What are the applications of smart card in information security?


There are several applications of smart card which are as follows −

  • A smart card is a device generally the size and shape of a credit card and includes one or more integrated chips that implements the functions of a computer with a microprocessor, memory, and input/output. Smart cards can be used to offer increased functionality and an increased level of security over memory cards when used for recognition and authentication.

  • Smart Cards are plastic cards that have integrated circuits or storage receptacles embedded in them. Smart cards with integrated circuits that can perform transactions and are defined as “active” smart cards.

  • A smart card can process, and store, data through its microprocessor; thus, the smart card itself (against the reader/writer device), can control access to the data stored on the card.

    This can be particularly useful for applications including user authentication in which security of the information should be maintained. The smart card can execute the password or PIN comparisons within the card.

  • The smart card can restore conventional password security with better, a PIN, which is checked by the card versus the computer system, which cannot have as sophisticated a means for user recognition and authentication.

  • As an authentication method, the smart card is the customer possesses. With current advances, a password or PIN can be added for more security and a fingerprint or photo for even more security. As contrasted with memory cards, an important and beneficial feature of a smart card is that it can be manufactured to provide the security of its own memory, thus lowering the risk of lost or stolen cards.

  • Use of smart devices define the added expense of the card itself, and the special reader devices. Careful decisions as to what systems warrant the need of a smart card should be made. The value of manufacturing smart cards is larger than that of memory cards but the disparity will get less and less as progressively manufacturers switch to this technology.

    On the other hand, it should be remembered that smart cards, against memory only cards, can effectively connect with relatively ‘dumb’, low-cost reader devices.

  • The card can be programmed to limit the multiple login attempts and ask biographic questions, or produce a biometric check to provide that only the smart card’s owner can use it. Furthermore, non-repeating challenges can be used to foil a method in which an attacker attempt to login using a password or PIN he observed from a previous login. In addition, the difficulty of smart card manufacturing creates forgery of the card’s contents virtually impossible.

Ginni
Ginni

e

Updated on: 09-Mar-2022

310 Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements