SlideShare a Scribd company logo
INSTITUTE OF TECHNOLOGY AND
MANAGEMENT, MEERUT




                 SATYENDER KUMAR
                         0728531039
DEFINITION

   A Smart card is a portable devices that
    contains some non-volatile memory and a
    microprocessor.

   This card contains some kind of an
    encrypted key that is compared to a secret
    key contained on the user’s processor.
History of SMART CARD

 In 1968 German rocket scientist Helmut
  Grottrup and his colleague Jurgen
  Dethloff invented the automated chip
  card, receiving a patent only in 1982.
 The first mass use of the cards was as a
  Telecarte for payment in French pay
  phones, starting in 1983.
Types of SMART CARD

   Contactless smart cards ( e.g. Highway toll
    Tags )

 Contact smart card
(SIM Card, Driving license, Electronic purses
  like debit card etc. )
Contactless SMART CARD
 These smart cards do not require any physical
  contact between the card and the reader and
  becoming popular for payment and ticketing
  applications such as highway tolls.
 They communicates with the reader and gets
  powered through R-f induction technology (at data
  rate of 106-848 Kbits/sec.)
Most commonly used contactless smart cards are:
Montreal’s OPUS card, Hongkong’s OCTOPUS card,
Songhai's public transportation card.
Contact SMART CARD
 Contact smart cards have a contact area
  of about 1sq. Cm (.16 sq. inch)
  comprising of several gold plated
  contact pads.
 These pads provides electrical
  connectivity when inserted in to a reader
Plastic Cards
   Visual identity application
    Plain plastic card is enough
   Magnetic strip (e.g. credit cards)
    Visual data also available in machine
     readable form
    No security of data
   Electronic memory cards
    Machine readable data
SMART CARDS
 Processor cards (and therefore memory
  too)
 Credit card size
    With or without contacts
 Cards have an operating system too.
 The OS provides
    A standard way of interchanging information
    An interpretation of the commands and data.
   Cards must interface to a computer or
    terminal through a standard card reader.
What’s in a Card?


               CL   RST
               K          Vcc
      RFU

      GND


       RFU
                          Vpp
        I/O
Terminologies
 VCC : Power supply input
 RST : Reset signal, used to reset the
  card's communications.
 CLK : Provides the card with a clock
  signal , from which data communications
  timing is derived.
 GND : Ground(reference voltage).
 VPP : Programming voltage input -
  originally an input for a higher voltage to
  program persistent memory e.g.
  EEPROM.
 I/O : Serial input and output .
 RFU : Reserved for future use.
Typical Configurations
 256 bytes to 4KB RAM.
 8KB to 32KB ROM.
 1KB to 32KB EEPROM.
 8-bit to 16-bit CPU. 8051 based designs
  are common.
Smart Card Readers
                                  Computer based readers
                                   Connect through USB or
                                   COM (Serial) ports




   Dedicated terminals
    Usually with a small screen,
    keypad, printer, often also
    have biometric devices such
    as thumb print scanner.
Communication mechanisms
   Communication between smart card and reader
    is standardized
     ISO 7816 standard
   Commands are initiated by the terminal
     Interpreted by the card OS
     Card state is updated
     Response is given by the card.
Why SMART CARD
 Improve the convenience and security of
  any transaction.
 Provide tamper-proof storage of user
  account and identity.
 Provide vital components of system
  security.
 Protect against a full range of security
  threats
Security Mechanisms
   Password
    Card holder’s protection
   Cryptographic challenge Response
    Entity authentication
   Biometric information
    Person’s identification
Password Verification
   Terminal asks the user to provide a
    password.

   Password is sent to Card for verification.

   Scheme can be used to permit user
    authentication.
Cryptographic verification
   Terminal verify card
     Terminal sends a random number to card to be
      hashed or encrypted using a key.
     Card provides the hash or hypertext.
     Terminal can know that the card is authentic.
Biometric techniques
   Finger print identification.
    Features of finger prints can be kept on the
     card (even verified on the card)

   Photograph pattern .
    Such information is to be verified by a
     person. The information can be stored in the
     card securely.
Access & control of the files
   Applications may specify the access
    controls
    A password (PIN) on the MF selection
    (For example SIM password in mobiles)
    Multiple passwords can be used and levels
      of security access may be given
   Applications may also use cryptographic
    authentication
How does it all work?
Card is inserted in the terminal
                                   Card gets power. OS boots up.
                                   Sends ATR (Answer to reset)
ATR negotiations take place to
set up data transfer speeds,
capability negotiations etc.

Terminal sends first command to    Card responds with an error
select MF                          (because MF selection is only on
                                   password presentation)
Terminal prompts the user to
provide password
Terminal sends password for        Card verifies P2. Stores a status
verification                       “P2 Verified”. Responds “OK”
Terminal sends command to          Card responds “OK”
select MF again                    Card supplies personal data and
                                   responds “OK”
Terminal sends command to read
Applications
   Payphones
   Mobile Communications
   Banking & Retail
   Electronic Purse
   Health Care
   ID Verification and Access Control
   Transport purpose
Any Query ?
   THANK YOU

More Related Content

What's hot

Smart card
Smart cardSmart card
Smart card
ram212213
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
Kapil Dev Ghante
 
Smart cards
Smart cardsSmart cards
Smart cards
Siddhartha Mazumdar
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Shashank Karamballi
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
Bhadra Gowdra
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
ppriteshs
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj PawarAnuj Pawar
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
Dewanshu Haswani
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Lav Pratap
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Pushkar Dutt
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Deepak Raj
 
Smart Card
Smart CardSmart Card
Smart Card
Darani Daran
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 
Smart card
Smart cardSmart card
Smart card
Vaibhaw Mishra
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
salman khan
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Reben Dalshad
 

What's hot (20)

Smart card
Smart cardSmart card
Smart card
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 

Similar to smart card

Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
ssuser1b4013
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
AjaySahre
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
Kumar290483
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
ssuser5b47c8
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
ssuser5b47c8
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
ssuser5b47c8
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
vasanthimuniasamy
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
grantlerc
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
ssuser5b47c8
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC Applications
Thomas de Lazzari
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
saniacorreya
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
Edgefxkits & Solutions
 
Smart card security
Smart card securitySmart card security
Smart card security
Dhirendra Kumar Yadav
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
Erfan Moradian
 

Similar to smart card (20)

Smartcard
SmartcardSmartcard
Smartcard
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
 
Card reader
Card readerCard reader
Card reader
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC Applications
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
M Commerce
M CommerceM Commerce
M Commerce
 
Smart card security
Smart card securitySmart card security
Smart card security
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

smart card

  • 1. INSTITUTE OF TECHNOLOGY AND MANAGEMENT, MEERUT SATYENDER KUMAR 0728531039
  • 2. DEFINITION  A Smart card is a portable devices that contains some non-volatile memory and a microprocessor.  This card contains some kind of an encrypted key that is compared to a secret key contained on the user’s processor.
  • 3. History of SMART CARD  In 1968 German rocket scientist Helmut Grottrup and his colleague Jurgen Dethloff invented the automated chip card, receiving a patent only in 1982.  The first mass use of the cards was as a Telecarte for payment in French pay phones, starting in 1983.
  • 4. Types of SMART CARD  Contactless smart cards ( e.g. Highway toll Tags )  Contact smart card (SIM Card, Driving license, Electronic purses like debit card etc. )
  • 5. Contactless SMART CARD  These smart cards do not require any physical contact between the card and the reader and becoming popular for payment and ticketing applications such as highway tolls.  They communicates with the reader and gets powered through R-f induction technology (at data rate of 106-848 Kbits/sec.) Most commonly used contactless smart cards are: Montreal’s OPUS card, Hongkong’s OCTOPUS card, Songhai's public transportation card.
  • 6. Contact SMART CARD  Contact smart cards have a contact area of about 1sq. Cm (.16 sq. inch) comprising of several gold plated contact pads.  These pads provides electrical connectivity when inserted in to a reader
  • 7. Plastic Cards  Visual identity application Plain plastic card is enough  Magnetic strip (e.g. credit cards) Visual data also available in machine readable form No security of data  Electronic memory cards Machine readable data
  • 8. SMART CARDS  Processor cards (and therefore memory too)  Credit card size With or without contacts  Cards have an operating system too.  The OS provides A standard way of interchanging information An interpretation of the commands and data.  Cards must interface to a computer or terminal through a standard card reader.
  • 9. What’s in a Card? CL RST K Vcc RFU GND RFU Vpp I/O
  • 10. Terminologies  VCC : Power supply input  RST : Reset signal, used to reset the card's communications.  CLK : Provides the card with a clock signal , from which data communications timing is derived.  GND : Ground(reference voltage).
  • 11.  VPP : Programming voltage input - originally an input for a higher voltage to program persistent memory e.g. EEPROM.  I/O : Serial input and output .  RFU : Reserved for future use.
  • 12. Typical Configurations  256 bytes to 4KB RAM.  8KB to 32KB ROM.  1KB to 32KB EEPROM.  8-bit to 16-bit CPU. 8051 based designs are common.
  • 13. Smart Card Readers  Computer based readers Connect through USB or COM (Serial) ports  Dedicated terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
  • 14. Communication mechanisms  Communication between smart card and reader is standardized  ISO 7816 standard  Commands are initiated by the terminal  Interpreted by the card OS  Card state is updated  Response is given by the card.
  • 15. Why SMART CARD  Improve the convenience and security of any transaction.  Provide tamper-proof storage of user account and identity.  Provide vital components of system security.  Protect against a full range of security threats
  • 16. Security Mechanisms  Password Card holder’s protection  Cryptographic challenge Response Entity authentication  Biometric information Person’s identification
  • 17. Password Verification  Terminal asks the user to provide a password.  Password is sent to Card for verification.  Scheme can be used to permit user authentication.
  • 18. Cryptographic verification  Terminal verify card  Terminal sends a random number to card to be hashed or encrypted using a key.  Card provides the hash or hypertext.  Terminal can know that the card is authentic.
  • 19. Biometric techniques  Finger print identification. Features of finger prints can be kept on the card (even verified on the card)  Photograph pattern . Such information is to be verified by a person. The information can be stored in the card securely.
  • 20. Access & control of the files  Applications may specify the access controls A password (PIN) on the MF selection (For example SIM password in mobiles) Multiple passwords can be used and levels of security access may be given  Applications may also use cryptographic authentication
  • 21. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to Card responds with an error select MF (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for Card verifies P2. Stores a status verification “P2 Verified”. Responds “OK” Terminal sends command to Card responds “OK” select MF again Card supplies personal data and responds “OK” Terminal sends command to read
  • 22. Applications  Payphones  Mobile Communications  Banking & Retail  Electronic Purse  Health Care  ID Verification and Access Control  Transport purpose
  • 24. THANK YOU