Your SlideShare is downloading. ×
Smart cards system
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Smart cards system

2,178
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,178
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
139
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Smart Card Technology
  • 2. What is a Smart Card?Standard credit card-sizedplastic card ,with a siliconmicrochip embedded on it.Two types Memory-only chips Microprocessor chips
  • 3. The card is "smart" because it is"active", that is that it can receiveinformation, process it and then"make a decision".Can hold up to 32,000 bytesNewer smart cards have math co-processors Perform complex encryption routines quickly
  • 4. IntroductionIn 1968 German inventors patentcombination of plastic cards with microchips.
  • 5. Construction of Smart Cards
  • 6. Construction of Smart Cards GNDVcc Vpp RST I/O CLK RFU RFU
  • 7. Examples of Smart Cards
  • 8. Examples of Smart Cards
  • 9. Examples of Smart Cards
  • 10. Current ApplicationsPayphonesMobile CommunicationsBanking & RetailElectronic PurseHealth CareID Verification and Access Control
  • 11. Interfaces of Smart Cards Antenna
  • 12. Interfaces of Smart Cards
  • 13. DifferentSmart Card Readers
  • 14. AdvantagesFlexibilitySecurityPortabilityIncreasing data storage capacityReliability.
  • 15. DisadvantagesSecurity
  • 16. Why Smart CardsImprove the convenience and security ofany transaction.Provide tamper-proof storage of user andaccount identity.Provide vital components of systemsecurity.Protect against a full range of securitythreats
  • 17. Future•Health Services•Education•Transportation•Tele-communications
  • 18. THANK YOU…