06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.1 Setting the Scene<br />

1.1 Setting the Scene<br />

We open the discussion in this chapter by exploring the evolution of the smart card from<br />

its beginnings to the present. This is followed by a discussion of the reasons <strong>for</strong> having<br />

a user centric approach to the management of a security-critical device like a smart card<br />

and the challenges this approach involves. We then discuss the contributions of the thesis,<br />

and outline its structure.<br />

1.2 A Brief History of Smart Cards<br />

Card-based transactions originated in the USA, starting with a system which came to be<br />

known as metal money. This was a metal card issued by Western Union 1 as part of a<br />

deferred payment scheme [2]. In 1946, John Biggins, a banker at Flatbush National Bank<br />

of Brooklyn, issued a banking card to his customers called Charg-It [3]. Customers used<br />

their Charg-It cards to pay <strong>for</strong> groceries at local shops. In 1951, New York's Franklin<br />

National Bank issued the rst credit cards [4] to gain a competitive advantage over rival<br />

banks. During the same period, an exclusive club known as the Diners Club issued the rst<br />

plastic cards [5]. These cards reected the high status of the individuals who used them.<br />

Instead of using cash, cardholders would use these cards to pay <strong>for</strong> services at selected hotels<br />

and restaurants. This was the beginning of plastic money as we know it; however, the rapid<br />

proliferation of plastic cards came when Visa 2 and MasterCard 3 entered the eld [5].<br />

These early cards spread from the USA to Europe and within a few years to the rest of<br />

the world. They had a very simple mechanism to store user-specic data and secure it<br />

against <strong>for</strong>gery. These cards carried the name of the cardholder and a unique card number<br />

printed or embossed on the card along with the card issuer's logo and a signature panel.<br />

The signature panel was used as a security mechanism to link the card to its cardholder.<br />

When used at a merchant's premises, the merchant had to verify the printed/embossed<br />

features of the card and ask the cardholder to sign the receipt. To verify the cardholder's<br />

right to use the card, the merchant could then match the signature on the receipt with the<br />

one on the signature panel [5]. The system relied heavily on the competence of the person<br />

at the Point of Sale (POS). This system worked <strong>for</strong> a while on a limited scale, but as the<br />

use of plastic cards increased, banks soon realised that a machine-readable and automated<br />

system would benet all parties including cardholders, merchants, and banks [6].<br />

1 Western Union is a US-based nancial company that provides person-to-person money transfer, business<br />

and commercial services.<br />

2 Visa: Trademark of Visa Inc, San Francisco, Cali<strong>for</strong>nia, USA. A global payment technology and<br />

transaction management company that provides nancial services to banks.<br />

3 MasterCard: Trademark of the MasterCard Worldwide that provides technology and architecture to<br />

support the relationship between nancial institutions, merchants, and consumers <strong>for</strong> monetary transactions.<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!