Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Smart card ppt

31.311 visualizaciones

Publicado el

Publicado en: Tecnología, Empresariales
  • Inicia sesión para ver los comentarios

Smart card ppt

  1. 1.
  2. 2. Smart cards<br />
  3. 3. Introduction :<br /> A smart card, typically a type of chip card, is a plastic card that contains an embedded computer chip–either a memory or microprocessor type–that stored and transacts data. This data is usually associated with either value, information, or both and is stored <br />Ex :healthcare,banking,entertainment, and transportation<br />History :<br /> 1982, while working for German company Giesecke &Devrient. The first mass use of the cards was as a Telecarte for payment in French pay phones, starting <br />The second use integrated microchips into all French carte Bleue debitcards in 1992. <br />
  4. 4. Contact Smart Cards :<br /> Contact smart cards have a contact area of approximately 1 <br />square centimeter (0.16 sq in), comprising several gold-plated contact pads. <br />These pads provide electrical connectivity when inserted into a reader.<br />
  5. 5. How to use signals :<br />VCC  - power supply<br /> RST  - Reset signal, used to reset the card's communications.<br /> CLK   -Provides the card with a clock signal, from which data communications timing is<br /> derived.<br /> GND - Ground (reference voltage).<br /> VPP  - Programming voltage input - originally an input for a higher voltage to program<br /> persistent memory (e.g., EEPROM), but now deprecated.<br /> I/O - Serial input and output (half duplex).<br /> C4, C8 - The two remaining contacts are AUX1 and AUX2 respectively, and used <br />for USB interfaces and other uses. <br />
  6. 6. Reader<br />Contact smart cards readers are used as a communication medium between the smart card and a host or a mobile telephone this are used subscriber identity modules( Sims )in mobile phone<br />
  7. 7. Applications :<br /><ul><li> First introduced in Europe smart cards debuted as a stored value tool for </li></ul> payphones to reduce theft.<br /><ul><li> smart cards and other chip-based cards advanced, people found </li></ul> new ways to use charge cards for credit <br /><ul><li> purchases and for record keeping in place of paper.
  8. 8. In the U.S., consumers have been using chip cards for everything from visiting </li></ul> libraries to buying groceries to attending movies<br /><ul><li> Many industries have implemented the power of smart cards in their products,</li></ul> such as the GSM digital cellular phones as well as TV- satellite decoders.<br />
  9. 9. Why can be use smart cards :<br /><ul><li> Smart cards improve the convenience and security of any transaction.
  10. 10. Smart card systems have proven to be more reliable than other machine-</li></ul> readable cards, like magnetic stripe and barcode, <br /><ul><li>Smart cards also provide vital components of system security for the </li></ul> exchange of data throughout virtually any type of network. <br /><ul><li>To making smart cards a cost-effective solution in these environments.
  11. 11.   Multifunction cards can also be used to manage network system access</li></ul>and store value and other data. <br />
  12. 12. <ul><li>Securing digital contents & physical Assets
  13. 13. E-Commerce.
  14. 14. Bank issued smart cards.
  15. 15. Health care Informatics.
  16. 16. Embedded medical device control.
  17. 17. Enterprise and Network security.</li></li></ul><li>Physical access: <br /> Businesses and universities of all types need simple identity cards for all employees and students. Most of these individuals are also granted access to certain data, equipment, and departments according to their status. <br />
  18. 18. Security :<br /><ul><li> Security is basically the protection of something valuable to ensure </li></ul> that it is not stolen, lost, or altered.<br /><ul><li> Smart cards provide computing and business systems the enormous </li></ul>benefit of portable and secure storage of data and value.<br />Security mechanism :<br /><ul><li> password
  19. 19. Cryptographic challenge Response
  20. 20. Biometric information</li></li></ul><li>password verification :<br /><ul><li> Terminal asks the user to provide a password.
  21. 21. Password is sent to Card for verification.
  22. 22. Scheme can be used to permit user authentication.
  23. 23. Not a person identification scheme</li></li></ul><li>password verification :<br />Read: Free<br />Write: upon verification<br />Select: P2 verification<br />EF1 (personal data)<br />Name: Rajat Moona<br />PF/Roll: 2345<br />EF1 (personal data)<br />Name: Rajat Moona<br />PF/Roll: 2345<br />EF1 (personal data)<br />Name: Rajat Moona<br />PF/Roll: 2345<br />MF<br />Read: Free<br />Write: Password Verification (P1)<br />MF<br />MF<br />EF2 (Address)<br />#320, CSE (off)<br />475, IIT (Res)<br />EF2 (Address)<br />#320, CSE (off)<br />475, IIT (Res)<br />EF2 (Address)<br />#320, CSE (off)<br />475, IIT (Res)<br />EF3 (password)<br />P1 (User password)<br />EF4 (keys)<br />K1 (DOSA’s key)<br />K2 (DOFA’s key)<br />K3 (Registrar’s key)<br />EF3 (password)<br />P1 (User password)<br />P2 (sys password)<br />EF3 (password)<br />P1 (User password)<br />P2 (sys password)<br />EF4 (keys)<br />K1 (DOSA’s key)<br />K2 (DOFA’s key)<br />K3 (Registrar’s key)<br />EF3 (password)<br />P1 (User password)<br />P2 (sys password)<br />Read: Never<br />Write: Once<br />Read: Never<br />Write: Password Verification (P1)<br />
  24. 24. Cryptography Verification :<br /> Cryptographic smart cards are often used for single sign-on. Most advanced smart cards include specialized cryptographic hardware that uses algorithms such as RSA and DSA.<br /><ul><li> Terminal verify card (INTERNAL AUTH)
  25. 25. Terminal sends a random number to card to be hashed or encrypted using a key.
  26. 26. Card provides the hash or cyphertext.
  27. 27. Terminal can know that the card is authentic.
  28. 28. Card needs to verify (EXTERNAL AUTH)
  29. 29. Terminal asks for a challenge and sends the response to card to verify
  30. 30. Card thus know that terminal is authentic.
  31. 31. Primarily for the “Entity Authentication”</li></li></ul><li>Biometric techniques:<br /><ul><li>Finger print identification.
  32. 32. finger prints can be kept on the card (even verified on the card)
  33. 33. Photograph/IRIS pattern etc.
  34. 34. Such information is to be verified by a person. The information can be</li></ul> stored in the card securely<br />
  35. 35. Standards :<br />International Organization for Standardization (ISO)<br /><ul><li> ISO/IEC 7816 It contains fourteen parts. 1, 2 and 3 deal only with contact smart card.</li></ul> 4,5,6,8,9,11,13 and 15 are relevant to contact aswell as contactless. <br /><ul><li> ISO/IEC 14443: It defines the interfaces to a "close proximity" contactless smart</li></ul> card, including the radio frequency (RF) interface.<br />Federal Information Processing Standards (FIPS)<br /><ul><li> FIPS 140 (1-3): The security requirements contained in FIPS 140 (1-3) certain Areas</li></ul> relatedto the Secure design and implementation of a cryptographic module<br /> specification; Cryptographic module ports and interfaces <br /><ul><li> FIPS 201this specification covers all aspects of multifunction cards used in identity</li></ul> management systems throughout the U.S. government.<br />
  36. 36. Conclusions:<br /> Smart cards can add convenience and safety to any transaction of value and data. Evaluations of performance, cost and security that will produce a smart card system that fits today's needs in future, which leads to better business for everybody<br />
  37. 37. Any queries?<br />