SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Smart Cards ,[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Agenda ,[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Plastic Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Smart Cards devices VCC Reset Clock GND VPP I/O Reserved Varun Arora | varun@varunarora.in | www.varunarora.in
What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU Varun Arora | varun@varunarora.in | www.varunarora.in
Typical Configurations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Smart Card Readers ,[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Terminal/PC Card Interaction ,[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Communication mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in CLA INS P1 P2 Lc 1..Lc Le
Security Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Password Verification ,[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Cryptographic verification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Biometric techniques ,[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Data storage ,[object Object],[object Object],File types Binary file (unstructured) Fixed size record file Variable size record file Varun Arora | varun@varunarora.in | www.varunarora.in MF DF DF DF EF EF EF EF EF
File Naming and Selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Basic File Related Commands ,[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
Access control on the files ,[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in
An example scenario (institute ID card) MF EF1  (personal data) Name: Varun Arora PF/Roll: 13 EF3  (password) P1 (User password) EF4  (keys) K1 (DOSA’s key) K2 (DOFA’s key) K3 (Registrar’s key) EF2  (Address) #320, MSc (off) 475, SICSR (Res) Security requirements: EF1:  Should be modified only by the DOSA/DOFA/Registrar Readable to all EF2: Card holder should be able to modify Read: Free Write: upon verification by K1, K2 or K3 Read: Free Write: Password Verification (P1) Read: Never Write: Password Verification (P1) Read: Never Write: Once What happens if the user forgets his password? Solution1:  Add supervisor password Solution2:  Allow DOSA/DOFA/Registrar to modify EF3 Solution3:  Allow both to happen EF3  (password) P1 (User password) P2 (sys password) Select: P2 verification Varun Arora | varun@varunarora.in | www.varunarora.in
An example scenario (institute ID card) MF EF1  (personal data) EF4  (keys) EF2  (Address) EF3  (password) DF1 (Lib) EF1 (Issue record) EF2 (Privilege info) Max Duration: 20 days Max Books: 10 Reserve Collection: Yes Modifiable: By issue staff. Read all Modifiable: By admin staff. Read: all EF3: Keys K1: Issue staff key K2: Admin staff key Library manages its own keys in EF3 under DF1 Institute manages its keys and data under MF Thus library can develop applications independent of the rest. Varun Arora | varun@varunarora.in | www.varunarora.in Bk# dt issue dt retn Bk# dt issue dt retn Bk# dt issue dt retn Bk# dt issue dt retn
How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK” Varun Arora | varun@varunarora.in | www.varunarora.in
Status of smart card deployments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Varun Arora | varun@varunarora.in | www.varunarora.in

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
Smart card
Smart cardSmart card
Smart card
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Smart card
Smart card Smart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart card security
Smart card securitySmart card security
Smart card security
 

Andere mochten auch

Andere mochten auch (6)

Green computing
Green computingGreen computing
Green computing
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Mechanical Engineering
Mechanical EngineeringMechanical Engineering
Mechanical Engineering
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Ähnlich wie Smart Cards

Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.pptssuser1b4013
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfssuser5b47c8
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptxDEVIKAS92
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport systemEdgefxkits & Solutions
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfssuser5b47c8
 
Mooney Patent Summary
Mooney Patent SummaryMooney Patent Summary
Mooney Patent SummaryBamaGolfNut
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesIRJET Journal
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Prathan Phongthiproek
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptAjaySahre
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.pptKumar290483
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 

Ähnlich wie Smart Cards (20)

Smart Card
Smart CardSmart Card
Smart Card
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
dewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdfdewanshuppt-130808103546-phpapp02.pdf
dewanshuppt-130808103546-phpapp02.pdf
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Card reader
Card readerCard reader
Card reader
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011   RFID - NÂO ENVIADO AO EVENTONullcon 2011   RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
 
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011   RFID - NÂO ENVIADO AO EVENTONullcon 2011   RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
 
smartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdfsmartcard-090723101806-phpapp01.pdf
smartcard-090723101806-phpapp01.pdf
 
Mooney Patent Summary
Mooney Patent SummaryMooney Patent Summary
Mooney Patent Summary
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt51775454-SMART-CARDS.ppt
51775454-SMART-CARDS.ppt
 
Fiduciary Documents
Fiduciary DocumentsFiduciary Documents
Fiduciary Documents
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
M Commerce
M CommerceM Commerce
M Commerce
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Smart Cards

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Smart Cards devices VCC Reset Clock GND VPP I/O Reserved Varun Arora | varun@varunarora.in | www.varunarora.in
  • 6. What’s in a Card? Vcc RST CLK RFU Vpp I/O GND RFU Varun Arora | varun@varunarora.in | www.varunarora.in
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. An example scenario (institute ID card) MF EF1 (personal data) Name: Varun Arora PF/Roll: 13 EF3 (password) P1 (User password) EF4 (keys) K1 (DOSA’s key) K2 (DOFA’s key) K3 (Registrar’s key) EF2 (Address) #320, MSc (off) 475, SICSR (Res) Security requirements: EF1: Should be modified only by the DOSA/DOFA/Registrar Readable to all EF2: Card holder should be able to modify Read: Free Write: upon verification by K1, K2 or K3 Read: Free Write: Password Verification (P1) Read: Never Write: Password Verification (P1) Read: Never Write: Once What happens if the user forgets his password? Solution1: Add supervisor password Solution2: Allow DOSA/DOFA/Registrar to modify EF3 Solution3: Allow both to happen EF3 (password) P1 (User password) P2 (sys password) Select: P2 verification Varun Arora | varun@varunarora.in | www.varunarora.in
  • 20. An example scenario (institute ID card) MF EF1 (personal data) EF4 (keys) EF2 (Address) EF3 (password) DF1 (Lib) EF1 (Issue record) EF2 (Privilege info) Max Duration: 20 days Max Books: 10 Reserve Collection: Yes Modifiable: By issue staff. Read all Modifiable: By admin staff. Read: all EF3: Keys K1: Issue staff key K2: Admin staff key Library manages its own keys in EF3 under DF1 Institute manages its keys and data under MF Thus library can develop applications independent of the rest. Varun Arora | varun@varunarora.in | www.varunarora.in Bk# dt issue dt retn Bk# dt issue dt retn Bk# dt issue dt retn Bk# dt issue dt retn
  • 21. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Card responds with an error (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for verification Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Terminal sends command to select MF again Terminal sends command to read EF1 Card supplies personal data and responds “OK” Card responds “OK” Varun Arora | varun@varunarora.in | www.varunarora.in
  • 22.