Smart Cards Seminar Report
Smart Cards Seminar Report
Smart Cards Seminar Report
Cards--
According to Axalto America, a company produces high-end smart cards and creates the operating systems to run it Today's smart cards are nothing less than single-chip computers with extensive memory . The term "smart cards" is used to describe different types of cards, from cards that simply carry data in memory to those that can carry out sophisticated processing of data. Actually microcontrollers or what might be thought of on a computer as the motherboard, rather than simply a single part of the motherboard.
Overview :
Today, the SIM cards basic functionality in wireless communications is subscriber authentication and roaming. Although such features may be achieved via a centralized intelligent network (IN) solution or a smarter handset, there are several key benefits that could not be realized without the use of a SIM card, which is external to a mobile handset. These benefitsenhanced security, improved logistics, and new marketing opportunitiesare key factors for effectively differentiating wireless service offerings. This tutorial assumes a basic knowledge of the wireless communications industry and will discuss the security benefits, logistical issues, marketing opportunities, and customer benefits associated with smart cards.
Varieties :
Smart cards come in two varieties Microprocessor and Memory Cards. Memory cards simply store data and can be viewed as a small floppy disk with optional security. Memory cards depend on the security of a card reader for their processing. A microprocessor card can add, delete, and manipulate information in its memory on the card. It is like a miniature computer with an input and output port, operating system, and hard disk with built-in security features. Smart cards have two different types of interfaces. Contact smart cards must be inserted into a smart-card reader. The reader takes contact with the card modules electrical connectors that transfer data to and from the chip. Contact less smart cards are passed near a reader with an antenna to carry out a transaction. They have an electronic microchip and an antenna embedded inside the card, which allows it to communicate without a physical contact. Contact less cards are an ideal solution when transactions must be processed quickly, as in mass transit or toll collection. A third category now emerging is a dual interface card. It features a single chip that enables a contact and contact less interface with a high level of security . Bonnett notes that traditional 125 kHz proxy cards are read-only, meaning they can hold and store but never change--any information. The company's new contact less iClass line is far more sophisticated and, at 13.56 MHz, far more powerful. "With a lot of the new technology we're doing with iClass and our other contact less technologies, we do have processing capabilities on the card," such as the ability for a new code to be created on a card each time it is held up to a reader, for added security. Bonnett says that iClass is a microcontroller-based technology, just in the contact less realm. The number and types of applications it can perform are limited because it doesn't use the Java operating system. The faster processors of these cards allow benefits such as faster data processing and throughput. The greater memory means that the cards could do more than simply allow or deny access. They could hold information such as an employee's medical history, encryption algorithms, and biometric identifiers. Another type of Smart card is Hybrid cards .
. 2
Hybrid Cards :
The promise and cost savings of smart cards can be offset by the expenses associated with making a transition from, say, a magnatic-stripe card used for physical access to a smart card with fingerprint biometric data on board. "You can put a lot of different technologies onto this little piece of plastic," including magnetic stripes, bar codes, and optical character recognition (OCR) codes, adds John McKeon, principal, biometrics and smart cards, IBM Global Services. These cards can also be contact and contact less. Two characteristics make smart cards especially well suited for applications in which security-sensitive or personal data is involved. First, because a smart card contains both the data and the means to process it, information can be processed to and from a network without divulging the cards data. Secondly, because smart cards are portable, users can carry data with them on the smart card rather than entrusting that information on network storage or a backend server where the information could be sold or accessed by unknown persons. This is clear from the following figure.
A smart card can restrict the use of information to an authorized person with a password. However, if this information is to be transmitted by radio frequency or telephone lines, additional protection is necessary. One form of protection is ciphering (scrambling data). Some smart cards are capable of ciphering and deciphering, so the stored information can be transmitted without compromising confidentiality. Smart cards can cipher into billions of foreign languages and choose a different language at random every time they 3
communicate. This process ensures that only authenticated cards and computers are used and makes hacking or eavesdropping virtually impossible. It's not only the chips that have changed, but also the way they work. The change began in the late 1990s with the introduction of the Java card, which allows multiple functions, protected by firewalls, to coexist on a single card. Java cards also allow new functions to be added.
JAVA cards :
To understand how previous types of smart cards--what Pattinson terms "file-system cards"--differ from the Java card (created by Axalto, using Sun Microsystems' Java technology), Pattinson gives the example of an electronicwallet application in which a card would hold balance information. "If you wanted to change [the balance], you had to modify the information of the card, and send it back to the smart card and store it back in the file," he says. The Java card provides all that functionality within the card, meaning that data can be stored and modified safely within the card itself. So, for example, a command to deduct three dollars from the card's balance would be sent to the card, rather than pulling the balance off the card and carrying out the operation. Keeping the data on the card adds additional security. Similarly, as discussed in a following section on biometrics, matching a person's biometric template (from, say, a fingerprint) to one stored on a card can be carried out on the card itself, meaning that organizations do not need to keep large databases of biometric information if they merely want to verify that the person presenting an ID card is the person authorized to have that card. Java cards are capturing an increasingly large part of the smart-card market. Sun Microsystems announced at a recent trade show that more than 750 million Java cards have already been deployed. That represents a growth of more than 50 percent in a single year, according to Sun. Another benefit of these cards is that there's a built-in backup system in case one part of the card has a problem, says Bonnett. "If one of the technologies fail for whatever reason, the rest of the card is still accessible and usable," he says. He compares hybrid cards to dual-technology cards where both technologies are on one chip. In these, "a single piece of silicon is able to do both contact and contact less" interfaces. But "if the chip fails, it fails for everything," he says, adding that these cards are also more difficult to manufacture.
Biometrics:
There are many biometric technologies, from obvious to obscure (these latter include systems that would analyze odor, gait, or vein structure), but the most commonly implemented systems are fingerprints, iris scans, face recognition, and hand geometry. These technologies vary not only in terms of their accuracy but also in the types of applications and facilities for which they are best suited.
Iris scans: Iris scans are the most accurate of the biometric technologies. A
report by the U.K.'s National Physical Laboratory (NPL) showed that iris scans had significantly fewer false accepts than other biometric technologies. This is one reason this type of biometric is often deployed in high-security areas.
Front Side
Magnetic Strip
Contact with Handset
ATM Card
6
SIM
Back Side
examples. Eventually, new networks will have a common smart object and a universal identification module (UIM), performing functions similar to SIM cards.
Identification Model
Providing value-added services such as mobile banking, Web browsing, travel services create a high cost of exit for the customer. Long-distance companies have successfully used joint programs with airline companies to ensure the long term loyalty of their customers. The more services a customer receives, the more difficult it is for the customer to leave the service provider. Smart cards provide an excellent vehicle for surrounding the core wireless service with these other valuable services, and packaging- and service-bundling opportunities are numerous.
4.Direct Marketing :
With their convenient form factor, smart cards can be used in direct-mail campaigns to sell wireless subscriptions, both for prospecting and subscription renewal. Using temporary or prepaid smart cards, network operators have a low ost channel for selling their services. In addition, subscription changes, renewals, and upgrades are easily handled by sending new cards in the mail.
5.Advertasing :
Two services, used in conjunction with smart cards, provide network operators with possibilities for highly targeted advertising. Short message service (SMS) and cell broadcast leverage smart cards to send advertising or informational messages that appear on the handset display to wireless users.
6.Trial Subscription :
Smart cards are an ideal vehicle for trial subscriptions. Programmed as prepaid cards, they can attract new customers to try wireless services with limited, defined financial risk for both the network operator and the consumer.
10
Customer Benefits
Full Portability of Services
The smart card effectively breaks the link between the subscriber and the terminal, allowing the use of any properly equipped terminal and helping to realize the wireless promise of anytime, anywhere communications. In fact, subscribers need not be constrained to using voice terminals only. A variety of other mobile communications devices such as personal digital assistants (PDAs) and personal intelligent communicators (PICs) are available that may have voice communications added as an integral part of their capabilities. If these other devices are equipped for smart cards, the potential for communications is increased. Similarly, data communications applications could benefit from the security features inherent in smart cards.
International Roaming
Wireless customers often require the ability to place and receive calls when traveling abroad. For these customers, international roaming enabled by smart cards is quite valuable. For example, Ameritech, AT&T, and GTE have all instituted international roaming programs using GSM phones and smart cards. The program uses co-branded smart cards, which corporate customers bring with them when they travel abroad. Customers are given a telephone number from a GSM carrier, which allows them to be contacted in any of the countries that have international roaming agreements.
Intersystem Roaming
The incompatibility of different communications radio interfaces and authentication protocols (time division multiple access [TDMA], code division multiple access [CDMA], GSM, personal digital cellular [PDC], mobile satellite systems, etc.) requires subscribers to make choices that constrain them to use only one particular type of handset that works with only one radio interface. With a smart card, it becomes possible for subscribers to use one handset for different interfaces and protocols. This feature is already implemented among the three frequencies used by the GSM platform (900, 1800, and 1900 MHz). American National Standards Institute (ANSI) telephone industry price index (T1P1).3 has recommended standards for a user identity module, a smart card that can be used with the major radio access methods. Thus, it becomes conceivable to have current GSM smart cards modified so that they can work with a CDMA handset. For example, North American GSM operators have designed a process in which the SIM holds both the GSM and advanced mobile phone service (AMPS) authentication algorithm and data to provide authentication on both networks in inter roamings situation .
11
12
13
Online Resource:
For this seminar report I viewed many sights on Internet using www.google.com & Yahoo search. Among this sights www.smo_cards.com there is a article named The Smart Cards Are ComingReally , by- Peter Piazza , I found this article much important for making this seminar report . SAIKAT MUKHERJEE
--X--
14
15
16