Seminar Report On Smart Cards
Seminar Report On Smart Cards
Guided By Submitted By
1
Smart cards in wireless
INDEX
1. introduction 3
2. overview 3
7. Smart Card ? 8
9. Operating systems 12
10. Programming 12
2
Smart cards in wireless
25. To Do 40
26. Summary 40
3
Smart cards in wireless
1. Introduction
Internet technologies, through intranet and extranet applications, have proven themselves
to be efficient and effective in streamlining existing processes from supply chain
management to manufacturing logistics, from marketing to customer asset management,
and by creating new value chains and businesses. Nevertheless, these changes and
benefits signal only an evolutionary shift in the way we do business. The Internet-enabled
economy resembles the conventional physical market in many aspects. Some of the new
technologies and applications may even be unnecessary. American consumers, for
example, regard smart cards as a redundant payment mechanism when checks, credit
cards and ATM cards do an adequate job for current needs. What is the use of smart
cards? Do we really need them? Will they ever take off?
2. Overview
Today, the SIM card’s basic functionality in wireless communications is subscriber
authentication and roaming. Although such features may be achieved via a centralized
intelligent network (IN) solution or a smarter handset, there are several key benefits that
could not be realized without the use of a SIM card, which is external to a mobile
handset. These benefits—enhanced security, improved logistics, and new marketing
opportunities—are key factors for effectively differentiating wireless service offerings.
This tutorial assumes a basic knowledge of the wireless communications industry and
will discuss the security benefits, logistical issues, marketing opportunities, and customer
benefits associated with smart cards.
Smart cards come in two varieties: microprocessor and memory. Memory cards simply
store data and can be viewed as small floppy disks with optional security. Memory cards
depend on the security of a card reader for their processing. A microprocessor card can
add, delete, and manipulate information in its memory on the card. It is like a miniature
computer with an input and output port, operating system, and hard disk with built- in
security features.
Smart cards have two different types of interfaces. Contact smart cards must be inserted
into a smart-card reader. The reader makes contact with the card module’s electrical
connectors that transfer data to and from the chip. Contactless smart cards are passed near
a reader with an antenna to carry out a transaction. They have a n electronic microchip
and an antenna embedded inside the card, which allow it to communicate without a
4
Smart cards in wireless
physical contact. Contactless cards are an ideal solution when transactions must be
processed quickly, as in mass transit or toll collection.
A third category now emerging is a dual interface card. It features a single chip that
enables a contact and contactless interface with a high level of security.
Two characteristics make smart cards especially well suited for applications in which
security-sensitive or personal data is involved. First, because a smart card contains both
the data and the means to process it, information can be processed to and from a network
without divulging the card’s data. Secondly, because smart cards are portable, users can
carry data with them on the smart card rather than entrusting that information on network
storage or a backend server where the information could be sold or accessed by unknown
persons (see Figure).
A smart card can restrict the use of information to an authorized person with a password.
However, if this information is to be transmitted by radio frequency or telephone lines,
additional protection is necessary. One form of protection is ciphering (scrambling data).
Some smart cards are capable of ciphering and deciphering, so the stored information can
be transmitted without compromising confidentiality. Smart cards can cipher into billions
of foreign languages and choose a different language at random every time they
communicate. This process ensures that only authenticated cards and computers are used
and makes hacking or eavesdropping virtually impossible.
The top five applications for smart cards throughout the world currently are as follows:
5
Smart cards in wireless
The benefits of using smart cards depend on the application. In general, applications
supported by smart cards benefit consumers where their lifestyles intersect with
information access and payment-related processing technologies. These benefits include
the ability to manage or control expenditures more effectively, reduce fraud and
paperwork, and eliminate the need to complete redundant, time-consuming forms. The
smart card also provides the convenience of having one card with the ability to access
multiple services, networks, and the Internet.
Initially, the SIM was specified as a part of the GSM standard to secure access to the
mobile network and store basic network information. As the years have passed, the role
of the SIM card has become increasingly important in the wireless service chain. Today,
SIM cards can be used to customize mobile phones regardless of the standard (GSM,
personal communications service [PCS], satellite, digital cellular system [DCS], etc.).
Today, the SIM is the major component of the wireless market, paving the way to value-
added services. SIM cards now offer new menus, prerecorded numbers for speed dialing,
and the ability to send presorted short messages to query a database or secure
transactions. The cards also enable greeting messages and company logotypes to be
displayed.
Other wireless communications technologies rely on smart cards for their operations.
Satellite communications networks (Iridium and Globalstar) are chief examples.
Eventually, new networks will have a common smart object and a universal identification
module (UIM), performing functions similar to SIM cards.
6
Smart cards in wireless
Smart cards make it easier for households and companies to increase the number of
subscriptions, thereby increasing usage. They also help to create a market for ready-to-
use preowned handsets that require no programming before use.
The SIM card’s chip can be programmed to carry multiple applications. The activation of
new applications can be downloaded to the card over the air, in real time, thereby
reducing the time (and cost) to market.
Providing value-added services such as mobile banking, Web browsing, or travel services
creates a high cost of exit for the customer. Long-distance companies have successfully
7
Smart cards in wireless
used joint programs with airline companies to ensure the long-term loyalty of their
customers. The more services a customer receives, the more difficult it is for the
customer to leave the service provider. Smart cards provide an excellent vehicle for
surrounding the core wireless service with these other valuable services, and packaging-
and service-bundling opportunities are numerous. Examples of such opportunities are as
follows:
Large IT players are deploying public key infrastructure (PKI) to provide secure logical
access to information. PKI is becoming the way to secure messaging and browsing of
private information, leading the way to secure electronic commerce. Smart cards are the
ideal vehicle to transport the digital certificate associated with the trusted third parties of
PKI infrastructures. They provide secure certificate portability and can combine other
security applications such as disk file encryption and secure computer log-on. The
inclusion of smart-card readers in the equipment listed in the PC99 recommendation has
already driven large computer manufacturers to integrate smart-card readers into their
product offer (for example, Hewlett Packard and Compaq).
Government agencies around the world are relying on smart-card technology to secure
off- line portable information, including identification documents and electronic benefit
transfer systems. A Brazilian province has issued its drivers licenses on smart cards to
allow the police to view securely stored ticket information immediately. The U.S.
government is a major early adopter of smart cards. It has instituted numerous smart card
8
Smart cards in wireless
identification programs for its defense department and recently announced that it will
further explore the nationwide use of smart cards for electronic benefit transfers as a
fraud reduction tool.
In the financial industry, large players such as Barclays and Citibank currently use SIM
cards to provide banking information to mobile users via their GSM phones. Electronic
purse systems based on VisaCash, Mondex, Proton, and other schemes are deployed
around the world and account for tens of millions of cards in Asia, Europe, and Latin
America. Major U.S. banks are considering or conducting trials of smart card-based
systems. The push by these major financial services firms will serve to accelerate
consumer acceptance.
7 Smart Card?
A smart card is a credit-card sized
plastic card embedded with an
integrated circuit chip that makes it
"smart". This marriage between a
convenient plastic card and a
microprocessor allows an immense
amount of information to be stored,
accessed and processed either online or
offline. Smart cards can store several
hundred times more data than a
conventional card with a magnetic
9
Smart cards in wireless
card has an antenna coil which communicates with a receiving antenna to transfer
information. Depending on the type of the embedded chip, smart cards can be either
memory cards or processor cards.
As smart cards have embedded microprocessors, they need energy to function and some
mechanism to communicate, receiving and sending the data. Some smart cards have
golden plates, contact pads, at one corner of the card. This type of smart cards are called
Contact Smart Cards. The plates are used to supply the necessary energy and to
communicate via direct electrical contact with the reader. When you insert the card into
the reader, the contacts in the reader sit on the plates. According to ISO7816 standards
the PIN connections are below:
,----, ,----,
| C1 | | C5 | C1 : Vcc = 5V C5 : Gnd
'----' '----' C2 : Reset C6 : Vpp
,----, ,----, C3 : Clock C7 : I/O
| C2 | | C6 | C4 : RFU C8 : RFU
'----' '----'
,----, ,----,
| C3 | | C7 |
'----' '----'
,----, ,----,
| C4 | | C8 |
'----' '----'
I/O : Input or Output for serial data to the integrated circuit inside the card.
Vpp : Programing voltage input (optional use by the card).
Gnd : Ground (reference voltage).
CLK : Clocking or timing signal (optional use by the card).
RST: Either used itself (reset signal supplied from the interface device) or in
combination with an internal reset control circuit (optional use by the card). If
internal reset is implemented, the voltage supply on Vcc is mandatory.
Vcc : Power supply input (optional use by the card).
The readers for contact smart cards are generally a separate device plugged into serial or
USB port. There are keyboards, PCs or PDAs which have built- in readers like GSM cell
phones. They also have embedded readers for GSM style mini smart cards.
10
Smart cards in wireless
Some smart cards do not have a contact pad on their surface.The connection between the
reader and the card is done via radio frequency (RF). But they have small wire loop
embedded inside the card. This wire loop is used as an inductor to supply the energy to
the card and communicate with the reader. When you insert the card into the readers RF
field, an induced current is created in the wire loop and used as an energy source. With
the modulation of the RF field, the current in the inductor, the communication takes
place.
The readers of smart cards usually connected to the computer via USB or serial port. As
the contactless cards are not needed to be inserted into the reader, usually they are only
composed of a serial interface for the computer and an antenna to connect to the card.
The readers for contactless smart cards may or may not have a slot. The reason is some
smart cards can be read upto 1.5 meters away from the reader but some needs to be
positioned a few millimeters from the reader to be read accurately.
There is one another type of smart card, combo card. A combo card has a contact pad for
the transaction of large data, like PKI credentials, and a wire loop for mutual
authentication. Contact smart cards are mainly used in electronic security whereas
contactless cards are used in transportation and/or door locks.
The most common and least expensive smart cards are memory cards. This type of smart
cards, contains EEPROM(Electrically Erasable Programmable Read-Only Memory),
non-volatile memory. Because it is non-volatile when you remove the card from the
reader, power is cut off, card stores the data. You can think of EEPROM, inside, just like
a normal data storage device which has a file system and managed via a microcontroller
(mostly 8 bit). This microcontroller is responsible for accessing the files and accepting
the communication. The data can be locked with a PIN (Personal Identification Number),
your password. PIN's are normally 3 to 8 digit numbers those are written to a special file
on the card. Because this type is not capable of cryptography, memory cards are used in
storing telephone credits, transportation tickets or electronic cash.
Microprocessor cards, are more like the computers we use on our desktops. They have
RAM, ROM and EEPROM with a 8 or 16 bit microprocessor. In ROM there is an
operating system to manage the file system in EEPROM and run desired functions in
RAM.
11
Smart cards in wireless
----------------
| 8 or 16 bit |
Reader <===| microprocessor |-----+
---------------- |
|
|---> RAM
NON-CRYPTOGRAPHIC |
CARD |---> ROM
|
+---> EEPROM
As seen in the diagram above all communication is done over the microprocessor, There
is no direct connection between the memory and the contacts. The operating system is
responsible for the security of the data in memory because the access conditions are
controlled by the OS.
---------------- --------
| 8 or 16 bit | | Crypto |
Reader <===| microprocessor |-----------| Module |
---------------- | --------
|
|---> RAM
CRYPTOGRAPHIC |
CARD |---> ROM
|
+---> EEPROM
With the addition of a crypto module our smart card can now handle complex
mathematical computations regarding to PKI. Because the internal clock rate of
microcontrollers are 3 to 5 MHz, there is a need to add a component, accelerator for the
cryptographic functions. The crypto-cards are more expensive than non-crypto smart
cards and so do microprocessor card than memory cards.
8.3. PC cards
While any IC-embedded card may be called a smart card, its distinguishing feature is its
use for personal activities. For example, PC cards (also known as PCMCIA cards) have
the same characteristics as a smart card but they are used as peripheral devices such as
modems or game cartridges. These PC cards are seldom called smart cards since they are
extension devices without personalization. In this sense, a smart card is a processor card
12
Smart cards in wireless
that allows persons to interact with others digitally to conduct transactions and other
personal activities.
9. Operating Systems
New trend in smart card operating systems is JavaCard Operating System. JavaCard OS
was developed by Sun Microsystems and than promoted to JavaCard Forum. Java Card
OS is popular because it gives independence to the programmers over architecture. And
Java OS based applications could be used on any vendor of smart card that support
JavaCard OS.
Most of the smart cards today use their own OS for underlying communication and
functions. But to give true support for the applications smart cards operating systems go
beyond the simple functions supplied by ISO7816 standards. As a result porting your
application, developed on one vendor, to another vendor of smart card becomes very hard
work.Another advantage of JavaCard OS is, it allows the concept of post- issuance
application loading. This allows you to upgrade the applications on smart card after
delivering the card to the end-user. The importance is, when someone needs a smart card
he/she is in need of a specific application to run. But later the demand can change and
more applications could be necessary.
And also Microsoft is on the smart card highway with Smart Card for Windows.
In a point of view the above Operating Systems are Card-Side API's to develop cardlets
or small programs that run on the card. Also there is Reader-Side API's like OpenCard
Framework and GlobalPlatform.
10. Programming
10.1. CT-API
This API depends on the card terminal used, but supplies generic functions that allow
communication with memory cards and processor cards. This API is a low level interface
to the reader. But still used because it complies with the ISO7816 standards and have a
13
Smart cards in wireless
simple programming logic resembling assembly. You just send code byes along with the
data packets and receive the response.
10.2. PC/SC
10.3. OpenCard
10.4. GlobalPlatform
10.5. To Sum Up
As you could understand from above, the standardization period of smart cards is not
finished. The demand on smart cards is growing on the basis of end-user and developer.
In my opinion, if you are a developer or in a decision making position, you should
carefully analyse all the standards as well as the companies manufacturing smart cards.
As a developer’s point of view, in the near future I think, Java will evaluate itself as the
standard because of portability and cross-platform uses in spite of its slowness and fast
evolution.
14
Smart cards in wireless
In this section there will be applications that uses smart cards for some reason on Linux
environment. If you are a developer of a software and your development environment is
Linux please let me know. I will add you in the list.
11.1. scas
SCAS is a simple program that checks the code inside the card with the code inside the
computer. As an example of showing a way of authentication with memory cards scas is
very good.
11.2. smartcard
smartcard is a general smart card utility in Linux which uses CT-API. With smartcard
utility you can read/write data from/into smart cards. As long as your reader can be
accessed via CT-API, smartcard can be used to control the reader. Currently smartcard
could only be used with memory cards using I2C or 3W protocols. There is also a
GTK+/Gnome graphical front end which support all functions of smartcard utility.
11.3. ssh-smart
ssh-smart is a basic proof-of-concept of ssh identity on smart card, as the author says.
ssh-smart uses smartcard utility to communicate with the smart card. Basically, ssh-
smart-add tool (perl script) call ssh-keygen to generate RSA public and private keys.
Than puts the private key on the memory card. Later the ssh-smart-addagent tool can be
used to extract the private key from the card to use with ssh-agent.
11.4. smarttools-rsa
This is another PAM Module for Unix systems but supports RSA authentication through
your private key on the smart card. You must have a Schlumberger Cyberflex Access
card or Schlumberger Cryptoflex for Windows Card and a working reader to use this
tool.
15
Smart cards in wireless
11.5. smartsign
This utility is some-complete PKI integration with the smart cards. To use you must
establish a working OpenCA and have Schlumberger's "Cyberflex Access 16K" smart
cards. During the certification process of OpenCA, private key and public certificate can
be stored on the smart card and private key, later, could be used with Netscape to sign
outgoing mails and news. Also smartsign supports authentication of local users via a
PAM Module through a public key authentication. Smartsign comes with gpkcs11, a
PKCS#11 implementation, smastsh, a command line shell that allows browsing smart
card contents, sign_sc/verify_sc to sign and verify any file with smart card.
16
Smart cards in wireless
------------------------------------
Total 810
____________________________________
Source: Smart Card Industry Association
Phone cards have become ubiquitous in Western Europe and Asia where coin-operated
public phones are becoming nearly obsolete. These pre-paid cards increase payphone
operator revenues, allow more sophisticated transactions via public phones, and have
become advertising devices as well as collector's items. Although the popularity of phone
cards contributed to a widening acceptance of smart cards by consumers, however,
processor cards are projected to be the fastest growing smart card uses by the year 2000.
17
Smart cards in wireless
Electronic modules embedded in smart cards have contacts by which messages are
exchanged between the card's IC chip and the card reader. International standards such as
ISO 7816 have specified which contact handles what type of data but applications must
be programmed to manage message exchanges that can be used by networked processors.
An interoperable and multi-platform application programming interface (API) is critical
for smart cards to carry out diverse functions. Open standards such as Java smart card
API provides one of several proposed interfaces. Java Card API in particular offers a
development tool for flexible, multi-platform applications–"Write Once, Run
Anywhere"–for devices ranging from Network Computers, Web TV, smart phones and
other consumer appliances. The industry leader Schlumberger, for example, has
introduced EasyFlex and FastOS based on Java API.
13.4. Applications
The ultimate utility of smart cards is in the functions they carry out–for example,
payment process, identification, network computing, health care management, benefits
distribution and so on. Application programs hand le data read by smart card readers and
forward them to central computers located at the other end of the smart card
infrastructure such as payment servers in banks, traffic control centers or mobile phone
centers, credit card companies, transit authorities, governments, Microsoft and other
service providers. Market players and stake holders in this end game for smart cards
include a wide variety of firms and institutions including card issuers, content providers,
Visa and MasterCard, banks, government agencies, security implementers such as Lucent
18
Smart cards in wireless
Technologies, electronics manufacturers such as NEC, and service providers who want to
exploit advantages of smart card technologies.
The smart card effectively breaks the link between the subscriber and the terminal,
allowing the use of any properly equipped terminal and helping to realize the wireless
promise of any-time, anywhere communications. In fact, subscribers need not be
constrained to using voice terminals only. A variety of other mobile communications
devices such as personal digital assistants (PDAs) and personal intelligent communicators
(PICs) are available that may have voice communicatio ns added as an integral part of
their capabilities. If these other devices are equipped for smart cards, the potential for
19
Smart cards in wireless
Wireless customers often require the ability to place and receive calls when traveling
abroad. For these customers, international roaming enabled by smart cards is quite
valuable. For example, Ameritech, AT&T, and GTE ha ve all instituted international
roaming programs using GSM phones and smart cards. The program uses co-branded
smart cards, which corporate customers bring with them when they travel abroad.
Customers are given a telephone number from a GSM carrier, which allows them to be
contacted in any of the countries that have international roaming agreements.
20
Smart cards in wireless
The smart card allows customers to be billed separately for personal and business calls
made on a single phone. For example, Airtel, a Spanish GSM operator, uses a SIM card
with two sets of subscription information—one for corporate and the other for personal
use. Airtel’s dual SIM cards have been well received in the corporate market.
SIM cards provide a secure authentication key transport container from the carrier’s
authentication center to the end-user’s terminal. Their superior fraud protection is enabled
by hosting the cryptographic authentication algorithm and data on the card’s
microprocessor chip. SIM cards can be personal identification number (PIN) protected
and include additional protection against logical attacks. With added PIN code security,
SIM cards offer the same level of security used by banks for sec uring off- line payments.
Because the home network–authentication algorithm also resides in the card, SIM cards
make secure roaming possible. They can also include various authentication mechanisms
for internetwork roaming of different types.
Complete fraud protection (with the exclusion of subscription fraud) can only be
provided in the context of a complete security framework that includes terminal
authentication, an authentication center, and authentication key management. Smart cards
are an essential piece of this environment, but only the complete architecture can allow
fraud reduction and secure roaming.
21
Smart cards in wireless
cards could then combine the three basic security blocks of possession, knowledge, and
characteristics (see Figure ).
14.3 Convenience
One use of the old fashioned memory cards is to replace various identification cards.
Smart cards will combine paper, plastic and magnetic cards used for identification,
automatic teller machines, copiers, toll collection, pay phones, health care and welfare
administration. Universities, firms and governments rely on smart identification cards
since they can contain more detailed data and enable many services to be integrated.
Health care cards, for example, reduce document processing costs by allowing immediate
access to personalized patient information stored in smart cards. Most other smart card
uses combine identification function with specialized purposes as in military PX cards,
government's Electronic Benefit Transfer cards, and university ID cards that are also used
to pay for food and photocopies.
Smart cards reduce transaction costs by eliminating paper and paper handling costs in
hospitals and government benefit payment programs. Contact and contactless toll
payment cards streamline toll collection procedures, reducing labor costs as well as
delays caused by manual systems. Maintenance costs for vending machines, petroleum
dispensers, parking meters and public phones are lowered while reve nues could increase,
about 30% in some estimates, due to the convenience of the smart card payment systems
in these machines.
14.5 Customization
22
Smart cards in wireless
A smart card contains all the data needed to personalize networking, Web connection,
payments and other applications. Using a smart card, one can establish a personalized
network connection anywhere in the world using a phone center or an information kiosk.
Web servers will verify the user's identity and present a customized Web page, an e- mail
connection and other authorized services based on the data read from a smart card.
Personal settings for electronic appliances, including computers, will be stored in smart
cards rather than in the appliances themselves. Phone numbers are stored in smart cards
instead of phones. While appliances become generic tools, users only carry a smart card
as the ultimate networking and personal computing device.
14.6 Multifunctionality
The processing power of a smart card makes it ideal to mix multiple functions. For
example, government benefit cards will also allow users access to other benefit programs
such as health care clinics and job training programs. A college identification card can be
used to pay for food, phone calls and photocopies, to access campus networks and to
register classes. By integrating many functions, governments and colleges can manage
and improve their operations at lower costs and offer innovative services.
15 Marketing Opportunities
In addition to the value-added services they can provide, smart cards pro vide many
marketing opportunities to network operators.
23
Smart cards in wireless
15.4 Advertising
Two services, used in conjunction with smart cards, provide network operators with
possibilities for highly targeted advertising. Short message service (SMS) and cell
broadcast leverage smart cards to send advertising or informational messages that appear
on the handset display to wireless users.
24
Smart cards in wireless
Smart cards were first developed as a payment method to simplify small value
transactions. Commonly called as a stored- value card, the data contained in a smart card
represents a monetary value that can be added or reduced as transactions are carried out.
This has proven to be useful in Western Europe and Asia where public transportation and
public phones are widely used.
In North American, the popularity of checks, credit cards and debit cards makes smart
cards a less attractive alternative. But in countries where the public phone system is less
than optimal, a smart card-based payment system offers convenience without increasing
investment in phone infrastructure. In some countries, the increasing use of smart cards is
also leading to advancements in banking services and the acceptance of credit and deb it
cards by consumers.
16.1 Benefits
A cost effective, secure and convenient alternative to cash transactions is needed as cash
is still the most important payment method in terms of number of transaction. Over 80%
of transactions are made in cash. Smart cards offer several advantages over checks and
credit cards:
25
Smart cards in wireless
Mondex is one of several electronic cash payment systems. Other systems such as
DigiCash are purely a form of electronic cash developed for online transactions.
However, differences between pure electronic cash and smart card (stored value) based
payment system are increasingly less obvious since electronic cash can be stored in a
smart card and exchanged offline and a Mondex card reader can be connected to a
personal computer allowing online transactions.
26
Smart cards in wireless
27
Smart cards in wireless
Even when these issues are resolved and smart cards become a preferred payment method
for electronic commerce, the excitement over smart card technologies and the ready
embrace by many developers of these technologies are due more to the explosion of
applications than to being a convenient form of payment. The smart card platform has
already expanded into the mainstream computing and commercial arena as a versatile
technology to implement innovative services in a mobile network.
Mobile Communications By the year 2000, global mobile networks will enable a real
time connection to anywhere, anytime. Global networks based on low earth orbiting
satellites such as Teledesic and Iridium are in the works or already in operation. Mobile
phones are gearing up to be a truly global communications network via Global Services
for Mobiles (GSM) system. Phones come equipped with a smart card slot to enable
integrated services. For example, Schlumberger's SIM (Subscriber Identification Module)
card can take care of call personalization, payment, security and other services such as
linking your phone with your PC using a GSM phone. A smart network can also operate
through a reader terminal installed at home or in offices, at a convenient store or a gas
station, at an information kiosk in libraries or a phone center at airports or eve n on a
remote hiking trail.
28
Smart cards in wireless
Smart cards go beyond replacing existing cards. Smart cards are interface devices that
allow users to digitally interact with firms, consumers and products in the networked
world. Smart cards are closer to a personal mobile computer.
Electronic Ticketing Traffic management and fare collection systems often impose heavy
operating costs in public transit systems and toll highways. Prepaid cards have proven to
be very effective and popular in saving time and resources in managing traffic and
passenger flows and improving services. Contactless smart cards send data via radio
frequency waves eliminating long lines. The amount of information on smart cards also
allow new type of services which are customized for specific groups of users, and the
user data can be collected and analyzed by a central server further improving services.
Such ticketing systems can also be used in sports arenas, concert halls, amusement parks
and other venues processing admissions.
29
Smart cards in wireless
Smart Vending Smart card vending systems are used for petroleum dispensors, various
vending machines and parking meters. Smart card-based vending systems not only
simplify payment processes but also enable customized services. For example, a smart
parking meter can charge a fraction of a minute or levy different amounts depending on
the customer profile, time of day or zones. Smart vendors also provide marketing
incentives such as discounts and coupons to reward loyal customers based on purchasing
behaviors. Smart vending thus allows a total integration of payment, marketing and
services in a networked enterprise.
The Smart Village envisioned by Schlumberger, the largest smart card seller, illustrates
the vision of a networked world where smart card-based services and products inhabit our
every day lives. This smart marketplace includes: GSM payphones and mobile
telecommunication, private site smart pay phones, smart ticket vending machines at
transit terminals, smart pay and display units at parking lots, smart fuel dispenser at gas
stations, contactless, remote and prepaid card terminals in retail locations, smart health
care management and network access based on secured, personalized smart cards.
30
Smart cards in wireless
Smart resort cards issued and managed by Leapfrog Smart Products Inc. are smart cards
that allow cashless transactions in RV parks for in-park transactions that include
admission and usage fees as well as vending and laundry services. Cards are also used to
record annual membership payments, to grant physical access to the park, and to store
information such as medical records for emergency usage. Several loyalty programs such
as coupons and reward vouchers are also stored and managed on the cards.
The infrastructure required for such an integrated service is relatively simple: doors and
gates, POS terminals in each RV park, vending machines and washers are retrofitted to
accept 8K Gemplus cards which cost about $10.75 each. Operational benefits, as
elaborated by Leapfrog, include:
When customer profiles, product information and payment data are combined, a simple
smart card becomes a versatile operating, marketing and management tool. One Yellow
Rabbit Performance Theatre of Calgary, Canada, has introduced smart card-based season
tickets. Using StarGenix smart cards, the season pass is a convenient and cost-saving
ticketing and stored- value system. The card contains ticket, performance, reservation and
cardholder information as well as a stored- value component redeemable for bar service
and the theatre's products sold at its stores.
The key ingredient for smart cards to succeed is interoperability and standardization in
hardware and applications. Without such standards, potential card issuers and users take a
31
Smart cards in wireless
severe risk in investing in new technologies that may not be compatible with future
generation technologies. Hardware standards have been an integral part of smart card
development in the last few years while application specific standards have only begun to
emerge.
32
Smart cards in wireless
kiosks and LAN terminals to become your personal computer. A key element in allowing
smart cards as a computing platform is an interoperable operating system or an
application programming interface which can be incorporated into smart cards'
processors. A leading candidate is Sun Microsystems' Java smart card API which allows
developers to create multi-platform applications. The much-hyped Network Computers
could become terminals that accept Java-enabled smart cards.
Several large scale pilot projects are aimed at testing the future acceptance of smart cards.
The most publicized try-out during the 1996 Atlanta Summer Olympics had a mixed
result. Regardless, transit authorities in San Francisco, Washington, D.C., and Finland are
rolling out smart card systems for transit management. 120,000 members of Quebec
Soccer Federation of Canada will soon be using smart cards for registration at
tournaments, at McDonald's restaurants, and for several promotional and reward
programs. States of Ohio and Wyoming are testing smart card technologies to deliver
government benefit payments.
33
Smart cards in wireless
Despite growing interests, smart card-based systems are not entirely cost effective
compared to many alternatives when one considers only the immediate costs and
benefits. For example, a welfare benefit distribution program using magnetic-stripe cards
cost less than smart card-based systems due to initial capital investment and the cost of
cards. Nevertheless, long-term benefits are substantial. Ohio expects to reduce its
monthly cost of benefit distribution from $3.84 to $2.89 per household by using smart
cards. In addition, transaction data associated with smart cards allow the state to cut down
benefit frauds and abuses substantially.
Larger and more important benefits are less obvious at this stage of smart card
technologies. Most smart card applications available today seem only to duplicate
functions carried out successfully and effectively by existing methods. The advanced
banking and financial systems and efficient communications networks in the U.S. work
against adopting smart cards. Like cellular phones which may be useful in less developed
countries with limited phone lines and high communications costs, smart cards are
readily accepted in countries where consumers and businesses do not trust checks and
other debt instruments, or there is a high incidence of inflation, fraud, crime and other
factors favoring cash. For smart cards to gain a wider acceptance, interoperable hardware,
simple user interface and more applications must appear to satisfy consumers who expect
to use the same card in different retail outlets and for different purposes. Considering that
Java smart card API was introduced in 1996, smart card technologies do have enormous
potential to become the next killer application for the digital economy.
34
Smart cards in wireless
The solution is not to equip highways and automobiles with powerful computers but to
engineer them to interact with smart devices. With an accurate global positioning system,
sensors need not be embedded in highways. The location of a vehicle can be determined
by interfacing an automobile's computer with a satellite. Much of the automobile's
computing is done through smart cards and remotely connected servers. Similarly,
consumer appliances can be equipped with smart card readers instead of installing
product-specific computers. For example, cellular phones interact with smart cards to
access personal information instead of storing it in each phone. In essence, smart network
computers and smart products can be less powerful and more standardized when
interfaced with smart cards.
A smart card-enabled system offers a versatile management tool in such an economy. For
example, smart credit cards issued by American Express can be loaded up with airline
tickets and hotel reservations. A travel plan may also include rental cars, admissions to
concerts and amusement parks, long distance phone bills, food and drinks. Arrangements
may change in real time necessitating coordination and adjustments among different
vendors. Such an integrated product or service has to be managed by computers and
requires spontaneous interactions with all parties involved. Instead of carrying a personal
computer to do the job, all transactions within such an integra ted (‘portfolio’) service
plan can be managed through a single smart card by inserting it into a public or mobile
phone or a network terminal at business locations.
35
Smart cards in wireless
Think that, you are working in a company with many branch offices and many facilities.
In such large companies often employers have access permissions to different physical
places. Also you access the servers inside the company for various purposes like sending
mail, uploading the web pages and accessing the databases of the company. Just think,
one password for each server and one key for each door and some money in your wallet
to buy food or drink from the local restaurant.
Actually you could just use a smart card. If you use a microprocessor card and a the cards
operating software or Java cardlets permit, you could use only one card for all these. For
this scenario to work, the company must establish a local CA, Certificate Authority.
Below there is a diagram showing the structure of a PKI simply, as described in RFC
2459.
+---+
| C | +------------+
| e | <-------------------->| End entity |
| r | Operational +------------+
| t | transactions ^
| | and management | Management
| / | transactions | transactions
| | | PKI users
| C | v
| R | -------------------+--+-----------+----------------
| L | ^ ^
| | | | PKI management
| | v | entities
| R | +------+ |
| e | <---------------------| RA | <---+ |
| p | Publish certificate +------+ | |
| o | | |
| s | | |
| I | v v
| t | +------------+
| o | <------------------------------| CA |
| r | Publish certificate +------------+
| y | Publish CRL ^
| | |
+---+ Management |
transactions |
v
+------+
| CA |
+------+
36
Smart cards in wireless
end entity: user of PKI certificates and/or end user system that is the subject of a
certificate;
RA: registration authority, i.e., an optional system to which a CA delegates
certain management functions; (in some implementations, where you register your
self to the system)
CA: certification authority; (Your public key, can be issue when you register
yourself or can be self- issued, is signed and your certificate is issued to you at
CA)
repository: a system or collection of distributed systems that store certificates and
CRLs, Certificate Revocation Lists, and serves as a means of distributing these
certificates and CRLs to end entities.
In fact, this is just a simplified view of the entities PKI. The employer or the end entity
just applies to the CA or RA to get a certificate A certificate is just a public key digitally
signed with the issuer's, CA, private key. By signed with the CA's private key, all which
trust the CA, can also trust the end entity. Your digital ID is ready. Just write your digital
ID and private key to your smart card. Or a better way, new smart cards are deployed
with embedded functions that generate public and private keys inside the card which
means your private key is not exported to anywhere.
New deployed cards are capable of PKI functions which you do not need to export the
private key to the application you use. For example when you want to send a signed mail,
your mail applications first generates a hash of the document you just wrote and starts the
communication with the card. Your application sends the hash value to the card which is
than signed with your private key inside the card. By this way your private key is never
exported to the public, your computer.
Also, while accessing your remote shell account you could use ssh, secure shell, client. In
man page of OpenSSH, an authentication method for ssh protocol 2 is described. Main
purpose of the method is true identification of the person trying to access the account and
secure connection between the host, if the user is accepted. Theoretically, only you can
know your private key. Although your private key is only readable by yourself, this could
be a security risk. But if your private key is inside a smart c ard, this is an increased
security. Of course, a smart card can get lost. But at this point another security subject is
on the line, your PIN. Generally speaking, smart card's security comes from two things,
one you know and one you own.
SSH is not the only application that smart cards can be used. Other applications like,
money transactions on the net, identification of yourself to the website you connect can
be done with smart cards. The system is more or less the same. Your identification is
checked via your private key and secure session is started with your keys. Than
application specific part comes which is designed and deployed by the service provider of
the application. Some money transactions are just done inside the smart card but some
applications just ask the card for your banking account number. There could be more
methods.
37
Smart cards in wireless
Electronic locks that can communicate with a smart card can be found on the market. PKI
can support, in addition to the mutual authentication between the card and the reader,
access accounting in the building. Just mutual authentication can be used or the lock ask
to a local server that keeps the user data and checks if the user is permitted to go behind
the door. And whether the permission is granted or not the server keeps the tracks of the
access trials.
With integration of smart cards into PKI world, many more applications could be built.
These application are mostly security specific or to ease the life of the customers.
alt.technology.smartcards
sci.crypt.research
sci.crypt.random- numbers
38
Smart cards in wireless
A good starting point is Movement for the Use of Smart Cards in a Linux Environment
home page, an information central for documentation, project pages and much more.
Please let me know if you have any other leads that can be of interest.
25. TODO
As all HOWTOs should be, this document will retain in "Under Development" phase as
long as smart card technology is not obsolete.
The part about the physical characteristics of smart cards should be re-organized.
In the "Programming" section there must be more information about the standards
of programming smart cards.
A new section of examples must be added.
Scenario section (e.g. Building a Corporate PKI) should be added with in-depth
information. (I will add some time in a few weeks :))
There could be a section about the tamper resistance of smart cards. How tamper
resistance is supplied and how secure is smart cards against new high-tech
gamers. (I have found some references and information but they must be
organized before adding.)
26 Summary
By the year 2000, an estimated 2.8 billion smart cards will be issued annually in the
world. But 70% of these cards will be in use in Western Europe and Asia while North
America will account for only about 12% of the business. Nevertheless, even in North
America, the prospect for processor cards is not as gloomy as phone cards. If the current
trend will persist, there will be over 100 million processor cards in use in North America.
These smart cards allow merchants to integrate products, payment and customer service
and customize pricing and marketing efforts based on real user behaviors in real time.
Smart cards as a secure payment system has garnered the keenest attention in the
marketplace. However, smart cards are an indispensable commercial infrastructure in a
networked marketplace which combine the functions of purses, credit cards, ID cards,
tickets, coupons and tokens with data for personalized settings. The electronic persona in
the digital world will be indeed in the form of a smart card and no enterprise solutions
should ignore its potential impacts on business.
39
Smart cards in wireless
Bibliography
1. Books
2. Websites
www.iec.org
www.bitpipe.com
www.MoTechno.com
www.iosoftware.com
www.cryptocard.com
www.Globalcard2000.com
www.digitcrypto.com
www.dta.co.uk
40