Page 73 - Cyber Warnings
P. 73
The magnetic-strip (IBM 1950) also permits theft since net-neutral electrons not humans
conduct identity confirmation and authorize transfer of money ownership. (Ownership
because Internet “tubes” and telephone “lines” cannot transfer cash.)
The 1970s European micro-chip card was standardized by ISO/IEC (circa 1980) to help
protect from EFT at points-of-sale when utilizing fraudulent chip cards.
The low-cost, disposable, non-identity, U.S. electromechanical Cyber Card system was
engineered to stop EFT by replacing electrons with humans – back to the secure future.
EFT PREVENTION CONCEPT.
Standard payment cards (e.g.; Credit, Debit and ATM) can be visualized as if house
keys which provide each owner’s identity, address and security attributes.
The electromechanical Cyber Card design can be visualized also as if house keys which
do not provide theft-enabling data, information or security attributes.
EFT PREVENTION PRINCIPLE.
Security risk with standard and chip payment cards can be compared to the limited,
statistical protection provided by bullet-proof vests, while Cyber Cards can be compared
to offensive weapons which cannot function.
Cyber Cards provide no identity nor financial value to others by possession, duplication
or knowledge of their inherent data and information baseline.
Cyber Cards do not employ identity, nor embossed or printed numerics including no card
number, no account number, and no security or check digits.
Cyber Cards do not need the owner’s name, dates, photo, signature, face-recognition,
fingerprint, micro-chip, security hologram or the like.
Cyber Cards can provide openly available information regarding card type, bank, issuer,
service disclaimers, phone numbers, legal warning, etc.
Cyber Card identification is based on a scene selected by the owner from among many
thousands; space is provided to write a personal identity code to protect from rare cases
of same scene cards used at the same place at the same time by the same person(s).
Each Cyber Card by design can only serve the legitimate owner, not the card possessor
nor due to such data and information as gained.
73 Cyber Warnings E-Magazine – September 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide