Global Identification of Smart Card Technologies-Safe and Secure: A Research
39 Pages Posted: 9 Jun 2023
Date Written: May 27, 2023
Abstract
Smart card technology is currently popular for global identification. The use of smart cards continues to increase in various fields along with the rapid development of technology. Data security stored on a smart card needs to be a focus of attention to avoid misuse of data by unauthorized parties. It is not enough for the security mechanism to be carried out only during the communication process of sending data, but the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures read and write access to the smart card can only be done if the keys used match the rules. This paper presents an overview of the history, commercialization, technology, standards, and current and future applications of smart cards. Section 1 is an overview of smart cards, including their current global use in identification, verification, and authorization applications through their ability to support transaction processing, information management and multiple applications on a single card. This section also includes a summary of the invention and early development and application of smart cards. The second section describes a typical smart card-based transaction, tracing it from the initial contact between a card and the card reader through the transaction to termination of the transaction. The third section describes the physical characteristics of the smart card, and its associated contact and contactless interfaces, integrated circuit (IC) chip and processor capacity. Section 4 summarizes the international standards associated with smart cards, including those related to interoperability among contact and contactless cards, and their respective reading devices. In Section 5, the focus is a high-level discussion of associated access technologies, including a more detailed look at magnetic stripe and barcode technologies and standards. This section includes a very brief mention of the impact of RISC-based technologies and Sun's Java™ Virtual Machine®. Section 6 discusses smart card security relating to the card's ability to authorize and facilitate electronic, logical, and physical access to controlled applications and physical locations. Also discussed is physical security, which relates to cardholders, environment and cards tampering, and data security, which is related to smart cards ability to support cryptography and cross validation of data stored on the cards across multiple databases for purposes of identification verification. Section 7 concludes this paper with a look at the future of smart card-related developments, including those related to both technology and applications. Technology-related developments include the support of more than a single operating system on the processor chip and peripheral card technologies. Application-related developments include those related to identification, information storage and transaction processing.
Keywords: Smart Card-ATM Card Fraud-Card Trapping-Card Skimming-Card Jamming-Card Phishing-Card Steeling-Program Cracking-Card Steeling-Banking-Debit Card Fraud-Credit Card Fraud-ATM Card Theft-Cash withdrawal Fraud-Exchange Fraud-Bank Related Fraud-Synthetic Account Fraud-Loos of money Fraud-General Fraud-Ot
Suggested Citation: Suggested Citation