IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151469                                                     

Unique ID Card Design for Personal Data Transaction


Aakula Lavanya, S. Naveen, Animoni Nagaraju
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Smart card technology is successfully penetrating the youth market, this market provides an opportunity to develop brand awareness and establish customer loyalty .Smart card solutions are now being deployed that recognize this vulnerability and are making a significant impact in promoting social inclusion. Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control system can be used in managing physical resources, logical resources, or digital resources, for these kinds of things the smart card system is a better solution.

In this paper most important role discusses are smart Card, smart card Reader/Writer and microcontroller unit. Smart card is a chip card embedded with a computer chip that stores and transacts data. This data is associated with either value or information or both and is stored and processed within the card's chip. The card data is transacted through a reader that is part of a computing system. Designing of unique ID card for personal transactions i.e. one ID card is used for the different applications like attendance, access control, money transactions etc. this development is very helpful for the public in daily life.

Aakula Lavanya, S. Naveen, Animoni Nagaraju

Smart Card, Access Control, Card Chip, Unique ID Card, Transacts Data.

  1. Business Week, "The Fight for Privacy Has Just Begun," Jan. 10, 2002
  2. "A Practical Guide to Biometric Security Technology," by Simon Liu and Mark Silverman, IT Professional, January/February 2001 (www.computer.org/itpro/ homepage/Jan_Feb/security3.htm)
  3. Peter Ventura, "ATM Theft," SANS Institute, Nov. 22, 2000 (rr.sans.org/authentic/ATM_theft.php)
  4. Microcontrollers & Embedded Systems by Anurag Arora.
  5. Embedded Software Development With C by Kai Qian, David Den Haring & Li Cao.
  6. Embedded System Design by FRANK VAHID.
  7. Abadi, M. Burrows, C. Kaufman and B. Lampson. Authentication and delegation with smart-cards.
  8. Technical Report 67, DEC Systems Research Center, October 1990.
  9. P. Barrett. Implementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor Advances in Cryptology: CRYPTO'86 (A. M. Odlyzko ed.), LCNS 263, Springer-Verlag, pp. 311-323, 1987.
  10. S. Brands.Untraceable Off-Line Cash in Wallets with Observers, Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ‘93, Springer, (1994). 9 David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM.
  11. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology: Proc. Crypto'86, Lecture Notes in Computer Science.

Publication Details

Published in : Volume 1 | Issue 4 | July-August - 2015
Date of Publication Print ISSN Online ISSN
2015-08-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
362-366 IJSRSET151469   Technoscience Academy

Cite This Article

Aakula Lavanya, S. Naveen, Animoni Nagaraju, "Unique ID Card Design for Personal Data Transaction", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 4, pp.362-366, July-August-2015.
URL : http://ijsrset.com/IJSRSET151469.php