In this seminar ,is giving some basic concepts about smart cards. The physical
and logical structure of the smart card and the corresponding security access
control have been discussed in this seminar . It is believed that smart cards
offer more security and confidentiality than the other kinds of information or
transaction storage. Moreover, applications applied with smart card technologies
are illustrated which demonstrate smart card is one of the best solutions to provide
and enhance their system with security and integrity.
seminar also covers the contactless type smart card briefly. Different kinds of
scheme to organise and access of multiple application smart card are discussed.
The first and second schemes are practical and workable on these days, and there
is real applications developed using those models. For the third one, multiple
independent applications in a single card, there is still a long way to go to
make it becomes feasible because of several reasons.
the end of the paper, an overview of the attack techniques on the smart card is
discussed as well. Having those attacks does not mean that smart card is unsecure.
It is important to realise that attacks against any secure systems are nothing
new or unique. Any systems or technologies claiming 100% secure are irresponsible.
The main consideration of determining whether a system is secure or not depends
on whether the level of security can meet the requirement of the system.
smart card is one of the latest additions to the world of information technology.
Similar in size to today's plastic payment card, the smart card has a microprocessor
or memory chip embedded in it that, when coupled with a reader, has the processing
power to serve many different applications. As an access-control device, smart
cards make personal and business data available only to the appropriate users.
Another application provides users with the ability to make a purchase or exchange
value. Smart cards provide data portability, security and convenience. Smart cards
come in two varieties: memory and microprocessor.
cards simply store data and can be viewed as a small floppy disk with optional
security. A microprocessor card, on the other hand, can add, delete and manipulate
information in its memory on the card. Similar to a miniature computer, a microprocessor
card has an input/output port operating system and hard disk with built-in security
On a fundamental level, microprocessor cards are similar to desktop
computers. They have operating systems, they store data and applications, they
compute and process information and they can be protected with sophisticated security
tools. The self-containment of smart card makes it resistant to attack as it does
not need to depend upon potentially vulnerable external resources. Because of
this characteristic, smart cards are often used in different applications, which
require strong security protection and authentication.
You may also like this : Smart Quill, Spam Assassin, Stereoscopic Imaging, Zigbee, Ultra-Wideband, Home Networking, Internet Protocol Television , Bacterio-Rhodopsin Memory, Blade Servers, Digital Cinema, Holographic Versatile Disc, Itanium Processor , Local Multipoint Distribution Service , Network Attached Storage, Night Vision Technology, Opera (web browser), Parasitic Computing, Performance Testing, Java Ring , RD RAM , GSM Security And Encryption , Fast Convergence Algorithms for Active Noise Controlin Vehicles , 3G vs WiFi , Data Security in Local Network using Distributed Firewalls, Computerized Paper Evaluation using Neural Network, Bluetooth Based Smart Sensor Networks , Laser Communications, Multiple Domain Orientation , Industrial Applications using Neural Networks , Implementation Of Zoom FFT , Image Processing , Virtual keyboard , Transient Stability Assessment using Neural Networks , Tracking and Positioning of Mobiles in Telecommunication, Timing Attacks on Implementations , Prototype System Design for Telemedicine , Optical Networking and Dense Wavelength Division Multiplexing , Optical Burst Switching, Image Processing & Compression , Cyberterrorism , Ipv6 - The Next Generation Protocol , Driving Optical Network Evolution , Cellular Neural Network , Radio Network Controller , Digital Audio Broadcasting , Significance of real-time transport Protocol in VOIP , Space Mouse , Resilient Packet Ring Technology , Wireless Networked Digital Devices, Design of 2-D Filters using a Parallel Processor Architecture, Computer Seminars Reports and PPT