An Introduction To Smart Cards: It Has Been Said That Smart Cards Will One Day Be As Important As
An Introduction To Smart Cards: It Has Been Said That Smart Cards Will One Day Be As Important As
INTRODUCTION
It has been said that smart cards will one day be as important as
computers are today. This statement contains a bit of an error because it implies
that smart cards are not computers, when in fact, they are. Because smart cards
are indeed tiny computers, it’s difficult to predict the variety of applications that
will be possible with them in the future. It’s quite possible that smart cards will
follow the same trend of rapid increases in processing power that computers
have, following "Moore’s Law" and doubling in performance while halving in cost
every eighteen months.
of millions of smart cards need to be deployed, all with a potential life of several
years. Forwards compatibility, and cross border and cross scheme interoperability
is increasingly difficult to maintain against the background of rapid chip
technology development. EEPROM may give way to faster and longer-lived Flash
memory. Voltages for powering smart cards are reducing almost annually.
Security technologies demand ever-faster processing power.
The roots of the current day smart card can be traced back to the US in
the early 1950s when Diners Club produced the first all-plastic card to be used for
payment applications. The synthetic material PVC was used which allowed for
longer-lasting cards than previously conventional paper based cards. In this
system, the mere fact that you were issued a Diners Club card allowed you to pay
with your "good name" rather than cash. In effect, the card identified you as a
member of a select group, and was accepted by certain restaurants and hotels that
recognized this group. VISA and MasterCard then entered the market, but
eventually the cost pressures of fraud, tampering, merchant handling, and bank
charges made a machine-readable card necessary. The magnetic stripe was
introduced, and this allowed further digitized data to be stored on the cards in a
CURRENT TRENDS
Latest super smart cards have keypads, LCD displays, battery and math co-
processors for performing complex encryption algorithms.
1.MEMORY CARDS
Memory cards simply store data. They do not have any processing
capability and can be viewed as a small floppy disk with optional security. The
main storage area in such cards is normally EEPROM (Electrically Erasable
Programmable Read-Only Memory), which - subject to defined security
constraints - can have its content updated, and which retains current contents
when external power is removed. Memory cards can be either memory only or
can have security logic using passwords and pin codes.
IC MEMORY CARDS
Can store data, but do not have a processor on the card.
OPTICAL MEMORY CARDS
Can only store data, but has a larger memory capacity than IC memory cards.
similar construction, smart card readers come in a variety of form factors with
varying levels of mechanical and logical sophistication. The card user's first action
is to insert the card in the reader. The application controlling the reader will
detect the presence of the card and issue a "Reset" command. This will ensure
that the smart card begins the new session in a "cold boot" context, with all its
working data in RAM newly initialized. The card returns a response to the reset
that indicates to the application that the card is initialized and ready to proceed
with the session.
As the name suggests, a contact smart card needs to come into physical
contact with a device that will allow information and data to be transferred to
and from the card. This device is generally called a card-accepting device (CAD) or
a smart card reader/writer. Contact smart cards are inserted into a smart card
reader, making physical contact with the reader.
The cards have embedded on them a small gold plate approximately the
size of an Australian 5-cent coin, commonly called the ‘module’. When the card
comes into contact with the reader, it makes contact with several electrical
connectors on the module that transfer the information to and from the chip.
Contact smart cards are inserted into a smart card reader, making physical
contact with the reader. They have a small gold plate about ½" in diameter on the
front, instead of the magnetic strip on the back of a credit card.
GOLD MODULE
PROXIMITY CARDS
Proximity cards are used where the distance between the card and the
receiving antenna is usually less than 20 cms, that is, where the card is in close
proximity to the receiving device. They are used to get access into secure work
areas.
REMOTE CARDS
Remote cards are used when the distance between card and antenna are
meters away. An example of where a remote contactless smart card could be
utilized here vehicles pass through a toll-collecting device.
several years before the main and traditional contact card-based schemes start to
migrate to these technologies.
1. Physical Characteristics(Part 1)
2. Dimensions and location of the contacts(Part 2)
3. Electronic signals and Transmission protocols(Part 3)
4. Inter-Industry command for interchange(Part 4)
5. Application Identifiers(Part 5)
6. Inter-Industry data elements(Part 6)
The international standard for the smart card specifies the size of the card
and the position, size and format of the contact pad. Usually, the size is described
as "credit-card sized".
Vcc is the supply voltage that drives the chips and is generally 3 volts.
However that in the future we are likely to see a move towards 1 volt
taking advantage of advanced semiconductor technology and allowing
much lower current levels to be consumed by the integrated circuit.
GND is the substrate or ground reference voltage against which the Vcc
potential is measured.
RST is the signal line that is used to initiate the state of the integrated
circuit after power on.
The CLK signal is used drive the logic of the IC and is also used as the
reference for the serial communications link. There are two commonly used
clock speeds 3.57 MHZ and 4.92 MHZ
The Vpp connector is used for the high voltage signal that is necessary to
program the EPROM memory.
Last, but by no means least is the serial input/output I/O connector. This is
the signal line by which the chip receives commands and interchanges data
with the outside world.
TECHNOLOGICAL FEATURES
THE CHIP
32 KB ROM
16KB EEPROM
1.3KB RAM
ACE CRYPTO UNIT
LENGTH=4.96mm
BREADTH=4.28mm
CHIP AREA=21.33mm2
A smart card's microprocessor chip has all the components needed for
the smart card application. Diagram 2 below indicates its main components and
describes their function.
Smart Cards speak to the outside world using their data packages
called APDUs which are constructed using a set of protocols. APDU contains
either a command or a response message. In the card world, the master-slave
model is used whereby a smart card always plays the passive role. The smart card
always waits for a command APDU from a terminal. It then executes the action
specified in the APDU and replies to the terminal with a response APDU. APDU is
a message transmitted between the smart card and the host. APDU has two types
- input and output. Input sends data to card, and output receives data from card.
Command APDUs and response APDUs are exchanged alternatively between the
card and a terminal.
Data : 0 - 255 byte data transmitted from host to card, or the other way.
1. Chip specification
There are a number of factors to be decided in the specification of the
integrated circuit for the smart card. The key parameters for the chip
specification are as follows:-
2. Card specification
The specification of a card involves parameters that are common to
many existing applications using the ISO ID-1 card. The following list defines the
main parameters that should be defined,
a. Card dimensions
b. Chip location (contact card)
c. Card material (e.g PVC, ABS)
d. Printing requirements
e. Magnetic stripe (optional)
f. Signature strip (optional)
g. Hologram or photo (optional)
h. Embossing (optional)
i. Environmental parameters
The mask ROM contains the operating system of the smart card. It is
largely concerned with the management of data files but it may optionally involve
additional features such as cryptographic algorithms (e.g DES). In some ways this
is still a relatively immature part of the smart card standards since the early
applications used the smart card largely as a data store with some simple security
features such as PIN checking. The relevant part of the ISO standard is 7816-4
(commands).There is a school of thought that envisages substantial changes in
this area to account for the needs of multi-application cards where it is essential
to provide the necessary security segregation. The developed code is given to the
supplier who incorporates this data as part of the chip manufacturing process.
5. Chip Fabrication
The first part of the process is to manufacture a substrate which contains the
chip. This is often called a COB (Chip On Board) and consists of a glass epoxy connector
board on which the chip is bonded to the connectors. There are three technologies
available for this process, wire bonding, flip chip processing and tape automated
bonding (TAB). In each case the semiconductor wafer manufactured by the
semiconductor supplier is diced into individual chips . This may be done by scribing
with a diamond tipped point and then pressure rolling the wafers so that it fractures
along the scribe lines. More commonly the die are separated from the wafer by the
use of a diamond saw. A mylar sheet is stuck to the back of the wafer so that following
separation the dice remain attached to the mylar film. Wire bonding is the most
commonly used technique in the manufacture of smart cards. Here a 25uM gold or
aluminium wire is bonded to the pads on the chip using ultrasonic or thermo
compression bonding.
combination of the two processes but which operate at lower temperatures. The die
mounting and wire bonding processes involve a large number of operations and
are therefore quite expensive. However in the semiconductor industry generally
two other techniques are used, the flip chip process and tape automated bonding.
In both cases gold bumps are formed on the die. In flip chip processing the dice
are placed face down on the substrate and bonding is effected by solder reflow.
With tape automated bonding the dice are attached by thermocompression to
copper leads supported on a flexible tape similar to a 35mm film. The finished
substrate is hermetically sealed with an inert material such as epoxy resin. The
complete micromodule is then glued into the card which contains the appropriately
sized hole. The fabrication of a contactless card is somewhat different since it
always involves a laminated card. The ICs and their interconnections as well as the
aerial circuits are prepared on a flexible polyimide substrate.
6. Application load
7. Card Personalisation
The card is personalized to the particular user by loading data into files
in the PROM memory in the same way that the application code is loaded into
memory. At this stage the security keys will probably be loaded into the PROM
memory but as mentioned previously we will explore this in more detail later.
8. Application Activation
1.FINANCIAL APPLICATIONS
Electronic Purse
Electronic Purse to replace coins for small purchases in vending
machines and over-the-counter transactions. VISA Cash Card issued during
Olympics 1996 were the best example for this and Singapore’s Net Cash Card
system is a Smart card which acts like electronic purse and holds the money. The
money can be spent for Payment in Parking Lots, museums, telephones, fast food
joints, vending machines, transportations and many more places. Such electronic
money can take many forms, and has been endowed with a wide and misleading
vocabulary including stored value and e-purse.
2.GOVERNMENT APPLICATIONS
National ID card
Smart Card based National ID’s project have started to take of in many
countries among which Sultanate of Oman is first middle east country to deploy
1.2 million National ID cards to it’s residents. Gemplus, one of the leading
providers of smart cards is behind this project with their solution called ResIDent
for this purpose. Smart Card is one of the most secure mechanism today compared
to any other type of ID cards, but when applications start to be deployed in such
large scales it must taken care to make sure the whole system of such a project is
secure rather than just the information on the smart card, failing to do so will result
for high threats and failure of such systems.
Driving License
The citizens of Argentina, El Salvador don’t need to carry dumb cards/
license booklets as a proof of eligibility to drive; they are allotted smart cards with
their complete information on it. This almost reduces the license fraud to none
with a secure mechanism which is difficult to be faked.
3.HEALTH APPLICATIONS
4.CAMPUS SOLUTIONS
Student Identification
Library card
Meal card
Transportation card
Student ID card, containing a variety of applications such as electronic
purse (for vending and laundry machines), library card, meal card and
transportation are used and University of Nottingham is one them.
5.EMPLOYEE CARDS
7.INFORMATION SECURITY
PC Security cards
Chip cards are used today by majority of the corporations like Microsoft,
Oracle to access their networks, chip cards can be incorporated with technologies
like Active Directory to store the PKI certificates for authentications makes it dual
factor (Digital Certificate + User password) and the it also allows the users to
encrypt the files and digitally sign the emails. The advantage of this mechanism is
that in case of any damage to smart card due to tampering/usage the user data is
still secure to be decrypted by issuing a new card with the same original Digital
Certificate. In case the smart card is lost or if company decided no to reissue the
same digital certificate to avoid any kind security breach, they can reissue the
smart card with a new private key (Digital Certificate) and the data can be
decrypted for the user by an special key.
Digital signature
Web based HTML forms can be digitally signed by your private key. This
could prove to be a very important technology for internet based business because
it allows for digital documents to be hosted by web servers and accessed by web
browsers in a paperless fashion. Online expense reports, W-4 forms, purchase
requests, and group insurance forms are some examples. For form signing, smart
cards provide portability of the private key and certificate as well as hardware
strength non repudiation. If an organization writes code that can be downloaded
over the web and then executed on client computers, it is best to sign that code so
the clients can be sure it indeed came from a reputable source. Smart cards can be
used by the signing organization so the private key can’t be compromised by a
rogue organization in order to impersonate the valid one.
Encryption
Smart cards can cipher into billions and billions of foreign languages, and
choose a different language at random every time they communicate. This
authentication process ensures only genuine cards and computers are used and
makes eaves-dropping virtually impossible.
1.CONVENIENCE
2.INTELLIGENCE
3.MULTIFUNCTIONALITY
4.ECONOMIC BENEFITS
5.CUSTOMIZATION
A smart card contains all the data needed to personalize networking, Web
connection, payments and other applications. Using a smart card, one can establish
a personalized network connection anywhere in the world using a phone center or
an information kiosk. Web servers will verify the user's identity and present a
customized Web page, an e-mail connection and other authorized services based
on the data read from a smart card. Personal settings for electronic appliances,
including computers, will be stored in smart cards rather than in the appliances
themselves. Phone numbers are stored in smart cards instead of phones. While
appliances become generic tools, users only carry a smart card as the ultimate
networking and personal computing device.
6.SECURITY
Chip is tamper-resistant.
Information stored on the card can be PIN code and/or read-write
protected.
Card Holder Only - The most common form of password for card holders is a
PIN (Personal Identification Number), a 4 or 5 digit number which is typed in on a
key pad. Therefore, if an unauthorized individual tries to use the card, it will lock-
up after 3 unsuccessful attempts to present the PIN code. More advanced types
of passwords are being developed.
Third Party Only - Some smart cards can only be accessed by the party who
issued it (e.g., an electronic purse can only be reloaded by the issuing bank).
7.PESONALISATION
CONCLUSION
BIBLIOGRAPHY
DEPT OF ECE,K.S.I.T Page 38
SMART CARDS
ABSTRACT
CONTENTS
1. INTRODUCTION
a) An Introduction to Smart Cards 1-2
b) Definition of Smart Cards 2-3
2. EVOLUTION OF SMART CARDS
a) History of Smart Cards 3-4
b) Current trends 4
3. CLASSIFICATION OF SMART CARDS
a) Memory Cards 5-6
b) Microprocessor/Intelligent Smart Cards 6-7
4. CARD ACCEPTANCE DEVICE (CAD) 7-9
5. DIFFERENT CONTACT INTERFACES
a) Contact Smart Cards 10
b) Contactless Smart Cards 11-12
c) Combi/Dual Interface Smart Cards 12-13
6. ISO STANDARDS FOR SMART CARDS
a) Standard dimensions of a Smart Card 14
b) Contacts of the Smart Card module 15
7. TECHNOLOGICAL FEATURES
a) The Chip 16-17