Sei sulla pagina 1di 11

L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B.

Daud

Smart Card Technology: Past, Present, and Future

L. A Mohammed, Abdul Rahman Ramli, V. Prakash,


and Mohamed B. Daud*
Department of Computer and Communication Systems Engineering
*Department of Biology and Agricultural Engineering
43400, UPM Serdang Selangor, Malaysia
e-mail: auwala@hotmail.com

Abstract payment card, the smart card has a


microprocessor or memory chip embedded in
Smart Cards are secure portable it that, when coupled with a reader, has the
storage devices used for several applications processing power to serve many different
especially security related ones involving applications. As an access-control device,
access to system’s database either online or smart cards can be used to access server
offline. For the future of smart card to be remotely over the Internet and they can make
bright, it is important to look into several personal and business data available only to
aspects and factors especially those resulted the appropriate users. Smart cards provide
due to the rapid advancement in information data portability, security, convenience and
and communication technology. This paper the like. According to Gemplus (ref. [19]),
looks into current trends in smart card smart cards can be categorized into the
technology and highlights what is likely to following:
happen in the future. Moreover, the paper
addresses other aspects in order to identify Memory and microprocessor- Memory
the core concepts that are of interest to cards simply store data and can be viewed as
smart card developers and researchers. a small floppy disk with optional security. A
More emphasis is given to four key microprocessor card, on the other hand, can
characteristics of smart cards: portability, add, delete and manipulate information in its
security, open platform, and memory memory on the card.
management, as they are believed to be at
the heart of many smart card applications. Contact and contactless - Contact smart
cards are inserted into a smart card reader,
making physical contact with the reader.
However, contactless smart cards have an
1. Introduction antenna embedded inside the card that
enables communication with the reader
Smart card is one of the greatest without physical contact. A combi card
achievements in the world of information combines the two features with a very high
technology. Similar in size to today's plastic level of security.

12
Smart Card Technology: Past, Present, and Future

Smart cards help businesses evolve and characteristics the first draft proposal was
expand their products and services in a registered in 1983. A long discussion
changing global marketplace. The scope of resulted in the standardization of the contact
uses for a smart card has expanded each year location. Next was the standardization of
to include applications in a variety of signals and protocols which resulted in
markets and disciplines. In recent years, the standards ISO/IEC 7816/1-4. Logical
information age has introduced an array of security came next, as it was clear from the
security and privacy issues that have called beginning that there was a need for
for advanced smart card security cryptographic capabilities, though this was a
applications. bit difficult due to the limited computing
power and the few bytes of RAM available
The rest of the paper is organized as at that time (Quisquater, 1997). Nowadays,
follows; the next section briefly discusses the smart cards are used in several applications.
history of smart card development and the
current and future market analysis. Section A survey completed by Card
three looks into some application areas, their Technology Magazine (http://www.
limitations and strengths. This section cardtechnology.com) indicated that the
addresses the future directions of smart card industry had shipped more than 1.5 billion
technology giving more emphasis to security smart cards worldwide in 1999. Over the
consideration and memory management next five years, the industry will experience
among others. The section also discusses steady growth, particularly in cards and
some areas that need further studies in order devices to conduct electronic commerce and
to improve the current state of smart cards so to enable secure access to computer
that they can fit into the future needs. Like networks. A study by Dataquest in March,
smart cards, biometric is also an approach 2000, predicts almost 28 million smart card
used in identification protocol. Section four shipments (microprocessor and memory) in
deals with comparison between the two the U.S. According to this study, an annual
schemes. Finally, the paper concludes in growth rate of 60% is expected for U.S.
section five. smart card shipments between 1998 and
2003. Smart Card Forum Consumer
Research, published in early 1999, provides
additional insights into consumer attitudes
2. Historical Perspective towards application and use of smart cards.
The market of smart card is growing rapidly
Smart card was invented at the end of due to its wide range of applications. The
the seventies by Michel Ugon (Guillou, worldwide smart cards market forecast in
1992). The French group of bankcards CB millions of dollars and millions of units as
(Carte Bancaire) was created in 1985 and has shown in figure 1:
allowed the diffusion of 24 million devices
(Fancher, 1997). For the physical

International Journal of The Computer, the Internet and Management Vol. 12#1 (January – April, 2004) pp 12 - 22

13
L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B. Daud

Figure 1. Smart card Market (Source: www.smartcardcentral.com)

3.1 Memory Management the standard memory of 32 or 64 KBytes can


prove a serious limitation. A solution to this
Smart card is a device with major is to look at some of the design issues and
hardware constraints: low-power CPU, low techniques to incorporate multiple memory
data rate serial I/O, little memory etc. chips in a single smart card. Gemplus had
Today, card technology utilizes 8 bit already produced a twin card, incorporating
processors (mainly of the 6805 or 8051 two unconnected chips in a single card.
family) whose memory sizes are about a few Other approaches include the use of PC in
tens of kilobytes (Urien, 2000), typically 1-4 conjunction with smartcard. For instance,
kb RAM (Random Access Memory), 32-128 Blaze (1996) proposes the use of a powerful
kb ROM (Read Only memory) and 32-64 kb PC with a smart card for symmetric key
EEPROM (Electrically Erasable encryption because the PC provides higher
Programmable Read Only Memory) at least, encryption bandwidth. Table 1 below shows
with options on FLASH and FRAM storage capacity needed for various
(Ferroelectric Random Access Memory) as communication rates.
well. As the demand for smart cards matures,

Table 1: Communication rate and storage capacity

Communication rate Storage capacity

P C (Pentium IV) 120 Mbps 10 GBytes

Standard smart card 9600 bps 64 Kbytes


Multiple chip card 20 Mbps 224 Mbytes

According to Junko (2002), the smart card devices built in 0.13-micron


EEPROM used in current smart cards is technology and beyond. For this reason,
reaching its scalability limits, particularly for companies like Philips agree on the need for

14
Smart Card Technology: Past, Present, and Future

alternative non-volatile memory for future many applications. Malaysia’s national ID,
smart cards. Currently Philips is leaning for instance, is a multipurpose smart card
toward magnetic RAM as an alternative to with a fingerprint biometric. The card is first
EEPROM. of its kind in the world as it combines many
applications such as driving licence,
Another important application that passport, healthcare, and non-government
requires memory management is the applications such as an e-purse. (See
application of biometrics. The use of http://www.jpn.gov.my/ or www.iris.com.my
biometrics within the card itself will mean for details). Table 2 below gives the required
that biometric features (fingerprint, retina, bytes for various biometrics. Additional
voice etc) can reliably identify a person. information about biometric technology and
With enhancement in memory system, it will standards can be found from the following
soon be possible to authorize the use of organisations: The Biometric Consortium
electronic information in smart card using a (www.biometrics.org), International
spoken word. The use of some of these Biometric Industry Association (www.ibia.
features has already been implemented in rg), or BioAPI Consortium (www.iapi com).

Table 2. Required Bytes for Biometrics

Biometric Bytes Required


Finger scan 300-1200
Finger geometry 14
Hand geometry 9
Iris recognition 512
Voice verification 1500
Face recognition 500-1000
Signature verification 500-1000
Retina recognition 96

Source: Smart Card Alliance

3.2 Security Issues


As smart card is handicapped or highly
Security is always a big concern for restricted in their input/output (unable to
smart cards applications. This naturally gives interact with the world without outside
rise to the need for reliable, efficient peripherals), this leads to the involvement of
cryptographic algorithms. We need to be many parties in its applications. Some of the
able to provide authentication and parties involve: Cardholder, Data Owner,
identification in online-systems such as bank Card Issuer, Card Manufacturer, Software
machine and computer networks, access Manufacturer, and Terminal Owner as
control, and the like. Currently, such mentioned in (Schneier, 1999). It is therefore
facilities allow access using a token; essential to ensure that none of the above
however, it is vital that the holder of the mentioned parties is threat to one another. To
token be the legitimate owner or user of the achieve this, there is need for further
token. investigation in the design and analysis of

International Journal of The Computer, the Internet and Management Vol. 12#1 (January – April, 2004) pp 12 - 22

15
L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B. Daud

smart card authentication and identification • No single vendor will specify the
protocols. For this reason, Gobioff (1996) standards for the operating system
proposes that smart cards be equipped with and the card’s use.
“additional I/O channels” such as buttons
to alleviate these shortcomings. Further, • The cards will support a high-level
there are numerous intrusion techniques application programming language
able to tamper with smart cards and (e.g., Java, C++) so issuers can
other similar temper-resistant devices as supply and support their own
presented in (Anderson, 1997). This also applications as well as applications
indicates the need for effective intrusion from many other vendors.
detection/prevention techniques.
• Applications can be written and will
operate on different vendor’s multi-
3.3 Open Architecture application smart cards with the same
API (Application Programming
Existing smart card standards leave Interface).
vendors too much room for interpretation. To
achieve wider implementation, there is need To overcome the problem of lack of
for an open standard that provides for inter- standardization, U.S. organizations have
operable smart cards solutions across many developed an add-on piece of smart card
hardware and software platforms. Open software meant to overcome communication
Platform, as defined by GlobalPlatform problems between chip cards and readers
(www.GlobalPlatform.org) is a compre- from different vendors. They would like to
hensive system architecture that enables the see this technology, which they call a "card
fast and easy development of globally capabilities container," used worldwide,
interoperable smart card systems. It making it an industry standard that would
comprises three elements; card, terminal and allow U.S. agencies to buy cards and readers
systems, each of which may include from many vendors, sure that they would
specifications, software and/or chip card work together (Cathy, 2002). Another move
technology. Together these components is the development of a new organization
define a secure, flexible, easy to use smart called Smart Card Alliance, formed by Smart
card environment. Development environ- Card Industry Association (SCIA) and Smart
ment in use today include; Java, Visual C, Card Forum (SCF) to act as a single voice
Visual Basic, C++, and the like. for the US smart card industries.

The development of standards like Even in biometrics, each vendor has its
GSM, EMV, CEPS, PC/SC, OCF, ITSO and own methods for enrolling individuals and
IATA 791 represents an opportunity for later checking someone’s identity against the
manufacturers to produce products on an stored image. However, there are efforts
economic scale and give stability to systems underway to create biometric standards,
designers. According to a report by largely driven by the U.S. government. In a
DatacardGroup (White paper version 1.0), major step, the American National Standards
True ‘open’ smart cards will have the Institute approved BioAPI as a standard way
following characteristics: for biometric devices to exchange data with
• They will run a non-proprietary ID applications. ANSI now is preparing to
operating system widely propose BioAPI to ISO for adoption as an
implemented and supported. international standard (Donald, 2002).

16
Smart Card Technology: Past, Present, and Future

consumption per switching event. Recently,


3.3.1 Operating Systems IBM have built a working transistor at 6
nanometres in length which is per
Today’s smart card operating systems beyond the projection of The Consortium of
and application frameworks are intrinsically International Semiconductor Companies that
local and monoapplication. Moreover, smart transistors have to be smaller than 9
card communicates with the outside world nanometres by 2016 in order to continue the
through a serial link. As the chip has a single performance trend.
bi-directional I/O pin, this link can only
support half-duplex protocol. The majority The ability to build working transistors
of chips work at the speed of 9600 baud, at these dimensions could allow developers
although the ISO standard 7816 has defined to put 100 times more transistors into a
a maximum data rate of 230400 baud. A new computer chip than is currently possible. The
type of SPOM (Self-Programmable One- IBM results will lead to further research into
Chip Microcomputer), named ISO/USB has small, high-density silicon devices and allow
been introduced in 1999; it provides a direct scientists to introduce new structures and
connection between a SPOM and the new materials. Details are available from
terminal via an USB port (Urien, 2000). IBM Research News 9th December 2002,
According to USB specifications, a data available online: http://www.research.ibm.
throughput from 1.2 to 12 Mbit/s may be com/.
obtained between the chip and the terminal.

The vision of smart card as an 3.5 Reader Requirements


application platform rather than a simple
security token is a paradigm shift for smart As the needs and uses of smart card
card operating systems. According to increases, the need for a Smart Card reader
Jurgensen (2002), the current operating that is not portable, small or light, but also
system model cannot completely support the easy to connect and access has arrived.
needs or the vision of Universal Integrated However, some developers like “Browns”
Circuit Card (UICC). The move is now (http://www.brownsbox.com/) believe that
towards the development of Next Generation the need for a reader is a problem, meaning
Smart Card Operating Systems (COSng), extra expenditure, and, when working with a
which will be able to handle multi- laptop, is a waste of a port. In view of this,
applications and support future requirements. an approach toward a device that can be
attached to a PC (internally or externally) has
arrived. To solve this problem, Browns
3.4 Performance developed a method that turns a floppy disk
drive into a smart card reader. Another
Performance and speed are very popular approach in Europe is the smarty
important factors that need to be considered smart card reader/writer the size of a 3.5-
in most smart card application. To achieve inch diskette by SmartDisk Corp. The
this, transistor scaling or the reduction of the device does not require a serial, parallel, or
gate length (the size of the switch that turns USB port, instead it works directly from
transistors on and off), must be taken into a diskette drive. Smarty supports all
consideration. This idea not only improves smart card protocols, including ISO 7816,
the performances of chips but also lowers and it works under different operating
their manufacturing cost and power systems. Details are available from:

International Journal of The Computer, the Internet and Management Vol. 12#1 (January – April, 2004) pp 12 - 22

17
L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B. Daud

http://www.smartcomputing.com/. This idea and card reader by “Cherry”


of smart diskette was initially proposed by (http://www.accesskeyboards.co.uk/cherry.ht
Paul (1989) as shown in figure 3. A similar m).
approach involves the development of
keyboard with integrated card reader, and/or
keyboard with integrated fingerprint sensor

Magnetic Interface
Interface
Driver

Power Generator
Stator
Processor
Rotor

Battery Memory

Power Regulator

Figure 3. Architecture of Smart Diskette

3.6 Portability 3.7 Mobile Services

As mentioned earlier, portability or Over the years, continued developments


convenience of handling is one of the most in GSM SIM smart card standards have
important characteristics of smart cards. produced innovations such as SIM Toolkit,
Since the smartness of smart card relies on which defines how to deliver value-added
the integrated circuit embedded in the plastic services to the handset menu system. The
card, it is possible that the future smart cards latest Javacard SIM Toolkit cards allow the
might look like other everyday objects such operator to offer handset services including
as rings, watches, badges, glasses or earring customized stock, weather and traffic
because that same electronic function could information, banking, email, and airline
be performed by embedding it in these reservations. In Malaysia, companies like
objects. What remains is for developers and Celcom (www.celcom.com.my) are making
researchers to look into the best way of move towards these services. A new
implementing it if the need arises. generation of GSM phones are enabled for

18
Smart Card Technology: Past, Present, and Future

two card slots and Wireless Access Protocol The primary advantage of biometric
(WAP) connection to the Internet. The SIM authentication methods over other methods
smart card handles identification and handset of user authentication is that they use real
features, while a second slot can support a human physiological or behavioural
multi-application smart card that delivers characteristics to authenticate users. These
payment and loyalty application functions. biometric characteristics are (more or less)
permanent and not changeable. It is also not
Going beyond current GSM mobile- easy (although in some cases not principally
phone and banking markets, the smart-card impossible) to change one’s fingerprint, iris
industry is now casting an eye on the home or other biometric characteristics. Further,
entertainment market: “digital rights most biometric techniques are based on
management, home entertainment, something that cannot be lost or forgotten.
multimedia applications, 3G mobile This is an advantage for users as well as for
messaging, Wi-Fi with smart card security, system administrators because the problems
electronic legal signature and digital and costs associated with lost, reissued or
authentication" as logical places to extend temporarily issued tokens/cards/passwords
the reach of smart cards. can be avoided, thus saving some costs of the
system management.

4. Smart card Vs Biometric However, as reported in (Luca 2002),


the major risk posed by the use of biometric
One of the primary reasons that smart systems in an authentication process is that a
cards exist is for security. The card itself malicious subject may interfere with the
provides a computing platform on which communication and intercept the biometric
information can be stored securely and template and use it later to obtain access.
computations can be performed securely. Likewise, an attack may be committed by
Consequently, the smart card is ideally suited generating a template from a fingerprint
to function as a token through which the obtained from some surface. Further,
security of other systems can be enhanced. performance of biometric systems is not
Most of today’s systems need proper user ideal. Biometric systems still need to be
authentication/identification as it is a crucial improved in terms of accuracy and speed.
part of the access control that makes the Biometric systems with the false rejection
major building block of any system’s rate under 1% (together with a reasonably
security. Three methods are currently in use: low false acceptance rate) are still rare today.
what the user has (e.g. smart card), what the Although few biometric systems are fast and
user knows (e.g. password), and what the accurate (in terms of low false acceptance
user is (biometrics). Each of these methods rate) enough to allow identification
has it’s own merits and demerits especially (automatically recognizing the user identity),
when used alone. When a single method is most of current systems are suitable for the
used, we believe smartcard is the best choice. verification only, as the false acceptance rate
Passwords can easily be forgotten, attacked, is too high.
and guessed. Similarly, biometric schemes
alone are not good enough to ensure user Moreover, not all users can use any
authentication, as they are also vulnerable to given biometric system. People without
attacks. First, we look into some of the hands cannot use fingerprint or hand-based
benefits in using biometric schemes and then systems. Visually impaired people have
analyze some of their limitations. difficulties using iris or retina based

International Journal of The Computer, the Internet and Management Vol. 12#1 (January – April, 2004) pp 12 - 22

19
L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B. Daud

techniques. Some biometric sensors methods are based on something the user
(particularly those having contact with users) knows or has, biometric systems can
also have a limited lifetime. While a sometimes link all user actions to a single
magnetic card reader may be used for years identity.
(or even decades), the optical fingerprint
reader (if heavily used) must be regularly Furthermore, biometric systems can
cleaned and even then the lifetime need not potentially be quite troublesome for some
exceed one year. users. These users find some biometric
systems intrusive or personally invasive. In
Biometric data are not considered to be some countries people do not like to touch
secret and security of a biometric system something that has already been touched
cannot be based on the secrecy of user’s many times (e.g., biometric sensor), while in
biometric characteristics. The server cannot some countries people do not like to be
authenticate the user just after receiving photographed or their faces are completely
his/her correct biometric characteristics. The covered. Lack of standards may also poses a
user authentication can be successful only serious problem. Two similar biometric
when user’s characteristics are fresh and systems from two different vendors are not
have been collected from the user being likely to interoperate at present.
authenticated. This implies that the biometric
input device must be trusted. Its authenticity Although good for user authentication,
should be verified (unless the device and the biometrics cannot be used to authenticate
link are physically secure) and user’s computers or messages. Biometric
likeness would be checked. The input device characteristics are not secret and therefore
also should be under human supervision or they cannot be used to sign messages or
tamper-resistant. The fact that biometric encrypt documents and the like. On the other
characteristics are not secret brings some hand, smart cards provide tamper-resistant
issues that traditional authentication systems storage for protecting private keys, account
need not deal with. Many of the current numbers, passwords, and other forms of
biometric systems are not aware of this fact personal information. Smart cards can also
and therefore the security level they offer is serve to isolate security-critical computations
limited. involving authentication, digital signatures,
and key exchange from other parts of the
User’s privacy may be violated by system that do not have a "need to know." In
biometric schemes. Biometric characteristics addition, smart cards provide a level of
are sensitive data that may contain a lot of portability for securely moving private
personal information. The DNA (being the information between systems at work, home,
typical example) contains (among others) the or on the road.
user’s preposition to diseases. This may be a
very interesting piece of information for an A better approach for the usage of
insurance company. The body odour can biometrics is to combine biometrics with
provide information about user’s recent smartcards. The advantages of this may
activities. It is also mentioned in (Jain, 1999) include: all attributes of the smartcards will
that people with asymmetric fingerprints are be maintained, counterfeiting attempts are
more likely to be homosexually oriented, etc. reduced due to enrolment process that
Use of biometric systems may also imply verifies identity and captures biometrics. It
loss of anonymity. While one can have will be extremely secure and provide
multiple identities when authentication excellent user-to-card authentication.

20
Smart Card Technology: Past, Present, and Future

Conclusion due to the significant amount of processing


and memory capacity required by this
Most of the smart card systems in use approach, implementing it in smart card
today serve one purpose and are related to remains difficult. Hence, this area needs to
just one process or is hardwired to only one be further evaluated to make it suitable for
application. A smart card cannot justify its built-in smart card applications. Other
existence in this respect. The approach of important security issues involve further
future smart card is therefore towards investigation of elliptic curve and quantum
designing multi-application card with own cryptography on smart cards.
operating system based on open standard that
can perform a variety of functions. It must be In the future, smart cards could handle
configurable and programmable and it must multiple tasks for their owners, from
be able to adapt to new situations and new providing access to company networks,
requirements especially in areas such as enabling electronic commerce, storing health
security, memory management, and care information, providing ticketless airline
operating system. Most of smart card travel and car rentals, and offering electronic
application methods today rely on the fact identification for accessing government
that the code of functions to be performed services such as benefit payments and
should be imported by card operating system drivers licenses etc. Smart cards of the future
from an outside server. This approach is may even stop resembling "cards" as smart
quite weak with regards to security. It is, card technology is embedded into rings,
therefore, important to find ways of relaxing watches, badges, and other forms and factors
this requirement so that the card on its own that will make them remarkably convenient
can support all functions and operations. to use. In the near future, we believe all PC’s
Further, we notice that one of the drawbacks and Network Computers will be integrated
of smart card has been the small amount of with smart card readers. These can be
non-volatile memory. Since this memory implemented either as part of the keyboard
will be used to store keys, cryptographic or occupying one of drives or perhaps as an
certificates etc, only applications that require external units. It is hoped that the smart card
a minimal amount of memory have been of the future will be a PC in pocket size with
implemented. Hence, there is need to do a sensors for biometric features and a human
more thorough investigation of suitable interface.
means (such as data compression) of
managing the available memory.

Security is very crucial issue in smart Reference


card especially due to the various
independent parties involve throughout the 1. Anderson R., and M. Kuhn, (1997) Low
card’s life cycle leading to what is now Cost Attacks on Tamper Resistant
called “splits” in trust. There is need to Devices, Security Protocol.
develop a method in which even without
trust none of the parties can cheat one 2. Blaze M. (1996), High-bandwidth
another. Further, to overcome the lack of encryption with low-bandwidth smart
security provided by passwords or PINs for cards. In Proceedings of the Fast
authentication and access control, some Software Encryption Workshop, volume
researchers believe that biometric is the best 1039 of Lecture Notes in Computer
genuine means of authentication. However, Science, pp. 33 – 40. Springer Verlag .

International Journal of The Computer, the Internet and Management Vol. 12#1 (January – April, 2004) pp 12 - 22

21
L. A Mohammed, Abdul Rahman Ramli, V. Prakash, Mohamed B. Daud

3. “Breaking the byte barrier”, 12. Junko Yoshida (2002), Smart-card


www.gemplus.com/smart/enews/st3/su chips advance as market stalls, EE
mo.html Oct-15-2002 14:19, [6/12/02] Times, 11 Nov., available online at
www.eetimes.com
4. Cathy Bowen (2002), Government Smart
Card IDs: Lessons Learned, Card 13. Luca B., et al, (2002), Biometrics
Technology Magazine, November. authentication with smartcard, IIT
TR-08/2002, Online [15/12/02]
5. DatacardGroup, The Transition to Multi- http://www.iat.cnr.it/attivita/progetti/pa
application Smart Cards with Post rametri biomedici.html
Issuance Personalization Capabilities,
Datacard White Paper Version 1.0, 14. Paul B., and Raymund E. (1989), The
May 2001, available online: Smart Diskette – A universal token and
(www.datacard.com). personal crypto-engine, Advances in
Cryptology-CRYPTO’89, Lecture Note
6. Donald Davis (2002), Early Steps in Comp. Sc. pp. 74-79, G.Goos and J.
Toward Biometric Standards, Card Hartmanis (Eds).
Technology Magazine, November.
15. Quisquater J-J. (1997), The
7. Fancher C. H. (1997), In your Pocket: adolescence of smart card, Future
Smartcards, IEEE Spectrum (February), Generation Computer Systems, pp.13 -
pp. 47-53. 37.

8. Gobioff et al. (1996), Smart cards in 16. Schneier B., and A. Shostack (1999),
hostile environments. In Proceedings of Breaking Up Is Hard to Do: Modeling
The Second USENIX Workshop on Security Threats for Smart Cards,
Electronic Commerce, Oakland, CA. USENIX Workshop on Smart Card
Technology, USENIX Press, pp. 175-
9. Guillou L. C., et al. (1992), The smart 185.
Card: A Standardized Security Device
Dedicated to Public cryptology, in G.J. 17. Secure Personal Identification System:
Simmons (Ed.), Contemporary Crypto- Policy, Process and Technology
logy. The Science of Information Choices for a privacy – Sensitive
Integrity, IEEE Press, pp. 561-613. Solution, available online
www.smartcardalliance.org [8/9/02]
10. Jain A, Bolle R. and Pankanti S.
BIOMETRICS: Personal Identification in 18. Urien P.(2000), Internet Card, a Smart
Networked Society. Kluwer Academic card as a true Internet node, Computer
Publishers, 1999. Communication, 23, pp. 1655-1666.

11. Jurgensen T., and Scott Guthery, Smart 19. What’s so smart about smart cards?
Cards: The developer’s toolkit, Prentice Available at www.gemplus.com
Hall PTR Upper Saddle River, NJ. 2002. [2/12/02]

22

Potrebbero piacerti anche