What Is a Chip Card and How EMV Technology Really Works

Última actualización: 12/07/2025
  • Chip cards (EMV) use embedded microchips and dynamic cryptograms to secure in-person payments far better than magnetic stripes.
  • During each transaction, card and terminal run a multi-step EMV dialogue, including authentication, risk checks and cryptogram generation.
  • EMV cuts card-present counterfeit fraud significantly, but fraud has shifted towards card-not-present channels like online payments.
  • Global liability shifts and regional rules have driven widespread EMV adoption, making chip cards the standard for modern card security.

Illustration of a chip card

Chip cards have quietly become the “new normal” for paying in stores, at ATMs and even in many unattended terminals, but most people only know that they now need to “insert” or “dip” the card instead of just swiping it. Behind that tiny metallic square there is a full security architecture, global standards, complex certifications and a long history of evolution from the old magnetic stripe.

Understanding what a chip card is, how EMV technology works and where its real strengths and limits are is essential if you want to keep your money safe, reduce the risk of fraud in your business or simply make sense of why some terminals ask for a PIN and others just want a signature. This guide walks through the concept of chip cards from the ground up, connecting everyday use with the underlying technology and the global payment rules that support it.

What is a chip card?

A chip card is a standard‑size debit or credit card that contains a small integrated circuit (microchip) in addition to the traditional magnetic stripe. You will also see it called a smart card, EMV card, chip‑and‑PIN card or chip‑and‑signature card. The chip securely stores payment data and actively participates in each transaction, while the magnetic stripe mainly remains for backward compatibility with older terminals.

The term EMV comes from Europay, Mastercard and Visa, the three companies that originally defined the global chip standard in the 1990s. Today the specification is maintained by EMVCo, a consortium jointly owned by Visa, Mastercard, American Express, JCB, Discover and China UnionPay. The goal of EMV is to create a consistent, interoperable and more secure way to process card payments across the world.

From the outside, the chip looks like a small gold or silver metallic square on the front of the card, usually near the left side. Internally, that module contains a silicon chip with processing power, secure memory and cryptographic capabilities. Compared with the static data on a magnetic stripe, the chip can generate dynamic authentication data, which is the real game changer for security.

EMV cards exist in both contact and contactless forms. Contact cards must be inserted (“dipped”) into a terminal slot so the chip makes physical contact with the reader. Contactless EMV cards use near‑field communication (NFC), allowing the card to be tapped or held close to the terminal to complete the payment. Most modern cards combine chip, contactless and magstripe on a single plastic.

Because EMV is a global standard, the same basic chip technology underpins card products from many networks such as Visa, Mastercard, American Express, JCB, UnionPay, RuPay, Verve and regional schemes like Girocard, Dankort or Interac. Each network implements its own flavor (for example AEIPS for American Express, D-PAS for Discover, J Smart for JCB), but all are based on the same EMV building blocks.

EMV chip card concept

Why chip cards were created and how they evolved

Before chips, card payments relied on mechanical imprinters and then on magnetic stripes combined with signatures. Early credit card transactions involved placing the card into a manual imprinter with carbon paper, writing in amounts by hand and checking printed lists of stolen card numbers. Later, magstripe readers could electronically send data to the issuer, but verification still depended on the cardholder’s signature and a quick visual comparison by the cashier.

Magnetic stripe technology, introduced widely in the 1970s and 1980s, was a big step forward but it had a serious weakness: data on the stripe is static and stored in clear form. If criminals capture that stripe data with a skimmer, they can easily clone the card and use it anywhere stripes are accepted, particularly where only signature verification is required.

The invention of the silicon integrated circuit in 1959 opened the door to embedding chips in plastic cards. By the late 1960s and 1970s, smart cards started to appear, first as prepaid calling cards and later as payment cards. Early national implementations such as Carte Bancaire smart cards in France and Geldkarte in Germany predated the unified EMV specification and proved that chips could dramatically reduce domestic card fraud.

The first EMV standard was published in 1995, with major revisions in 1996, 1998 and 2000, gradually converging national schemes into a global interoperable framework. Over time, EMV added support for more robust cryptography, contactless transactions, mobile wallets and secure remote commerce, while keeping contact chip processing as the core.

EMV adoption spread first across Europe and other regions, and more slowly in the United States. France, the UK, Canada, Australia and many other countries migrated to chip‑and‑PIN years before the US, largely driven by regional liability shifts that pushed merchants and issuers to upgrade. The US officially adopted EMV for most in‑store transactions with a liability shift on counterfeit card fraud in October 2015, making chip fallback support almost universal there as well.

How chip cards actually work in a payment terminal

When you insert a chip card into a payment terminal, there’s a structured conversation between the card and the reader, defined in detail by the EMV specifications. That conversation takes place using ISO/IEC 7816 protocols and is made of commands called Application Protocol Data Units (APDUs) flowing back and forth.

The terminal first performs application selection, choosing which payment application on the card to use. Each application is identified by an Application Identifier (AID), which includes a Registered Application Provider Identifier (RID) plus a proprietary extension (PIX). Different schemes have different AIDs (for example, specific AIDs for Visa credit, Visa Electron, Mastercard, Maestro, UnionPay, RuPay, etc.), and these AIDs are what you see encoded on EMV receipts.

  Actuarial Cost Method: Definition, Types and Practical Impact

Once the application is selected, the reader sends a “get processing options” command. The card had previously shared a list of data it needs, called the Processing Options Data Objects List (PDOL). In response, the card returns its Application Interchange Profile (AIP), which indicates which EMV features it supports (such as offline data authentication types), and an Application File Locator (AFL), which tells the terminal which internal files and records it must read.

The terminal then reads the EMV data records from the card using “read record” commands. EMV doesn’t dictate exactly which physical files must store each data element, so the AFL is essential. The retrieved information is encoded in BER‑TLV format (tag‑length‑value), with EMV assigning the tags for all fields involved in processing (like application usage control, effective and expiry dates, cardholder verification lists, risk parameters and more).

Next come processing restrictions, where the terminal checks if the card is allowed to be used. It validates the application version, checks whether the card is domestic‑only or can be used internationally, and verifies effective and expiration dates. Failures here do not always mean automatic decline; instead, the terminal sets corresponding bits in the Terminal Verification Results (TVR), which are used later in the accept/decline decision.

Offline data authentication follows, using public‑key cryptography to verify the legitimacy of the card. Depending on card capabilities, terminals may perform Static Data Authentication (SDA), Dynamic Data Authentication (DDA) or Combined DDA/Application Cryptogram (CDA). SDA protects against simple data modification but not cloning, while DDA and especially CDA provide much stronger protection against both tampering and card duplication.

Authenticity is established through a chain of EMV certificates. A central EMV Certificate Authority issues certificates to issuers; the card then presents the issuer’s public key certificate and Signed Static Application Data (SSAD) to the terminal. Using the CA public key stored locally, the terminal verifies the issuer certificate and then uses the issuer key to validate the SSAD, confirming the card’s data really comes from that issuer.

Cardholder verification is the step where the person using the card proves they are authorized to do so. EMV supports many Cardholder Verification Methods (CVMs): online PIN, offline plaintext or encrypted PIN, signature, combinations of PIN and signature, consumer device verification (such as a mobile phone) and even “no CVM required” for low‑risk scenarios like small contactless payments.

The card contains a CVM list that defines which verification methods it prefers and in which order, and the terminal compares that list with its own capabilities. ATMs almost always support online PIN, while POS terminals may support PIN, signature or both, depending on the country and merchant configuration. Since 2017, EMVCo has also added support for biometric verification methods as CVMs.

Terminal risk management decides whether the transaction can be handled offline or must go online to the issuer. The terminal compares the amount with an offline ceiling limit, applies counters that force occasional online transactions, and can consult local hot card lists for offline environments. Any triggered conditions are again reflected in TVR bits.

The combined result of earlier checks (TVR plus action codes) leads to a terminal action analysis. Each acquirer configures Terminal Action Codes (TACs), and each issuer sets Issuer Action Codes (IACs). These codes, divided into Denial, Online and Default sets, specify how to react when particular TVR bits are set. By combining TAC and IAC, the terminal reaches a provisional decision to approve offline, go online for authorization, or decline offline.

Before this decision is final, the terminal asks the card to generate an application cryptogram. The card holds a Card Data Object List (CDOL1) that specifies which transaction details (amount, date, terminal country, risk flags and more) it wants to see. The terminal sends those values and requests either a Transaction Certificate (TC) for offline approval, an Authorization Request Cryptogram (ARQC) for an online request, or an Application Authentication Cryptogram (AAC) for offline decline.

The card can accept or override the terminal’s proposed course of action within EMV rules. For example, a card may respond with an ARQC even if the terminal asked for a TC, effectively forcing the transaction online. But it cannot respond with a TC if the terminal requested an ARQC. This step lets issuers exercise tight control over risk via parameters stored on the card.

For online transactions, the ARQC and other details are sent to the issuer or its processor. The issuer verifies the cryptogram, applies its own authorization logic (balance, risk scoring, anti‑fraud tools) and returns an authorization response code plus an Authorization Response Cryptogram (ARPC), and possibly an issuer script – a sequence of commands to update card settings or even block the card.

Once the terminal receives the issuer’s response, it performs a second card action analysis using CDOL2, feeding additional data (response code, ARPC and any scripts) back to the card. The card can then update its internal counters, adjust offline limits or execute issuer scripts, such as changing keys or disabling the application. Some optimizations like Visa Quick Chip and Mastercard M/Chip Fast skip ARPC and script processing when the card is removed quickly from the reader.

Types of chip cards: chip-and-signature vs chip-and-PIN and more

From the user’s perspective, the main difference between chip cards is how you authenticate yourself at the terminal. The two most widely known models are chip‑and‑signature and chip‑and‑PIN, although EMV supports additional options for contactless and mobile scenarios.

Chip‑and‑signature cards use the chip to secure transaction data but still rely on your handwritten signature as the verification method. You insert or tap the card, the chip negotiates a secure transaction, and then you sign the receipt. This model offers more security than pure magstripe‑and‑signature because skimming the stripe is much harder to exploit, but signatures themselves remain relatively weak as proof of identity.

Chip‑and‑PIN cards add a Personal Identification Number as the primary way to confirm that the person using the card is the legitimate holder. Once the chip has been read, the terminal asks for a 4-6 digit PIN. The PIN is verified either offline by the chip (in plaintext or encrypted form) or online by the issuer. In many countries – such as Canada, the UK, France and large parts of Europe and Latin America – chip‑and‑PIN is the standard for both debit and credit cards.

  What is commission and how does it really work?

Some markets mix both approaches. For instance, the United States long favored chip‑and‑signature, especially for credit cards, while using PIN mostly for debit and ATM transactions. Meanwhile, some unattended terminals (fuel pumps, ticket machines) may require PIN even for credit cards, and cross‑border travelers often see differences in behavior from one country to another.

Contactless EMV cards and mobile wallets introduce another layer: consumer device verification. For tap‑and‑go payments, the CVM may be “no CVM required” below a certain limit, or “consumer device CVM” when a smartphone or wearable has already authenticated the user with a fingerprint, face recognition or device PIN. In such cases, the terminal trusts that verification and doesn’t prompt the cardholder again.

Security benefits of chip cards

The core security benefit of chip cards is the use of dynamic cryptograms instead of static data when authorizing transactions. Each time a chip card is used at a chip‑enabled terminal, it generates a unique cryptographic code that cannot be reused. Even if criminals intercept that code, it will not help them approve another payment later.

This dynamic approach makes classical cloning attacks – so effective against magnetic stripes – largely ineffective for chip transactions. While the stripe revealed everything needed to copy a card, EMV chips never expose their internal keys and never send the same cryptogram twice. Combined with issuer fraud monitoring, this has led to major reductions in counterfeit card fraud wherever EMV has become the norm.

Issuers and networks complement chip security with advanced fraud monitoring systems. Banks track card usage by location, merchant category, purchase amount and timing. If a pattern looks suspicious – such as sudden foreign transactions or abnormal spending spikes – they can decline authorizations or reach out to the customer. When confirmed as fraud, issuers typically credit back unauthorized charges, subject to regulation and scheme rules.

Many EMV cards and terminals also support offline PIN verification, which works even when the terminal cannot reach the issuer. The PIN is checked by the chip using cryptographic keys stored securely on the card. While offline methods are not immune to all attack types, they provide a strong local defense against simple lost‑card misuse in environments with intermittent connectivity.

Contactless EMV builds the same cryptographic protections into tap payments. Despite myths, EMV contactless transactions have similar protections to contact ones, including dynamic cryptograms, risk checks and limits for no‑CVM transactions. For high‑value contactless purchases, many markets require either a PIN or device authentication.

Real‑world data supports the effectiveness of EMV. For example, Mastercard and Visa have reported drops of more than 70-80% in card‑present counterfeit fraud at merchants that deployed EMV terminals. Canada saw domestic card‑present debit fraud fall by almost 90% and credit card fraud by more than two‑thirds in the years after migration.

Limitations, vulnerabilities and what chip cards don’t solve

Despite the strong improvements, chip cards are not a magic shield against all forms of payment fraud. EMV primarily addresses card‑present counterfeit and theft at physical terminals; other fraud vectors remain and sometimes even grow as criminals adapt.

One well‑documented effect of EMV rollouts is the shift of fraud toward “card‑not‑present” (CNP) channels, such as online, telephone and mail‑order purchases. In these environments, the merchant cannot present a keypad or chip reader to the customer, so the transaction relies on card number, expiry date, security code and additional web‑based authentication methods. As a result, CNP fraud has become a large – often majority – portion of total card fraud in many markets.

Attackers constantly probe EMV implementations for weaknesses, and several academic teams have demonstrated proof‑of‑concept exploits. Examples include man‑in‑the‑middle devices that trick the terminal into believing a PIN was verified, or vulnerabilities in how cardholder verification methods are configured and validated. There have also been large‑scale supply chain attacks where POS terminals were physically tampered with before deployment to exfiltrate card data and PINs.

To mitigate some of these issues, schemes introduced measures such as “iCVV” (a different verification value on chip versus magstripe) so that data stolen from an EMV transaction cannot be reused to build a working stripe clone. Additionally, standards and best practices around POS security, key management and device lifecycle control have become stricter, making it harder to insert rogue devices into the field unnoticed.

Recent research has also highlighted weaknesses in contactless PIN enforcement for some brands, showing ways a sophisticated attacker might bypass PIN requirements by manipulating unprotected data fields or causing a “brand mix‑up” where a terminal thinks it is talking to one network while the card belongs to another. Networks and EMVCo respond to such findings with specification updates and certification tightening, but the key takeaway is that no system is ever finished from a security perspective.

Importantly, chip cards do not prevent data breaches at merchants or processors. If a retailer’s systems are compromised, attackers can still capture transaction data as it flows through their internal network, although strong cryptography and tokenization limit what can be done with it. EMV reduces the usefulness of stolen in‑store data for creating clones, but does not by itself stop breaches from happening.

Using a chip card in the real world

From a cardholder’s point of view, using a chip card in a store or at an ATM is straightforward once you’ve done it a couple of times. At a chip‑enabled POS terminal, you insert the card chip‑first into the slot and leave it there until the screen tells you to remove it. The terminal and chip carry out all the steps described earlier in a few seconds.

Depending on the merchant setup and your card type, you may be asked to enter a PIN, provide a signature, or do nothing at all. For traditional credit transactions in some countries, signature is still accepted, but many issuers and merchants are moving toward PIN or no‑signature flows to streamline checkout and rely more on the cryptographic security of EMV plus backend fraud detection.

  What Is Central Purchasing? Definition, Models and Benefits

If a terminal doesn’t support chips or the chip is unreadable after several attempts, it may fall back to a magnetic stripe swipe. This is mainly retained to support legacy environments and international travelers, but it comes with higher risk. Because of this, card schemes and issuers often treat magstripe fallback as suspicious and may apply tighter monitoring or decline rules to those transactions.

ATMs handle chip cards in a similar way. You insert the card, the ATM reads the chip, and you enter your PIN. Some ATMs may briefly pull in and re‑insert the card as they communicate with the chip, but the general rule is the same: keep the card in the machine until the screen tells you to take it and collect your cash or receipt.

Online and phone purchases work essentially the same way with chip cards as with old magstripe‑only cards. You still enter the card number, expiry and security code on websites or provide them verbally on calls. EMV does not change this, although the same card may be enrolled in 3‑D Secure or similar strong customer authentication tools that add one‑time codes or out‑of‑band confirmations to reduce CNP fraud.

Merchant adoption, liability shifts and global differences

One of the main levers that accelerated EMV adoption worldwide has been the concept of the “liability shift”. Historically, issuers absorbed most counterfeit fraud costs. Under EMV rules, if a fraudulent transaction occurs and one party (merchant/acquirer or issuer) is using EMV while the other is not, liability often shifts to the party that has not upgraded to chip technology.

These liability shifts occurred at different dates by region, card brand and channel. For example, in the European Union, many shifts took effect in the mid‑2000s for POS and a bit later for ATMs. In Latin America, Asia‑Pacific and Canada, EMV timelines varied but converged on similar principles: merchants and ATM operators who delayed EMV upgrades became increasingly exposed to counterfeit fraud losses.

The United States, a late adopter, saw major liability shifts for POS on October 1, 2015, for most networks, with later dates for ATMs and automated fuel dispensers (“pay at the pump”). As of today, the vast majority of US cards are chip‑enabled and most storefronts accept chip, though some still rely on magstripe or operate hybrid configurations where chip readers are present but not fully enabled.

Regional card schemes such as Interac in Canada and domestic systems in Europe, Asia and Africa have their own EMV migration milestones. Some, like Malaysia, achieved full EMV compliance for cards and terminals relatively early, while others rolled out gradually in stages. Despite different timelines, the trend has been consistent: card‑present fraud drops significantly after widespread EMV rollout.

For travelers, differences in EMV usage can cause practical inconveniences. A visitor from a magstripe‑oriented market may find that some kiosks, ticket machines or unattended fuel pumps abroad refuse their card because they require chip‑and‑PIN. Conversely, some staff in chip‑centric countries may be reluctant to accept a signature‑only or magstripe‑only foreign card, mistakenly fearing increased liability, even though scheme rules usually oblige them to accept the card if the network is supported.

EMV beyond the physical card: remote authentication and tokens

As card‑not‑present fraud grew, networks and issuers extended EMV concepts to online and remote transactions. One important development is the use of one‑time passwords and device‑based authenticators that rely on EMV‑style cryptography, such as Mastercard’s Chip Authentication Program (CAP) and Visa’s Dynamic Passcode Authentication (DPA).

In these models, the physical chip card or a specialized EMV device generates short‑lived codes that prove possession of the card for online payments. The user typically inserts the card into a small reader or uses a card with an integrated keypad and display to get a one‑time code, which is then entered on the merchant or bank website. Even if this code is intercepted, it cannot be reused later.

Another important evolution is tokenization, which replaces the actual card number with surrogate values. In EMV environments, tokens can be used both in-store and online: mobile wallets like Apple Pay or Google Pay store EMV‑style tokens on the device, and each transaction produces a one‑time cryptogram that the issuer can map back to the real account. This dramatically reduces the value of stolen data, since tokens are limited in scope and can be revoked without replacing the physical card.

In these models, the physical chip card or a specialized EMV device generates short‑lived codes that prove possession of the card for online payments. The user typically inserts the card into a small reader or uses a card with an integrated keypad and display to get a one‑time code, which is then entered on the merchant or bank website. Even if this code is intercepted, it cannot be reused later.

Banks and processors now blend EMV, tokenization, 3‑D Secure, behavioral analytics and strong customer authentication rules into multi‑layered defense strategies. Chip cards are one pillar in that stack: they are extremely effective at blocking straightforward cloning and many point‑of‑sale attacks, but they work best as part of a larger ecosystem of controls.

EMV chip cards, liability shifts and modern risk tools have reshaped how card payments work worldwide, cutting down on face‑to‑face counterfeit fraud, changing incentives for merchants and issuers, and pushing criminals to look for weaker links in e‑commerce, social engineering and malware. For cardholders and businesses, understanding how chips function, what they protect against and where the gaps still are is the key to making smarter security choices when paying, accepting cards or designing payment systems.

Tokenización
Artículo relacionado:
Tokenization moves center stage: S&P index plans, RWAs, money markets and payments converge