Feeds

Smart cards get really smart

Consumer programmable chips

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Researchers at the University of Pennsylvania have developed smart credit cards with embedded microchips. What's new about is a technique which lets ordinary card users program in their own spending parameters.

Just imagine: employers could better manage spending on corporate cards, while parents could create emergency credit cards for their children, to be used only at certain locations such as hotels or pay phones.

Banks and other card issuers have long been able to set general parameters in chip cards, such as credit limits. So far, there has been little interest in setting finer limits because the procedure is awkward and expensive to manage. But not anymore, according to Penn scientist Carl Gunter, who presented this work at the recent conference on Object-Oriented Programming in Darmstadt, Germany.

The programmable card brings together an assortment of existing technologies, including the microchips first built into credit cards more than 30 years ago.

An on-card verification system prevents unauthorised users from tampering with restrictions programmed in by the card's rightful owner, while an ordinary card-reader plugs into a computer dock, allowing users to create restrictions.

Programmable credit cards could let cardholders limit their own expenditures, to a certain amount a day or to spending only on certain days or at certain locations. The technology could also help cut fraudulent online use of credit cards, Penn scientists believe.

So, will your bank offer these cards tomorrow? No, you need to wait. Penn says it seeking corporate partners to commercialise the technology. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.