smart card system ppt
DESCRIPTION
smart card by wonderful animation email me views at [email protected]TRANSCRIPT
What is a Smart Card?•Can hold up to 32,000 bytes•Newer smart cards have math co-processors•Perform complex encryption routines quickly
04/08/2023 [email protected] 3
Plastic cards•Magnetic strip.•No security of data•Eg.credit cards
• Electronic memory cards.•Vendor specific
Construction of Smart Cards
Construction of Smart CardsI/ORST
RFU RFU
GND
Vpp
Vcc
CLK
Examples of Smart Cards
Current Applications• Payphones• Mobile Communications • Banking & Retail• Electronic Purse• Health Care • ID Verification and Access Control
Antenna
Interfaces of Smart Cards
Different
Smart Card
Readers
Start
Welcome note on lcd
Start
Signals cut by opto coupler
Welcome note on lcd
Start
Signals cut by opto coupler
Welcome note on lcd
Display the user name
Start
Signals cut by opto coupler
Welcome note on lcd
Display the user name
Request for password
Start
Signals cut by opto coupler
Welcome note on lcd
Display the user name
Request for password
Thank You
If OK
Start
Signals cut by opto coupler
Welcome note on lcd
Display the user name
Request for password
Wrong password
Re enter password
Thank You
If OK
Advantages
• Flexibility• Security• Portability • Increasing data storage capacity • Reliability.
Why Smart Cards
• Improve the convenience and security of any transaction.
• Provide tamper-proof storage of user and account identity.
• Provide vital components of system security.• Protect against a full range of security threats
04/08/2023 [email protected] 18
04/08/2023 [email protected] 19
Security mechanism• Password
• Card holder’s protection• Cryptographic challenge Response
• Entity authentication• Biometric information
• Person’s identification
RF SMART CARD SYSTEM
RETINA SENSING SYSTEM
CARD AND FINGER SYSTEM
FINGER IDENTIFICATION SYSTEM
CARD ATTENDANCE SYSTEM
04/08/2023 [email protected] 21
Operations performedCard is inserted in the terminal Card gets power. OS boots
up. Sends ATR (Answer to reset)
ATR negotiations take place to set up data transfer speeds, capability negotiations etc.
Terminal sends first command to select MF
Card responds with an error (because MF selection is only on password presentation)
Terminal prompts the user to provide password and verifies the pwd.
Card verifies Pwd. Stores a status “Pwd Verified”. Responds “OK”
Terminal sends command to select MF againTerminal sends command to read EF1
Card supplies personal data and responds “OK”
Card responds “OK”
THANK YOU
HAVE A NICE DAY