Index
Card Technology Technology Page
- World of Phonecards - international page for collectors of Phonecards with informative articles and up-to-date links Rate this link
- Electronic Telephone Cards: How to make your own! - article from Phrack magazine Rate this link
- Telephone cards used in Finland and their security - text in Finnish Rate this link
Memory cards
Memory cards are the simples type of smartcard. Memory cards onlyhave some amount of memory inside the card and this memory can be normallyread and written. There is normally nothing relly intelligne insidethose cards. Typically the memory inside this kind of cards isEPROM, EEPROM or FLASH memory. This card type is very widely used astelehone cards (telecards). Many countries use a telecard systemwhich is very close to the first smartcard telephone system in usein France.
Technical information
Computer interfaces
Information resource pages
Telecard articles
Smartcards
Here you can find information on real smartcards which have a realmicroprocessor inside the card. There have been many differentsmall microprocessors used inside smartcards including 8031/51 variants,PIC microcontrollers and some pecial microprocessors just designed forsmartcard applications. Very many smartcards communicate usingthe protocols standardized in ISO 7816 standard.The ISO7816 Standard define many physical features, including card size, mechanical strength and elecrical properties. ISO7816-2 Standard defines card contact type, placement incard and the pinout. The standard pinout is:
C1 : Vcc = 5V C5 : GndPins marked with RFU are application specific pinsdefined in application standards.The standard supports two transmission modes:
C2 : Reset C6 : Vpp (programming voltage)
C3 : Clock C7 : I/O (data in/out)
C4 : RFU C8 : RFU
- Asynchronous transmission: In this type of transmission, characters are transmitted on the I/O line in an asynchronous half duplex mode. Each character includes an 8bit byte.
- Synchronous transmission: In this type of transmission, a serie of bits is transmitted on the I/O line in half duplex mode in synchronisation with the clock signal on CLK.
- alt.technology.smartcards FAQ Rate this link
- Prepaid Smart Card Techniques - A Brief Introduction and Comparison Rate this link
- Smart cards... trained for security - latest ones go to great lengths to protect smart cards from fraudulent use Rate this link
- Smart Cards in Wireless Services Tutorial - presents a business case for the use of smart cards or subscriber identity modules (SIMs) in the marketing and network operations of wireless communications operators Rate this link
- An Overview of Smart Card Security - The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong security protection and authentication. This paper discusses the security of the smart card in three different aspects. Rate this link
General information
- M.U.S.C.L.E - Movement for the Use of Smart Cards in a Linux Environment Rate this link
- Open Card Consortium - Java based smartcard specification Rate this link
- PC/SC Workgroup - Integrating PC's and Smart Cards, site includes some specifications Rate this link
- The Smart Card Cyber Show Rate this link
Smartcard resource pages
- Using PC to emulate videocrypt smartcard Rate this link
- Satellite TV scrabler smartcard links - collected by tomi Engdahl Rate this link
Satellite TV smartcards
Technical specs
- Dumb Mouse Universal Chipcard Reader Rate this link
- Gold wafer card programmer - This circuit is a combination of a ludipipo programmer (for the pic) + a phoenix programmer (for the eeprom 24LC16). Rate this link
- SmartCard Edit/Read/Write Software - for almost any kind of smartcard Rate this link
Computer interfaces
- Java Card Security - How Smart Cards and Java Mix Rate this link
- RFID tags connect smart cars to smart highways - small RF identification (RFID) tags are part of the critical communication link between automobiles and electronically directed "smart" highways and there are also many other uses for them Rate this link
- Tamper Resistance - a Cautionary Note - description of a number of attacks on smartcard systems that designers of secure systems should consider, also in Rate this link
- Tamper Resistance - a Cautionary Note - paper published in the Proceedings of the Second USENIX Workshop on Electronic Commerce (EC96) Rate this link
Smartcard articles
- Active unpowered RFID tag absorbs RF from interrogate signal, rectifies carrier, uses to power low-power circuitry. Circuit encodes response and transmits code back to interrogator.
- Active self powered RFID tags carry battery or some other power, which provides a smarter function- can send more information than simple ID code, or has a longer range than interrogator-powered versions.
- Third version is just a passive reflector with a binary function. It either passively reflects, triggering response, or just sits there and does not respond at all. Since these devices do not actually send an ID number, some do not consider them RFID (maybe in some applications you could use tags tuned to different operating frequencies for simple identification). These are types found in anti-theft devices.
- Induce enough power into the tag coil to energize the tag. Passive RFID tags utilize an induced antenna coil voltage for operation. This induced AC voltage is rectified to provide a voltage source for the device. As the DC voltage reaches a certain level, the device starts operating.
- Provide a synchronized clock source to the tag. Many RFID tags divide the carrier frequency down to generate an on-board clock for state machines, counters, etc., and to derive the data transmission bit rate for data returned to the reader.
- Act as a carrier for return data from the tag. Backscatter modulation requires the reader to peak-detect the tag's modulation of the reader's own carrier. Backscatter modulation works by repeatedly shunting the tag coil through a transistor, the tag can cause slight fluctuations in the reader's RF carrier amplitude.
- Charles Walton, the Father of RFID - Walton got his first patent about it in 1973. There are 32 patents granted to Walton, the first to be associated with the acronym RFID dates from May 17, 1983. Rate this link
- The father of RFID - The next time you wave a key card to unlock the door to your office building, think of Charles Walton. One of Silicon Valley's unsung inventors, Walton's patents on radio frequency identification, or RFID, spawned those electronic door keys. Now the technology Walton pioneered in the 1970s and 1980s is poised to change the way billions of products are tracked. Rate this link
- Antenna Circuit Design for RFID - Since the energizing and communication between the reader and tag is accomplished through antenna coils, it is important that the device must be equipped with a proper antenna circuit for successful RFID applications. Rate this link
- Optimizing read range in RFID systems - Determining and improving the read range of RFID tags is especially important as these tags become more commonplace. Rate this link
- Passive RFID Basics - Radio Frequency Identification (RFID) systems use radio frequency to identify, locate and track people, assets, and animals. Passive RFID systems are composed of three components . an interrogator (reader), a passive tag, and a host computer. This application note discusses on those devices. Rate this link
- RFID tags connect smart cars to smart highways - small RF identification (RFID) tags are part of the critical communication link between automobiles and electronically directed "smart" highways and there are also many other uses for them Rate this link
- RFID Fundamental Operating Principles - This chapter from RFID Handbook describes the basic interaction between transponder and reader, in particular the power supply to the transponder and the data transfer between transponder and reader. Rate this link
- RFID Handbook - book home page with some interresting material to download Rate this link
Contactless smartcards and RFID
In contact smartcard systems, such as reading the data from a serial EEPROM over a two-wire (I2 C) or three-wire SPI or Microwire bus, the power, clock, and data lines are connected separately. Some wired smartcards use RS-232 type asyncronous communications, and in this case supply power and communication through different wires. In contactless smartcards all this communication and usually also the power for the smartcard needs to be transferred wirelessly using RF signals and/or inductive coupling methods.
Radio Frequency Identification (RFID) systems use radio frequency to identify, locate and track people, assets, and animals. Charles Walton pioneered the RFID technology in the 1970s and 1980s. RFID is a catchall term for a broad array of technologies that includes everything from battery-powered "active" tags, such as those used in highway toll booths, to "passive" RFID tags that measure a fraction of a millimeter in each dimension, not counting the antenna in the device.
RFID (Radio Frequency Identification) is a technology where information can be read from and/or written to a microchip without contact using High Frequency (HF) magnetic induction or Ultra High Frequency (UHF) transmission and reflection. Both HF and UHF techniques have the same function, interfacing between a reader and an information storage device by means of antennas, but they are quite different in operation.
There are several types of RFID technologies:
Passive RFID systems are composed of three components: an interrogator (reader), a passive tag, and a host computer. The tag is composed of an antenna coil and a silicon chip that includes basic modulation circuitry and non-volatile memory. The tag is energized by a time-varying electromagnetic radio frequency (RF) wave that is transmitted by the reader. This RF signal is called a carrier signal. When the RF field passes through an antenna coil, there is an AC voltage generated across the coil. This voltage is rectified to supply power to the tag. The information stored in the tag is transmitted back to the reader. This is often called backscattering. By detecting the backscattering signal, the information stored in the tag can be fully identified. Passive RFID devices also use a serial bus, but the power, clock, and data are all in the same signal. Instead of wires, this signal is carried through wireless means.
Typical RFID system use inductive coupling between the card and the reader. Both of them have coils whick interactig with each other (magnetic coupling). This interaction makes it possible to transfer power to the card (through alternating magnetic field or pulses) and transfer information (modulating the magnetic field). Typical this kind of inductively coupled systems operate at 125-kHz to 13.56-MHz frequency range. ISO frequencies of 125 kHz and 13.56 MHz are generally used. 125 kHz and 13.56 MHz, utilize transformer-type electromagnetic coupling. The typical operating distance is usually few centimeter or tens of centimeters.
Sometimes higher frequencies are used for RFID tagging, but the communicationmethods are somewhat different. 2.45 GHz, for example, uses a true RF link. There are also systems that operate at UHF frequencies (902-928 MHz in USA and 866-868 MHz in Europe). The radio systems can operate typically from few meters to 10 meters.
Systems incorporating passive RFID tags operate inways that may seem unusual to anyone who already understands RF or microwave systems. There is only one transmitter: the passive tag is not a transmitter or transponder in the purest definition of the term, yet bidirectional communication is taking place.
The RF field generated by a tag reader (the energy transmitter) has three purposes:
Most modern RFID systems operate at 13.56 MHz frequency range. There are several standards on this field: I-Code, ISO-14443, TagSys ja TagIt. From those I-Code and ISO-14443 look most promising. The reading of those tags is possible up to distance of a few meters with a correct antenna. There are many companies that make RFID tages (for example Philips and Texas Instruments) and many companies that make readers to them (for example 3M and Nordic ID).
It is well known that a limiting factor in the adoption of RFID technology is the inability to read RFID tags on metallic or liquid objects. The usual solution has been to use some sort of spacer to lift the tag off the metal.
- Card-O-Rama: Magnetic Stripe Technology and Beyond - This detailed document will enlighten you and hopefully spark your interest in magnetic stripe card technology. Rate this link
- Decoding magnetic cards Rate this link
- Documentation for SR&D MCR-175-1R-0803 mag stripe card reader - signals and reading source code Rate this link
- Interpretation of Clock-and-Data reader output for standard HID formatted cards - information on card reader interface emulates a magnetic stripe reader track 2 data output, application note Rate this link
- Magnetic Striple Card Standards Rate this link
- Mag Stripe Card Info - summary of tips using magnetic card reader modules Rate this link
- Magnetic stripe technology - many articles and related files Rate this link
- Magtek - company which makes magnetic card products Rate this link
- Magtek Application Notes - notes on magnetic stripe cards Rate this link
- Perspectives - Automatic Teller Machines - copy of a set of class notes Rate this link
- Card Reading MagStripe Swipe TTL Rate this link
- Magnetic Stripe Technology and Beyond - Look in your wallet. Chances are you own at least 3 cards that have magnetic stripes on the back. ATM cards, credit cards, calling cards, frequent flyer cards, ID cards, passcards,...cards, cards, cards! And chances are you have NO idea what information is on those stripes or how they are encoded. This detailed document will enlighten you and hopefully spark your interest in this fascinating field. Rate this link
- MAGTEK Application Note: Magnetic Stripe Reader - The Mag-Tek Card Reader may be interfaced to a microprocessor unit (MPU) in a number of ways. Selection of the most suitable method will depend on the system requirements and the MPU capabilities. The two most common methods are Single-bit input programming and USART (Universal Synchronous/Asynchronous Receiver - Transmitter). Rate this link
Magnetic cards
Card with magnetic stripes are not smartcard techniques, but because they are quite often used in same applications where smartcards are also used to coming to use, they are also worth to mention on the same page with smartcard technologies. Chances are you many cards that have magnetic stripes on the back on your wallet: ATM cards, credit cards, calling cards, frequent flyer cards, ID cards, passcards, etc. ANSI/ISO standards define 3 Tracks for magnetic card, each of which is used fordifferent purposes. These Tracks are defined only by their location on themagstripe, since the magstripe as a whole is magnetically homogeneous.Track 2 is most commonly used. Track 2 is used by ATMs and credit card checkers.Track 1 usually holds the cardholder's name as well as account and other discretionary data.Most card readers read either Track 1 or Track 2.Track 3 was intended to have data read and written on it, butis nowadays pretty much an orphaned standard. The data in magnetis stripes is in digital format.The most commonly used code is a 5-bit Binary Coded Decimal coded ANSI/ISO format. It uses a 16-character set, which uses 4 of the 5 available bits (plus parity).Alphanumeric data can also be encoded on magstripes. The second ANSI/ISO dataformat is ALPHA (alphanumeric) and involves a 7-bit character set with 64characters. Not all magstripe cards operate on a digital encoding method. Some cardsencode audio tones, as opposed to digital data. These cards are usuallyused with old, outdated, industrial-strength equipment where security is not anissue and not a great deal of data need be encoded on the card. Some subwaypasses with magnetic strips in them are like this.
- Altek Pages - premier Barcode site, barcode specifications Rate this link
- Barcode 1 - A Web Of Rate this link
- BarCode 1 - a web of information about bar code Rate this link
- Barcodes: Color & Contrast - Many barcode problems which turn out to be caused by low contrast barcodes. The human eye is many times more sensitive than the best barcode scanner - what appears to be a good barcode by eye may be barely perceptible by the scanner. The best contrast is obtained when the background reflects all the light and the bars reflect none. This is never fully achieved in practice but there must be a significant difference between the bars and background if the code is to be read reliably. Rate this link
- Barcodes FAQ - introduction on printing bar codes, many popular barcodes listed Rate this link
- Barcode Information & Specifications Rate this link
- Barcode Server - form that generates 12 digit UPC bas codes Rate this link
- Bar Code Symbologies - Bar code systems can use several symbologies. A symbology is equivalent to a language. Each symbology has strengths and weaknesses. Many symbologies are around for historical or political reasons, while others have definite technical advantages. This document has information about many different bar codes. Rate this link
- Code 128 Specification - very high density alphanumeric bar code Rate this link
- Linux Reads Bar Codes - A hardware and device driver project for Linux Rate this link
- Pankkiviivakoodistandardi - Information on bar coding used in bills in Finland to make payin gof them with ATM easier. This document is in Finnish. Rate this link
- Uniform Code Council - bar code organization for coordinating bar codes used in products Rate this link
- What is a Keyboard Wedge? - A keyboard wedge is a system whereby it becomes possible to enter data into a computer in a way not anticipated by the programmer who wrote the application. It is based on the idea that all applications programs allow data to be entered via the keyboard. If the computer can be fooled into accepting 'dummy' keyboard data then that data will be processed and handled correctly by the application. Wedge systems are typically used to enter small packets of machine collected data into applications written for keyed data. This data may come from a barcode reader or similar device. Rate this link
- Barcodes - This web page has introductions to 4 State BPO Code (British Post Office, Royal Mail Code), AZTEC Code, Codabar, Code 128, Code 49, Code 93, EAN (EAN-13, EAN-8 EAN-99), Interleaved 2 of 5 Code (also referred to as USS ITF 2/5, ITF and I-2/5), Maxi Code, MSI/Plessey Code, PDF417 Code and UPC (UPC-A & UPC-E) Rate this link
Barcode
Barcode technique, but because they are quite often used in similar applications, barcodes are also worth to mention on the same page with smartcard technologies. Bar codes are used in many applications to encode numeric or ASCII informationto stripes which are easilily readable by electronic device called bar code scanner.UPC or EAN symbol are found on most retail products around the world. Many electronics products have barcodes on their circuit board foridentification purposes and many packages have bar codes.Genrally in barcodes the information is coded to the width ofthe bars and their distance from each other.When reading barcodes there is generally one optosensor which gives 1 or 0 signaldepending of sensor is over the black bar or white background.(for example 1 on background and 0 on black bar or other way).Bar code systems can use several symbologies. A symbology is equivalent to a language. Each symbology has strengths and weaknesses. Many symbologies are around for historical or political reasons, while others have definite technical advantages. For general-purpose use, Code 128 is usually the best choice. It provides use of the full (128-character) ASCII set as well as the best readability and reliability available. If you are making a general-purpose system that needs to read only numbers and uppercase letters, you can use Code 39. If you need numbers only, you should use Interleaved 2 of 5 or Code 128. In any case, avoid symbologies that require reconfiguration of the reader, and your life will be easier.Checksums are additional characters appended to bar codes to guarantee good reads. Checksums are necessary on some bar codes that are prone to errors.Printing barcodes is nowadays done usually with a normal PC and normal laser printer. You just need a suitable software and a normal printer and you can print your own bar codes.Reading of bar code information can be done in many ways. If you use ready made reader units, you do not usually need to worryabout the decoding process yourself. You just need to make sure that the bar code reader you have supports the bar code you use. The commercial barcode readersusually can output the code contents in ASCII format throughserial port or PC keyboard interface. Readers are available from simple pen linke devices to complicated laser based bar cide scanners as used in many shops at counter.If you need to do the barcode decoding yourself, you need to know thedetails of the code. The general process in decoding is tobegin by waiting for a black bar. When we see the beginning ofthe first black bar, we reset our clock to zero. Then we wait the signal to toggle to the white level, so we canclock and write down the reading as the measured width of the first black bar. When we get the white-to-black transition we read the clock and write down that reading as the width of the first white bar. We continue to time the width of the bars in this way for thewhole length of the code. After this we can start decoding of the codeby using the facts that there is a known ratio between thick andthin bars. And the code suaully starts with a known start code (knownbar and white space lengths).
Related pages
<[email protected]>
Back to ePanorama main page ??