SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Card reader
From Wikipedia, the free encyclopedia
This article is about the hardware device. For the fortune-telling practice using a deck of cards,
see Cartomancy.
This article needs additional citations for verification. Please help improve this
article by adding citations to reliable sources. Unsourced material may be challenged and
removed. (October 2010)
A card reader is a data input device that reads data from a card-shaped storage medium. The first
were punched card readers, which read the paper or cardboard punched cards that were used during the
first several decades of the computer industry to store information and programs for computer systems.
Modern card readers are electronic devices that can read plastic cards embedded with either
a barcode, magnetic strip, computer chip or another storage medium.
A memory card reader is a device used for communication with a smart card or a memory card.
A magnetic card reader is a device used to read magnetic stripe cards, such as credit
cards.[1] A business card reader is a device used to scan and electronically save printed business cards.
Contents
[hide]
 1 Smart card readers
 2 Memory card readers
 3 Access control card reader
o 3.1 Barcode
o 3.2 Biometric
o 3.3 Magnetic stripe
o 3.4 Wiegand card
o 3.5 Proximity card
o 3.6 Smart card
 4 Banking card readers
 5 See also
 6 References
Smart card readers[edit]
See also: Contact smart card and Contactless smart card.
A smart card reader is an electronic device that reads smart cards and
can be found in the following forms:
 Some keyboards have a built-in card reader.
 External devices and internal drive bay card reader devices exist
for personal computers (PC).
 Some laptop models contain a built-in smart card reader and/or
utilize flash upgradeable firmware.
External devices that can read a Personal identification number (PIN) or
other information may also be connected to a keyboard (usually called
"card readers with PIN pad"). This model works by supplying
the integrated circuit on the smart card with electricity and communicating
via protocols, thereby enabling the user to read and write to a
fixed address on the card.
Communication protocols
Name Description
T=0 Asynchronous half-duplex byte-level transmission protocol, defined in ISO/IEC 7816-3
T=1 Asynchronous half-duplex block-level transmission protocol, defined in ISO/IEC 7816-3.
T=2 Reserved for future use.
T=3 Reserved for future use.
Contactless APDU transmission via contactless interface ISO/IEC 14443.
If the card does not use any standard transmission protocol, but uses a
custom/proprietary protocol, it has the communication protocol
designation T=14.[2]
The latest[which?] PC/SC CCID specifications define a new smart
card framework. This framework works with USB devices with the specific
device class 0x0B. Readers with this class do not need device
drivers when used with PC/SC-compliant operating systems, because
the operating system supplies the driver by default.[citation needed]
PKCS#11 is an API designed to be platform-independent, defining a
generic interface to cryptographic tokens such as smart cards. This
allows applications to work without knowledge of the reader details.
Memory card readers[edit]
Main article: Memory card reader
A USB card reader like this one, will typically implement the USB mass storage device
class.
A memory card reader is a device, typically having a USB interface, for
accessing the data on a memory card such as
a CompactFlash (CF), Secure Digital (SD) orMultiMediaCard (MMC).
Most card readers also offer write capability, and together with the card,
this can function as a pen drive.
Access control card reader[edit]
Access control card readers are used in physical security systems to read
acredential that allows access through access control points, typically a
locked door. An access control reader can be a magnetic stripe reader,
a bar code reader, a proximity reader, a smart card reader, or
a biometric reader.
Access control readers are classified by functions they are able to perform
and by identification technology:
Barcode[edit]
A barcode is a series of alternating dark and light stripes that are read by
an optical scanner. The organization and width of the lines is determined
by the bar code protocol selected. There are many different protocols,
such as the prevalentCode 39.[3] Sometimes the digits represented by the
dark and light bars are also printed to allow people to read the number
without an optical reader.
The advantage of using barcode technology is that it is cheap and easy to
generate the credential and it can easily be applied to cards or other items.
However the same affordability and simplicity makes the technology
susceptible to fraud, because fake barcodes can also be created cheaply
and easily, for example byphotocopying real ones. One attempt to reduce
fraud is to print the barcode using carbon-based ink, and then cover the
bar code with a dark red overlay. The barcode can then be read with an
optical reader tuned to the infrared spectrum, but can not easily be copied
by a copy machine. This does not address the ease with which barcode
numbers can be generated from a computer using almost any printer.
Biometric[edit]
This section appears to be written like an advertisement. Please help improve itby
rewriting promotional content from a neutral point of view and removing any
inappropriate external links. (April 2011)
IP access control
IP fingerprint reader
Media type Internet Protocol
Capacity 10000 templates
Developed by Suprema Inc.
Usage fingerprint identification, access control
There are several forms of biometric identification employed in access
control:fingerprint, hand geometry, iris and facial recognition. Biometric
technology has been promoted for its ability to significantly increase the
security level of systems. Proponents claim that the technology eliminates
such problems as lost, stolen or loaned ID cards and forgotten PINs.[citation
needed]
All biometric readers work similarly, by comparing the template stored in
memory to the scan obtained during the process of identification. If there
is a high enough degree of probability that the template in the memory is
compatible with the live scan (the scan belongs to the authorized person),
the ID number of that person is sent to a control panel. The control panel
then checks the permission level of the user and determines whether
access should be allowed. The communication between the reader and
the control panel is usually transmitted using the industry
standard Wiegand interface. The only exception is the intelligent biometric
reader, which does not require any panels and directly controls all door
hardware.
Biometric templates may be stored in the memory of readers, limiting the
number of users by the reader memory size (there are reader models that
have been manufactured with a storage capacity of up to 50,000
templates). User templates may also be stored in the memory of the smart
card, thereby removing all limits to the number of system users (finger-
only identification is not possible with this technology), or a
central server PC can act as the template host. For systems where a
central server is employed, known as "server-based verification", readers
first read the biometric data of the user and then forward it to the main
computer for processing. Server-based systems support a large number
of users but are dependent on the reliability of the central server, as well
ascommunication lines.
1-to-1 and 1-to-many are the two possible modes of operation of a
biometric reader:
 In the 1-to-1 mode a user must first either presenting an ID card or
enter a PIN. The reader then looks up the template of the
corresponding user in the database and compares it with the live
scan. The 1-to-1 method is considered more secure and is generally
faster as the reader needs to perform only one comparison. Most 1-
to-1 biometric readers are "dual-technology" readers: they either have
a built-in proximity, smart card or keypad reader, or they have an
input for connecting an external card reader.
 In the 1-to-many mode a user presents biometric data such as a
fingerprint or retina scan and the reader then compares the live scan
to all the templates stored in the memory. This method is preferred by
most end-users, because it eliminates the need to carry ID cards or
use PINs. On the other hand this method is slower, because the
reader may have to perform thousands of comparison operations until
it finds the match. An important technical characteristic of a 1-to-many
reader is the number of comparisons that can be performed in one
second, which is considered the maximum time that users can wait at
a door without noticing a delay. Currently most 1-to-many readers are
capable of performing 2,000–3,000 matching operations per second.
Magnetic stripe[edit]
See also: Magnetic stripe card
Magnetic stripe technology, usually called mag-stripe, is so named
because of the stripe of magnetic oxide tape that is laminated on a card.
There are three tracks of data on the magnetic stripe. Typically the data
on each of the tracks follows a specific encoding standard, but it is
possible to encode any format on any track. A mag-stripe card is cheap
compared to other card technologies and is easy to program. The
magnetic stripe holds more data than a barcode can in the same space.
While a mag-stripe is more difficult to generate than a bar code, the
technology for reading and encoding data on a mag-stripe is widespread
and easy to acquire. Magnetic stripe technology is also susceptible to
misreads, card wear, and data corruption. These cards are also
susceptible to some forms of skimming where external devices are placed
over the reader to intercept the data read.
Wiegand card[edit]
Wiegand card technology is a patented technology using
embedded ferromagnetic wires strategically positioned to create a unique
pattern that generates the identification number. Like magnetic
stripe or barcode technology, this card must be swiped through a reader
to be read. Unlike the other technologies, the identification media is
embedded in the card and not susceptible to wear. This technology once
gained popularity because it is difficult to duplicate, creating a high
perception of security. This technology is being replaced by proximity
cards, however, because of the limited source of supply, the relatively
better tamper resistance of proximity readers, and the convenience of the
touch-less functionality in proximity readers.
Proximity card readers are still referred to as "Wiegand output readers",
but no longer use the Wiegand effect. Proximity technology retains
the Wiegand upstream data so that the new readers are compatible with
old systems.
Proximity card[edit]
Access control
Proximity reader with keypad
Developed by Elko International
Usage access control
A proximity reader radiates a 1" to 20" electrical field around itself. Cards
use a simple LC circuit. When a card is presented to the reader, the
reader's electrical field excites a coil in the card. The coil charges
a capacitor and in turn powers anintegrated circuit. The integrated circuit
outputs the card number to the coil, which transmits it to the reader.
A common proximity format is 26-bit Wiegand. This format uses a facility
code, sometimes also called a site code. The facility code is a unique
number common to all of the cards in a particular set. The idea is that an
organization will have their own facility code and a set of numbered cards
incrementing from 1. Another organization has a different facility code and
their card set also increments from 1. Thus different organizations can
have card sets with the same card numbers but since the facility codes
differ, the cards only work at one organization. This idea worked early in
the technology, but as there is no governing body controlling card
numbers, different manufacturers can supply cards with identical facility
codes and identical card numbers to different organizations. Thus there
may be duplicate cards that allow access to multiple facilities in one area.
To counteract this problem some manufacturers have created formats
beyond 26-bit Wiegand that they control and issue to organizations.
In the 26-bit Wiegand format, bit 1 is an even parity bit. Bits 2–9 are a
facility code. Bits 10–25 are the card number. Bit 26 is an odd parity bit.
1/8/16/1. Other formats have a similar structure of a leading facility code
followed by the card number and including parity bits for error checking,
such as the 1/12/12/1 format used by some American access control
companies.
1/8/16/1 gives as facility code limit of 255 and 65535 card number
1/12/12/1 gives a facility code limit of 4095 and 4095 card number.
Wiegand was also stretched to 34 bits, 56 bits and many others.
Smart card[edit]
There are two types of smart cards: contact and contactless. Both have
an embedded microprocessor and memory. The smart card differs from
the proximity card in that the microchip in the proximity card has only one
function: to provide the reader with the card's identification number. The
processor on the smart card has an embedded operating system and can
handle multiple applications such as a cash card, a pre-paid membership
card, or an access control card.
The difference between the two types of smart cards is the manner with
which the microprocessor on the card communicates with the outside
world. A contact smart card has eight contact points, which must
physically touch the contacts on the reader to convey information between
them. Since contact cards must be inserted into readers carefully in the
proper orientation, the speed and convenience of such a transaction is not
acceptable for most access control applications. The use of contact smart
cards as physical access control is limited mostly to parking applications
when payment data is stored in card memory, and when the speed of
transactions is not as important.
A contactless smart card uses the same radio-based technology as the
proximity card, with the exception of the frequency band used: it uses a
higher frequency (13.56 MHz instead of 125 kHz), which allows the
transfer of more data, and communication with several cards at the same
time. A contactless card does not have to touch the reader or even be
taken out of a wallet or purse. Most access control systems only read
serial numbers of contactless smart cards and do not utilize the available
memory. Card memory may be used for storing biometric data (i.e.
fingerprint template) of a user. In such case a biometric reader first reads
the template on the card and then compares it to the finger (hand, eye,
etc.) presented by the user. In this way biometric data of users does not
have to be distributed and stored in the memory of controllers or readers,
which simplifies the system and reduces memory requirements.
Smartcard readers have been targeted successfully by criminals in what is
termed a supply chain attack, in which the readers are tampered with
during manufacture or in the supply chain before delivery. The rogue
devices capture customers' card details before transmitting them to
criminals.[4]
Banking card readers[edit]
This section requires expansion. (April
2011)
The Barclays PINsentryChip Authentication Programdevice
Some banks have issued hand-held smartcard readers to their customers
to support different electronic payment applications:
 Chip Authentication Program (CAP) uses EMV banking cards to
authenticate online transactions as a phishing countermeasure.
 Geldkarte is a German electronic purse scheme where card readers
are used to allow the card holder to verify the amount of money
stored on the card and the details of the last few transactions.
See also[edit]
 Access control
 Credential
 Memory card
 Physical security
 Punched card
 Unit record equipment
References[edit]
Wikimedia Commons has media
related to Card readers.
1. Jump up^ "Mobile Credit Card Readers Grow with IOS as Foundation".
Macworld.com. Retrieved March 22, 2012.
2. Jump up^ ISO/IEC 7816-3:2006 Identification cards — Integrated circuit
cards — Part 3: Cards with contacts — Electrical interface and
transmission protocols, clause 8.2.3
3. Jump up^ "Bar Code Basics". Online Conveyor Parts. Retrieved March
22, 2012.
4. Jump up^ Henry Samuel (2008-10-10). "Chip and pin scam 'has netted
millions from British shoppers'". The Telegraph. Retrieved 2008-10-13.
[hide]
 V
 T
 E
Memory cards
Main articles
 Memory card reader
 Comparison of memory cards
 SD Card and MultiMediaCard family comparison
Types
 CompactFlash (CF, CFast)
 Express Card
 JEIDA
 MultiMediaCard (MMC)
 Memory Stick (MS, MS-PRO, MS-PRO HG, MS-XC)
 miCard
 Microdrive (MD)
 MiniCard
 P2 (MicroP2)
 PC Card (PCMCIA, CardBus, CardBay)
 Secure Digital(SDSC, SDHC, SDXC)
 SmartMedia (SM)
 SxS
 Universal Flash Storage (UFS)
 USB
 xD-Picture
 XQD
Categories:
 Computer storage devices
 Smart cards
 Solid-state computer storage media
 USB
Navigation menu
 Create account
 Log in
 Article
 Talk
 Read
 Edit
 View history
Go
 Main page
 Contents
 Featured content
 Current events
 Random article
 Donate to Wikipedia
 Wikimedia Shop
Interaction
 Help
 About Wikipedia
 Community portal
 Recent changes
 Contact page
Tools
Print/export
Languages
 Català
 Dansk
 Deutsch
 Eesti
 한국어
 Bahasa Indonesia
 ‫עברית‬
 Македонски
 Nederlands
 日本語
 Norsk bokmål
 Polski
 Русский
 Suomi
 Svenska
 Українська
 中文
 Edit links
 This page was last modified on 10 February 2014 at 11:45.
 Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. By using this site, you agree to the Terms of
Use and Privacy Policy.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc.,



 100+more
 Smart Card Reader Software
View all images
 Try these too:
 View more
 Images may be subject to copyright.-Send feedback

 www.rfidinfotek.com

 100+more

 190 × 149 - bsdinfotech.com



Card reader

Weitere ähnliche Inhalte

Was ist angesagt?

Mail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxMail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxLesterFajardo5
 
Categories of Hardware Tools in CSS.pptx
Categories of Hardware Tools in CSS.pptxCategories of Hardware Tools in CSS.pptx
Categories of Hardware Tools in CSS.pptxbrigoli pepito
 
1.2 motherboard form factor
1.2  motherboard form factor1.2  motherboard form factor
1.2 motherboard form factorGagandeep Singh
 
ICT LESSON: HISTORY OF COMPUTER
ICT LESSON: HISTORY OF COMPUTERICT LESSON: HISTORY OF COMPUTER
ICT LESSON: HISTORY OF COMPUTERerwin marlon sario
 
The Microsoft Publisher Environment
The Microsoft Publisher EnvironmentThe Microsoft Publisher Environment
The Microsoft Publisher EnvironmentRolly Franco
 
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsx
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsxICT 7 LESSON 3 Buttons and Ports on a Computer.ppsx
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsxbabababababbabbababa
 
The Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxThe Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxMerlouDomael2
 
Inside the computer
Inside the computerInside the computer
Inside the computerZafar Ayub
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2melody77776
 
System’s specification
System’s specificationSystem’s specification
System’s specificationRachel Espino
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardwareiarthur
 

Was ist angesagt? (20)

Storage Device
Storage DeviceStorage Device
Storage Device
 
Mail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptxMail-Merge-and-Label-Generation.pptx
Mail-Merge-and-Label-Generation.pptx
 
Categories of Hardware Tools in CSS.pptx
Categories of Hardware Tools in CSS.pptxCategories of Hardware Tools in CSS.pptx
Categories of Hardware Tools in CSS.pptx
 
1.2 motherboard form factor
1.2  motherboard form factor1.2  motherboard form factor
1.2 motherboard form factor
 
Storage device & media
Storage device & mediaStorage device & media
Storage device & media
 
Ports and Connectors
Ports and ConnectorsPorts and Connectors
Ports and Connectors
 
ICT LESSON: HISTORY OF COMPUTER
ICT LESSON: HISTORY OF COMPUTERICT LESSON: HISTORY OF COMPUTER
ICT LESSON: HISTORY OF COMPUTER
 
The Microsoft Publisher Environment
The Microsoft Publisher EnvironmentThe Microsoft Publisher Environment
The Microsoft Publisher Environment
 
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsx
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsxICT 7 LESSON 3 Buttons and Ports on a Computer.ppsx
ICT 7 LESSON 3 Buttons and Ports on a Computer.ppsx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
COMPUTER STORAGE
COMPUTER STORAGECOMPUTER STORAGE
COMPUTER STORAGE
 
Hard disk
Hard diskHard disk
Hard disk
 
The Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxThe Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptx
 
System's Specification
System's SpecificationSystem's Specification
System's Specification
 
Inside the computer
Inside the computerInside the computer
Inside the computer
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2
 
Microsoft word
Microsoft wordMicrosoft word
Microsoft word
 
audio
audioaudio
audio
 
System’s specification
System’s specificationSystem’s specification
System’s specification
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardware
 

Andere mochten auch

Computer Fundamentals_Chapter 02 bco
Computer Fundamentals_Chapter 02 bcoComputer Fundamentals_Chapter 02 bco
Computer Fundamentals_Chapter 02 bcoSaumya Sahu
 
Computer Fundamentals Chapter 09 io devices
Computer Fundamentals Chapter 09 io devicesComputer Fundamentals Chapter 09 io devices
Computer Fundamentals Chapter 09 io devicesSaumya Sahu
 
Computer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageComputer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageSaumya Sahu
 
Computer Fundamentals Chapter 07 pam
Computer Fundamentals Chapter  07 pamComputer Fundamentals Chapter  07 pam
Computer Fundamentals Chapter 07 pamSaumya Sahu
 
Computer Fundamentals Chapter 14 os
Computer Fundamentals Chapter 14 osComputer Fundamentals Chapter 14 os
Computer Fundamentals Chapter 14 osSaumya Sahu
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsSaumya Sahu
 
Schedule and monitor in mule
Schedule and monitor in muleSchedule and monitor in mule
Schedule and monitor in muleSon Nguyen
 

Andere mochten auch (7)

Computer Fundamentals_Chapter 02 bco
Computer Fundamentals_Chapter 02 bcoComputer Fundamentals_Chapter 02 bco
Computer Fundamentals_Chapter 02 bco
 
Computer Fundamentals Chapter 09 io devices
Computer Fundamentals Chapter 09 io devicesComputer Fundamentals Chapter 09 io devices
Computer Fundamentals Chapter 09 io devices
 
Computer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storageComputer Fundamentals Chapter 08 secondary storage
Computer Fundamentals Chapter 08 secondary storage
 
Computer Fundamentals Chapter 07 pam
Computer Fundamentals Chapter  07 pamComputer Fundamentals Chapter  07 pam
Computer Fundamentals Chapter 07 pam
 
Computer Fundamentals Chapter 14 os
Computer Fundamentals Chapter 14 osComputer Fundamentals Chapter 14 os
Computer Fundamentals Chapter 14 os
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Schedule and monitor in mule
Schedule and monitor in muleSchedule and monitor in mule
Schedule and monitor in mule
 

Ähnlich wie Card reader

Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfssuser5b47c8
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj PawarAnuj Pawar
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfssuser5b47c8
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfssuser5b47c8
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker systemeSAT Publishing House
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Authenticated Access of ATM Cards
Authenticated Access of ATM CardsAuthenticated Access of ATM Cards
Authenticated Access of ATM Cardsijtsrd
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 

Ähnlich wie Card reader (20)

Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
Smart card
Smart cardSmart card
Smart card
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart card
Smart cardSmart card
Smart card
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker system
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Authenticated Access of ATM Cards
Authenticated Access of ATM CardsAuthenticated Access of ATM Cards
Authenticated Access of ATM Cards
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 

Kürzlich hochgeladen

Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negronnegronf24
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...amitlee9823
 
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...only4webmaster01
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
 
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai KokoDubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai Kokokojalkojal131
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...sonalitrivedi431
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.GabrielaMiletti
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...amitlee9823
 
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night StandCall Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Rearing technique of lac insect and their management
Rearing technique of lac insect and their managementRearing technique of lac insect and their management
Rearing technique of lac insect and their managementSaurabhTiwari264113
 
Presentation for the country presentation
Presentation for the country presentationPresentation for the country presentation
Presentation for the country presentationjalal879
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNBruce Bennett
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...amitlee9823
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineBruce Bennett
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...amitlee9823
 

Kürzlich hochgeladen (20)

Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
 
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 9155563397 👗 Top Class Call Girl Service Ban...
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
 
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai KokoDubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
 
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night StandCall Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
 
Rearing technique of lac insect and their management
Rearing technique of lac insect and their managementRearing technique of lac insect and their management
Rearing technique of lac insect and their management
 
Presentation for the country presentation
Presentation for the country presentationPresentation for the country presentation
Presentation for the country presentation
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
 

Card reader

  • 1. Card reader From Wikipedia, the free encyclopedia This article is about the hardware device. For the fortune-telling practice using a deck of cards, see Cartomancy. This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (October 2010) A card reader is a data input device that reads data from a card-shaped storage medium. The first were punched card readers, which read the paper or cardboard punched cards that were used during the first several decades of the computer industry to store information and programs for computer systems. Modern card readers are electronic devices that can read plastic cards embedded with either a barcode, magnetic strip, computer chip or another storage medium. A memory card reader is a device used for communication with a smart card or a memory card. A magnetic card reader is a device used to read magnetic stripe cards, such as credit cards.[1] A business card reader is a device used to scan and electronically save printed business cards. Contents [hide]  1 Smart card readers  2 Memory card readers  3 Access control card reader o 3.1 Barcode o 3.2 Biometric o 3.3 Magnetic stripe o 3.4 Wiegand card o 3.5 Proximity card o 3.6 Smart card  4 Banking card readers  5 See also  6 References Smart card readers[edit]
  • 2. See also: Contact smart card and Contactless smart card. A smart card reader is an electronic device that reads smart cards and can be found in the following forms:  Some keyboards have a built-in card reader.  External devices and internal drive bay card reader devices exist for personal computers (PC).  Some laptop models contain a built-in smart card reader and/or utilize flash upgradeable firmware. External devices that can read a Personal identification number (PIN) or other information may also be connected to a keyboard (usually called "card readers with PIN pad"). This model works by supplying the integrated circuit on the smart card with electricity and communicating via protocols, thereby enabling the user to read and write to a fixed address on the card. Communication protocols Name Description T=0 Asynchronous half-duplex byte-level transmission protocol, defined in ISO/IEC 7816-3 T=1 Asynchronous half-duplex block-level transmission protocol, defined in ISO/IEC 7816-3. T=2 Reserved for future use. T=3 Reserved for future use.
  • 3. Contactless APDU transmission via contactless interface ISO/IEC 14443. If the card does not use any standard transmission protocol, but uses a custom/proprietary protocol, it has the communication protocol designation T=14.[2] The latest[which?] PC/SC CCID specifications define a new smart card framework. This framework works with USB devices with the specific device class 0x0B. Readers with this class do not need device drivers when used with PC/SC-compliant operating systems, because the operating system supplies the driver by default.[citation needed] PKCS#11 is an API designed to be platform-independent, defining a generic interface to cryptographic tokens such as smart cards. This allows applications to work without knowledge of the reader details. Memory card readers[edit] Main article: Memory card reader A USB card reader like this one, will typically implement the USB mass storage device class.
  • 4. A memory card reader is a device, typically having a USB interface, for accessing the data on a memory card such as a CompactFlash (CF), Secure Digital (SD) orMultiMediaCard (MMC). Most card readers also offer write capability, and together with the card, this can function as a pen drive. Access control card reader[edit] Access control card readers are used in physical security systems to read acredential that allows access through access control points, typically a locked door. An access control reader can be a magnetic stripe reader, a bar code reader, a proximity reader, a smart card reader, or a biometric reader. Access control readers are classified by functions they are able to perform and by identification technology: Barcode[edit] A barcode is a series of alternating dark and light stripes that are read by an optical scanner. The organization and width of the lines is determined by the bar code protocol selected. There are many different protocols, such as the prevalentCode 39.[3] Sometimes the digits represented by the dark and light bars are also printed to allow people to read the number without an optical reader. The advantage of using barcode technology is that it is cheap and easy to generate the credential and it can easily be applied to cards or other items. However the same affordability and simplicity makes the technology susceptible to fraud, because fake barcodes can also be created cheaply and easily, for example byphotocopying real ones. One attempt to reduce fraud is to print the barcode using carbon-based ink, and then cover the bar code with a dark red overlay. The barcode can then be read with an optical reader tuned to the infrared spectrum, but can not easily be copied by a copy machine. This does not address the ease with which barcode numbers can be generated from a computer using almost any printer. Biometric[edit] This section appears to be written like an advertisement. Please help improve itby rewriting promotional content from a neutral point of view and removing any
  • 5. inappropriate external links. (April 2011) IP access control IP fingerprint reader Media type Internet Protocol Capacity 10000 templates Developed by Suprema Inc. Usage fingerprint identification, access control There are several forms of biometric identification employed in access control:fingerprint, hand geometry, iris and facial recognition. Biometric technology has been promoted for its ability to significantly increase the security level of systems. Proponents claim that the technology eliminates
  • 6. such problems as lost, stolen or loaned ID cards and forgotten PINs.[citation needed] All biometric readers work similarly, by comparing the template stored in memory to the scan obtained during the process of identification. If there is a high enough degree of probability that the template in the memory is compatible with the live scan (the scan belongs to the authorized person), the ID number of that person is sent to a control panel. The control panel then checks the permission level of the user and determines whether access should be allowed. The communication between the reader and the control panel is usually transmitted using the industry standard Wiegand interface. The only exception is the intelligent biometric reader, which does not require any panels and directly controls all door hardware. Biometric templates may be stored in the memory of readers, limiting the number of users by the reader memory size (there are reader models that have been manufactured with a storage capacity of up to 50,000 templates). User templates may also be stored in the memory of the smart card, thereby removing all limits to the number of system users (finger- only identification is not possible with this technology), or a central server PC can act as the template host. For systems where a central server is employed, known as "server-based verification", readers first read the biometric data of the user and then forward it to the main computer for processing. Server-based systems support a large number of users but are dependent on the reliability of the central server, as well ascommunication lines. 1-to-1 and 1-to-many are the two possible modes of operation of a biometric reader:  In the 1-to-1 mode a user must first either presenting an ID card or enter a PIN. The reader then looks up the template of the corresponding user in the database and compares it with the live scan. The 1-to-1 method is considered more secure and is generally faster as the reader needs to perform only one comparison. Most 1- to-1 biometric readers are "dual-technology" readers: they either have
  • 7. a built-in proximity, smart card or keypad reader, or they have an input for connecting an external card reader.  In the 1-to-many mode a user presents biometric data such as a fingerprint or retina scan and the reader then compares the live scan to all the templates stored in the memory. This method is preferred by most end-users, because it eliminates the need to carry ID cards or use PINs. On the other hand this method is slower, because the reader may have to perform thousands of comparison operations until it finds the match. An important technical characteristic of a 1-to-many reader is the number of comparisons that can be performed in one second, which is considered the maximum time that users can wait at a door without noticing a delay. Currently most 1-to-many readers are capable of performing 2,000–3,000 matching operations per second. Magnetic stripe[edit] See also: Magnetic stripe card Magnetic stripe technology, usually called mag-stripe, is so named because of the stripe of magnetic oxide tape that is laminated on a card. There are three tracks of data on the magnetic stripe. Typically the data on each of the tracks follows a specific encoding standard, but it is possible to encode any format on any track. A mag-stripe card is cheap compared to other card technologies and is easy to program. The magnetic stripe holds more data than a barcode can in the same space. While a mag-stripe is more difficult to generate than a bar code, the technology for reading and encoding data on a mag-stripe is widespread and easy to acquire. Magnetic stripe technology is also susceptible to misreads, card wear, and data corruption. These cards are also susceptible to some forms of skimming where external devices are placed over the reader to intercept the data read. Wiegand card[edit] Wiegand card technology is a patented technology using embedded ferromagnetic wires strategically positioned to create a unique pattern that generates the identification number. Like magnetic stripe or barcode technology, this card must be swiped through a reader to be read. Unlike the other technologies, the identification media is
  • 8. embedded in the card and not susceptible to wear. This technology once gained popularity because it is difficult to duplicate, creating a high perception of security. This technology is being replaced by proximity cards, however, because of the limited source of supply, the relatively better tamper resistance of proximity readers, and the convenience of the touch-less functionality in proximity readers. Proximity card readers are still referred to as "Wiegand output readers", but no longer use the Wiegand effect. Proximity technology retains the Wiegand upstream data so that the new readers are compatible with old systems. Proximity card[edit] Access control Proximity reader with keypad Developed by Elko International Usage access control A proximity reader radiates a 1" to 20" electrical field around itself. Cards use a simple LC circuit. When a card is presented to the reader, the reader's electrical field excites a coil in the card. The coil charges a capacitor and in turn powers anintegrated circuit. The integrated circuit outputs the card number to the coil, which transmits it to the reader. A common proximity format is 26-bit Wiegand. This format uses a facility code, sometimes also called a site code. The facility code is a unique
  • 9. number common to all of the cards in a particular set. The idea is that an organization will have their own facility code and a set of numbered cards incrementing from 1. Another organization has a different facility code and their card set also increments from 1. Thus different organizations can have card sets with the same card numbers but since the facility codes differ, the cards only work at one organization. This idea worked early in the technology, but as there is no governing body controlling card numbers, different manufacturers can supply cards with identical facility codes and identical card numbers to different organizations. Thus there may be duplicate cards that allow access to multiple facilities in one area. To counteract this problem some manufacturers have created formats beyond 26-bit Wiegand that they control and issue to organizations. In the 26-bit Wiegand format, bit 1 is an even parity bit. Bits 2–9 are a facility code. Bits 10–25 are the card number. Bit 26 is an odd parity bit. 1/8/16/1. Other formats have a similar structure of a leading facility code followed by the card number and including parity bits for error checking, such as the 1/12/12/1 format used by some American access control companies. 1/8/16/1 gives as facility code limit of 255 and 65535 card number 1/12/12/1 gives a facility code limit of 4095 and 4095 card number. Wiegand was also stretched to 34 bits, 56 bits and many others. Smart card[edit] There are two types of smart cards: contact and contactless. Both have an embedded microprocessor and memory. The smart card differs from the proximity card in that the microchip in the proximity card has only one function: to provide the reader with the card's identification number. The processor on the smart card has an embedded operating system and can handle multiple applications such as a cash card, a pre-paid membership card, or an access control card. The difference between the two types of smart cards is the manner with which the microprocessor on the card communicates with the outside world. A contact smart card has eight contact points, which must physically touch the contacts on the reader to convey information between
  • 10. them. Since contact cards must be inserted into readers carefully in the proper orientation, the speed and convenience of such a transaction is not acceptable for most access control applications. The use of contact smart cards as physical access control is limited mostly to parking applications when payment data is stored in card memory, and when the speed of transactions is not as important. A contactless smart card uses the same radio-based technology as the proximity card, with the exception of the frequency band used: it uses a higher frequency (13.56 MHz instead of 125 kHz), which allows the transfer of more data, and communication with several cards at the same time. A contactless card does not have to touch the reader or even be taken out of a wallet or purse. Most access control systems only read serial numbers of contactless smart cards and do not utilize the available memory. Card memory may be used for storing biometric data (i.e. fingerprint template) of a user. In such case a biometric reader first reads the template on the card and then compares it to the finger (hand, eye, etc.) presented by the user. In this way biometric data of users does not have to be distributed and stored in the memory of controllers or readers, which simplifies the system and reduces memory requirements. Smartcard readers have been targeted successfully by criminals in what is termed a supply chain attack, in which the readers are tampered with during manufacture or in the supply chain before delivery. The rogue devices capture customers' card details before transmitting them to criminals.[4] Banking card readers[edit] This section requires expansion. (April 2011)
  • 11. The Barclays PINsentryChip Authentication Programdevice Some banks have issued hand-held smartcard readers to their customers to support different electronic payment applications:  Chip Authentication Program (CAP) uses EMV banking cards to authenticate online transactions as a phishing countermeasure.  Geldkarte is a German electronic purse scheme where card readers are used to allow the card holder to verify the amount of money stored on the card and the details of the last few transactions. See also[edit]  Access control  Credential  Memory card  Physical security  Punched card  Unit record equipment References[edit] Wikimedia Commons has media related to Card readers. 1. Jump up^ "Mobile Credit Card Readers Grow with IOS as Foundation". Macworld.com. Retrieved March 22, 2012.
  • 12. 2. Jump up^ ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols, clause 8.2.3 3. Jump up^ "Bar Code Basics". Online Conveyor Parts. Retrieved March 22, 2012. 4. Jump up^ Henry Samuel (2008-10-10). "Chip and pin scam 'has netted millions from British shoppers'". The Telegraph. Retrieved 2008-10-13. [hide]  V  T  E Memory cards Main articles  Memory card reader  Comparison of memory cards  SD Card and MultiMediaCard family comparison Types  CompactFlash (CF, CFast)  Express Card  JEIDA  MultiMediaCard (MMC)  Memory Stick (MS, MS-PRO, MS-PRO HG, MS-XC)  miCard  Microdrive (MD)  MiniCard  P2 (MicroP2)  PC Card (PCMCIA, CardBus, CardBay)  Secure Digital(SDSC, SDHC, SDXC)  SmartMedia (SM)  SxS  Universal Flash Storage (UFS)  USB  xD-Picture  XQD Categories:
  • 13.  Computer storage devices  Smart cards  Solid-state computer storage media  USB Navigation menu  Create account  Log in  Article  Talk  Read  Edit  View history Go  Main page  Contents  Featured content  Current events  Random article  Donate to Wikipedia  Wikimedia Shop Interaction  Help  About Wikipedia  Community portal  Recent changes  Contact page Tools Print/export Languages  Català  Dansk  Deutsch  Eesti  한국어  Bahasa Indonesia  ‫עברית‬  Македонски  Nederlands  日本語  Norsk bokmål  Polski  Русский
  • 14.  Suomi  Svenska  Українська  中文  Edit links  This page was last modified on 10 February 2014 at 11:45.  Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc.,     100+more
  • 15.  Smart Card Reader Software View all images  Try these too:  View more  Images may be subject to copyright.-Send feedback   www.rfidinfotek.com
  • 16.   100+more   190 × 149 - bsdinfotech.com   