250 TRACK I ATA ANSI X4.162 1983/ ISO 3554 TRACK 2 ABA ANSI X4. 16? 1983 ISO 3554 TRACK 3 THRIFT ANSI X4. 162 1983 SO3554 00 Track 1 sIFC⊥ PaNFS⊥ NAMEFS Additional DataES LRC Primary Acc Expiry Date alphanumeric Restriction or Type 3 (19 digits max characters max) Offset or PvN 5 Lss」 Start Sentinel%LFC」 Format Code FS] Field Seperator( ES End Sentinel? LRC] Longitudinal Redundany Code Track 2 SS FC⊥ PANFS Additional data LRC Expiry Date Restriction or Type 3 (19 digits max) Offset Or pvn 5 Discretionary Data 「 ss Start Sentinel;「 fc format Code FS] Field Seperator=ES] End Sentinel?LRC Longitudinal Redundany Code Magnetic stripe Content of Financial Cards
TRACK 1 TRACK 2 TRACK 3 IATA ANSI X4.16 ? 1983 ISO 3554 ABA ANSI X4.16 ? 1983 ISO 3554 THRIFT ANSI X4.16 ? 1983 ISO 3554 0.223? 0.110? 0.110? 0.110? Track 1 SS FC PAN FS NAME FS Additional Data ES LRC Primary Acc. No. (19 digits max.) Name (26 alphanumeric characters max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data Track 2 FC SS PAN FS Additional Data ES LRC Primary Acc. No. (19 digits max.) • Exipiry Date 4 • Restriction or Type 3 • Offset or PVN 5 • Discretionary Data SS Start Sentinel % Format Code FS Field Seperator { ES End Sentinel ? LRC Longitudinal Redundany Code SS Start Sentinel ; FC Format Code FS Field Seperator = ES End Sentinel ? LRC Longitudinal Redundany Code 3.250? FC Magnetic stripe Content of Financial Cards
Capacity Track Record density bits/inch Capacity 210 79(7 bits/char) 23 75 40(5 bits/char. 210 107(5 bits/char)
Capacity Track Record density bits/inch Capacity 1 210 79 (7 bits/char.) 2 75 40 (5 bits/char.) 3 210 107 (5 bits/char)
fraud card activities Stealing A legal card may be stolen and used in ATMs or EPoss Altering and re-embossing a genuine card, that is modifying the visual features of card Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket
Fraud card activities ⚫ Stealing — A legal card may be stolen and used in ATMs or EPOSs. ⚫ Altering and re-embossing a genuine card, that is modifying the visual features of card. ⚫ Skimming or altering the original electronic data stored on the magnetic stripe, for example the expire date or the credit limit. ⚫ Buffering or re-encoding the original data to the magnetic card. This technique is commonly used in producing card counterfeits of store-value ticket
Copying of data from a genuine card to another in an on-line fashion white plastic fraud? Counterfeiting --color plastic fraud may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion
• Copying of data from a genuine card to another in an on-line fashion ⎯ “white plastic fraud” • Counterfeiting — “color plastic fraud” may be prepared by reading another legal card and encoding the same information onto another fraud card in an off-line fashion
Valid card VISAGOLD Fraud Card 2等:
Valid Card Fraud Card