Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Magnetic-stripe cards, such as those issued by banks and credit card companies, lack the security of microchips but remain inexpensive due to their status as a singlepurpose card.
The card is made of plastic, generally PVC,
The technology behind smart cards has actually been around since the 1960s but the chips were much larger. In the 1980s, a German scientist created a card for using to pay for a call on a pay phone. The technology wasn t really used much until the 1990s when cell phones in Europe developed using the smart card technology with a card called a SIM card.
In 1968 German rocket scientist Helmut Grottrup and his colleague Jorgen Dethloff invented the automated chip card, receiving a patent only in 1982, while working for German company Giesecke and Devrient.
Smart cards have two different types of interfaces: contact and contactless. Contact smart cards are inserted into a smart card reader, making physical contact with the reader. Contactless smart cards have an antenna embedded inside the card that enables communication with the reader without physical contact
badges, citizen ID documents, electronic passports, driver s licenses, online authentication devices.
In the U.S., smart cards are utilized in GSM mobile
telephones, in DirecTV and EchoStar satellite receivers, and in the American Express Blue card. Software Industry .
physician ID cards, portable medical records cards. Payment applications - contact and contactless credit/debit cards, transit payment cards. Telecommunications applications - GSM Subscriber Identity Modules, pay telephone payment cards.
There are five general categories of smart cards: Contact smart cards Contactless smart cards dual-interface cards hybrid cards Integrated Circuit (IC) Microprocessor Cards
ASEDrivIIIe USB V2 Smart Card Reader BlackBerry Smart Card Reader-The BlackBerry
Smart Card Reader1 is a lightweight, wearable reader that enables controlled access to BlackBerry smartphones using Bluetooth technology and advanced AES-256 encryption.
includes following steps: User requirements: What does the user want to accomplish? Software requirements: Map user requirements to software requirements. Architectural design: Design the architecture of the solution. . Final testing and maintenance.
architecture. Emulation: Use emulators to test the code on virtual card. In-card Emulation: Run the code on actual card using card reader. Verification and Validation: It involves the testing. Final testing and maintenance.
accessed only through the chip operating system (COS), providing a high level of data security. This security takes the form of passwords allowing a user to access parts of the IC chip's memory or encryption/decryption measures which translate the bytes stored in memory into useful information.
applications may run proprietary operating systems. Smart cards designed with the capability to run multiple applications usually run MULTOS or Java Card .
Computer security Credit cards Health care (medical) Identification Security ] Differential power analysis Physical disassembly
The plastic card in which the chip is embedded is fairly flexible, and the larger the chip, the higher the probability that normal use could damage it. Cards are often carried in wallets or pockets a harsh environment for a chip.
Using a smart card for mass transit presents a privacy risk, because it allows the mass transit operator (and the government) to track an individual's movement. Another problem is the lack of standards for functionality and security
Improve the convenience and security of any transaction. Provide tamper-proof storage of user and account identity. Provide vital components of system security. Protect against a full range of security threats
RFU
RFU