Contactless RFID Credit Cards

Contactless RFID Credit Cards

Today technology now process contactless credit cards. They are cards that use radio-frequency identification (RFID) for making secure payments. These Contactless payment technology in credit cards such as MasterCard’s PayPass and Visa’s payWave uses RFID, and allows cardholders to wave their cards in front of contactless payment terminals to complete transactions.

Contactless payment cards uses the same protocol – EMV Contactless Communication Protocol Specifications (EMV CCPS) for communicating with Near Field Communication (NFC) enabled devices. Note, however, that EMV CCPS is used for the physical card-to-terminal communication, and is different from the proprietary payment transaction protocol.

How does RFID work on credit card?

The RFID chip in the credit card is not powered and relies on radio frequency (RF) energy transferred from the powered contactless payment terminal to the card in order to power the chip-on-card. … Meaning, a MasterCard PayPass reader cannot process transactions for Visa payWave cards.

What are its advantages?

Compared to chip-and-signature credit cards, contactless RFID cards are faster, more convenient, and more secure. They have the same protection as chip-and-PIN payments. When specifically tied to a smart phone, cardholders can use features such as payment history, virtual card provisioning, remote deactivation, and user-configured pin-protection. In addition, its tap-to-pay method allows for quick and convenient transactions, which is especially useful in transit venues.

What are its disadvantages?

Now Days Most smartphones today feature NFC technology capabilities and have mobile apps that can read the data stored in your contactless cards. There are available open source software libraries for reading and extracting data from contactless cards, which can be used to build custom NFC apps. This availability and ease of use can be used against the cardholder. Armed with either a NFC enabled smartphone (and an app that reads contactless card data) or a dedicated RFID reader, attackers can brush against potential victims in crowded public spaces and wirelessly steal their credit card data—dubbed as “electronic pickpocketing.”

The simple solution to prevent electronic pickpocketing is to put your contactless cards in shielded sleeves that will block the RF (Radio Frequency) energy required to power the chip on the card, but having to remove the card from the sleeve for quick transactions would negate the ease of use and contactless convenience that the technology promises.

What is NFC?

NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance. NFC is an upgrade of the existing proximity card standard (RFID) that combines the interface of a smartcard and a reader into a single device

Are credit cards NFC or RFID?

NFC uses radio waves to transmit information at a short range. Tokenization means you get the same fraud protection as EMV, but without having to insert or swipe a card. NFC is also used in contactless payment cards, though somewhat confusingly, these cards are often referred to as RFID cards.

Cryptography: A Peer-to-Peer ECS (Electronic Cash System)

Cryptography: A Peer-to-Peer ECS (Electronic Cash System)

A peer-to-peer ECS on digital era would allow online payments for the transaction to be sent directly from one party to another party without going through any of the financial institution. We authenticate the transaction via Digital signatures which provides a part of unique and global solutions, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We recommend a solution to the double-spending problem using a peer-to-peer network. The Real time network timestamps transactions by hashing business into an ongoing chain of hash-based for proof-of-work, to forming a record that cannot be changed without redoing the work with proof.  The longest cryptography chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU (central processing unit) power. As long as a majority of C.P.U. power is controlled and handle by nodes they are not cooperating to attack the network, they’ll generate the longest chain and outpace attackers. The network itself requires minimal hardware structure. All the Messages are broadcast on a best effort basis, and networks nodes can leave and rejoin the network at the point on will, accepting the longest work chain as proof of what happened while they were gone.

New data protection law finalised

Union Minister for Communications, Electronics and IT; and Law and Justice, Ravi Shankar Prasad, said that a new data protection law has been finalised and will be taken to the Cabinet for approval. He also said the IT Act needs to be improved.

Read more story here.