Point-of sale mechanism

ABSTRACT

A secured point-of-sale mechanism is disclosed in which there is a closable two compartment housing having an unsecured door portion covering a monetary negotiable instrument section disposed within a secured portion for which a transaction price index is set to the correct sales amount purchased by a customer, wherein a plurality of switching mechanisms are actuated by the negotiable instruments in the negotiable instruments section for which a locking mechanism connected to said plurality of switching mechanisms and disposed between the secured and unsecured portions of the housing is actuated against invasion as long as the plurality of switching mechanisms are actuated.

FIELD OF THE INVENTION

This invention relates to the field of a point-of-sale device and moreparticularly to one in which all of the transactions are completedwithout possible outside intervention.

This invention is directd to a cost-effective, OEM address-o-graph stylemechanism designed to utilize several types of existing credit cardssuch as a "PIN/ALGORITHM" of verifiable consumer oriented point-of-saleformat plus all types of checks using Fed. MICR system.

The mechanism operates in a highly desirable mode by locking both thecard, the invoices, and any other negotiable instruments during theentire transaction. That is, any attempts to interfere with thetransaction creates an abort and the system returns to its status quo.It gives the retailer badly needed security with minimum expenditures.

Its expandable modular options permit verification of travelers checks,smart card capability, and lost or stolen credit card verification. Thesystem can utilize several algorithm security codes simultaneously andcan be programmed to give regional or local protection.

BRIEF DESCRIPTION OF THE PRIOR ART

One applicable reference is that of Wolfgang J. Wostle entitled"Automated Dispensing System", U.S. Pat. No. 3,786,421 is directed to apersonal identification code number that is used to insure that theparty making the transaction is the person he claims to be.

Another reference that is relevant is U.S. Pat. No. 4,453,074 entitled"Protection System for Intelligent Cards" by Stephen B. Weinstein whichmakes use of a smart card with encrypted material using a private keythat is associated with a public key.

Another reference which is relevant is that of U.S. Pat. No. 4,439,670,entitled "Method and Device for The Checking of The Number of AccessAttempts To An Electronic Store, Notably That Of An Integrated CircuitOf An Object Such As A Credit Card Or A Buyer's Card" by Jean-ClaudeBasset et al. This reference makes use of codes compared upon reaching apredetermined number of rejections in which the card then becomesdisabled.

SUMMARY OF THE INVENTION

The herein disclosed invention is comprised of a secured point-of-salemechanism having a closeable two compartment housing which in turn hasan unsecured door portion covering a monetary negotiable instrumentsection disposed within a secured portion for which a transaction priceindex is set to the correct sales amount purchased by a customer. Aplurality of switching mechanisms are actuated by the negotiableinstruments in the negotiable instruments section for which a lockingmechanism, connected to said plurality of switching mechanisms anddisposed between the secured and unsecured portions of the housing, isactuated against invasion as long as the plurality of switchingmechanisms are actuated.

It is therefore a general object of this invention to provide a securedpoint-of-sale mechanism that is secured against invasion from theoutside.

It is another object of this invention to provide a securedpoint-of-sale mechanism that is connected to a micro-processor thatcompletes all transactions while the mechanism is secured.

It is yet another object of this invention to abort any transactionwhile the mechanism is secured where invasion from the outside occurs.

It is a further object of this invention to use all forms of negotiableinstruments at the point of sale and secure the transaction takingplace.

It is still another object of this invention to provide a printed recordof the transaction taking place at the point of sale.

It is still another object of this invention to provide a lock disablingmechanism actuated upon the printing mechanism printing a record of thetransaction taking place.

These and other objects and advantages of the invention will more fullyappear from the following description, made in connection with theaccompanying drawings, wherein like reference characters refer to thesame or similar parts throughout the several views, and in which:

FIG. 1 is an isometric view of the point of sale device;

FIG. 2 is an isometric view of the invention with the cover broken away;

FIG. 3 is a sectional view of the invention taken along lines 3--3 ofFIG. 1;

FIG. 4 is a schematic diagram of the components of the invention;

FIG. 5 is a partial side section of the invention taken along lines 5--5of FIG. 1;

FIG. 6 is a partial rear section of the invention taken along lines 6--6of FIG. 1;

FIG. 7 is a sectional view of the printing mechanism in its lowerposition;

FIG. 8 is a sectional view of the printing mechanism in its upper orprint position;

FIG. 9 is a diagramatic view of a check;

FIG. 10 is a diagramatic view of a travelers check;

FIG. 11 is a diagramatic view of a modified travelers check;

FIG. 12 is a diagramatic rear view of the modified travelers check;

FIG. 13 is a partial side view of the read head detection mechanisms;

FIG. 14 is a diagramatic view showing both top and bottom views of theuse of credit cards, checks, invoices, and travelers checks;

FIG. 15 is a diagramatic view of the use of credit cards, checks,invoices and travelers checks with appropriate PIN'S and detectiondevices; and

FIG. 16 is a diagramatic view of the mechanism for detecting travelerschecks.

DETAILED DESCRIPTION OF THE INVENTION

The sturdy main case of the device, 1-1, is formed of metal andskillfully designed to be aesthetically pleasing with careful attentionto color coordination and physical refinements. The case, along with theheavily constructed steel cover, 1-2, protects the internal electronicsfrom harmful magnetic and RF fields, dirt, corrosion, etc., as well asproviding system integrity from vandalism, abuse, tampering, and so on.Reference to the first number goes to the Figure and the second numbergoes to the identification or reference number in that Figure. Thecover, itself a vital part of the printing process, hinges upward at 1-4exposing the retailer-operated functions. Lamps 1-3 are "conditionlights" relating systems and procedures statuses. Switch 1-5 is the mainpower switch controlling both mainframe and all outboard module current.Indicator 1-23 displays the total sale to the operator equally well inall light, from direct sunlight to total darkness.

FIG. 2 shows the device with the cover, 2-2, removed although the systemcannot be operated in this condition as explained later. A customarymanual "purchase amount" matrix is pictured at 2-12 with its associatedmanual control at 2-10. However, an alternative electronicallycontrolled matrix using a numeric keyboard at 2-10 may prove morereliable and workable in conveying sales amounts and other informationto the outboard modules. The retailer's identification number is printedby his cast matrix 2-13 on an invoice, 2-8. The customer's credit card,2-7, is placed face up in its normal position (the positioning guides15-72 may be replaced by a recession slightly larger than the size ofthe card) directly over the verifier access door, 2-6, located beneaththe invoice and the card. The verifier access door is actually a part ofthe verifier traction mechanism, as shown in 2-24, and more particularlyas disclosed at 5-24 and 6-24. The cover, 1-2, fits down over the maindeck housing 2-37, and onto the rabbet, 2-11 activating thenon-defeatable cover switches, 2-15, (only one shown in FIG. 2) and inthis closed position is able to be secured by the locking pins shown as2-9. These locking pins fit into recesses in the lid at 3-22.

FIG. 3 shows the printing mechanism consisting of a slightlyconvex-shaped steel "spring plate" 3-14 mounted into the cover 3-2, aheavy, rigid "printer plate" 3-19 and the print actuator, 3-17. When allsecurity and transaction conditions have been correctly met, theactuator carries the "floating" matrices 2-12, 2-13 and the credit cardupward and squeezes them and the invoice between plates 3-14 and 3-19 toprint the invoice. The convex shape of the spring plate "rolls" theprinting process to the outside edges of the invoice assuring clearprinting.

Closing the cover automatically signals the onboard CPU to ask thefollowing (and other) questions: (A) Is the cover locked (signified bythe 3-20 solenoids being engaged)? (B) Is there a valid smart cardinserted at 4-66 or a credit card and invoice present (proper responsesfrom 3-18 and 3-18A)? (D) Does the purchase-price matrix mechanism(3-16) show an entry? (E) Does the PIN entered by the customer match theone interpolated by the onboard algorithm decryption systems from thecard mag-stripe or the smart card? (F) Does the search reveal aterminated, stolen, counterfeit or over-extended card? Only if allquestions are correctly answered will the CPU allow completion of thetransaction. Completion involves recording of the transaction, chargingthe smart card the appropriate amount (and recording same) and actuationof the print mechanism, 3-17, moving it upward to print the invoice.When the print mechanism has cycled, the cover automatically pops openwhich clears the computer and the process begins again.

FIG. 3 also shows the relative position of the matrix control mechanism,3-16, to the print plate, 3-19, and the cover solenoid lock mechanism,3-20, which slides the large steel pins, 2-9, into the recesses shown at3-22.

FIG. 4 shows the positioning of the security electronics in the heavymetal drawer, 4-28. This drawer completely encloses the vital securityand interface modules and protects them from outside probing, tamperingand vandalism. The security drawer is externally locked by a highquality lock, 4-27, and when fully inserted into the system mainframe,connects with associated internal electronics via a reliable multi-pinconnector, 4-29. The wide flange on the drawer, 4-26, assures that thesecurity modules 4-39 will disconnect from 4-29 and destroy themselves(via self-destruct circuitry) before any probes can be introduced intothe module area. Each 4-39 module contains electronics (and algorithmdecryption circuits) unique to each card or check issuer.

The actual transaction printing process begins when the retailer liftsthe normally unlocked cover, 1-2. Lifting the cover off the switches at3-15 (3-15A) triggers the security systems and alerts the electronics(CPU) to receive the customer's personal identification number (PIN)which is conveniently entered on the numeric keyboard FIG. 4-44.Meanwhile, and not necessarily in this order, the retailer will enterthe purchase price at 2-10 or 4-64 which will read out automatically tothe customer and the retailer at 2-23 and 4-65 and 4-40, and insert thecredit card and the invoice in the system which triggers the"card/invoice present" switches at 3-18 and 3-18A. Insertion of a validsmart card in slot 4-66 overrides the "card present" function of 3-18but not the "invoice present" function of 3-18A.

Rather than having separate housings for the PIN keyboard 4-45 and the"smart card reader" 4-64 as shown, the units could be contained in themain housing unit 1-1 to eliminate the need for outboard mechanisms.

When the cover (1-2) is closed for the verification and print cycle, apreset tension of the print plate 3-19 squeezes the card and/or invoiceagainst the spring plate (3-14) just hard enough to insure properoperation of the "card/invoice present" switch and to offer cardstability during the mag-stripe scan but not hard enough to print.

When the retailer closes the cover to print the invoice, the 3-15(3-15A) switches activate the solenoid cover locks and signal the CPU tobegin the system analysis and card verification functions. The creditcard, invoice and purchase price matrix remain locked under the coveruntil either (A) the succesful verification and transaction cycle opensit, or (B) the transaction is aborted due to a security breach in thesystem or a premature removal of the smart card, or (C) the transactionis terminated because an incorrect PIN is detected or not receivedwithin 30 seconds, a smart card reveals insufficient funds, or a systemsearch reveals an invalidated, bogus or stolen card has been presented.Any detected fault will automatically abort the transaction and thecover will unlock and open without printing the invoice and/or chargingthe purchase to the smart card.

FIG. 5 illustrates the system's mag-stripe scanning mechanism. Thisfigure is a side view showing the credit card, 5-7, being held in placeby the curved spring-plate 5-14 and the recess in the printer-plate deckhousing, 5-37, which limits the card's lateral movement. Since printingpressure need only be applied beneath the card's embossments at 5-38,the retailer's matrix (2-13) and the purchase-amount matrix 2-12, theprint plate 5-19 leaves the card's mag-stripe readily exposed forscanning by the mag-stripe reader, 5-36 and MICR read head 4-76. Duringscanning, the reader's traction unit, 5-24, 6-24, moves read head 5-36and MICR read head 4-76 from left to right following a precision pathafforded by a ball bearing and track system, 5-34 and 6-34. The readhead scans all three tracks of the mag-stripe simultaneously and theCPUs decipher appropriate information and automatically select thecorrect security module 4-39 to deal with the PIN verification process.If the correct module is faulty, damaged or non-existent, or if thecustomer has entered the wrong PIN, the transaction is aborted and thecover opens automatically resetting the machine. This allows anotherattempt for the correct PIN by the customer or easy removal of the cardand invoice.

The mag-stripe reader 6-36 is assured effective and reliable contactwith the mag-stripe by "floating" over the stripe with the aid of asensitive suspension system, 6-35, which allows operation in anyattitude. The read head begins its course in almost direct contact withthe mag-stripe due to its location in relation to the card and theverifier access door, 6-6 and 2-6. This access door immediately precedesthe read head on its path across the mag-stripe and returns with it tooffer secure protection against dust, intrusion and vandalism.

FIG. 4 illustrates the customer's PIN entry keyboard module, that has amain housing, 4-45. The keyboard, 4-44, uses reliable, long-life,magnetic contact keys resistant to dust, moisture, sunlight, most commonsolvents and cleaners and reasonable abuse. A purchase amount display,4-40, which matches the mainframe display 1-23 allows the customer andthe retailer to monitor the purchase amount being selected by theretailer on the print matrix. The keyboard is connected to the main bodyby means of a high quality multi-conductor cable, 4-43.

FIGS. 7 and 8 are more detailed drawings of the print actuator mechanismpreviously shown as 3-17. It consists of two cam wheels, 7-51, driven inopposite directions by means of gear teeth. Both are driven by the cammotor 7-48, through its drive shaft (7-49) and cam drive gear (7-50).Each cam wheel gear (7-51) has two "high" lobes and two "low" lobesindicated by "H" and "L" markings respectively. These lobes are "timed"so that all four print-plate lift wheels, 7-52, center on either H or Lpositions simultaneously to achieve equal lift throughout the printcycle. Only one-half revolution of each cam-wheel is required tocomplete each print cycle so the cam motor (7-48) may be gear (speed)reduced to achieve a slow enough rotation and adequate torque to liftthe print-plate through its cycle. The 7-51 cams, the print-platesupport body, 7-58, and the cam table (ball) bearing (7-56) and bearingrace (7-55) are all precisely aligned by the two cam shafts, 7-53. Theseshafts drift upward with the print-plate and its support mechanisms (andthe matrices) while the cam gears and table bearings remain firmlyseated on the main-frame body represented by 7-54. The print-platesupport body is constructed so as to allow sufficient clearance for thepurchase-price matrix assembly (7-16).

Regarding the check verification function, suppose an unknown customerfrom Montana, for example, would find himself in Florida without cash orcredit cards. The customer would present his check to the retailer withthis system. The retailer would insert it in the proper fashion into thesystem, enter the check amount at the keypad (2-10) and close the lid.The retailer would then press the "verify" button on top of the system(in the verification mechanism, FIG. 5 and 6, which would "read" theMICR information and compare the offset or PVV number and subsequent PINwith the PIN entered by the customer at 4-44. If the PINS match, then thCPU would activate the "Phone in Verification Module" which wouldinclude a suitable modem for an AT&T hook-up with the Fed's MICR system.This would connect the system to the customer's own bank and the checkcould be verified for sufficient funds and proper I.D. If all iscorrect, the system would stamp the word "Verified" on the check and thelid would pop open resetting the machine for the next transaction.

This invention anticipates the use of checks as they currently existusing the Fed MICR system. However, a modified check may be used in thefuture which is a standard check save for the addition of an "NCR" (nocarbon required) slip on the back entitled D-8 and a mag-stripe adheredto the front labeled D-17/D-18 shown in FIG. 11. The NCR page wouldinclude the amount of the check, D-16 and the serial number of the checkD-15 as well as the company's logo and other regulated information. Itmay or may not include the duplication of the payer's signature andcountersignature, D-11 and D-13. However, it would naturally reproducethe Payee's name, D-12, and the date, D-14. D-11 and D-13 could possiblybe obscured by a vision blocking ink screen such as seen on commonpersonal checks with NCR pages.

FIG. 3 shows the printing mechanism consisting of a convex shaped, steel"spring plate" (3-14) mounted in the cover (3-2), with a correspondingflat steel "print plate" (3-19) and the print propulsion system oractuator shown as 3-17. When all security, verification and transactionconditions have been correctly met, the 3-17 actuator carries theappropriate embossments and matrices upward and squeezes them and theinvoice or check between plates 3-14 and 3-19 thereby printing theinformation on the check or invoice. The convex shape of the springplate "rolls" the printing process to the outside edges of the invoiceassuring legible reproduction. This "squeezing" method eliminates the"shearing" action of many common printers and the problems associatedtherewith.

When the cover (1-2) is closed for the verification and print cycle, apreset tension of the print plate and/or spring plate (3-19 and/or 3-14)squeezes the card and invoice or traveler's check, personal check,Government check (all types), food stamp etc., against the spring plateand/or print plate just hard enough to insure proper operation of the"card/invoice/check present" switches and to offer card stability duringthe mag-stripe or MICR scan but not hard enough to print.

All security sensors and devices relating in any way to the systemMain-frame and its modules are continually being monitored by theirassociated CPU's to insure uninterrupted integrity of the system deviceand the algorithm modules located at 4-39. Back-up battery powerprovided by the system main-frame will have its own internal charger toassure power should the AC line fail.

The 4-39 security modules will be powered during shipment to individualsystem locations by their own inboard lithium batteries (or suitablesubstitute) and will have the ability to monitor their own securityduring said transit. Should modules sense serial scanning, X-rays,infra-red rays (used for disarming, etc.), or other types of "electronictampering" designed to disarm security or otherwise compromise theintegrity of the security modules, the battery will "dump" andneutralize the security module. This battery power will last a minimumof ninety (90) days from date of manufacture and should the ninety dayspass before 4-39 module is installed, it will automatically "dump" thesecure algorithm chips. The security chip will destroy itselfautomatically upon any interference of power.

OPERATION/TRANSACTION/VERIFICATION/PRINT CYCLE

The actual transaction/verification/print cycle begins when the retailerlifts the (normally closed) cover, 1-2, to insert the credit card,invoice, check, food stamp, etc. Lifting the cover off thenon-defeatable switches at 3-15 far enough (this is a two stage switchas will be explained later) alerts the system's CPU to begin a thirty(30) second countdown in which the customer must enter his PIN number atthe keypad (4-44).

The retailer will enter the purchase price amount at 2-10 (or if a smartcard is being used, 4-64) which automatically sets the entered amount at2-12 which then reads out to the customer and the retailer at 4-40 and2-23 and 4-65, only if a smart card is being used.

The retailer will insert the credit card, travelers check, personalcheck, food stamp and/or invoice in the system at their proper locationas seen by Figure 15. These will be held in place prior to spring platepressure by the retractable pin guides, 13-72 and 15-72, guides at 15-88(or the alternative slot 16-91 and/or appropriate recesses in the deckhousing. It consists basically of a lengthened 14-70 reader housingthereby creating a slot or groove long enough to insert the entire(long) edge of a 15-78 check. It may in fact be long enough for commonlarger checks such as payroll checks, etc. This groove 16-91 in the16-6A verifier access door insures reliable reading of the MICR line andall tracks of the credit cards. This is accomplished since properinsertion by the retailer will necessarily eliminate folds and wrinklesin checks and food stamps and may even accomodate minor tears anddestruction of the MICR line area. The "bottom" of the 16-91 groove willcorrespond to the location of the 15-88 guides. Obviously, the 15-36 and15-76 heads will begin and end their read cycle in the same locationseen as 14-77.

Triggering the 15-18 switch tells the CPU that a card is present and toswitch to "Card Mode." The CPU will automatically select the mag-stripereader head (15-36) and all "Card Mode" verification systems andfunctions. The 15-18 switch may be overridden by the 4-94 slot switchindicating a smart card is present. Triggering of both switches 4-94 and15-18, will cause an abort. Triggering of either the 4-94 switch or15-18 without proper triggering of 15-18A, indicating an invoice ispresent will cause an abort. Triggering of switch 15-86 in conjunctionwith either 4-94 slot switch or switch 15-18 will cause an abort.

Triggering the 4-94 slot switch tells the CPU that a "smart card" ispresent and to switch to the "Smart Card" mode. The CPU willautomatically cancel the "cycle command" of the verifier head tractionmechanism (4-24) since its function is not necessary in the "Smart Card"mode. Additionally, the CPU will automatically select all "Smart Card"verification and transaction functions with respect to record keeping,printing of the invoice, etc. Triggering of the 4-94 slot switch demandsthat an invoice be present and that the 15-86 not show a check present.A violation of either condition will cause an abort.

Triggering of switch 15-86 signals the CPU that a "check" is present andto switch to the "Check Mode." ("Check" shall mean traveler's checks,government checks, personal checks, food stamps or any means of monetarypayment which utilizes the Federal Reserve Bank's MICR system.) The CPUwill automatically select the 15-76 MICR reader head and all "check"verification systems and functions which shall include the phone-inmodule, the diskdrive, etc. Simultaneous triggering of the 4-94 slotswitch, the 15-18 or the 15-18A with the 15-86 will cause an abort ofthe T/V/P Cycle.

Triggering the 15-18A signals the CPU that an invoice is present. Itmust be triggered with the 4-94 slot switch or the 15-18 to becomeusable information to the CPU.

After the retailer has inserted the proper combination of invoice, card,and check and has made the proper keypad entries, he will close the 1-2lid to begin the T/V/P Cycle. (Note: As mentioned in the first paragraphof the T/V/P Cycle text, the 3-15 switch is a dual function device. Thetwo functions shall be entitled "3-15" and 3-15A." When the 1-2 cover isin its "rest" position between transactions, neither 3-15 or 3-15A isactivated. Lifting the cover off the 3-15 switch triggers the CPU toreceive the customer's PIN entry within 30 seconds. Once triggered, the3-15 then becomes inert until the next cycle begins. Closing the 1-2 lidwith the application of 6 oz. of pressure or more then triggers the3-15A function which signals the CPU to begin the entire T/V/P Cycle.)When the 3-15A switch is triggered, the CPU then begins to ask a seriesof questions. All questions will be on an "if `yes,` proceed" and an "if`no,` abort" basis. "Abort" shall mean that the 1-2 cover will "pop"open and the system will not have printed the invoice or caused anyfunds to be transferred in any way whatever. One option may be that anattempted purchase with a proven lost, stolen or counterfeit check orcard will be recorded with the date, account number and dealer I.D.number (for location) to help the police in the apprehension ofcriminals.

(1) Does the system have standard 110 v. (220 v. for export) power? Thisshall be within the limits described elsewhere. If `yes,` proceed - if`no,` abort . . .

(2) Is the 1-2 cover locked as signified by the 3-20's being engaged?

(3) Are any of the onboard/outboard security systems or any of the 4-39module security systems compromised?

(4) What mode is the system to function in as designated by responsesfrom 15-18, 15-18A, 15-86 and 4-94 slot switches.

(5) Does the purchase price matrix mechanism (3-16, 15-10, 15-12) showan entry?

(6) Has a verified correct PIN number been entered at 4-44 within the 30second time limit? The 30 second limit may be modified for more time ifresearch mandates such a change. Verifying the PIN will involvecomparison of the PIN entered by the customer with that computed by the4-39 security modules, the PIN returned from the issuer's computer via aphone in module or verification via the MICR system.

(7) In the case of personal checks does the account the check is drawnon show sufficient funds? The system anticipates the use of PIN's withpersonal checks to identify the writer and bearer of the check to be infact the valid bearerr. Also, a check of the account balance that showssufficient funds would warrant the automatic stamping of "VERI." on thecheck. This would in some degree insure payment to the retailer. The"VERI." stamp is described as either 15-81 or 15-85.

(8) If in the "smart card" mode, does the card show sufficient funds?Does the card show a verified correct PIN entry? Has the card beenprematurely removed from the 4-66 slot as indicated by the 4-94 slotswitch?

The main system CPU keeps a running total of all sales for a given dayor shift and will display them following a predescribed key command at4-23. This display will show the total of funds paid to the retailer bycash, check or credit card at the POS; a separate total of all "EFT"funds transferred to the retailer's account in his bank (as per commonpractice) and a grand total of both.

The 4-39 modules will mount into the 4-28 drawer by sliding intoappropriately spaced slots or "rails" and will be secured in place by asuitable machine screw. When the 4-39's are inserted fully into thedrawer, they make contact via a reliable multi-pin connector with aparallel-wired circuit rail which in turn plugs into the system at 4-29.Thus, all 4-39 modules are wired similarly in parallel or "gangs" andall receive identically the same information. However, when one module"recognizes" its algorithm, processes the input and returns an "accept"signal to the system, the passive output (at this stage) of the other4-39's will not impede the transmission of this "accept" command to thesystem.

FIGS. 13 thru 16 show an alternative design to that discussed so far inthis section. This alternative design more readily accomodatestraveler's checks, personal checks, food stamps, etc. and in factconstitutes refinement and improvement over that system shown in FIGS. 5and 6. A MICR reader device, 14-76, 15-76, and 16-76, such as that incommon use by the Federal Reserve Banking System is installed adjacentto the 13-36 (14-36 and 15-36) magstripe reader head. This is possiblesince the three mag-stripe tracks on common credit cards and the MICRline on all checks are in such close proximity as shown by FIG. 15. Dueto strict Standard's regulations, This phenomenon is likely to remainindefinately. As has been previously stated, the selection of which"head" to use is automatically made prior to verifier movement by thesystem's CPU in association with the switches numbered 15-18, 15-18A and15-86. The position of the MICR, PIN, or offset number on the 15-78check is shown at 15-75A and will be read as a part of the routing andtransit numbers and account numbers preceding it in the MICR line.

FIGS. 14 and 16 show the correct method of inserting the travelerschecks and all instruments with MICR line information to allow MICRreading. They are inserted into the 16-91 slot upside down with the MICRline toward the front of the machine, which means the MICR line must beclosest to the 14-70, 16-70 read-head assembly. Since the 14-70 and16-6A devices are attached forming a single unit, reliable tracking isassured during the entire field of motion.

It will, of course, be understood that various changes may be made inthe form, details, arrangement and proportions of the parts withoutdeparting from the scope of the invention which consists of the mattershown and described herein and set forth in the appended claims.

What is claimed is:
 1. A secured point-of-sale mechanism comprising:(a)a closable two compartment housing having a secured portion including aplurality of signal devices indicating the condition of a plurality ofcircuits contained in said secured portion of said housing; (b) anunsecured door portion cooperating with said secured portion forcompleting said two compartment housing; (c) a monetary negotiableinstrument section disposed within said secured portion having a firstpart for retaining a credit card, a second part for retaining an invoiceof a point-of-sale transaction, a third part for retaining a check for apoint-of-sale transaction, a fourth part for retaining any monetarynegotiable instrument, a fifth part for identifying the payee of saidtransactions, and a sixth part for establishing the transaction sellingprice; (d) a transaction price index settable to the correct salesamount purchased by a customer; (e) a first plurality of switchingmechanisms having a first part fixed in said secured portion of saidhousing and a second part extending into said unsecured portion of saidhousing to be actuated by said unsecured door portion; (f) a secondplurality of switching mechanisms having a first part fixed in saidsecured portion of said housing and a second part extending into saidunsecured portion of said housing to be actuated by a combination ofmonetary negotiable instruments; (g) and a locking mechanism connectedto said plurality of switching mechanisms and disposed between saidsecured and unsecured portions of said housing for securing said housingagainst invasion as long as said plurality of switching mechanisms areactuated.
 2. The invention as set forth in claim 1 including:(h) astandard 8 bit microprocessor capable of accessing 64K bytes of memory;(i) means connecting said plurality of switching mechanisms and saidlocking mechanisms to said microprocessor and upon any one of saidswitching mechanisms not being actuated, said locking mechanism seekingan inoperable position.
 3. The invention as set forth in claim 2including:(j) a printing mechanism having a pair of plates spatiallydisposed about any of said credit cards, invoices, checks or othermonetary negotiable instruments; (k) an actuating mechanism cooperatingwith said printing mechanism for producing an imprinted instrument ofsaid transaction; (l) a lock disabling mechanism connected to saidactuating mechanism and said locking mechanism, said locking mechanismbeing disabled after creating an imprinted monetary negotiableinstrument.
 4. The invention as set forth in claim 3 including:(m) readhead means connected to said microprocessor and disposed adjacent saidcredit card for reading any magnetic code that is detectable in saidcard; (n) read head transport means producing movement of said read headmeans under said credit card as long as said code is being detected bysaid read head.
 5. The invention as set forth in claim 3 including:(m) amonetary negotiable instrument carrying a MICR stripe on its surfacedisposed within said secured portion having a first part for retainingsaid MICR stripe; (n) said monetary negotiable instrument also carryinga magnetic stripe on its surface disposed within said secured portionhaving a first part for retaining said magnetic stripe; (o) read headmeans connected to said microprocessor and disposed adjacent saidmonetary negotiable instrument to read any code impressed therein; (p)PIN identification number entry means connected to said microprocessorfor receiving a PIN number; (q) means including said microprocessorconnecting said read head means and said PIN identification number entrymeans to said printing mechanism and said actuating mechanism saidprinting mechanism to be actuated when said signals are the same.
 6. Theinvention as set forth in claim 3 including:(m) an override mechanism;(n) a smart card key pad connected to said override mechanism havingdetection means for detecting the presence of said smart card; (o) apersonal identification number module having a key tab matrix connectedto said microprocessor, said key tab matrix having been set to match thetransaction amount to be recorded; (p) said override mechanism beingconnected to said micoprocessor for actuating said printing mechanismand said lock disabling mechanism.
 7. The invention as set forth inclaim 3 including:(m) a high strength steel drawer slidable within saidsecured portion of said two compartment housing, said drawer havingindividual electrical compartments for containing said security modules;(n) wide flange means formed on the outside of said steel drawer toengage said two compartment housing; (o) a connector electricallyconnected to said individual electrical compartments in said steeldrawer and to said microprocessor; (p) locking means securing said steeldrawer within said two compartment housing and further securing saidsecurity modules to said steel drawer.
 8. The invention as set forth inclaim 3 including:(m) a first read head connected to said microprocessorand disposed adjacent a first monetary negotiable instrument within saidsection; (n) a second read head connected to said microprocessor anddisposed adjacent a second monetary negotiable instrument within saidsection; (o) a track mechanism for guiding a transport means; (p) firsttransport means producing movement of said first read head over saidtrack mechanism; (q) second transport means producing movement of saidsecond read head over said track mechanisms; (r) means connecting saidfirst and second transport means to said microprocessor and causingmovement of the same as long as a code is being detected by said firstand second read heads.