SlideShare uma empresa Scribd logo
1 de 18
Smart Cards: Technology  Ameen Shariff 1225208103(RM)
DEFINITION ,[object Object],[object Object]
Types of Smart Cards ,[object Object],[object Object]
OBJECTIVE ,[object Object],[object Object],[object Object],[object Object]
Plastic Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
Typical Configurations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card Readers ,[object Object],[object Object],[object Object],[object Object]
Communication mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Verification ,[object Object],[object Object],[object Object]
Cryptographic verification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric techniques ,[object Object],[object Object],[object Object],[object Object]
Access control on the files ,[object Object],[object Object],[object Object],[object Object],[object Object]
How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
[object Object]

Mais conteúdo relacionado

Mais procurados

Example of access control
Example of access controlExample of access control
Example of access controlHafiza Abas
 
Commercial data processing
Commercial data processingCommercial data processing
Commercial data processingvDrPepper
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsMayank Jain
 

Mais procurados (12)

Atm switch
Atm switchAtm switch
Atm switch
 
Example of access control
Example of access controlExample of access control
Example of access control
 
Fundamental of ICT
Fundamental of ICTFundamental of ICT
Fundamental of ICT
 
Commercial data processing
Commercial data processingCommercial data processing
Commercial data processing
 
Atm Simulator
Atm SimulatorAtm Simulator
Atm Simulator
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
ATM Locator
ATM LocatorATM Locator
ATM Locator
 
Access control system
Access control systemAccess control system
Access control system
 
Seminar
SeminarSeminar
Seminar
 
Seminar
SeminarSeminar
Seminar
 
In bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systemsIn bio 460 Access Control System http://ampletrails.com/access-control-systems
In bio 460 Access Control System http://ampletrails.com/access-control-systems
 
Biometric System
Biometric SystemBiometric System
Biometric System
 

Semelhante a Smart Card

Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.pptssuser1b4013
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptAjaySahre
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptKumar290483
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfssuser5b47c8
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport systemEdgefxkits & Solutions
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authenticationhon1nbo
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam崇倍 洪
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 

Semelhante a Smart Card (20)

Smartcard
SmartcardSmartcard
Smartcard
 
smart card
smart cardsmart card
smart card
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Card reader
Card readerCard reader
Card reader
 
Smart card
Smart cardSmart card
Smart card
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
 
Smart card
Smart cardSmart card
Smart card
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 

Mais de itsvineeth209

Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retailitsvineeth209
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09itsvineeth209
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sectoritsvineeth209
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2itsvineeth209
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Designitsvineeth209
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Processitsvineeth209
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collectionitsvineeth209
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Designitsvineeth209
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identificationitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Methoditsvineeth209
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Ruleitsvineeth209
 

Mais de itsvineeth209 (20)

Green Marketing
Green MarketingGreen Marketing
Green Marketing
 
Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retail
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sector
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Design
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Process
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collection
 
Rm 3 Hypothesis
Rm   3   HypothesisRm   3   Hypothesis
Rm 3 Hypothesis
 
Research Design
Research DesignResearch Design
Research Design
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Design
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identification
 
Vam
VamVam
Vam
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Simplex Method
Simplex MethodSimplex Method
Simplex Method
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Method
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Rule
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Smart Card

  • 1. Smart Cards: Technology Ameen Shariff 1225208103(RM)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
  • 8. What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
  • 18.