Unique ID Card Design for Personal Data Transaction

Authors(3) :-Aakula Lavanya, S. Naveen, Animoni Nagaraju

Smart card technology is successfully penetrating the youth market, this market provides an opportunity to develop brand awareness and establish customer loyalty .Smart card solutions are now being deployed that recognize this vulnerability and are making a significant impact in promoting social inclusion. Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control system can be used in managing physical resources, logical resources, or digital resources, for these kinds of things the smart card system is a better solution.

In this paper most important role discusses are smart Card, smart card Reader/Writer and microcontroller unit. Smart card is a chip card embedded with a computer chip that stores and transacts data. This data is associated with either value or information or both and is stored and processed within the card's chip. The card data is transacted through a reader that is part of a computing system. Designing of unique ID card for personal transactions i.e. one ID card is used for the different applications like attendance, access control, money transactions etc. this development is very helpful for the public in daily life.

Authors and Affiliations

Aakula Lavanya
Brilliant Institute of Engineering & Technology, Hyderabad, Hyderabad, Telangana, India
S. Naveen
Brilliant Institute of Engineering & Technology, Hyderabad, Hyderabad, Telangana, India
Animoni Nagaraju
Professor, Sree Dattha Group of Institutions, Sheriguda, Telangana, Hyderabad, India

Smart Card, Access Control, Card Chip, Unique ID Card, Transacts Data.

  1. Business Week, "The Fight for Privacy Has Just Begun," Jan. 10, 2002
  2. "A Practical Guide to Biometric Security Technology," by Simon Liu and Mark Silverman, IT Professional, January/February 2001 (www.computer.org/itpro/ homepage/Jan_Feb/security3.htm)
  3. Peter Ventura, "ATM Theft," SANS Institute, Nov. 22, 2000 (rr.sans.org/authentic/ATM_theft.php)
  4. Microcontrollers & Embedded Systems by Anurag Arora.
  5. Embedded Software Development With C by Kai Qian, David Den Haring & Li Cao.
  6. Embedded System Design by FRANK VAHID.
  7. Abadi, M. Burrows, C. Kaufman and B. Lampson. Authentication and delegation with smart-cards.
  8. Technical Report 67, DEC Systems Research Center, October 1990.
  9. P. Barrett. Implementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor Advances in Cryptology: CRYPTO'86 (A. M. Odlyzko ed.), LCNS 263, Springer-Verlag, pp. 311-323, 1987.
  10. S. Brands.Untraceable Off-Line Cash in Wallets with Observers, Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ‘93, Springer, (1994). 9 David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM.
  11. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology: Proc. Crypto'86, Lecture Notes in Computer Science.

Publication Details

Published in : Volume 1 | Issue 4 | July-August 2015
Date of Publication : 2015-08-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 362-366
Manuscript Number : IJSRSET151469
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Aakula Lavanya, S. Naveen, Animoni Nagaraju, " Unique ID Card Design for Personal Data Transaction, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 4, pp.362-366, July-August-2015.
Journal URL : http://ijsrset.com/IJSRSET151469

Article Preview

Follow Us

Contact Us