Unique ID Card Design for Personal Data Transaction

Authors

  • Aakula Lavanya  Brilliant Institute of Engineering & Technology, Hyderabad, Hyderabad, Telangana, India
  • S. Naveen  Brilliant Institute of Engineering & Technology, Hyderabad, Hyderabad, Telangana, India
  • Animoni Nagaraju  Professor, Sree Dattha Group of Institutions, Sheriguda, Telangana, Hyderabad, India

Keywords:

Smart Card, Access Control, Card Chip, Unique ID Card, Transacts Data.

Abstract

Smart card technology is successfully penetrating the youth market, this market provides an opportunity to develop brand awareness and establish customer loyalty .Smart card solutions are now being deployed that recognize this vulnerability and are making a significant impact in promoting social inclusion. Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control system can be used in managing physical resources, logical resources, or digital resources, for these kinds of things the smart card system is a better solution.

In this paper most important role discusses are smart Card, smart card Reader/Writer and microcontroller unit. Smart card is a chip card embedded with a computer chip that stores and transacts data. This data is associated with either value or information or both and is stored and processed within the card's chip. The card data is transacted through a reader that is part of a computing system. Designing of unique ID card for personal transactions i.e. one ID card is used for the different applications like attendance, access control, money transactions etc. this development is very helpful for the public in daily life.

References

  1. Business Week, "The Fight for Privacy Has Just Begun," Jan. 10, 2002
  2. "A Practical Guide to Biometric Security Technology," by Simon Liu and Mark Silverman, IT Professional, January/February 2001 (www.computer.org/itpro/ homepage/Jan_Feb/security3.htm)
  3. Peter Ventura, "ATM Theft," SANS Institute, Nov. 22, 2000 (rr.sans.org/authentic/ATM_theft.php)
  4. Microcontrollers & Embedded Systems by Anurag Arora.
  5. Embedded Software Development With C by Kai Qian, David Den Haring & Li Cao.
  6. Embedded System Design by FRANK VAHID.
  7. Abadi, M. Burrows, C. Kaufman and B. Lampson. Authentication and delegation with smart-cards.
  8. Technical Report 67, DEC Systems Research Center, October 1990.
  9. P. Barrett. Implementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor Advances in Cryptology: CRYPTO'86 (A. M. Odlyzko ed.), LCNS 263, Springer-Verlag, pp. 311-323, 1987.
  10. S. Brands.Untraceable Off-Line Cash in Wallets with Observers, Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ‘93, Springer, (1994). 9 David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM.
  11. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology: Proc. Crypto'86, Lecture Notes in Computer Science.

Downloads

Published

2015-08-25

Issue

Section

Research Articles

How to Cite

[1]
Aakula Lavanya, S. Naveen, Animoni Nagaraju, " Unique ID Card Design for Personal Data Transaction, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 4, pp.362-366, July-August-2015.