Unique ID Card Design for Personal Data Transaction
Keywords:
Smart Card, Access Control, Card Chip, Unique ID Card, Transacts Data.Abstract
Smart card technology is successfully penetrating the youth market, this market provides an opportunity to develop brand awareness and establish customer loyalty .Smart card solutions are now being deployed that recognize this vulnerability and are making a significant impact in promoting social inclusion. Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control system can be used in managing physical resources, logical resources, or digital resources, for these kinds of things the smart card system is a better solution.
In this paper most important role discusses are smart Card, smart card Reader/Writer and microcontroller unit. Smart card is a chip card embedded with a computer chip that stores and transacts data. This data is associated with either value or information or both and is stored and processed within the card's chip. The card data is transacted through a reader that is part of a computing system. Designing of unique ID card for personal transactions i.e. one ID card is used for the different applications like attendance, access control, money transactions etc. this development is very helpful for the public in daily life.
References
- Business Week, "The Fight for Privacy Has Just Begun," Jan. 10, 2002
- "A Practical Guide to Biometric Security Technology," by Simon Liu and Mark Silverman, IT Professional, January/February 2001 (www.computer.org/itpro/ homepage/Jan_Feb/security3.htm)
- Peter Ventura, "ATM Theft," SANS Institute, Nov. 22, 2000 (rr.sans.org/authentic/ATM_theft.php)
- Microcontrollers & Embedded Systems by Anurag Arora.
- Embedded Software Development With C by Kai Qian, David Den Haring & Li Cao.
- Embedded System Design by FRANK VAHID.
- Abadi, M. Burrows, C. Kaufman and B. Lampson. Authentication and delegation with smart-cards.
- Technical Report 67, DEC Systems Research Center, October 1990.
- P. Barrett. Implementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor Advances in Cryptology: CRYPTO'86 (A. M. Odlyzko ed.), LCNS 263, Springer-Verlag, pp. 311-323, 1987.
- S. Brands.Untraceable Off-Line Cash in Wallets with Observers, Lecture Notes in Computer Science 773, Advances in Cryptology: Proc. Crypto ‘93, Springer, (1994). 9 David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM.
- Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology: Proc. Crypto'86, Lecture Notes in Computer Science.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.