24
Presented by The Mavericks.

presentation on smart card

Embed Size (px)

Citation preview

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 1/24

Presented byThe Mavericks.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 2/24

ASmart Card is a plastic card the size of acredit card with an integrated circuit builtinto it.

Smart cards typically hold 2,000 to 8,000electronic bytes of data (the equivalent of several pages of data).

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 3/24

Those bytes can be electronically coded.Magnetic-stripe cards, such as those issued

by banks and credit card companies, lack thesecurity of microchips but remaininexpensive due to their status as a single-purpose card.

The card is made of plastic, generally PVC,(Polyvinyl chloride) but sometimesABS(Acrylonitrile butadiene styrene).

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 4/24

� The technology behind smart cards has actuallybeen around since the 1960s but the chips weremuch larger.

� In the 1980s, a German scientist created a cardfor using to pay for a call on a pay phone.

The technology wasnt really used much untilthe 1990s when cell phones in Europe developedusing the smart card technology with a cardcalled a SIM card.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 5/24

In 1968 German rocket scientist HelmutGrottrup and his colleague Jorgen Dethloff invented the automated chip card, receiving a

patent only in 1982, while working for

German company Giesecke and Devrient.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 6/24

� Smart cards have two different types of 

interfaces: contact and contactless.

� Contact smart cards are inserted into a smartcard reader, making physical contact with the

reader.

Contactless smart cards have an antennaembedded inside the card that enablescommunication with the reader without

physical contact

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 7/24

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 8/24

Secure identity applications - employee IDbadges, citizen ID documents, electronic

passports, drivers licenses, online authenticationdevices.

In the U.S., smart cards are utilized in GSM mobile

telephones, in DirecTV and EchoStar satellitereceivers, and in theAmerican Express Blue card.

Software Industry .

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 9/24

Healthcare applications - citizen health ID cards,physician ID cards, portable medical records

cards. Payment applications - contact and contactless

credit/debit cards, transit payment cards.

Telecommunications applications - GSM

Subscriber Identity Modules, pay telephonepayment cards.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 10/24

There are five general categories of smart cards:

Contact smart cards

Contactless smart cards

dual-interface cards

hybrid cards Integrated Circuit (IC) Microprocessor Cards

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 11/24

ASEDrivIIIeUSBV2 Smart Card Reader

BlackBerry Smart Card Reader-TheBlackBerry®Smart Card Reader1 is a lightweight, wearablereader that enables controlled access to

BlackBerry® smartphones usingBluetooth®technology and advancedAES-256 encryption.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 12/24

The smart card application development processincludes following steps:

User requirements: What does the user want toaccomplish?

Software requirements: Map user requirements tosoftware requirements.

Architectural design: Design the architecture of thesolution.

.

Final testing and maintenance.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 13/24

Code Generation: Create code as per thearchitecture.

Emulation: Use emulators to test the code onvirtual card.

In-card Emulation: Run the code on actual cardusing card reader.

Verification and Validation: It involves the testing.

Final testing and maintenance.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 14/24

Data stored in the smart card's microchip can be

accessed only through the chip operating system(COS), providing a high level of data security. Thissecurity takes the form of passwords allowing auser to access parts of the IC chip's memory or

encryption/decryption measures which translatethe bytes stored in memory into usefulinformation.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 15/24

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 16/24

� Computer security

� Credit cards

� Health care (medical)� Identification

� Security

� ] Differential power analysis

� Physical disassembly

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 17/24

� The plastic card in which the chip is

embedded is fairly flexible, and the larger the

chip, the higher the probability that normaluse could damage it.

� Cards are often carried in wallets or pockets

a harsh environment for a chip.

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 18/24

� Using a smart card for mass transit presents a

privacy risk, because it allows the mass

transit operator (and the government) totrack an individual's movement.

� Another problem is the lack of standards for

functionality and security

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 19/24

� Improve the convenience and security of any

transaction.

� Provide tamper-proof storage of user and

account identity.

� Provide vital components of system security.

� Protect against a full range of security threats

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 20/24

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 21/24

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 22/24

Construction of Smart Cards

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 23/24

8/6/2019 presentation on smart card

http://slidepdf.com/reader/full/presentation-on-smart-card 24/24

Construction of Smart Cards

I/O

RST

RFU RFU

GND

Vpp

Vcc

CLK