SlideShare uma empresa Scribd logo
1 de 15
Smart card
technology
What is a Smart Card?
• A smart card, chip card, or integrated circuit card (ICC) is
any pocket-sized card with embedded integrated circuits.
• Smart cards can provide identification, authentication,
data storage and application processing.
• Smart cards may also provide strong security
authentication for single sign-on (SSO) within large
organizations.
• Smarts cards may have up to 8 kilobytes of RAM, 346
kilobytes of ROM, 256 kilobytes of programmable ROM,
and a 16-bit microprocessor.
It’s Generic Characteristics:
Dimensions similar to those of a credit card. ID-1 of the ISO/IEC
7810 standard defines cards as nominally 85.60 by 53.98
millimeters (3.370 in × 2.125 in).
Contains a tamper-resistant security system (for example a secure
crypto processor and a secure file system) and provides security
services (e.g., protects in-memory information).
Managed by an administration system which securely
interchanges information and configuration settings with the
card, controlling card blacklisting and application-data updates.
Communicates with external services via card-reading devices,
such as ticket readers, ATMs, etc.
Card Construction
• Mostly all chip cards are built from layers of
differing materials, or substrates, that when
brought together properly gives the card a
specific life and functionality.
• The typical card today is made from PVC,
Polyester or Polycarbonate.
• The card layers are printed first and then
laminated in a large press.
• The next step in construction is the blanking or
die cutting.
• This is followed by embedding a chip and then
adding data to the card. In all, there may be up
to 30 steps in constructing a card.
• The total components, including software and
plastics, may be as many as 12 separate items;
all this in a unified package that appears to the
user as a simple device.
Contact Smart card
• These are the most common type of smart card.
• Electrical contacts located on the outside of the card
connect to a card reader when the card is inserted.
• This connector is bonded to the encapsulated chip in the
card.
CHIP:

CONNECTOR:

• The use of contact smart cards as physical access
control is limited mostly to parking applications when
payment data is stored in card memory, and when the
speed of transactions is not as important.
Contactless Smart card
• A contactless smart card is a card in which the chip communicates
with the card reader through an induction technology similar to that
of an RFID (Radio Frequency Identification) (at data rates of 106 to
848 Kbit/s).
• These cards require only close proximity to an antenna to complete
a transaction.
• They are often used when transactions must be processed quickly or
hands-free, such as on mass transit systems, where a smart card can
be used without even removing it from a wallet.
Proximity Smart Card
• A proximity card or prox. card is a smart card which can be "read" without
inserting it into a reader device, as required by earlier magnetic stripe cards
such as credit cards.
• To use, the proximity card is held near an electronic reader unit for a
moment.
• The reader usually produces a "beep" or other sound to indicate the card
has been read.
• Proximity cards typically have a range of around 5 cm (2 inches) for reading,
so the user often leaves the card inside his or her wallet or purse, and
simply holds the wallet or purse near the reader.
• The term "proximity card" can refer to the older 125 kHz devices or the
newer 13.56 MHz contactless smartcards.
• Proximity cards can hold more data than a magnetic stripe card, for example
an electronic funds balance, and so can be used for contactless payment
systems. Many major banks are offering such cards.
Smart Card Reader
• A card reader is a data input device that reads data from a
card-shaped storage medium.
• Modern card readers are electronic devices that can read
plastic cards embedded with either a barcode, magnetic
strip, computer chip or another storage medium.
• A memory card reader is a device used for communication
with a smart card or a memory card.
Contact Smart Card Reader
•
•
•

•

This type of reader requires a physical connection
to the cards, made by inserting the card into the
reader.
This is the most common reader type for
applications such as ID and Stored Value.
The card-to-reader communications is often ISO
7816 T=0 only. This communication has the
advantage of direct coupling to the reader and is
considered more secure.
The other advantage is speed. The typical PTS
Protocol Type Selection (ISO7816-3) negotiated
speed can be up to 115 kilo baud. This interface
enables larger data transport without the overhead
of anti-collision and wireless breakdown issues that
are a result from the card moving in and out of the
reader antenna range.
Contactless Smart Card Reader
• This type of reader works with a radio

frequency that communicates when the card
comes close to the reader.
• Many contactless readers are designed
specifically for Payment, Physical Access
Control and Transportation applications.
• The dominant protocol under the ISO 14443
is MIFARE, followed by the EMV standards.
• The contactless smart card contains an antenna embedded within the plastic
body of the card.
• When the card is brought into the electromagnetic field of the reader, the chip in

the card is powered on.
• Once the chip is powered on, a wireless communication protocol is initiated and
established between the card and the reader for data transfer.
• The following four functions describe at a high level the sequence of events that

happen when a contactless smart card is brought near a card reader:
• Energy transfer to the card for powering the integrated circuit (chip)
• Clock signal transfer
• Data transfer to the contactless smart card
• Data transfer from the contactless smart card
• Hence, once the card is brought within range of an electromagnetic field of the
required frequency (13.56 MHz), the card will be powered up, ready to
communicate with the reader.
Communicating with a Smart Card Reader
The reader provides a path for an application to send and receive
commands from the card. There are many types of readers available, such
as serial, PC-Card, and standard keyboard models. Unfortunately, the ISO
group was unable to provide a standard for communicating with the
readers so there is no “one size fits all” approach to smart card
communication.

Each manufacturer provides a different protocol for communication with
the reader.
• First, users have to communicate with the reader.
• Second, the reader communicates with the card, acting as the
intermediary before sending the data to the card.
• Third, communication with a smart card is based on the APDU format.
The card will process the data and return it to the reader, which will then
return the data to its originating source.
Smart Card Security
• Smartcard readers have been targeted successfully by criminals in
what is termed a supply chain attack, in which the readers are
tampered with during manufacture or in the supply chain before
delivery.
• The rogue devices capture customers' card details before transmitting
them to criminals.
• The microprocessor on the smart card is there for security.
• The host computer and card reader actually "talk" to the
microprocessor.
• The microprocessor enforces access to the data on the card.
• If the host computer read and wrote the smart card's random access
memory (RAM), it would be no different than a diskette.
Smart cards offer a number of features that can be used to provide or
enhance privacy protection in systems. The following is a brief
description of some of these features and how they can be used to
protect privacy.
• Authentication
• Secure data storage

• Encryption
• Strong device security
• Secure communications
• Biometrics
• Personal device
• Certifications

Mais conteúdo relacionado

Mais procurados (20)

Smart card
Smart cardSmart card
Smart card
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card
Smart cardSmart card
Smart card
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart Card
Smart CardSmart Card
Smart Card
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 

Destaque

Destaque (17)

Integrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart CardIntegrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart Card
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
5pc pen technology
5pc pen technology5pc pen technology
5pc pen technology
 
Sociodrama instalacion de una farmacia y su func.
Sociodrama  instalacion de una farmacia y su func.Sociodrama  instalacion de una farmacia y su func.
Sociodrama instalacion de una farmacia y su func.
 
Smart sports bracelet
Smart sports braceletSmart sports bracelet
Smart sports bracelet
 
smart card and typrs of smart card
smart card and typrs of smart cardsmart card and typrs of smart card
smart card and typrs of smart card
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
Li-Fi Technology ( Advanced Technology in Future)
Li-Fi Technology ( Advanced Technology in Future)Li-Fi Technology ( Advanced Technology in Future)
Li-Fi Technology ( Advanced Technology in Future)
 
IPTV India Progress Report 2009 by Knowledgefaber - Market Analysis
IPTV India Progress Report 2009 by Knowledgefaber - Market AnalysisIPTV India Progress Report 2009 by Knowledgefaber - Market Analysis
IPTV India Progress Report 2009 by Knowledgefaber - Market Analysis
 
Li-fi Technology
Li-fi TechnologyLi-fi Technology
Li-fi Technology
 
Iptv report
Iptv reportIptv report
Iptv report
 
project loon
project loonproject loon
project loon
 
Chitti%2027
Chitti%2027Chitti%2027
Chitti%2027
 
A.P. Smart Card Project May 2011
A.P. Smart Card  Project May 2011A.P. Smart Card  Project May 2011
A.P. Smart Card Project May 2011
 
Iptv
IptvIptv
Iptv
 
Basics of IPTV
Basics of IPTVBasics of IPTV
Basics of IPTV
 

Semelhante a Smart card

Semelhante a Smart card (20)

RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
Card reader
Card readerCard reader
Card reader
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
Smart card technologies dorababu
Smart card technologies dorababuSmart card technologies dorababu
Smart card technologies dorababu
 
Itfm
ItfmItfm
Itfm
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart cart
Smart cartSmart cart
Smart cart
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
My blink tech.
My blink tech.My blink tech.
My blink tech.
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 
Namrata
NamrataNamrata
Namrata
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Smart card Technology
Smart card TechnologySmart card Technology
Smart card Technology
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Smart card

  • 2. What is a Smart Card? • A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated circuits. • Smart cards can provide identification, authentication, data storage and application processing. • Smart cards may also provide strong security authentication for single sign-on (SSO) within large organizations. • Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor.
  • 3. It’s Generic Characteristics: Dimensions similar to those of a credit card. ID-1 of the ISO/IEC 7810 standard defines cards as nominally 85.60 by 53.98 millimeters (3.370 in × 2.125 in). Contains a tamper-resistant security system (for example a secure crypto processor and a secure file system) and provides security services (e.g., protects in-memory information). Managed by an administration system which securely interchanges information and configuration settings with the card, controlling card blacklisting and application-data updates. Communicates with external services via card-reading devices, such as ticket readers, ATMs, etc.
  • 4. Card Construction • Mostly all chip cards are built from layers of differing materials, or substrates, that when brought together properly gives the card a specific life and functionality. • The typical card today is made from PVC, Polyester or Polycarbonate. • The card layers are printed first and then laminated in a large press. • The next step in construction is the blanking or die cutting. • This is followed by embedding a chip and then adding data to the card. In all, there may be up to 30 steps in constructing a card. • The total components, including software and plastics, may be as many as 12 separate items; all this in a unified package that appears to the user as a simple device.
  • 5. Contact Smart card • These are the most common type of smart card. • Electrical contacts located on the outside of the card connect to a card reader when the card is inserted. • This connector is bonded to the encapsulated chip in the card.
  • 6. CHIP: CONNECTOR: • The use of contact smart cards as physical access control is limited mostly to parking applications when payment data is stored in card memory, and when the speed of transactions is not as important.
  • 7. Contactless Smart card • A contactless smart card is a card in which the chip communicates with the card reader through an induction technology similar to that of an RFID (Radio Frequency Identification) (at data rates of 106 to 848 Kbit/s). • These cards require only close proximity to an antenna to complete a transaction. • They are often used when transactions must be processed quickly or hands-free, such as on mass transit systems, where a smart card can be used without even removing it from a wallet.
  • 8. Proximity Smart Card • A proximity card or prox. card is a smart card which can be "read" without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards. • To use, the proximity card is held near an electronic reader unit for a moment. • The reader usually produces a "beep" or other sound to indicate the card has been read. • Proximity cards typically have a range of around 5 cm (2 inches) for reading, so the user often leaves the card inside his or her wallet or purse, and simply holds the wallet or purse near the reader. • The term "proximity card" can refer to the older 125 kHz devices or the newer 13.56 MHz contactless smartcards. • Proximity cards can hold more data than a magnetic stripe card, for example an electronic funds balance, and so can be used for contactless payment systems. Many major banks are offering such cards.
  • 9. Smart Card Reader • A card reader is a data input device that reads data from a card-shaped storage medium. • Modern card readers are electronic devices that can read plastic cards embedded with either a barcode, magnetic strip, computer chip or another storage medium. • A memory card reader is a device used for communication with a smart card or a memory card.
  • 10. Contact Smart Card Reader • • • • This type of reader requires a physical connection to the cards, made by inserting the card into the reader. This is the most common reader type for applications such as ID and Stored Value. The card-to-reader communications is often ISO 7816 T=0 only. This communication has the advantage of direct coupling to the reader and is considered more secure. The other advantage is speed. The typical PTS Protocol Type Selection (ISO7816-3) negotiated speed can be up to 115 kilo baud. This interface enables larger data transport without the overhead of anti-collision and wireless breakdown issues that are a result from the card moving in and out of the reader antenna range.
  • 11. Contactless Smart Card Reader • This type of reader works with a radio frequency that communicates when the card comes close to the reader. • Many contactless readers are designed specifically for Payment, Physical Access Control and Transportation applications. • The dominant protocol under the ISO 14443 is MIFARE, followed by the EMV standards.
  • 12. • The contactless smart card contains an antenna embedded within the plastic body of the card. • When the card is brought into the electromagnetic field of the reader, the chip in the card is powered on. • Once the chip is powered on, a wireless communication protocol is initiated and established between the card and the reader for data transfer. • The following four functions describe at a high level the sequence of events that happen when a contactless smart card is brought near a card reader: • Energy transfer to the card for powering the integrated circuit (chip) • Clock signal transfer • Data transfer to the contactless smart card • Data transfer from the contactless smart card • Hence, once the card is brought within range of an electromagnetic field of the required frequency (13.56 MHz), the card will be powered up, ready to communicate with the reader.
  • 13. Communicating with a Smart Card Reader The reader provides a path for an application to send and receive commands from the card. There are many types of readers available, such as serial, PC-Card, and standard keyboard models. Unfortunately, the ISO group was unable to provide a standard for communicating with the readers so there is no “one size fits all” approach to smart card communication. Each manufacturer provides a different protocol for communication with the reader. • First, users have to communicate with the reader. • Second, the reader communicates with the card, acting as the intermediary before sending the data to the card. • Third, communication with a smart card is based on the APDU format. The card will process the data and return it to the reader, which will then return the data to its originating source.
  • 14. Smart Card Security • Smartcard readers have been targeted successfully by criminals in what is termed a supply chain attack, in which the readers are tampered with during manufacture or in the supply chain before delivery. • The rogue devices capture customers' card details before transmitting them to criminals. • The microprocessor on the smart card is there for security. • The host computer and card reader actually "talk" to the microprocessor. • The microprocessor enforces access to the data on the card. • If the host computer read and wrote the smart card's random access memory (RAM), it would be no different than a diskette.
  • 15. Smart cards offer a number of features that can be used to provide or enhance privacy protection in systems. The following is a brief description of some of these features and how they can be used to protect privacy. • Authentication • Secure data storage • Encryption • Strong device security • Secure communications • Biometrics • Personal device • Certifications