• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

"Smart Cards "

Extracts from this document...

Introduction

"Smart Cards " Introduction: Smart Cards are being extensively used in various fields of life. It has provided customers with the ease of mobility while carrying their personal details with them in an extremely secure manner. Smart Cards have been implemented initially as pre-paid phone cards and picked up trends to be used for e-commerce today. Today I will present the basic structure of a smart card, it's uses, security feature, and the various benefits customers can enjoy. What Is A Smart Card? Smart Cards can be thought of being a specialized form of computing that are plastic cards same in size and shape as that of a credit card with an integrated microprocessor and memory. History Of Smart Cards: Smart cards can be traced back to 1968 when using plastic cards as the carrier of microchips was first developed by the German inventors Jurgen Dethloff and Helmut Grotrupp .Two years later, in 1970, Kunitaka Arimura developed a similar application. Then in 1980 Smart Cards were introduced in Europe for pre-paid phone cash. When a customer purchased this pre-paid phone card, it contained the total amount of "cash" available against which calls could be made. ...read more.

Middle

On the other hand normal credit cards have to be secured from scratches and being tempered. The chip also has a unique chip serial no. which identifies the make, type, production date for the chip. ? Personal information is read/write protected: Any sensitive data stored on the smart card is permanently burnt into the microprocessor chip and safe from modification. This is called non-volatile data. ? Data is secure using encryption/decryption: Various encryption and decryption codes are used to encode/decode data when storing it in smart card. This stores data in a secret form so that it cannot be understood and used unless the decryption code is known. ? Capable of storing temporary modifiable information: Smart cards are also provided with a modifiable memory storage, which can store temporary details. This is updated each time the card is used. Hence a card can receive , process and send information as and when required by the processing application. ? It can process information: Smart cards are capable of processing information. Banking transactions use details from stored on the smart card, process it during application execution and then update details on the smart card. The processing of data is done in a temporary storage called volatile memory, which is used during the phase of data processing. ...read more.

Conclusion

The advantages they offer consumers are: * The card can carry personal account, credit and buying preference information that can be accessed with a mouse click instead of filling out forms. * Cards can manage and control expenditures with automatic limits and reporting. * Internet loyalty programs can be deployed across multiple vendors with disparate POS systems and the card acts as a secure central depository for points or rewards. * "Micro Payments" - paying nominal costs without transaction fees associated with credit cards or for amounts too small for cash ,like reprint charges. Campus Badging and Access Businesses and universities of all types need simple identity cards for all employees and students. Most of these people are also granted access to certain data, equipment and departments according to their status. Multifunction, microprocessor-based smart cards incorporate identity with access privileges and also store value for use in various locations, such as cafeterias and stores. Conclusion Smart cards can add convenience and safety to any transaction of value and data;They have largely replaced a lot of credit card and money transactions. The industry analysts and the specialized press forecast a brilliant future for the smart cards. Billions of cards are predicted to be circulating in a few years as it has provided greater mobility to users and security when online transactions or authentic checks are concerned. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    monies for repayment are owed, their assets could be seized where a charge has been taken against them and the directors of the company may find themselves no longer named as such and their own Identity stolen. Ultimately the financial losses could result in cessation of business activities if for

  2. Free essay

    Setting up and E-Commerce Site

    other businesses it may involve international laws, for example the selling of meat to other countries, the meat may be banned and so on. 4. What we need to also consider is the address from which the business can be run, for example, in some places like council houses its

  1. Free essay

    Incentives and Barriers to E-commerce

    By doing this the maximum chance for revenue maximization is increased greatly. * By setting up a forum on the webpage we can see what the users think of our products when they have purchased them. This will then help us to specifically identify problems and issues where we may not in a shop.

  2. Security Issues of E-Commerce

    By the business accepting this payment it shows that they haven actually taken the correct method checks to ensure the customer is who they say they are. This gives the business a bad name. Invasion of privacy-especially related to minors Privacy is very important to the home user when purchasing off of the internet.

  1. What is E-Commerce?

    Below is a bullet point list of a few of the areas where we use e-commerce today. * Online shopping * Banking * Trading of goods (E-bay) An alternative to E-bay is a website known as QXL, although its not globally as big as e-bay it offers a direct alternative.

  2. AQA Computing CPT3

    and the dispensed petrol clock (variable - fuelClock). The button will also change the current pump status of "Pump Is In Use" to "Pump Stopped, Replace Nozzle". The Replace Nozzle button will change the current status of the pump from "Pump Stopped, Replace Nozzle" to "Awaiting Payment", this will allow

  1. Smart Card System

    1.2 IP protocol TCP sends each datagrams to IP. Of course it has to tell IP the Internet address of the computer at the other end. This is all IP is concerned about. It doesn't care about what is in the datagram, or even in the TCP header.

  2. Flexible Architectures in Communication Security Application

    Digital signatures authenticate the sender. Since only the person holding the private key knows its value, only that person can create a digital signature that others can decrypt with the public key. Figure 1. Public-Key and Secret-Key Ciphers. F(x) G(x) G(x) G(x) Public-Key Cipher Secret-Key Cipher plaintext ciphertext plaintext plaintext ciphertext plaintext public key private

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work