SMART CARD BASICS
Upcoming SlideShare
Loading in...5
×
 

SMART CARD BASICS

on

  • 947 views

 

Statistics

Views

Total Views
947
Views on SlideShare
947
Embed Views
0

Actions

Likes
0
Downloads
67
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

SMART CARD BASICS SMART CARD BASICS Presentation Transcript

  • By: KAJAL Basic of Smart cardBasic of Smart card
  • Contents Introduction Smart card/chip Smart chip design Types of smart chips Card Construction Circuits and Card Operating Systems Applications and Benefits
  • Introduction Established in 1996 Syscom Corporation and Smart Chip Limited today occupy the leadership position in both their respective sectors. Today the companies have 47 offices in 23 states of India with employee strength of 550 nationwide. Syscom is 100 per cent subsidiary of Smart Chip Ltd. With over a decade of experience in smart cards management systems, Smart Chip has been delivering successful smart card enabled solutions in India since 1995.
  • Smart card A smart card is a plastic card about the size of a credit card with an embedded microchip that can be loaded with data. A smart card is a portable device that contains some non – volatile memory and microprocessor.
  • Smart card These are basically used for telephone calling, cash payments and other applications. This card contain some encrypted key that is compared to a secret key contained on the user’s  processor.  Smart cards can hold up to 32,000 bytes. Smart card is an elctronic wallet.
  • Fabrication of smart card Smart cards are credit card-sized and made of flexible plastic, usually polyvinyl chloride (PVC).  They are embedded with a micro module containing a single silicon integrated circuit chip with memory and microprocessor.  The micro module has eight metallic pads on its surface, each designed to international standards.
  • Micro module metallic chip design VCC: power supply RST: reset signal, used to reset the card's communications CLK: provides the card with a clock signal GND: ground (reference voltage) VPP: designated this as a programming voltage I/O: serial input and output (half-duplex). C4, c8: the two remaining contacts are used for usb interfaces and other uses
  • TYPES OF SMART CARD Contactless smart card ( .eg. Highway toll tags) Contact smart card (SIM Card , Driving license , electronic purpose like debit card etc.)
  • Card Construction Mostly all chip cards are built from layers of differing materials, or substrates, that when brought together properly gives the card a specific life and functionality. The typical card today is made from PVC, Polyester or Polycarbonate. The 3 by 5 mm security chip embedded in the card
  • PC card interaction PC send command to card(through the serial line). The card execute the command and send back the reply. The PC cannot directly access the memory of the card so the data in card is protected from unauthorized access. This is what make the card smart…..
  • Application area Telecommunications E-Governance Health & ID Transport Banking
  • Applications Financial Identification Public transit Computer security Schools Healthcare
  • Problems  The plastic card in which the chip is embedded is fairly flexible, and the larger the chip, the higher the probability that normal use could damage it. Cards are often carried in wallets or pockets, a harsh environment for a chip. However, for large banking systems, failure-management costs can be more than offset by fraud reduction.  Client-side identification and authentication cards are the most secure way for e.g., internet banking applications, but security is never 100% sure. If the account holder's computer hosts malware, the security model may be broken.