check digit ?

Posted on 2007-10-04
Last Modified: 2008-01-09

I need to check wether an Isin code specified by a user is valid or not..
I found this article exaplaining an algoryhtm to compute a "check digit" :
But what do I have to do after calculating this check digit ?

Maybe if you have some experience in security, you understand what this is about ? (I have none)

Thank you.
Question by:matthew016
    LVL 59

    Accepted Solution

    Check digits are often used to support validation of a data sequence which is how it appears to b eused in this instance.

    i.e. if you enter the ISIN but make a typo the check digit will likely indicate the fact and you can prompt for a re-entry.  It means when entering an ISIN for validation you should calculate the correct check digit and ensure the data as entered validates against it.

    LVL 9

    Author Comment

    I am not sure I understand.
    If user makes a typo, I will compute a certain digit. How can I detect from this digit that he made a typo ?
    LVL 59

    Expert Comment

    by:Chris Bottomley
    Error checking is a speciality in it's own right ... i'm not saying i'm an expert but as far as I can see the referenced syntax will indicate an error exists but it is not error correcting and will not indicate which character, (or characters are wrong).

    i.e. when requesting or receiving the data you should calculate the check digit for each datum and ensure it is correct before proceeding and where any individual datum is wrong reject it and move on.

    LVL 9

    Author Comment

    Well I need to know how I detect an error exists.
    I do not want to correct the error.

    But now I am maybe confusing
    * error detection in some kind of I/O operations, etc. and
    * validation to check if the data entered is a valid sequence
    LVL 9

    Author Comment

    nevermind ...

    I see that I can check the digit computed with the last number of the sequence number.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Suggested Solutions

    When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
    If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    25 Experts available now in Live!

    Get 1:1 Help Now