SlideShare uma empresa Scribd logo
1 de 18
Smart Cards: Technology  Ameen Shariff 1225208103(RM)
DEFINITION ,[object Object],[object Object]
Types of Smart Cards ,[object Object],[object Object]
OBJECTIVE ,[object Object],[object Object],[object Object],[object Object]
Plastic Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
Typical Configurations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card Readers ,[object Object],[object Object],[object Object],[object Object]
Communication mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Verification ,[object Object],[object Object],[object Object]
Cryptographic verification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric techniques ,[object Object],[object Object],[object Object],[object Object]
Access control on the files ,[object Object],[object Object],[object Object],[object Object],[object Object]
How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
[object Object]

Mais conteúdo relacionado

Mais procurados (20)

Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart Card
Smart CardSmart Card
Smart Card
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Destaque

Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentationjaclor0408
 
Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Shane Mitchell
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...flyingsheep
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam崇倍 洪
 
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...Elisabete Ferreira
 
Developing Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsDeveloping Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsCellnetrix
 
Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelCSI globalVCard
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Mobile charging
Mobile chargingMobile charging
Mobile chargingRafee Dar
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICSkajal
 
Smart card technology
Smart card technologySmart card technology
Smart card technologyDeepak Raj
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2lesleywalters3333
 
Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec
 

Destaque (20)

Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentation
 
smart card
smart cardsmart card
smart card
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2Smart 2020 ICT Presentation July2
Smart 2020 ICT Presentation July2
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...Virtual Smart Design - How Sustainability and Technology are Interconnected w...
Virtual Smart Design - How Sustainability and Technology are Interconnected w...
 
Developing Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsDeveloping Smart Card Web Server Applications
Developing Smart Card Web Server Applications
 
Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate Travel
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Smart cart
Smart cartSmart cart
Smart cart
 
Embedded System Case Study
Embedded System Case StudyEmbedded System Case Study
Embedded System Case Study
 
Mobile charging
Mobile chargingMobile charging
Mobile charging
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Finer print scanner
Finer print scannerFiner print scanner
Finer print scanner
 
Using A FInancial Calculator
Using A FInancial CalculatorUsing A FInancial Calculator
Using A FInancial Calculator
 
The research project slide show 2
The research project slide show 2The research project slide show 2
The research project slide show 2
 
Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...Expo Canitec 2010, Digital TV Transition and ...
Expo Canitec 2010, Digital TV Transition and ...
 

Semelhante a Smart Card

Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.pptssuser1b4013
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptAjaySahre
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptKumar290483
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfssuser5b47c8
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport systemEdgefxkits & Solutions
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authenticationhon1nbo
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfssuser5b47c8
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 

Semelhante a Smart Card (20)

Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Card reader
Card readerCard reader
Card reader
 
Smart card
Smart cardSmart card
Smart card
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
M Commerce
M CommerceM Commerce
M Commerce
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
 
Smart Card
Smart CardSmart Card
Smart Card
 

Mais de itsvineeth209

Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retailitsvineeth209
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09itsvineeth209
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sectoritsvineeth209
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2itsvineeth209
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Designitsvineeth209
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Processitsvineeth209
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collectionitsvineeth209
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Designitsvineeth209
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identificationitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problemitsvineeth209
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Methoditsvineeth209
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Ruleitsvineeth209
 

Mais de itsvineeth209 (20)

Green Marketing
Green MarketingGreen Marketing
Green Marketing
 
Evolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian RetailEvolution,Drivers Of Indian Retail
Evolution,Drivers Of Indian Retail
 
Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09Intro To Tretailing 6.2.09
Intro To Tretailing 6.2.09
 
Indian Retail Sector
Indian Retail SectorIndian Retail Sector
Indian Retail Sector
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Sampling Design
Sampling DesignSampling Design
Sampling Design
 
Rm 10 Report Writing 2
Rm   10   Report Writing 2Rm   10   Report Writing 2
Rm 10 Report Writing 2
 
Rm 6 Sampling Design
Rm   6   Sampling DesignRm   6   Sampling Design
Rm 6 Sampling Design
 
Rm 1 Intro Types Research Process
Rm   1   Intro Types   Research ProcessRm   1   Intro Types   Research Process
Rm 1 Intro Types Research Process
 
Rm 5 Methods Of Data Collection
Rm   5   Methods Of Data CollectionRm   5   Methods Of Data Collection
Rm 5 Methods Of Data Collection
 
Rm 3 Hypothesis
Rm   3   HypothesisRm   3   Hypothesis
Rm 3 Hypothesis
 
Research Design
Research DesignResearch Design
Research Design
 
Rm 4 Research Design
Rm   4   Research DesignRm   4   Research Design
Rm 4 Research Design
 
Rm 2 Problem Identification
Rm   2   Problem IdentificationRm   2   Problem Identification
Rm 2 Problem Identification
 
Vam
VamVam
Vam
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Transportation Problem
Transportation ProblemTransportation Problem
Transportation Problem
 
Simplex Method
Simplex MethodSimplex Method
Simplex Method
 
Procedure Of Simplex Method
Procedure Of Simplex MethodProcedure Of Simplex Method
Procedure Of Simplex Method
 
North West Corner Rule
North   West Corner RuleNorth   West Corner Rule
North West Corner Rule
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Smart Card

  • 1. Smart Cards: Technology Ameen Shariff 1225208103(RM)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Smart Cards devices VCC Reset Clock Reserved I/O VPP GND
  • 8. What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK”
  • 18.