SlideShare une entreprise Scribd logo
1  sur  29
Presented By: Aaina Katyal
Jaswinder Kaur
Ravisha Sethi









Smart Cards
Benefits of Smart Cards
What’s in a Smart Card?
History of Smart Cards
Types of Smart Cards
Applications of Smart Cards
Uses of Smart Cards
Advantages and Disadvantages
of Smart Cards


A small electronic device about size of a credit card that
contains electronic memory and possibly an embedded
Integrated Circuit (IC).


Two types of Smart Cards are there:
1. Memory Only Chips.
2. Microprocessor Chips.




Invented by Helmut
Grottrup
Jurgen Dethloff
In 1968

Helmut
Grottrup

Jurgen
Dethloff
 1968-

German inventors patent combination of plastic
cards with micro chips.
 1970- Japan patent different version.
 1974- Roland Moreno invents integrated chip card and
patents it in France.
 1977- Motorola produces first smart card microchip.
 1979- Motorola develops first single chip
microcontroller for bank in France.
 1982- ATM cards with smart chips tested and smart
chips placed on telephone cards.
 1991- AT&T declared its contact less smart card.
 1992- Germany uses smart card for health care.
 1996- First university campus deployment of chip
cards.







Cost
Reliability
Error correction
Storage capability
Ease of use
Security






Identification
Authentication
Data Storage
Portability
Easy to use


Improve the convenience and security of any
transaction.



Provide tamper proof storage of user and
account identity.



Provide vital components of system security.



Protect against a full range of security
threat.


Typical Configuration: -



256 byte to 4kb RAM
8kb to 32 kb ROM
1kb to 32kb EEPROM
Crypto-coprocessors
(implementing 3DES,RSA etc; in
Hardware) are optional
8-bit to 16-bit CPU. 8051 based
designs are common.








CPU



ROM



RAM

 EEPROM








Contact Smart Cards
Contactless Smart Cards
Dual-interface Cards
Hybrid Cards
Cash Card
Debit Card
Control Acess Card
Contact Smart Card





Contact area of 1 square centimeter.
It is inserted into a reader then chips makes
contact with electrical connectors.
Contact Smart card Readers
Contactless Smart Card




Contactless Smart Card is any pocket sized card
with embedded IC’s
Benefits
Contactless Smart Card Reader
Dual-interface Cards
• In this, it is possible to access the same chip using
either contact or contactless interface.

Hybrid Cards

• A hybrid cards having two chips.
Cash Card
“An embossed plastic card bearing the name
and account details of a bank ,used with a
personal identification number to obtain
money.”
Debit Card
“An electronic card issued by a bank which allows
bank clients access to their account to withdraw
cash or pay for goods and services.”
Control Access Card
It is a plastic card used to gain control
access.
Applications Of Smart Cards
1.Banking & Retail:Smart banking cards can be used as credit, direct debit
cards. The microchip on the card and the card readers
use mutual authentication procedures .
2. Mobile Communications:Smart Cards are used as
identification device.
3. Electronic Purse:Card readers retrieve the amount currently stored, and subtract
the amount for the goods or services being purchased.

4. Payphones:The first card technology was used in 1983 in payphones in
France. Its advanced features are like phone banking, on-line
services.
5. Health Care
Smart cards allow the information for a patient's
history to be safely stored .

6.

ID Verification
A smart card is a device to store such information
as a user's picture or fingerprints
Some Facts of Smart Cards


The first card was issued in India by Visa in
1981.



The country's first Gold Card was also issued
from Visa in 1986.



The first international credit card was issued
to a restricted number of customers by
Andhra Bank in 1987.
1. Commercial
Applications
a) Banking/Payment
b) Identification
c) Ticketing
d) Universities Smart
Cards
2. Mobile Telecommunications
a) SIM Cards used on cell phones
b) Over 300,000,000 GSM Phones
with Smart Cards
c) Mobile security, Billing
Information etc
3. Information Technology
a) Secure logon and
authentification of users to
PCs & Networks
b) Encryption of Sensitive Data
Advantages: 1. Flexibility
2. Cost & Availability
3. Security
4. Data Integrity
5. Safety
6. Easy to Use

1.
2.
3.
4.
5.

Disadvantages: Fees applied with the use of a card
It gives liability issues if stolen or lost
The accuracy of information is small
Lack of technology to support users
It is potential for too much data on one card if lost or
stolen











http://www.smartcardbasics.com/smart-cardtypes.html
http://www.mobilein.com/smart_cards.htm
http://www.smartcardbasics.com/smart-cardoverview.html
http://people.cs.uchicago.edu/~dinoj/smartcar
d/applications.html
http://web.mit.edu/ecom/Spring1997/gr12/2US
ES.HTM
http://www.ehow.com/facts_4843889_advantag
es-disadvantages-using-smart-cards.html
Smart cards

Contenu connexe

Tendances (20)

Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cards Smart cards
Smart cards
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart cards system
Smart cards systemSmart cards system
Smart cards system
 
Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 

Similaire à Smart cards

Similaire à Smart cards (19)

smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Doccccc
DocccccDoccccc
Doccccc
 
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8rsmart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
 
Smart Cards.pptx
Smart Cards.pptxSmart Cards.pptx
Smart Cards.pptx
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto das
 
Smart card Technology
Smart card TechnologySmart card Technology
Smart card Technology
 
Smartcards 111228091849-phpapp01
Smartcards 111228091849-phpapp01Smartcards 111228091849-phpapp01
Smartcards 111228091849-phpapp01
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 
smart card and typrs of smart card
smart card and typrs of smart cardsmart card and typrs of smart card
smart card and typrs of smart card
 
My blink tech.
My blink tech.My blink tech.
My blink tech.
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 

Plus de Divam Goyal

Plus de Divam Goyal (20)

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
 
Technology
TechnologyTechnology
Technology
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
Blade server
Blade serverBlade server
Blade server
 
SOPA
SOPASOPA
SOPA
 
Steganography
SteganographySteganography
Steganography
 
Input device
Input deviceInput device
Input device
 
New energy resources
New energy resourcesNew energy resources
New energy resources
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Operating System
Operating SystemOperating System
Operating System
 
Inflection
InflectionInflection
Inflection
 
Steganography
SteganographySteganography
Steganography
 
Biometrics
Biometrics Biometrics
Biometrics
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Big bazaar
Big bazaarBig bazaar
Big bazaar
 
Brain rules
Brain rulesBrain rules
Brain rules
 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
 
Apple
AppleApple
Apple
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Smart cards

Notes de l'éditeur

  1. Memory Cards: These cards just store data and have no data processing capabilities. Often made with I2C or serial flash semiconductors, these cards were traditionally the lowest cost per bit for user memory. This has now changed with the larger quantities of processors being built for the GSM market. This has dramatically cut into the advantage of these types of devices. They should be regarded as floppy disks of varying sizes without the lock mechanism. These cards cannot identify themselves to the reader, so your host system has to know what type of card is being inserted into a reader. These cards are easily duplicated and cannot be tracked by on-card identifiers. Microporcessor Cards:Generally referred as chip crds.it offer greater memory storage and security of data.The microprocessor card can add,delete and manipulate information on the cards.
  2. The benefits of smart cards are directly related to the volume of information and applications that are programmed for use on a card. A single contact/contactless smart card can be programmed with multiple banking credentials, medical entitlement, driver’s license/public transport entitlement, loyalty programs and club memberships to name just a few. Multi-factor and proximity authentication can and has been embedded into smart cards to increase the security of all services on the card. For example, a smart card can be programmed to only allow a contactless transaction if it is also within range of another device like a uniquely paired mobile phone. This can significantly increase the security of the smart card. Governments gain a significant enhancement to the provision of publicly funded services through the increased security offered by smart cards. These savings are passed onto society through a reduction in the necessary funding or enhanced public services.
  3. Card Material Smart cards are made up of as many as six layers of plastic material laminated together. Common choices for the primary materials are polyester, PVC and polycarbonate. Large sheets of the materials that make up the various layers are printed with any markings, then combined with each other in a press. The sheets are then stamped into card "blanks" with a die. After this the chip is embedded into the card. The card appears to the user as a single, simple rectangle of plastic, but in reality it can take as many as 30 distinct steps to create it.
  4. This lets you get cash from cash machines by using a PIN (personal identity number). Your PIN should be kept secret; if you lose it or it is stolen, inform your bank immediately. If someone else withdraws cash with your card and PIN before you report it, you may have to pay for any amount that they took out. Keeping your card separate from your PIN reduces the risk of someone else being able to use it.
  5. Debit cards, also known as check cards look like credit cards or ATM cards (automated teller machine card). It operates like cash or a personal check. Debit cards are different from credit cards. Credit card is a way to "pay later," whereas debit card is a way to "pay now." When you use it, the amount of your purchase is "debited to" (taken from) your account, usually two or three days later. Your bank statement will often show which supplier you bought the goods from.
  6. Control Access Cards: It is a plastic card used to gain control access or enter restricted areas. Usually associated with magnetic or chip card and proximity cards with or without photo. When you use Zebra card printers to create your ID cards, authorized users can access your security system right away.