Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

Magnetic ‘junkstripes’ still going strong for stored value payments on campus

CampusIDNews Staff   ||   Nov 01, 2002  ||   , , ,

Somewhere on your campus there is, very likely, a magnetic stripe stored value system in operation. Maybe it is a full-blown part of your campus ID card enabling cashless purchases in vending machines, photocopiers, and laundry facilities. Or maybe it is a stand-alone system for copiers in some renegade department, an internal control device for tracking departmental office equipment usage, or on the back of a dedicated library card issued only for use in the law library. Whatever the case, the little black stripe is likely on the back of some plastic cards on your campus.

The thin black stripe was nicknamed a “junkstripe” in the higher education market because of its frequent use as a means to purchase junkfood from vending machines. It looks like any other magnetic stripe, only more narrow. In fact, it is actually just a single track magnetic stripe–as compared to bank cards and most campus card that use a two- or three-track stripe. It contains a strip of magnetic material capable of recording data—just like its wider counterpart. It is made of a high coercivity (HiCo) material and thus is resistant to incidental erasure.

A handful of companies provide magnetic stripe stored value programs to campuses, but the technology originally was developed by Debitek (now Ingenico) and DANYL (formerly Schlumberger but recently sold to ESD). In the early 1990’s, the two companies worked in tandem developing the code and building the readers. In the mid-1990’s, the companies parted ways, each agreeing to continue to use the system and ensure compatibility in an effort to maintain a satisfied customer base. Both retain rights to develop the technology in perpetuity and both continued production of their own readers.

How the technology operates

A site code, or conditional acceptance number, is a short numeric identifier for the card, typically four-digits in length. An institution is granted a series of site codes specific to them. This code is the first data read during a transaction. If the code is not authorized for acceptance by a particular reader, the card is rejected. These codes ensure that a card from one school cannot be used at another location, unless the schools have agreed to share usage. Different codes can be used at a single institution to allow demographic data to be collected. For example, by assigning a different code to class levels it is possible to determine the volume of Diet Cokes purchased by sophomores. Additionally, variable pricing can be assigned to different site codes so that, for example, students pay less for products than visitors would. Readers can be programmed to accept as many as 32 separate site codes.

Value is the other significant piece of data recorded on a stripe. When a transaction is debited from a card, the entire value is erased from the card and the new value is written in its place.

The security behind the system

The security utilized in these systems does not rely on encryption. Instead it relies on the codes used to authorize transactions and the physical means by which data is encoded on the stripe. First, the numeric signals or messages that specify transactions are unknown outside of the companies. Therefore, outside parties cannot fraudulently initiate meaningful commands in an attempt to emulate reading and encoding. Second, the encoding heads that write data onto the magnetic stripe are positioned precisely at a specified angle which renders data on the stripe invisible to a read head positioned at any other angle. Other card readers and encoders cannot see the data encoded on the stripe.

While this security is by no means foolproof, our research found no reported cases of fraud against these systems. Perhaps this is because the dollar values for junkstripe transactions are typically quite low. As vended products, copies, and laundry are the typical uses for this type of payment the incentive to crack the system is unlikely to be financial in nature. Another reason for this apparent lack of fraud could be that it is difficult, if not impossible, to catch if it was occurring. Because the cards are not personalized to the cardholder, it would be extremely difficult to detect.

The process in a nutshell …

To use the technology, a customer needs the following components:

  • Card stock
    This can be ordered through the vendor or an independent card provider.
  • Software and card encoding device
    The software contains the site codes that allow the encoding device to create valid cards. The specific codes are hard coded into the package, ensuring that one location cannot make cards that could be used at another location.
  • Readers for machines to be controlled
    These units are the controlling devices that attach to the snack vending, soft drink vending, and laundry machines as well as to photocopiers, laser printers, video games, and even merchant cash registers.
  •  Devices to load value to cards
    A range of devices to allow cardholders to add value to the stripe are available.
  • Data collection devices
    A portable device is used to collect the transaction data from the readers and revalue stations deployed in the field. Laptop computers, handheld computers, and even Palm or Pocket PC units are available.

A blank card is made valid using the system software and the encoding device. Value is loaded by the cardholder and the card is used for payment in a single, or in a range of, card controlled devices. The value from the transaction is subtracted from the card balance and the new balance is rewritten to the stripe. At the same time, the reader credits its log with the amount of the transaction. Periodically, a staff member collects the data from the readers. It is then downloaded loaded into the system and total transaction values by merchant, machine, and site code are available.

In some cases, the campus may collect from the readers. In other cases, the vendors—such as the soft drink provider—collects the data and bills the school for the amount reported. An unresettable grand total counter exists in most readers which enables one party to periodically audit the reports of another. In the example above, the school could check this counter to ensure that they were not over-charged by the soft drink provider.

While junkstripe technology is not receiving the same level of attention that it did in the mid-1990’s it remains a powerful tool for tracking, controlling, and conducting transactions. The large base of schools that continue to utilize the technology today and the numbers still implementing the ensure that the systems will continue to play an important role in campus ID projects.

Subscribe to our weekly newsletter

RECENT POSTS

Feb 03, 23 /

Brown campus mailroom adds visual queue

Brown University has added a new visual queue in its campus mailroom that displays the order in which students will be called to pick up their packages. The system is underpinned by the student ID card and a kiosk system in the mailroom.
Feb 02, 23 / ,

East Carolina adds robot delivery with Grubhub, Starship

East Carolina University has joined the growing list of institutions to deploy robot delivery, partnering with Grubhub and Starship Technologies to provide the service. All students, faculty and staff at East Carolina University are able to leverage robot delivery from main campus dining locations.

LEAF on campus: An open standard for access control and identity management

ELATEC's Sean Houchin discusses a solution for campuses seeking an open alternative to traditional access control platforms: LEAF. LEAF is an open, interoperable platform that allows credential holders to use their LEAF ID card, key fob or smartphone to unlock access to various campus applications through any LEAF-enabled reader.
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Join us, @NACCUorg, and @TouchNet to explore how campus card programs can successfully navigate the sales and procurement process. Join the webinar on June 6, 2 pm EDT. https://go.touchnet.com/l/652093/2022-05-18/lsndq

Webinar: Learn how the University of Arizona uses campus cards, mobile ordering, kiosks, lockers, and robots to revolutionize campus dining. April 7, 2-2:30 EDT. Register Now at https://register.gotowebinar.com/register/7821245544009488910?source=campus-id

As supply chain issues in 2021 persist, identity solutions provider @ColorID discusses ways campuses can to overcome potentially troublesome delays until the situation eases.

https://www.cr80news.com/news-item/protecting-your-campus-card-program-from-supply-chain-issues/

A dining services push at the @UBuffalo is reinforcing the utility of self-service checkout. @CBORD is improving the food service experience using the GET app, as well as Nextep kiosks and Oracle’s Micros Simphony POS.

https://www.cr80news.com/news-item/kiosks-self-service-tech-streamline-campus-food-service-u-buffalo/

Did you miss our recent webinar? No worries - watch it on-demand. Leaders from @NAU and the @UAlberta joined Ryan Audus, Touchnet, and Andrew Hudson, @CR80News, to discuss innovative mobile services and the future of mobile tech in higher ed. Watch now: https://bit.ly/31RFyLn

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2023 CampusIDNews. All rights reserved.