Smart card is one of the greatest achievements in the world of information technology. Similar in size to today 's plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. As an access-control device, smart cards can be used to access server remotely over the Internet and they can make personal and business data available only to the appropriate users. Smart cards provide data portability, security, convenience and the like. According to Gemplus (ref. [19]), smart cards can be categorized into the following .Memory and microprocessor- Memory cards simply store data and can be viewed as a small floppy disk with optional security. A microprocessor card, on the other hand, can add, delete and manipulate information in its memory on the card.
Contact and contactless - Contact smart cards are inserted into a smart card reader, making physical contact with the reader. However, contactless smart cards have an antenna embedded inside the card that enables communication with the reader without physical contact. A combi card combines the two features with a very high level of security.
Smart cards help businesses evolve and expand their products and services in a changing global marketplace. The scope of uses for a smart card has expanded each year to include applications in a variety of markets and disciplines. In recent years, the information age has introduced an array of security and privacy issues that have called for advanced smart card security applications.
"Key to the global village", that is how the Smart Card has been described. Smart Cards will bring big changes to the way people provide and receive information and the way they spend money. They will have a profound impact on retailing and service delivery.
A Smart Card is like an "electronic wallet". It is a standard credit card-sized plastic intelligent
References: 1. Anderson R., and M. Kuhn, (1997) Low Cost Attacks on Tamper Resistant Devices, Security Protocol. 2 7. Fancher C. H. (1997), In your Pocket: Smartcards, IEEE Spectrum (February), pp. 47-53. 8 9. Guillou L. C., et al. (1992), The smart Card: A Standardized Security Device Dedicated to Public cryptology, in G.J. Simmons (Ed.), Contemporary Crypto-logy. The Science of Information Integrity, IEEE Press, pp. 561-613. 10 11. Jurgensen T., and Scott Guthery, Smart Cards: The developer’s toolkit, Prentice Hall PTR Upper Saddle River, NJ. 2002. 12 13. Luca B., et al, (2002), Biometrics authentication with smartcard, IIT TR-08/2002, Online [15/12/02] http://www.iat.cnr.it/attivita/progetti/parametri biomedici.html 14 15. Quisquater J-J. (1997), The adolescence of smart card, Future Generation Computer Systems, pp.13 -37. 16