Professional Documents
Culture Documents
BRIJENDRA MOHAN
EC 8th SEMESTER
ROLL NO:0614331021
Cutting Edge 2005 workshop, IIT Kanpur
memory too)
Credit card size
With or without contacts.
Cards have an operating system
too.
The OS provides
A standard way of interchanging information
An interpretation of the commands and data.
Cards must interface to a
computer or terminal through a
Classification of smart cards
•Contact and contactless type smart cards
identification, authentication,
and data storage.
Smart cards provide a means
of effecting business
transactions in a flexible,
secure, standard way with
minimal human intervention.
Smart card can provide
strong authentication.
Cutting Edge 2005 workshop, IIT Kanpur
Reserved
Clock
Reset
VCC
I/O
VPP
GND
Cutting Edge 2005 workshop, IIT Kanpur
RFU
GND
RFU
I/O
CLK
RST
Vpp
Vcc
Password
Cutting Edge 2005 workshop, IIT Kanpur
Electronic cash
Wireless communication
Loyality systems
Banking
Satellite TV
Government identification
256 bytes to 4KB RAM.
Cutting Edge 2005 workshop, IIT Kanpur
provide a password.
Password is sent to Card for
verification.
Scheme can be used to permit
user authentication.
Not a person identification scheme
Data is stored in smart cards in
Cutting Edge 2005 workshop, IIT Kanpur
E2PROM
Card OS provides a file structure
mechanism
File types
Binary file
(unstructured)
Fixed size record file
Variable size record
file
Card is inserted in the
Card gets power. OS boots
Cutting Edge 2005 workshop, IIT Kanpur
terminal
up. Sends ATR (Answer to
ATR negotiations take place reset)
to set up data transfer
speeds, capability
negotiations etc.
Terminal sends first Card responds with an error
command to select MF (because MF selection is only
on password presentation)
Terminal prompts the user to
provide password
Terminal sends password for Card verifies P2. Stores a
verification status “P2 Verified”.
Responds “OK”“OK”
Card responds
Terminal sends command to
select MF again Card supplies personal data and
responds “OK”
Terminal sends command to read
EF1
1. Authenticate user to bank
Terminal with officer card:
Cutting Edge 2005 workshop, IIT Kanpur
The terminal itself does not store any keys, it’s the two cards that
really authenticate each other. The terminal just facilitates the
process.
At RTOs, two RTO officers are
Cutting Edge 2005 workshop, IIT Kanpur
required to create a DL
These two work in pair.
Have a usage counter of key built in.
www.wikwpedia.com
www.cs.fsu.ed