SlideShare a Scribd company logo
Khalid C
NIC Wayanad
DAIRY SMART CARD
NIC WAYANADDairy Smart Card
Dairy Smart Card
 Farmers Identity
Card
 Securely stores
farmers personal
information, milk
procurement,
transaction details
using RFID
technology
 It can be further
managed and
exchangedDairy Smart Card NIC WAYANAD
Dairy Smart Card
 Issues to each Dairy
Farmer
 Contains
 Farmer ID
 Name
 Address
 Member#
 Photo
Dairy Smart Card NIC WAYANAD
Dairy Smart Card
 Works as digital
passbook at the
time of door step
level Milk
Procurement and
other transactions
Dairy Smart Card NIC WAYANAD
Smart Card – Application
Interfacing
 Accessed through
USB attached Smart
Card Reader
 Proprietary Devices
provides API/SDK
for development
Purpose
Dairy Smart Card NIC WAYANAD
Dairy Smart Card
 Can be used with
HHT (Handheld
Terminals) POS.
 Inbuilt Reader
Module
 Helps to read/write
transaction details
 Reduces errors /
fraud in transaction
 Replace
Conventional
PassbookDairy Smart Card NIC WAYANAD
How it Works in Dairy Apps ?
NIC WAYANADDairy Smart Card
Implementation Status
NIC WAYANADDairy Smart Card
 Pilot Implementation
 Pallikkunnu DCS (Wayanad) – 750 Cards
 Channothukolly DCS (Wayanad) – 200 Cards
 In Progress
 Highrange Dairy (Idukki) – Enrolment in Process
Implementation Process
NIC WAYANADDairy Smart Card
 Collect Farmers Details in Worksheet
 Farmer ID, Name, Address, Member# etc
 Capture Farmers Passport Size Photos
 Scan from existing Records
 Collect through scheduled campaign at DCS
 Provide Details to Card Printing Vendors
 Cost . Approx Rs 40/- per card
 Including Card and Printing
Smart Card Technology
 Contactless smart
cards that employ a
radio frequency
(RFID) between
card and reader
without physical
insertion of the card.
NIC WAYANADDairy Smart Card
Smart Card - Technology
NIC WAYANADDairy Smart Card
Smart Card - Technology
NIC WAYANADDairy Smart Card
 Contactless Smart Card
 ISO/IEC 14443A Standard
 Communication distance up to 10 cm. (13.56
Mhz)
 Data/Power transfer over RF via antenna
inside
 Read and write memory capacity of 1k- 4k
ISO/IEC Standards Overview
NIC WAYANADDairy Smart Card
What happens in RF
communication
NIC WAYANADDairy Smart Card
1. When a contactless smart card or an RFID
tag passes within range, a reader sends out
radio frequency electromagnetic waves.
2. The antenna, tuned to receive these waves,
wakes up the chip in the smart card or tag.
3. A wireless communications channel is set up
between the reader and the smart card or
tag.
References
NIC WAYANADDairy Smart Card
 http://www.smartcardbasics.com/smart-card-types.html
 https://en.wikipedia.org/wiki/Contactless_smart_card
 https://www.acs.com.hk/en/product-lines/6/contactless-readers/

More Related Content

What's hot

Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
Anant Patel
 
Smart card
Smart cardSmart card
Smart card
ram212213
 
Smart cards
Smart cardsSmart cards
Smart cards
jaswinderkaur144
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Lav Pratap
 
Smart cart
Smart cartSmart cart
Smart cart
Yashar Sabir
 
Smart cards
Smart cardsSmart cards
Smart cards
imshubham
 
Smart cards system
Smart cards systemSmart cards system
Smart card
Smart cardSmart card
Smart card
Rahul Srivastava
 
Smart card
Smart cardSmart card
SMART CARD
SMART CARDSMART CARD
SMART CARD
Kapil Dev Ghante
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Shashank Karamballi
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
thinkahead.net
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
Ram Dutt Shukla
 
Smart Card
Smart Card Smart Card
Smart Card
Liton Ahmed
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
Anuj Pawar
 
smart card
smart cardsmart card
smart card
Sumit Kumar
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Reben Dalshad
 
Smart card
Smart cardSmart card
Smart card
Vaibhaw Mishra
 
Smart Card
Smart CardSmart Card
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
vishnu murthy
 

What's hot (20)

Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart cart
Smart cartSmart cart
Smart cart
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart cards system
Smart cards systemSmart cards system
Smart cards system
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Smart Card
Smart Card Smart Card
Smart Card
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
smart card
smart cardsmart card
smart card
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 

Similar to Contact less Smart Card

RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
avinash yada
 
Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)
raviteja srinivasula
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
Pranav Veerani
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
laharipothula
 
15251640 pss7
15251640 pss715251640 pss7
15251640 pss7
瀚宇 邓
 
13251473 pss7
13251473 pss713251473 pss7
13251473 pss7
XieZhengBang
 
RFID Application
RFID ApplicationRFID Application
RFID Application
RainySiu
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
Martin Man
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
IRJET Journal
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Lipupu
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
Edgefxkits & Solutions
 
RFID Application
RFID ApplicationRFID Application
RFID Application
16200810
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
rajkanakaraj007
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
Edgefxkits & Solutions
 
15226891 pss7
15226891 pss715226891 pss7
15226891 pss7
15226891
 
Rfid application
Rfid applicationRfid application
Rfid application
kcy523
 
13252976 pss7
13252976 pss713252976 pss7
13252976 pss7
frankzzhai
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
liuyingxi971017
 
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
IRJET-  	  Smart Trolley System for Automated Billing using RFID and IoTIRJET-  	  Smart Trolley System for Automated Billing using RFID and IoT
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
IRJET Journal
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
15251705
 

Similar to Contact less Smart Card (20)

RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)
 
Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
15251640 pss7
15251640 pss715251640 pss7
15251640 pss7
 
13251473 pss7
13251473 pss713251473 pss7
13251473 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
15226891 pss7
15226891 pss715226891 pss7
15226891 pss7
 
Rfid application
Rfid applicationRfid application
Rfid application
 
13252976 pss7
13252976 pss713252976 pss7
13252976 pss7
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
IRJET-  	  Smart Trolley System for Automated Billing using RFID and IoTIRJET-  	  Smart Trolley System for Automated Billing using RFID and IoT
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Contact less Smart Card

  • 1. Khalid C NIC Wayanad DAIRY SMART CARD NIC WAYANADDairy Smart Card
  • 2. Dairy Smart Card  Farmers Identity Card  Securely stores farmers personal information, milk procurement, transaction details using RFID technology  It can be further managed and exchangedDairy Smart Card NIC WAYANAD
  • 3. Dairy Smart Card  Issues to each Dairy Farmer  Contains  Farmer ID  Name  Address  Member#  Photo Dairy Smart Card NIC WAYANAD
  • 4. Dairy Smart Card  Works as digital passbook at the time of door step level Milk Procurement and other transactions Dairy Smart Card NIC WAYANAD
  • 5. Smart Card – Application Interfacing  Accessed through USB attached Smart Card Reader  Proprietary Devices provides API/SDK for development Purpose Dairy Smart Card NIC WAYANAD
  • 6. Dairy Smart Card  Can be used with HHT (Handheld Terminals) POS.  Inbuilt Reader Module  Helps to read/write transaction details  Reduces errors / fraud in transaction  Replace Conventional PassbookDairy Smart Card NIC WAYANAD
  • 7. How it Works in Dairy Apps ? NIC WAYANADDairy Smart Card
  • 8. Implementation Status NIC WAYANADDairy Smart Card  Pilot Implementation  Pallikkunnu DCS (Wayanad) – 750 Cards  Channothukolly DCS (Wayanad) – 200 Cards  In Progress  Highrange Dairy (Idukki) – Enrolment in Process
  • 9. Implementation Process NIC WAYANADDairy Smart Card  Collect Farmers Details in Worksheet  Farmer ID, Name, Address, Member# etc  Capture Farmers Passport Size Photos  Scan from existing Records  Collect through scheduled campaign at DCS  Provide Details to Card Printing Vendors  Cost . Approx Rs 40/- per card  Including Card and Printing
  • 10. Smart Card Technology  Contactless smart cards that employ a radio frequency (RFID) between card and reader without physical insertion of the card. NIC WAYANADDairy Smart Card
  • 11. Smart Card - Technology NIC WAYANADDairy Smart Card
  • 12. Smart Card - Technology NIC WAYANADDairy Smart Card  Contactless Smart Card  ISO/IEC 14443A Standard  Communication distance up to 10 cm. (13.56 Mhz)  Data/Power transfer over RF via antenna inside  Read and write memory capacity of 1k- 4k
  • 13. ISO/IEC Standards Overview NIC WAYANADDairy Smart Card
  • 14. What happens in RF communication NIC WAYANADDairy Smart Card 1. When a contactless smart card or an RFID tag passes within range, a reader sends out radio frequency electromagnetic waves. 2. The antenna, tuned to receive these waves, wakes up the chip in the smart card or tag. 3. A wireless communications channel is set up between the reader and the smart card or tag.
  • 15. References NIC WAYANADDairy Smart Card  http://www.smartcardbasics.com/smart-card-types.html  https://en.wikipedia.org/wiki/Contactless_smart_card  https://www.acs.com.hk/en/product-lines/6/contactless-readers/