SlideShare una empresa de Scribd logo
1 de 4
Validation of a Credit
Card Number
Come see how it works :D !
Gabriel
More about the MOD 10 algorithm
• The MOD 10 algorithm is a checksum (detection of errors) formula
which is the common name for the Luhn algorithm.
Wikipedia article about this subject pretty much covers the
essential about it.
• This formula has been in use to validate a lot of identification
numbers besides credit cards since its development by scientist
Hans Peter Luhn from IBM.
To teach you how to manually validate a specific number, lets
do an example:
Gabriel
Check this out !
• Say we have 38520000023237
and we want to check if it could be a real credit card number.
• Take the last digit <7>. This is our check digit.
• Take the rest of the sequence 3852000002323
Double every other digit starting from the right <6,8,10,2,0,0,0,0,0,2,6,2,6>
• Sum the digits of the products (e.g. 10 = 1 + 0 = 1)
• Add all the digits together: <6+8+1+2+0+0+0+0+0+2+6+2+6 = 33>
• Multiply the result by 9: <33 * 9 = 297>
Gabriel
Kind of Magic !
• 297
• Take the last digit of the result <7>.
If this matches the check digit we have a valid sequence !
• Since our check digit (7) matches our result (7), we conclude that
this sequence would be a valid credit card number!
Gabriel

Más contenido relacionado

La actualidad más candente

Multiplexer and DeMultiplexer
Multiplexer and DeMultiplexerMultiplexer and DeMultiplexer
Multiplexer and DeMultiplexerEstiak Khan
 
Encoders and decoders
Encoders and decodersEncoders and decoders
Encoders and decodersDeepikaDG1
 
BCD to binary code converter
BCD to binary code converterBCD to binary code converter
BCD to binary code converterkiruthikamaniG1
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codessrinu247
 
Encoders and decoders
Encoders and decodersEncoders and decoders
Encoders and decodersGaditek
 
logical circuits substractors
logical circuits substractors logical circuits substractors
logical circuits substractors Fâhém Ähmêd
 
Encoders and Decoders
Encoders and DecodersEncoders and Decoders
Encoders and DecodersNic JM
 
Encoder & Decoder
Encoder & DecoderEncoder & Decoder
Encoder & DecoderSyed Saeed
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxPavaniMachineni
 
How to open a savings bank account
How to open a savings bank accountHow to open a savings bank account
How to open a savings bank accountIts All About Money
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewatvishwesh sharma
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Color Sensor.pptx
Color Sensor.pptxColor Sensor.pptx
Color Sensor.pptxRituSachan2
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.CS_GDRCST
 

La actualidad más candente (20)

Multiplexer and DeMultiplexer
Multiplexer and DeMultiplexerMultiplexer and DeMultiplexer
Multiplexer and DeMultiplexer
 
IO Management
IO ManagementIO Management
IO Management
 
Encoders and decoders
Encoders and decodersEncoders and decoders
Encoders and decoders
 
BCD to binary code converter
BCD to binary code converterBCD to binary code converter
BCD to binary code converter
 
Shift Registers
Shift RegistersShift Registers
Shift Registers
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codes
 
Encoders and decoders
Encoders and decodersEncoders and decoders
Encoders and decoders
 
logical circuits substractors
logical circuits substractors logical circuits substractors
logical circuits substractors
 
Encoders and Decoders
Encoders and DecodersEncoders and Decoders
Encoders and Decoders
 
Encoder & Decoder
Encoder & DecoderEncoder & Decoder
Encoder & Decoder
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptx
 
BCD ADDER
BCD ADDER BCD ADDER
BCD ADDER
 
How to open a savings bank account
How to open a savings bank accountHow to open a savings bank account
How to open a savings bank account
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
BCD Adder
BCD AdderBCD Adder
BCD Adder
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewat
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Color Sensor.pptx
Color Sensor.pptxColor Sensor.pptx
Color Sensor.pptx
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.
 

Similar a Validation of a credit card number

Luhn algorithm
Luhn algorithmLuhn algorithm
Luhn algorithmNguyen Huy
 
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docx
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docxSkip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docx
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docxedgar6wallace88877
 
DutchMLSchool. ML Business Perspective
DutchMLSchool. ML Business PerspectiveDutchMLSchool. ML Business Perspective
DutchMLSchool. ML Business PerspectiveBigML, Inc
 
Machine learning workshop @DYP Pune
Machine learning workshop @DYP PuneMachine learning workshop @DYP Pune
Machine learning workshop @DYP PuneGanesh Raskar
 
Project 1 t-shirt business model
Project 1 t-shirt business modelProject 1 t-shirt business model
Project 1 t-shirt business modelParth Shah
 
DutchMLSchool. Your first BigML Project
DutchMLSchool. Your first BigML ProjectDutchMLSchool. Your first BigML Project
DutchMLSchool. Your first BigML ProjectBigML, Inc
 
Pseudocode algorithim flowchart
Pseudocode algorithim flowchartPseudocode algorithim flowchart
Pseudocode algorithim flowchartfika sweety
 
Scoring Customer Churn Risk
Scoring Customer Churn RiskScoring Customer Churn Risk
Scoring Customer Churn Riskrisraelkloss
 
2s complement arithmetic
2s complement arithmetic2s complement arithmetic
2s complement arithmeticSanjay Saluth
 
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the Sale
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the SaleSelling to the Enterprise: Value Statements, Buyer Types & Stages of the Sale
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the SaleSalesQualia
 
Machine learning for retail banking
Machine learning for retail bankingMachine learning for retail banking
Machine learning for retail bankingRudradeb Mitra
 
Product manager interview estimation
Product manager interview estimationProduct manager interview estimation
Product manager interview estimationAbhishek Kori
 
Programming exercises
Programming exercisesProgramming exercises
Programming exercisesTerry Yin
 
You can use a calculator to do numerical calculations. No graphing.docx
You can use a calculator to do numerical calculations. No graphing.docxYou can use a calculator to do numerical calculations. No graphing.docx
You can use a calculator to do numerical calculations. No graphing.docxjeffevans62972
 
Time & Cost Benefits of Robotics in Processing Amazon Deductions & Chargebacks
Time & Cost Benefits of Robotics in Processing Amazon Deductions & ChargebacksTime & Cost Benefits of Robotics in Processing Amazon Deductions & Chargebacks
Time & Cost Benefits of Robotics in Processing Amazon Deductions & ChargebacksSreedhar Narahari
 
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...Habit Summit
 

Similar a Validation of a credit card number (20)

Luhn algorithm
Luhn algorithmLuhn algorithm
Luhn algorithm
 
Introduction to BDD
Introduction to BDD Introduction to BDD
Introduction to BDD
 
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docx
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docxSkip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docx
Skip To ContentOpen Quick LinksQuick LinksPage LandmarksCont.docx
 
DutchMLSchool. ML Business Perspective
DutchMLSchool. ML Business PerspectiveDutchMLSchool. ML Business Perspective
DutchMLSchool. ML Business Perspective
 
Machine learning workshop @DYP Pune
Machine learning workshop @DYP PuneMachine learning workshop @DYP Pune
Machine learning workshop @DYP Pune
 
Project 1 t-shirt business model
Project 1 t-shirt business modelProject 1 t-shirt business model
Project 1 t-shirt business model
 
DutchMLSchool. Your first BigML Project
DutchMLSchool. Your first BigML ProjectDutchMLSchool. Your first BigML Project
DutchMLSchool. Your first BigML Project
 
Pseudocode algorithim flowchart
Pseudocode algorithim flowchartPseudocode algorithim flowchart
Pseudocode algorithim flowchart
 
Scoring Customer Churn Risk
Scoring Customer Churn RiskScoring Customer Churn Risk
Scoring Customer Churn Risk
 
Scoring Customer Churn Risk
Scoring Customer Churn RiskScoring Customer Churn Risk
Scoring Customer Churn Risk
 
Telecom Churn Analysis
Telecom Churn AnalysisTelecom Churn Analysis
Telecom Churn Analysis
 
2s complement arithmetic
2s complement arithmetic2s complement arithmetic
2s complement arithmetic
 
17 Jo P May 08
17 Jo P May 0817 Jo P May 08
17 Jo P May 08
 
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the Sale
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the SaleSelling to the Enterprise: Value Statements, Buyer Types & Stages of the Sale
Selling to the Enterprise: Value Statements, Buyer Types & Stages of the Sale
 
Machine learning for retail banking
Machine learning for retail bankingMachine learning for retail banking
Machine learning for retail banking
 
Product manager interview estimation
Product manager interview estimationProduct manager interview estimation
Product manager interview estimation
 
Programming exercises
Programming exercisesProgramming exercises
Programming exercises
 
You can use a calculator to do numerical calculations. No graphing.docx
You can use a calculator to do numerical calculations. No graphing.docxYou can use a calculator to do numerical calculations. No graphing.docx
You can use a calculator to do numerical calculations. No graphing.docx
 
Time & Cost Benefits of Robotics in Processing Amazon Deductions & Chargebacks
Time & Cost Benefits of Robotics in Processing Amazon Deductions & ChargebacksTime & Cost Benefits of Robotics in Processing Amazon Deductions & Chargebacks
Time & Cost Benefits of Robotics in Processing Amazon Deductions & Chargebacks
 
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...
Detecting and Building Habits: A Data-Driven Approach - Robert Moore, CEO, RJ...
 

Más de Pedro De Almeida

Java memory model primary ref. - faq
Java memory model   primary ref. - faqJava memory model   primary ref. - faq
Java memory model primary ref. - faqPedro De Almeida
 
Sistemas Operativos - Processos e Threads
Sistemas Operativos - Processos e ThreadsSistemas Operativos - Processos e Threads
Sistemas Operativos - Processos e ThreadsPedro De Almeida
 
XSD Incomplete Overview Draft
XSD Incomplete Overview DraftXSD Incomplete Overview Draft
XSD Incomplete Overview DraftPedro De Almeida
 
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1Pedro De Almeida
 
Sessão 10 Códigos Cíclicos
Sessão 10 Códigos CíclicosSessão 10 Códigos Cíclicos
Sessão 10 Códigos CíclicosPedro De Almeida
 
Sessao 9 Capacidade de canal e Introdução a Codificação de canal
Sessao 9 Capacidade de canal e Introdução a Codificação de canalSessao 9 Capacidade de canal e Introdução a Codificação de canal
Sessao 9 Capacidade de canal e Introdução a Codificação de canalPedro De Almeida
 
Sessão 8 Codificação Lempel-Ziv
Sessão 8 Codificação Lempel-ZivSessão 8 Codificação Lempel-Ziv
Sessão 8 Codificação Lempel-ZivPedro De Almeida
 
Sessao 7 Fontes com memória e codificação aritmética
Sessao 7 Fontes com memória e codificação aritméticaSessao 7 Fontes com memória e codificação aritmética
Sessao 7 Fontes com memória e codificação aritméticaPedro De Almeida
 
Sessao 5 Redundância e introdução à codificação de fonte
Sessao 5 Redundância e introdução à codificação de fonteSessao 5 Redundância e introdução à codificação de fonte
Sessao 5 Redundância e introdução à codificação de fontePedro De Almeida
 
Sessão 6 codificadores estatísticos
Sessão 6 codificadores estatísticosSessão 6 codificadores estatísticos
Sessão 6 codificadores estatísticosPedro De Almeida
 
Sessao 4 - Chaves espúrias e distância de unicidade
Sessao 4 - Chaves espúrias e distância de unicidadeSessao 4 - Chaves espúrias e distância de unicidade
Sessao 4 - Chaves espúrias e distância de unicidadePedro De Almeida
 
Sessao 3 Informação mútua e equívocos
Sessao 3 Informação mútua e equívocosSessao 3 Informação mútua e equívocos
Sessao 3 Informação mútua e equívocosPedro De Almeida
 
Sessao 2 Introdução à T.I e Entropias
Sessao 2 Introdução à T.I e EntropiasSessao 2 Introdução à T.I e Entropias
Sessao 2 Introdução à T.I e EntropiasPedro De Almeida
 
Cripto - Introdução, probabilidades e Conceito de Segurança
Cripto - Introdução, probabilidades e Conceito de SegurançaCripto - Introdução, probabilidades e Conceito de Segurança
Cripto - Introdução, probabilidades e Conceito de SegurançaPedro De Almeida
 

Más de Pedro De Almeida (20)

APM Model in .NET - PT-pt
APM Model in .NET - PT-ptAPM Model in .NET - PT-pt
APM Model in .NET - PT-pt
 
Java memory model primary ref. - faq
Java memory model   primary ref. - faqJava memory model   primary ref. - faq
Java memory model primary ref. - faq
 
Sistemas Operativos - Processos e Threads
Sistemas Operativos - Processos e ThreadsSistemas Operativos - Processos e Threads
Sistemas Operativos - Processos e Threads
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
 
XSD Incomplete Overview Draft
XSD Incomplete Overview DraftXSD Incomplete Overview Draft
XSD Incomplete Overview Draft
 
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1
O Projecto, Gestão de Projectos e o Gestor de Projectos - Parte 1
 
Classes e Objectos JAVA
Classes e Objectos JAVAClasses e Objectos JAVA
Classes e Objectos JAVA
 
Ficheiros em JAVA
Ficheiros em JAVAFicheiros em JAVA
Ficheiros em JAVA
 
Excepções JAVA
Excepções JAVAExcepções JAVA
Excepções JAVA
 
Sessão 10 Códigos Cíclicos
Sessão 10 Códigos CíclicosSessão 10 Códigos Cíclicos
Sessão 10 Códigos Cíclicos
 
Sessao 9 Capacidade de canal e Introdução a Codificação de canal
Sessao 9 Capacidade de canal e Introdução a Codificação de canalSessao 9 Capacidade de canal e Introdução a Codificação de canal
Sessao 9 Capacidade de canal e Introdução a Codificação de canal
 
Sessão 8 Codificação Lempel-Ziv
Sessão 8 Codificação Lempel-ZivSessão 8 Codificação Lempel-Ziv
Sessão 8 Codificação Lempel-Ziv
 
Sessao 7 Fontes com memória e codificação aritmética
Sessao 7 Fontes com memória e codificação aritméticaSessao 7 Fontes com memória e codificação aritmética
Sessao 7 Fontes com memória e codificação aritmética
 
Sessao 5 Redundância e introdução à codificação de fonte
Sessao 5 Redundância e introdução à codificação de fonteSessao 5 Redundância e introdução à codificação de fonte
Sessao 5 Redundância e introdução à codificação de fonte
 
Sessão 6 codificadores estatísticos
Sessão 6 codificadores estatísticosSessão 6 codificadores estatísticos
Sessão 6 codificadores estatísticos
 
Sessao 4 - Chaves espúrias e distância de unicidade
Sessao 4 - Chaves espúrias e distância de unicidadeSessao 4 - Chaves espúrias e distância de unicidade
Sessao 4 - Chaves espúrias e distância de unicidade
 
Sessao 3 Informação mútua e equívocos
Sessao 3 Informação mútua e equívocosSessao 3 Informação mútua e equívocos
Sessao 3 Informação mútua e equívocos
 
Sessao 2 Introdução à T.I e Entropias
Sessao 2 Introdução à T.I e EntropiasSessao 2 Introdução à T.I e Entropias
Sessao 2 Introdução à T.I e Entropias
 
Cripto - Introdução, probabilidades e Conceito de Segurança
Cripto - Introdução, probabilidades e Conceito de SegurançaCripto - Introdução, probabilidades e Conceito de Segurança
Cripto - Introdução, probabilidades e Conceito de Segurança
 
Basic java tutorial
Basic java tutorialBasic java tutorial
Basic java tutorial
 

Último

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Último (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Validation of a credit card number

  • 1. Validation of a Credit Card Number Come see how it works :D ! Gabriel
  • 2. More about the MOD 10 algorithm • The MOD 10 algorithm is a checksum (detection of errors) formula which is the common name for the Luhn algorithm. Wikipedia article about this subject pretty much covers the essential about it. • This formula has been in use to validate a lot of identification numbers besides credit cards since its development by scientist Hans Peter Luhn from IBM. To teach you how to manually validate a specific number, lets do an example: Gabriel
  • 3. Check this out ! • Say we have 38520000023237 and we want to check if it could be a real credit card number. • Take the last digit <7>. This is our check digit. • Take the rest of the sequence 3852000002323 Double every other digit starting from the right <6,8,10,2,0,0,0,0,0,2,6,2,6> • Sum the digits of the products (e.g. 10 = 1 + 0 = 1) • Add all the digits together: <6+8+1+2+0+0+0+0+0+2+6+2+6 = 33> • Multiply the result by 9: <33 * 9 = 297> Gabriel
  • 4. Kind of Magic ! • 297 • Take the last digit of the result <7>. If this matches the check digit we have a valid sequence ! • Since our check digit (7) matches our result (7), we conclude that this sequence would be a valid credit card number! Gabriel