smart cards system

Post on 22-Nov-2014

2.291 Views

Category:

Technology

4 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Smart Card Technology

What is a Smart Card?What is a Smart Card?

Standard credit card-sized Standard credit card-sized plastic card ,with a silicon plastic card ,with a silicon microchip embedded on it.microchip embedded on it.

Two types Two types Memory-only chipsMemory-only chips Microprocessor chipsMicroprocessor chips

The card is "smart" because it is The card is "smart" because it is "active", that is that it can receive "active", that is that it can receive information, process it and then information, process it and then "make a decision". "make a decision". Can hold up to 32,000 bytesCan hold up to 32,000 bytesNewer smart cards have math co-Newer smart cards have math co-processorsprocessors Perform complex encryption routines Perform complex encryption routines

quicklyquickly

IntroductionIntroduction

In 1968 German inventors patent In 1968 German inventors patent combination of plastic cards with micro combination of plastic cards with micro chips.chips.

Construction of Smart Cards

Construction of Smart Cards

I/ORST

RFU RFU

GND

Vpp

Vcc

CLK

Examples of Smart Cards

Examples of Smart Cards

Examples of Smart Cards

Current ApplicationsCurrent Applications

PayphonesPayphones

Mobile CommunicationsMobile Communications

Banking & RetailBanking & Retail

Electronic PurseElectronic Purse

Health CareHealth Care

ID Verification and Access ControlID Verification and Access Control

Antenna

Interfaces of Smart Cards

Interfaces of Smart Cards

Different

Smart Card

Readers

AdvantagesAdvantages

FlexibilityFlexibility

SecuritySecurity

Portability Portability

Increasing data storage capacity Increasing data storage capacity

Reliability.Reliability.

DisadvantagesDisadvantages

Security Security

Why Smart CardsWhy Smart Cards

Improve the convenience and security of Improve the convenience and security of any transaction. any transaction.

Provide tamper-proof storage of user and Provide tamper-proof storage of user and account identity. account identity.

Provide vital components of system Provide vital components of system security.security.

Protect against a full range of security Protect against a full range of security threats threats

FutureFuture

•Health Services

•Education

•Transportation

•Tele-communications

THANK YOU…THANK YOU…

top related