23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Radio Frequency Identification 8-5<br />

8.4 Smart Card<br />

Every sword has two blades. The ability to write and rewrite implies that the personal record of its bearer<br />

is vulnerable to unauthorized alterations. Addressing this issue, a microprocessor chip with a sizable<br />

memory is embedded in a polyvinyl chloride (PVC) card because the said polymer is cheap, durable, and<br />

easy to assemble at a relatively low temperature. Using the old-fashioned write-once memory, top security<br />

could be obtained because the data stored in this type of memory cannot be altered. Alternatively,<br />

specially designed software could be used to protect the data from external hacking. Short of absolute<br />

security, the latter method is tamper resistant.<br />

The microprocessor-controlled memory could be used in conjunction with the magnetic<br />

stripe. With or without a magnetic stripe, it is called a smart card. Although the first version was<br />

unveiled by Helmut Gröttrup and Jürgen Dethloff for SEL (Standard Elektrik Lorenz) in 1968, the<br />

smart card remains very popular 4 decades later as most credit cards in our wallets belong to this<br />

category.<br />

With significant progress made in the mass production of semiconductor devices in recent<br />

years, the price of EPROMs (erasable programmable read-only memory), E-EPROMs (rewritable<br />

EPROM), or flash memories is dropping very fast. Thus, a memory of 1024.kB or more could be<br />

found in many smart cards; therefore, many new features are made possible. For example, a highresolution<br />

image of its bearer could be included for authentication. One may also choose to download<br />

one’s resume, medical record, and other information, such as the name of the physician and<br />

the date of the last visit in an eye-catching card such that erroneous blood transfusion and the prescription<br />

of allergic medicine could be reduced, especially when the bearer is knocked unconscious<br />

after an accident.<br />

By incorporating a proprietary hardware onboard, cryptographic smart cards could be used in topsecurity<br />

transactions by providing a digital signature. For example, it is adopted for interbank fund<br />

transfers, as in the electronic payment system (EPS) in Hong Kong. It could also be used in money withdrawals<br />

and cash deposits via an autoteller machine (ATM). With additional reconfirmation through<br />

various biofeatures, such as fingerprint and face recognition, smart cards could be used at border control.<br />

For example, a resident in Hong Kong could clear the immigration process between the Hong Kong<br />

Special Administrative Region (SAR) and Mainland China through the “e-way” in less than 7.s or 5.s in<br />

the upgraded version.<br />

A boom in smart card use came in 1990 after it was packaged into the form of a subscriber identity<br />

module (SIM) card for the GSM mobile phone in Europe (Figure 8.5). Besides mobile phones, SIM cards<br />

are extensively used in video games, software licenses, and for watching premium movies on a highdefinition<br />

television (HDTV) format at home.<br />

(a)<br />

(b)<br />

FIGURE 8.5<br />

(a) SIM card and (b) GSM telephone card.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!