Sie sind auf Seite 1von 28

Your Logo Here

E-Wallet
By: J. JYOTHI PRASAD 08M51A0436
1

Abstract
 Using the basic concepts of Embedded
Systems, an idea for changing the future of Cards (Banking, Petro, Health, etc.) is proposed in this paper Requirement of a special card reader, limited lifetime, acceptance being the main disadvantages of todays traditional cards, led to the design of e-Wallet. The main objective of e-Wallet is to make paperless money transaction easier. The main idea behind this paper is to bring in a cheaper, more versatile and much more easily usable kind of a card.
2

Introduction
Embedded

Systems can be viewed as a combination of hardware and software components, in which the software is implanted into the hardware to do the specific job. These ES were implemented in various fields from Battery chargers to Aviation Systems besides Cell phones (GSM, GPRS, CDMA, etc.).

Using the basic concept of ES, an idea for changing the future of Cards (Banking, Petro, Health etc.) is proposed in this paper

Pros and cons of todays cards


Basic advantages: Ease of mobility Ease of use Disadvantages: Easy Duplication Requires a special card reader Networking problems Limited lifetime Limited acceptance
4

E-WALLET
The main objective of e-Wallet is to make
paperless money transaction easier The electronic wallet (e-Wallet) is just like a leather wallet as it does the same, in terms of ecash.

It is a cheaper, more versatile and much more easily usable kind of card.
5

Features of E-Wallet
More than 40 years of data retention  Firewall encrypted security logic Compatible with many supporting hardware. No separate card reader is required to access our card Polarity reversal indicator is pre-built in our card. Reusability of our card is unlimited. Multiple card features are incorporated in the same card. External complexities are less.

6

Transaction procedure
 The e-Wallet cardholder goes to a point of sale
(POS) location where the e-Wallet is accepted. Having chosen the goods he wishes to buy, he goes to the cash desk. Here, the merchant calculates the total value and enters it on the payment terminal using a keypad.

 The terminal then displays the amount on a


small screen facing the cardholder, who confirms the amount by pressing an "OK" button. In less than a second, the value is transferred from the eWallet to the terminal, and the value remaining in the e-Wallet is adjusted. 7

Transaction procedure


This is an off-line transaction. A message is displayed to both the cardholder and the merchant saying that the payment has been accepted.

Periodically,

the merchant connects the terminal to his bank to do a collection that is to transfer the value collected in the terminal to his bank account. This is an on-line transaction.

Transaction procedure
The terminal sends a message for each transaction to the e-Wallet host system, identifying the card number and issuer and the amount. The host system debits the float account of the issuer and credits the merchant's account. This typically takes a few seconds per transaction.  Merchants can program their terminals to automatically do collections each day, week or month, or when a specified value of transactions is reached.

9

Card design
The first part of the process is to manufacture a substrate which contains the chip. This is often called a COB (Chip On Board) and consists of a glass epoxy connector board on which the chip is bonded to the connectors.

This may be done by scribing with a diamond tipped point and then pressure rolling the wafers so that it fractures along the scribe lines
10

Card design
     

 

Signals: VCC Power supply. RST Reset signal, used to reset the card's communications. CLK Provides the card with a clock signal, from which data communications timing is derived. GND (reference voltage). VPP designated this as a programming voltage - an input for a higher voltage to program persistent memory (e.g., EEPROM). I/O Serial input and output C4, C8 The two remaining contacts are AUX1 and AUX2 respectively, and used for USB interfaces and other uses.
11

Architecture of card

12

Architecture

 Embedded Microcontroller: The embedded


microcontroller used here is ATMEL AT40K. It has the overall system control and it interprets the encryption algorithm.

 Crypto Coprocessor: This is a custom designed


unit to implement encryption algorithm. Inside, it has a ROM to store the password used. It runs independent of the microcontroller unit and it minimizes the delay in data encryption and decryption.
13

Architecture


Random Word Generator: The random word generator unit generates a random word which replaces the password (correct password) in the buffers and other terminals with a random word after the transaction is over.

On Chip Security Power Management: This unit protects the card (ASIC) against over voltage or under voltage and over frequency or under frequency of the clock signals given for operation. Access Control: Access control unit protects the on chip memory. It provides address and data bus scrambling and detects any nonstandard attempt to acquire memory access.
14

Architecture
 Flash ROM / ROM: Flash ROM stores the
instruction set for the microcontroller unit, the necessary monitor routine programs and the application code.


EEPROM: EEPROM is used to store the processed data i.e. the balance amount in the card. RAM: It provides the workspace for both the microcontroller unit and the crypto co-processor. Its where the actual comparison of the stored password (original password) and the given password for transaction to take place.
15

Architecture
 Serial Interface: It has six valid pins CS-chip
select, CLK-external clock, DI-data input, D0-data input, VOC-voltage input, GND-ground.


RF Interface: This unit provides establishment of transaction using Blue tooth technology, which is our future enhancement. Internal 16 Bit Address/Data Bus: This provides communication between different units inside ASIC chip.
16

Programming the card


 

  

Smart cards contain an operating system which provides a platform to run applications. Commands can be passed to the card via the card reader and then the desired application can be accessed through the smart card. One of the most commonly used smart card operating systems is JavaCard. JavaCards enable secure and chip-independent execution of various applications. Any person can develop applications using Java programming language. The java programs can run independently on the card
17

Communication with card reader


 The reader provides a path for an application to send and receive commands from the card.  Each manufacturer provides a different protocol for communication with the reader.  First, users have to communicate with the reader.  Second, the reader communicates with the card, acting as the intermediary before sending the data to the card.  The card will process the data and return it to the reader, which will then return the data to its originating source.
18

operation
 

 

Once the card is given the power supply all the units are activated. The password is sought and the password is sent. The first bit is chip select then the start bit, two opcode bits, 6-address bits and 16 data bits. The dedicated embedded microcontroller looks after this process. Then the given password is sent to the RAM work space. The password (original password) after decryption by the crypto processor is sent to the RAM.
19

operation


 

Here the passwords are compared by the microcontroller. Only if the both the passwords are correct, the access control unit brings the flash ROM, EEPROM units of low impedance state. Otherwise the units are kept in high impedance state. The on-chip security power management unit provides the correct voltage and correct frequency (CLK signal) for functioning of the ASIC. If the password is correct, then the microcontroller fetches the instructions from the instruction set in the FLASH ROM.
20

operation
 

The balance amount can be fetched form the EEPROM, through the D0 pin of the serial interface. After the transaction is over the balance amount is stored in the EEPROM through D1 pin of the serial interface.

 Once the transaction is over, the random word


generator generates a random word and sends it to the terminal ends and other buffers where the original password is present. This protects the original password from being hacked by hackers.

21

Features of E-Wallet


  

  

Refillable: the data in e-wallet can be easily refillable. Data such as balance amount in credit card and other data can be refillable. Infinite lifetime: the life of e-wallet is infinite. Current balance can be stored and read. User authentication: user authentication is one of the important features of e-wallet. This feature includes validation of consumer before a transaction is made. Universal access: e-wallet can be accessed universally. It has no limitations. E-wallet supports maximum possible cash. An e-wallet cannot be duplicated.
22

Advantages & disadvantages


    

Advantages: Ease of use Accessibility and convenience Flexibility Safety and control Disadvantages:

 

Users must download the wallet form and software

23

Future challenges
 Mass Market Appeal : One way to increase the
mass market appeal is to make the digital wallet usable for all day-to-day transactions.

 Stake Holder Dynamics : This is a challenge


because satisfying the business and strategic goals of multiple stake holders is difficult.


The third challenge is designing a digital wallet that consumers want to use. This requires a usable interface, and support for all financial transactions that a user may want to perform.
24

conclusion
 With all the above mentioned features it is definite
that the future of cards is definitely e-Wallet.


Besides credit cards, this e-Wallet can also be extended into the following fields, namely: Sim card Petro card Credit card Health card
25

   

Bibliography
1.

www.way2students.com

2. www.jntuworld.com 3.http://www.microsoft.com/ 4.http://awww.microsoft.com/

26

27

QUERIES

28

Das könnte Ihnen auch gefallen