Page 73 - Cyber Warnings
P. 73







 The magnetic-strip (IBM 1950) also permits theft since net-neutral electrons not humans
conduct identity confirmation and authorize transfer of money ownership. (Ownership
because Internet “tubes” and telephone “lines” cannot transfer cash.)

 The 1970s European micro-chip card was standardized by ISO/IEC (circa 1980) to help
protect from EFT at points-of-sale when utilizing fraudulent chip cards.
 The low-cost, disposable, non-identity, U.S. electromechanical Cyber Card system was
engineered to stop EFT by replacing electrons with humans – back to the secure future.



EFT PREVENTION CONCEPT.

 Standard payment cards (e.g.; Credit, Debit and ATM) can be visualized as if house
keys which provide each owner’s identity, address and security attributes.

 The electromechanical Cyber Card design can be visualized also as if house keys which
do not provide theft-enabling data, information or security attributes.



EFT PREVENTION PRINCIPLE.
 Security risk with standard and chip payment cards can be compared to the limited,
statistical protection provided by bullet-proof vests, while Cyber Cards can be compared
to offensive weapons which cannot function.

 Cyber Cards provide no identity nor financial value to others by possession, duplication
or knowledge of their inherent data and information baseline.

 Cyber Cards do not employ identity, nor embossed or printed numerics including no card
number, no account number, and no security or check digits.
 Cyber Cards do not need the owner’s name, dates, photo, signature, face-recognition,
fingerprint, micro-chip, security hologram or the like.

 Cyber Cards can provide openly available information regarding card type, bank, issuer,
service disclaimers, phone numbers, legal warning, etc.

 Cyber Card identification is based on a scene selected by the owner from among many
thousands; space is provided to write a personal identity code to protect from rare cases
of same scene cards used at the same place at the same time by the same person(s).

 Each Cyber Card by design can only serve the legitimate owner, not the card possessor
nor due to such data and information as gained.






73 Cyber Warnings E-Magazine – September 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   68   69   70   71   72   73   74   75   76   77   78