SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 1 Issue 3 ǁ May. 2016 ǁ PP 24-25
| Volume 1| Issue 3 | www.ijrtem.com | May 2016| 24
Analysis on need of Smart Card
Sujata Naik1
, Bhgyashree Muley2
, Sayali Pawar3
1,2,3
Department Of Electronics And Telecommunication Engineering
D Y Patil College Of Engineering, Akurdi, Pune, India
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a
reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many
applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is
important to look into several aspects and factors especially those resulted due to the rapid advancement in communication
technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future.
Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and
researchers.
Keywords: contactless, security
1. Introduction
Smart card is one of the greatest achievements in the world of information technology. Similar in size to today's plastic
payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the
processing power to serve many different applications. As an access-control device, smart cards can be used to access server remotely
over the Internet and they can make personal and business data available only to the appropriate users. Smart cards provide data
portability, security, convenience and the like. smart cards can be categorized into the following: Memory and microprocessor-
Memory cards simply store data and can be viewed as a small floppy disk with optional security. A microprocessor card, on the other
hand, can add, delete and manipulate information in its memory on the card. Contact and contactless - Contact smart cards are inserted
into a smart card reader, making physical contact with the reader. However, contactless smart cards have an antenna embedded inside
the card that enables communication with the reader without physical contact. A combi card combines the two features with a very
high level of security The scope of uses for a smart card has expanded each year. In recent years, the information age has introduced
an array of security and privacy issues that have called for advanced smart card security applications. This paper describes about the
necessities of smart card in current market where all technogy base is contactless communication. There are many sectors which are
using smartcards for access of data over radio frequency. These paper also describes how educational, financial and medival sectors
are moving fastly toward contactless access.
2. Need Of Contactless Smart Chip Technology
In Contactless smart chip technology contains microcontroller or equivalent intelligence, internal memory, and a RF
transreceiver embedded in a device that communicates with a reader through a contactless interface. contactless smart chip
technology is being leveraged to improve speed, convenience and security. This technology is used in a wide range of applications
from payment cards to protecting personal information in government and corporate identification cards, electronic passports and
visas, Contactless smart chips can securely manage, store, and provide access to data on the device in which they are embedded
Contactless smart chip technology is available in a variety of forms – plastic cards, watches, key fobs, documents, and other handheld
devices, such as mobile phones. This technology is not related to ―non-smart‖ RF chip technologies, such as the RFID tags used for
inventory management/product tracking applications, which require minimal functionality.The drawbacks of methods of payment –
magnetic stripe cards and cash that we found that are The readers are not made available for the driving license (smart card) to traffic
squads by traffic department in many cities,The collection of fine is not automated; instead manual memo book is used to collect
fine,Proposed readers are contact readers which will be time consuming Just what are the advantages of contactless payments over
other The answer is speed and security, as has been substantiated in the early implementations and in recent market research.
Consumers no longer have to worry about having enough cash for a purchase—they can place their contactless payment device in
close proximity to a reader and go. In most cases, they do not even have to sign a receipt or enter a personal identification number
(PIN). As a result,an American Express study found contactless transactions to be 63% faster than cash and 53% faster than using a
traditional credit card. Research also shows that consumers generally spend more per transaction when they don’t use cash. as a result
of fewer requirements to handle cash, improved operational efficiencies, and reduced maintenance required by contactless readers.
Analysis on need of Smart Card
| Volume 1| Issue 3 | www.ijrtem.com | May 2016| 25
3. Conclusion
Smart card inclined with advent of convenience and security issues. Utilizing smart card technology essentially improves
protection. It secures private qualified data on the card with progressed cryptography and digital signatures to avoid illegal changes
and to anticipate cloning of the card. This permits the single person to control access to their information and kills the requirement for
mid database access throughout character verification. contactless smart cards with elevated conveyance velocities are currently ready
that have enough memory to store an interesting unique mark template (fingerprint) or photographic representation. These methods are
higher secure system can utilize contactless smart card technology to attain an extent of security, throughput and cost objectives.
Smart card improves Efficiency Utilizing smart card technology for distinguishing proof and confirmation of people gives the most
productive execution of a secure authentication system. It also Upgrades and offers Flexibility
References
[1]. István Zsolt BERTA – Zoltán ÁdámMANN,Smart Cards – Present and Future
[2]. Internet Security and FinancialMathematics Application
[3]. Research & Development Laboratory (E-BizLab)
[4]. won Kim: ―Smart Cards: Status, Issues, and US Adoption‖, in Journal
[5]. of Object Technology, vol. 3, no. 5, May-June 2004, pp. 25-30.
[6]. Gammel, B.M and Ruping, J. ―Smart cards insides‖ IEEE Spectrum , conference publications, PP 69-74, 12-16 Sept. 2005.
[7]. Chang, C.-C, Hwang, R.-J , Buehrer,D. ―Using smart cards to authenticate passwords‖IEEE Conference Publications, PP 154-
156, 13-15 Oct 19
[8]. SIMPSON, M.C.S. ―SMART POWER; A SMART CARD ELECTRICITY PAYMENT SYSTEM‖ IEEE,PP 3/1 - 3/4 , 23 JAN
1996
[9]. Selimis,G. Fournaris, A. Kostopoulos, G , Koufopavlou, O. ―Software and Hardware Issues in Smart Card Technology‖ IEEE,
PP 143 – 152, 3rd Quarter 2009 .
[10]. Stefano Zanero ―Smart card content security‖(http://home.dei.polimi.it/zanero/papers/scsecurity.pdf).
[11]. W.-S.Juang. Efficient multi-server password authenticated key agreement using smartcards. IEEE Transactions on Consumer
Electronics, 50:251–255, 2004.
[12]. Guillou L. C., et al. (1992), The smart Card: A Standardized Security Device Dedicated to Public cryptology, in G.J. Simmons
(Ed.), Contemporary Crypto- logy. The Science of Information Integrity, IEEE Press, pp. 561-613.

Mais conteúdo relacionado

Mais procurados

Smart card technology
Smart card technologySmart card technology
Smart card technologyDeepak Raj
 
Proven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data ProcessingProven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data Processingloginworks software
 
Smart Card Research Presentation
Smart Card Research PresentationSmart Card Research Presentation
Smart Card Research Presentationncapitoni
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionCSCJournals
 
Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferRutwikShitole1
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet BankingGoutama Bachtiar
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)SimiAttri
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities ProjectIndicThreads
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-reportdavid19860080
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
 

Mais procurados (20)

Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Proven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data ProcessingProven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data Processing
 
Smart Card Research Presentation
Smart Card Research PresentationSmart Card Research Presentation
Smart Card Research Presentation
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
 
Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identifer
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Computer's project
Computer's projectComputer's project
Computer's project
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 

Semelhante a Analysis on need of Smart Card

PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Smart Cards Market Insights: Industry Report 2023-2033
Smart Cards Market Insights: Industry Report 2023-2033Smart Cards Market Insights: Industry Report 2023-2033
Smart Cards Market Insights: Industry Report 2023-2033techtomorrow570
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
Smart card technologies dorababu
Smart card technologies dorababuSmart card technologies dorababu
Smart card technologies dorababuDorababu anjimeti
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto dasSubroto Das
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998Venkatesan 'Prasad' Sundararajan
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card TechnologyAmit Gaur
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 

Semelhante a Analysis on need of Smart Card (20)

PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Smart Cards Market Insights: Industry Report 2023-2033
Smart Cards Market Insights: Industry Report 2023-2033Smart Cards Market Insights: Industry Report 2023-2033
Smart Cards Market Insights: Industry Report 2023-2033
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Smart card technologies dorababu
Smart card technologies dorababuSmart card technologies dorababu
Smart card technologies dorababu
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto das
 
Smart card
Smart cardSmart card
Smart card
 
Doccccc
DocccccDoccccc
Doccccc
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Smart card
Smart card Smart card
Smart card
 
Smart card
Smart card Smart card
Smart card
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998
Smart Cards - Enablers of Electronic Commerce_DeloitteConsultingVS1998
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 

Mais de journal ijrtem

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...journal ijrtem
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...journal ijrtem
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...journal ijrtem
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0journal ijrtem
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERjournal ijrtem
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...journal ijrtem
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principlesjournal ijrtem
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management journal ijrtem
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...journal ijrtem
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessjournal ijrtem
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...journal ijrtem
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...journal ijrtem
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...journal ijrtem
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident journal ijrtem
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management journal ijrtem
 

Mais de journal ijrtem (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...
 
ORGANIC FOODS
ORGANIC FOODSORGANIC FOODS
ORGANIC FOODS
 
MOLECULAR COMPUTING
MOLECULAR COMPUTINGMOLECULAR COMPUTING
MOLECULAR COMPUTING
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principles
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management
 

Último

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Último (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Analysis on need of Smart Card

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 1 Issue 3 ǁ May. 2016 ǁ PP 24-25 | Volume 1| Issue 3 | www.ijrtem.com | May 2016| 24 Analysis on need of Smart Card Sujata Naik1 , Bhgyashree Muley2 , Sayali Pawar3 1,2,3 Department Of Electronics And Telecommunication Engineering D Y Patil College Of Engineering, Akurdi, Pune, India Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security 1. Introduction Smart card is one of the greatest achievements in the world of information technology. Similar in size to today's plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. As an access-control device, smart cards can be used to access server remotely over the Internet and they can make personal and business data available only to the appropriate users. Smart cards provide data portability, security, convenience and the like. smart cards can be categorized into the following: Memory and microprocessor- Memory cards simply store data and can be viewed as a small floppy disk with optional security. A microprocessor card, on the other hand, can add, delete and manipulate information in its memory on the card. Contact and contactless - Contact smart cards are inserted into a smart card reader, making physical contact with the reader. However, contactless smart cards have an antenna embedded inside the card that enables communication with the reader without physical contact. A combi card combines the two features with a very high level of security The scope of uses for a smart card has expanded each year. In recent years, the information age has introduced an array of security and privacy issues that have called for advanced smart card security applications. This paper describes about the necessities of smart card in current market where all technogy base is contactless communication. There are many sectors which are using smartcards for access of data over radio frequency. These paper also describes how educational, financial and medival sectors are moving fastly toward contactless access. 2. Need Of Contactless Smart Chip Technology In Contactless smart chip technology contains microcontroller or equivalent intelligence, internal memory, and a RF transreceiver embedded in a device that communicates with a reader through a contactless interface. contactless smart chip technology is being leveraged to improve speed, convenience and security. This technology is used in a wide range of applications from payment cards to protecting personal information in government and corporate identification cards, electronic passports and visas, Contactless smart chips can securely manage, store, and provide access to data on the device in which they are embedded Contactless smart chip technology is available in a variety of forms – plastic cards, watches, key fobs, documents, and other handheld devices, such as mobile phones. This technology is not related to ―non-smart‖ RF chip technologies, such as the RFID tags used for inventory management/product tracking applications, which require minimal functionality.The drawbacks of methods of payment – magnetic stripe cards and cash that we found that are The readers are not made available for the driving license (smart card) to traffic squads by traffic department in many cities,The collection of fine is not automated; instead manual memo book is used to collect fine,Proposed readers are contact readers which will be time consuming Just what are the advantages of contactless payments over other The answer is speed and security, as has been substantiated in the early implementations and in recent market research. Consumers no longer have to worry about having enough cash for a purchase—they can place their contactless payment device in close proximity to a reader and go. In most cases, they do not even have to sign a receipt or enter a personal identification number (PIN). As a result,an American Express study found contactless transactions to be 63% faster than cash and 53% faster than using a traditional credit card. Research also shows that consumers generally spend more per transaction when they don’t use cash. as a result of fewer requirements to handle cash, improved operational efficiencies, and reduced maintenance required by contactless readers.
  • 2. Analysis on need of Smart Card | Volume 1| Issue 3 | www.ijrtem.com | May 2016| 25 3. Conclusion Smart card inclined with advent of convenience and security issues. Utilizing smart card technology essentially improves protection. It secures private qualified data on the card with progressed cryptography and digital signatures to avoid illegal changes and to anticipate cloning of the card. This permits the single person to control access to their information and kills the requirement for mid database access throughout character verification. contactless smart cards with elevated conveyance velocities are currently ready that have enough memory to store an interesting unique mark template (fingerprint) or photographic representation. These methods are higher secure system can utilize contactless smart card technology to attain an extent of security, throughput and cost objectives. Smart card improves Efficiency Utilizing smart card technology for distinguishing proof and confirmation of people gives the most productive execution of a secure authentication system. It also Upgrades and offers Flexibility References [1]. István Zsolt BERTA – Zoltán ÁdámMANN,Smart Cards – Present and Future [2]. Internet Security and FinancialMathematics Application [3]. Research & Development Laboratory (E-BizLab) [4]. won Kim: ―Smart Cards: Status, Issues, and US Adoption‖, in Journal [5]. of Object Technology, vol. 3, no. 5, May-June 2004, pp. 25-30. [6]. Gammel, B.M and Ruping, J. ―Smart cards insides‖ IEEE Spectrum , conference publications, PP 69-74, 12-16 Sept. 2005. [7]. Chang, C.-C, Hwang, R.-J , Buehrer,D. ―Using smart cards to authenticate passwords‖IEEE Conference Publications, PP 154- 156, 13-15 Oct 19 [8]. SIMPSON, M.C.S. ―SMART POWER; A SMART CARD ELECTRICITY PAYMENT SYSTEM‖ IEEE,PP 3/1 - 3/4 , 23 JAN 1996 [9]. Selimis,G. Fournaris, A. Kostopoulos, G , Koufopavlou, O. ―Software and Hardware Issues in Smart Card Technology‖ IEEE, PP 143 – 152, 3rd Quarter 2009 . [10]. Stefano Zanero ―Smart card content security‖(http://home.dei.polimi.it/zanero/papers/scsecurity.pdf). [11]. W.-S.Juang. Efficient multi-server password authenticated key agreement using smartcards. IEEE Transactions on Consumer Electronics, 50:251–255, 2004. [12]. Guillou L. C., et al. (1992), The smart Card: A Standardized Security Device Dedicated to Public cryptology, in G.J. Simmons (Ed.), Contemporary Crypto- logy. The Science of Information Integrity, IEEE Press, pp. 561-613.