Smart cards and its dimensions, Other Subject

SMART CARDS

A chip card, smart card, or integrated circuit card (ICC), is in any pocket-sized card with surrounded integrated circuits which can procedure data. This implies that it can obtain input which is processed - by way of the ICC applications - and delivered as an output. There are two wide classes of ICCs. Memory cards hold merely non-volatile memory storage mechanism, and possibly some exact security logic. Microprocessor cards hold volatile memory and microprocessor mechanism. The card is prepared of plastic, usually PVC, but sometimes ABS. The card may insert a hologram to avoid counterfeiting. By smartcards also is a form of strong security verification for single sign-on contained by large organizations and companies .

DIMENSIONS

A "smart card" is also described like this:

  • Magnitude are usually credit card size. The ID-1 of ISO/IEC 7810 normal defines them as 85.60 × 53.98 mm. one more well-liked size is ID-000 which is 25 ×15 mm (commonly used in SIM cards). Both are 0.76 mm thick.
  • have a security system with tamper-resistant assets (example a safe crypto processor, secure file system, human-readable features) and is able of provided that security services (example privacy of information in the memory).
  • Benefit managed by way of a essential administration system which interchanges information and design settings with the card throughout the security system. The later includes card hot listing, updates for application data.
  • Card data is transferred to the essential administration system via card reading devices, for example ticket readers, ATMs etc.
Posted Date: 10/13/2012 3:22:26 AM | Location : United States







Related Discussions:- Smart cards and its dimensions, Assignment Help, Ask Question on Smart cards and its dimensions, Get Answer, Expert's Help, Smart cards and its dimensions Discussions

Write discussion on Smart cards and its dimensions
Your posts are moderated
Related Questions
Defense in Depth                                        Information security must keep information throughout the life span of the information, from the original creation of t

Question 1 Write a long note on the characteristics of a short story 2 Write an analysis and a symbolic study of A Flowering Tree 3 Write a detailed note on Mulk Raj Anan

AUTHENTICATION EFTS transactions may be go together with by methods to validate the card and the card holder. The merchant may manually confirm the card holder's signature, or

PARTIES INVOLVED Cardholder: The owner of the card used to create a purchase; the customer. Card-issuing bank: The financial organization or other organization that

Industrial Law : A comparative analysis between banking and plantation Industry

Problem 1: (a) Describe the process of counseling and show how the technics used by the counselor can have an effect on the client. (b) How does the counselor handle the p

Visit any restaurant, possibly your school cafeteria. The workers and fellow customers will assume that you are an ordinary customer, but you are really a secret shopper (spy) for


I Have to do a 5 minute presentation on Subculture in policing. I just don''t know how to start it. What should I talk about?

what was the condition of the ottoman empire at the beginning of the 20th century