Beruflich Dokumente
Kultur Dokumente
Credit card sized plastic card with an embedded chip. Generally made of plastic such as PVC or Polycarbonate. May come in 2 types:
Memory Micro-processor
Contact and Contact-less type cards. Used as a replacement for magnetic strip cards.
Reserved
Typical Configurations
256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common.
Computer Based Readers which connect through USB or COM (Serial) ports
Dedicated Terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
Password
Biometric information
Persons identification
Password Verification
Terminal asks the user to provide a password. Password is sent to Card for verification. Scheme can be used to permit user authentication.
Cryptographic Verification
Method of converting data from a human readable form to a modified form, and then back to its original readable form, to make unauthorized access difficult. Cryptography is used in the following ways:
Ensure data privacy, by encrypting data Ensures data integrity, by recognizing if data has been manipulated in an unauthorized way Ensures data uniqueness by checking that data is "original", and not a "copy" of the "original". The sender attaches a unique identifier to the "original" data which is checked by the receiver of the data.
Biometric Techniques
Features of finger prints can be kept on the card (even verified on the card)
Photograph/IRIS pattern
Such information is to be verified by a person. The information can be stored in the card securely.
Can store currently up to 7000 times more data than a magnetic stripe card. Information that is stored on the card can be updated. Magnetic stripe cards are vulnerable to many types of fraud.
Greatly enhances security by communicating with card readers using PKI algorithms. A single card can be used for multiple applications (cash, identification, building access, etc.) Provides a 3-fold approach to authentic identification:
UID GSM cards (SIM cards for mobiles) Phone book etc. + authentication. Cards for credit card applications. From 200 all credit cards will be smart card. EMV standard (Europay, MasterCard and VISA) Card for e-purse applications Bank cards Card technology has advanced Contactless smart cards, 32-bit processors and bigger memories JAVA cards
Chicago Transit Card Speed Pass Amex Blue Card Phone Cards University ID cards Health-care cards Access to high level government facilities. Federally Passed Real-ID act of 2005. E-Passports
Future uses:
References