and the encoded finger prints and the prints provided by the person are compared to establish verification. The Ucida '785 patent teaches apparatus for comparing finger pant pattern level feature differences for reducing the volume of file data prints for further checking. The Merjanian '950 patent teaches a method and apparatus for guiding a finger of a person on to a platen for reading the fmge:r print on the finger. In one aspect of the invention Merjanian teaches a housing supporting at least two planar surfaces, one of which supports the forger for reading the finger paint, the other of which provides a griping surface for holding the housing. In another aspect the housing supports a contoured surface with a wide for ~uidin~ a person's forger on to the platen of the reader. Kinsella in. the '094 patent teaches a biometric sensor integrated into a computer mouse, the sensor being operated in response to grasping the computer mouse. 'Che biometrie sensor system includes a sensor/ comparator that senses a selected personal characteristic of the person grasping the computer mouse and compares the personal characteristic with previously obtained and stored personal data of a person. A successful comparison between the real time data and the stored data indicates verification of the user. Continued monitoring of the computer mouse ensures that the same person, previously verified is using the computer mouse.
The '3 I8 patent issued to Jain et al teaches a system and method for matching finger print patterns by creating a one dimensional representation of one or more points in a forger print pattern. The one dimensional representations are created by fording corresponding reference points in finger print pattern and generating an index of points which represents the finger print pattern. Indexes of two finger print patterns are compared for matching purposes. This is another way of matching finger print patterns. Bradney et al in patent '264 teaches a personal verification system using the thumb print of a person being interrogated. The thumb print of a person is converted into a coded data and the data is stored on a card. The teaching provides a reader which reads the coded data on the card and reads the thumb print of a person. The card is inserted in the reader and the reader scans the print on the thumb of a person. The reader reads the data on the card and, at the same time, converts the scanned thumb print into a corresponding code.
Comparison of the stored, coded data on the card and the real time code data from the scanned reading, identifies that the person whose thumb print is scanned as the person who owns the card. The '439 patent to Burger teaches a biometric authentication system which includes a dual data input reader which reads bath stored data and real time data. The stored data consists of physiological data, such as finger print pattern data of a person, stored on a chip disposed in a card.
The real time data is data representing a finger print scan of a person, by the reader.
The physiological data stored on the chip in the card is compared with a real tune finger print scan for verification and identifcation. Physiological data includes finger print pattern, retina scan, voice sound wave pattern, saliva and other physiological data. Bergenek et al in the '288 patent teaches a finger print identification/verif cation system using comparison of bit maps generated from a finger print pattern. Geometric co~gurations in a finger print pattern are recognized and a reference between geometric configurations in the same finger print pattern are mapped out in a bit map. Stored bit maps of finger print patterns are compared with a bit map generated from an input finger print pattern of a person. Identification or verification of a person is made by comparing two bit maps of finger prints.
The above discussed prior art establishes a data base of infotrnation on identification and verification of persons by comparing finger print pattern data and other biomebric data. However, this prior art does not address the problems that the present invention is designed to solve. The present invention addresses the problem of unauthorized and authorized use of a mufti-function wholesale and/or retail commercial establislunent check out system and deterring theft from the check out system. It should be apparent to one skilled in the art that the discussed prior art is to be construed within the limitations established by the inventors named in the respective patents and in the claims defining the inventions.
OBJECTS OF THE 1NVENTlON
It is an object of the present invention to provide a wholesale/retail check out system which promotes employee honest' and provides a reliable inventory index and cash flow.
It is a further object of the invention to provide a biometric technology system for control of the access to the functions of a mufti-function cash register at a check, out station in a commercial establishment.
It is also an object of the invention to provide a controlled cash register which deters employee theft in a check out station where an employee uses unauthorized functions of a mufti-function cash register.
Another object of the invention is to provide a biometric technology securit~~ system for a commercial check out system that controls access to the cash register-These and other objects will become apparent when reading the following detailed description of the invention with reference to the drawings..
SUMMARY OF THE INVENTION
The present invention provides a commercial establishment check out system which includes one or more check out stations or counters, each of which includes a cash register means. One or more of the cash registers in a mufti-station check out system may be a mufti-function cash register means and each multi-funetion cash register means includes a biometric human digit print identifier, such as a thumb print or finger print reader and identifier or comparator for keying ar permitting a selected, identified person either limited access or unlimited access to the cash register functions of the check out station. Each cash register means includes at least a cash draw which is both lockable and unlockable, at the local level and which may have central control override; a bar code scanner/reader means for identifying merchandise passed through the check out station; a reader means for reading checks and/or cards, such as credit cards andlor debit cards presented for payment of merchandise; a biomeiric reader means for reading human physiological information or data, with a data sending means for sending human physiological data read to a comparator for comparison purposes and a locking control means for locking the cash register and/or the cash draw in response to selected signals and for unlocking and permitting access to ail or selected functions of the mufti-function cash register.
From another aspect, the invention provides a single station or mufti-station check out system, for a commercial establishment, in which one or more check out stations or check out counters of the system are connected to a central control station which override control over the individual check out stations in the system.
In accordance with the invention, each check out station includes a cash reg:~ster means having mufti-function capabilities. Some cash registers in a mufti-station system may have more capabilities than other cash registers in the same system.
An example of some of the capabilities that may be included in a cash register are a cash draw that is capable of being locked and unlocked, both manually and automatically; visual and hard copy readout of transaction data; full mathematic capabilities; automatic tai. calculation; bar code recognition of merchandise passed through the check out station; check, credit and debit card reading; biometric reading means with physiological data comparison; storage for physiological data for use in data comparison; electronic transfer of funds associated with the check reading capability; communication with the central control station;
communication with a clock means: and activation of an alarm means.
In practicing the invention, some mufti-station check out systems. with central control station may include some cash registers that have full multi-function capability and other cash registers that have mufti-function capability, but selected functions of a full mufti-function capability cash register have been deleted, cancelled out or omitted from the cash register. In a preferred, mufti--station check out system with a central control station, the cash register in each respective check out station has full mufti-funcrion capability and may include more capabilities than mentioned above.
The cashier that operates the cash register in a check out station is usually responsible for the proceeds in the cash draw. The proceeds could be cash, checks, credit slips, debit slips, coupons, food stamps, and the like. The cashier is usually very careful that the account in the cash draw balances at the end of the work shift or work day. However it is not unknown for a manager to take advantage of a cashier's absence, such as taking a short break, and pilfer cash from the cash draw of an unattended cash register. it is an objective of the invention to prevent such theft by preventing operation of the cash register by any one unauthorized to operate the cash register and to monitor what authorized person is using the cash register during any time period. One of the features of the present invention includes the monitoring of the use of each cash register in the system. When a cash register in the system has been activated or turned ON for operation, and, if during the ON period the cash register is not operated and/or used for a predetermined period of time, such as ten ( 10) seconds, for example, the cash register is shut down, becoming locked and a person authorized to use the particular cash register must insert a proper finger into a biometric reading means, such as a finger print reader means, for example, in order to unlock the cash register andJor restart the cash register, for further use. This will prevent unauthorized persons from using the cash register while the authorized cashier is away from the check out station.
In accordance with the invention. the finger print of an unauthorized person vvill not unlock or start the cash register.
Similarly, the employer may make provision for his employees to cash employee pay check at the cash register, without the employee's finger print.
Thus, one or more of the cash registers in the system may include a check recognition capability, which recognizes an employee payroll check and permits selective cashing of checks. This will ensure that checks. with insufficient funds in the bank to cover the amount of the check are not cashed through the cash register.
This also prevents fraud on the part of the cashier who could otherwise cash checks in amounts that are insufficiently covered by funds in the bank. The ~;J.S.
patent #US 6,243,689 B l, issued to Norton, January 2001 teaches a check reading and electronic fund transfer system for paying funds identified in a check drawn by the payer to the payee. The check is a conventional two part draft instrument with bar code readable identification- The original portion of the instrument authorizes transfer of fund to the payee. Check cashing within the definition of the present invention may be done by exchanging the check for an amount of cash represented by the check or may be accomplished electronically into a bank.
A comprehensive audit trail of individual financial transactions of each cash register is accumulated and stored in the respective cash register. In accordance with the invention, in check out systems which include a central control station audit trail data and/or inventory transfer information are forwarded to a retrievable storage in the central control station. The synergistic combination of the cash register receipts data, merchandise recognition and employee finger print identification scanning techniques provide beneficial effects that are not possible with any other type of cash registers and/or biometric identification devices.
BRIEF DESCRIPTION OF ~'HE DRAWINGS
Fig. 1 is a block diagram representing one embodiment of the invention;
Fig. 2 is a representation of a check out station, with central clock;
Fig. ~ is a flow chart for accumulating employee data for matching employees with authorized stations and function at such starion;
Fig. 3a is a flow chart for cashier identification and authorized position;
Fig. 4 is a flow chart for protecting the payroll check cashing function;
Fig. 5 is a flow chart for non-use protection of a cash register with unauthorized user protection;
Fig. 6 is a flow chart for protecting other than normal commercial functions and use of a cash register; and Fig. 7 is a flow chart for authorizing the voiding of a tabulation on the cash register.
DETAILED DESCRIPT10N OF THE ItvVENTION
A preferred embodiment of the invention is represented in block diagram form in Fig. 1 as a check out system with a plurality of check out stations and .a central control station. Three (3) check out stations, block I0, Check Out Station # 1: block I l, Check Out Station #2 and block I2, Check Out Station #3 are represented, although more or fewer than three (3) check out stations may be used in one check out system, if desired. The Check Out Stations 10, 11 and 12 and the Central Control Station, block 14 are each connected to a real time clock, Clock, block 13 which keeps a running tally of commercial functions performed by the system with identification of employees using the functions, on a date, day and time of day basis. Each check out station is connected to an Interface, block I S
which connects to the central control station, block I4. The Central Control Station, block I4 includes a Biometric Data Library (Storage) and Comparator represented by block 16. An Alarm, block 17 is connected through the interface, block 15 to each check out station and to the central control station. The Alarm may be an audible alarm and/or a visible alarm and may be connected to a security monitoring system andlor to the local police, if desired.
In a single station check out system an Interface and a Central Control Station may be eliminated and the storage and compasator may be associated with the cash register in the system or with the Clock, to which the cash register is connected. An example of a cash register that may be used when practicing the present invention is the ROYAL, model 9170 Cash Management System, marketed by Staples, Inc, of Framingham, Massachusetts. 'The cash register includes a.
cash draw that may be locked and unlocked; a monitor for visual display of a transaction; a printer and tape supply for providing a hard copy of the transaction;
an alphanumeric key board, linked to the microprocessor. The microprocessor is programmable to automatically calculate taxes on transactions> and to receive and respond to instructions and/or commands. Some instructions and/or commands which may be programmed into the microprocessor include limiting access andlor use of the cash register and/or functions of the cash register to certain employees who have been identified by identification means in the system. Instructions programmed into the system may include, without limitation:
a) permitting access to the cash register to properly identified persons, such as an employee assigned to the cash register and identified by biometric, companson;
b) limiting the type of checks cashed to pay roll checks drawn by the employer/owner of the establishment;
c) monitoring use of a cash register and shutting down the cash register a predetermined period of non-use; and, d) limit use of the cash register to persons properly identified for certain defined transactions or functions on the cash register, such as cashing checks, making refunds, making exchanges andlor voiding a tabulation made on the cash register.
In addition to the hard wire communication system represented in Fig. 1, additional forms of communication, such as an air link andJor a visual link, may be used in the check out system. A second communication system is represented by the A in blocks, 18 at each check out station and at the central control station.
Fig. 2 represents a cash register 20, which is microprocessor controlled and includes a cash draw 21, for storing cash, checks, credit and debit slips, etc., the cash draw being both lockable and unlockable, a visual output or monitor meals 22 for displaying transactions, a printer means and tape storage means 23 for printing hard copies of transactions, an alphanumeric key board 24 for inputting data into the cash register, an hand held bar code reader means 25, for reading standard bar codes which identify and item and provide the price of the item, for example, a stationary bar code reader means 26, which also reads standard bar code but is usually mounted in the counter of the check out station, a check reader means 27 which reads check identification, a card reader means 28 which reads credit and/or debit cards, a finger print reader means 29, for reading biometric data when a finger, 30 is placed on the platen of the finger print reader means.
The cash register may also include a transmitter/receiver (not shown) connected to a microphone 32 and an antenna 33 for communication with the office or another station, for example. A panic alarm button 35 is represented for emergency operation of the alarm 31 which may be audible andlor visual. The alarm may connect to an alarm monitoring system and/or to the police, if desired. The cash register 20 is connected to a clock 36 which provides digitized time data, such as year, date, day of the week and time of day to the cash register via communication lines 37. The uncompleted lines 38 represent connections to other cash registers in other check out stations that may be in the same system. The broken line box represents a storage means for forger print data and the broken line box 41 represents a comparator for comparing stored finger print data with current .forger print data read by the print reader 29. One type of print reader is describe in U.S.
l5 patent #US 6,241,288 B 1 issued to Bergenek, et al which converts the pattern of a thumb print into a digital bit map. This patent is discussed above.
The Clock 36 keeps a running tally of the year, date, day and time of day and converts the time data into a readable digital code, readable by the cash register. The Clock is either reset manually periodically or reset automatically via Internet as a calibrated code from KIST or an equivalent national agency. The business computer may serve as a master clock that synchronizes real time clocks of each of the check out stations, if desired.
Referring to Fig. 3. a flow chart represents a sequence of steps or operations for generating a library or storage of employee identification data, location of work or station data and authorized work functions data, for each employee. The identity of each employee is stored in a readable memory. Finger print data from each employee's hand is read and stored 45. The employee, identified by the particular print, is assigned a station and authorized work functions 46. The print data, identifying an employee, the date the print data was taken, the station at which the employee is assigned to work and the authorized work functions of the employee associated with the particular print data are stored 47 and held in standby for comparison purposes 48. Fig. 3a is a flow chart representing a sequence of operations for activating a cash register. The sequence is initiated by a person inserting a forger in the finger print reader means 29, of Fig. 2, so that the finger print pattern may be read. Here it is assumed that an employee starts a day at the check out station. The employee inserts a finger in the forger print reader means and the forger print is read by the print reader 50.
The data of that, current finger print is stored with time, date and station S 1.
The current print data is compared with the librar~~ of prints held in standby 48, Fig. 3.
for determining if the print is a match with a print in stand-by storage for comparison 48, for the person authorized to use the cash register at this station 52.
If there is a match, authorization to operate is YES, 56, the cash register is activated 57. if the prints read by the print reader do not match, NO, 53, the alarm is actuated 54, calling the attention of the Secuzity operation in the establishment.
In a preferred embodiment of the system, the alarm is manually deactivated, ending the sequence. This protects use of the cash register from unauthorized persons.
Fig. 4 is a flow chart representing a sequence of steps which prevent the cashing of unauthorized checks. In a preferred embodiment of the invention, only payroll checks drawn by the employer-owner are authorized cashed at the system cash register.. The prevents the cashing of checks that are not covered by adequate funds in the bank. The sequence represented in Fig. 4 starts with the cash register in operation 57, in Fig. 3a. The cashier enters the function, for example, Cash Employee Payroll Check 60. The finger print of the cashier is already on file for this work period. The print, station and function are compared with the data in stand-by comparison 48 at 59. If a match authorizes the function YES, 61 the payroll check is processed 62 for pay authorization. If YES, 63 the check is cashed 64 and the sequence ends 65. If the function authorization is refused NO, 66, the cashier calls a manager or supervisor 67. The forger print of the manager or supervisor is obtained 68 and the print is stored with time, station and date 69.
Current print data is compared with stored stand-by data for print, station and function 52-4. If the function is authorized YES, 70, the authorized manager/supervisor follows the process through line 71 via block 60. If authorization is NO, 72, the manager/supervisor calls a higher level manager as indicated by the line 74. This process ensures that payroll checks of employees of the establishment are cashed and that an identified, authorized person preforms the function of cashing the check.
The flow chart in Fig. 5 represents a process for protecting the cash register of a cashier who may leave the cash register unattended for a few moments of time or takes a break from the check out station, without shutting down the cash register. The process represented would occur at a time after the cash register has been activated, such as at 57 in Fig. 3a. To set up such a process the cash register would be programmed to monitor itself and to shut itself off if the cash register is activated but is not used or operated for a predetermined period of time, such as ten ( 10) seconds 80 and 81. In order to reactivate the cash register the cashier must go through the same process as represented in Fig. 3a, that is, 50, 51, 52, 56 and 57. If a third person were to attempt to activate the cash register after shut down 81, but before the cashier has returned to the station, it is preferred that any tl7urd person be denied access to the cash register. This will prevent theft from the cash draw. On the other hand, it may, under special circumstance, be necessary for a manager or a higher level supervisor to obtain access to the cash register, as the cashier may have become ill, for example. The broken line 85 represents the attempt of a third person to obtain access to the shut down cash register. The finger print of a third person or the manager is obtained 86 and the print, time, date and station are stored 87. Comparison is made with stored stand-by data 52-5.
In the preferred system, authorization would not be granted, without special override, for example. However, if authorization is YES, the manager/supervisor gains access vis 88 to operate the cash register 57. This sequence prevents theft by managers, supervisors and/or higher level employees from the cash draw of a cash register left open by a cashier who has left the check out station for some reason, without shutting down the cash register.
Fig. 6 is a flow chart that represents a sequence of steps for the bar code scanning of merchandise returned to the establishment and the prevention of theft by unauthorized refund payments or exchanges of goods purchased elsewhere. The cash register is in operation as at 57 in Fig_ ~a. Merchandise is presented for scanning the bar code 90. This determines if the merchandise was purchased at the current establishment or elsewhere. If the merchandise was purchased at the current establishment the response is YES, 92. The function of Refimd or Exchange 94 is entered and this work function is compared with the authorized work functions of the cashier 95. The cashier's finger print is already filed fo:r this work period. If the cashier is authorized YES, 96 the refund of cash, credit or exchange 97, is made. If authorization is N0, 98 a supervisor or manager is called 99. The finger print of the called employee is obtained 100 and the print, time, date and station 101 is stored. Comparison with stand-by data 48, is made, 5 2-6 to determine if the called person has authority to operate the cash register at this station. If authorization to operate is YES, 102 the step goes to determine if the called employee also has authorization to handle refunds and/or exchanges 94 via line 104. If authorization is NO, 106 an employee of higher Ievel is called so that an authorized employee is obtained to operate the cash register and handle dae refund or exchange function. If the merchandise was purchased at some other establishment, the response NO, 91 would activate the alarm. This sequence of steps ensures that refunds and/or exchanges are made for only merchandise purchased at the current establishment and that the actual refund andlor exchange made is made by an authorized employee.
Fig. 7 is a flow diagram that represents a sequence of steps or operations for voiding a tabulation on a cash register that includes an error in the tabulation. The cash register is in operation as in Fig. 3a at 57. An error in the tabulation occurs.
The cash register must be put through Void Function 111. This Function is compared with data in stand-by 48 with the print of the cashier already on file for the current work period 113. If the cashier is authorized to preform this funciion the response is YES. 1 I4. The cashier will void the tabulation 115. If the cashier is not authorized to preform the function, the response is NO, 116. A call is made to a manager or supervisor 117 from who a finger print is obtained 118. The print is stored with the time, date and station I20 for comparison with stand-by data 48 at 52-7, for authorization to operate the cash register at this station. If N0,121, a higher level employee 1 I7, is called via line 122. The higher level employee goes through the steps 118, 120 and 52-7 for authorization to operate. With a YES
response the Void Function is identified 111 and the print of the higher level, authorized employee is compared with stand-by data 48 for authorization of the function 1 I3. With a YES, 114 the higher level employee performs Void Tab 115.
This sequence ensures that errors in the tabulation at a cash register will be cleared only by authorized employees.
The present invention discloses a check out system and station that provides a higher level of security than that taught by the prior art. The use of biometric technology for ensuring identification and veritic;aticm of employees with authorization addresses the problem differently than taught or suggested in the prior art. All employees are identified with the use of biometric technology with identification data and authority store for comparison with newly entered data providing security. ~E~he proper cashier at the assigned cash register is assured. Tlre cashing of checks is limited to ~~rnplcny~r drawn payroll checks and those checks are cashed only by authorized emplo yetis. ~l'he security of ~;asl~i~:r's cash draw is assured. Refunds and/or exchanges of merchandise are limited to establishment purchased goods and refunds and exchanges are made by authorized employees. Preferably, refunds require authorization from the manager and the cashier. Clearing a tabulatic:~ra error on thr: crash register requires a supervisor authorization.
In the foregoing description of the invention, clarity and comprehension.
However, no necessary limitations are to be implied from or because of the terms used, beyond the requirements of the prior art, because such terms are used fear descriptive purposes and are intended to be broadly constructed. F'irrihermore, the description and illustration of the invention are by way of example, and the scope of'the invention is not limited to the exact details shown, represented or described.
Having now described a preferred embodiment of thc: invention, in terms c,f features, discoveries and principles, along with certain alternative oc:mstructiorl and suggested changes, other charges that may becorne apparent to thcast skilled in the art may be made. without departing from the scope of the invention defined in the appended claims.
?1
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to security and access control systems and apparatus for check out stations and cash registers used in commerce at the wholesale and retail level.
Prior Art The check out stations which include cash registers of wholesale and retail commercial establishments that are open, to essentially, the public are multi-function stations. The cash register normally included as a part of the check out station is often a complex, mufti-function, intelligent machine. The machine is basically a cash register with an alphanumeric key board through which data is entered into the machine. Transactions are calculated and displayed to both the operator and the customer. The machine handles multiple transactions. The type of transaction could be a wholesale or a retail sale, for example. Taxes on the sale are accordingly calculated. The transaction could be a cash, a check, a credit card, a debit card or a line of credit sale, for example, either wholesale or retail.
The transaction could be a sale or a return of merchandise purchased for cash return or credit return or exchange of merchandise in kind or some other kind. These and other commercial transactions are handled at mufti-function commercial check out stations along with inventory update and record keeping and check cashing. An example of a currently manufactured electronic, mufti-function cash register is the ROYAL model 9170 Cash Management System available from Staples, Inc. of Framingham. Massachusetts. This mufti-function cash register does automatic tax computation, prints out written receipt identifying the purchase made and price charged, has a dual alphanumeric display with programmable store logo, maintains a two-station alphanumeric journal and has a locking cash draw.
Whether the commercial establishment has a mufti-station check out system or a single station check out system, most check out stations have a locking feature which effectively limits access to the mufti-functions of the check out stations. The locking feature may be over come by use of the proper key inserted into a lock tumbler in the cash register or may be a code or pin number punched into a key board. But the problem of these key devices is security. Keys, pin numbers, pass words or other codes may be readily stolen and used by unauthorized persons.
Further, because the check out station has a great plurality of functions, some of the functions of the system may be unauthorized to certain persons, who have authorized, but limited use of the mufti-function machine, use limited to certain specific functions of the machine. Some persons may not have the training or ability to use all the functions of a mufti-function machine. On the other hand, some persons may intentionally use unauthorized functions of the machine for dishonest purposes. Other persons may have full authorized use of the machine.
The United States Patent #5,615,277; issued to Hoffinan. teaches a tokenless security system and method for authorizing access to a computer system.
Personal identification, using unique biometric sample comparison, integrated into a computer security system is taught.-Comparison provides authentication of an individual entitled to access to the computer system. A second coded input by the authorized person indicates whether the act of access is voluntary on the part of the authorized person or if the authorized person is being forced by another person to request access. In the case of voluntary access, unlimited access to the computer is provided. In the case of coerced access, limited access to the computer is pro~~ided. Hoffinan requires that the individual first be idenfiified as an authorised person or user and then that the authorized user inform the security system whether the access by the user is a voluntary act on the user's part or the user is being coerced or forced by a third part to request access to the computer.
Identification and/or verification of identity using biometric comparison techniques is well known. A few examples of U.S. patents that teach techniques and/or apparatus for biometric comparison for identification and/or personal verification are:
U.S. #3,576,583 issued to Miller April 1971 ('583) U.S. #4,690,554 issued to Froelich Sept. 1987 ('554) U.S. #5,073,949 issued to Takeda Dec. 1991 ('949) et al U.S. #5,815,252 issued to Price-FrancisSept. 1998 ('252) U.S. #6,002,785 issued to Ucida Dec. 1999 ('785) U.S. #6,028,950 issued to MerjanianFeb. 2000 ('950) U.S. #6,148,094 issued to Kinsella Nov. 2000 ('094) U. S. #US6,185,318issued to Jain et Feb. 2001 ( '3 B 1 al 7 8) U.S. #US6,208,264 issued to Bradney Mar. 2001 ('264) U.S. #US6,219,439 issued to Burger April 2001 ('439) U.S. #US6,241,288 issued to Bergenek June 2001 1;'288) B 1 et al Miller, in his '383 patent teaches a personal identification biometric comparison system, compares selected features of the contour or outer dimensions of the forgers of an individual with previous data on identical body parts.
Froelich.
in his '554 patent teaches a device for comparing a real time forger print image with finger print images already on file. The apparatus includes a pair of self correcting relay lens systems arranged symmetrically about a common image plane. The '949 patent to Takeda et al teaches a personal verification apparat~zs that identifies or verifies an individual by the proportional relationship of the joints of the forgers by comparing previously taken and filed data with current data of the same body parts of the same person. The '252 patent to Price-Francis teaches an apparatus and system for verifying that a card held or possessed by a person us owned by that person. One or more of the card owner's finger print, are encoded on the card. The person possessing the card provides his or her finger prints and the encoded finger prints and the prints provided by the person are compared to establish verification. The Ucida '785 patent teaches apparatus for comparing finger pant pattern level feature differences for reducing the volume of file data prints for further checking. The Merjanian '950 patent teaches a method and apparatus for guiding a finger of a person on to a platen for reading the fmge:r print on the finger. In one aspect of the invention Merjanian teaches a housing supporting at least two planar surfaces, one of which supports the forger for reading the finger paint, the other of which provides a griping surface for holding the housing. In another aspect the housing supports a contoured surface with a wide for ~uidin~ a person's forger on to the platen of the reader. Kinsella in. the '094 patent teaches a biometric sensor integrated into a computer mouse, the sensor being operated in response to grasping the computer mouse. 'Che biometrie sensor system includes a sensor/ comparator that senses a selected personal characteristic of the person grasping the computer mouse and compares the personal characteristic with previously obtained and stored personal data of a person. A successful comparison between the real time data and the stored data indicates verification of the user. Continued monitoring of the computer mouse ensures that the same person, previously verified is using the computer mouse.
The '3 I8 patent issued to Jain et al teaches a system and method for matching finger print patterns by creating a one dimensional representation of one or more points in a forger print pattern. The one dimensional representations are created by fording corresponding reference points in finger print pattern and generating an index of points which represents the finger print pattern. Indexes of two finger print patterns are compared for matching purposes. This is another way of matching finger print patterns. Bradney et al in patent '264 teaches a personal verification system using the thumb print of a person being interrogated. The thumb print of a person is converted into a coded data and the data is stored on a card. The teaching provides a reader which reads the coded data on the card and reads the thumb print of a person. The card is inserted in the reader and the reader scans the print on the thumb of a person. The reader reads the data on the card and, at the same time, converts the scanned thumb print into a corresponding code.
Comparison of the stored, coded data on the card and the real time code data from the scanned reading, identifies that the person whose thumb print is scanned as the person who owns the card. The '439 patent to Burger teaches a biometric authentication system which includes a dual data input reader which reads bath stored data and real time data. The stored data consists of physiological data, such as finger print pattern data of a person, stored on a chip disposed in a card.
The real time data is data representing a finger print scan of a person, by the reader.
The physiological data stored on the chip in the card is compared with a real tune finger print scan for verification and identifcation. Physiological data includes finger print pattern, retina scan, voice sound wave pattern, saliva and other physiological data. Bergenek et al in the '288 patent teaches a finger print identification/verif cation system using comparison of bit maps generated from a finger print pattern. Geometric co~gurations in a finger print pattern are recognized and a reference between geometric configurations in the same finger print pattern are mapped out in a bit map. Stored bit maps of finger print patterns are compared with a bit map generated from an input finger print pattern of a person. Identification or verification of a person is made by comparing two bit maps of finger prints.
The above discussed prior art establishes a data base of infotrnation on identification and verification of persons by comparing finger print pattern data and other biomebric data. However, this prior art does not address the problems that the present invention is designed to solve. The present invention addresses the problem of unauthorized and authorized use of a mufti-function wholesale and/or retail commercial establislunent check out system and deterring theft from the check out system. It should be apparent to one skilled in the art that the discussed prior art is to be construed within the limitations established by the inventors named in the respective patents and in the claims defining the inventions.
OBJECTS OF THE 1NVENTlON
It is an object of the present invention to provide a wholesale/retail check out system which promotes employee honest' and provides a reliable inventory index and cash flow.
It is a further object of the invention to provide a biometric technology system for control of the access to the functions of a mufti-function cash register at a check, out station in a commercial establishment.
It is also an object of the invention to provide a controlled cash register which deters employee theft in a check out station where an employee uses unauthorized functions of a mufti-function cash register.
Another object of the invention is to provide a biometric technology securit~~ system for a commercial check out system that controls access to the cash register-These and other objects will become apparent when reading the following detailed description of the invention with reference to the drawings..
SUMMARY OF THE INVENTION
The present invention provides a commercial establishment check out system which includes one or more check out stations or counters, each of which includes a cash register means. One or more of the cash registers in a mufti-station check out system may be a mufti-function cash register means and each multi-funetion cash register means includes a biometric human digit print identifier, such as a thumb print or finger print reader and identifier or comparator for keying ar permitting a selected, identified person either limited access or unlimited access to the cash register functions of the check out station. Each cash register means includes at least a cash draw which is both lockable and unlockable, at the local level and which may have central control override; a bar code scanner/reader means for identifying merchandise passed through the check out station; a reader means for reading checks and/or cards, such as credit cards andlor debit cards presented for payment of merchandise; a biomeiric reader means for reading human physiological information or data, with a data sending means for sending human physiological data read to a comparator for comparison purposes and a locking control means for locking the cash register and/or the cash draw in response to selected signals and for unlocking and permitting access to ail or selected functions of the mufti-function cash register.
From another aspect, the invention provides a single station or mufti-station check out system, for a commercial establishment, in which one or more check out stations or check out counters of the system are connected to a central control station which override control over the individual check out stations in the system.
In accordance with the invention, each check out station includes a cash reg:~ster means having mufti-function capabilities. Some cash registers in a mufti-station system may have more capabilities than other cash registers in the same system.
An example of some of the capabilities that may be included in a cash register are a cash draw that is capable of being locked and unlocked, both manually and automatically; visual and hard copy readout of transaction data; full mathematic capabilities; automatic tai. calculation; bar code recognition of merchandise passed through the check out station; check, credit and debit card reading; biometric reading means with physiological data comparison; storage for physiological data for use in data comparison; electronic transfer of funds associated with the check reading capability; communication with the central control station;
communication with a clock means: and activation of an alarm means.
In practicing the invention, some mufti-station check out systems. with central control station may include some cash registers that have full multi-function capability and other cash registers that have mufti-function capability, but selected functions of a full mufti-function capability cash register have been deleted, cancelled out or omitted from the cash register. In a preferred, mufti--station check out system with a central control station, the cash register in each respective check out station has full mufti-funcrion capability and may include more capabilities than mentioned above.
The cashier that operates the cash register in a check out station is usually responsible for the proceeds in the cash draw. The proceeds could be cash, checks, credit slips, debit slips, coupons, food stamps, and the like. The cashier is usually very careful that the account in the cash draw balances at the end of the work shift or work day. However it is not unknown for a manager to take advantage of a cashier's absence, such as taking a short break, and pilfer cash from the cash draw of an unattended cash register. it is an objective of the invention to prevent such theft by preventing operation of the cash register by any one unauthorized to operate the cash register and to monitor what authorized person is using the cash register during any time period. One of the features of the present invention includes the monitoring of the use of each cash register in the system. When a cash register in the system has been activated or turned ON for operation, and, if during the ON period the cash register is not operated and/or used for a predetermined period of time, such as ten ( 10) seconds, for example, the cash register is shut down, becoming locked and a person authorized to use the particular cash register must insert a proper finger into a biometric reading means, such as a finger print reader means, for example, in order to unlock the cash register andJor restart the cash register, for further use. This will prevent unauthorized persons from using the cash register while the authorized cashier is away from the check out station.
In accordance with the invention. the finger print of an unauthorized person vvill not unlock or start the cash register.
Similarly, the employer may make provision for his employees to cash employee pay check at the cash register, without the employee's finger print.
Thus, one or more of the cash registers in the system may include a check recognition capability, which recognizes an employee payroll check and permits selective cashing of checks. This will ensure that checks. with insufficient funds in the bank to cover the amount of the check are not cashed through the cash register.
This also prevents fraud on the part of the cashier who could otherwise cash checks in amounts that are insufficiently covered by funds in the bank. The ~;J.S.
patent #US 6,243,689 B l, issued to Norton, January 2001 teaches a check reading and electronic fund transfer system for paying funds identified in a check drawn by the payer to the payee. The check is a conventional two part draft instrument with bar code readable identification- The original portion of the instrument authorizes transfer of fund to the payee. Check cashing within the definition of the present invention may be done by exchanging the check for an amount of cash represented by the check or may be accomplished electronically into a bank.
A comprehensive audit trail of individual financial transactions of each cash register is accumulated and stored in the respective cash register. In accordance with the invention, in check out systems which include a central control station audit trail data and/or inventory transfer information are forwarded to a retrievable storage in the central control station. The synergistic combination of the cash register receipts data, merchandise recognition and employee finger print identification scanning techniques provide beneficial effects that are not possible with any other type of cash registers and/or biometric identification devices.
BRIEF DESCRIPTION OF ~'HE DRAWINGS
Fig. 1 is a block diagram representing one embodiment of the invention;
Fig. 2 is a representation of a check out station, with central clock;
Fig. ~ is a flow chart for accumulating employee data for matching employees with authorized stations and function at such starion;
Fig. 3a is a flow chart for cashier identification and authorized position;
Fig. 4 is a flow chart for protecting the payroll check cashing function;
Fig. 5 is a flow chart for non-use protection of a cash register with unauthorized user protection;
Fig. 6 is a flow chart for protecting other than normal commercial functions and use of a cash register; and Fig. 7 is a flow chart for authorizing the voiding of a tabulation on the cash register.
DETAILED DESCRIPT10N OF THE ItvVENTION
A preferred embodiment of the invention is represented in block diagram form in Fig. 1 as a check out system with a plurality of check out stations and .a central control station. Three (3) check out stations, block I0, Check Out Station # 1: block I l, Check Out Station #2 and block I2, Check Out Station #3 are represented, although more or fewer than three (3) check out stations may be used in one check out system, if desired. The Check Out Stations 10, 11 and 12 and the Central Control Station, block 14 are each connected to a real time clock, Clock, block 13 which keeps a running tally of commercial functions performed by the system with identification of employees using the functions, on a date, day and time of day basis. Each check out station is connected to an Interface, block I S
which connects to the central control station, block I4. The Central Control Station, block I4 includes a Biometric Data Library (Storage) and Comparator represented by block 16. An Alarm, block 17 is connected through the interface, block 15 to each check out station and to the central control station. The Alarm may be an audible alarm and/or a visible alarm and may be connected to a security monitoring system andlor to the local police, if desired.
In a single station check out system an Interface and a Central Control Station may be eliminated and the storage and compasator may be associated with the cash register in the system or with the Clock, to which the cash register is connected. An example of a cash register that may be used when practicing the present invention is the ROYAL, model 9170 Cash Management System, marketed by Staples, Inc, of Framingham, Massachusetts. 'The cash register includes a.
cash draw that may be locked and unlocked; a monitor for visual display of a transaction; a printer and tape supply for providing a hard copy of the transaction;
an alphanumeric key board, linked to the microprocessor. The microprocessor is programmable to automatically calculate taxes on transactions> and to receive and respond to instructions and/or commands. Some instructions and/or commands which may be programmed into the microprocessor include limiting access andlor use of the cash register and/or functions of the cash register to certain employees who have been identified by identification means in the system. Instructions programmed into the system may include, without limitation:
a) permitting access to the cash register to properly identified persons, such as an employee assigned to the cash register and identified by biometric, companson;
b) limiting the type of checks cashed to pay roll checks drawn by the employer/owner of the establishment;
c) monitoring use of a cash register and shutting down the cash register a predetermined period of non-use; and, d) limit use of the cash register to persons properly identified for certain defined transactions or functions on the cash register, such as cashing checks, making refunds, making exchanges andlor voiding a tabulation made on the cash register.
In addition to the hard wire communication system represented in Fig. 1, additional forms of communication, such as an air link andJor a visual link, may be used in the check out system. A second communication system is represented by the A in blocks, 18 at each check out station and at the central control station.
Fig. 2 represents a cash register 20, which is microprocessor controlled and includes a cash draw 21, for storing cash, checks, credit and debit slips, etc., the cash draw being both lockable and unlockable, a visual output or monitor meals 22 for displaying transactions, a printer means and tape storage means 23 for printing hard copies of transactions, an alphanumeric key board 24 for inputting data into the cash register, an hand held bar code reader means 25, for reading standard bar codes which identify and item and provide the price of the item, for example, a stationary bar code reader means 26, which also reads standard bar code but is usually mounted in the counter of the check out station, a check reader means 27 which reads check identification, a card reader means 28 which reads credit and/or debit cards, a finger print reader means 29, for reading biometric data when a finger, 30 is placed on the platen of the finger print reader means.
The cash register may also include a transmitter/receiver (not shown) connected to a microphone 32 and an antenna 33 for communication with the office or another station, for example. A panic alarm button 35 is represented for emergency operation of the alarm 31 which may be audible andlor visual. The alarm may connect to an alarm monitoring system and/or to the police, if desired. The cash register 20 is connected to a clock 36 which provides digitized time data, such as year, date, day of the week and time of day to the cash register via communication lines 37. The uncompleted lines 38 represent connections to other cash registers in other check out stations that may be in the same system. The broken line box represents a storage means for forger print data and the broken line box 41 represents a comparator for comparing stored finger print data with current .forger print data read by the print reader 29. One type of print reader is describe in U.S.
l5 patent #US 6,241,288 B 1 issued to Bergenek, et al which converts the pattern of a thumb print into a digital bit map. This patent is discussed above.
The Clock 36 keeps a running tally of the year, date, day and time of day and converts the time data into a readable digital code, readable by the cash register. The Clock is either reset manually periodically or reset automatically via Internet as a calibrated code from KIST or an equivalent national agency. The business computer may serve as a master clock that synchronizes real time clocks of each of the check out stations, if desired.
Referring to Fig. 3. a flow chart represents a sequence of steps or operations for generating a library or storage of employee identification data, location of work or station data and authorized work functions data, for each employee. The identity of each employee is stored in a readable memory. Finger print data from each employee's hand is read and stored 45. The employee, identified by the particular print, is assigned a station and authorized work functions 46. The print data, identifying an employee, the date the print data was taken, the station at which the employee is assigned to work and the authorized work functions of the employee associated with the particular print data are stored 47 and held in standby for comparison purposes 48. Fig. 3a is a flow chart representing a sequence of operations for activating a cash register. The sequence is initiated by a person inserting a forger in the finger print reader means 29, of Fig. 2, so that the finger print pattern may be read. Here it is assumed that an employee starts a day at the check out station. The employee inserts a finger in the forger print reader means and the forger print is read by the print reader 50.
The data of that, current finger print is stored with time, date and station S 1.
The current print data is compared with the librar~~ of prints held in standby 48, Fig. 3.
for determining if the print is a match with a print in stand-by storage for comparison 48, for the person authorized to use the cash register at this station 52.
If there is a match, authorization to operate is YES, 56, the cash register is activated 57. if the prints read by the print reader do not match, NO, 53, the alarm is actuated 54, calling the attention of the Secuzity operation in the establishment.
In a preferred embodiment of the system, the alarm is manually deactivated, ending the sequence. This protects use of the cash register from unauthorized persons.
Fig. 4 is a flow chart representing a sequence of steps which prevent the cashing of unauthorized checks. In a preferred embodiment of the invention, only payroll checks drawn by the employer-owner are authorized cashed at the system cash register.. The prevents the cashing of checks that are not covered by adequate funds in the bank. The sequence represented in Fig. 4 starts with the cash register in operation 57, in Fig. 3a. The cashier enters the function, for example, Cash Employee Payroll Check 60. The finger print of the cashier is already on file for this work period. The print, station and function are compared with the data in stand-by comparison 48 at 59. If a match authorizes the function YES, 61 the payroll check is processed 62 for pay authorization. If YES, 63 the check is cashed 64 and the sequence ends 65. If the function authorization is refused NO, 66, the cashier calls a manager or supervisor 67. The forger print of the manager or supervisor is obtained 68 and the print is stored with time, station and date 69.
Current print data is compared with stored stand-by data for print, station and function 52-4. If the function is authorized YES, 70, the authorized manager/supervisor follows the process through line 71 via block 60. If authorization is NO, 72, the manager/supervisor calls a higher level manager as indicated by the line 74. This process ensures that payroll checks of employees of the establishment are cashed and that an identified, authorized person preforms the function of cashing the check.
The flow chart in Fig. 5 represents a process for protecting the cash register of a cashier who may leave the cash register unattended for a few moments of time or takes a break from the check out station, without shutting down the cash register. The process represented would occur at a time after the cash register has been activated, such as at 57 in Fig. 3a. To set up such a process the cash register would be programmed to monitor itself and to shut itself off if the cash register is activated but is not used or operated for a predetermined period of time, such as ten ( 10) seconds 80 and 81. In order to reactivate the cash register the cashier must go through the same process as represented in Fig. 3a, that is, 50, 51, 52, 56 and 57. If a third person were to attempt to activate the cash register after shut down 81, but before the cashier has returned to the station, it is preferred that any tl7urd person be denied access to the cash register. This will prevent theft from the cash draw. On the other hand, it may, under special circumstance, be necessary for a manager or a higher level supervisor to obtain access to the cash register, as the cashier may have become ill, for example. The broken line 85 represents the attempt of a third person to obtain access to the shut down cash register. The finger print of a third person or the manager is obtained 86 and the print, time, date and station are stored 87. Comparison is made with stored stand-by data 52-5.
In the preferred system, authorization would not be granted, without special override, for example. However, if authorization is YES, the manager/supervisor gains access vis 88 to operate the cash register 57. This sequence prevents theft by managers, supervisors and/or higher level employees from the cash draw of a cash register left open by a cashier who has left the check out station for some reason, without shutting down the cash register.
Fig. 6 is a flow chart that represents a sequence of steps for the bar code scanning of merchandise returned to the establishment and the prevention of theft by unauthorized refund payments or exchanges of goods purchased elsewhere. The cash register is in operation as at 57 in Fig_ ~a. Merchandise is presented for scanning the bar code 90. This determines if the merchandise was purchased at the current establishment or elsewhere. If the merchandise was purchased at the current establishment the response is YES, 92. The function of Refimd or Exchange 94 is entered and this work function is compared with the authorized work functions of the cashier 95. The cashier's finger print is already filed fo:r this work period. If the cashier is authorized YES, 96 the refund of cash, credit or exchange 97, is made. If authorization is N0, 98 a supervisor or manager is called 99. The finger print of the called employee is obtained 100 and the print, time, date and station 101 is stored. Comparison with stand-by data 48, is made, 5 2-6 to determine if the called person has authority to operate the cash register at this station. If authorization to operate is YES, 102 the step goes to determine if the called employee also has authorization to handle refunds and/or exchanges 94 via line 104. If authorization is NO, 106 an employee of higher Ievel is called so that an authorized employee is obtained to operate the cash register and handle dae refund or exchange function. If the merchandise was purchased at some other establishment, the response NO, 91 would activate the alarm. This sequence of steps ensures that refunds and/or exchanges are made for only merchandise purchased at the current establishment and that the actual refund andlor exchange made is made by an authorized employee.
Fig. 7 is a flow diagram that represents a sequence of steps or operations for voiding a tabulation on a cash register that includes an error in the tabulation. The cash register is in operation as in Fig. 3a at 57. An error in the tabulation occurs.
The cash register must be put through Void Function 111. This Function is compared with data in stand-by 48 with the print of the cashier already on file for the current work period 113. If the cashier is authorized to preform this funciion the response is YES. 1 I4. The cashier will void the tabulation 115. If the cashier is not authorized to preform the function, the response is NO, 116. A call is made to a manager or supervisor 117 from who a finger print is obtained 118. The print is stored with the time, date and station I20 for comparison with stand-by data 48 at 52-7, for authorization to operate the cash register at this station. If N0,121, a higher level employee 1 I7, is called via line 122. The higher level employee goes through the steps 118, 120 and 52-7 for authorization to operate. With a YES
response the Void Function is identified 111 and the print of the higher level, authorized employee is compared with stand-by data 48 for authorization of the function 1 I3. With a YES, 114 the higher level employee performs Void Tab 115.
This sequence ensures that errors in the tabulation at a cash register will be cleared only by authorized employees.
The present invention discloses a check out system and station that provides a higher level of security than that taught by the prior art. The use of biometric technology for ensuring identification and veritic;aticm of employees with authorization addresses the problem differently than taught or suggested in the prior art. All employees are identified with the use of biometric technology with identification data and authority store for comparison with newly entered data providing security. ~E~he proper cashier at the assigned cash register is assured. Tlre cashing of checks is limited to ~~rnplcny~r drawn payroll checks and those checks are cashed only by authorized emplo yetis. ~l'he security of ~;asl~i~:r's cash draw is assured. Refunds and/or exchanges of merchandise are limited to establishment purchased goods and refunds and exchanges are made by authorized employees. Preferably, refunds require authorization from the manager and the cashier. Clearing a tabulatic:~ra error on thr: crash register requires a supervisor authorization.
In the foregoing description of the invention, clarity and comprehension.
However, no necessary limitations are to be implied from or because of the terms used, beyond the requirements of the prior art, because such terms are used fear descriptive purposes and are intended to be broadly constructed. F'irrihermore, the description and illustration of the invention are by way of example, and the scope of'the invention is not limited to the exact details shown, represented or described.
Having now described a preferred embodiment of thc: invention, in terms c,f features, discoveries and principles, along with certain alternative oc:mstructiorl and suggested changes, other charges that may becorne apparent to thcast skilled in the art may be made. without departing from the scope of the invention defined in the appended claims.
?1
Claims (10)
1. A commercial check out station system comprising:
a) a cash register means;
b) a biometric reader means for reading and storing a biometric data read by said biometric reader means; and c) a comparator means, associated with said cash register means, for comparing said stored biometric data with a second biometric data read by said biometric reader means for identifying a person authorized to use said cash register means.
a) a cash register means;
b) a biometric reader means for reading and storing a biometric data read by said biometric reader means; and c) a comparator means, associated with said cash register means, for comparing said stored biometric data with a second biometric data read by said biometric reader means for identifying a person authorized to use said cash register means.
2. A commercial check out station system as in claim 1 wherein said cash register of said check out station system will automatically shut down if said cash register is not used for a predetermined time interval.
3. A commercial check out station system as in claim 1 wherein checks cashed through said cash register means are limited to employee payroll checks drafted by an employer/operator of said commercial check out station system.
4. A commercial check out station system as in claim 1 wherein said biometric reader means is a thumb print reader means.
5. A commercial check out station system as in claim 1 wherein said biometric reader means is a finger print reader means.
6. A commercial check out station system as in claim 1 which further includes a real time clock for providing a running tally of date, day of week, time of day and year.
7. A commercial check out station system as in claim 6 where in said cash register means is a plurality of cash register means.
8. A commercial check out station system as in claim 7 each said cash register means of said plurality of cash register means includes a) a check reader means for reading a data on a check identifying an account on which said check is drawn and a bank which holds said account.
9. A commercial check out station system as in claim 8 which further includes a) a standard card reader means for reading for reading a credit card and a debit card; and b) a bar code reader means for reading data encoded in bar form code.
10. A commercial check out station system as in claim 7 and said system further includes a) a central control station, coupled to each said cash register by a hard wire link and by a wireless link for communication between stations.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/074,636 US6883709B2 (en) | 2002-02-12 | 2002-02-12 | Biometric identification and security system associated with cash register |
CA2420800A CA2420800C (en) | 2002-02-12 | 2003-03-04 | Biometric identification and security system associated with cash register |
US11/362,563 USRE42734E1 (en) | 2002-02-12 | 2006-02-24 | Biometric identification and security system associated with cash register |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/074,636 US6883709B2 (en) | 2002-02-12 | 2002-02-12 | Biometric identification and security system associated with cash register |
CA2420800A CA2420800C (en) | 2002-02-12 | 2003-03-04 | Biometric identification and security system associated with cash register |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2420800A1 true CA2420800A1 (en) | 2004-09-04 |
CA2420800C CA2420800C (en) | 2016-07-19 |
Family
ID=33477386
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2420800A Expired - Lifetime CA2420800C (en) | 2002-02-12 | 2003-03-04 | Biometric identification and security system associated with cash register |
Country Status (2)
Country | Link |
---|---|
US (2) | US6883709B2 (en) |
CA (1) | CA2420800C (en) |
Families Citing this family (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7343351B1 (en) | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7953671B2 (en) | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7889052B2 (en) | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
WO2001041032A1 (en) * | 1999-11-30 | 2001-06-07 | David Russell | Methods, systems, and apparatuses for secure interactions |
US6886743B2 (en) * | 2001-02-16 | 2005-05-03 | Ghassan Brikho | System and method for gathering customer information for completing check cashing transactions |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US8279042B2 (en) | 2001-07-10 | 2012-10-02 | Xatra Fund Mx, Llc | Iris scan biometrics on a payment device |
US20040236699A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US7303120B2 (en) | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US20040233039A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | System for registering a biometric for use with a transponder |
US8294552B2 (en) | 2001-07-10 | 2012-10-23 | Xatra Fund Mx, Llc | Facial scan biometrics on a payment device |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US7735725B1 (en) | 2001-07-10 | 2010-06-15 | Fred Bishop | Processing an RF transaction using a routing number |
US7360689B2 (en) | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US7249112B2 (en) | 2002-07-09 | 2007-07-24 | American Express Travel Related Services Company, Inc. | System and method for assigning a funding source for a radio frequency identification device |
US7229013B2 (en) * | 2002-04-17 | 2007-06-12 | American Eps, Inc. | Biometric multi-purpose terminal, payroll and work management system and related methods |
US20080041942A1 (en) * | 2002-04-17 | 2008-02-21 | Aissa Nebil B | Biometric Multi-Purpose Terminal, Payroll and Work Management System and Related Methods |
US20090127328A1 (en) * | 2002-04-17 | 2009-05-21 | Nebil Ben Aissa | Biometric multi-purpose biometric terminal, payroll and work management system and related methods |
JP4366921B2 (en) * | 2002-07-12 | 2009-11-18 | セイコーエプソン株式会社 | Personal verification device, card-type information recording medium, and information processing system using the same |
CA2491662C (en) * | 2002-07-12 | 2015-11-24 | Privaris, Inc. | Personal authentication software and systems for travel privilege assignation and verification |
JP4619119B2 (en) | 2002-08-06 | 2011-01-26 | プリヴァリス・インコーポレーテッド | Method for secure registration and backup of personal identification to an electronic device |
US6892938B2 (en) * | 2002-08-13 | 2005-05-17 | Mandalay Resort Group | Gaming system and method for completing a transaction associated with a gaming machine |
US6805287B2 (en) | 2002-09-12 | 2004-10-19 | American Express Travel Related Services Company, Inc. | System and method for converting a stored value card to a credit card |
US7542945B2 (en) * | 2003-01-15 | 2009-06-02 | Sanmina-Sci Corporation | Authentication device, system and methods |
US20040215574A1 (en) * | 2003-04-25 | 2004-10-28 | First Data Corporation | Systems and methods for verifying identities in transactions |
CA3012154A1 (en) | 2003-05-30 | 2004-12-16 | Apple Inc. | An in-circuit security system and methods for controlling access to and use of sensitive data |
US8698117B2 (en) | 2003-07-01 | 2014-04-15 | Transitions Optical, Inc. | Indeno-fused ring compounds |
US7341181B2 (en) * | 2004-07-01 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Method for biometric security using a smartcard |
US7314164B2 (en) * | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | System for biometric security using a smartcard |
US7318550B2 (en) | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US8472046B2 (en) * | 2005-03-11 | 2013-06-25 | Avery Dennison Corporation | Printer systems and methods for global tracking of products in supply chains, authentication of products, and connecting with customers both before, during, and after a product sale |
WO2006099123A2 (en) * | 2005-03-11 | 2006-09-21 | Avery Dennison Corporation | Method of processing a ticket order |
CA2592749C (en) | 2005-03-24 | 2015-02-24 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
US20060287065A1 (en) * | 2005-06-15 | 2006-12-21 | De La Rue International, Ltd. | Value token dispensing system and method |
US20060293891A1 (en) * | 2005-06-22 | 2006-12-28 | Jan Pathuel | Biometric control systems and associated methods of use |
US7878409B2 (en) * | 2005-12-09 | 2011-02-01 | Shoplogix Inc. | System and method for verifying identity during data entry with a barcode scanner |
US8345931B2 (en) | 2006-02-10 | 2013-01-01 | The Western Union Company | Biometric based authorization systems for electronic fund transfers |
KR101176230B1 (en) * | 2006-05-26 | 2012-08-22 | 엘지전자 주식회사 | Method for managing the operation of a laundry room machine |
US20080142589A1 (en) * | 2006-12-13 | 2008-06-19 | Cummings Scott A | One Touch Purchase Device and System |
US7696869B2 (en) * | 2007-04-05 | 2010-04-13 | Health Hero Network, Inc. | Interactive programmable container security and compliance system |
WO2009042392A2 (en) | 2007-09-24 | 2009-04-02 | Apple Inc. | Embedded authentication systems in an electronic device |
US8117127B1 (en) * | 2008-11-25 | 2012-02-14 | Bank Of America Corporation | Currency recycler user roles |
US8102246B2 (en) * | 2009-01-02 | 2012-01-24 | International Business Machines Corporation | Resetting a target device |
WO2011131154A1 (en) * | 2010-04-21 | 2011-10-27 | Leung Yim Mui | Wireless cash register |
US8738480B2 (en) * | 2010-12-08 | 2014-05-27 | Xerox Corporation | Virtual electronic paymaster method and system |
US8493588B2 (en) | 2010-12-13 | 2013-07-23 | Eastman Kodak Company | Method of identifying user of scanning apparatus |
US8456655B2 (en) | 2010-12-13 | 2013-06-04 | Eastman Kodak Company | User identification for scanning apparatus |
CN102529162A (en) * | 2012-02-15 | 2012-07-04 | 蚌埠市振华包装机械有限责任公司 | Automatic alarm device of integral molding machine for paperboards |
CN111178332A (en) | 2012-05-18 | 2020-05-19 | 苹果公司 | Device, method and graphical user interface for manipulating a user interface |
US20140253286A1 (en) * | 2013-03-06 | 2014-09-11 | James S. Bianco | Wireless Tracking and Security System |
US9824402B2 (en) * | 2014-04-23 | 2017-11-21 | Vivint, Inc. | Time clock for tracking employees |
US10868672B1 (en) | 2015-06-05 | 2020-12-15 | Apple Inc. | Establishing and verifying identity using biometrics while protecting user privacy |
US11140171B1 (en) | 2015-06-05 | 2021-10-05 | Apple Inc. | Establishing and verifying identity using action sequences while protecting user privacy |
JP6367768B2 (en) * | 2015-06-30 | 2018-08-01 | 東芝テック株式会社 | Product sales data processing apparatus and program |
US10559040B2 (en) | 2015-10-16 | 2020-02-11 | The Adt Security Corporation | Security system that tracks employees on site and hours worked |
US10621584B2 (en) * | 2016-03-16 | 2020-04-14 | Clover Network, Inc. | Network of biometrically secure devices with enhanced privacy protection |
US9619804B1 (en) * | 2016-03-16 | 2017-04-11 | Clover Network, Inc. | Network of biometrically secure devices with enhanced privacy protection |
US10579979B2 (en) * | 2017-09-20 | 2020-03-03 | Paypal, Inc. | Dynamically adjusting visual codes displayed on a device |
WO2021217134A1 (en) * | 2020-04-24 | 2021-10-28 | Tidel Engineering, L.P. | Systems and methods for improving cash management system operation |
US20230316254A1 (en) * | 2022-03-29 | 2023-10-05 | Shopify Inc. | Method and system for customer responsive point of sale device |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3576538A (en) | 1969-04-14 | 1971-04-27 | Identimation Corp | Finger dimension comparison identification system |
US4690554A (en) | 1986-12-01 | 1987-09-01 | Froelich Ronald W | Fingerprint identification device |
US5073949A (en) | 1989-03-16 | 1991-12-17 | Kabushiki Kaisha Toshiba | Personal verification apparatus |
US5484988A (en) * | 1992-11-13 | 1996-01-16 | Resource Technology Services, Inc. | Checkwriting point of sale system |
JPH06274759A (en) * | 1993-03-18 | 1994-09-30 | Fujitsu Ltd | Cash register |
US5615277A (en) | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
US6192142B1 (en) | 1994-11-28 | 2001-02-20 | Smarttouch, Inc. | Tokenless biometric electronic stored value transactions |
US6202055B1 (en) * | 1996-08-21 | 2001-03-13 | Image Data, Llc | Positive identification display device and scanner for low cost collection and display of graphic and text data in a secure manner |
JP2785862B2 (en) | 1995-10-16 | 1998-08-13 | 日本電気株式会社 | Fingerprint card selection device and fingerprint card narrowing device |
US6148094A (en) | 1996-09-30 | 2000-11-14 | David J. Kinsella | Pointing device with biometric sensor |
US6164528A (en) * | 1996-12-31 | 2000-12-26 | Chequemark Patent, Inc. | Check writing point of sale system |
US6999936B2 (en) * | 1997-05-06 | 2006-02-14 | Sehr Richard P | Electronic ticketing system and methods utilizing multi-service visitor cards |
US6208264B1 (en) | 1997-05-23 | 2001-03-27 | Automated Identification Service, Inc. | Personal verification in a commercial transaction system |
US6185318B1 (en) | 1997-08-22 | 2001-02-06 | International Business Machines Corporation | System and method for matching (fingerprint) images an aligned string-based representation |
US6241288B1 (en) | 1998-04-02 | 2001-06-05 | Precise Biometrics Ab | Fingerprint identification/verification system |
US6219439B1 (en) | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
US6522772B1 (en) * | 1998-09-30 | 2003-02-18 | Ncr Corporation | Self-service checkout terminal having a biometric sensing device for verifying identity of a user and associated method |
US6028950A (en) | 1999-02-10 | 2000-02-22 | The National Registry, Inc. | Fingerprint controlled set-top box |
US6950540B2 (en) * | 2000-01-31 | 2005-09-27 | Nec Corporation | Fingerprint apparatus and method |
US6611881B1 (en) * | 2000-03-15 | 2003-08-26 | Personal Data Network Corporation | Method and system of providing credit card user with barcode purchase data and recommendation automatically on their personal computer |
US20020112177A1 (en) * | 2001-02-12 | 2002-08-15 | Voltmer William H. | Anonymous biometric authentication |
US6644546B2 (en) * | 2002-01-02 | 2003-11-11 | International Business Machines Corporation | System and method for electronic check conversion at a point-of-sale terminal |
-
2002
- 2002-02-12 US US10/074,636 patent/US6883709B2/en not_active Ceased
-
2003
- 2003-03-04 CA CA2420800A patent/CA2420800C/en not_active Expired - Lifetime
-
2006
- 2006-02-24 US US11/362,563 patent/USRE42734E1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
US20030150911A1 (en) | 2003-08-14 |
USRE42734E1 (en) | 2011-09-27 |
CA2420800C (en) | 2016-07-19 |
US6883709B2 (en) | 2005-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2420800C (en) | Biometric identification and security system associated with cash register | |
US5416306A (en) | Method for comparing and verifying security codes at point of sale | |
US6011858A (en) | Memory card having a biometric template stored thereon and system for using same | |
US6273334B1 (en) | Electronic-money rewarding system for lost and found IC card | |
US6182894B1 (en) | Systems and methods for authorizing a transaction card | |
US6615194B1 (en) | System for secure execution of credit based point of sale purchases | |
EP0803828B1 (en) | Electronic money recovering system | |
US20030216997A1 (en) | Financial cards | |
JPH079678B2 (en) | Electronic cash register | |
JPS59151261A (en) | Dealing securing system | |
US20050125363A1 (en) | System and method for authorizing transactions | |
JPS60502126A (en) | Systems with administrative access and how they operate | |
JPH0337786A (en) | Prepaid card issuing and account-settling system | |
US6412690B1 (en) | Credit card security method and credit card | |
JP3300498B2 (en) | Service data processing device using receipt | |
JPS6235892A (en) | Shopping card | |
JPH096864A (en) | Immediate membership system telephone betting system | |
JPS58142477A (en) | Transaction processor | |
JPH10188091A (en) | Prepaid card system using ic card | |
CA2206631C (en) | Electronic-money collecting system | |
JP2611218B2 (en) | Small data processing device | |
JPS6061862A (en) | Individual collating device | |
JPH04127289A (en) | Multifunctional ic card system provided with authorization and prepaid function | |
JP3162545B2 (en) | Commuter pass processing device and commuter pass processing method | |
JP3045436U (en) | Prepaid card for pachinko machine and use management device for this prepaid card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20230306 |