1. Smart Card–Based Information Security
Smart Card–Based Information Security means using smart cards to protect data and user identity. A smart card is a plastic card with an embedded chip that can store data and perform secure operations.
- Provides strong security
- Portable and reliable
- Difficult to duplicate
Examples: ATM cards, SIM cards, Aadhaar cards, Employee ID cards.
2. Smart Card Operating System – Fundamentals
A Smart Card Operating System (SCOS) is software that runs inside the smart card chip.
- Manages memory
- Controls files
- Handles security
- Communicates with card reader
Example: Just like Android runs on a phone, SCOS runs inside a smart card.
3. Design and Implementation Principles of Smart Cards
These principles define how smart cards are designed and implemented securely.
- Security-first design
- Optimized for limited memory and power
- High reliability
- Tamper resistance
Example: ATM cards are designed to resist physical and software attacks.
4. Memory Organization in Smart Cards
Smart cards have limited memory which is divided into different types.
- ROM: Stores operating system (permanent)
- EEPROM / Flash: Stores user data and applications
- RAM: Temporary memory during execution
Example: PIN stored in EEPROM, OS stored in ROM.
5. Smart Card Files
Smart cards store information in the form of files similar to a computer file system.
- Master File (MF): Root directory
- Dedicated File (DF): Sub-directory
- Elementary File (EF): Stores actual data
Example: EF may store user ID or account balance.
6. File Management in Smart Cards
File management controls how files are created, accessed, and deleted in smart cards.
- Access controlled using security rules
- Files protected by PIN or cryptographic keys
Example: Only authorized applications can read balance data.
7. PPS Security Techniques – User Identification
User identification verifies the identity of the card holder.
- PIN verification
- Password
- Biometric authentication
Example: ATM card + PIN verifies the user.
8. Smart Card Security
Smart card security protects cards from unauthorized access and attacks.
- Encryption
- PIN protection
- Secure chip design
- Authentication protocols
Example: Card gets blocked after multiple wrong PIN attempts.
9. Quality Assurance and Testing of Smart Cards
Quality Assurance (QA) ensures smart cards work correctly and securely.
- Functional testing
- Security testing
- Performance testing
- Stress testing
Example: Testing how the card behaves after many incorrect PIN attempts.
10. Smart Card Life Cycle – 5 Phases
- Manufacturing: Card and chip production
- Personalization: User data added
- Issuance: Card issued to user
- Usage: Card used for transactions
- Expiry / Revocation: Card expires or is blocked
Example: ATM card expires after a fixed number of years.
11. Smart Card Terminals
Smart card terminals are devices that read and communicate with smart cards.
- ATM machines
- POS machines
- Card readers
- NFC-enabled mobile devices
Example: ATM machine reads the card and verifies PIN.
Summary
- Smart card provides secure authentication
- Smart Card OS manages memory and security
- Memory types: ROM, EEPROM, RAM
- Files: MF, DF, EF
- Life cycle has 5 phases
- Terminals enable communication with smart cards

No comments:
Post a Comment