SlideShare uma empresa Scribd logo
1 de 23
Seminar
on
SMART CARD
(The Technology Of Secure Information Exchange)
PRESENTED
BY
Saumya Ranjan Behura
Adapted from : http://www.citi.umich.edu/projects/smartcard/smartcard_seminar/14.html
Talk Flow :
 What is smart card ?
 Construction of Smart card
 Typical smart card dimension
 Functional chip of smart card
 Basic components of smart card
 ISO Specifications
 How does a smart card works ?
 Smart card Technology
 Categories of Smart Card
 Advantages & Disadvantages
 Applications
 Conclusion
Introduction :
Smart cards were introduced in Europe in the beginning of
1990s,basically to reduce theft and fraud in payphones.
WHAT IS A SMART CARD ?
 It is like an “electronic wallet”.
 A standard credit card sized plastic intelligent token within
which Si microchip is embedded.
 It has a memory & an operating system.
 Operating system provides standard way of exchanging information.
 Memory provides the space for storage of data.
 The chip also contains advanced security features that protects card’s
data.
Construction of Smart card :
 The main storage area in the
card is normally EEPROM,
which can have its contents
updated, and retains current
contents when external power
is removed.
 The information or application
stored in the IC chip is
transferred through an
electronic module.
Adapted from : http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm
Smart Card Construction.
Typical smart card dimension:
Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
Functional chip of smart card :
Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
Basic components of smart card :
RFU
RFU
GND
CLK
I/O Vpp
VccRST
CPU
INTERNAL BUS
EEPROMRAM ROM
Co-processor
ISO Specifications :
 ISO has created standard #7816,that specifies the standards regarding
Smart Card chip organization.
 ISO specification for an 8-bit microprocessor card :
 Contact field #1 always supplies voltage to power the card.
 Contact field #2 resets the information on the card.
 Contact field #3 regulates the microprocessor speed by changing
clock frequency.
 Contact field #5 supplies the ground potential.
 Contact field #7 monitors all communications (serial input/output )
to and from the card.
 These 5 fields are fixed out of 8 & the rest 3 can be designed by the
manufacturers.
 Contact field #6 is given an external voltage for any programming
that needs to be done by the card.
 Contact field # 4 & Contact field #8 are reserved for future use.
How does a smart card works ?
CARD IS INSERTED IN
THE TERMINAL
CARD GETS POWER ,OS
BOOTS UP, SENDS ATR
(ANSWER TO RESET)
CARD RESPONDS WITH
AN ERROR (BECAUSE MF
SELECTION IS ONLY ON
PASSWORD PRESENTATION)
TERMINAL SENDS PASSWORD
FOR VERIFICATION
TERMINAL ASKS THE USER
FOR PASSWORD
TERMINAL SENDS FIRST
COMMAND TO SELECT MF
ATR NEGOTIATES TO SETUP
DATA TRANSFER SPEEDS,
CAPABILITY
TERMINAL SENDS COMMAND
TO SELECT MF AGAIN
TERMINAL SENDS PASSWORD FOR
VERIFICATION
CARD VERIFIES PW,STORES
A STATUS ‘PW VERIFIED’
RESPONDS’OK’
CARD RESPONDS ‘OK’
CARD SUPPLIES
PERSONAL DATA
AND RESPONDS ‘OK’
Smart card Technology :
 The information or application
stored in the IC chip is transferred
through an electronic module that
interconnects with a terminal or card
reader.
 Two general categories of smart
cards according to compactness of
card with card reader ;
 A. CONTACT SMART CARD
 It must be inserted into a
smart card reader with a
direct
connection to a conductive gold
plated electrical contacts
embedded inside it.
 E.g., GSM SIM CARD in
mobile phone.
Adapted from : http://www.smartcardalliance.org/pages/smart-cards-intro-primer
 B.CONTACTLESS
SMART CARD
 It requires only close
proximity
to a card reader
 Card must have a micro
strip antenna.
 Communicates using RF
technology.
 The card derive power for
the chip form
electromagnetic signal.
 E.g., Mass transit toll
collection
Adapted from : http://www.smartcardalliance.org/pages/smart-cards-intro-primer
Additional categories :
 A. Hybrid card
 Smart Card has 2 chips each with
its respective contact & contact
less interface.
 The two chips are not connected,
but for many application this hybrid
serves the needs of consumers
and card users.
 B. Dual Interface Card/ Kombi Card
 Card with both contact and contact
less interfaces.
 Security level is very high.
Adapted from : http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm
A
B
According to functionality of chip :
 A. IC Microprocessor Cards
 Both storage & data processing (addition, deletion
&manipulation) is possible.
 8-bit processor,32KB ROM,512Bytes of RAM is present.
 B. IC Memory Cards
 It is a memory chip with non programmable logic.
 Only storage of data is possible.
 1-4KB data can be stored.
 C. Optical Memory Cards
 It is a card with a piece of a CD glued on the top.
 Once written , data cannot be changed or removed.
 Data storage is up to 4MB.
Advantages :
 Proven to be more reliable than the magnetic stripe
card .
 Can store up to thousands of times of the information
than the magnetic stripe card.
 Reduces tampering through high security mechanism.
 Can be disposable or reusable.
 Performs multiple functions.
 Compatible with portable electronic devices (e.g.,
PCs, telephones)
Disadvantages :
 Smart card technologies will prove to be the killer
application for the networked economy.
 It may replace the magnetic stripe card technology
which is most popularly used now-a-days.
Adapted from : http://www.iec.org/online/tutorials/smartcard/topic02.html
Applications of Smart Card :
 Telephony
 Healthcare Services
 Registration Certificates
 Driving License
 Institute ID Card
 ATM
 Shopping
 Computer Networks
Contd…
Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
Contd…
Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
An Application showing Institute ID
card :
MF
DF1
(LIBRARY)
EF1(ISSUED RECORD )
Books
Book1
Book2
Book3
Date Of
issue
Date of
return
EF2(Inforation)
Max.Duration:
21 DAYS
Max.Books:4
EF3:Keys
K1: Issue Staff Key
K2:Admin Staff Key
Modifiable by issue
Staff Read :ALL
EF1(Personal Data)
EF1(Address)
EF1(Password)
EF1(Key)
Conclusion :
 The Biometrics (i.e., fingerprint, voice etc.) will help to
identify a person which may prove to be the boon for
security of information.
 Thus the “Smartness” of smart cards comes from the
integrated circuit embedded in the plastic card.
References :
[1] http://www.iec.org/online/tutorials/smartcard/topic02.html
[2] http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm
[3] http://www.smartcardalliance.org/pages/smart-cards-intro-primer
[4] http:://w:/www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
[5] http://home.dei.polimi.it/zanero/papers/security.pdf
[6] http://www.citi.umich.edu/projects/smartcard/smartcard_seminar/14.html
Smart Card Seminar: Secure Info Exchange

Mais conteúdo relacionado

Mais procurados (20)

Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart card
Smart cardSmart card
Smart card
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
College Student Smart Card
College Student Smart CardCollege Student Smart Card
College Student Smart Card
 

Semelhante a Smart Card Seminar: Secure Info Exchange

Semelhante a Smart Card Seminar: Secure Info Exchange (20)

Smart cards
Smart cardsSmart cards
Smart cards
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
Smart card technologies dorababu
Smart card technologies dorababuSmart card technologies dorababu
Smart card technologies dorababu
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Psa final
Psa finalPsa final
Psa final
 
Smart card Technology
Smart card TechnologySmart card Technology
Smart card Technology
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
Smart cards
Smart cards Smart cards
Smart cards
 
Interactive Multitask smartcard
Interactive Multitask smartcardInteractive Multitask smartcard
Interactive Multitask smartcard
 
Card reader
Card readerCard reader
Card reader
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
smart card
smart cardsmart card
smart card
 

Mais de Saumya Ranjan Behura (20)

Gsm
GsmGsm
Gsm
 
Quadcopters
QuadcoptersQuadcopters
Quadcopters
 
Nano technology
Nano technologyNano technology
Nano technology
 
Miling machine
Miling machineMiling machine
Miling machine
 
Manglev train
Manglev trainManglev train
Manglev train
 
E nose
E noseE nose
E nose
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
 
Night vision
Night visionNight vision
Night vision
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
 
Sensors
SensorsSensors
Sensors
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Smart Card Seminar: Secure Info Exchange

  • 1. Seminar on SMART CARD (The Technology Of Secure Information Exchange) PRESENTED BY Saumya Ranjan Behura Adapted from : http://www.citi.umich.edu/projects/smartcard/smartcard_seminar/14.html
  • 2. Talk Flow :  What is smart card ?  Construction of Smart card  Typical smart card dimension  Functional chip of smart card  Basic components of smart card  ISO Specifications  How does a smart card works ?  Smart card Technology  Categories of Smart Card  Advantages & Disadvantages  Applications  Conclusion
  • 3. Introduction : Smart cards were introduced in Europe in the beginning of 1990s,basically to reduce theft and fraud in payphones. WHAT IS A SMART CARD ?  It is like an “electronic wallet”.  A standard credit card sized plastic intelligent token within which Si microchip is embedded.  It has a memory & an operating system.  Operating system provides standard way of exchanging information.  Memory provides the space for storage of data.  The chip also contains advanced security features that protects card’s data.
  • 4. Construction of Smart card :  The main storage area in the card is normally EEPROM, which can have its contents updated, and retains current contents when external power is removed.  The information or application stored in the IC chip is transferred through an electronic module. Adapted from : http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm Smart Card Construction.
  • 5. Typical smart card dimension: Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
  • 6. Functional chip of smart card : Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
  • 7. Basic components of smart card : RFU RFU GND CLK I/O Vpp VccRST CPU INTERNAL BUS EEPROMRAM ROM Co-processor
  • 8. ISO Specifications :  ISO has created standard #7816,that specifies the standards regarding Smart Card chip organization.  ISO specification for an 8-bit microprocessor card :  Contact field #1 always supplies voltage to power the card.  Contact field #2 resets the information on the card.  Contact field #3 regulates the microprocessor speed by changing clock frequency.  Contact field #5 supplies the ground potential.  Contact field #7 monitors all communications (serial input/output ) to and from the card.  These 5 fields are fixed out of 8 & the rest 3 can be designed by the manufacturers.  Contact field #6 is given an external voltage for any programming that needs to be done by the card.  Contact field # 4 & Contact field #8 are reserved for future use.
  • 9. How does a smart card works ? CARD IS INSERTED IN THE TERMINAL CARD GETS POWER ,OS BOOTS UP, SENDS ATR (ANSWER TO RESET) CARD RESPONDS WITH AN ERROR (BECAUSE MF SELECTION IS ONLY ON PASSWORD PRESENTATION) TERMINAL SENDS PASSWORD FOR VERIFICATION TERMINAL ASKS THE USER FOR PASSWORD TERMINAL SENDS FIRST COMMAND TO SELECT MF ATR NEGOTIATES TO SETUP DATA TRANSFER SPEEDS, CAPABILITY TERMINAL SENDS COMMAND TO SELECT MF AGAIN TERMINAL SENDS PASSWORD FOR VERIFICATION CARD VERIFIES PW,STORES A STATUS ‘PW VERIFIED’ RESPONDS’OK’ CARD RESPONDS ‘OK’ CARD SUPPLIES PERSONAL DATA AND RESPONDS ‘OK’
  • 10. Smart card Technology :  The information or application stored in the IC chip is transferred through an electronic module that interconnects with a terminal or card reader.  Two general categories of smart cards according to compactness of card with card reader ;  A. CONTACT SMART CARD  It must be inserted into a smart card reader with a direct connection to a conductive gold plated electrical contacts embedded inside it.  E.g., GSM SIM CARD in mobile phone. Adapted from : http://www.smartcardalliance.org/pages/smart-cards-intro-primer
  • 11.  B.CONTACTLESS SMART CARD  It requires only close proximity to a card reader  Card must have a micro strip antenna.  Communicates using RF technology.  The card derive power for the chip form electromagnetic signal.  E.g., Mass transit toll collection Adapted from : http://www.smartcardalliance.org/pages/smart-cards-intro-primer
  • 12. Additional categories :  A. Hybrid card  Smart Card has 2 chips each with its respective contact & contact less interface.  The two chips are not connected, but for many application this hybrid serves the needs of consumers and card users.  B. Dual Interface Card/ Kombi Card  Card with both contact and contact less interfaces.  Security level is very high. Adapted from : http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm A B
  • 13. According to functionality of chip :  A. IC Microprocessor Cards  Both storage & data processing (addition, deletion &manipulation) is possible.  8-bit processor,32KB ROM,512Bytes of RAM is present.  B. IC Memory Cards  It is a memory chip with non programmable logic.  Only storage of data is possible.  1-4KB data can be stored.  C. Optical Memory Cards  It is a card with a piece of a CD glued on the top.  Once written , data cannot be changed or removed.  Data storage is up to 4MB.
  • 14. Advantages :  Proven to be more reliable than the magnetic stripe card .  Can store up to thousands of times of the information than the magnetic stripe card.  Reduces tampering through high security mechanism.  Can be disposable or reusable.  Performs multiple functions.  Compatible with portable electronic devices (e.g., PCs, telephones)
  • 15. Disadvantages :  Smart card technologies will prove to be the killer application for the networked economy.  It may replace the magnetic stripe card technology which is most popularly used now-a-days.
  • 16. Adapted from : http://www.iec.org/online/tutorials/smartcard/topic02.html
  • 17. Applications of Smart Card :  Telephony  Healthcare Services  Registration Certificates  Driving License  Institute ID Card  ATM  Shopping  Computer Networks
  • 18. Contd… Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
  • 19. Contd… Adapted from : http://www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid=
  • 20. An Application showing Institute ID card : MF DF1 (LIBRARY) EF1(ISSUED RECORD ) Books Book1 Book2 Book3 Date Of issue Date of return EF2(Inforation) Max.Duration: 21 DAYS Max.Books:4 EF3:Keys K1: Issue Staff Key K2:Admin Staff Key Modifiable by issue Staff Read :ALL EF1(Personal Data) EF1(Address) EF1(Password) EF1(Key)
  • 21. Conclusion :  The Biometrics (i.e., fingerprint, voice etc.) will help to identify a person which may prove to be the boon for security of information.  Thus the “Smartness” of smart cards comes from the integrated circuit embedded in the plastic card.
  • 22. References : [1] http://www.iec.org/online/tutorials/smartcard/topic02.html [2] http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm [3] http://www.smartcardalliance.org/pages/smart-cards-intro-primer [4] http:://w:/www.smartcomputing.com/articles/archive/r0403/35r03/35r03.pdfguid= [5] http://home.dei.polimi.it/zanero/papers/security.pdf [6] http://www.citi.umich.edu/projects/smartcard/smartcard_seminar/14.html