摘要 |
Many real world fraudulent transactions require that data relating to the compromised card must be transferred to another physical card so that it can be used, for example, within an automatic teller machine (ATM), point-of-sale (POS) terminal, etc. In some instances, the card may be replicated several times and used in various geographically locations whilst in other scenarios the compromised card may not be employed for immediate financial theft but identity theft or to provide the user with access to a service, facility, enterprise, good that they otherwise would not be allowed. Accordingly, it would be beneficial to provide a means for authenticating a card independent of the information relating to the card to which it purports to be such that, for example, tampering can be established, the original owner of a tampered card established, and the source of stolen base cards established. |