尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Technical Project Report
On
“SMART CARD TECHONOLOGY”
Submitted in partial fulfillment of the
Requirements for the award of the degree of
Bachelor of Technology
In
Computer Science & Engineering
BY
UNDER THE GUIDENCE OF
MS.B VADA VIDYA
R.SAI BHASKAR(13R21A05L3)
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043.
2016-17
Department of Computer Science & Engineering
MLR INSTITUTE OF TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
DUNDIGAL(V), QUTHBULLAPUR Mandal, HYDERABAD -500 043.
.
CERTIFICATE
This is to certify that the Technical project entitled “SMART CARD TECHONOLOGY ” by
R.SAI BHASKAR(13R21A05L3) has been submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied
in this project have not been submitted to any other University or Institution for the award of any
degree or diploma.
Internal Guide Head of the Department
External Examiner
DECLARATION
I hereby declare that the project entitled “SMART CARD TECHONOLOGY” is the
work done during the period from MARCH 2017 and is submitted in the partial fulfillment of the
requirements for the award of degree of Bachelor of technology in computer Science and
Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results embodied in
this project have not been submitted to any other university or Institution for the award of any
degree or diploma.
R . SAI BHASKAR(13R21A05L3)
ACKNOWLEDGEMENT
There are many people who helped me directly and indirectly to complete my project
successfully. I would like to take this opportunity to thank one and all.
First of all I would like to express my deep gratitude towards my internal guide
Ms.B VADA VIDHYA Assistant Professor. Department of CSE for his support in the
completion of my dissertation. I wish to express my sincere thanks to, Dr. N. Chandrashekar
HOD, Dept. of CSE and also to our principal Dr. P BHASKARAR REDDY for providing the
facilities to complete the dissertation.
I would like to thank all our faculty and friends for their help and constructive criticism
during the project period. Finally, I am very much indebted to our parents for their moral support
and encouragement to achieve goals.
R.SAI BHASKAR(13R21A05L3)
ABSTRACT
Right now, in most of the countries, inside the people ’s wallet, they probably have a the
couple of credit cards, an identification card, automatic machine teller cards (ATM card),
and maybe a few other plastic cards. Without realizing it, these plastic cards havebecome
a very important part of their life. Although smart card technology improves security and
convenient but it is not used in a wide range in Middle East countries.
User acceptance is vital for further development of any fresh technology and smart card
technology as well. One of the factors that can effect on the acceptance of smart card
technology is users’ awareness. The goal of this study is to present a general overview of
smart card technology and identify the smart card’s benefits, features and characteristics
and moreover, the level of users’ knowledge and awareness about smart card technology
will be evaluated. In order to achieve this goal, a survey was conducted among the
international students of University Technology Malaysia to measure their awareness of
smart technology
TABLE OF CONTENTS
S NO. TITLE PAGE NO.
1 SMART CARD INTRO 1
1.1 Smart Card 1
1.2 Founders of SMART CARD 2
1.3 Status of Smart Card 7
2 STRUCTURE 9
2.1 Components 9
3 WORKING OF THE SMART CARD 11
3.1 Working of Smart Card 11
3.2 Finger positioning 12
4 OPERATION OF THE SMART CARD 13
4.1 Operating 13
4.2 Connectivity 13
5 FEATURES AND CHARACTERISTICS 15
5.1 Key Features 15
5.2 Limitations 20
6 CONCLUSION 21
7 REFERENCES 22
LIST OF FIGURES
FIG. NO. FIG. TITLE PAGE NO.
1 Smart Card 2
2 Overview Smart Card 4
3 Estimated time duration for the existence Smart Card 4
4 Founders of Smart Card 5
5 Founders of Smart Card 5
6 Smart Card overview 9
7 Founders of Smart Card 10
8 Components of Smart Card 17
9 Block diagram of Smart Card 20
10 Finger print 21
11 Operating the Smart Card 24
12 Designed for mobile Card Logics smart card 26
13 Weneo feature on ISO 77
SMART CRAD
INTRODUCTION
A smart card is a plastic card with an embedded microprocessor chip (usually small gold-colored
metal module), capable of storing, processing, calculating, managing and performing cryptography
algorithm on a significant amount of data which can be either value or information
or both. Most smart cards resemble the size of a standard credit card .
Smart cards provide maximum security and convenience, and also data portability . It makes
possible sophisticated and portable data processing applications, and has proven to be more
reliable than magnetic strip cards. Assume a student at a university may use the university
identification card (ID card) as a basic form of identification to gain access to the university’s
facilities, using university library, purchase meals or decrease value from a meal plan, purchase
materials and supplies from the university store, or use university’s vending machines.
Additionally, some cards may also be used to access the university’s computer systems, network
and intranet or internet. In this situation, likelihood the contactless reader cannot detect the smart
card.
The use of multiple technologies or multi applications on a single ID card can reduce card issuance,
administrative costs and provide users with the convenience of a single access ID credential. One
example of a multi application card is the student campus ID card, , however the point is that, the
students should accept the new technology otherwise developing new technology will not be
successful.
examined. This paper is going to study and investigate the students’ awareness of smart card
technology and identify the features, characteristics, and advantages of smart card technology.
Smart Card
Smart card is a security token that has an embedded chip.A Netcom Smart Card is a pocket-sized
card with embedded integrated circuits. It provides strong security authentication. Smart card can
store lots of information and can perform multiple functions in a wide range of industries. The
Kiosk is integrated with our Netcom Smartcard to access the information about the student’s.
Fig 1: Smart Card
About Smart Card
Netcom smart card is connected with our project “School Management System”. This is about the
class attendance signing system using student’s smart card. The Purpose of our project is to collect
the student’s class attendance by using student’s smart card and it also provides the options for the
staff to calculate the student attendance percentage to view the attendance report and entry the
student’s marks for automatically calculating the total, percentage, and grade. The project involves
the biometric card reader to implement the barcode on student’s smartcard for student’s
identification. The student has the option to view their personal information and view their
performance report about their marks, attendance, and overall behavior. Fees Details such as
payable amount and remaining amount to pay also displayed. Overall performance can be viewed
1.2 FOUNDERS
At the beginning, four guys who believed in a crazy idea they are
• Kofo is recognised globally as a leading African woman entrepreneur, who has founded a
world class manufacturing company competing successfully in a global market.
• Mohammad Khan, President and Founder of ViVOtech. Mr. Khan held several
• engineering, marketing, and business development management
• Philip Andreae Vice President, Field Marketing, Payment, North America, Oberthur
Technologies.
• President,SamSrinivas and Product Management Director, Information Security, Google
Fig2: KOFO AKINKUGBE
Innovator and technology market leader
Founder of Secure ID
Country: Nigeria
Sector: Smart Card Manufacturing
Fig3:Mohammad Khan,
President and Founder of ViVOtech.
Mr. Khan held several engineering, marketing, and business development management
Fig4:Secretary
Philip Andreae
Vice President, Field Marketing,
North America, Oberthur Technologies
Fig5:President,Sam Srinivas
ProductManagementDirector,
Take a look in Middle Eastern’s wallet and what will be found? Notes, coins, driving
license, a library card, paper identity card and other cards will be found and maybe some credit
cards. All these documents could be replaced by just two or three smart cards. Smart cards are
being used in a number of ways around the world, replacing a wallet's content bit by bit. As a result
of adopting smart card technology, one card can be used for all.
Smart cards protect against a full range of security threats, from careless storage of user
passwords to sophisticated system hacks. There are a lot of advantages to use of smart cards in
wide variety applications in daily life, for example government, financial services, transportation,
telecommunication, healthcare, network security, education, retail, and many other industries. In
order to reduce the number of vehicles stuck in congestion, especially for stop and go traffic at toll
plazas, the establishment of smart card systems has been a hot issue and dominant trend in many
countries. Faced with annually increasing demand for travel and transport of goods, transportation
systems are reaching the limits of their existing capacity. Heavy highway congestion has become
one of most serious urban problems.
Furthermore, by using the smart cards banks have been able to replace their current cards
(ATM, debit, credit account, and travel and entertainment cheque) with one card. Beside that smart
cards are also being used in quite a few countries as electronic purses (such as Singapore). On the
other hand, many retailers have started using smart cards as loyalty cards.
awareness is a key to act against fraud and identity theft. The users need to understand functions
of card because sometimes they do not know how they should use their cards and even what the
advantages of using them are, and how they can benefit users. As we know, different applications
involve different user behavior so they should be aware of the usage and application of smart cards.
In all applications, educating the user is a key element to integrate in any kind of smart card
deployment. An application features play an important role in determining whether individuals
involved in an activity will use it or not [17]. The users need to know how they should protect the
card and why they need to protect the card
Users awareness about smart card can assist them to understand the technology, for example,
contactless card adopters must be aware of the probability of slow transactions or business logic
problems when more than one card enters the radio frequency field (i.e., if a card holder has two
in a wallet), or where the reader must deal with more than one modulation scheme. Card holder
education is needed to deal with the first problem, and in the second case, it is highly preferable to
choose a single modulation scheme.
.
The purpose of this study is to present a general overview of smart card technology and identify
the smart card’s benefits, features and characteristics. The level of users’ knowledge and awareness
about smart card technology is also described.
Fig6:Smart Card overview
Smart card technology makes possible sophisticated and portable data processing applications,
and has proven to be more reliable than magnetic strip cards. The interest in smart card
technologies worldwide is driven by several factors, including security against identity theft and
web fraud, efficiency of service delivery and user convenience.
Smart cards are secure devices that enable positive user identification. They are multi-functional
and cost effective devices that can be easily adapted for both physical and logical access. Logical
access control concerns familiar principles such as password checking or the more sophisticated
cryptographic mechanisms for authentication such as windows logon, virtual private network
Fig7:Founders of Smart Card
The operator, which successfully trialled smart ticketing in Lancashire, is now offering a paperless
‘StagecoachSmart’ ticketing option on all long term adult tickets throughout its operations in
Merseyside, Cheshire and Lancashire
In Merseyside, bus passengers will benefit from a pioneering smart multi-operator ticketing
scheme between Stagecoach and Arriva to ensure maximum convenience for passengers travelling
on Quality Bus Network routes. The operators have worked together to sync ticket machines,
allowing passengers to use both companies weekly and M-tickets on either operators services. The
new system also incorporates the acceptance of Merseytravel’s Walrus travel card Elisabeth
Tasker, managing director of Stagecoach Merseyside and South Lancashire, said: “Ensuring that
passengers who travel with us are able to benefit from integrated, seamless ticketing systems is a
key priority for the business, so we’re delighted to have successfully rolled out this new service
for passengers across the region.
“In Merseyside, we’ve worked closely with Arriva to pioneer a joined-up approach to smart-
ticketing which also dovetails with Merseytravel’s existing Walrus card. We’re confident that this
partnership will provide real benefits for passengers and create a more joined-up, convenient travel
experience.
“Smart-ticketing is a logical step for the travel industry; it’s a sustainable, convenient option
which provides real environmental and operational efficiencies, and we look forward to working
1.3 STATUS OF SMART CARD
• Internet technologies, through intranet and extranet applications, have proven themselves to be
efficient and effective in streamlining existing processes from supply chain management to
manufacturing logistics, from marketing to customer asset management, and by creating new value
chains and businesses. Nevertheless,these changes and benefits signal only an evolutionary shift in
the way we do business. The Internet-enabled economy resembles the conventional physical market
in many aspects. Some of the new technologies and applications may even be unnecessary.
American consumers, for example, regard smart cards as a redundant payment mechanism when
checks,credit cards and ATM cards do an adequate job for current needs. What is the use of smart
cards? Do we really need them? Will they ever take off?
.
• Smart cards have two different types of interfaces. Contact smart cards must be inserted
into a smart-card reader. The reader makes contact with the card module’s electrical
connectors that transfer data to and from the chip. Contactless smart cards are passed near
a reader with an antenna to carry out a transaction. They have a n electronic microchip and
an antenna embedded inside the card, which allow it to communicate without a physical
contact. Contactless cards are an ideal solution when transactions must be processed
quickly, as in mass transit or toll collection. A third category now emerging is a dual
interface card. It features a single chip that enables a contact and contactless interface with
a high level of security. Two characteristics make smart cards especially well suited for
applications in which security-sensitive or personal data is involved. First, because a smart
card contains both the data and the means to process it, information can be processed to and
from a network without divulging the card’s data. Secondly, because smart cards are
portable, users can carry data with them on the smart card rather than entrusting that
information on network storage or a backend server where the information could be sold or
accessed by unknown persons.
STRUCTURE
• Memory chips which are similar to magnetic stripe cards, they are not programmable after
manufacture and only capable to store data. They are suitable for the system that performs a fixed
operation and use as pre-paid cards or identification card, in systems where low cost is the main
consideration [13]. The advantages of this type of card lies in simple technology, and therefore
incur low cost, and also it is easy to support, while the disadvantage is that thecard cannot be reused
once it is empty. • Microprocessor chips contain a computer on a chip, with operating system,
and read or write memory that can be updated many times. Microprocessor cards contain and
execute logic and calculations, and store data in accordance with their operating. Microprocessor
cards are able to store private keys and execute modern cryptographic algorithms.•
Possible application areas for microprocessor cards include identification, access control
systems for restricted areas and computers, secure data storage, electronic signatures and electronic
purses. Microprocessor cards are useful for multiple applications because of their storage capacity,
level of security, general flexibility, and the ability to execute cryptographic algorithm. Smart
cards interfaces are described by which electrical power is supplied to the integrated circuit card
and data is transferred from the card to an interface device (i.e., smartcard reader). Due to the
communication with the reader and functionality of smart cards, they are classified to the
following:
•Contact smart cards require physically communicate with the reader so the reader can establish a
direct electrical contact with the chip. Contact cards are generally used for a wide variety of
applications, including financial transactions and logical access control.
•Contactless smart cards do not require physical contact with the reader but enable communication
with the reader through radio frequency and has an embedded transmitted. Therefore they are
particularly suitable for applications in which persons or objects should be quickly identified such
as access control, local public transportation, ski passes, airline tickets, and baggage identification.
Smart card applications
Smart cards may also be used as electronic wallets. The smart card chip can be loaded with funds
which can be spent in parking meters and vending machines or at various merchants.
Cryptographic protocols protect the exchange of money between the smart card and the accepting
machine .
A list of applications for smart card technologies includes:
• Health cards
• Banking (such as ATM cards)
• Network authentication
• Telephony (including card’s for parking lots, gas stations, vending machines, calling)
• Identification (including government identity (ID) cards, employee ID badges and
membership cards)
• Telecommunication (including mobile phone subscriber identification and administration)
• Transportation (including ticketing and tolling)
• Electronic passports
• Physical access control
• Campus cards
• Financial applications (such as electronic purse, and secure payment through internet
2.1 COMPONENTS
 Computing security system conforms to smartcard standards
• Compatible with various telecom networks including GSM, CDMA, PHS, WCDMA,
CDMA2000, TD-SCDMA, etc
• MIFARE 1K and 4K logic encryption card
• Conforms to PBOC 2.0 specification
• Can store multiple identity authentications and VIP information; supports real-time
network authentication.
• Long-distance data broadcasting
• Benefits of 2.4GHz
• RF-SIM uses the 2.4 GHz wireless radio frequency, which offers many outstanding
features:
• High-speed communication rate (1 Mbps), strong anti-interference capability, and
effective long-distance communication
• RF-SIM card can be used as a tag to support passive induction swipe card mode
• One-way information broadcasting within a 100-m radius
• Card-swiping induction function can be opened or closed automatically
• Maximum working electric current is only 12 mA
• Hollow data transmission is automatically encrypted with 3DES to prevent eavesdropping
• Three-step, two-way authentication is implemented when the card is swiped
Fig8: Components of Smart Card
• WORKING OF THE SMART CARD
3.1. WORKING
Michal Bairanzade of ON Semiconductor, describes the basic smart card international
specifications and functions, together with the physical interface necessary to handle existing and
future cards.
Unlike the old fashioned magnetic stripes credit card, the smartcard is based on a micro controller
chip. Consequently, pirating a smart card based credit card is extremely difficult, not to say
impossible, and remote payments are no longer risky for both the customer and the supplier.As
well as banking operations, the MCU based card are widely used in other applications : health
care, security access, GSM identification, fidelity card, pay per view and set top box decoders
being very popular world wide.
The smart card uses the same standard plastic media as magnetic stripe based cards to carry the
electronic chip: eight gold platted contacts are used to connect the silicon to the external world.
These contacts are arranged according to the ISO7816-1 specification shown in figure 1.
1: Smart card ISO layout
Whatever be the direction, all the signals must comply to the electrical parameters defined by the
ISO7816-3 specifications, including the ESD capability. As a matter of fact, since this device is
handled manually, all the pins must be capable to sustain a 4kV ESD stress minimum without
failure.
Generally speaking, the asynchronous cards are used for banking and security applications,
including the GSM PIN identification, the synchronous one being dedicated to low cost systems
like the fidelity or public phone
There are three sub types:
Card Type A: operating voltage Vcc = 5.0V
Card Type B: operating voltage Vcc = 3.0V
Card Type C: operating voltage Vcc = 1.8V (new cards )
Since there is no external and visible way to identify the card a system is dealing with, it is the
interface responsibility to differentiate the card, handling the chip properly.
The main purpose of the interface is two fold:
To provide the right power supply voltage to the card, whatever be the external power source
value.
To translate the voltage levels necessaries to connect the card ( pins C1 to C8 ) to the external
controller.
Fig9:Block diagram of Smart Card
3.2 FINGER POSITIONING
Finger position is calculated by the interception made by the finger and calculated the range of
interception and debugs the position in terms of x and y positions and considers the screen to the
x and y plane and operation is done using the finger’s position.
For every touch there will be a position of the finger and will be easily recognized by the proximity
sensors to read the positions.
Fig10:Finger print
The AET65 Smart Card Reader with Fingerprint Sensor guarantees security and convenience in a
variety of applications. Combining contact smart card and fingerprint technologies in a single
device, it creates a more cost-efficient and simplified
integration of biometric technology in applications where the accuracy of biometric authentication
isnecessary to ensure a high level of security. AET65 utilizes three-factor authentication, match-
on device authentication, and has a built-in secure access moduleusing only AET65’s API and
reference documents, and can also easily expand or adapt their existing systems utilizing third
party fingerprint algorithms with AET65’s third party algorithm suppo (SAM) for maximum
security. Developers without an in-depth knowledge of biometrics can integrate fingerprint
authentication into smart card based applications
• OPERATION OF THE SMART CARD
4.1 OPERATING
The smart card's Chip Operating System (frequently referred to simply as COS; and
sometimes referred to as the Mask) is a sequence of instructions, permanently
embedded in the ROM of the smart card. Like the familiar PC DOS or Windows
Operating System, COS instructions are not dependent on any particular application,
but are frequently used by most application.
4.2 CONNECTIVITY
TE Connectivity (TE) Industrial & Commercial Transportation’s new smart card reader (TE part
numbers 1955562-1 & 1955562-2) is designed to work with a digital tachograph to track the
number of hours a commercial vehicle operator drives, helping prevent fatigue-related accidents.
The new smart card reader is easy to use, tamperproof, extremely durable, and interconnects with
a smart card according to ISO 7810 & 7816 standards.
TE’s smart card reader is a rugged and economical solution for tachograph manufacturers that
need a card reader that will last several years of heavy use. It is compact (112.2 x 61.5 x 6.05 mm),
withstands high vibrations (up to 1000 Hz), and endures severe mechanical shocks (up to 50G).
The smart card reader has a -25° to + 80°C working temperature, making it suitable for tachograph
applications that face wide climate variations.
The new smart card reader is designed for easy card insertion and utilizes an electromechanical
ejector for quick and automatic card removal. It is extremely durable and supports 25,000 card
insertion/removal cycles. The smart card reader’s heavy-duty thermoplastic body has a
flammability rating of UL 94 V0.Two variations of the new smart card reader are available: Part
number 1955562-1 and part number 1955562-2. Both part numbers are identical in performance,
but part number 1955562-2 features a shorter PCBstrip to meet specific application requirements.
The smart card reader is part of TE Industrial & Commercial Transportation’s extensive portfolio
of rugged, time-tested, high vibration resistant products and technologies. TE’s heavy-duty
connectors, sensors, relays, and other robust technologies withstand the harshest envrinomental
conditions and help vehicles operate safer, cleaner, and smarter.
Fig11: Operating the Smart Card
• FEATURES AND CHARACTERISTICS.
• Smart cards—cards with embedded integrated circuits that can process information—offer a
number of features that provide or enhance privacy protection in an access-control system
5.1. KEY FEATURES OF THE CICRET
• Authentication. Smart cards provide ways to authenticate others who want to gain access
to the card. These mechanisms can be used to validate users, devices, or applications
wishing to use the data on the card's chip. These features can protect privacy by ensuring
that a banking application has been authenticated as having the appropriate access rights
before accessing financial data or functions on the card, for example.
• Secure data storage. Smart cards provide a way to securely store data on the card. This data
can only be accessed through the smart-card operating system by those with proper access
rights. This feature can be utilized by a system to enhance privacy by storing personal user
data on the card rather than in a central database, for example. In this situation, the user
has better knowledge and control of when their personal data is being granted access—and
who is involved.
• Encryption. Smart cards provide a robust set of encryption capabilities, including key
generation, secure key storage, hashing, and digital signing. These capabilities can be used
to protect privacy in many ways. For example, a smart-card system can produce a digital
signature for an e-mail message, providing a way to validate the e-mail's authenticity. This
protects the message from being tampered with, and also provides the recipient with
assurance about origination. The fact that the signing key originated from a smart card adds
credibility to the origin and the intent of the signer
• Strong device security. Smart-card technology is extremely difficult to duplicate or forge,
and has built-in tamper resistance. Smart-card chips include a variety of hardware and
software capabilities that detect and react to tampering attempts, and help counter possible
attacks.
.
Fig12:Designed for mobile CardLogix smart card
Fig 13:Weneo feature on ISO
5.2. LIMITATION
• The Smart Card based solutions are popular in many Banking and E-Governance applications
and India is getting ready to a huge investment on Smart Cards in its Citizen ID project. The
use of Smart Cards is basically recommended for the higher security that it is proposed to
provide for a solution.
• It is however necessary to recognize that like many other IT solutions Smart Cards have a
cost and unless the application justifies the cost and there are no cheaper alternative, there is
no need to adopt Smart Cards for a given solution.
• Typically Smart Cards are used to store information such as health record, the vehicle
registration record or driver’s license record, Bank record etc. These cards are read using a
“Smart Card Reader” which will be required at all access points. Additionally at the
originating end, Smart Card writers are also required.
• The total cost of Smart Card usage includes)
• a) Smart Card Cost
• b) Smart Card Reader Cost.
• c) Smart Card Writer Cost
• CONCLUSION
According to awareness is defined as “the degree to which an individual are aware about the
technology”. Awareness about technology cause users to look forward to try technology and at the
same time enjoys the various benefits that the system provides.
As a real time scenario, suppose person X has received physical access card in order to use for
interior building facilities. Prior to using the access card, a friend of person X who is person Y
(consider as an unauthorized person), needs to use the access card too, so person X shares his or
her smart card. This behavior is an invasion to intellectual property rule and regulation where the
only responsible person is person X to hold security of entire building so if anything wrong happen
in the building person X would be in charge.
In other words, awareness also refers to the effort in providing knowledge and improving
understanding of the smart card. Being aware of the technology will improve users’ judgment and
their ability in using the system in a secured manner.
Smart cards contain unique features that bring many benefits. They offer enhanced security,
convenience and economic benefits. However smart card makes possible sophisticated and
portable data processing applications, and is a reliable card but in Middle East countries it is not
well introduced and developed.
Awareness about smart card can assist people to understand the technology and it can have a
positive influence on successful applying smart card technology in society. Findings of this study
show that users are not well aware about the smart card technology. Therefore, further
investigation need to be carried out in the future to identify factors that will enhance their smart
card awareness.
7. REFERENCES
[1] Al-Alawi, A. I. and Al-Amer, M. A. Young generation attitudes and awareness towards the
implementation of smart card in Bahrain: an exploratory study, Journal of Computer Science,
2006.2 (5), 441-446.
[2] Australian Government Technical Interoperability Framework V2, 2005.
http://www.agimo.gov.au/publications/2005/04/agtifv2]
[3] Bandura, A. Self-efficacy mechanism in human agency, American Psychologist, Vol. 37, No.
2, 1982, pp. 122-147.
[4] Consultation on Australian Government Smartcard Framework; Smartcard Implementation
Guide. 2007: Australian government office of the privacy commissioner.
[5] Domingo-Ferrer, J. and Posegga. J. Advances in smart cards. Computer Networks. 2007. 51(9):
2219-2222.
[6] Everett. D, Smart Card Tutorial, Part 11 The Development Environment. First Published in
July 1993.
[7] Fancher. C. H. In Your Pocket: Smart Cards, IEEE Spectrum. 1997.
[8] Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards
and Identification, John Wiley and Sons. 2003.
] Government Smartcard Handbook, US General Services Administration, February 2004.
[10] Haddad, A. A New Way To Pay: Creating Competitive Advantage Through The Emv Smart
Card Standard, Gower Publishing, Ltd. 2005.

More Related Content

What's hot

Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
kondalarao7
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
salman khan
 
Smart card
Smart cardSmart card
Smart card
ram212213
 
Smart Card
Smart CardSmart Card
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
thinkahead.net
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Shashank Karamballi
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
Kapil Dev Ghante
 
Smart card
Smart cardSmart card
Smart card
Rahul Srivastava
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Deepak Raj
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
vishnu murthy
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
puneet bhatia
 
Smart cards
Smart cardsSmart cards
Smart cards
imshubham
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Pushkar Dutt
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
Rebecca D'souza
 
Smart cards
Smart cardsSmart cards
Smart cards
jaswinderkaur144
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
Ram Dutt Shukla
 
Smart card
Smart cardSmart card
Smart card
Vaibhaw Mishra
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Reben Dalshad
 
Smart cards
Smart cards Smart cards
Magnetic Strip Card
Magnetic Strip CardMagnetic Strip Card
Magnetic Strip Card
simran choudhary
 

What's hot (20)

Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart card
Smart cardSmart card
Smart card
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart cards
Smart cards Smart cards
Smart cards
 
Magnetic Strip Card
Magnetic Strip CardMagnetic Strip Card
Magnetic Strip Card
 

Viewers also liked

plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
Bhadra Gowdra
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
Bhadra Gowdra
 
I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
Bhadra Gowdra
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
Bhadra Gowdra
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
Bhadra Gowdra
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
Bhadra Gowdra
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
Bhadra Gowdra
 
Smart card
Smart cardSmart card
Smart card
Bhadra Gowdra
 

Viewers also liked (8)

plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
 
BTech Resume
BTech Resume BTech Resume
BTech Resume
 
I locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPTI locate security for lost or misplaced devices PPT
I locate security for lost or misplaced devices PPT
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
 
Smart card
Smart cardSmart card
Smart card
 

Similar to Smatcard documentation

SMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
SMART CARD FOR VARIOUS APPLICATION IN INSTITUTIONSMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
SMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
IRJET Journal
 
USC marketing final
USC marketing  finalUSC marketing  final
USC marketing final
Jamal Shah
 
College Student Smart Card
College Student Smart CardCollege Student Smart Card
College Student Smart Card
Surbhi Sharma
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
journal ijrtem
 
Multipurpose Student Smart Card
Multipurpose Student Smart CardMultipurpose Student Smart Card
Multipurpose Student Smart Card
ijtsrd
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
IJECEIAES
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto das
Subroto Das
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
Amira Serag
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
Lal Sivaraj
 
Online Admission Management System
Online Admission Management SystemOnline Admission Management System
Online Admission Management System
ijtsrd
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET Journal
 
Implementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR CodeImplementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR Code
ijtsrd
 
report
reportreport
report
Hirra Sultan
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
vivatechijri
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
IRJET Journal
 
My Smart Card
My Smart Card My Smart Card
My Smart Card
Phebin Philip
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
LameesAnees
 
Secure Verification Process in Smart Card Technology
Secure Verification Process in Smart Card TechnologySecure Verification Process in Smart Card Technology
Secure Verification Process in Smart Card Technology
ijtsrd
 
Mobile wallet
Mobile walletMobile wallet
Mobile wallet
Somyadarshna
 
E-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit cardE-commerce: Smart Card, Debit card & Credit card

Similar to Smatcard documentation (20)

SMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
SMART CARD FOR VARIOUS APPLICATION IN INSTITUTIONSMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
SMART CARD FOR VARIOUS APPLICATION IN INSTITUTION
 
USC marketing final
USC marketing  finalUSC marketing  final
USC marketing final
 
College Student Smart Card
College Student Smart CardCollege Student Smart Card
College Student Smart Card
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Multipurpose Student Smart Card
Multipurpose Student Smart CardMultipurpose Student Smart Card
Multipurpose Student Smart Card
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto das
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
 
Online Admission Management System
Online Admission Management SystemOnline Admission Management System
Online Admission Management System
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Implementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR CodeImplementation of Smart and Secure Gate Pass System using QR Code
Implementation of Smart and Secure Gate Pass System using QR Code
 
report
reportreport
report
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
 
My Smart Card
My Smart Card My Smart Card
My Smart Card
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Secure Verification Process in Smart Card Technology
Secure Verification Process in Smart Card TechnologySecure Verification Process in Smart Card Technology
Secure Verification Process in Smart Card Technology
 
Mobile wallet
Mobile walletMobile wallet
Mobile wallet
 
E-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit cardE-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit card
 

More from Bhadra Gowdra

Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
Bhadra Gowdra
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
Bhadra Gowdra
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
Bhadra Gowdra
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
Bhadra Gowdra
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Bhadra Gowdra
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
Bhadra Gowdra
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
Bhadra Gowdra
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
Bhadra Gowdra
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
Bhadra Gowdra
 
Fun Food
Fun FoodFun Food
Fun Food
Bhadra Gowdra
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
Bhadra Gowdra
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
Bhadra Gowdra
 

More from Bhadra Gowdra (13)

Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
 
Fun Food
Fun FoodFun Food
Fun Food
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
 

Recently uploaded

CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 

Recently uploaded (20)

CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 

Smatcard documentation

  • 1. Technical Project Report On “SMART CARD TECHONOLOGY” Submitted in partial fulfillment of the Requirements for the award of the degree of Bachelor of Technology In Computer Science & Engineering BY UNDER THE GUIDENCE OF MS.B VADA VIDYA R.SAI BHASKAR(13R21A05L3) Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mdl), HYDERABAD -500 043. 2016-17
  • 2. Department of Computer Science & Engineering MLR INSTITUTE OF TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University, Hyderabad) DUNDIGAL(V), QUTHBULLAPUR Mandal, HYDERABAD -500 043. . CERTIFICATE This is to certify that the Technical project entitled “SMART CARD TECHONOLOGY ” by R.SAI BHASKAR(13R21A05L3) has been submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of Technology in Computer Science and Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied in this project have not been submitted to any other University or Institution for the award of any degree or diploma. Internal Guide Head of the Department
  • 3. External Examiner DECLARATION I hereby declare that the project entitled “SMART CARD TECHONOLOGY” is the work done during the period from MARCH 2017 and is submitted in the partial fulfillment of the requirements for the award of degree of Bachelor of technology in computer Science and Engineering from Jawaharlal Nehru Technology University, Hyderabad. The results embodied in this project have not been submitted to any other university or Institution for the award of any degree or diploma.
  • 4. R . SAI BHASKAR(13R21A05L3) ACKNOWLEDGEMENT There are many people who helped me directly and indirectly to complete my project successfully. I would like to take this opportunity to thank one and all. First of all I would like to express my deep gratitude towards my internal guide Ms.B VADA VIDHYA Assistant Professor. Department of CSE for his support in the completion of my dissertation. I wish to express my sincere thanks to, Dr. N. Chandrashekar HOD, Dept. of CSE and also to our principal Dr. P BHASKARAR REDDY for providing the facilities to complete the dissertation. I would like to thank all our faculty and friends for their help and constructive criticism during the project period. Finally, I am very much indebted to our parents for their moral support and encouragement to achieve goals. R.SAI BHASKAR(13R21A05L3)
  • 5. ABSTRACT Right now, in most of the countries, inside the people ’s wallet, they probably have a the couple of credit cards, an identification card, automatic machine teller cards (ATM card), and maybe a few other plastic cards. Without realizing it, these plastic cards havebecome a very important part of their life. Although smart card technology improves security and convenient but it is not used in a wide range in Middle East countries. User acceptance is vital for further development of any fresh technology and smart card technology as well. One of the factors that can effect on the acceptance of smart card technology is users’ awareness. The goal of this study is to present a general overview of smart card technology and identify the smart card’s benefits, features and characteristics and moreover, the level of users’ knowledge and awareness about smart card technology will be evaluated. In order to achieve this goal, a survey was conducted among the international students of University Technology Malaysia to measure their awareness of smart technology
  • 6. TABLE OF CONTENTS S NO. TITLE PAGE NO. 1 SMART CARD INTRO 1 1.1 Smart Card 1 1.2 Founders of SMART CARD 2 1.3 Status of Smart Card 7 2 STRUCTURE 9 2.1 Components 9 3 WORKING OF THE SMART CARD 11 3.1 Working of Smart Card 11 3.2 Finger positioning 12 4 OPERATION OF THE SMART CARD 13 4.1 Operating 13 4.2 Connectivity 13 5 FEATURES AND CHARACTERISTICS 15 5.1 Key Features 15
  • 7. 5.2 Limitations 20 6 CONCLUSION 21 7 REFERENCES 22 LIST OF FIGURES FIG. NO. FIG. TITLE PAGE NO. 1 Smart Card 2 2 Overview Smart Card 4 3 Estimated time duration for the existence Smart Card 4 4 Founders of Smart Card 5 5 Founders of Smart Card 5 6 Smart Card overview 9 7 Founders of Smart Card 10 8 Components of Smart Card 17 9 Block diagram of Smart Card 20 10 Finger print 21 11 Operating the Smart Card 24 12 Designed for mobile Card Logics smart card 26
  • 8. 13 Weneo feature on ISO 77 SMART CRAD INTRODUCTION A smart card is a plastic card with an embedded microprocessor chip (usually small gold-colored metal module), capable of storing, processing, calculating, managing and performing cryptography algorithm on a significant amount of data which can be either value or information or both. Most smart cards resemble the size of a standard credit card . Smart cards provide maximum security and convenience, and also data portability . It makes possible sophisticated and portable data processing applications, and has proven to be more reliable than magnetic strip cards. Assume a student at a university may use the university identification card (ID card) as a basic form of identification to gain access to the university’s facilities, using university library, purchase meals or decrease value from a meal plan, purchase materials and supplies from the university store, or use university’s vending machines. Additionally, some cards may also be used to access the university’s computer systems, network and intranet or internet. In this situation, likelihood the contactless reader cannot detect the smart card. The use of multiple technologies or multi applications on a single ID card can reduce card issuance, administrative costs and provide users with the convenience of a single access ID credential. One example of a multi application card is the student campus ID card, , however the point is that, the students should accept the new technology otherwise developing new technology will not be successful. examined. This paper is going to study and investigate the students’ awareness of smart card technology and identify the features, characteristics, and advantages of smart card technology.
  • 9. Smart Card Smart card is a security token that has an embedded chip.A Netcom Smart Card is a pocket-sized card with embedded integrated circuits. It provides strong security authentication. Smart card can store lots of information and can perform multiple functions in a wide range of industries. The Kiosk is integrated with our Netcom Smartcard to access the information about the student’s. Fig 1: Smart Card About Smart Card Netcom smart card is connected with our project “School Management System”. This is about the class attendance signing system using student’s smart card. The Purpose of our project is to collect the student’s class attendance by using student’s smart card and it also provides the options for the staff to calculate the student attendance percentage to view the attendance report and entry the student’s marks for automatically calculating the total, percentage, and grade. The project involves the biometric card reader to implement the barcode on student’s smartcard for student’s identification. The student has the option to view their personal information and view their
  • 10. performance report about their marks, attendance, and overall behavior. Fees Details such as payable amount and remaining amount to pay also displayed. Overall performance can be viewed 1.2 FOUNDERS At the beginning, four guys who believed in a crazy idea they are • Kofo is recognised globally as a leading African woman entrepreneur, who has founded a world class manufacturing company competing successfully in a global market. • Mohammad Khan, President and Founder of ViVOtech. Mr. Khan held several • engineering, marketing, and business development management • Philip Andreae Vice President, Field Marketing, Payment, North America, Oberthur Technologies. • President,SamSrinivas and Product Management Director, Information Security, Google Fig2: KOFO AKINKUGBE Innovator and technology market leader Founder of Secure ID Country: Nigeria Sector: Smart Card Manufacturing
  • 11. Fig3:Mohammad Khan, President and Founder of ViVOtech. Mr. Khan held several engineering, marketing, and business development management Fig4:Secretary Philip Andreae Vice President, Field Marketing, North America, Oberthur Technologies
  • 12. Fig5:President,Sam Srinivas ProductManagementDirector, Take a look in Middle Eastern’s wallet and what will be found? Notes, coins, driving license, a library card, paper identity card and other cards will be found and maybe some credit cards. All these documents could be replaced by just two or three smart cards. Smart cards are being used in a number of ways around the world, replacing a wallet's content bit by bit. As a result of adopting smart card technology, one card can be used for all. Smart cards protect against a full range of security threats, from careless storage of user passwords to sophisticated system hacks. There are a lot of advantages to use of smart cards in wide variety applications in daily life, for example government, financial services, transportation, telecommunication, healthcare, network security, education, retail, and many other industries. In order to reduce the number of vehicles stuck in congestion, especially for stop and go traffic at toll plazas, the establishment of smart card systems has been a hot issue and dominant trend in many countries. Faced with annually increasing demand for travel and transport of goods, transportation systems are reaching the limits of their existing capacity. Heavy highway congestion has become one of most serious urban problems. Furthermore, by using the smart cards banks have been able to replace their current cards (ATM, debit, credit account, and travel and entertainment cheque) with one card. Beside that smart
  • 13. cards are also being used in quite a few countries as electronic purses (such as Singapore). On the other hand, many retailers have started using smart cards as loyalty cards. awareness is a key to act against fraud and identity theft. The users need to understand functions of card because sometimes they do not know how they should use their cards and even what the advantages of using them are, and how they can benefit users. As we know, different applications involve different user behavior so they should be aware of the usage and application of smart cards. In all applications, educating the user is a key element to integrate in any kind of smart card deployment. An application features play an important role in determining whether individuals involved in an activity will use it or not [17]. The users need to know how they should protect the card and why they need to protect the card Users awareness about smart card can assist them to understand the technology, for example, contactless card adopters must be aware of the probability of slow transactions or business logic problems when more than one card enters the radio frequency field (i.e., if a card holder has two in a wallet), or where the reader must deal with more than one modulation scheme. Card holder education is needed to deal with the first problem, and in the second case, it is highly preferable to choose a single modulation scheme. . The purpose of this study is to present a general overview of smart card technology and identify the smart card’s benefits, features and characteristics. The level of users’ knowledge and awareness about smart card technology is also described.
  • 14. Fig6:Smart Card overview Smart card technology makes possible sophisticated and portable data processing applications, and has proven to be more reliable than magnetic strip cards. The interest in smart card technologies worldwide is driven by several factors, including security against identity theft and web fraud, efficiency of service delivery and user convenience. Smart cards are secure devices that enable positive user identification. They are multi-functional and cost effective devices that can be easily adapted for both physical and logical access. Logical access control concerns familiar principles such as password checking or the more sophisticated cryptographic mechanisms for authentication such as windows logon, virtual private network
  • 15. Fig7:Founders of Smart Card The operator, which successfully trialled smart ticketing in Lancashire, is now offering a paperless ‘StagecoachSmart’ ticketing option on all long term adult tickets throughout its operations in Merseyside, Cheshire and Lancashire In Merseyside, bus passengers will benefit from a pioneering smart multi-operator ticketing scheme between Stagecoach and Arriva to ensure maximum convenience for passengers travelling on Quality Bus Network routes. The operators have worked together to sync ticket machines, allowing passengers to use both companies weekly and M-tickets on either operators services. The new system also incorporates the acceptance of Merseytravel’s Walrus travel card Elisabeth Tasker, managing director of Stagecoach Merseyside and South Lancashire, said: “Ensuring that passengers who travel with us are able to benefit from integrated, seamless ticketing systems is a key priority for the business, so we’re delighted to have successfully rolled out this new service for passengers across the region. “In Merseyside, we’ve worked closely with Arriva to pioneer a joined-up approach to smart- ticketing which also dovetails with Merseytravel’s existing Walrus card. We’re confident that this partnership will provide real benefits for passengers and create a more joined-up, convenient travel experience. “Smart-ticketing is a logical step for the travel industry; it’s a sustainable, convenient option which provides real environmental and operational efficiencies, and we look forward to working
  • 16. 1.3 STATUS OF SMART CARD • Internet technologies, through intranet and extranet applications, have proven themselves to be efficient and effective in streamlining existing processes from supply chain management to manufacturing logistics, from marketing to customer asset management, and by creating new value chains and businesses. Nevertheless,these changes and benefits signal only an evolutionary shift in the way we do business. The Internet-enabled economy resembles the conventional physical market in many aspects. Some of the new technologies and applications may even be unnecessary. American consumers, for example, regard smart cards as a redundant payment mechanism when checks,credit cards and ATM cards do an adequate job for current needs. What is the use of smart cards? Do we really need them? Will they ever take off? . • Smart cards have two different types of interfaces. Contact smart cards must be inserted into a smart-card reader. The reader makes contact with the card module’s electrical connectors that transfer data to and from the chip. Contactless smart cards are passed near a reader with an antenna to carry out a transaction. They have a n electronic microchip and an antenna embedded inside the card, which allow it to communicate without a physical contact. Contactless cards are an ideal solution when transactions must be processed quickly, as in mass transit or toll collection. A third category now emerging is a dual interface card. It features a single chip that enables a contact and contactless interface with a high level of security. Two characteristics make smart cards especially well suited for applications in which security-sensitive or personal data is involved. First, because a smart card contains both the data and the means to process it, information can be processed to and from a network without divulging the card’s data. Secondly, because smart cards are portable, users can carry data with them on the smart card rather than entrusting that information on network storage or a backend server where the information could be sold or accessed by unknown persons.
  • 17. STRUCTURE • Memory chips which are similar to magnetic stripe cards, they are not programmable after manufacture and only capable to store data. They are suitable for the system that performs a fixed operation and use as pre-paid cards or identification card, in systems where low cost is the main consideration [13]. The advantages of this type of card lies in simple technology, and therefore incur low cost, and also it is easy to support, while the disadvantage is that thecard cannot be reused once it is empty. • Microprocessor chips contain a computer on a chip, with operating system, and read or write memory that can be updated many times. Microprocessor cards contain and execute logic and calculations, and store data in accordance with their operating. Microprocessor cards are able to store private keys and execute modern cryptographic algorithms.• Possible application areas for microprocessor cards include identification, access control systems for restricted areas and computers, secure data storage, electronic signatures and electronic purses. Microprocessor cards are useful for multiple applications because of their storage capacity, level of security, general flexibility, and the ability to execute cryptographic algorithm. Smart cards interfaces are described by which electrical power is supplied to the integrated circuit card and data is transferred from the card to an interface device (i.e., smartcard reader). Due to the communication with the reader and functionality of smart cards, they are classified to the following: •Contact smart cards require physically communicate with the reader so the reader can establish a direct electrical contact with the chip. Contact cards are generally used for a wide variety of applications, including financial transactions and logical access control. •Contactless smart cards do not require physical contact with the reader but enable communication with the reader through radio frequency and has an embedded transmitted. Therefore they are particularly suitable for applications in which persons or objects should be quickly identified such as access control, local public transportation, ski passes, airline tickets, and baggage identification. Smart card applications Smart cards may also be used as electronic wallets. The smart card chip can be loaded with funds which can be spent in parking meters and vending machines or at various merchants.
  • 18. Cryptographic protocols protect the exchange of money between the smart card and the accepting machine . A list of applications for smart card technologies includes: • Health cards • Banking (such as ATM cards) • Network authentication • Telephony (including card’s for parking lots, gas stations, vending machines, calling) • Identification (including government identity (ID) cards, employee ID badges and membership cards) • Telecommunication (including mobile phone subscriber identification and administration) • Transportation (including ticketing and tolling) • Electronic passports • Physical access control • Campus cards • Financial applications (such as electronic purse, and secure payment through internet 2.1 COMPONENTS  Computing security system conforms to smartcard standards • Compatible with various telecom networks including GSM, CDMA, PHS, WCDMA, CDMA2000, TD-SCDMA, etc • MIFARE 1K and 4K logic encryption card • Conforms to PBOC 2.0 specification • Can store multiple identity authentications and VIP information; supports real-time network authentication. • Long-distance data broadcasting
  • 19. • Benefits of 2.4GHz • RF-SIM uses the 2.4 GHz wireless radio frequency, which offers many outstanding features: • High-speed communication rate (1 Mbps), strong anti-interference capability, and effective long-distance communication • RF-SIM card can be used as a tag to support passive induction swipe card mode • One-way information broadcasting within a 100-m radius • Card-swiping induction function can be opened or closed automatically • Maximum working electric current is only 12 mA • Hollow data transmission is automatically encrypted with 3DES to prevent eavesdropping • Three-step, two-way authentication is implemented when the card is swiped Fig8: Components of Smart Card
  • 20. • WORKING OF THE SMART CARD 3.1. WORKING Michal Bairanzade of ON Semiconductor, describes the basic smart card international specifications and functions, together with the physical interface necessary to handle existing and future cards. Unlike the old fashioned magnetic stripes credit card, the smartcard is based on a micro controller chip. Consequently, pirating a smart card based credit card is extremely difficult, not to say impossible, and remote payments are no longer risky for both the customer and the supplier.As well as banking operations, the MCU based card are widely used in other applications : health care, security access, GSM identification, fidelity card, pay per view and set top box decoders being very popular world wide. The smart card uses the same standard plastic media as magnetic stripe based cards to carry the electronic chip: eight gold platted contacts are used to connect the silicon to the external world. These contacts are arranged according to the ISO7816-1 specification shown in figure 1. 1: Smart card ISO layout
  • 21. Whatever be the direction, all the signals must comply to the electrical parameters defined by the ISO7816-3 specifications, including the ESD capability. As a matter of fact, since this device is handled manually, all the pins must be capable to sustain a 4kV ESD stress minimum without failure. Generally speaking, the asynchronous cards are used for banking and security applications, including the GSM PIN identification, the synchronous one being dedicated to low cost systems like the fidelity or public phone There are three sub types: Card Type A: operating voltage Vcc = 5.0V Card Type B: operating voltage Vcc = 3.0V Card Type C: operating voltage Vcc = 1.8V (new cards ) Since there is no external and visible way to identify the card a system is dealing with, it is the interface responsibility to differentiate the card, handling the chip properly. The main purpose of the interface is two fold: To provide the right power supply voltage to the card, whatever be the external power source value. To translate the voltage levels necessaries to connect the card ( pins C1 to C8 ) to the external controller. Fig9:Block diagram of Smart Card
  • 22. 3.2 FINGER POSITIONING Finger position is calculated by the interception made by the finger and calculated the range of interception and debugs the position in terms of x and y positions and considers the screen to the x and y plane and operation is done using the finger’s position. For every touch there will be a position of the finger and will be easily recognized by the proximity sensors to read the positions. Fig10:Finger print The AET65 Smart Card Reader with Fingerprint Sensor guarantees security and convenience in a variety of applications. Combining contact smart card and fingerprint technologies in a single device, it creates a more cost-efficient and simplified integration of biometric technology in applications where the accuracy of biometric authentication isnecessary to ensure a high level of security. AET65 utilizes three-factor authentication, match- on device authentication, and has a built-in secure access moduleusing only AET65’s API and
  • 23. reference documents, and can also easily expand or adapt their existing systems utilizing third party fingerprint algorithms with AET65’s third party algorithm suppo (SAM) for maximum security. Developers without an in-depth knowledge of biometrics can integrate fingerprint authentication into smart card based applications • OPERATION OF THE SMART CARD 4.1 OPERATING The smart card's Chip Operating System (frequently referred to simply as COS; and sometimes referred to as the Mask) is a sequence of instructions, permanently embedded in the ROM of the smart card. Like the familiar PC DOS or Windows Operating System, COS instructions are not dependent on any particular application, but are frequently used by most application. 4.2 CONNECTIVITY TE Connectivity (TE) Industrial & Commercial Transportation’s new smart card reader (TE part numbers 1955562-1 & 1955562-2) is designed to work with a digital tachograph to track the number of hours a commercial vehicle operator drives, helping prevent fatigue-related accidents. The new smart card reader is easy to use, tamperproof, extremely durable, and interconnects with a smart card according to ISO 7810 & 7816 standards. TE’s smart card reader is a rugged and economical solution for tachograph manufacturers that need a card reader that will last several years of heavy use. It is compact (112.2 x 61.5 x 6.05 mm), withstands high vibrations (up to 1000 Hz), and endures severe mechanical shocks (up to 50G). The smart card reader has a -25° to + 80°C working temperature, making it suitable for tachograph applications that face wide climate variations.
  • 24. The new smart card reader is designed for easy card insertion and utilizes an electromechanical ejector for quick and automatic card removal. It is extremely durable and supports 25,000 card insertion/removal cycles. The smart card reader’s heavy-duty thermoplastic body has a flammability rating of UL 94 V0.Two variations of the new smart card reader are available: Part number 1955562-1 and part number 1955562-2. Both part numbers are identical in performance, but part number 1955562-2 features a shorter PCBstrip to meet specific application requirements. The smart card reader is part of TE Industrial & Commercial Transportation’s extensive portfolio of rugged, time-tested, high vibration resistant products and technologies. TE’s heavy-duty connectors, sensors, relays, and other robust technologies withstand the harshest envrinomental conditions and help vehicles operate safer, cleaner, and smarter. Fig11: Operating the Smart Card
  • 25. • FEATURES AND CHARACTERISTICS. • Smart cards—cards with embedded integrated circuits that can process information—offer a number of features that provide or enhance privacy protection in an access-control system 5.1. KEY FEATURES OF THE CICRET • Authentication. Smart cards provide ways to authenticate others who want to gain access to the card. These mechanisms can be used to validate users, devices, or applications wishing to use the data on the card's chip. These features can protect privacy by ensuring that a banking application has been authenticated as having the appropriate access rights before accessing financial data or functions on the card, for example. • Secure data storage. Smart cards provide a way to securely store data on the card. This data can only be accessed through the smart-card operating system by those with proper access rights. This feature can be utilized by a system to enhance privacy by storing personal user data on the card rather than in a central database, for example. In this situation, the user has better knowledge and control of when their personal data is being granted access—and who is involved. • Encryption. Smart cards provide a robust set of encryption capabilities, including key generation, secure key storage, hashing, and digital signing. These capabilities can be used to protect privacy in many ways. For example, a smart-card system can produce a digital signature for an e-mail message, providing a way to validate the e-mail's authenticity. This protects the message from being tampered with, and also provides the recipient with assurance about origination. The fact that the signing key originated from a smart card adds credibility to the origin and the intent of the signer • Strong device security. Smart-card technology is extremely difficult to duplicate or forge, and has built-in tamper resistance. Smart-card chips include a variety of hardware and software capabilities that detect and react to tampering attempts, and help counter possible attacks. .
  • 26. Fig12:Designed for mobile CardLogix smart card Fig 13:Weneo feature on ISO
  • 27. 5.2. LIMITATION • The Smart Card based solutions are popular in many Banking and E-Governance applications and India is getting ready to a huge investment on Smart Cards in its Citizen ID project. The use of Smart Cards is basically recommended for the higher security that it is proposed to provide for a solution. • It is however necessary to recognize that like many other IT solutions Smart Cards have a cost and unless the application justifies the cost and there are no cheaper alternative, there is no need to adopt Smart Cards for a given solution. • Typically Smart Cards are used to store information such as health record, the vehicle registration record or driver’s license record, Bank record etc. These cards are read using a “Smart Card Reader” which will be required at all access points. Additionally at the originating end, Smart Card writers are also required. • The total cost of Smart Card usage includes) • a) Smart Card Cost • b) Smart Card Reader Cost. • c) Smart Card Writer Cost • CONCLUSION According to awareness is defined as “the degree to which an individual are aware about the technology”. Awareness about technology cause users to look forward to try technology and at the same time enjoys the various benefits that the system provides. As a real time scenario, suppose person X has received physical access card in order to use for interior building facilities. Prior to using the access card, a friend of person X who is person Y (consider as an unauthorized person), needs to use the access card too, so person X shares his or her smart card. This behavior is an invasion to intellectual property rule and regulation where the only responsible person is person X to hold security of entire building so if anything wrong happen in the building person X would be in charge.
  • 28. In other words, awareness also refers to the effort in providing knowledge and improving understanding of the smart card. Being aware of the technology will improve users’ judgment and their ability in using the system in a secured manner. Smart cards contain unique features that bring many benefits. They offer enhanced security, convenience and economic benefits. However smart card makes possible sophisticated and portable data processing applications, and is a reliable card but in Middle East countries it is not well introduced and developed. Awareness about smart card can assist people to understand the technology and it can have a positive influence on successful applying smart card technology in society. Findings of this study show that users are not well aware about the smart card technology. Therefore, further investigation need to be carried out in the future to identify factors that will enhance their smart card awareness.
  • 29. 7. REFERENCES [1] Al-Alawi, A. I. and Al-Amer, M. A. Young generation attitudes and awareness towards the implementation of smart card in Bahrain: an exploratory study, Journal of Computer Science, 2006.2 (5), 441-446. [2] Australian Government Technical Interoperability Framework V2, 2005. http://www.agimo.gov.au/publications/2005/04/agtifv2] [3] Bandura, A. Self-efficacy mechanism in human agency, American Psychologist, Vol. 37, No. 2, 1982, pp. 122-147. [4] Consultation on Australian Government Smartcard Framework; Smartcard Implementation Guide. 2007: Australian government office of the privacy commissioner. [5] Domingo-Ferrer, J. and Posegga. J. Advances in smart cards. Computer Networks. 2007. 51(9): 2219-2222. [6] Everett. D, Smart Card Tutorial, Part 11 The Development Environment. First Published in July 1993. [7] Fancher. C. H. In Your Pocket: Smart Cards, IEEE Spectrum. 1997. [8] Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, John Wiley and Sons. 2003. ] Government Smartcard Handbook, US General Services Administration, February 2004. [10] Haddad, A. A New Way To Pay: Creating Competitive Advantage Through The Emv Smart Card Standard, Gower Publishing, Ltd. 2005.
  翻译: