Part 1 Card Technology
Part 1 Card Technology
Card Era credit cards have become part of our daily life as forms of plastic money since its first launch in 1960 a magnetic card verse a smart card
Card Era credit cards have become part of our daily life as forms of plastic money since its first launch in 1960 a magnetic card verse a smart card
Magnetic Card composed of a layer of magnetic material for storing information easy to carry can be use for authentication what is its principles
Magnetic Card composed of a layer of magnetic material for storing information easy to carry can be use for authentication what is its principles?
Information on Magnetic Card the stri Ibe IS p 8.5cmⅩ1.2cm data is constructed In Case of Inquiries, please contact Dr L.M. Cheng based on iso Department of Electronic Engineering. 7811/2 City University of Hong Kong 83 Tat Chee Avenue, Kowloon, Hong Kon Tet:(852)27887778 Fax:(852)27887791 Email: EELCHENGe CITYU EDU. HK maximum 3 stripes can store around IK bits
Information on Magnetic Card the stripe is 8.5cm X 1.2cm data is constructed based on ISO 7811/2 maximum 3 stripes can store around 1K bits
ISO Standards Based on Iso 7811 Track I is developed by International Air Transportation Association (IATA) which contains adaptive 6-bit alphanumerical characters Track 2 is used by American Bankers Association (ABA) which stores 4-bit numerical information containing identification number and control information Track 3 is originated by Thrift Industry which contains information which is intended to be updated with each transaction
ISO Standards Based on ISO 7811 Track 1 is developed by International Air Transportation Association (IATA) which contains adaptive 6-bit alphanumerical characters Track 2 is used by American Bankers Association (ABA) which stores 4-bit numerical information containing identification number and control information. Track 3 is originated by Thrift Industry which contains information which is intended to be updated with each transaction
250 TRACK I ATA ANSI X4.162 1983/ ISO 3554 TRACK 2 ABA ANSI X4. 16? 1983 ISO 3554 TRACK 3 THRIFT ANSI X4. 162 1983 SO3554 00 Track 1 sIFC⊥ PaNFS⊥ NAMEFS Additional DataES LRC Primary Acc Expiry Date alphanumeric Restriction or Type 3 (19 digits max characters max) Offset or PvN 5 Lss」 Start Sentinel%LFC」 Format Code FS] Field Seperator( ES End Sentinel? LRC] Longitudinal Redundany Code Track 2 SS FC⊥ PANFS Additional data LRC Expiry Date Restriction or Type 3 (19 digits max) Offset Or pvn 5 Discretionary Data 「 ss Start Sentinel;「 fc format Code FS] Field Seperator=ES] End Sentinel?LRC Longitudinal Redundany Code Magnetic stripe Content of Financial Cards
TRACK 1 TRACK 2 TRACK 3 IATA ANSI X4.16 ? 1983 ISO 3554 ABA ANSI X4.16 ? 1983 ISO 3554 THRIFT ANSI X4.16 ? 1983 ISO 3554 0.223? 0.110? 0.110? 0.110? Track 1 SS FC PAN FS NAME FS Additional Data ES LRC Primary Acc. No. (19 digits max.) Name (26 alphanumeric characters max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data Track 2 FC SS PAN FS Additional Data ES LRC Primary Acc. No. (19 digits max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data SS Start Sentinel % Format Code FS Field Seperator { ES End Sentinel ? LRC Longitudinal Redundany Code SS Start Sentinel ; FC Format Code FS Field Seperator = ES End Sentinel ? LRC Longitudinal Redundany Code 3.250? FC Magnetic stripe Content of Financial Cards
Capacity Track Record density bits/inch Capacity 210 79(7 bits/char) 23 75 40(5 bits/char. 210 107(5 bits/char)
Capacity Track Record density bits/inch Capacity 1 210 79 (7 bits/char.) 2 75 40 (5 bits/char.) 3 210 107 (5 bits/char)
fraud card activities Stealing A legal card may be stolen and used in ATMs or EPoss Altering and re-embossing a genuine card, that is modifying the visual features of card Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket
Fraud card activities ⚫ Stealing — A legal card may be stolen and used in ATMs or EPOSs. ⚫ Altering and re-embossing a genuine card, that is modifying the visual features of card. ⚫ Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit. ⚫ Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket
Copying of data from a genuine card to another in an on-line fashion white plastic fraud? Counterfeiting --color plastic fraud may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion
• Copying of data from a genuine card to another in an on-line fashion ⎯ “white plastic fraud” • Counterfeiting — “color plastic fraud” may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion
Valid card VISAGOLD Fraud Card 2等:
Valid Card Fraud Card