SEMINAR Report On Smart Card
SEMINAR Report On Smart Card
P)
SEMINAR REPORT
ON SMART CARD
Submitted To:
Submitted By:
XYZ
ACKNOWLEDGEMENT
In many ways its more difficult to acknowledge ones dept ,but we can express my deep sense of gratitude to each and every one whose support and co-operation helped us to complete this project successfully , and without which to complete this project would never has been easier. I am very grateful to Mr. Pankaj Singh (HOD of Electronics dept.) and Mr. VINAYAK YADAV (Assistant Professor) for their valuable and peerless guidance and everlasting support. He gave us moral support and encouragement during this presentation without their commitment and encouragement and certainly without their technical guidance this project would never have been completed. I am also thankful to my friends who helped me during preparation of this seminar.I also like to thank God and my parents who have always been there support in bad times
CONTENTS
1. SMART CARD 2. WhATS iN A SMART CARD 3. USES AND TYPES 4. SMART CARD TYPES 5. BENEFITS 6. SMART CARD READERS 7. HISTORY OF SMART CARD 8. DATA STORAGE 9. CONFIGURATION 10. FURTHER PROGRESS 11. STATUS OF SMART CARD DEPLOYMENT 12. Terminal/PC Card Interaction 13. Communication mechanisms 14. Security Mechanisms 15. Password Verification 16. Cryptographic verification 17. Biometric techniques 18. REFERENCES
The card is made of plastic, generally PVC, but sometimes ABS. The card may embed a hologram to avoid counterfeiting. Using smartcards also is a form of strong security authentication for single sign-on within large compaA smart card, combining credit card and debit card properties. The 3 by 5 mm security chip embedded in the card is shown enlarged in the inset. The contact pads on the card enables electronic access to the chip. nies and organizations.
BENEFITS:Smart cards can be used for identification, authentication, and data storage.
Smart cards provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.
enterprise single sign-on to computers, laptops, data with encryption, enterprise resource planning platforms such as SAP, etc.
Dedicated terminals Usually with a small screen Keypad,printer often also have Biometric devices such aSThumb print scanner
Michel Ugon from Honeywell Bull invented the first microprocessor smart card. In 1978, Bull patented the SPOM (Self Programmable One-chip Microcomputer) that defines the necessary architecture to auto-program the chip.
DATA STORAGE Data is stored in smart cards in E2 PROM Cards OS provides a file structure mechanism
File types Binary file(unstructured) Fixed size record files Variable size record file
Typical Configurations 256 bytes to 4KB RAMa. 8KB to 32KB ROM 1KB to 32KB EEPROM.
Cryptocoprocessors(implementing 3DES, RSA etc. in hardware)are optional. 8 bit to 16 bit CPU. 8051based designs are common. The price of a mid- level chip when produced in bulk is less than US$1.
FURTHER PROGRESS
The major boom in smart card use came in the 1990s, with the introduction of the smart-card-based SIM used in GSM mobile
phone equipment in Europe. With the ubiquity of mobile phones in Europe, smart cards have become very common The international payment brands MasterCard, Visa, and Europay agreed in 1993 to work together to develop the specifications for the use of smart cards in payment cards used as either a debit or a credit card. The first version of the EMV system was released in 1994. In 1998 a stable release of the specifications was available
Status of smart cards deployments Famous Gujarat Dairy card Primarily an ID card
GSM cards (SIM cards for mobiles) Phone book etc. + authentication. cArdS for crediT cArd applications. By 2007 end all credit cards will be smart. EMV standard Card for e-purse applications Bank cards Card technology has advanced Contactless smart cards, 32-bit processors and bigger memories JAVA cards
Terminal/PC Card Interaction The terminal/PC sends commands to the card (through the serial line). The card executes the command and sends back the reply.
The terminal/PC cannot directly access memory of the card data in the card is protected from unauthorized access. This is what makes the card smart
Password Verification Terminal asks the user to provide a password. Password is sent to Card for verification.
Scheme can be used to permit user authentication. Not a person identification scheme