ELEC332 Presentation HKID & Credit Card Number Verification Chan Ka Shing, Yuemin Lu, Tang Shuk Fan 1.

Slides:



Advertisements
Similar presentations
Math for Liberal Studies. An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept The number.
Advertisements

Error-Correcting codes
DIGITAL COMMUNICATION Packet error detection (CRC) November 2011 A.J. Han Vinck.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Numbers in Our Pockets GCNU 1025 Numbers Save the Day.

NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Math for Liberal Studies.  None of the methods we have investigated so far can detect transposition errors  In this section we will investigate new.
Chapter 10 Error Detection and Correction
Hash Tables1 Part E Hash Tables  
Chapter 2 Parity checks Simple codes Modular arithmetic.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
MAT 1000 Mathematics in Today's World Winter 2015.
Error Detection and Correction
Computer Science A 14: 3/4. Computing with numbers - Precision - Representation - Computing with numbers - Example.
Write A if the quantity in Column A is greater
PrasadDigital Roots1 VEDIC MATHEMATICS : Digital Roots/Sums T. K. Prasad
Consecutive Numbers Algebra I.
More to Learn Check digit –It is used to check whether a number is valid. –Both ISBN and Hong Kong Identity Card numbers contain a check digit for data.
Method for verifying a credit card number: Example:
Partial Sums An Addition Algorithm.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Identification Numbers and Error Detection Meredith Wachs.
Wong Wai Ling, Lam Pui Ki Identification number  clearly identify a person or a thing Check digit  an extra digit for the purpose of error.
1 JavaScript 4 User Input Validation. 2 Input Validation One of the most useful applications of JavaScript is input validation Scripts in the page can.
SAT Review 1.Which is the equation of a line that passes through the pt (7, - 1) and is to y + 2x = 1. A. y = 2x – 15 B. y = –2x + 13 C. D. 2.Line p is.
Fault Tolerance CDA 5140 Spring 06 Everyday FT. Background Use of check digits for error detection on everyday applications used extensively but most.
Check Digit Schemes Jerzy Wojdyło Southeast Missouri State University May 13, 2002.
Lecture 12.  The ISBN 10-digit uses a reverse weighting system: multiply the first digit by 10, the second by 9, the third by 8 and so on until the check.
Spring 2015 Mathematics in Management Science Identification Numbers Data Security Check Digits UPCs, Routing Nos, Bar Codes Personal Data.
Computer Arithmetic and the Arithmetic Unit Lesson 2 - Ioan Despi.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Analyzing Numerical Data: Validating Identification Numbers
ENEE244-02xx Digital Logic Design Lecture 3. Announcements Homework 1 due next class (Thursday, September 11) First recitation quiz will be next Monday,
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
MAT 105 Spring  An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept  The number.
Error Detection and Correction
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Detection (§3.2.2)
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
Longitudinal redundancy check
1 Block Coding Messages are made up of k bits. Transmitted packets have n bits, n > k: k-data bits and r-redundant bits. n = k + r.
Data Communications and Networking
Error-Detecting and Error-Correcting Codes
Data Management Data Verification Data Validation.
Math for Liberal Studies. What is an identification number?  An identification number is a sequence of digits and/or numbers that identifies an object,
Check Digits Tanli Su. Introduction -identification numbers are used to easily identify people, products, books, accounts, credit cards, driver's licenses,
Ways to Check for Divisibility Dividing by 2 All even numbers are divisible by 2 Even numbers are numbers that end with either 2, 4, 6, 8, or 0.
Weighted Codes, Codabar, ISBN & Code 39 Sol: DM.11 Classwork: worksheet Homework (day 47): worksheet.
Donation form optimisation Glyn Thomas
Analyzing Numerical Data: Validating Identification Numbers
ERROR DETECTION AND CORRECTION
Error Detection and Correction
Multiplying 2 Digit Factors
Consecutive Numbers Algebra I.
Advanced Computer Networks
Multiplication Inverse
Even/odd parity (1) Computers can sometimes make errors when they transmit data. Even/odd parity: is basic method for detecting if an odd number of bits.
Arithmetic operations in binary

Modular Arithmetic II Lecture 10: Oct 6.
Chapter 16: Introduction
II. Linear Block Codes.
Credit Cards UPC Codes.
Chapter 9 Error Detection and Correction
How Credit Card Numbers are Generated

Chapter 16: Check Digit Systems, Continued
Method for verifying a credit card number:
Presentation transcript:

ELEC332 Presentation HKID & Credit Card Number Verification Chan Ka Shing, Yuemin Lu, Tang Shuk Fan 1

Luhn Algorithm  Created by IBM scientist Hans Peter Luhn  Simple checksum formula used to validate identification numbers  Many extensions  Classical Algorithm Logic  Double the value of every second digit counting from the check digit  Sum all the digits  Mod 10 XXXXXXXXXXXXX Y X = account number, Y = check digit 2

Luhn Algorithm  Strengths and Weaknesses  Detect single-digit error  Almost all transposition of adjacent digits except 09 and 90  Detect some twin errors 3

Credit Card Verification  Credit Card pattern  Example:  16-bit Credit Card = Codeword  Double every other number, starting with the second number in from the right  If a number has two digits, add both digits together 4

Credit Card Verification  Add all numbers together  If last digit is a zero, it is a valid credit card number. If not, the credit card number is a fake. 5

HKID Verification  HK digit pattern X /X999999(C)  Each letter matches to a corresponding number NumberLetterNumberLetter 1A L M7G R 2B M X8H S 3C N Y9I T 4D O Z10J U 5E P11KV 6F Q 6

HKID Verification  Example: C546234(5)  8-bit HKID = Codeword  First 7-bit = Message  Last bit = Check Bit CheckSum =char[1]*8+char[2]*7+char[3]*6+char[4]*5+char[5]*4+cha r[6]*3+char[7]*2 =3(C)*8+5*7+4*6+6*5+2*4+3*3+4*2 =138 Check Bit =11-(CheckSum mod 11) = 11-(138mod11) = 5 C546234(5) is a valid HKID. 7

HKID Verification Assume a single error is represented by e Example: C546e34(5) CheckSum =char[1]*8+char[2]*7+char[3]*6+char[4]*5+e*4+cha r[6]*3+char[7]*2 =3(C)*8+5*7+4*6+6*5+e*4+3*3+4*2 =130+4e Check Bit =11-(CheckSum mod 11) =11-(130+4e)mod11=11-(9+4e)mod11 8

HKID Verification  If Check Bit == 5 =>11-(9+4e)mod11 = 5 =>(9+4e)mod11 = 6 =>9+4e = 11n+6 n is an positive integer =>e = (11n-3)/4 Single bit error is detected. e n3/117/ /1119/1123/1127/1131/1135/1139/11 9