Personal Identification Number (Denmark), Personal Identification Numbers
   HOME

TheInfoList



OR:

A personal identification number (PIN; sometimes redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to facilitating the private data exchange between different data-processing centers in computer networks for financial institutions, governments, and enterprises. PINs may be used to authenticate banking systems with cardholders, governments with citizens, enterprises with employees, and computers with users, among other uses. In common usage, PINs are used in ATM or PO transactions, secure access control (e.g. computer access, door access, car access), internet transactions, or to log into a restricted website.


History

The PIN originated with the introduction of the
automated teller machine An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account ...
(ATM) in 1967, as an efficient way for banks to dispense cash to their customers. The first ATM system was that of
Barclays Barclays PLC (, occasionally ) is a British multinational universal bank, headquartered in London, England. Barclays operates as two divisions, Barclays UK and Barclays International, supported by a service company, Barclays Execution Services ...
in London, in 1967; it accepted
cheque A cheque (or check in American English) is a document that orders a bank, building society, or credit union, to pay a specific amount of money from a person's account to the person in whose name the cheque has been issued. The person writing ...
s with machine-readable encoding, rather than cards, and matched the PIN to the cheque. In 1972,
Lloyds Bank Lloyds Bank plc is a major British retail banking, retail and commercial bank with a significant presence across England and Wales. It has traditionally been regarded one of the "Big Four (banking)#England and Wales, Big Four" clearing house ...
issued the first bank card to feature an information-encoding magnetic strip, using a PIN for security.
James Goodfellow James Goodfellow (born 1937) is a Scottish inventor. In 1966, he patented personal identification number (PIN) technology and an automated teller machine (ATM). He is generally considered the inventor of the modern ATM. Goodfellow was born i ...
, the inventor who patented the first personal identification number, was awarded an
OBE The Most Excellent Order of the British Empire is a British order of chivalry, rewarding valuable service in a wide range of useful activities. It comprises five classes of awards across both civil and military divisions, the most senior two o ...
in the 2006
Queen's Birthday Honours The Birthday Honours, in some Commonwealth realms, mark the King's Official Birthday, reigning monarch's official birthday in each realm by granting various individuals appointment into Order (honour), national or Dynastic order of knighthood, dy ...
.
Mohamed M. Atalla Mohamed M. Atalla (; August 4, 1924 – December 30, 2009) was an Egyptian-American engineer, physicist, cryptographer, inventor and entrepreneur. He was a semiconductor pioneer who made important contributions to modern electronics. He is best ...
invented the first PIN-based
hardware security module A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryption and decryption functions for digital signatures, strong authentication and other crypt ...
(HSM), dubbed the "Atalla Box," a security system that encrypted PIN and ATM messages and protected offline devices with an un-guessable PIN-generating key. In 1972, Atalla filed for his PIN verification system, which included an encoded
card reader A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcod ...
and described a system that utilized
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
techniques to assure telephone link security while entering personal ID information that was transmitted to a remote location for verification. He founded
Atalla Corporation Utimaco Atalla, founded as Atalla Technovation and formerly known as Atalla Corporation or HP Atalla, is a security vendor, active in the market segments of data security and cryptography. Atalla provides government-grade end-to-end products in ...
(now
Utimaco Atalla Utimaco Atalla, founded as Atalla Technovation and formerly known as Atalla Corporation or HP Atalla, is a security vendor, active in the market segments of data security and cryptography. Atalla provides government-grade end-to-end products in ...
) in 1972, and commercially launched the "Atalla Box" in 1973. The product was released as the Identikey. It was a card reader and customer identification system, providing a terminal with
plastic card Plastic cards usually serve as identity documents, thus providing authentication. In combination with other assets that complement the data stored on the card, like Personal identification number, PIN numbers, they also serve authorization purpose ...
and PIN capabilities. The system was designed to let
bank A bank is a financial institution that accepts Deposit account, deposits from the public and creates a demand deposit while simultaneously making loans. Lending activities can be directly performed by the bank or indirectly through capital m ...
s and
thrift institutions A savings and loan association (S&L), or thrift institution, is a financial institution that specializes in accepting savings deposits and making mortgage and other loans. While the terms "S&L" and "thrift" are mainly used in the United States, ...
switch to a plastic card environment from a
passbook A passbook or bankbook is a paper book used to record bank or building society transactions on a deposit account. Traditionally, a passbook was used for accounts with a low transaction volume, such as savings accounts. A bank teller or postm ...
program. The Identikey system consisted of a card reader console, two customer
PIN pad A PIN pad or PIN entry device is an electronic device used in a debit, credit or smart card-based transaction to accept and encrypt the cardholder's personal identification number (PIN). PIN pads are normally used with payment terminals, autom ...
s, intelligent controller and built-in electronic interface package. The device consisted of two
keypads A keypad is a block or pad of buttons set with an arrangement of digits, symbols, or alphabetical letters. Pads mostly containing numbers and used with computers are numeric keypads. Keypads are found on devices which require mainly numeric in ...
, one for the customer and one for the teller. It allowed the customer to type in a secret code, which is transformed by the device, using a
microprocessor A microprocessor is a computer processor (computing), processor for which the data processing logic and control is included on a single integrated circuit (IC), or a small number of ICs. The microprocessor contains the arithmetic, logic, a ...
, into another code for the teller. During a transaction, the customer's account number was read by the card reader. This process replaced manual entry and avoided possible key stroke errors. It allowed users to replace traditional customer verification methods such as signature verification and test questions with a secure PIN system. In recognition of his work on the PIN system of
information security management Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The ...
, Atalla has been referred to as the "Father of the PIN". The success of the "Atalla Box" led to the wide adoption of PIN-based hardware security modules. Its PIN verification process was similar to the later IBM 3624. By 1998 an estimated 70% of all ATM transactions in the United States were routed through specialized Atalla hardware modules, and by 2003 the Atalla Box secured 80% of all ATM machines in the world, increasing to 85% as of 2006. Atalla's HSM products protect 250million card transactions every day as of 2013, and still secure the majority of the world's ATM transactions as of 2014.


Financial services


PIN usage

In the context of a financial transaction, usually both a private "PIN code" and public user identifier are required to authenticate a user to the system. In these situations, typically the user is required to provide a non-confidential user identifier or token (the ''user ID'') and a confidential PIN to gain access to the system. Upon receiving the user ID and PIN, the system looks up the PIN based upon the user ID and compares the looked-up PIN with the received PIN. The user is granted access only when the number entered matches the number stored in the system. Hence, despite the name, a PIN does not ''personally'' identify the user. The PIN is not printed or embedded on the card but is manually entered by the cardholder during
automated teller machine An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account ...
(ATM) and
point of sale The point of sale (POS) or point of purchase (POP) is the time and place at which a retail transaction is completed. At the point of sale, the merchant calculates the amount owed by the customer, indicates that amount, may prepare an invoice f ...
(PO) transactions (such as those that comply with
EMV EMV is a payment method based on a technical standard for smart card, smart payment cards and for payment terminals and automated teller machines which can accept them. EMV stands for "Europay International, Europay, Mastercard, and Visa Inc., ...
), and in card not present transactions, such as over the Internet or for phone banking.


PIN length

The international standard for financial services PIN management, ISO 9564-1, allows for PINs from four up to twelve digits, but recommends that for usability reasons the card issuer not assign a PIN longer than six digits. The inventor of the ATM,
John Shepherd-Barron John Adrian Shepherd-Barron OBE (23 June 1925 – 15 May 2010) was an India-born British inventor, who led the team that installed the first cash machine, sometimes referred to as the automated teller machine or ATM. Early life John Adrian Shep ...
, had at first envisioned a six-digit numeric code, but his wife could only remember four digits, and that has become the most commonly used length in many places, although banks in Switzerland and many other countries require a six-digit PIN.


PIN validation

There are several main methods of validating PINs. The operations discussed below are usually performed within a
hardware security module A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), and performs encryption and decryption functions for digital signatures, strong authentication and other crypt ...
(HSM).


IBM 3624 method

One of the earliest ATM models was the IBM 3624, which used the IBM method to generate what is termed a ''natural PIN''. The natural PIN is generated by encrypting the primary account number (PAN), using an encryption key generated specifically for the purpose. This key is sometimes referred to as the PIN generation key (PGK). This PIN is directly related to the primary account number. To validate the PIN, the issuing bank regenerates the PIN using the above method, and compares this with the entered PIN. Natural PINs cannot be user selectable because they are derived from the PAN. If the card is reissued with a new PAN, a new PIN must be generated. Natural PINs allow banks to issue PIN reminder letters as the PIN can be generated.


IBM 3624 + offset method

To allow user-selectable PINs it is possible to store a PIN offset value. The offset is found by subtracting the natural PIN from the customer selected PIN using
modulo In computing and mathematics, the modulo operation returns the remainder or signed remainder of a division, after one number is divided by another, the latter being called the '' modulus'' of the operation. Given two positive numbers and , mo ...
10. For example, if the natural PIN is 1234, and the user wishes to have a PIN of 2345, the offset is 1111. The offset can be stored either on the card track data, or in a database at the card issuer. To validate the PIN, the issuing bank calculates the natural PIN as in the above method, then adds the offset and compares this value to the entered PIN.


VISA method

The VISA method is used by many card schemes and is not VISA-specific. The VISA method generates a PIN verification value (PVV). Similar to the offset value, it can be stored on the card's track data, or in a database at the card issuer. This is called the reference PVV. The VISA method takes the rightmost eleven digits of the PAN excluding the checksum value, a PIN validation key index (PVKI, chosen from one to six, a PVKI of 0 indicates that the PIN cannot be verified through PVS) and the required PIN value to make a 64-bit number, the PVKI selects a validation key (PVK, of 128 bits) to encrypt this number. From this encrypted value, the PVV is found. To validate the PIN, the issuing bank calculates a PVV value from the entered PIN and PAN and compares this value to the reference PVV. If the reference PVV and the calculated PVV match, the correct PIN was entered. Unlike the IBM method, the VISA method does not derive a PIN. The PVV value is used to confirm the PIN entered at the terminal, was also used to generate the reference PVV. The PIN used to generate a PVV can be randomly generated, user-selected or even derived using the IBM method.


PIN security

Financial PINs are often four-digit numbers in the range 0000–9999, resulting in 10,000 possible combinations. Switzerland issues six-digit PINs by default. Some systems set up default PINs and most allow the customer to set up a PIN or to change the default one, and on some a change of PIN on first access is mandatory. Customers are usually advised not to set up a PIN-based on their or their spouse's birthdays, on driver license numbers, consecutive or repetitive numbers, or some other schemes. Some financial institutions do not give out or permit PINs where all digits are identical (such as 1111, 2222, ...), consecutive (1234, 2345, ...), numbers that start with one or more zeroes, or the last four digits of the cardholder's
social security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
or birth date. Many PIN verification systems allow three attempts, thereby giving a card thief a putative 0.03%
probability Probability is a branch of mathematics and statistics concerning events and numerical descriptions of how likely they are to occur. The probability of an event is a number between 0 and 1; the larger the probability, the more likely an e ...
of guessing the correct PIN before the card is blocked. This holds only if all PINs are equally likely and the attacker has no further information available, which has not been the case with some of the many PIN generation and verification algorithms that financial institutions and ATM manufacturers have used in the past. Research has been done on commonly used PINs. The result is that without forethought, a sizable portion of users may find their PIN vulnerable. "Armed with only four possibilities, hackers can crack 20% of all PINs. Allow them no more than fifteen numbers, and they can tap the accounts of more than a quarter of card-holders." Breakable PINs can worsen with length, to wit:


Implementation flaws

In 2002, two PhD students at
Cambridge University The University of Cambridge is a Public university, public collegiate university, collegiate research university in Cambridge, England. Founded in 1209, the University of Cambridge is the List of oldest universities in continuous operation, wo ...
, Piotr Zieliński and Mike Bond, discovered a security flaw in the PIN generation system of the IBM 3624, which was duplicated in most later hardware. Known as the decimalization table attack, the flaw would allow someone who has access to a bank's computer system to determine the PIN for an ATM card in an average of 15 guesses.


Reverse PIN hoax

Rumours have been in e-mail and Internet circulation claiming that in the event of entering a PIN into an ATM backwards, law enforcement will be instantly alerted as well as money being ordinarily issued as if the PIN had been entered correctly. The intention of this scheme would be to protect victims of muggings; however, despite the
system A system is a group of interacting or interrelated elements that act according to a set of rules to form a unified whole. A system, surrounded and influenced by its open system (systems theory), environment, is described by its boundaries, str ...
being proposed for use in some US states, there are no ATMs currently in existence that employ this software.


Mobile phone passcodes

A mobile phone may be PIN protected. If enabled, the PIN (also called a passcode) for
GSM The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
mobile phones can be between four and eight digits and is recorded in the
SIM card A typical SIM card (mini-SIM with micro-SIM cutout)A SIM card or SIM (subscriber identity module) is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI) number and its related key, which are u ...
. If such a PIN is entered incorrectly three times, the SIM card is blocked until a
personal unblocking code A personal unblocking key (PUK), sometimes called personal unblocking code (PUC), is used in SIM cards to reset a personal identification number (PIN) that has been lost or forgotten. Most mobile phones offer the feature of PIN protection. After ...
(PUC or PUK), provided by the service operator, is entered. If the PUC is entered incorrectly ten times, the SIM card is permanently blocked, requiring a new SIM card from the mobile carrier service. Note that this should not be confused with software-based passcodes that are often used on smartphones with lock screens: these are not related to the device's cellular SIM card, PIN and PUC.


See also

* ATM SafetyPIN software * Campus card *
Transaction authentication number A transaction authentication number (TAN) is used by some online banking services as a form of ''single use'' one-time passwords (OTPs) to authorize financial transactions. TANs are a second layer of security above and beyond the traditional singl ...


References

{{DEFAULTSORT:Personal Identification Number Banking terms Identity documents Password authentication