Protecting against Credit Card Forgery with Existing Magnetic Card Readers

نویسندگان

  • Yinzhi Cao
  • Xiang Pan
  • Yan Chen
چکیده

Existing magnetic cards adopt plain text to store confidential information, thus being vulnerable to an untrusted credit card reader or a skimming device. To tackle the problem, researchers have proposed many solutions such as integrated circuit card (IC card) and mobile wallets applications [6, 9, 12, 20, 21]; however, none of them can support existing magnetic card readers thereby facing significant backward compatibility issue. In this paper, to combat such credit card information leakages and remain backward compatible, we propose a system adopting disposable credit card information that expires after one-time usage, as well as a magnetic card chip simulating the behavior of a physical magnetic card. The overall system consists of a bank server, a mobile application, and the magnetic card chip. The bank server distributes the disposable credit card information to the mobile application, which generates electrical current to the magnetic card chip via a microphone audio jack or Bluetooth. We have implemented a prototype system and evaluated it. In the evaluation, we show that the current cost for one clientside device is about $0.5 (not including the phone), which can be even lowered if manufactured in large scale. We also evaluated the correctness, scalability and robustness of the prototype.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Credit Card Endorsement using Biometrics in Cloud Computing

The project entitled “Credit Card Endorsement Using Biometrics in Cloud Computing” is based on the security issues related to data access and data storage in cloud computing. The application focused is on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transactio...

متن کامل

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

On-Line Payment with Cellular Phone

Recent rapid development in mobile communication enables people being with cellular phone wherever they go. It is practical to enhance the functionality of cellular phone, and one is to boost consumerfriendly mobile transactions by replacing traditional credit card payment system. However, previous researches focus on the improvement of smartcard technology [1]. That means the handset must be u...

متن کامل

Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection

Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...

متن کامل

TDDD17 Project, Spring 2008 Magnetic Card Fraud – Can you do it?

Every year more and more purchases are made by bank card transactions. At the same time the reports about card fraud are flooding the news. This paper first tries to describe the current situation of magnetic card fraud and what different types of fraud exist today. The aim of the paper is then to observe if everyone can perform card forgery by studying the tools and knowledge needed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013