December 31,2013
The recent news that data from 40 million credit and debit cards used at Target department stores was hacked has raised concerns about the security of plastic bank cards. These contain financial information on a magnetic strip or a memory chip embedded in the plastic. A new method of storing encrypted data is in its early stages, but the company developing the technology says some credit card companies are paying close attention.
Most credit and debit cards today use magnetic strips that hold the data about the owner’s bank account and personal identification number called a PIN.
Other credit cards hold the data in memory chips that communicate wirelessly with card readers. Both systems are vulnerable. Criminals can steal the data by hacking into the banks’ or retailers' computer systems or, as in the case of Target, tampering with card readers in stores.
Now, scientists in Britain say they are developing a way to make encrypted data more secure by storing it in the plastic itself.
Gordon Smith, a professor emeritus at Warwick Manufacturing Group, at the University of Warwick, said researchers are manipulating a plastic molding machine to use the colors of the card to encrypt data.
“As it's making that plastic from a molten plastic into a solid component, we are moving the pigments such that they form specific images,” he said.
The way the pigment is configured inside the plastic ensures the security of the data. When the card is passed through a special scanner, similar to magnetic strip readers, the software reads the embedded image containing the data.
“When we first developed the images within the plastic, it looked as though it would just be an aesthetic aspect to it, but then we've realized that once we could make it covert, we could color the plastic so that the image was hidden, then it became something a lot more special," said Smith.
Smith admits the system could be compromised if someone discovers how the card was made, though he said that's unlikely. The counterfeiter would need to have access to an injection molding machine that costs more than $300,000.
The patents for this new method are pending, and it has not been used commercially at all. Smith said some credit card companies, however, already have indicated they are interested in the technology.
相关推荐
Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia ...
Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia ...
How to Find Information - A guide for researchers
Receiver operating characteristics graphs are a useful technique for organizing classifiers and visualizing their performance .ROC graphs are commonly used in medical decision making and in recent ...
We have attempted with this book to provide advanced practitioners and researchers with an analysis of the rich and diverse literature on credit risk. The book does not shy away from advanced topics ...
ROC Graphs: Notes and Practical Considerations for Data Mining Researchers 描述roc曲线很详细的一篇论文!
School psychologists as researchers: An approach for initiating training and practice PsyrholoRj in thr Schoo/s Volume 21 . A d , /984 SCHOOL PSYCHOLOGISTS AS RESEARCHERS: AN APPROACH FOR ...
利用java开放自然语言处理系统的入门教程。对于入门者而言,极佳。
These notes are designed for someone new to statistical computing wishing to develop a set of skills necessary to perform original research using Python. They should also be useful for students, ...
This book shows you how to develop NFC applications for Android, for all NFC operating modes: reader/writer, peer-to-peer, and card emulation. The book starts with the basics of NFC technology, an ...
Featuring state-of-the-art software engineering methods, as well as new techniques being utilized in the field, this book is a pivotal reference source for professionals, researchers, practitioners, ...
With pragmatic advice throughout, it is essential reading for practitioners, researchers, and hobbyists in these areas, and can be used as a text for a special topics course in computer graphics. ...
It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key...
Good book for researchers! Good book for researchers! Good book for researchers!
Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG’s advantages in sensing, communication,...
Quickly Engages in Applying Algorithmic Techniques to Solve Practical Signal Processing ProblemsWith its active, hands-on learning approach, this text enables readers to master the underlying ...
As such, the methods and examples demonstrated in the book will be a valuable source of information for academic and industrial researchers, as well as for automotive companies and suppliers.
In this book, we develop a Machine Learning framework to predict economic growth and the likelihood of recessions. In such a framework, different algorithms are trained to identify an internally ...
Foreword Computational Medical Image Analysis has become a prominent field of research at the intersection of Informatics, Computational Sciences, and Medicine, supported ...September 1, 2016
国外著名信号处理书籍,本书指在针对研究者和学生都可以使用