SlideShare a Scribd company logo
1 of 30
Seminar on
Smart Cards
Submitted to:- Submitted by:-
Er. Tushar Srivastava Rahul Kumar
Er. Ajay Kumar Maurya
29507,EIE
UNSIET,Jaunpur
Overview
 INTRODUCTION
 EVOLUTION
 TECHNOLOGICAL FEATURES
 CLASSIFICATION
 CONTACT INTERFACES
 FABRICATION
 APPLICATION
 ADVANTAGE AND DISADVANTAGE
 FUTURE
What is smart card?
 Standard credit card-sized with microchip
embedded on it.
 Any pocket-sized card with embedded
integrated circuits.
 Can hold up to 32,000 bytes.
 Follow the MOORE’s law.
 On a fundamental level, microprocessor
cards are similar to desktop computers.
EXAMPLES OF SMART CARDS
EVOLUTION OF SMART CARDS
HISTORY
1950-Used by diners club in 1950 as a plastic card
1968- German inventors patent combination of
plastic cards with micro chips.
1970- Japan patent different version.
1974- Roland Moreno invents integrated chip card
and patents it in France.
1977- Motorola produces first smart card microchip.
1979- Motorola develops first single chip
microcontroller for bank in France.
 1982- ATM cards with smart chips tested and smart
chips placed on telephone cards.
 1991- AT&T declared its contactless smart card.
 1992- Germany uses smart card for health care.
 1996- First university campus deployment of chip
cards.
CURRENT TRENDS
 Latest super smart cards have keypads, LCD
displays, battery and math co-processors for
performing complex encryption algorithms.
TECHNOLOGICAL FEATURES
 256 bytes to 4KB RAM.
 8KB to 32KB ROM.
 1KB to 32KB EEPROM.
 Crypto-coprocessors (implementing 3DES, RSA etc.,
in hardware) are optional.
 8-bit to 16-bit CPU. 8051 based designs are
common.
 Length=4.96mm
 Breadth=4.28mm
 Chip area=21.33mm2
 COS
CLASSIFICATION OF SMART
CARDS
MEMORY CARDS MICROPROCESSOR CARDS
 IC MEMORY CARDS
Can store data,but do not
have a processor on the
card.
 OPTICAL MEMORY
CARDS
Can store only data,but has a
larger memory capacity
than IC memory cards.
 Holds a microprocessor or
microcontroller chip.
 Can add,delete and
manipulate information in
its memory.
 COS
DIFFERENT TYPES OF CONTACT
INTERFACES
1. CONTACT SMART CARDS
2. CONTACTLESS SMART CARDS
 Proximity cards
 Remote cards
3. COMBI/DUAL INTERFACE CARDS
 Dual interface cards
 Combination of smart cards and biometric devices
STANDARD DIMENSION FOR SMART
CARDS
CONTACTS OF THE SMART CARD
MODULE
FABRICATION OF SMART CARDS
 Chip specification
 Card specification
 Mask ROM specification
 Application software specification
 Chip fabrication
 Card personilisation
 Applicatin activation
 Application load
APPLICATION OF SMART CARDS
1. FINANCIAL APPLICATIONS
 Electronics purse
 Telephone payment cards
2. GOVERNMENT APPLICATIONS
 National ID card
 Driving license
3. HEALTH APPLICATIONS
 Patient data card
 Health professional card
4. CAMPUS SOLUTIONS
Student identification
Library cards
Meal cards
Transportation cards
5. EMPLOYEE CARDS
ID cards
Access cards
Time attendance system
6. COMMUNICATIONS AND ENTERTAINMENT
 SIM
 Subscriber activation card for pay-TV
7. INFORMATION SECURITY
 PC Security cards
 Digital signature
 Encryption
 Telecommuting And Corporate Network
Security
ADVANTAGES OF SMART CARDS
 CONVENIENCE
 INTELLIGENCE
 MULTIFUNCTIONALITY
 ECONOMIC BENEFITS
 CUSTOMIZATION
 SECURITY
 PERSONALISATION
DISADVANTAGES OF SMART CARDS
 FLEXIBILITY
 HARSH ENVIRONMENT
 SECURITY IS NOT ALWAYS 100 %.
 LACK OF STANDARDS FOR FUNCTIONALITY AND
SECURITY.
Plastic Cards
 Visual identity application
 Plain plastic card is enough
 Magnetic strip (e.g. credit cards)
 Visual data also available in machine readable
form
 No security of data
 Electronic memory cards
 Machine readable data
 Some security (vendor specific)
Smart Cards
 Processor cards (and therefore memory too)
 Credit card size
 With or without contacts.
 Cards have an operating system too.
 The OS provides
 A standard way of interchanging information
 An interpretation of the commands and data.
 Cards must interface to a computer or
terminal through a standard card reader.
Smart Cards devices
VCC
Reset
Clock
GND
VPP
I/O
Reserved
Smart Card Readers
 Dedicated
terminals
 Usually with a
small screen,
keypad, printer,
often also
have biometric
devices such as
thumb print
scanner.
 Computer based readers
Connect through USB or
COM (Serial) ports
FUTURE OF THE SMART CARD
 I believe smart cards are the wave of the future
for consumer use, commercial use and internal
network security. Europe already has a head
start on the U.S., as smart cards are in much
wider use there.
 With this technology identity theft and credit
card fraud can be controlled to a great extent.
Further it will give a fillip to the Internet
commerce. It will be no exaggeration to predict
that the future belongs to contact less smart
card supporting multiple applications.
Any queries
smartcard-121018150432-phpapp01.pdf

More Related Content

Similar to smartcard-121018150432-phpapp01.pdf (20)

Smart card
Smart cardSmart card
Smart card
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8rsmart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
smart-card-ppt.pptx6rto78r66r8tou7t8o7to87t8r
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Doccccc
DocccccDoccccc
Doccccc
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Smart Cards.pptx
Smart Cards.pptxSmart Cards.pptx
Smart Cards.pptx
 
Card reader
Card readerCard reader
Card reader
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card presentation Subroto das
Smart card presentation Subroto dasSmart card presentation Subroto das
Smart card presentation Subroto das
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

smartcard-121018150432-phpapp01.pdf

  • 1. Seminar on Smart Cards Submitted to:- Submitted by:- Er. Tushar Srivastava Rahul Kumar Er. Ajay Kumar Maurya 29507,EIE UNSIET,Jaunpur
  • 2. Overview  INTRODUCTION  EVOLUTION  TECHNOLOGICAL FEATURES  CLASSIFICATION  CONTACT INTERFACES  FABRICATION  APPLICATION  ADVANTAGE AND DISADVANTAGE  FUTURE
  • 3. What is smart card?  Standard credit card-sized with microchip embedded on it.  Any pocket-sized card with embedded integrated circuits.  Can hold up to 32,000 bytes.  Follow the MOORE’s law.  On a fundamental level, microprocessor cards are similar to desktop computers.
  • 5.
  • 6. EVOLUTION OF SMART CARDS HISTORY 1950-Used by diners club in 1950 as a plastic card 1968- German inventors patent combination of plastic cards with micro chips. 1970- Japan patent different version. 1974- Roland Moreno invents integrated chip card and patents it in France. 1977- Motorola produces first smart card microchip. 1979- Motorola develops first single chip microcontroller for bank in France.
  • 7.  1982- ATM cards with smart chips tested and smart chips placed on telephone cards.  1991- AT&T declared its contactless smart card.  1992- Germany uses smart card for health care.  1996- First university campus deployment of chip cards. CURRENT TRENDS  Latest super smart cards have keypads, LCD displays, battery and math co-processors for performing complex encryption algorithms.
  • 8.
  • 9. TECHNOLOGICAL FEATURES  256 bytes to 4KB RAM.  8KB to 32KB ROM.  1KB to 32KB EEPROM.  Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional.  8-bit to 16-bit CPU. 8051 based designs are common.  Length=4.96mm  Breadth=4.28mm  Chip area=21.33mm2  COS
  • 10.
  • 11.
  • 12. CLASSIFICATION OF SMART CARDS MEMORY CARDS MICROPROCESSOR CARDS  IC MEMORY CARDS Can store data,but do not have a processor on the card.  OPTICAL MEMORY CARDS Can store only data,but has a larger memory capacity than IC memory cards.  Holds a microprocessor or microcontroller chip.  Can add,delete and manipulate information in its memory.  COS
  • 13. DIFFERENT TYPES OF CONTACT INTERFACES 1. CONTACT SMART CARDS 2. CONTACTLESS SMART CARDS
  • 14.  Proximity cards  Remote cards 3. COMBI/DUAL INTERFACE CARDS  Dual interface cards  Combination of smart cards and biometric devices
  • 15. STANDARD DIMENSION FOR SMART CARDS
  • 16. CONTACTS OF THE SMART CARD MODULE
  • 18.  Chip specification  Card specification  Mask ROM specification  Application software specification  Chip fabrication  Card personilisation  Applicatin activation  Application load
  • 19. APPLICATION OF SMART CARDS 1. FINANCIAL APPLICATIONS  Electronics purse  Telephone payment cards 2. GOVERNMENT APPLICATIONS  National ID card  Driving license 3. HEALTH APPLICATIONS  Patient data card  Health professional card
  • 20. 4. CAMPUS SOLUTIONS Student identification Library cards Meal cards Transportation cards 5. EMPLOYEE CARDS ID cards Access cards Time attendance system
  • 21. 6. COMMUNICATIONS AND ENTERTAINMENT  SIM  Subscriber activation card for pay-TV 7. INFORMATION SECURITY  PC Security cards  Digital signature  Encryption  Telecommuting And Corporate Network Security
  • 22. ADVANTAGES OF SMART CARDS  CONVENIENCE  INTELLIGENCE  MULTIFUNCTIONALITY  ECONOMIC BENEFITS  CUSTOMIZATION  SECURITY  PERSONALISATION
  • 23. DISADVANTAGES OF SMART CARDS  FLEXIBILITY  HARSH ENVIRONMENT  SECURITY IS NOT ALWAYS 100 %.  LACK OF STANDARDS FOR FUNCTIONALITY AND SECURITY.
  • 24. Plastic Cards  Visual identity application  Plain plastic card is enough  Magnetic strip (e.g. credit cards)  Visual data also available in machine readable form  No security of data  Electronic memory cards  Machine readable data  Some security (vendor specific)
  • 25. Smart Cards  Processor cards (and therefore memory too)  Credit card size  With or without contacts.  Cards have an operating system too.  The OS provides  A standard way of interchanging information  An interpretation of the commands and data.  Cards must interface to a computer or terminal through a standard card reader.
  • 27. Smart Card Readers  Dedicated terminals  Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.  Computer based readers Connect through USB or COM (Serial) ports
  • 28. FUTURE OF THE SMART CARD  I believe smart cards are the wave of the future for consumer use, commercial use and internal network security. Europe already has a head start on the U.S., as smart cards are in much wider use there.  With this technology identity theft and credit card fraud can be controlled to a great extent. Further it will give a fillip to the Internet commerce. It will be no exaggeration to predict that the future belongs to contact less smart card supporting multiple applications.