当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

电子商务中的智能卡技术(PPT讲稿)Smart Card Technology in Electronic Commerce

资源类别:文库,文档格式:PPT,文档页数:142,文件大小:4.69MB,团购合买
Part 1 Card Technology Part 2 Card Security
点击下载完整版文档(PPT)

Part 1 Card Technology

Part 1 Card Technology

Card Era credit cards have become part of our daily life as forms of plastic money since its first launch in 1960 a magnetic card verse a smart card

Card Era credit cards have become part of our daily life as forms of plastic money since its first launch in 1960 a magnetic card verse a smart card

Magnetic Card composed of a layer of magnetic material for storing information easy to carry can be use for authentication what is its principles

Magnetic Card composed of a layer of magnetic material for storing information easy to carry can be use for authentication what is its principles?

Information on Magnetic Card the stri Ibe IS p 8.5cmⅩ1.2cm data is constructed In Case of Inquiries, please contact Dr L.M. Cheng based on iso Department of Electronic Engineering. 7811/2 City University of Hong Kong 83 Tat Chee Avenue, Kowloon, Hong Kon Tet:(852)27887778 Fax:(852)27887791 Email: EELCHENGe CITYU EDU. HK maximum 3 stripes can store around IK bits

Information on Magnetic Card the stripe is 8.5cm X 1.2cm data is constructed based on ISO 7811/2 maximum 3 stripes can store around 1K bits

ISO Standards Based on Iso 7811 Track I is developed by International Air Transportation Association (IATA) which contains adaptive 6-bit alphanumerical characters Track 2 is used by American Bankers Association (ABA) which stores 4-bit numerical information containing identification number and control information Track 3 is originated by Thrift Industry which contains information which is intended to be updated with each transaction

ISO Standards Based on ISO 7811 Track 1 is developed by International Air Transportation Association (IATA) which contains adaptive 6-bit alphanumerical characters Track 2 is used by American Bankers Association (ABA) which stores 4-bit numerical information containing identification number and control information. Track 3 is originated by Thrift Industry which contains information which is intended to be updated with each transaction

250 TRACK I ATA ANSI X4.162 1983/ ISO 3554 TRACK 2 ABA ANSI X4. 16? 1983 ISO 3554 TRACK 3 THRIFT ANSI X4. 162 1983 SO3554 00 Track 1 sIFC⊥ PaNFS⊥ NAMEFS Additional DataES LRC Primary Acc Expiry Date alphanumeric Restriction or Type 3 (19 digits max characters max) Offset or PvN 5 Lss」 Start Sentinel%LFC」 Format Code FS] Field Seperator( ES End Sentinel? LRC] Longitudinal Redundany Code Track 2 SS FC⊥ PANFS Additional data LRC Expiry Date Restriction or Type 3 (19 digits max) Offset Or pvn 5 Discretionary Data 「 ss Start Sentinel;「 fc format Code FS] Field Seperator=ES] End Sentinel?LRC Longitudinal Redundany Code Magnetic stripe Content of Financial Cards

TRACK 1 TRACK 2 TRACK 3 IATA ANSI X4.16 ? 1983 ISO 3554 ABA ANSI X4.16 ? 1983 ISO 3554 THRIFT ANSI X4.16 ? 1983 ISO 3554 0.223? 0.110? 0.110? 0.110? Track 1 SS FC PAN FS NAME FS Additional Data ES LRC Primary Acc. No. (19 digits max.) Name (26 alphanumeric characters max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data Track 2 FC SS PAN FS Additional Data ES LRC Primary Acc. No. (19 digits max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data SS Start Sentinel % Format Code FS Field Seperator { ES End Sentinel ? LRC Longitudinal Redundany Code SS Start Sentinel ; FC Format Code FS Field Seperator = ES End Sentinel ? LRC Longitudinal Redundany Code 3.250? FC Magnetic stripe Content of Financial Cards

Capacity Track Record density bits/inch Capacity 210 79(7 bits/char) 23 75 40(5 bits/char. 210 107(5 bits/char)

Capacity Track Record density bits/inch Capacity 1 210 79 (7 bits/char.) 2 75 40 (5 bits/char.) 3 210 107 (5 bits/char)

fraud card activities Stealing A legal card may be stolen and used in ATMs or EPoss Altering and re-embossing a genuine card, that is modifying the visual features of card Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket

Fraud card activities ⚫ Stealing — A legal card may be stolen and used in ATMs or EPOSs. ⚫ Altering and re-embossing a genuine card, that is modifying the visual features of card. ⚫ Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit. ⚫ Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket

Copying of data from a genuine card to another in an on-line fashion white plastic fraud? Counterfeiting --color plastic fraud may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion

• Copying of data from a genuine card to another in an on-line fashion ⎯ “white plastic fraud” • Counterfeiting — “color plastic fraud” may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion

Valid card VISAGOLD Fraud Card 2等:

Valid Card Fraud Card

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共142页,可试读30页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有