0% found this document useful (0 votes)
213 views30 pages

E Wallet PPT 1

This document proposes an electronic wallet (e-wallet) as an alternative to traditional cards like credit cards. It discusses the pros and cons of traditional cards, as well as the features and design of the proposed e-wallet system. The e-wallet uses an embedded system with a microcontroller and other components on a chip card. It allows contactless payment through technologies like Bluetooth and has security features to protect financial information.

Uploaded by

Adam Booker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
213 views30 pages

E Wallet PPT 1

This document proposes an electronic wallet (e-wallet) as an alternative to traditional cards like credit cards. It discusses the pros and cons of traditional cards, as well as the features and design of the proposed e-wallet system. The e-wallet uses an embedded system with a microcontroller and other components on a chip card. It allows contactless payment through technologies like Bluetooth and has security features to protect financial information.

Uploaded by

Adam Booker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 30

Your Logo Here E-Wallet By: J.

JYOTHI PRASAD 08M51A0436 1


Abstract Using the basic concepts of Embedded Systems, an idea for changing the
future of Cards (Banking, Petro, Health, etc.) is proposed in this paper
Requirement of a special card reader, limited lifetim e, acceptance being the main
disadvantages of today¶s traditional cards, led to th e design of e-Wallet. The
main objective of e-Wallet is to make paperless money transaction easier. The main
idea behind this paper is to bring in a cheaper, mo re versatile and much more
easily usable kind of a card. 2
Introduction Embedded Systems can be viewed as a combination of hardware and
software components, in w hich the software is implanted into the hardware to do
the specific job. These E S were implemented in various fields from Battery
chargers to Aviation Systems b esides Cell phones (GSM, GPRS, CDMA, etc.).

Using the basic concept of ES, an idea for changing the future of Cards (Banking ,
Petro, Health etc.) is proposed in this paper 3
Pros and cons of today¶s cards Basic advantages: Ease of mobility Ease of use
Disadvantages: Easy Duplication Re quires a special card reader Networking problems
Limited lifetime Limited accepta nce 4
E-WALLET The main objective of e-Wallet is to make paperless money transaction
easier The electronic wallet (e-Wallet) is just like a leather wallet as it does
the same, in terms of ecash. It is a cheaper, more versatile and much more easily
usable kind of card. 5
Features of E-Wallet More than 40 years of data retention Firewall encrypted
security logic Compatible with many supporting hardware. No separate card reader is
required to access our card Polarity reversal indicator is pre-built in our card.
Reusability of our car d is unlimited. Multiple card features are incorporated in
the same card. External complexities are less. 6
Transaction procedure The e-Wallet cardholder goes to a point of sale (POS)
location where the e-Wallet is accepted. Having chosen the goods he wishes to buy,
he goes to the cash desk. Here, the merchant calculates the total value and enters
it on the payment terminal using a keypad. The terminal then displays the amount on
a small screen facing the cardholder, who confirms the amount by pressing an "OK"
button. In less than a second, the value is transferred from the eWallet to the
terminal, and the value remaining in the e-Wallet is adjusted. 7
Transaction procedure This is an off-line transaction. A message is displayed to
both the cardholder a nd the merchant saying that the payment has been accepted.
Periodically, the merchant connects the terminal to his bank to do a collection
that is to tra nsfer the value collected in the terminal to his bank account. This
is an on-lin e transaction. 8
Transaction procedure The terminal sends a message for each transaction to the e-
Wallet host system, i dentifying the card number and issuer and the amount. The
host system debits the float account of the issuer and credits the merchant's
account. This typically takes a few seconds per transaction. Merchants can program
their terminals to au tomatically do collections each day, week or month, or when a
specified value of transactions is reached. 9
Card design The first part of the process is to manufacture a substrate which
contains the c hip. This is often called a COB (Chip On Board) and consists of a
glass epoxy co nnector board on which the chip is bonded to the connectors. This
may be done by scribing with a diamond tipped point and then pressure rolli ng the
wafers so that it fractures along the scribe lines 10
Card design

Signals: VCC Power supply. RST Reset signal, used to reset the card's communicat
ions. CLK Provides the card with a clock signal, from which data communications
timing is derived. GND (reference voltage). VPP designated this as a programming
voltage - an input for a higher voltage to program persistent memory (e.g., EEP
ROM). I/O Serial input and output C4, C8 The two remaining contacts are AUX1 and
AUX2 respectively, and used for USB interfaces and other uses. 11
Architecture of card 12
Architecture Embedded Microcontroller: The embedded microcontroller used here is
ATMEL AT40K. It has the overall system control and it interprets the encryption
algorithm. Crypto Coprocessor: This is a custom designed unit to implement
encryption algorithm. Inside, it has a ROM to store the passwo rd used. It runs
independent of the microcontroller unit and it minimizes the de lay in data
encryption and decryption. 13
Architecture Random Word Generator: The random word generator unit generates a
random word wh ich replaces the password (correct password) in the buffers and
other terminals with a random word after the transaction is over.

On Chip Security Power Management: This unit protects the card (ASIC) against ov er
voltage or under voltage and over frequency or under frequency of the clock s
ignals given for operation. Access Control: Access control unit protects the on
chip memory. It provides address and data bus scrambling and detects any nonstan
dard attempt to acquire memory access. 14
Architecture Flash ROM / ROM: Flash ROM stores the instruction set for the
microcontroller unit, the necessary monitor routine prog rams and the application
code.

EEPROM: EEPROM is used to store the processed data i.e. the balance amount in th e
card. RAM: It provides the workspace for both the microcontroller unit and the
crypto co-processor. It¶s where the actual comparison of the stored password (ori
ginal password) and the given password for transaction to take place. 15
Architecture Serial Interface: It has six valid pins CS-chip select, CLK-external
clock, DI-data input, D0-data input, VOC-voltage input, GND -ground. RF Interface:
This unit provides establishment of transaction using Blue tooth t echnology, which
is our future enhancement. Internal 16 Bit Address/Data Bus: Th is provides
communication between different units inside ASIC chip. 16
Programming the card

Smart cards contain an operating system which provides a platform to run applica
tions. Commands can be passed to the card via the card reader and then the desir ed
application can be accessed through the smart card. One of the most commonly used
smart card operating systems is JavaCard. JavaCards enable secure and
chipindependent execution of various applications. Any person can develop
applicatio ns using Java programming language. The java programs can run
independently on t he card 17
Communication with card reader The reader provides a path for an application to
send and receive commands from the card. Each manufacturer provides a different
protocol for communication wi th the reader. First, users have to communicate with
the reader. Second, the r eader communicates with the card, acting as the
intermediary before sending the data to the card. The card will process the data
and return it to the reader, w hich will then return the data to its originating
source. 18
operation

Once the card is given the power supply all the units are activated. The passwor d
is sought and the password is sent. The first bit is chip select then the star t
bit, two opcode bits, 6-address bits and 16 data bits. The dedicated embedded
microcontroller looks after this process. Then the given password is sent to the
RAM work space. The password (original password) after decryption by the crypto
processor is sent to the RAM. 19
operation

Here the passwords are compared by the microcontroller. Only if the both the pas
swords are correct, the access control unit brings the flash ROM, EEPROM units o f
low impedance state. Otherwise the units are kept in high impedance state. The on-
chip security power management unit provides the correct voltage and correct
frequency (CLK signal) for functioning of the ASIC. If the password is correct,
then the microcontroller fetches the instructions from the instruction set in t he
FLASH ROM. 20
operation The balance amount can be fetched form the EEPROM, through the D0 pin of
the ser ial interface. After the transaction is over the balance amount is stored
in the EEPROM through D1 pin of the serial interface. Once the transaction is over,
the random word generator generates a random word and sends it to the terminal ends
and other bu ffers where the original password is present. This protects the
original passwor d from being hacked by hackers. 21
Features of E-Wallet

Refillable: the data in e-wallet can be easily refillable. Data such as balance
amount in credit card and other data can be refillable. Infinite lifetime: the l
ife of e-wallet is infinite. Current balance can be stored and read. User authen
tication: user authentication is one of the important features of e-wallet. This
feature includes validation of consumer before a transaction is made. Universal
access: e-wallet can be accessed universally. It has no limitations. E-wallet s
upports maximum possible cash. An e-wallet cannot be duplicated. 22
Advantages & disadvantages Advantages: Ease of use Accessibility and convenience
Flexibility Safety and con trol Disadvantages:

Users must download the wallet form and software 23


Future challenges Mass Market Appeal : One way to increase the mass market appeal
is to make the digital wallet usable for all day-to-day trans actions. Stake Holder
Dynamics : This is a challenge because satisfying the business and strategic goals
of multiple stake holders is difficult. The third challenge is designing a digital
wallet that consumers want to use. Th is requires a usable interface, and support
for all financial transactions that a user may want to perform. 24
conclusion With all the above mentioned features it is definite that the future of
cards is definitely e-Wallet. Besides credit cards, this e-Wallet can also be
extended into the following fiel ds, namely: Sim ± card Petro ± card Credit ± card
Health ± card 25
Bibliography 1. www.way2students.com 2. www.jntuworld.com
3.http://www.microsoft.com/ 4.http://awww.microsoft.com/ 26
27
QUERIES 28

You might also like