Random credit card validation question

Soldato
Joined
2 Oct 2007
Posts
4,336
Location
Oxfordshire
Right, bank acount numbers and sort code please :rolleyes:

No, um am doing some silly credit card storage program for uni assignment (nothing major, only a first year) but whats the maxiumum life of a single credit card? Am being told its 3 years before it gets issued again but thought I'd ask you lot, am sure 1 person here has a credit card! I don't!!

Cheers!
 
Not sure about the lifetime but don't forget to do a Mod10 on the card number to check it's valid.
 
Not sure about the lifetime but don't forget to do a Mod10 on the card number to check it's valid.

Yer we were told we could use Mod10 code from interenet if we found it and reference it, found some of that to return the simple true or false for me :D
 
it's 3 years on my natwest debit + credit cards and nationwide current account.
 
[ZiiP]carrot;14015087 said:
Its storing the values as ints...in a txt file :p

eeps ;)

At a minimum, PCI DSS requires PAN (Primary Account Number: card number) to be rendered unreadable anywhere it is stored – including portable digital media, backup media, and in logs. Software solutions for this requirement may include one of the following:
• One-way hash functions based on strong cryptography – also called hashed index, which displays only index data that point to records in the database where sensitive data actually reside.
• Truncation – removing a data segment, such as showing only the last four digits.
• Index tokens and securely stored pads – encryption algorithm that combines sensitive plain text data with a random key or “pad” that works only once.
• Strong cryptography – with associated key management processes and procedures. Refer to the PCI DSS and PA-DSS Glossary of Terms, Abbreviations and Acronyms for the definition of “strong cryptography.”
Some cryptography solutions encrypt specific fields of information stored in a database; others encrypt a singular file or even the entire disk where data is stored. If full-disk encryption is used, logical access must be managed independently of native operating system access control mechanisms. Decryption keys must not be tied to user accounts. Encryption keys used for encryption of cardholder data must be protected against both disclosure and misuse. All key management processes and procedures for keys used for encryption of cardholder data must be fully documented and implemented.

Edit: and if your still bored after writing a secure encrypt & key management system you could always lookup the bin number and id the "card" http://en.wikipedia.org/wiki/List_of_Bank_Identification_Numbers ;)
 
Last edited:
i wouldn't worry too much, as long as your just doing it as a coding test and not taking payments/using real card data your fine :)

Nah mate!! No real payments, just a small assignment where the user would use the program to store password to websites and notes. Our job was to add some plugins for credit cards, bank details etc etc. Been quite good fun actually, just finishing my 1st year at uni and enjoying it :D
 
Back
Top Bottom