In this seminar ,is giving some basic concepts about smart cards. The physical
and logical structure of the smart card and the corresponding security access
control have been discussed in this seminar . It is believed that smart cards
offer more security and confidentiality than the other kinds of information or
transaction storage. Moreover, applications applied with smart card technologies
are illustrated which demonstrate smart card is one of the best solutions to provide
and enhance their system with security and integrity.
seminar also covers the contactless type smart card briefly. Different kinds of
scheme to organise and access of multiple application smart card are discussed.
The first and second schemes are practical and workable on these days, and there
is real applications developed using those models. For the third one, multiple
independent applications in a single card, there is still a long way to go to
make it becomes feasible because of several reasons.
the end of the paper, an overview of the attack techniques on the smart card is
discussed as well. Having those attacks does not mean that smart card is unsecure.
It is important to realise that attacks against any secure systems are nothing
new or unique. Any systems or technologies claiming 100% secure are irresponsible.
The main consideration of determining whether a system is secure or not depends
on whether the level of security can meet the requirement of the system.
smart card is one of the latest additions to the world of information technology.
Similar in size to today's plastic payment card, the smart card has a microprocessor
or memory chip embedded in it that, when coupled with a reader, has the processing
power to serve many different applications. As an access-control device, smart
cards make personal and business data available only to the appropriate users.
Another application provides users with the ability to make a purchase or exchange
value. Smart cards provide data portability, security and convenience. Smart cards
come in two varieties: memory and microprocessor.
cards simply store data and can be viewed as a small floppy disk with optional
security. A microprocessor card, on the other hand, can add, delete and manipulate
information in its memory on the card. Similar to a miniature computer, a microprocessor
card has an input/output port operating system and hard disk with built-in security
On a fundamental level, microprocessor cards are similar to desktop
computers. They have operating systems, they store data and applications, they
compute and process information and they can be protected with sophisticated security
tools. The self-containment of smart card makes it resistant to attack as it does
not need to depend upon potentially vulnerable external resources. Because of
this characteristic, smart cards are often used in different applications, which
require strong security protection and authentication.
You may also like this : Electronics Meet Animal Brains, Satellite Radio, Search For Extraterrestrial Intelligence, Line-Reflect-Reflect Technique, Low Power UART Design for Serial Data Communication, Light emitting polymers, Cruise Control Devices, Boiler Instrumentation and Controls , SPECT, Sensors on 3D Digitization , Asynchronous Chips , Optical packet switch architectures , Digital Audio Broadcasting , Cellular Neural Network , FRAM , Wireless Fidelity , Synthetic Aperture Radar System, Touch Screens , Tempest and Echelon, VoCable , Data Compression Techniques , Fractal Image Compression, Computer Aided Process Planning , Space Shuttles and its Advancements , Space Robotics , Welding Robots , Sensotronic Brake Control , Mobile IP , Power System Contingencies , Lightning Protection Using LFAM , Wideband Sigma Delta PLL Modulator, Bioinformatics , Extreme Ultraviolet Lithography , Animatronics, Molecular Electronics , Cellonics Technology , Cellular Digital Packet Data, CT Scanning , Continuously variable transmission (CVT) , High-availability power systems Redundancy options , IGCT , Iris Scanning , ISO Loop magnetic couplers , LWIP , Image Authentication Techniques , Seasonal Influence on Safety of Substation Grounding , Wavelet transforms, Cyberterrorism , Ipv6 - The Next Generation Protocol , Driving Optical Network Evolution,Electronics Seminar Reports, PPT and PDF.