30-01-2013, 01:11 PM
SMART CARD
SMART CARD.ppt (Size: 661.5 KB / Downloads: 46)
INTRODUCTION
Firstly we will discuss of the pin description of smart card and how it protect data.
Secondly we will examine how the data is protected through logical controls over the files in the card.
Thirdly we will discuss how the smart card can provide a secure for applications.
LIFE CYCLE OF SMART CARD
Fabrication phase
Pre-personalization phase
Personalization phase
Utilization phase
End of life phase
LOGICAL STRUCTURE AND ACCESS CONTROL
Smart card can be used as disk drive.
The protection of the smart card will be controlled by the application operating system.
Logical file structure:
-It contains one master file (MF), two elementary files (EF).
-Smart card can also store data.
ACCESS CONTROL
The fundamental principle of the access control is based on the presentation of pin numbers and their management.
Levels of access conditions:
Always (ALW)
Card holder verification 1(CHV1)
Card holder verification 2(CHV2)
Administrative (ADM)
Never (NEV)
CONCLUSION
Finally it is concluded that smart card is an intrinsically secure device.
It is safe place to store the valuable information such as private keys, account numbers and valuable personal data.
Smart card can be element of solution to a security problem in the modern world.