SlideShare a Scribd company logo
1 of 17
Magnetic stripe on the back of
Credit card .. !!
Vaishnavi Chigarapalle
Magnetic Stripe
• A magnetic stripe card is a type of card capable of storing data by modifying the
magnetism of tiny iron-based magnetic particles on the band of magnetic material on
the card.
• The magnetic stripe is sometimes called swipe card or magstripe.
• This is read by swiping past a magnetic reading head.
• This is made up of tiny-iron based magnetic particles in a plastic-like film.
• Each particle is really a very tiny bar magnet about 20 millionths of an inch long.
• The magnetic stripe can be written because the tiny bar magnets can be magnetized.
• This can be done either in a north or south pole direction.
• The magnetic stripe on the back of a credit card is similar to a piece of cassette
tape fastened to the back of a card.
• Instead of motors moving the tape so it can be read, our hand provides the motion
as we swipe a credit card through a reader or insert at the gas station pump.
Magstripe Formats
• There are three tracks on a magstripe.
• Each track is .110-inch wide.
• The ISO/IEC standard 7811, which is used by banks, specifies:
– Track one is 210 bits per inch (bpi), and holds 79 six-bit plus parity bit read-only characters.
– Track two is 75 bpi, and holds 40 four-bit plus parity bit characters.
– Track three is 210 bpi, and holds 107 four-bit plus parity bit characters.
• The credit card typically uses only track one and two.
• Track three is a read-write track.
• The read-write track includes an encrypted PIN, country code, currency units, amount
authorized.
• But the usage of track three is not standardized among banks.
Magstrip Formats
Verification and Authentication System.
Track 1
• Track 1 is the only track that may contain alphabetic text, and hence is the only track
that contains the card holder’s name.
• The minimum cardholder account information needed to complete a transaction is
present on both track 1 and track 2.
• Track 1 is written with code known as DEC SIXBIT plus odd bit parity.
• The information on track 1 is contained in several formats:
– A, which is reserved for proprietary use of card issuer.
– B, is as described below.
– C-M, which are reserved for use by ANSI subcommittee X3B10 and
– N-Z, which are available for use by individual card readers.
• Track 1, Format B:
– Start sentinel: 1 character (generally ‘%’)
– Format Code=“B”: 1 character (alpha only)
– Primary account number (PAN): up to 19 characters. Usually, but not always, matches the credit card number
printed on the front of the card.
– Field separator: 1 character (generally ‘^’)
– Country code: 3 characters
– Name: 2-26 characters
– Field separator: 1 character (generally ‘^’)
– Expiration date or separator: 4 characters or 1 character
– Discretionary data: enough characters to fill out maximum record length (79 characters total). May include pin
Verification Key Indicator (PVKI, 1 character), PIN Verification Value (PVV, 4 characters), Card Verification Value
or Card Verification Code (CVV or CVC, 3 characters)
– End sentinel: 1 character (generally ‘?’)
– Longitudinal Redundancy Check (LRC), a form of computed check character; 1 character.
Track 2
• Track 2 format was developed by the banking industry (ABA).
• This track is written with a 5-bit scheme (4 data bits + 1 parity), which allows for
sixteen possible characters, which are the numbers 0-9, plus the six characters : ; < = >
?.
• The selection six punctuation may seem odd, but in fact the sixteen codes simply map to
the ASCII range 0x30 through 0x3f, which defines ten digit characters plus those six
symbols.
• Point-of-scale card readers almost always read track 1, or track 2, and sometimes both,
in case one track is unreadable.
• The minimum cardholder account information needed to complete a transaction is
present on both track 1 and track 2.
• Format for Track 2:
– Start sentinel: 1 character (generally ‘;’)
– Primary Account Number (PAN): up to 19 characters. Usually, but not always, matches the credit card number
printed on the front of the card.
– Separator: 1 character (generally ‘=‘)
– Expiration Date or separator: 4 characters or 1 character.
– Service Code: 3 digits. The first digit specifies the interchange rules, the second specifies the authorization
process, and the third specifies the range of services.
– Discretionary data: Enough characters to fill out maximum record length (40 characters total). As in track 1
– End Sentinel: 1 character (generally ‘?’)
– Longitudinal Redundancy Check (LRC): it is 1 character and a validity character calculated from other data on
the track. Most reader devices do not return the value when the card is swiped to the presentation layer, and use It
only to verify the input internally to the reader.
Track 3
• Track 3 is a read-write track, but its usage is not standardized among banks.
• This track includes an encrypted PIN, country code, currency units, amount
authorized.
• Track 3 is virtually unused by major worldwide networks.
• This is often isn’t even physically present on the card by virtue of a narrower
magnetic stripe.
Methods to determine what our credit
cards will pay for?
• There are three basic methods for determining that out credit card will pay for
what we’re charging:
– Merchants with few transactions each month will do voice authentication, using a touch tone
phone.
– Electronic Data Capture (EDC) magstripe card swipe terminals are becoming more common – so
is having us swipe our own card at the checkout.
– Virtual terminal on the internet.
How it works?
• After we or the cashier swipes the credit card through a reader, the EDC software at the
point of sale (POS) terminal dials a stored telephone number via a modem to call an
acquirer.
• An acquirer is an organization that collects credit authentication requests from
merchants and provides a payment guarantee to the merchant.
• When the acquirer company gets the credit card authentication request, it checks the
transaction for validity and the record on the magstripe for:
– Merchant ID
– Valid card number
– Expiration Date
– Credit card limit
– Card usage.
• Single dial-up transactions are processed 1200-2400 bps, while direct internet
attachment uses much higher speeds via this protocol.
• In this system, the cardholder enters a Personal Identification Number (PIN),
using a keypad.
Problems why an ATM doesn’t accept the
card
• If the ATM isn’t accepting our card, the problem is probably either:
– Dirty or scratched magstripe.
– Erased magstripe (The most common causes for erased magstripes are exposures to magnets,
like the small ones used to hold notes and pictures on the refrigirator, and a store’s electronic
article surveillance (EAS) tag demagnetizer.
Sources:
• http://money.howstuffworks.com/personal-finance/debt-management/magnetic-
stripe-credit-card.htm
• http://en.wikipedia.org/wiki/Magnetic_stripe_card
• Images.google.com

More Related Content

What's hot

Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debitAnil Chaurasiya
 
Prepaid card in india
Prepaid card in indiaPrepaid card in india
Prepaid card in indiaMorCryp
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Types of debit cards
Types of debit cardsTypes of debit cards
Types of debit cardsBhavana Nandu
 
Cashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followCashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followAbhinav Reddy Lattu
 
Evalution of Money and Banking system
Evalution of Money and Banking systemEvalution of Money and Banking system
Evalution of Money and Banking systemHammad Ali
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future walletSabin Tripathi
 
Contactless payment technology
Contactless payment technologyContactless payment technology
Contactless payment technologyLaw of Compounding
 
The Future of Retail Banking: Customized product offerings and self-service s...
The Future of Retail Banking: Customized product offerings and self-service s...The Future of Retail Banking: Customized product offerings and self-service s...
The Future of Retail Banking: Customized product offerings and self-service s...Zafin
 
Cash vs cashless economy
Cash vs cashless economyCash vs cashless economy
Cash vs cashless economyNischay Singal
 
Smart card technology
Smart card technologySmart card technology
Smart card technologyDeepak Raj
 
Demonetization and cashless economy(my ppt)
Demonetization and cashless economy(my ppt)Demonetization and cashless economy(my ppt)
Demonetization and cashless economy(my ppt)Shiv Sagar Jain
 

What's hot (20)

E wallet
E walletE wallet
E wallet
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debit
 
Prepaid card in india
Prepaid card in indiaPrepaid card in india
Prepaid card in india
 
Smart Card
Smart CardSmart Card
Smart Card
 
E banking
E bankingE banking
E banking
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
PLASTIC MONEY
PLASTIC MONEYPLASTIC MONEY
PLASTIC MONEY
 
Types of debit cards
Types of debit cardsTypes of debit cards
Types of debit cards
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Introduction to emv
Introduction to emvIntroduction to emv
Introduction to emv
 
Ppt final
Ppt finalPpt final
Ppt final
 
Cashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followCashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to follow
 
Evalution of Money and Banking system
Evalution of Money and Banking systemEvalution of Money and Banking system
Evalution of Money and Banking system
 
money pad the future wallet
money pad the future walletmoney pad the future wallet
money pad the future wallet
 
Atm security
Atm securityAtm security
Atm security
 
Contactless payment technology
Contactless payment technologyContactless payment technology
Contactless payment technology
 
The Future of Retail Banking: Customized product offerings and self-service s...
The Future of Retail Banking: Customized product offerings and self-service s...The Future of Retail Banking: Customized product offerings and self-service s...
The Future of Retail Banking: Customized product offerings and self-service s...
 
Cash vs cashless economy
Cash vs cashless economyCash vs cashless economy
Cash vs cashless economy
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Demonetization and cashless economy(my ppt)
Demonetization and cashless economy(my ppt)Demonetization and cashless economy(my ppt)
Demonetization and cashless economy(my ppt)
 

Viewers also liked

The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputSilas Cutler
 
Layman's Guide to ISO8583
Layman's  Guide to ISO8583Layman's  Guide to ISO8583
Layman's Guide to ISO8583Donald Yeo
 
αγαπημενοι προορισμοι
αγαπημενοι προορισμοιαγαπημενοι προορισμοι
αγαπημενοι προορισμοιMaria Makrigeorgaki
 
Intro to press regulation
Intro to press regulationIntro to press regulation
Intro to press regulationnctcmedia12
 
Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Nik Syazwani
 
Gincy's Protfolio 2013
Gincy's Protfolio 2013Gincy's Protfolio 2013
Gincy's Protfolio 2013俐嫻 吳
 
Creating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDECreating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDENag Arvind Gudiseva
 
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南小翰 蔡小翰
 
Introducing AppPulse
Introducing AppPulse Introducing AppPulse
Introducing AppPulse Globe Testing
 
Home Seller's Guide
Home Seller's GuideHome Seller's Guide
Home Seller's Guideteresacking
 
Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Alexandra Nelles
 

Viewers also liked (20)

The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutput
 
Layman's Guide to ISO8583
Layman's  Guide to ISO8583Layman's  Guide to ISO8583
Layman's Guide to ISO8583
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
MUN Student Portfolio
MUN Student PortfolioMUN Student Portfolio
MUN Student Portfolio
 
йододефицит
йододефицитйододефицит
йододефицит
 
αγαπημενοι προορισμοι
αγαπημενοι προορισμοιαγαπημενοι προορισμοι
αγαπημενοι προορισμοι
 
Packaging research
Packaging researchPackaging research
Packaging research
 
(54)
(54)(54)
(54)
 
Intro to press regulation
Intro to press regulationIntro to press regulation
Intro to press regulation
 
Question 7
Question 7 Question 7
Question 7
 
Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02
 
Gincy's Protfolio 2013
Gincy's Protfolio 2013Gincy's Protfolio 2013
Gincy's Protfolio 2013
 
Creating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDECreating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDE
 
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
 
Introducing AppPulse
Introducing AppPulse Introducing AppPulse
Introducing AppPulse
 
Ramas bun clasa a IV-a, 2015
Ramas bun clasa a IV-a, 2015Ramas bun clasa a IV-a, 2015
Ramas bun clasa a IV-a, 2015
 
Home Seller's Guide
Home Seller's GuideHome Seller's Guide
Home Seller's Guide
 
Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0
 
Presentation ISI5121
Presentation ISI5121Presentation ISI5121
Presentation ISI5121
 
An approach to use PERA in Enterprise Modeling for industrial systems
An approach to use PERA in Enterprise Modeling for industrial systemsAn approach to use PERA in Enterprise Modeling for industrial systems
An approach to use PERA in Enterprise Modeling for industrial systems
 

Similar to Magnetic stripe on the back of credit card

Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM60ml
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system60ml
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfssuser5b47c8
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureAdaCore
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart CardsRebecca D'souza
 
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADsThe Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADskahunaworld
 
ATM machine and its reverse engineering
ATM machine and its reverse engineeringATM machine and its reverse engineering
ATM machine and its reverse engineeringAkash Chakraborty
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for DummiesSilly Beez
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfssuser5b47c8
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinarWelchATM
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationTalvinder Singh
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 

Similar to Magnetic stripe on the back of credit card (20)

Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Sploitego
SploitegoSploitego
Sploitego
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
What is A Smart Card
What is A Smart CardWhat is A Smart Card
What is A Smart Card
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADsThe Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
 
ATM machine and its reverse engineering
ATM machine and its reverse engineeringATM machine and its reverse engineering
ATM machine and its reverse engineering
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
smart card
smart cardsmart card
smart card
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
 
Smart card
Smart cardSmart card
Smart card
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authentication
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

More from Vaishnavi

Traffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledTraffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledVaishnavi
 
Web services using sales force.com
Web services using sales force.comWeb services using sales force.com
Web services using sales force.comVaishnavi
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systemsVaishnavi
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousingVaishnavi
 
Brain storming ideas for tackling the
Brain storming ideas for tackling theBrain storming ideas for tackling the
Brain storming ideas for tackling theVaishnavi
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime timeVaishnavi
 
Synchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerSynchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerVaishnavi
 
Tackling the sleep problem
Tackling the sleep problemTackling the sleep problem
Tackling the sleep problemVaishnavi
 

More from Vaishnavi (9)

Traffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledTraffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulled
 
Web services using sales force.com
Web services using sales force.comWeb services using sales force.com
Web services using sales force.com
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systems
 
Barcode
BarcodeBarcode
Barcode
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousing
 
Brain storming ideas for tackling the
Brain storming ideas for tackling theBrain storming ideas for tackling the
Brain storming ideas for tackling the
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime time
 
Synchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerSynchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layer
 
Tackling the sleep problem
Tackling the sleep problemTackling the sleep problem
Tackling the sleep problem
 

Recently uploaded

DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

Magnetic stripe on the back of credit card

  • 1. Magnetic stripe on the back of Credit card .. !! Vaishnavi Chigarapalle
  • 2. Magnetic Stripe • A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on the band of magnetic material on the card. • The magnetic stripe is sometimes called swipe card or magstripe. • This is read by swiping past a magnetic reading head. • This is made up of tiny-iron based magnetic particles in a plastic-like film. • Each particle is really a very tiny bar magnet about 20 millionths of an inch long. • The magnetic stripe can be written because the tiny bar magnets can be magnetized.
  • 3. • This can be done either in a north or south pole direction. • The magnetic stripe on the back of a credit card is similar to a piece of cassette tape fastened to the back of a card. • Instead of motors moving the tape so it can be read, our hand provides the motion as we swipe a credit card through a reader or insert at the gas station pump.
  • 4. Magstripe Formats • There are three tracks on a magstripe. • Each track is .110-inch wide. • The ISO/IEC standard 7811, which is used by banks, specifies: – Track one is 210 bits per inch (bpi), and holds 79 six-bit plus parity bit read-only characters. – Track two is 75 bpi, and holds 40 four-bit plus parity bit characters. – Track three is 210 bpi, and holds 107 four-bit plus parity bit characters. • The credit card typically uses only track one and two. • Track three is a read-write track. • The read-write track includes an encrypted PIN, country code, currency units, amount authorized. • But the usage of track three is not standardized among banks.
  • 7. Track 1 • Track 1 is the only track that may contain alphabetic text, and hence is the only track that contains the card holder’s name. • The minimum cardholder account information needed to complete a transaction is present on both track 1 and track 2. • Track 1 is written with code known as DEC SIXBIT plus odd bit parity. • The information on track 1 is contained in several formats: – A, which is reserved for proprietary use of card issuer. – B, is as described below. – C-M, which are reserved for use by ANSI subcommittee X3B10 and – N-Z, which are available for use by individual card readers.
  • 8. • Track 1, Format B: – Start sentinel: 1 character (generally ‘%’) – Format Code=“B”: 1 character (alpha only) – Primary account number (PAN): up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card. – Field separator: 1 character (generally ‘^’) – Country code: 3 characters – Name: 2-26 characters – Field separator: 1 character (generally ‘^’) – Expiration date or separator: 4 characters or 1 character – Discretionary data: enough characters to fill out maximum record length (79 characters total). May include pin Verification Key Indicator (PVKI, 1 character), PIN Verification Value (PVV, 4 characters), Card Verification Value or Card Verification Code (CVV or CVC, 3 characters) – End sentinel: 1 character (generally ‘?’) – Longitudinal Redundancy Check (LRC), a form of computed check character; 1 character.
  • 9. Track 2 • Track 2 format was developed by the banking industry (ABA). • This track is written with a 5-bit scheme (4 data bits + 1 parity), which allows for sixteen possible characters, which are the numbers 0-9, plus the six characters : ; < = > ?. • The selection six punctuation may seem odd, but in fact the sixteen codes simply map to the ASCII range 0x30 through 0x3f, which defines ten digit characters plus those six symbols. • Point-of-scale card readers almost always read track 1, or track 2, and sometimes both, in case one track is unreadable. • The minimum cardholder account information needed to complete a transaction is present on both track 1 and track 2.
  • 10. • Format for Track 2: – Start sentinel: 1 character (generally ‘;’) – Primary Account Number (PAN): up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card. – Separator: 1 character (generally ‘=‘) – Expiration Date or separator: 4 characters or 1 character. – Service Code: 3 digits. The first digit specifies the interchange rules, the second specifies the authorization process, and the third specifies the range of services. – Discretionary data: Enough characters to fill out maximum record length (40 characters total). As in track 1 – End Sentinel: 1 character (generally ‘?’) – Longitudinal Redundancy Check (LRC): it is 1 character and a validity character calculated from other data on the track. Most reader devices do not return the value when the card is swiped to the presentation layer, and use It only to verify the input internally to the reader.
  • 11.
  • 12. Track 3 • Track 3 is a read-write track, but its usage is not standardized among banks. • This track includes an encrypted PIN, country code, currency units, amount authorized. • Track 3 is virtually unused by major worldwide networks. • This is often isn’t even physically present on the card by virtue of a narrower magnetic stripe.
  • 13. Methods to determine what our credit cards will pay for? • There are three basic methods for determining that out credit card will pay for what we’re charging: – Merchants with few transactions each month will do voice authentication, using a touch tone phone. – Electronic Data Capture (EDC) magstripe card swipe terminals are becoming more common – so is having us swipe our own card at the checkout. – Virtual terminal on the internet.
  • 14. How it works? • After we or the cashier swipes the credit card through a reader, the EDC software at the point of sale (POS) terminal dials a stored telephone number via a modem to call an acquirer. • An acquirer is an organization that collects credit authentication requests from merchants and provides a payment guarantee to the merchant. • When the acquirer company gets the credit card authentication request, it checks the transaction for validity and the record on the magstripe for: – Merchant ID – Valid card number – Expiration Date – Credit card limit – Card usage.
  • 15. • Single dial-up transactions are processed 1200-2400 bps, while direct internet attachment uses much higher speeds via this protocol. • In this system, the cardholder enters a Personal Identification Number (PIN), using a keypad.
  • 16. Problems why an ATM doesn’t accept the card • If the ATM isn’t accepting our card, the problem is probably either: – Dirty or scratched magstripe. – Erased magstripe (The most common causes for erased magstripes are exposures to magnets, like the small ones used to hold notes and pictures on the refrigirator, and a store’s electronic article surveillance (EAS) tag demagnetizer.