December 31,2013
The recent news that data from 40 million credit and debit cards used at Target department stores was hacked has raised concerns about the security of plastic bank cards. These contain financial information on a magnetic strip or a memory chip embedded in the plastic. A new method of storing encrypted data is in its early stages, but the company developing the technology says some credit card companies are paying close attention.
Most credit and debit cards today use magnetic strips that hold the data about the owner’s bank account and personal identification number called a PIN.
Other credit cards hold the data in memory chips that communicate wirelessly with card readers. Both systems are vulnerable. Criminals can steal the data by hacking into the banks’ or retailers' computer systems or, as in the case of Target, tampering with card readers in stores.
Now, scientists in Britain say they are developing a way to make encrypted data more secure by storing it in the plastic itself.
Gordon Smith, a professor emeritus at Warwick Manufacturing Group, at the University of Warwick, said researchers are manipulating a plastic molding machine to use the colors of the card to encrypt data.
“As it's making that plastic from a molten plastic into a solid component, we are moving the pigments such that they form specific images,” he said.
The way the pigment is configured inside the plastic ensures the security of the data. When the card is passed through a special scanner, similar to magnetic strip readers, the software reads the embedded image containing the data.
“When we first developed the images within the plastic, it looked as though it would just be an aesthetic aspect to it, but then we've realized that once we could make it covert, we could color the plastic so that the image was hidden, then it became something a lot more special," said Smith.
Smith admits the system could be compromised if someone discovers how the card was made, though he said that's unlikely. The counterfeiter would need to have access to an injection molding machine that costs more than $300,000.
The patents for this new method are pending, and it has not been used commercially at all. Smith said some credit card companies, however, already have indicated they are interested in the technology.
相关推荐
Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia ...
Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia ...
1. **阈值选择**:在实际应用中,通常需要根据具体情况选择不同的阈值来平衡TPR和FPR。例如,在医学领域,可能会倾向于减少假阴性结果的数量,从而提高TPR。 2. **类别不平衡问题**:当正负样本比例失衡时,ROC图...
We have attempted with this book to provide advanced practitioners and researchers with an analysis of the rich and diverse literature on credit risk. The book does not shy away from advanced topics ...
《Programming for Linguists: Java™ Technology for Language Researchers》是一本专为语言学研究者设计的Java编程入门书籍。本书由Michael Hammond撰写,Blackwell Publishers出版。作者通过本书向读者介绍了如何...
#### 1. 信息搜集过程 信息搜集是一个系统的过程,涉及一系列技能和步骤。首先,定义研究主题至关重要,这要求研究者明确研究的目的、范围以及目标受众。其次,设定研究计划,包括确定数据来源、制定研究方法和时间...
PyTorch_Tutorial_for_Deep_Learning_Researchers_pytorch-tutorial
School psychologists as researchers: An approach for initiating training and practice PsyrholoRj in thr Schoo/s Volume 21 . A d , /984 SCHOOL PSYCHOLOGISTS AS RESEARCHERS: AN APPROACH FOR ...
These notes are designed for someone new to statistical computing wishing to develop a set of skills necessary to perform original research using Python. They should also be useful for students, ...
With pragmatic advice throughout, it is essential reading for practitioners, researchers, and hobbyists in these areas, and can be used as a text for a special topics course in computer graphics. ...
Foreword Computational Medical Image Analysis has become a prominent field of research at the intersection of Informatics, Computational Sciences, and Medicine, supported ...September 1, 2016
It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key...
Good book for researchers! Good book for researchers! Good book for researchers!
Quickly Engages in Applying Algorithmic Techniques to Solve Practical Signal Processing ProblemsWith its active, hands-on learning approach, this text enables readers to master the underlying ...
1. **阈值的选择**:ROC图中的每个点都对应一个不同的阈值。如何选择最优阈值对于实际应用至关重要。这通常涉及到成本效益分析,即考虑误报和漏报的成本。 2. **多分类问题**:对于多分类问题,直接使用ROC图进行...
As such, the methods and examples demonstrated in the book will be a valuable source of information for academic and industrial researchers, as well as for automotive companies and suppliers.