Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010062312 | TK7895.S62 J87 2002 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Smart cards are credit cards with a built-in microprocessor and memory used for identification or financial transactions. This text provides coverage of every facet of Smart Cart technology and includes multiple international case studies.
Author Notes
TIMOTHY M. JURGENSEN is an independent consultant specializing in smart cards and high-security infrastructures. Jurgensen has consulted on several projects utilizing smart cards for network and physical access, contributes to key smart card standards bodies, and is actively involved in security certifications for smart cards.
SCOTT B. GUTHERY is currently Chief Technical Officer for Mobile-Mind, Inc., where he is designing and building Fujitsu's new smart card operating system, HIPERSIM. He developed the technical solutions and led the team that created the original Java Smart Card at Schlumberger, and was architect of Microsoft's Windows for Smart Card Operating System. Jurgensen and Guthery co-authored The Smart Card Developer's Kit , a leading resource for smart card software development and the first book to contain a smart card.
Table of Contents
Foreword | p. xv |
Preface | p. xvii |
1 Overview of Smart Cards and Their Programming | p. 1 |
History of Smart Cards | p. 2 |
The Generic Smart Card Application | p. 3 |
Major IT Applications--The Big Four | p. 3 |
Smart Card Programming | p. 16 |
Elements of Smart Cards | p. 21 |
Organization of the Book | p. 30 |
2 Physical Characteristics of Smart Cards | p. 33 |
Physical Security | p. 35 |
Card Construction | p. 38 |
ICC Architecture | p. 45 |
Summary | p. 53 |
3 Basic Standards for Smart Cards | p. 55 |
ID Card Standards | p. 56 |
Physical Characteristics of Identification Cards | p. 57 |
Encoding of Information for Identification Cards | p. 59 |
The Business Model for Identification Cards | p. 61 |
Smart Card Standards | p. 63 |
Characteristics of Smart Cards | p. 65 |
Other Smart Card Standards and Specifications | p. 74 |
Link-Level Protocols to Smart Cards | p. 78 |
Application-Level Protocols | p. 89 |
Summary | p. 90 |
4 Smart Card Applications | p. 91 |
General Architecture of Applications | p. 92 |
Infrastructure | p. 93 |
Security | p. 94 |
Security Mechanisms | p. 99 |
Access Conditions | p. 109 |
Interindustry Smart Card Commands (ISO 7816-4) | p. 111 |
Summary | p. 126 |
5 Multiapplication Smart Cards | p. 127 |
Why Multiapplication Smart Cards | p. 127 |
A Brief History of On-Card Interpreters and Virtual Machines | p. 129 |
Application Selection and AIDs | p. 133 |
Application Identifiers | p. 134 |
ISO-7816 Application Selection | p. 135 |
Other Application Selection Schemes | p. 136 |
The SCADA Card | p. 136 |
The Multos Card | p. 141 |
The Java Card | p. 147 |
The Windows-Powered Smart Card | p. 159 |
The ZeitControl Basic Card | p. 165 |
The Basic Card Application Development Cycle | p. 173 |
Data Access Control | p. 173 |
Summary of the Four Programmable Smart Cards | p. 179 |
Summary | p. 181 |
6 Commercial Smart Card Commands | p. 183 |
Cryptoflex 32K eGate | p. 184 |
Cyberflex 32K eGate | p. 213 |
Summary | p. 231 |
7 Smart Card Infrastructure | p. 233 |
Smart Card Protocol Stacks | p. 236 |
STIP-Small Terminal Interoperability Platform | p. 258 |
Summary | p. 259 |
8 GSM and Smart Cards | p. 261 |
Introduction | p. 261 |
SIM Standards and Their Evolution | p. 264 |
SIM APDUs | p. 267 |
Programming Language Bindings for the Card Application Toolkit | p. 288 |
Example: The Rapid Reorder Application | p. 291 |
Evolution of the SIM and the Card Application Toolkit | p. 298 |
Summary | p. 299 |
9 Authorization: Public Keys Without the Infrastructure | p. 301 |
Introduction | p. 301 |
Making the Intangible Tangible | p. 302 |
Shared Rights | p. 303 |
Group Membership | p. 304 |
Digital Rights Management (DRM) | p. 304 |
Remote Control | p. 305 |
Example 1 The WCLA Auction Card | p. 307 |
The Auction Advisor Program | p. 308 |
Example 2 Mobile Authorization Using a WIM | p. 311 |
Summary | p. 315 |
10 Smart Card System Management | p. 317 |
Converging Systems | p. 317 |
The Actors | p. 319 |
The Infrastructure | p. 323 |
The Card System | p. 327 |
Card Manufacturing | p. 331 |
Characteristics to be Managed | p. 335 |
Elements of a Card Management System | p. 345 |
Summary | p. 353 |
11 Current Trends and Future Directions | p. 355 |
The Frontier of IT Networks | p. 355 |
The ETSI Smart Card Platform Project | p. 356 |
Achieving Smart Card Interoperability | p. 358 |
The SCP Standards | p. 362 |
The UICC Platform | p. 363 |
Next Generation Smart Card Operating Systems (COSng) | p. 364 |
Summary | p. 371 |
Glossary | p. 373 |
Index | p. 397 |