SlideShare a Scribd company logo
1 of 17
Magnetic stripe on the back of
Credit card .. !!
Vaishnavi Chigarapalle
Magnetic Stripe
• A magnetic stripe card is a type of card capable of storing data by modifying the
magnetism of tiny iron-based magnetic particles on the band of magnetic material on
the card.
• The magnetic stripe is sometimes called swipe card or magstripe.
• This is read by swiping past a magnetic reading head.
• This is made up of tiny-iron based magnetic particles in a plastic-like film.
• Each particle is really a very tiny bar magnet about 20 millionths of an inch long.
• The magnetic stripe can be written because the tiny bar magnets can be magnetized.
• This can be done either in a north or south pole direction.
• The magnetic stripe on the back of a credit card is similar to a piece of cassette
tape fastened to the back of a card.
• Instead of motors moving the tape so it can be read, our hand provides the motion
as we swipe a credit card through a reader or insert at the gas station pump.
Magstripe Formats
• There are three tracks on a magstripe.
• Each track is .110-inch wide.
• The ISO/IEC standard 7811, which is used by banks, specifies:
– Track one is 210 bits per inch (bpi), and holds 79 six-bit plus parity bit read-only characters.
– Track two is 75 bpi, and holds 40 four-bit plus parity bit characters.
– Track three is 210 bpi, and holds 107 four-bit plus parity bit characters.
• The credit card typically uses only track one and two.
• Track three is a read-write track.
• The read-write track includes an encrypted PIN, country code, currency units, amount
authorized.
• But the usage of track three is not standardized among banks.
Magstrip Formats
Verification and Authentication System.
Track 1
• Track 1 is the only track that may contain alphabetic text, and hence is the only track
that contains the card holder’s name.
• The minimum cardholder account information needed to complete a transaction is
present on both track 1 and track 2.
• Track 1 is written with code known as DEC SIXBIT plus odd bit parity.
• The information on track 1 is contained in several formats:
– A, which is reserved for proprietary use of card issuer.
– B, is as described below.
– C-M, which are reserved for use by ANSI subcommittee X3B10 and
– N-Z, which are available for use by individual card readers.
• Track 1, Format B:
– Start sentinel: 1 character (generally ‘%’)
– Format Code=“B”: 1 character (alpha only)
– Primary account number (PAN): up to 19 characters. Usually, but not always, matches the credit card number
printed on the front of the card.
– Field separator: 1 character (generally ‘^’)
– Country code: 3 characters
– Name: 2-26 characters
– Field separator: 1 character (generally ‘^’)
– Expiration date or separator: 4 characters or 1 character
– Discretionary data: enough characters to fill out maximum record length (79 characters total). May include pin
Verification Key Indicator (PVKI, 1 character), PIN Verification Value (PVV, 4 characters), Card Verification Value
or Card Verification Code (CVV or CVC, 3 characters)
– End sentinel: 1 character (generally ‘?’)
– Longitudinal Redundancy Check (LRC), a form of computed check character; 1 character.
Track 2
• Track 2 format was developed by the banking industry (ABA).
• This track is written with a 5-bit scheme (4 data bits + 1 parity), which allows for
sixteen possible characters, which are the numbers 0-9, plus the six characters : ; < = >
?.
• The selection six punctuation may seem odd, but in fact the sixteen codes simply map to
the ASCII range 0x30 through 0x3f, which defines ten digit characters plus those six
symbols.
• Point-of-scale card readers almost always read track 1, or track 2, and sometimes both,
in case one track is unreadable.
• The minimum cardholder account information needed to complete a transaction is
present on both track 1 and track 2.
• Format for Track 2:
– Start sentinel: 1 character (generally ‘;’)
– Primary Account Number (PAN): up to 19 characters. Usually, but not always, matches the credit card number
printed on the front of the card.
– Separator: 1 character (generally ‘=‘)
– Expiration Date or separator: 4 characters or 1 character.
– Service Code: 3 digits. The first digit specifies the interchange rules, the second specifies the authorization
process, and the third specifies the range of services.
– Discretionary data: Enough characters to fill out maximum record length (40 characters total). As in track 1
– End Sentinel: 1 character (generally ‘?’)
– Longitudinal Redundancy Check (LRC): it is 1 character and a validity character calculated from other data on
the track. Most reader devices do not return the value when the card is swiped to the presentation layer, and use It
only to verify the input internally to the reader.
Track 3
• Track 3 is a read-write track, but its usage is not standardized among banks.
• This track includes an encrypted PIN, country code, currency units, amount
authorized.
• Track 3 is virtually unused by major worldwide networks.
• This is often isn’t even physically present on the card by virtue of a narrower
magnetic stripe.
Methods to determine what our credit
cards will pay for?
• There are three basic methods for determining that out credit card will pay for
what we’re charging:
– Merchants with few transactions each month will do voice authentication, using a touch tone
phone.
– Electronic Data Capture (EDC) magstripe card swipe terminals are becoming more common – so
is having us swipe our own card at the checkout.
– Virtual terminal on the internet.
How it works?
• After we or the cashier swipes the credit card through a reader, the EDC software at the
point of sale (POS) terminal dials a stored telephone number via a modem to call an
acquirer.
• An acquirer is an organization that collects credit authentication requests from
merchants and provides a payment guarantee to the merchant.
• When the acquirer company gets the credit card authentication request, it checks the
transaction for validity and the record on the magstripe for:
– Merchant ID
– Valid card number
– Expiration Date
– Credit card limit
– Card usage.
• Single dial-up transactions are processed 1200-2400 bps, while direct internet
attachment uses much higher speeds via this protocol.
• In this system, the cardholder enters a Personal Identification Number (PIN),
using a keypad.
Problems why an ATM doesn’t accept the
card
• If the ATM isn’t accepting our card, the problem is probably either:
– Dirty or scratched magstripe.
– Erased magstripe (The most common causes for erased magstripes are exposures to magnets,
like the small ones used to hold notes and pictures on the refrigirator, and a store’s electronic
article surveillance (EAS) tag demagnetizer.
Sources:
• http://money.howstuffworks.com/personal-finance/debt-management/magnetic-
stripe-credit-card.htm
• http://en.wikipedia.org/wiki/Magnetic_stripe_card
• Images.google.com

More Related Content

What's hot

Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 
Texas Lucky
Texas LuckyTexas Lucky
Texas Luckyglenede
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
Project report on gsm based borewell water level monitor
Project report on gsm based borewell water level monitorProject report on gsm based borewell water level monitor
Project report on gsm based borewell water level monitorTarun Arora
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingPranav Veerani
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future walletMokshada Birari
 
Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Pranav Veerani
 

What's hot (20)

credit card.pptx
credit card.pptxcredit card.pptx
credit card.pptx
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Texas Lucky
Texas LuckyTexas Lucky
Texas Lucky
 
Introduction to emv
Introduction to emvIntroduction to emv
Introduction to emv
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
RFID E-passport System
RFID E-passport SystemRFID E-passport System
RFID E-passport System
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 
Project report on gsm based borewell water level monitor
Project report on gsm based borewell water level monitorProject report on gsm based borewell water level monitor
Project report on gsm based borewell water level monitor
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Fms
FmsFms
Fms
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Security
SecuritySecurity
Security
 
Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster
 

Viewers also liked

The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputSilas Cutler
 
Layman's Guide to ISO8583
Layman's  Guide to ISO8583Layman's  Guide to ISO8583
Layman's Guide to ISO8583Donald Yeo
 
αγαπημενοι προορισμοι
αγαπημενοι προορισμοιαγαπημενοι προορισμοι
αγαπημενοι προορισμοιMaria Makrigeorgaki
 
Intro to press regulation
Intro to press regulationIntro to press regulation
Intro to press regulationnctcmedia12
 
Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Nik Syazwani
 
Gincy's Protfolio 2013
Gincy's Protfolio 2013Gincy's Protfolio 2013
Gincy's Protfolio 2013俐嫻 吳
 
Creating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDECreating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDENag Arvind Gudiseva
 
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南小翰 蔡小翰
 
Introducing AppPulse
Introducing AppPulse Introducing AppPulse
Introducing AppPulse Globe Testing
 
Home Seller's Guide
Home Seller's GuideHome Seller's Guide
Home Seller's Guideteresacking
 
Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Alexandra Nelles
 

Viewers also liked (20)

The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutput
 
Layman's Guide to ISO8583
Layman's  Guide to ISO8583Layman's  Guide to ISO8583
Layman's Guide to ISO8583
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
MUN Student Portfolio
MUN Student PortfolioMUN Student Portfolio
MUN Student Portfolio
 
йододефицит
йододефицитйододефицит
йододефицит
 
αγαπημενοι προορισμοι
αγαπημενοι προορισμοιαγαπημενοι προορισμοι
αγαπημενοι προορισμοι
 
Packaging research
Packaging researchPackaging research
Packaging research
 
(54)
(54)(54)
(54)
 
Intro to press regulation
Intro to press regulationIntro to press regulation
Intro to press regulation
 
Question 7
Question 7 Question 7
Question 7
 
Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02Senianyamantikarmengkuang 111130225418-phpapp02
Senianyamantikarmengkuang 111130225418-phpapp02
 
Gincy's Protfolio 2013
Gincy's Protfolio 2013Gincy's Protfolio 2013
Gincy's Protfolio 2013
 
Creating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDECreating executable JAR from Eclipse IDE
Creating executable JAR from Eclipse IDE
 
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
Self liberation201003終結獨裁政權或其他壓迫的行動戰略規劃指南
 
Introducing AppPulse
Introducing AppPulse Introducing AppPulse
Introducing AppPulse
 
Ramas bun clasa a IV-a, 2015
Ramas bun clasa a IV-a, 2015Ramas bun clasa a IV-a, 2015
Ramas bun clasa a IV-a, 2015
 
Home Seller's Guide
Home Seller's GuideHome Seller's Guide
Home Seller's Guide
 
Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0Competitive Intelligence and Web2.0
Competitive Intelligence and Web2.0
 
Presentation ISI5121
Presentation ISI5121Presentation ISI5121
Presentation ISI5121
 
An approach to use PERA in Enterprise Modeling for industrial systems
An approach to use PERA in Enterprise Modeling for industrial systemsAn approach to use PERA in Enterprise Modeling for industrial systems
An approach to use PERA in Enterprise Modeling for industrial systems
 

Similar to Magnetic stripe on the back of credit card

Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
Abdullin modern payments security. emv, nfc, etc
Abdullin   modern payments security. emv, nfc, etcAbdullin   modern payments security. emv, nfc, etc
Abdullin modern payments security. emv, nfc, etcDefconRussia
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM60ml
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system60ml
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfssuser5b47c8
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureAdaCore
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart CardsRebecca D'souza
 
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADsThe Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADskahunaworld
 
ATM machine and its reverse engineering
ATM machine and its reverse engineeringATM machine and its reverse engineering
ATM machine and its reverse engineeringAkash Chakraborty
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfssuser5b47c8
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinarWelchATM
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationTalvinder Singh
 

Similar to Magnetic stripe on the back of credit card (20)

Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Abdullin modern payments security. emv, nfc, etc
Abdullin   modern payments security. emv, nfc, etcAbdullin   modern payments security. emv, nfc, etc
Abdullin modern payments security. emv, nfc, etc
 
Sploitego
SploitegoSploitego
Sploitego
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
What is A Smart Card
What is A Smart CardWhat is A Smart Card
What is A Smart Card
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADsThe Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
The Long Road to EMV: An In-Depth Look at EMV and How It Will Impact IADs
 
ATM machine and its reverse engineering
ATM machine and its reverse engineeringATM machine and its reverse engineering
ATM machine and its reverse engineering
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
smart card
smart cardsmart card
smart card
 
Emv for f_is_webinar
Emv for f_is_webinarEmv for f_is_webinar
Emv for f_is_webinar
 
Smart card
Smart cardSmart card
Smart card
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authentication
 
Presentation On ATM Technology
Presentation On ATM TechnologyPresentation On ATM Technology
Presentation On ATM Technology
 

More from Vaishnavi

Traffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledTraffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledVaishnavi
 
Web services using sales force.com
Web services using sales force.comWeb services using sales force.com
Web services using sales force.comVaishnavi
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systemsVaishnavi
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousingVaishnavi
 
Brain storming ideas for tackling the
Brain storming ideas for tackling theBrain storming ideas for tackling the
Brain storming ideas for tackling theVaishnavi
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime timeVaishnavi
 
Synchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerSynchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerVaishnavi
 
Tackling the sleep problem
Tackling the sleep problemTackling the sleep problem
Tackling the sleep problemVaishnavi
 

More from Vaishnavi (9)

Traffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulledTraffic lights detecting a car that has pulled
Traffic lights detecting a car that has pulled
 
Web services using sales force.com
Web services using sales force.comWeb services using sales force.com
Web services using sales force.com
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systems
 
Barcode
BarcodeBarcode
Barcode
 
Business intelligence and data warehousing
Business intelligence and data warehousingBusiness intelligence and data warehousing
Business intelligence and data warehousing
 
Brain storming ideas for tackling the
Brain storming ideas for tackling theBrain storming ideas for tackling the
Brain storming ideas for tackling the
 
Is cloud computing really ready for prime time
Is cloud computing really ready for prime timeIs cloud computing really ready for prime time
Is cloud computing really ready for prime time
 
Synchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layerSynchronization of multihop sensor networks in the app layer
Synchronization of multihop sensor networks in the app layer
 
Tackling the sleep problem
Tackling the sleep problemTackling the sleep problem
Tackling the sleep problem
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Magnetic stripe on the back of credit card

  • 1. Magnetic stripe on the back of Credit card .. !! Vaishnavi Chigarapalle
  • 2. Magnetic Stripe • A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on the band of magnetic material on the card. • The magnetic stripe is sometimes called swipe card or magstripe. • This is read by swiping past a magnetic reading head. • This is made up of tiny-iron based magnetic particles in a plastic-like film. • Each particle is really a very tiny bar magnet about 20 millionths of an inch long. • The magnetic stripe can be written because the tiny bar magnets can be magnetized.
  • 3. • This can be done either in a north or south pole direction. • The magnetic stripe on the back of a credit card is similar to a piece of cassette tape fastened to the back of a card. • Instead of motors moving the tape so it can be read, our hand provides the motion as we swipe a credit card through a reader or insert at the gas station pump.
  • 4. Magstripe Formats • There are three tracks on a magstripe. • Each track is .110-inch wide. • The ISO/IEC standard 7811, which is used by banks, specifies: – Track one is 210 bits per inch (bpi), and holds 79 six-bit plus parity bit read-only characters. – Track two is 75 bpi, and holds 40 four-bit plus parity bit characters. – Track three is 210 bpi, and holds 107 four-bit plus parity bit characters. • The credit card typically uses only track one and two. • Track three is a read-write track. • The read-write track includes an encrypted PIN, country code, currency units, amount authorized. • But the usage of track three is not standardized among banks.
  • 7. Track 1 • Track 1 is the only track that may contain alphabetic text, and hence is the only track that contains the card holder’s name. • The minimum cardholder account information needed to complete a transaction is present on both track 1 and track 2. • Track 1 is written with code known as DEC SIXBIT plus odd bit parity. • The information on track 1 is contained in several formats: – A, which is reserved for proprietary use of card issuer. – B, is as described below. – C-M, which are reserved for use by ANSI subcommittee X3B10 and – N-Z, which are available for use by individual card readers.
  • 8. • Track 1, Format B: – Start sentinel: 1 character (generally ‘%’) – Format Code=“B”: 1 character (alpha only) – Primary account number (PAN): up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card. – Field separator: 1 character (generally ‘^’) – Country code: 3 characters – Name: 2-26 characters – Field separator: 1 character (generally ‘^’) – Expiration date or separator: 4 characters or 1 character – Discretionary data: enough characters to fill out maximum record length (79 characters total). May include pin Verification Key Indicator (PVKI, 1 character), PIN Verification Value (PVV, 4 characters), Card Verification Value or Card Verification Code (CVV or CVC, 3 characters) – End sentinel: 1 character (generally ‘?’) – Longitudinal Redundancy Check (LRC), a form of computed check character; 1 character.
  • 9. Track 2 • Track 2 format was developed by the banking industry (ABA). • This track is written with a 5-bit scheme (4 data bits + 1 parity), which allows for sixteen possible characters, which are the numbers 0-9, plus the six characters : ; < = > ?. • The selection six punctuation may seem odd, but in fact the sixteen codes simply map to the ASCII range 0x30 through 0x3f, which defines ten digit characters plus those six symbols. • Point-of-scale card readers almost always read track 1, or track 2, and sometimes both, in case one track is unreadable. • The minimum cardholder account information needed to complete a transaction is present on both track 1 and track 2.
  • 10. • Format for Track 2: – Start sentinel: 1 character (generally ‘;’) – Primary Account Number (PAN): up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card. – Separator: 1 character (generally ‘=‘) – Expiration Date or separator: 4 characters or 1 character. – Service Code: 3 digits. The first digit specifies the interchange rules, the second specifies the authorization process, and the third specifies the range of services. – Discretionary data: Enough characters to fill out maximum record length (40 characters total). As in track 1 – End Sentinel: 1 character (generally ‘?’) – Longitudinal Redundancy Check (LRC): it is 1 character and a validity character calculated from other data on the track. Most reader devices do not return the value when the card is swiped to the presentation layer, and use It only to verify the input internally to the reader.
  • 11.
  • 12. Track 3 • Track 3 is a read-write track, but its usage is not standardized among banks. • This track includes an encrypted PIN, country code, currency units, amount authorized. • Track 3 is virtually unused by major worldwide networks. • This is often isn’t even physically present on the card by virtue of a narrower magnetic stripe.
  • 13. Methods to determine what our credit cards will pay for? • There are three basic methods for determining that out credit card will pay for what we’re charging: – Merchants with few transactions each month will do voice authentication, using a touch tone phone. – Electronic Data Capture (EDC) magstripe card swipe terminals are becoming more common – so is having us swipe our own card at the checkout. – Virtual terminal on the internet.
  • 14. How it works? • After we or the cashier swipes the credit card through a reader, the EDC software at the point of sale (POS) terminal dials a stored telephone number via a modem to call an acquirer. • An acquirer is an organization that collects credit authentication requests from merchants and provides a payment guarantee to the merchant. • When the acquirer company gets the credit card authentication request, it checks the transaction for validity and the record on the magstripe for: – Merchant ID – Valid card number – Expiration Date – Credit card limit – Card usage.
  • 15. • Single dial-up transactions are processed 1200-2400 bps, while direct internet attachment uses much higher speeds via this protocol. • In this system, the cardholder enters a Personal Identification Number (PIN), using a keypad.
  • 16. Problems why an ATM doesn’t accept the card • If the ATM isn’t accepting our card, the problem is probably either: – Dirty or scratched magstripe. – Erased magstripe (The most common causes for erased magstripes are exposures to magnets, like the small ones used to hold notes and pictures on the refrigirator, and a store’s electronic article surveillance (EAS) tag demagnetizer.