SlideShare a Scribd company logo
Smart Cards: Technology  Ameen Shariff 1225208103(RM)
DEFINITION ,[object Object],[object Object]
Types of Smart Cards ,[object Object],[object Object]
OBJECTIVE ,[object Object],[object Object],[object Object],[object Object]
Plastic Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
Typical Configurations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card Readers ,[object Object],[object Object],[object Object],[object Object]
Communication mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Verification ,[object Object],[object Object],[object Object]
Cryptographic verification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric techniques ,[object Object],[object Object],[object Object],[object Object]
Access control on the files ,[object Object],[object Object],[object Object],[object Object],[object Object]
How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
[object Object]

More Related Content

What's hot

SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
salman khan
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
Amit Gaur
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
Mithileysh Sathiyanarayanan
 
Smart card
Smart cardSmart card
Smart card
ram212213
 
Smart Card
Smart CardSmart Card
Smart Card
Smart CardSmart Card
Smart Card
Darani Daran
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Deepak Raj
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Pushkar Dutt
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
Kapil Dev Ghante
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
Vikram Nandini
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Shashank Karamballi
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 

What's hot (20)

SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
smart card
smart cardsmart card
smart card
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 

Viewers also liked

Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
Dewanshu Haswani
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentationjaclor0408
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj PawarAnuj Pawar
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Lav Pratap
 
Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Shane Mitchell
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
flyingsheep
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
崇倍 洪
 
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Elisabete Ferreira
 
Developing Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsDeveloping Smart Card Web Server Applications
Developing Smart Card Web Server Applications
Cellnetrix
 
Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate Travel
CSI globalVCard
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Smart cart
Smart cartSmart cart
Smart cart
Yashar Sabir
 
Embedded System Case Study
Embedded System Case StudyEmbedded System Case Study
Embedded System Case Study
JCT COLLEGE OF ENGINEERING AND TECHNOLOGY
 
Mobile charging
Mobile chargingMobile charging
Mobile charging
Rafee Dar
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICSkajal
 
Using A FInancial Calculator
Using A FInancial CalculatorUsing A FInancial Calculator
Using A FInancial Calculator
How To Be A Stock Market Player
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2lesleywalters3333
 

Viewers also liked (20)

Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentation
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
 
Developing Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsDeveloping Smart Card Web Server Applications
Developing Smart Card Web Server Applications
 
Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate Travel
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Smart cart
Smart cartSmart cart
Smart cart
 
Embedded System Case Study
Embedded System Case StudyEmbedded System Case Study
Embedded System Case Study
 
Mobile charging
Mobile chargingMobile charging
Mobile charging
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Finer print scanner
Finer print scannerFiner print scanner
Finer print scanner
 
Using A FInancial Calculator
Using A FInancial CalculatorUsing A FInancial Calculator
Using A FInancial Calculator
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2
 

Similar to Smart Card

Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
ssuser1b4013
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
AjaySahre
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
Kumar290483
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
ssuser5b47c8
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
saniacorreya
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
ssuser5b47c8
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
Edgefxkits & Solutions
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
hon1nbo
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
Lennon808
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
spy007s
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
ssuser5b47c8
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
Amira Serag
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
Varun Arora
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
Vivek Bajpai
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
grantlerc
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
ijctcm
 

Similar to Smart Card (20)

Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Card reader
Card readerCard reader
Card reader
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
M Commerce
M CommerceM Commerce
M Commerce
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 

More from itsvineeth209

Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retailitsvineeth209
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09itsvineeth209
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sectoritsvineeth209
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2itsvineeth209
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Designitsvineeth209
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Processitsvineeth209
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collectionitsvineeth209
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Designitsvineeth209
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identificationitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Methoditsvineeth209
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Ruleitsvineeth209
 

More from itsvineeth209 (20)

Green Marketing
Green MarketingGreen Marketing
Green Marketing
 
Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retail
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sector
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Design
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Process
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collection
 
Rm 3 Hypothesis
Rm   3   HypothesisRm   3   Hypothesis
Rm 3 Hypothesis
 
Research Design
Research DesignResearch Design
Research Design
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Design
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identification
 
Vam
VamVam
Vam
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Simplex Method
Simplex MethodSimplex Method
Simplex Method
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Method
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Rule
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Smart Card

  • 1. Smart Cards: Technology Ameen Shariff 1225208103(RM)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
  • 8. What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
  • 18.