488 results on '"Contactless smart card"'
Search Results
2. The Sufficiency of the 'Contactless Cards' Security Features in Preventing Fraud-A Malaysian Study
- Author
-
Geetha A. Rubasundram and Mansourah Banon Hosany
- Subjects
Psychiatry and Mental health ,Clinical Psychology ,Business ,Pshychiatric Mental Health ,Computer security ,computer.software_genre ,computer ,Contactless smart card - Published
- 2020
- Full Text
- View/download PDF
3. A Recent Open Source Embedded Implementation of the DESFire Specification Designed for On-the-Fly Logging with NFC Based Systems
- Author
-
Maxie D. Schmidt
- Subjects
Security analysis ,Emulation ,Computer science ,Firmware ,business.industry ,Interface (computing) ,computer.software_genre ,Near field communication ,Embedded software ,Embedded system ,business ,computer ,Protocol (object-oriented programming) ,Contactless smart card - Abstract
The Chameleon Mini is a portable device that interfaces with the NFC protocol over RFID. This device is designed to facilitate on-the-fly logging of data exchanges between contactless cards and tag readers operating over NFC in the 13.56 MHz band. It is an indispensible tool for researchers, reverse engineers and system penetration testers that perform security analysis over the protocol. The Chameleon Mini also supports emulation of many contactless card types over NFC that are enabled by contributions to its open source embedded firmware. In 2020, we set out to offer a fully functional open source implementation to provide a frequently requested interface to the complex and proprietary DESFire tag command set and internal architecture specification from within the open source firmware for the Chameleon Mini RevG. In this application note, we describe the technologies utilized, applications of this work, and describe the challenges of the low-level implementation of the embedded software.
- Published
- 2021
- Full Text
- View/download PDF
4. The EMV Standard: Break, Fix, Verify
- Author
-
Ralf Sasse, Jorge Toro-Pozo, and David Basin
- Subjects
FOS: Computer and information sciences ,Authentication ,Computer Science - Cryptography and Security ,business.industry ,Computer science ,media_common.quotation_subject ,Credit card fraud ,Computer security ,computer.software_genre ,Payment ,Issuing bank ,Electronic money ,Smart card ,business ,Cryptography and Security (cs.CR) ,Implementation ,Contactless smart card ,computer ,media_common - Abstract
EMV is the international protocol standard for smartcard payment and is used in over 9 billion cards worldwide. Despite the standard's advertised security, various issues have been previously uncovered, deriving from logical flaws that are hard to spot in EMV's lengthy and complex specification, running over 2,000 pages. We formalize a comprehensive symbolic model of EMV in Tamarin, a state-of-the-art protocol verifier. Our model is the first that supports a fine-grained analysis of all relevant security guarantees that EMV is intended to offer. We use our model to automatically identify flaws that lead to two critical attacks: one that defrauds the cardholder and a second that defrauds the merchant. First, criminals can use a victim's Visa contactless card to make payments for amounts that require cardholder verification, without knowledge of the card's PIN. We built a proof-of-concept Android application and successfully demonstrated this attack on real-world payment terminals. Second, criminals can trick the terminal into accepting an unauthentic offline transaction, which the issuing bank should later decline, after the criminal has walked away with the goods. This attack is possible for implementations following the standard, although we did not test it on actual terminals for ethical reasons. Finally, we propose and verify improvements to the standard that prevent these attacks, as well as any other attacks that violate the considered security properties. The proposed improvements can be easily implemented in the terminals and do not affect the cards in circulation., Comment: Accepted for IEEE S&P 2021
- Published
- 2021
- Full Text
- View/download PDF
5. Risk Assessments of Unattended Smart Contactless Cards
- Author
-
Eric Blancaflor, Ma. Zhenadoah Santos, Cydel John Ariola, Darwin Medel, Andrea Krystel Danao, and Aaron Paul Abellon
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,Process (computing) ,Card reader ,Payment ,computer.software_genre ,Unique identifier ,Identification (information) ,Arduino ,Operating system ,Smart card ,business ,computer ,Contactless smart card ,media_common - Abstract
Contactless smart card technology serves various applications ranging from personal identification to financial payment. A well-known brand, Mifare cards, supplies more than three-quarters of the world's smart contactless cards. When left unprotected and unattended, these cards are potentially vulnerable to external threats that enable an attacker to read the card and steal the UID (Unique Identifier) and write to the card, potentially corrupting it. This study assesses the risk of unattended Mifare Classic smart cards through a simulation of the attack. The mobile applications NFC Tools and Mifare Classic Tool which were installed on an NFC-capable smartphone were utilized as the primary card reader/writer to perform the said functions to the cards. The attack was performed against a Mifare Classic 1K card; Its contents were read and written to and its UID was duplicated/cloned using a UID-writable card and a Proxgrind Chameleon Mini Rebooted. The duplicates/clones were tested on a simulated card system scanner that was built using a CH340G Arduino board and an RC522 module that was designed to accept only the genuine Mifare Classic 1K card. The simulation of the attack presents that cards can easily be accessed, even when placed inside relatively thick layers of wrapping such as inside a wallet and a bag. Once accessed, the UID of the cards was obtained and its memory can also be read and written to. The duplication/cloning process was successfully executed as the simulated card system scanner accepted and recognized the duplicates/clones as if they were the original card.
- Published
- 2021
- Full Text
- View/download PDF
6. Contactless Cards Powered by Light
- Author
-
C. Algora and J.C. Zamorano
- Subjects
Light source ,Terminal (electronics) ,business.industry ,Computer science ,Range (aeronautics) ,Electrical engineering ,Metre ,Smart card ,Data rate ,business ,Contactless smart card ,Common emitter - Abstract
The work described in this paper was developed a system, which allows the use of smart cards as a contactless cards, without physical contact with any terminal. This system is composed of two blocks: a card control terminal and a special wallet, where you may put in the smart card when contactless operation is necessary. This wallet is powered by a solar cell array, when illuminated from a light source into the card control terminal. Contactless operations are especially suitable for quickly data transactions, hands-free operations and applications in high security areas. The system works as a bi-directional infrared data-interface between the smart card and the card control terminal. The operational range is of up to one meter, with an angular mismatch within emitter and receiver of ± 30° in both horizontal and vertical planes. The data rate is 9.6 Kbauds, although the data interface is able to work up to 115 Kbauds. The actual operational range is voluntary limited. We are developing new strategies to improve this limitation.
- Published
- 2020
- Full Text
- View/download PDF
7. The impact of contactless payment on cash usage at an early stage of diffusion
- Author
-
Tobias Trütsch
- Subjects
Statistics and Probability ,Money demand ,Economics and Econometrics ,media_common.quotation_subject ,finance ,010501 environmental sciences ,01 natural sciences ,Cash usage ,0502 economics and business ,ddc:330 ,D12 ,050207 economics ,lcsh:Statistics ,lcsh:HA1-4737 ,Contactless smart card ,C33 ,0105 earth and related environmental sciences ,media_common ,Credit cards ,Actuarial science ,lcsh:HB71-74 ,05 social sciences ,lcsh:Economics as a science ,Contactless payment ,economics ,Debit cards ,Payment ,Cash ,ComputingMilieux_COMPUTERSANDSOCIETY ,Business ,E41 ,E42 - Abstract
This paper explores the impact of contactless payment on consumers’ demand for cash at an early stage of diffusion. The specific devices that are investigated are debit and credit cards, in which the feature is embedded. A novel balanced panel dataset drawn from representative surveys on consumer payment behavior in the USA from 2009 to 2013 is analyzed to account for unobserved heterogeneity in cash usage. The results show that contactless credit and debit cards exert no statistically significant effect on cash usage after controlling for unobserved heterogeneity. Consumers’ decision to use contactless payment is an endogenous choice. Card-affined individuals replace conventional card payments with contactless card payments. Hence, the overall effect on cash usage remains unaffected.
- Published
- 2020
- Full Text
- View/download PDF
8. Contactless Payment Cards: Trends and Barriers to Consumer Adoption in the U.S
- Author
-
Tom Akana and Wei Ke
- Subjects
Product (business) ,Credit card ,Commerce ,Issuer ,media_common.quotation_subject ,Mobile payment ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Business ,Payment ,Contactless smart card ,Debit card ,Payment card ,media_common - Abstract
Since 2017, the payment cards industry has undertaken a concerted effort to bring contactless “tap-and-pay” credit and debit card products to consumers. Payment networks, card issuers, and banks have worked to ensure that contactless cards, which communicate payment information wirelessly to point-of-sale terminals through Near Field Communication technology, are at the forefront of consumers’ minds when they make a purchase. Missing from the discussion of contactless payments, however, is an understanding of consumer interest in the technology; indeed, the current activities are a relaunch of a product that underwhelmed consumers in the mid-2000s. The authors discuss environmental and technological developments that make the current market more receptive to contactless cards and describe the results of a consumer survey on the topic. We conclude that while adoption of contactless card payments is more likely, the path to full adoption has notable barriers that are revealed in the survey results.
- Published
- 2020
- Full Text
- View/download PDF
9. Fully integrated transceiver module with a temperature compensation for high bit rate contactless smart card
- Author
-
Amy Hamidah Salman, Prasetiyo, Trio Adiono, Suksmandhira Harimurti, and Khilda Afifah
- Subjects
Computer science ,business.industry ,020208 electrical & electronic engineering ,Big data ,Ranging ,02 engineering and technology ,020202 computer hardware & architecture ,Compensation (engineering) ,Identification (information) ,Hardware and Architecture ,Transfer (computing) ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Transceiver ,business ,Contactless smart card ,Software ,Computer hardware ,Data rate units - Abstract
Contactless smart card has been applied in various applications, including electronic transaction and personal identification. These applications particularly require a big data transfer, as compared to other applications. Hence, it is very important that the card supports a high-speed data transfer rate. In this paper, we propose a design of a fully integrated transceiver module for contactless smart card that supports a high bit rate data communication, up to 848 kbps. Furthermore, to increase the stability and security of the card, the module is also designed to compensate the applied temperature variation, ranging from −25 to 125 °C.
- Published
- 2019
- Full Text
- View/download PDF
10. Demand Forecast of NFC Mobile Users – A Case Study of Serbian Market
- Author
-
Valentina Radojicic, Dejan Marković, Bojan Stanivuković, and Mladenka Blagojevic
- Subjects
Computer science ,business.industry ,forecast ,Near Field Communication ,lcsh:TA1001-1280 ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Ocean Engineering ,Demand forecasting ,Fuzzy logic ,language.human_language ,Near field communication ,Mobile phone ,mobile users ,language ,fuzzy logic ,lcsh:Transportation engineering ,Serbian ,Telecommunications ,business ,Engineering (miscellaneous) ,Contactless smart card ,Civil and Structural Engineering - Abstract
Near Field Communication (NFC) is a very short-range type of radio communication that is compatible with other contactless communication technologies. It provides enormous possibilities, particularly given that it does not require any particular communication infrastructure. NFC technology has found possible application in contactless cards and mobile phone devices as a communication infrastructure which provides a platform for the development of NFC-based business services. This paper proposes a novel approach to forecasting the number of new users of NFC mobile phones based on fuzzy logic and the Norton-Bass diffusion model. The proposed approach is demonstrated through the case study.
- Published
- 2018
- Full Text
- View/download PDF
11. HB+DB: Distance bounding meets human based authentication
- Author
-
Qiao Hu, Gerhard P. Hancke, Aikaterini Mitrokotsa, Anjia Yang, and Elena Pagnin
- Subjects
Authentication ,SIMPLE (military communications protocol) ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Physical layer ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,business ,Contactless smart card ,Protocol (object-oriented programming) ,Software ,Computer network - Abstract
Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB + protocol by Juels and Weis provides device authentication based on the learning parity with noise ( LPN ) problem and is appropriate for resource-constrained devices, but it has been shown to be vulnerable to a simple man-in-the-middle attack. Subsequent work has focused on modifying the cryptographic properties of the original protocol to mitigate this problem. We propose that this attack could be mitigated using physical layer measures from distance-bounding protocols and simple modifications to devices’ radio receivers. We take the HB + as a reference protocol and combine it with distance-bounding techniques. This hybrid solution, the HB + DB protocol is shown to provide resistance against the man-in-the-middle attacks on HB + as a result of the additional physical-layer mechanisms. We analyze the security of the proposed HB + DB protocol against active man-in-the-middle attacks and present experiments showing how it is practically possible to limit the success of a practical man-in-the-middle attack. We also briefly discuss the possibility that HB + DB could provide some resistance to basic threats scenarios meant to be mitigated by distance-bounding protocols. We make a practical implementation to verify that our proposed method is feasible. Finally, we discuss a proof-of-concept channel for our scheme implemented on a platform equivalent in resources to a contactless smart card/NFC device.
- Published
- 2018
- Full Text
- View/download PDF
12. DIRECTIONS OF USE OF PAYMENT CARD AS INNOVATION OF PAYMENT OF TRANSPORT ORGANIZATIONS SERVICES
- Author
-
Yevhen Yaroslavovych Chaikovskyi, Yaroslav Ivanovych Chaikovskyi, Hryhoriy Leonardovych Monastyrsky, and Ivanna Chaikovska
- Subjects
Finance ,business.industry ,media_common.quotation_subject ,Ukrainian ,TheoryofComputation_GENERAL ,Payment system ,Payment ,language.human_language ,Payment card ,ComputerApplications_MISCELLANEOUS ,Cash ,language ,Business ,Contactless smart card ,Moneyness ,Shadow (psychology) ,media_common - Abstract
It is carried out the analysis of the share of cash outside the banks in the money supply in Ukraine within 2013-2017 and the integral indicator of the level of the shadow economy in Ukraine for 2010-2017. The dynamics of the main indicators of functioning of the payment cards market of Ukraine during 2012-2017 is analysed. The main tendencies of development the market of payment cards in Ukraine are considered. In particular, the dynamics of the number of holders of payment cards and their issuing banks, the development of electronic payment infrastructure, the types of payment cards issued by Ukrainian banks by types of carriers etc. formations, in terms of payment systems, dynamics of the structure of operations using payment cards by volume and quantity are considered in this research. On the basis of the results of the analysis, we have concluded that there is a development of cashless payments by payment cards in Ukraine. The strategic direction for the development of cashless settlements in transport infrastructure has been revealed due to the use of payment contactless cards as an innovative means of payment for services of transport organizations.
- Published
- 2018
- Full Text
- View/download PDF
13. An Improve Three Factor Remote User Authentication Scheme Using Smart Card
- Author
-
Nishant Doshi, Manish Shingala, and Chintan Patel
- Subjects
Authentication ,OpenPGP card ,Biometrics ,business.industry ,Computer science ,Data_MISCELLANEOUS ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Open Smart Card Development Platform ,Smart card ,Electrical and Electronic Engineering ,business ,computer ,Contactless smart card ,Anonymity - Abstract
In this digital era, two entities can exchange the messages over internet even through the physical distance between them is much far. Before exchange they require to authenticate each other via authentication scheme. Biometric is one of the unique feature for each entity and can be accustomed to identify the authenticity of the entity. Motivated by this, many researchers had proposed the various schemes based on biometric feature for authentication using smart card. As smart card is not a temper resistance consummately, various attacks have been identified by the researchers in the biometric based authentication schemes. In this paper we review Wen et al.’s scheme and we find that Wen et al.’s scheme is vulnerable to insider attack, denial of service attack and user anonymity cannot achieve by them. Then we propose new remote user authentication algorithm where our algorithm is secure.
- Published
- 2017
- Full Text
- View/download PDF
14. Secure Smart Card Based Remote User Authentication Scheme for Multi-Server Environment to Eliminate Smart Card Security Breach
- Author
-
S. Saraswathi, S. Renuka Devi, and P. Yogesh
- Subjects
Card security code ,OpenPGP card ,business.industry ,Computer science ,General Chemistry ,Condensed Matter Physics ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,Computational Mathematics ,MULTOS ,General Materials Science ,Open Smart Card Development Platform ,Smart card ,Electrical and Electronic Engineering ,business ,computer ,Contactless smart card ,Common Access Card - Published
- 2017
- Full Text
- View/download PDF
15. Financial Innovation, Payment Choice and Cash Demand - Causal Evidence from the Staggered Introduction of Contactless Debit Cards
- Author
-
Helmut Stix, Hannes Mettler, Nicole Hentschel, and Martin Brown
- Subjects
History ,Authentication ,Polymers and Plastics ,Financial innovation ,business.industry ,media_common.quotation_subject ,Payment ,Industrial and Manufacturing Engineering ,Debit card ,Commerce ,Cash ,Retail banking ,Business ,Business and International Management ,Contactless smart card ,media_common - Abstract
We provide causal evidence on how the improved convenience of electronic payments affects consumer payment choice and cash demand. We study the staggered introduction of contactless debit cards by a retail bank between 2016-2018. Our analysis is based on account-level data for a random sample of 30’000 bank clients and follows a pre-analysis plan. The timing of access to the contactless payment technology is quasi-random across clients, depending only on the expiry date of the pre-existing debit card. We isolate a “convenience effect” of electronic payments by comparing small-value transactions which are eligible for contactless authentication to large value transactions which are not. On average, consumers increase their use of debit cards for small-value payments in response to receiving a contactless card. Contactless cards increase the frequency of transactions among existing card users but do not cause more consumers to use debit cards. Relative to average consumer cash spending on small-value items, the average increase in debit card use is limited. The impact of contactless cards on cash demand is thus economically small and statistically insignificant.
- Published
- 2020
- Full Text
- View/download PDF
16. Hardware Design of Transaction Device based on Contact and Contactless Smart Card
- Author
-
Akhmad Alfaruq, Trio Adiono, and Syifaul Fuada
- Subjects
Battery charger ,Software ,Data exchange ,business.industry ,Computer science ,Controller (computing) ,Smart card ,business ,Database transaction ,Contactless smart card ,Thermal printing ,Computer hardware - Abstract
In this paper, we design and implement the transaction device based on two operation methods, i.e., with contact and without contact with smart cards. The system can be divided into three parts: hardware (transaction device), software (transaction application), and server. In this work, we focus on the hardware design that comprises smart card reader hardware, LCD display - touch panel, and battery charger circuit. ATMEGA 328P was chosen as a data exchange controller between the smart card and smart card reader. In contrast, the Raspberry Pi 3 Model B (single-board computer) was utilized as an application processor due to several features offered, such as I/O, graph processing unit, and enough memory. Our electronic transaction device can be connected to the thermal printer. Therefore, the transactions report (e.g., Top-up, balance check, payment activity, and so on) can be printed out. The developed device has a tiny dimension and lightweight to carry, hence it can be categorized as a portable device (easily moved everywhere).
- Published
- 2019
- Full Text
- View/download PDF
17. Challenge-response mutual authentication protocol for EMV contactless cards
- Author
-
Ossama Al-Maliki and Hisham Al-Assam
- Subjects
Authentication ,Point of sale ,General Computer Science ,Computer science ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Challenge response ,Payment ,computer.software_genre ,Computer security ,Information sensitivity ,Payment protocol ,Authentication protocol ,0202 electrical engineering, electronic engineering, information engineering ,Mobile payment ,020201 artificial intelligence & image processing ,Law ,computer ,Contactless smart card ,Protocol (object-oriented programming) ,media_common - Abstract
Europay MasterCard and Visa (EMV) is the most popular payment protocol with almost 7.1 billion EMV based credit and debit cards around the world. This payment protocol supports different kinds of payment transactions such as Chip & PIN, Chip & signature, contactless card, and mobile payment transactions. This paper focuses on the EMV contactless card transactions and highlights one of such transactions’ vulnerabilities that allows attackers to gain access to most of the EMV card sensitive information using off-the-shelf hardware and software. In the EMV card payment protocol, the EMV card must authenticate itself as a genuine card to the point of Sale (POS) in each transaction while the reverse is not happening. An attacker can take an advantage of such vulnerabilities in the EMV specifications especially in contactless cards due to the wireless connectivity between the cards and POSs. In this paper, we propose a cost-effective mutual-authentication solution that relies on two-way challenge-response between EMV contactless cards and POSs in order to prevent sniffing attacks launched by NFC enabled readers or smartphones. To demonstrate the viability of the proposed authentication protocol, we present a Java framework to illustrate the practicality of the proposed solution. The paper argues that the proposed protocol can be easily integrated into the EMV infrastructure with minor changes at the personalization and transaction phases.
- Published
- 2021
- Full Text
- View/download PDF
18. Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment
- Author
-
Bidyut K. Bhattacharyya, Saraju P. Mohanty, Shirsha Ghosh, Alak Majumder, Joyeeta Goswami, and Abhishek Kumar
- Subjects
Card security code ,OpenPGP card ,business.industry ,Computer science ,media_common.quotation_subject ,Payment system ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Payment ,Computer Science Applications ,Human-Computer Interaction ,Hardware and Architecture ,MULTOS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Smart card ,Electrical and Electronic Engineering ,business ,computer ,Contactless smart card ,Merchant services ,media_common - Abstract
Advancement in payment technologies has an important impact on one's quality of life. Emerging payment technologies create both opportunities and challenges for the future. Being a quick and convenient process, contactless payment gained momentum, especially with merchants, with throughput being the main parameter. However, it poses risks to issuers, as no robust customer verification method is available. Thus, efforts have been underway to evolve and sustain a well-organized, efficient, reliable, and secure unified payment system, which may contribute to the smooth functioning of the market by eliminating obstacles in business.
- Published
- 2017
- Full Text
- View/download PDF
19. Automatic Recognition of Bank Security Card Using Smart Phone
- Author
-
Jin-Ho Kim
- Subjects
Card security code ,Mobile banking ,Smart phone ,Computer science ,business.industry ,05 social sciences ,050801 communication & media studies ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,0508 media and communications ,MULTOS ,0502 economics and business ,Open Smart Card Development Platform ,Smart card ,business ,Contactless smart card ,computer ,050203 business & management - Published
- 2016
- Full Text
- View/download PDF
20. Optimal MIFARE Classic Attack Flow on Actual Environment
- Author
-
Yerim Lee, Hyunjin Ahn, Dong-Guk Han, and Su-Jin Lee
- Subjects
Crypto-1 ,business.industry ,Computer science ,Access control ,Computer security ,computer.software_genre ,Pre-play attack ,Key (cryptography) ,Chosen-ciphertext attack ,Electrical and Electronic Engineering ,Reflection attack ,business ,Contactless smart card ,Stream cipher ,computer - Abstract
MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker’s ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary’s ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.
- Published
- 2016
- Full Text
- View/download PDF
21. A Universal Application Storage System Based on Smart Card
- Author
-
Jie Shen, Yang Ren, Xiao Yang, and Yingjue Cai
- Subjects
Card security code ,OpenPGP card ,business.industry ,Computer science ,020207 software engineering ,Card reader ,02 engineering and technology ,BasicCard ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,Hardware and Architecture ,020204 information systems ,MULTOS ,0202 electrical engineering, electronic engineering, information engineering ,Smart card ,business ,Contactless smart card ,computer ,Software - Abstract
Nowadays, electronic commerce (e-commerce) has brought facilitation to people’s daily lives. Smart-card-based systems are widely used as an implementation, where smart cards act as a secure carrier for small-sized data. However, most of these systems are developed and managed by each service provider individually and repeatedly, which causes both unnecessary work and difficulties in future maintenance. Besides, advantages of smart card technology are not full-fledged for the lack of enough consideration in flexibility and security. To propose a solution, this article presents a Universal Application Storage System, including card side, terminal side, and back-end system. The card side provides a universal and secured infrastructure for data storage, where data are organized and stored in a card file system with several security mechanisms. In the terminal side, a framework for accessing various forms of secure element is presented to simplify the procedures involved in manipulating smart cards. Through this framework, the back-end system is able to establish a direct connection to the card, and performs authorized operations by exchanging commands in a secure channel. The validity of the proposed system is verified at the end of this article, illustrated by an e-coupon system.
- Published
- 2016
- Full Text
- View/download PDF
22. The National Standard Real Situation Conformance Test System for a Nation-wide Interoperable Transportation Card
- Author
-
Ki-Han Lee, Soo-kyung Lee, and Na-kyung Nam
- Subjects
Engineering ,Service (systems architecture) ,Terminal (telecommunication) ,business.industry ,Interoperability ,Computer security ,computer.software_genre ,Metropolitan area ,Field (computer science) ,Public transport ,Smart card ,business ,Contactless smart card ,computer - Abstract
The pre-paid nation-wide interoperable transportation card, which an pay fee of bus, subway, train, and highway with just one card, released in June. 2014. It has started and operated from Seoul, Gyeonggi, and major local metropolitan area. In this paper, after starting of service, we evaluate conformance and interoperability of nation-wide interoperable transportation card system in real situation. Through this, we check the status of its technical operation. For this, we choose 6 region included Seoul, Gyeonggi which are serviced by different transport vendors and check recognition and billing result from field of transportation card terminal. As a result, we can reach that the major nation-wide interoperable transportation card operate normally and deliver CONFIG DF query command. It means nation-wide interoperable transportation card system which use only one card stably adapt the public transport system and it can make user`s public transport use convenience higher through the extension of service area.
- Published
- 2016
- Full Text
- View/download PDF
23. Special Multi-Purpose Card Designed using PIC16F877A and RFID Technology
- Author
-
Cherryla Tobden, Aarfin Ashraf, Rinku Bhutia, Karma Gyatsho, Deepak Rasaily, and Shyam Chhinal
- Subjects
business.industry ,Computer science ,Embedded system ,General Engineering ,Ventra ,business ,Contactless smart card ,Computer hardware - Published
- 2016
- Full Text
- View/download PDF
24. Spatiotemporal Segmentation of Metro Trips Using Smart Card Data
- Author
-
Xue Liu, Chen Tian, Lei Rao, Juanjuan Zhao, Cheng-Zhong Xu, and Fan Zhang
- Subjects
050210 logistics & transportation ,Engineering ,Data collection ,Computer Networks and Communications ,business.industry ,05 social sciences ,Real-time computing ,Aerospace Engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,020204 information systems ,Smart city ,0502 economics and business ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,TRIPS architecture ,Segmentation ,Smart card ,Electrical and Electronic Engineering ,business ,Intelligent transportation system ,computer ,Contactless smart card ,Transaction data - Abstract
Contactless smart card systems have gained universal prevalence in modern metros. In addition to its original goal of ticketing, the large amount of transaction data collected by the smart card system can be utilized for many operational and management purposes. This paper investigates an important problem: how to extract spatiotemporal segmentation information of trips inside a metro system. More specifically, for a given trip, we want to answer several key questions: How long does it take for a passenger to walk from the station gantry to the station platform? How much time does he/she wait for the next train? How long does he/she spend on the train? How long does it take to transfer from one line to another? This segmentation information is important for many application scenarios such as travel time prediction, travel planning, and transportation scheduling. However, in reality, we only assume that only each trip's tap-in and tap-out time can be directly obtained; all other temporal endpoints of segments are unknown. This makes the research very challenging. To the best of our knowledge, we are the first to give a practical solution to this important problem. By analyzing the tap-in/tap-out event pattern, our intuition is to pinpoint some special passengers whose transaction data can be very helpful for segmentation. A novel methodology is proposed to extract spatiotemporal segmentation information: first, for nontransfer trips, by deriving the boarding time between the gantry and the platform, and then, for with-transfer trips, by deriving the transfer time. Evaluation studies are based on large-scale real-system data of the Shenzhen metro system, which is one of the largest metro systems in China and serves millions of passengers daily. Onsite investigations validate that our algorithm is accurate and that the average estimation error is only around 15%.
- Published
- 2016
- Full Text
- View/download PDF
25. Card-Sales Response to Merchant Contactless Payment Acceptance: Causal Evidence
- Author
-
David Bounie and Youssouf Camara
- Subjects
Matching (statistics) ,Commerce ,Spillover effect ,media_common.quotation_subject ,Sample (statistics) ,Business ,Payment ,Contactless smart card ,Difference in differences ,media_common - Abstract
Disruptive innovations in digital payments are happening in a large number of countries around the world. In this paper, we investigate how merchants' acceptance of a contactless card technology affects card sales. Using score matching and difference-in-difference techniques on a unique sample of about 275,580 merchants in France, we find that accepting contactless payments in 2018 increases the card-sales amount by 15.3 percent on average (and by 17.1 percent the card-sales count) compared to merchants who do not accept contactless payments. We also find evidence that accepting contactless payments exerts a positive spillover of about 1.3 percent in the amount of contact card sales, and thus significantly increases the average annual card-sales amount and count for small merchants and new entrepreneurs.
- Published
- 2019
- Full Text
- View/download PDF
26. Algorithm of Trip Destination Estimation Based on E-Card Data – a Case Study on Taichung Urban Bus
- Author
-
Chi-Hua Lu and Chao-Fu Yeh
- Subjects
Estimation ,Walking distance ,Computer science ,business.industry ,Distance error ,Value (economics) ,Smart card ,Urban bus ,business ,Algorithm ,Contactless smart card - Abstract
Smart card data contains a lot of useful information, so both of urban bus and intercity bus are built up the contactless smart card system in Taiwan. Although smart card data can offer useful information, it’s still limited to how the passengers are being charged. This paper focuses on the estimation of the destination of the passenger who takes the bus twice a day and presents an algorithm to estimate the destination location for each individual boarding of the bus with a smart card. To evaluate the accuracy of destination estimation algorithm, this paper selected Taichung urban bus which uses mileage charges as a case study area. According to the results, the estimated accuracy is 63% with the 600 m tolerance distance (allowable walking distance), after considering 500 m of the value of tolerance distance error the accuracy increases to 90%.
- Published
- 2018
- Full Text
- View/download PDF
27. Efficient LFSR Based Distance Bounding Protocol for Contactless EMV Payments
- Author
-
Srinivas Sampalli and Trishla Shah
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Payment ,Payment card ,Relay attack ,law.invention ,Relay ,law ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Smart card ,Distance-bounding protocol ,business ,Contactless smart card ,media_common ,Computer network - Abstract
This paper focuses on relay attacks against EMV based contactless payment cards. EMV is a standard for payments via smart cards. In a typical relay attack on contactless cards, the attacker launches the attack by relaying the legitimate user’s card information to another malicious device, in proximity to the verifier. This technique is used by the attacker to burglarize money from the victim’s card. Designing an efficient distance bounding protocol is a promising solution to defeat relay attacks. We study the dominant payment protocols in EMV contactless cards (Visa’s payWave, Mastercard’s PayPass, and PaySafe) and identify the existing vulnerabilities in these protocols. A practical relay attack on the latest EMV payment protocol - PaySafe is performed. Contactless payments are fast becoming a key instrument in the payment industry, and the future technologies must aim towards convenience and security. We propose a light weight protocol that suits well with the current EMV specification. Our protocol is based on LFSR, which supports exchange of a small string of bits through a time critical channel.
- Published
- 2018
- Full Text
- View/download PDF
28. Contactless Smart Card Experiments in a Cybersecurity Course
- Author
-
Shanshan Li, Yongqiang Chen, and Xiaojun Wu
- Subjects
business.industry ,Computer science ,ComputingMilieux_COMPUTERSANDEDUCATION ,The Internet ,Access control ,Smart card ,business ,Computer security ,computer.software_genre ,Contactless smart card ,computer ,Course (navigation) - Abstract
This Innovate Practice Work in Progress paper is about education on Cybersecurity, which is essential in training of innovative talents in the era of the Internet. Besides knowledge and skills, it is important as well to enhance the students’ awareness of cybersecurity in daily life. Considering that contactless smart cards are common and widely used in various areas, one basic and two advanced contactless smart card experiments were designed innovatively and assigned to junior students in 3-people groups in an introductory cybersecurity summer course. The experimental principles, facilities, contents and arrangement are introduced successively. Classroom tests were managed before and after the experiments, and a box and whisker plot is used to describe the distributions of the scores in both tests. The experimental output and student feedback implied the learning objectives were achieved through the problem-based, active and group learning experience during the experiments.
- Published
- 2018
- Full Text
- View/download PDF
29. Do We Still Need to Pay?
- Author
-
Teresa Connors
- Subjects
business.industry ,Internet privacy ,business ,Contactless smart card - Published
- 2019
- Full Text
- View/download PDF
30. Microcontroller Based Smart Card Car Security System
- Author
-
A. I. Bugaje, A. Z. Loko, and Usman Abdullahi
- Subjects
Microcontroller ,business.industry ,Computer science ,Embedded system ,MULTOS ,General Engineering ,Card reader ,Smart card ,Open Smart Card Development Platform ,business ,Contactless smart card ,Smart card application protocol data unit ,Security system - Published
- 2015
- Full Text
- View/download PDF
31. A novel consumer-centric card management architecture and potential security issues
- Author
-
Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Smart card Centre [Egham], Royal Holloway [University of London] (RHUL), DMI (XLIM-DMI), XLIM (XLIM), and Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Information Systems and Management ,Computer science ,smart card ,02 engineering and technology ,Computer security ,computer.software_genre ,Theoretical Computer Science ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Artificial Intelligence ,MULTOS ,0202 electrical engineering, electronic engineering, information engineering ,Multos ,Contactless smart card ,Card management architecture ,User centric smart cards ,Trusted service manager ,OpenPGP card ,business.industry ,GlobalPlatform ,020207 software engineering ,BasicCard ,Smart card application protocol data unit ,Computer Science Applications ,Java Card ,Control and Systems Engineering ,020201 artificial intelligence & image processing ,Open Smart Card Development Platform ,Smart card ,business ,computer ,Software - Abstract
International audience; Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from different application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited. NFC has recently reinvigorated the multi-application initiative and this time around a number of innovative deployment models are proposed. Such models include Trusted Service Manager (TSM), User Centric Smart Card Ownership Model (UCOM) and GlobalPlatform Consumer-Centric Model (GP-CCM). In this paper, we discuss two of the most widely accepted and deployed smart card management architectures in the smart card industry: GlobalPlatform and Multos. We explain how these architectures do not fully comply with the UCOM and GP-CCM. We then describe our novel flexible consumer-centric card management architecture designed specifically for the UCOM and GP-CCM frameworks, along with ways of integrating the TSM model into the proposed card management architecture. Finally, we discuss four new security issues inherent to any architecture in this context along with the countermeasures for our proposed architecture.
- Published
- 2015
- Full Text
- View/download PDF
32. Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction
- Author
-
Chang-Seop Park and Chan-Ho Park
- Subjects
Card security code ,OpenPGP card ,business.industry ,Computer science ,Card reader ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,Credit card ,Charge card ,Smart card ,business ,Contactless smart card ,computer - Abstract
Financial fraud has been increasing along with credit card usag e. Magnetic stripe cards have vulnerabilities in that credit ca rd information is exposed in plaintext and cardholder verification is untrustworthy. So they have been replaced by a smart card scheme to provide enhanced security. Furthermore, the FinTech t hat combines the IT with Financi al product is being prevalent. For that reason, many mobile device based payment schemes have been proposed for card present transaction. In this paper, we propose a virtual credit card number payment scheme based on pu blic key system for efficient authentication in card present transaction. Our proposed scheme is able to authenticate effici ently in card present transaction by pre-registering virtual cr edit card number based on cardholder's public key without PKI. And w e compare and analyze our proposed scheme with EMV.Keywords: Card Present Transaction, Virtual Credit Card Number, Authenti cation, EMV, FinTech I.서 론 *
- Published
- 2015
- Full Text
- View/download PDF
33. A novel verification method for payment card systems
- Author
-
Abdulrahman Alhothaily, Rongfang Bie, Xiuzhen Cheng, and Arwa Alrawais
- Subjects
Flexibility (engineering) ,Card security code ,Authentication ,Computer science ,business.industry ,media_common.quotation_subject ,Mobile computing ,Payment system ,Management Science and Operations Research ,Payment ,Computer security ,computer.software_genre ,Computer Science Applications ,Payment card ,Hardware and Architecture ,business ,Security level ,Contactless smart card ,computer ,media_common - Abstract
Security plays a crucial role in payment systems; however, some implementations of payment card security rely on weak cardholder verification methods, such as card and a signature, or use the card without having any cardholder verification process at all. Other vulnerable implementations of cardholder verification methods suffer from many security attacks, such as relay attacks and cloning attacks. In addition, the impact of these security attacks is high since they cause monetary losses for banks and consumers. In this paper, we introduce a new cardholder verification method using a multi-possession factor authentication with a distance bounding technique. It adds an extra level of security to the verification process and utilizes the idea of distance bounding which prevents many different security attacks. The proposed method gives the user the flexibility to add one or more extra devices and select the appropriate security level. This paper argues that the proposed method mitigates or removes many popular security attacks that are claimed to be effective in current card based payment systems, and that it can help to reduce fraud on payment cards. Furthermore, the proposed method provides an alternative verification technique and enables cardholders with special needs to use the payment cards and make the payment system more accessible.
- Published
- 2015
- Full Text
- View/download PDF
34. Differentiating ASK Demodulator for Contactless Smart Cards Supporting VHBR
- Author
-
Taehoon Kim, Hyongmin Lee, Jisung Kim, Kim Suhwan, and Dongwoo Ha
- Subjects
Engineering ,business.industry ,Electrical engineering ,Modulation index ,Amplitude-shift keying ,Differentiator ,CMOS ,Ask price ,Electronic engineering ,Demodulation ,Smart card ,Electrical and Electronic Engineering ,business ,Contactless smart card - Abstract
This brief proposes an amplitude shift keying (ASK) demodulator that uses switched-capacitor differentiators to make it compliant with the very high bit rate amendment to the ISO/IEC 14443 standard for contactless smart card applications. These differentiators detect transitions in modulated ASK signals with a carrier frequency of 13.56 MHz at data rates up to 6.78 Mb/s. The demodulator has been implemented in 0.18 μm CMOS technology. The total power consumption is under 350 μW. Measured results confirm correct operation, and it is further shown that this differentiating scheme allows the modulation index to be reduced to 2.56%.
- Published
- 2015
- Full Text
- View/download PDF
35. A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator
- Author
-
Hwajeong Seo, Seonhee Seok, Howon Kim, and Kyoung-hoon Kim
- Subjects
Card security code ,Pseudorandom number generator ,OpenPGP card ,Computer science ,business.industry ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,3-D Secure ,Smart card ,Java Card ,business ,computer ,Contactless smart card ,Computer network - Published
- 2015
- Full Text
- View/download PDF
36. Security Issues with Contactless Bank Cards
- Author
-
Brendan McBride, Kevin Curran, and Nigel McKelvey
- Subjects
Relation (database) ,Data Protection Act 1998 ,Business ,Computer security ,computer.software_genre ,computer ,Contactless smart card - Abstract
Contactless bank cards have been issued steadily to banking customers over the past four years and this trend has continued to grow rapidly more recently. We want to highlight a list of security issues as well as privacy threats to be concerned with when using such contactless bank cards. Further advances in smartphone technology applications can lead to new threats in relation to contactless bank cards. This study contributes to the literature as it highlights data protection issues in Ireland and also highlights the major push by authorities to adopt a cashless banking society which could potentially lead to further data protection problems in Ireland.
- Published
- 2015
- Full Text
- View/download PDF
37. AccelTag
- Author
-
Shin Takahashi, Buntarou Shizuki, and Kazuya Oharada
- Subjects
Liquid-crystal display ,business.industry ,Computer science ,Card reader ,Login ,law.invention ,Identification (information) ,Acceleration ,law ,User identifier ,Smart card ,business ,Contactless smart card ,Computer hardware - Abstract
There are many everyday situations in which users need to enter their user identification (user ID), such as logging in to computer systems and entering secure offices. In such situations, contactless passive IC cards are convenient because users can input their user ID simply by passing the card over a reader. However, these cards cannot be used for successive interactions. To address this issue, we propose AccelTag, a contactless IC card equipped with an acceleration sensor and a liquid crystal display (LCD). AccelTag utilizes high-function RFID technology so that the acceleration sensor and the LCD can also be driven by a wireless power supply. With its built-in acceleration sensor, AccelTag can acquire its direction and movement when it is waved over the reader. We demonstrate several applications using AccelTag, such as displaying several types of information in the card depending on the user's requirements.
- Published
- 2017
- Full Text
- View/download PDF
38. Perancangan Smart Card Reader Menggunakan STM32F4 Discovery Kit
- Author
-
Agus Bejo, Addin Suwastono, and Mohamad Faiz Hamzah
- Subjects
OpenPGP card ,Engineering ,business.industry ,MULTOS ,Embedded system ,Card reader ,Open Smart Card Development Platform ,BasicCard ,Smart card ,business ,Contactless smart card ,Smart card application protocol data unit - Abstract
Smart card has been a new trend as practical and secure authentication solution in online transactions such as epayment, net-banking, e-money, and other online services. The increasing of smart card-based applications demands higher supply of smart card readers as well. Many types of smart card readers in the market have been existed. However, their feature and software are mostly closed and can not be modified to satisfy the application developer’s requirements to optimize the performance and security of the applications. Therefore, a selfdesigned smart card reader is needed to offer flexibility and ability to be costumized in order to satisfy application developer’s needs. In this research, a smart card reader is designed based on 32-bit microcontroller STM32F407VG which is implemented on STM32F4 Discovery Kit. The proposed smart card reader is evaluated by accessing information resides on the JCOP31 smart card which has been pre-installed by applet with certain APDU. Evaluation results show that the proposed smart card reader is able to access smart card properly, having good portability on different platform machines and having good performance as indicated by the CWT and CBT which are faster than the recommended ones.
- Published
- 2017
- Full Text
- View/download PDF
39. Implementation for Personal Document Processing System
- Author
-
Ahmad Qasim Mohammad AlHamad, Waleed Maqableh, Ahmed M. Elshamy, and Asma Qasim
- Subjects
Business information ,Engineering ,business.industry ,Information technology ,02 engineering and technology ,World Wide Web ,ATM card ,Order (business) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mobile technology ,Smart card ,Java Card ,business ,Contactless smart card - Abstract
Business cards are defined as cards which contains some business information about a company or individual. Business card are usually includes a company name or business affiliation with a logo, in addition to some information about cards holders such as (holders name, street addresses, telephone number, fax number, e-mail addresses and website). Nowadays, it became very necessary for these cards to be developed. To keep pace with the revolution of the information and communication technology. From this point it became necessary to find a modern form of business card to reduce the problems reported by the people who deal with traditional business cards. In this invention we are proposing a new Personal Document Processing system (PDP system) depending on the use of mobile technology to produce a smart business card in order to overcome the problems faced by business card holders.
- Published
- 2017
- Full Text
- View/download PDF
40. On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks
- Author
-
Carlton Shepherd, Iakovos Gurulian, Konstantinos Markantonakis, Keith Mayes, Eibe Frank, and Raja Naeem Akram
- Subjects
021110 strategic, defence & security studies ,Authentication ,Computer science ,business.industry ,0211 other engineering and technologies ,Access control ,02 engineering and technology ,Relay attack ,law.invention ,Intelligent sensor ,Relay ,law ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Smart card ,Mobile telephony ,business ,Contactless smart card ,Computer network - Abstract
Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards, which has resulted in the deployment of various access control, transportation and payment services, such as Google Pay and Apple Pay. Like contactless cards, however, NFC-based smartphone transactions are susceptible to relay attacks, and ambient sensing has been suggested as a potential countermeasure. In this study, we empirically evaluate the suitability of ambient sensors as a proximity detection mechanism for smartphone-based transactions under EMV constraints. We underpin our study using sensing data collected from 17 sensors from an emulated relay attack test-bed to assess whether they can thwart such attacks effectively. Each sensor, where feasible, was used to record 350-400 legitimate and relay (illegitimate) contactless transactions at two different physical locations. Our analysis provides an empirical foundation upon which to determine the efficacy of ambient sensing for providing a strong anti-relay mechanism in security-sensitive applications. We demonstrate that no single, evaluated mobile ambient sensor is suitable for such critical applications under realistic deployment constraints.
- Published
- 2017
- Full Text
- View/download PDF
41. Implementation of RFID based raspberry Pi for user authentication and offline intelligent payment system
- Author
-
Zulfajri Basri Hasanuddin, Astriany Noer, and Dewiani Djamaluddin
- Subjects
Authentication ,Computer science ,business.industry ,media_common.quotation_subject ,Payment system ,Payment ,Payment terminal ,Server ,Key (cryptography) ,Smart card ,business ,Contactless smart card ,media_common ,Computer network - Abstract
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to store user's identity in specific sectors and provide classified authentication key for the card. Passengers will make the payment on a device that has been previously installed on the BRT, called Contactless Payment Terminal (CPT). CPT consists of Raspberry Pi 3 Model B, MFRC522 and LCD Waveshare 3.5. CPT works without requiring server communication when conducting the transaction, but rather accessing the data stored in the contactless card. The optimum range for the CPT can identify the data on the contactless card is at a distance of 1 cm and 2 cm with a percentage of 100%, the percentage decreased by 86.67% at a distance of 3 cm. The fastest delay time is 0.1 s at a distance of 1 cm and the longest is 2.7 s at a distance of 3 cm. The designed system is also equipped with a website operated by an administrator to register a new user, to edit the user's identity, to top up the user's balances, and to check the transaction history.
- Published
- 2017
- Full Text
- View/download PDF
42. Emulator of contactless smart cards in FPGA
- Author
-
Jiri Budek, Stanislav Jerabek, Jan Schmidt, and Martin Novotny
- Subjects
OpenPGP card ,business.industry ,Computer science ,Embedded system ,Card reader ,BasicCard ,Answer to reset ,Smart card ,Open Smart Card Development Platform ,business ,Contactless smart card ,Smart card application protocol data unit ,Computer hardware - Abstract
This paper describes implementation of contactless smart card emulator compliant with ISO/IEC 14443 in Field Programmable Gate Array (FPGA). Systems using contactless smart cards are widely used and some of these systems are not secured properly. For example in many such systems smart card Unique Identifier (UID) is used as the only one authentication mean. As the UID is not encrypted and is read from the card in plain, it is easy to make a copy of the smart card and use the clone as the original card. In this work we describe emulator of a smart card implemented in FPGA which is able to spoof some genuine smart card. Emulator described in this work emulates protocol described in ISO/IEC 14443 standard, which in detail describes all aspects of RFID smart cards (from physical attributes of both — cards and readers — to communication by digital signals). The emulator is able to come through the whole card selection process and to spoof the real smart card with given UID. Moreover emulator can be selected also for higher application layer protocol communication. If we know the proprietary application layer protocol, emulator is able to spoof communication on this protocol with data recorded in it. This functionality was successfully tested on systems used at Czech Technical University in Prague, where the weak implementation of UID as the only one authentication mean without any proprietary protocol is used. Emulator is responding faster than most of other existing smart card emulators thanks to high efficient implementation in hardware.
- Published
- 2017
- Full Text
- View/download PDF
43. Secure Access to Information using Smart Card
- Subjects
Card security code ,OpenPGP card ,Computer science ,business.industry ,Computer security ,computer.software_genre ,Smart card application protocol data unit ,MULTOS ,Smart card ,Open Smart Card Development Platform ,Java Card ,business ,Contactless smart card ,computer - Published
- 2017
- Full Text
- View/download PDF
44. A Security Solution for Bank Card
- Author
-
Yan-Jiao Ma, Gui-Fen Zhao, and Xiang-Yi Hu
- Subjects
Card security code ,Hardware_MEMORYSTRUCTURES ,Computer science ,business.industry ,media_common.quotation_subject ,Payment system ,Public key infrastructure ,Card reader ,Cryptographic protocol ,Payment ,Computer security ,computer.software_genre ,law.invention ,ATM card ,law ,ComputingMilieux_COMPUTERSANDSOCIETY ,Payment order ,Smart card ,business ,Contactless smart card ,computer ,media_common ,Magnetic stripe card - Abstract
Analyze the management vulnerabilities and technology vulnerabilities of current bank cards firstly, explain the technical features of the magnetic stripe and memory chip bank card, and disclose the method probably used by criminals while attacking. Meanwhile analyze the reasons why PKI may be infeasible to guarantee the security of bank cards. Vertical authentication based security solution for bank cards are proposed. Use CPU smart chip to replace the magnetic stripe card and memory chip. Set up signature and encryption protocols dealing with withdrawal form or payment order on the basis of vertical authentication in CPU smart chips, and replace current withdrawal or payment password authentication protocol. Therefore, set up a chip-level withdrawal or payment system for ATM or POS to guarantee the security of bank card withdrawal or payment.
- Published
- 2017
- Full Text
- View/download PDF
45. Modeling Consumers Payment Behavior Towards Contactless Cards
- Author
-
Angelos Markos, Vaggelis Saprikis, and Maro Vlachopoulou
- Subjects
Information Systems and Management ,Commerce ,Management of Technology and Innovation ,media_common.quotation_subject ,Business ,Payment ,Contactless smart card ,Management Information Systems ,media_common - Published
- 2020
- Full Text
- View/download PDF
46. Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices
- Author
-
Moon Seog Seo
- Subjects
Card security code ,business.industry ,Computer science ,Card reader ,Answer to reset ,computer.software_genre ,Smart card application protocol data unit ,MULTOS ,Embedded system ,Ventra ,Operating system ,Smart card ,business ,Contactless smart card ,computer - Published
- 2014
- Full Text
- View/download PDF
47. Design and Implementation of Campus Card in Shower System
- Author
-
Zuo Ren Zhao
- Subjects
Engineering ,business.industry ,Interface (computing) ,Payment system ,General Medicine ,Communications system ,computer.software_genre ,Smart card application protocol data unit ,CAN bus ,MULTOS ,Operating system ,Smart card ,business ,Contactless smart card ,computer - Abstract
s: This paper analyzes the application characteristics of campus smart card and electronic account, from the students requirements of shower management, made some research and Study on the campus smart card electronic account application and the CAN bus data transmission and developed a general admission fee based on network of campus card and CAN bus communication system, realize no cash operation in the finance charge project. This paper is discussed in detail from the communications and design payment system, interface, security aspects, and provides a reference of smart card application for the similar colleges.
- Published
- 2014
- Full Text
- View/download PDF
48. Design of Laboratory Management System Based on RFID
- Author
-
Shu Qing Ma and Chuan Jun Wang
- Subjects
Engineering ,business.industry ,Data exchange ,Reading (computer) ,Embedded system ,General Engineering ,Ventra ,Radio-frequency identification ,Card reader ,Smart card ,business ,Contactless smart card ,Automation - Abstract
RFID (Radio Frequency Identification, RFID) technology is developed in the eighty s of the 20th century a automatic Identification technology. Using radio frequency way between non-contact rf card reader and two-way data transmission, in order to achieve the purpose of target recognition and data exchange. Article from the traditional type of code, compared magnetic card and IC card, rf card has a non-contact, fast reading, no wear, is not affected by the environment, the characteristics of long service life, easy to use and have anti-collision function, can handle multiple CARDS at the same time. Abroad, rfid technology has been widely used in industrial automation, business automation, transportation control management, and many other fields.
- Published
- 2014
- Full Text
- View/download PDF
49. TRAIN TICKETING SYSTEM USING SMARTCARD
- Author
-
Abu Abraham Mathews, Iii Year, and Amal Babu P
- Subjects
Engineering ,Memory chip ,business.industry ,Computer security ,computer.software_genre ,law.invention ,Microprocessor ,law ,Public transport ,Key (cryptography) ,Revenue ,Smart card ,Architecture ,business ,Contactless smart card ,computer - Abstract
The goal of our project is to attain improved travel information and electronic ticketing using smart cards. The smart cards are similar to that of an ATM, so that they can be recharged and can be reused often. Smart cards are secure portable storage devices used for several applications especially security related ones involving access to the system’s database. This looks into current trends in smart card technology and highlights what is likely to happen in the future. The smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. The smart cards are user- friendly and so it can be used for Public Transport Networks (PTNs).It can also be noted as a service-oriented architecture. Railways are the important key aspect for the development of the Indian revenue. Many people are in need of train transportation than any other means of transportation because a number of people may travel at the same time. So people may prefer smart cards for the traveling purpose instead of booking the tickets. The existing fare booking system can be replaced by smart cards.
- Published
- 2014
- Full Text
- View/download PDF
50. Mining Private Information from Public Data: The Transantiago Case
- Author
-
Javier Bustos-Jiménez, Giselle Font, Camila Montero, Jorge Bahamonde, and Alejandro Hevia
- Subjects
Information privacy ,Ubiquitous computing ,Computer science ,business.industry ,Computer security ,computer.software_genre ,Computer Science Applications ,World Wide Web ,Computational Theory and Mathematics ,Analytics ,Public transport ,Information system ,Smart card ,business ,computer ,Private information retrieval ,Contactless smart card ,Software - Abstract
Transantiago, the smartcard-based public transportation system in Santiago, Chile, includes both a subway system and buses. An online information system lets card holders find detailed trip information, including start time and location, as well as frequency and type of transportation used, by simply providing its card ID. This article studies the privacy implications of the availability of the Transantiago online information system. The authors explore how much of a card holder's information and behavior could be extracted from something as simple as their card ID. They concluded that, given that the corresponding card IDs are known, they can use simple statistical techniques to correctly predict the nearest public transport station to the homes of more than half of the users. This article is part of a special issue on pervasive analytics and citizen science.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.