Advantages of Smart Cards

  1. Larger memory.
  2. High levels of security
  3. Reduced fraud
  4. Organized information
  5. Reliability
  6. Upper management information
  7. Information Security
  8. Ease of use without need for connections online or via telephone
  9. User comfort
  10. Represent liquidity
  11. Through the Internet, smart card users can buy and pay for computer network
  12. Ensuring economic operations, 100% effective theft-proof.
  13. Falling costs for operators and users.
  14. Specific standards ISO 7810, 7811, 9992, 10536.
  15. Multiservice smart cards.
  16. Privacy.
  17. Administration and control over cash payments.

Disadvantages of smart cards

  1. A more powerful virus.
  2. Discomfort to retrieve information from a stolen card.
  3. For its size can be easily misled.
  4. The card must be recharged.
  5. Increased cost of production.
  6. Dependence of electrical energy for use.
  7. Vulnerable to fluids.
  8. Bank fees associated with credit card.
  9. We need a smart card reader.

Most Current Services

Today smart cards are proving to be used in the following services:

  1. Mobile Phone Cards. Approximately 3.3% of the actual cards. With a forecast for 2000 of 76 million cards. Allows the subscriber registration and password.
  2. Health Cards. While it now accounts for 5.4% of cards (46 million approx.) Is expected to see short term increased their number by 800% for 2003. May contain identifying information apart from a history or information on chronic diseases or allergies.
  3. Wallet banking. Currently about 65 million cards. Growth is expected in the short run close to 550%. The chip contains information about the monetary balance of the card in terms of their use (in appropriate establishments) and its cargo at ATMs. While the trend is growing in terms of their use is not believed to move completely to the conventional credit card but to complement it.
  4. Phone Cards. In this sector, where smart cards have increased usage. about 665 million cards and with an estimated growth of 100% until 2000. The chip contains information about the outstanding balance of use in public telephones ready.
  5. Other services among which use common services in universities and pay TV cards. In several Spanish universities have launched projects based on this technology. Each student has an identification card that allows you access to all university services (photocopies, library) and is also a credit card and electronic purse, Also find services for security identification, criminal records, services On-line, transportation, national identification, local, military, access control and presence.

Contactless smart cards

Smart cards with microprocessor has the following advantages:

  1. They have a cost per transaction is less than the conventional magnetic cards. This is including the costs of the card, the necessary infrastructure and elements to handle transactions.
  2. They offer a performance about 20 times higher than traditional magnetic card. This advantage is explained by the multiple configurations that can be, allowing use in various applications.
  3. Enable businesses in mobile communications environments, in environments Prepaid and new communications environment. In these environments cannot access traditional card.
  4. Improvements in security and operation can reduce the risks and costs of the user.

Internal Controls of Smart Cards

There is no 100% secure system, but the smart card is theoretically providing a higher degree of safety.

The smart card is a very secure mechanism for storing financial information or transaction, the smart card is a safe place to store information such as private keys, account number, password, or valuable personal information, this ability is due to:

  1. Encryption.
  2. Password Safe (PINs).
  3. Secondary security key.
  4. Redundant safety system.
  5. Digital Signatures.
  6. High security physical access to: facilities, laboratories, control, computer rooms.
  7. Through biometrics, fingerprint and retina.

Smartcard-based applications

Control Types

Control of information on human resources KU-CLOCK

Lets gather, manage and perform calculations with all the data you have on your employees, is a strategic tool for cost control.

It is designed to give immediate and intuitive access to secure, detailed and useful information for each of its employees or places divisions, sections or by post.

Intelligent Presence Control (ICC)

Consolidation in the field of human resources and corporate culture, concepts such as human capital and knowledge management and phenomena such as telecommuting, flexible hiring and global competition are changing the vision of the personnel department.

The ICC help human resource managers to "drive" the change to the traditional functions with a certain operational focus for the day to day, incorporate ICC

  1. Absenteeism Routines: The replacement plan that allows for the company does not stop.
  2. Process integration routines and people: Knowing the intellectual capacities of staff can link them with the plans and business objectives by optimizing the information, the possibility of working equipment, shielding the company of strong competition and ensuring knowledge transfer balanced and strengthened market orientation.
  3. Reporting: The CPI distributes reports, statistics and graphs for each of the routines or functions that the system is endowed.
  4. Centralization and communications: The ICC work on LAN and WAN and Windows NT by extending the control of the presence of delegations or their tele-working system.
  5. Security through Smart Cards: Personal authentication using smart cards fraud in signing banished. The copy function (Backup), ensures the safekeeping of the data.

Physical Access Controls

Control of opening doors and time, record by digital photograph and fingerprint access.

Access control: This is the most obvious and most neglected that such access to the management station of the network or the server room, on the other hand is very important to have a password system that is the only way to authenticate and identify users when they access the computer system.

Personal Computer Control

Protecting access to PC, PC lock when you remove the card and unlock by the user fingerprint protection.

Restrict our access to the computer by inserting the smart card, without it we can access the computer. If you insert a card does not validate the computer may freeze and the same would happen if a card reader.

Computer control applications

Helps protect the information and use of enterprise software, once inside the application each card allows access to given data. Meets almost 100% of the more stringent requirement of security.

It takes a manager that also allows us to make statistical studies and temporality that is desired, the operator is projected under requirements of the company or its security directors to give even more potential to the solution.

internet

Internet

Cruise Control on the Internet and computer access control

This is a program developed for the management of internet cafes, cyber cafes where virtual or use navigation software, are subject to recovery or time.

The system uses security based on tallies smart technology. When the user insert the card into the reader built into the computer, you have a limited time the card is regulated by controlling the use of the computer, performing a lock or unlock the computer.

Smart Cards

Due to the advanced technology that is available in the world, it is necessary for this constantly evolving and enjoying the benefits that this offers us in any of the services where applicable and who has the need for handling information in a timely, quickly and without limits or delays in paperwork reaching them, it becomes necessary general knowledge of smart card technology by the community for its widespread use.


Like it on Facebook, Tweet it or share this article on other bookmarking websites.

No comments