外文翻譯 英文文獻(xiàn) 中英版 校園智能卡_第1頁
外文翻譯 英文文獻(xiàn) 中英版 校園智能卡_第2頁
外文翻譯 英文文獻(xiàn) 中英版 校園智能卡_第3頁
外文翻譯 英文文獻(xiàn) 中英版 校園智能卡_第4頁
外文翻譯 英文文獻(xiàn) 中英版 校園智能卡_第5頁
已閱讀5頁,還剩10頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、英文文獻(xiàn):smart card for smart campuskfupm case studytala1 halawani and mohamed mohandesking fahd university of petroleum and m. saabstractsmart card is the latest addition in the world of information technology. the vision of the smart card program is to provide access to service

2、s that is secure, fast,friendly, easy to use, flexible, personal, and is accessible by the users kom anyplace at any time. a smart card is of the size of a conventional credit card with an embedded computer chip that stores and transacts data between users and devices. this data is associated with e

3、ither value or information or both and is stored and processed within the chip of the card. the card data is transacted via a card reader attached to a computing system as a peripheral device. smart cards are extensively used through several key applications like education, healthcare, banking, ente

4、rtainment, and transportation.1. introductionsmart card is a mini-computer capable of storing and processing data. although, at -present, they are most popular as single-function cash cards and long-distance calling cards, their capabilities range from retaining tickets, money, frequent flyer miles,

5、 travel preferences, insurance information, key demographic data, links to a patients medical records, to allowing access into a building, logging onto a network, etc. the potential of the smart card is limitless. with the added bonus of these functions being performed on a single card, smart cards

6、have the ability to become indispensable tools. smart cards were first introduced in europe a couple of decades ago as a stored value tool for pay phones to reduce theft i. as smart cards and other chip-based cards advanced, people found new ways to use them, such as charging cards for credit purcha

7、ses and for record keeping in place of paper. smart cards provide tamper-proof storage of user and account identity. they provide protection against a full range of security threats, kom careless storage of user passwords to sophisticated system hacks. smart card can be multi-functional through the

8、use of several applications stored on the card. this paper starts with the history of smart cards and describes the different types of smart cards with characteristics of each type. finally, the paper will detail kfupm smart card system as an important case study in the field.2. the history of smart

9、 cardsthe first plastic payment card for general use was issued by the dinners club in 1950. at first the cards functions were quite simple 2. they initially served as data carriers that were secure against forgery and tampering. general information, such as the card issuers name, was printed on the

10、 surface while personal data elements, such as the cardholders name and the card number were embossed. further more, many cards bad a signature field. protection against forgery was provided by visual features. therefore, the systems security depended completely on the retail staff accepting the car

11、ds. however, this was not an overwhelming problem due to the cards initial exclusivity. there was a pressing need for machine-readable cards to reduce handling cost in addition to the fact that card issuers losses due grew from year to year due to fraud 2.the first improvement consisted of a magneti

12、c strip on the back of the card. this allowed digital data to be stored on the card in a machine-readable form as a supplement to the visual data. additionally, security is enhanced by the use of a secret personal identification number (pin) that is compared to a reference number stored in the magne

13、tic strip 3. although the embossed card with a magnetic strip is still the most commonly used type of payment card, they suffer from a severe weakness in that data stored on the strip can be read, deleted and rewritten by anyone with access to the appropriate equipment. pin must be stored in the hos

14、t system in a secure environment, instead of on the magnetic strip. most systems that employ magnetic strip cards have on-line connections to the systems host computer for security reasons. however, this generates considerable data transmission costs.the development of the smart card, combined with

15、the expansion of electronic data processing has created completely new possibilities for solving this problem. progress in microelectronics in the 1970s made it possible to integrate data storage and arithmetic logic on a single silicon chip measuring a few square millimeters 2. the ideas of incorpo

16、rating such an integrated circuit into an id card was contained in a patent application filed in japan by kunitaka arimura in japan concerning “a plastic card incorporating one or more integrated circuit chips for the generationof distinguishing signals” in1970 3. however, the first real progress in

17、 the development of smart cards came when ronal moreno registered his smart card patent on “an independent electronic object with memory” in france in 1974.a breakthrough was achieved in 1984, when the french telecommunication authorities decided to use prepaid chip cards for public pay phones due t

18、o the increasing vandalism and theft. chip cards were demonstrated to be a cost effective solution. the french example was followed by many other countries. today, more than 100 countries use chip cards for their public phone systems. by 1990 the total number of smart cards reached 60 million cards

19、4. today, several billion smart cards are in use worldwide.3. types of smart cardssmart cards are composed of a chip, an interface between the chip and the card reader, and a plastic body. smart cards are classified according to the chip type; memory chip cards as well as microprocessor chip cards.

20、they can also be classified according to the method of communication with the reader. cards may communicate with readers either through direct physical contacts (contact cards) or through a radio kequency signals (contactless cards).3.1 memory chip curdsmemory cards have no sophisticated processing

21、power and cannot manage files dynamically. they are used for data storage and applications. data can consist of the identification number, serial number of the card, installed applications and the information required to a specific application in case of mudti-appliciation cards. the main use for me

22、mory smart cards is to store cards operating system, nm-time e:nvironment, issuer security domain, card issuer application, keys, and certificates for cryptography. keys function as passwords to secure environments, and certificates verify the authenticity of keys. memory smart cards are built wi.th

23、 erasable programmable read-only memory (eprom) or electrically eprom (eeprom) chi,ps. eprom is often used in prepaid service cards such as phone cards that count off minutes used and then are discarded. eeprom, which can be changed up to 100,000 times, includes built-in logic that can be used to up

24、date a. counter in prepaid service cards.3.2 microprocessor chip curdsthese cards have on card dynamic data processing capabilities. the chip contains a microprocessor or a microcontroller that manages memory allocations and file access. it manages data in organized file structures, via a card opera

25、ting system (cos). unlike other operating systems, this software controls access to the on card user memory. thi,s capability permits different and multiple functions and/or different applications to reside on tkle card. the microprocessor chips used for cards are smaller, slower versions of the cen

26、tral processing units used in pcs. their pro,gamming capability provides support to functionality of the card. microprocessor smart cards are required for applications that manipulate or compare data, such as public key infrastructure (pki), dataencryption, java applets, and electronic purses. every

27、 microprocessor smart card bas a cos on the chip to operate the internal functions of the application. the cos loads off the read-onlymemory (rom), much like: a basic inputloutput system (bios) on a pc z.3.3 contact smart cmdsin addition to the classification of smart card based on the chip type, sm

28、art cards can be classified based on communication type. contact smart card requires a phyriical contact between card and the reader. they use an eight or six pin contacts on the top of the card to physically connect to the card reader. their ch.ip could be memory or microprocessor type 5.3.4 contac

29、tless smart curdscontactless smart cards use an antenna to communicate with the reader. they are powered from an rf field generated by the card reader. the rf field also transfers data between the card and the reader 4. employee identification badges for building access are typically contactless sma

30、rt cards. additionally, most cards used for transportation are contactless as well.3.5 combination smart cardsmultipurpose combination smart cards are a hybrid mix of the contact and contactless designs. they include contacts for communication with a contact type reader, and also include an antenna

31、for communication with an rf type reader 5.4. kfupm smart card systemuniversities need simple identity cards for all employees and students who are granted access to certain data, equipment and departments according to their status. multifunction, microprocessor based smart cards incorporate identit

32、y with access privileges and also stores value for use in various locations, such as cafeterias and stores. numerous universities around the world are utilizing smart cards. kfupm is one of the first universities in the area to adopt a comprehensive multifunctional smart card system. kfupm card is a

33、 dual card that bas two chips; one for contact applications and the other is for contactless applications. the contact chip will be utilized to store cardholder photo in addition for future bank services while the contactless chip will be utilized for all other functions. the card systemwill provide

34、 the following functions:photo idlibrary borrowing privilegeselectronic purserecreation center sewicesmedical center servicese-leamingaccess control to university facilities logical access to pcs and the internet these functions are controlled from a control management center (cmc) as shown in figur

35、e.1. the cmc will host a file database server that is connected to the university network, enabling the system to access the student information system (sis) and personnel payroll databases (pps). an additional database is created for the cardholder database and will be residing in the systems serve

36、r. there are several components of the cmc.figure.1 card management centerthe function of the card issuing system (cis) is to capture the digital photograph and the biometrics template of the cardholder 6-71. as can be seen in figure.2, the cis consists of a card printer, biometrics scanner, digital

37、 camera, and a workstation. the cis workstation is connected to the network to access the databases for the required information and data. however, records under processing could be stored for a sbort period in the cis local database before it is passed onto the cardholder database to reduce the loa

38、d on kfupm network.figure.2 card issuance centercard personalization system (cps) performs the chip personalization in addition to defining the door access level for the cardbolder. cps works on a cliendserver configuration, where the application used for the personalization process resides on the s

39、erver. therefore, each defined cps workstation uses the kfupm network to access and invoke the cps application in the server. the cps application can access the sis and pps through the kfupm network. cps consists of biometrics scanner, contact card reader and contactless reader as seen in figure.3.f

40、igure.3 card personalization systemdue to the presence of contact and contactless chips, personalization has to be performed twice. once the personalization process is complete, the system performs a biometrics verification process to insure that biometrics templates match the actual physical cardho

41、lder.access control system (acs) is responsible for controlling all defined access controlled areas. it is also used to define the various group levels, which allow proper control of the movement of students and personnel in the university. this system provides access control to the university gates

42、, buildings,laboratories, library, recreation centers and car parks, as shown in figure.4. acs tracks and records movement of staff and students in controlled regions.figure.4 access control systempayment management system (pms) is responsible for collecting the various e-purse and university accoun

43、t transactions performed at the point of sale (pos) terminals. these pos terminals would be available at restaurants, library, recreation center, medical center, and coffee shops. the pos system accepts cash payments, make payments via university account, and make payments and provide refunds using

44、the e-purse system. figure.5 shows the pos system.figure5 point of sale systemconclusionsthis paper introduced smart card technology. it presented the history and ines of smart cards. additionally, it highlighted the important points of kfupm smart card system. upon completion of the system, it is h

45、oped that kfupm smart card project will be an important case study for other universities in the are.% to follow.中文翻譯:校園智能卡摘 要智能卡的誕生是對世界信息技術(shù)的一種補(bǔ)充。從前景來看,智能卡程序旨在提供安全、快速、友好,易于使用的,靈活的服務(wù),便于用戶任何時間任何地點使用。智能卡的大小與傳統(tǒng)的信用卡大小相同,它內(nèi)嵌用于在用戶和設(shè)備間存儲和交換數(shù)據(jù)的計算機(jī)芯片。這類數(shù)據(jù)可以是值或信息,也可以兩者兼有,通過智能卡的芯片儲存和處理??〝?shù)據(jù)通過讀卡器連接到計算機(jī)系統(tǒng)作為外圍設(shè)備。目前

46、,智能卡在幾個主要應(yīng)用領(lǐng)域得到廣泛應(yīng)用,如教育、醫(yī)療、銀行、娛樂和運(yùn)輸。1. 簡介智能卡是一種具有提高儲存和處理數(shù)據(jù)能力的微型計算機(jī)。雖然現(xiàn)在它們最普遍的應(yīng)用是單功能現(xiàn)金卡和長途呼叫卡,但它們的能力范圍涉及保留票據(jù)和錢,累計飛行里程,旅游偏好、保險信息、關(guān)鍵的人口數(shù)據(jù),連接到一個病人的病歷,允許進(jìn)入建筑物,登陸網(wǎng)絡(luò)等。智能卡的潛力是無限的。如果在一個單一的卡上執(zhí)行這些附加功能,智能卡有可能成為必不可少的工具。智能卡在幾十年前第一次出現(xiàn)在歐洲,作為儲值工具,以減少電話付費(fèi)時的偷盜1。隨著智能卡及其它基于芯片的卡的發(fā)展,人們找到新的使用方法,如通過一卡通收取信用卡消費(fèi)來代替在紙上記錄。智能卡提供用

47、戶和帳號的身份驗證。他們針對全面的安全威脅提供保護(hù),從用戶密碼的不安全存儲到復(fù)雜的系統(tǒng)的修改。智能卡可通過使用儲存在卡中的多種應(yīng)用而變得多功能。本文從智能卡的歷史開始說起,描述了不同類型的智能卡以及每種類型卡的特征。最后,本文將詳細(xì)介紹kfupm智能卡系統(tǒng)作為一個重要的案例研究。2. 智能卡的歷史第一個做一般性使用的塑料付款卡發(fā)布于1950年的晚餐俱樂部。一開始,智能卡的功能相當(dāng)簡單2。他們最初作為數(shù)據(jù)的載體,以防止數(shù)據(jù)被偽造和篡改。一般性信息,如信用卡發(fā)行公司的名字,被印在卡的表面,而個人數(shù)據(jù)元素,如持卡人姓名和卡號碼是浮雕式突出的。進(jìn)一步來說,許多卡有一個簽名區(qū)域。防偽通過視覺特征顯示。因

48、此,系統(tǒng)的安全性完全依于接受卡的零售人員。然而,鑒于卡的初始權(quán)這并不是一個絕對的問題。由于欺詐行為卡發(fā)行公司的損失逐年增多,就迫切需要有一種機(jī)器可讀的卡來降低處理成本。第一個改進(jìn)的是在卡背面貼一個磁條。這個允許數(shù)字?jǐn)?shù)據(jù)作為可視化數(shù)據(jù)以機(jī)器可讀的形式存儲到卡中。此外,通過使用一個秘密的個人身份證明文件 (pin),與存儲在磁條中的參考數(shù)字進(jìn)行比較,來增強(qiáng)安全性。在1984年當(dāng)法國電信部門針對逐漸增加的破壞和偷竊決定使用預(yù)付費(fèi)芯片卡支付公共電話費(fèi)時智能卡取得了重大突破,。芯片卡被證明是有效的付費(fèi)方案。法國的例子被許多其他的國家效仿。今天,超過100個國家在公共電話系統(tǒng)中才采用芯片卡付費(fèi)。到1990

49、年,智能卡的總數(shù)達(dá)到60萬張。今天,有數(shù)十億的智能卡在世界范圍內(nèi)被使用。3. 智能卡的分類智能卡芯片由一個芯片,一個在芯片和讀卡機(jī)之間的接口和一個塑料外殼組成。根據(jù)芯片類型智能卡可分為內(nèi)存芯片卡片和微處理器芯片卡。他們也可以根據(jù)與讀卡器通信的方式不同進(jìn)行分類。智能卡可通過直接物理接觸(接觸式卡)或通過射頻訊號(非接觸式卡) 與讀卡器通信。3.1內(nèi)存芯片卡記憶卡沒有復(fù)雜的處理能力,也無法動態(tài)管理文件。它們是用來存儲數(shù)據(jù)和應(yīng)用。數(shù)據(jù)可以包括卡的識別碼,序列號、安裝的應(yīng)用程序以及多應(yīng)用程序卡的一個特定應(yīng)用程序所需的信息。記憶智能卡主要用于存儲卡的操作系統(tǒng),運(yùn)行時間環(huán)境,卡發(fā)行方的安全域、卡發(fā)行方的應(yīng)用, 密鑰、解密許可。鑰匙函數(shù)作為安全運(yùn)行環(huán)境的密碼, 解密許可核對密碼的真實性。3.2微處理器芯片卡這些卡具有卡動態(tài)數(shù)據(jù)處理能力。這個芯片包含了一個用于管理內(nèi)存分配和檔案存取得微處理器或微控制器。它在組織好的文件結(jié)構(gòu)中通過一個卡操作系統(tǒng)管理數(shù)據(jù)。

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論