What are the security issues of POS machines?

Updated on technology 2024-05-09
3 answers
  1. Anonymous users2024-02-09

    The correct process for accepting bank cards:

    1. Card review: check whether there is the name and logo of the issuing bank on the card, whether there are alterations, scratches, corners or punches, and whether there are sample test cards; Credit cards should be reviewed for signatures on pre-printed codes, expiration dates, laser anti-counterfeiting logos and signature strips;

    2. When swiping the card on the POS, check whether the card number displayed on the POS LCD screen is consistent with the card number on the card surface, if it is inconsistent, it will not be accepted; (This item must be paid special attention and strictly enforced).

    3. Enter the amount, note that the minimum unit of the amount is "points", and press the "0" key to make up for the shortcomings;

    4. Please enter the password on the PINpad and press the "Confirm" button directly on the PINpad without the password;

    5. After the transaction is successful, please sign the cardholder on the purchase form. Then check whether the card number on the purchase order is consistent with the card number embossed on the card surface, and check the transaction elements such as amount and time; Double-check that the signature on the purchase slip matches the reserved signature on the back of the credit card. If there is a significant discrepancy, it will not be accepted.

    (This item must be paid special attention and strictly enforced).

    6. Give the cardholder's stub and card to the customer, and keep the merchant coupon properly for 2 years in case the bank adjusts the order.

    Precautions: 1. If there is a transaction on the day of POS, it must be settled;

    2. If there is a chip in a single-currency foreign card, the card must be inserted to make a transaction, and if the transaction is unsuccessful, change to another payment method;

    3. If the POS does not print the purchase order, there is no signature on the purchase form or the signature does not match, the transaction will be deemed to be unsuccessful;

    4. When returning the goods, the cardholder is required to bring the original card to return. If the return transaction is unsuccessful, do not try again. Check whether the return transaction is successful the next day, and then initiate a manual return transaction if it is unsuccessful.

  2. Anonymous users2024-02-08

    <> general garbled codes, and small problems such as can't be swiped with small receipts. A ** to the company can help you solve it.

  3. Anonymous users2024-02-07

    The risk of handling the POS machine: the funds are not safe when it is handled by the second clearing machine, and the handling fee will be higher than that of the first clearing machine; It is easy to handle non-compliant POS machines, which are loaded with stolen devices, and personal information and funds are at risk of being stolen and swiped; The merchant is informal, and the card is not paid after the card is swiped.

    Although it is more convenient for individuals to cash out POS machines, after all, cashing out is a violation of the rules, and there are the following risks:

    1. When handling the second clearing machine, the funds are not safe, and the handling fee will be higher than that of the first clearing machine;

    2. It is easy to handle non-compliant POS machines, which are installed with stolen Yinling brush devices, and personal information and funds are at risk of being stolen and stolen;

    3. The merchant is irregular, the account is not received after swiping the card, the merchant runs away or goes bankrupt, and the loss of funds is not returned.

    It is recommended that you be cautious when handling POS machines, but if you choose the right brand.

Related questions
10 answers2024-05-09

When people frequently use QQ, MSN and other chat tools as communication tools for daily work and life, whether the password, personal data and chat history of the chat tool can be safe has become a crucial issue. >>>More

8 answers2024-05-09

The switch port has MAC address binding and port + MAC+IP binding on the switch to prevent ARP attacks and DHCP attacks. ACL has IP-based MAC-based access restrictions. Restrict and allow client traffic based on MAC address; Avoid MAC address proliferation attacks; Avoid MAC address spoofing attacks (hosts using fake MAC addresses to send illegal data). >>>More

7 answers2024-05-09

There are many disadvantages of plate theory:

1.Plate theory cannot explain today's land and sea. >>>More

5 answers2024-05-09

1) The concept of operating life insurance and the Fang Weiyuan method are used to operate health insurance, (2) there is a lack of empirical data, and (3) there are shortcomings in China's medical system: first, the allocation of medical resources is unreasonable, and the medical services that should be implemented in community medical and health service institutions have to be solved in large hospitals; >>>More

6 answers2024-05-09

There are several main problems:

1. Lack of connection between kindergartens and primary schools; >>>More