23 Nov 2022

86

Smart Card Technologies within the Access-Control Environment

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1697

Pages: 6

Downloads: 0

Introduction 

Smart cards are part of biometrics used I the industry of payment cards. Biometrics are technology devices used for the identification of persons depending on their, behavioral or biological features (Jain, Bolle & Pankanti, 2006). They have various advantages associated with safety, ease of access and reliability. But they also have some limitations that affect he pace at which they are being adopted as electronic payment methods. This paper aims to support or prove the idea that various smart card technologies within access-control environments provide an increase in security, accessibility, and reliability. The section that follows begins by explaining the need for smart card technologies, how smart card technologies function and the shortcomings of smart card technologies. The paper ends with conclusion that summarizes arguments and main points. 

The Need for Smart Card Technologies 

Advantages of Smart Card Technologies 

Smart card technologies are needed because they offer several advantages. The first advantage is the ease of use. Just like debit cards or credit cards, smart cards are simple to use though they have high level of security as compared with debit and credit cards. They are also light hence easy to carry. This factor makes smart cards easy to possess and settle electronic payment with it such as parking fee (Clark, 2012). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The second advantage is the increased security. Smart cards make use of authentication and encryption technologies which are extra secure as compared with the former approaches related to payment cards. This kind of encryption and authentication makes it difficult for any unauthorized individual to decipher information stored within the smart card (Clark, 2012). The third advantage is the enhanced accuracy. Smart cards can help achieve high degree of accuracy with systems of biometrics. When the system is set in the right way then it is possible to use biological feature like finger prints to provide special and accurate methods of identification. Only the authorized individual can gain access to information since these features cannot be duplicated (Randal, 2009) 

The cards are also good in saving time since the identification process is fast in accepting or rejecting the scanned biological characteristics of an individual (Randal 2009). Another advantage is the multi-factor authentication. The two factor authentication can for, instance be used with smart card to improve on security plus reliability. The use of multi-factor authentication is also minimizes or eliminates the chance of illegal access to personal information by cyber attackers or unauthorized persons (Kumari & Khan, 2014). Reliability is yet another merit od adopting this type of biometric identification. Smart cards are also reliable when used for personal identification since they are dependable, consistent and can be trusted by smart card holders who have sensitive information that needs optimum security ( Akram, Markantonakis & Mayes, 2014). 

Places Smart Cards Are Being Used 

Smart cards can be used in a variety of areas. They include businesses and corporations, government agencies, schools and universities and other private sectors. The businesses and corporations can use smart cards to enhance the security and privacy of sensitive business information. The individual who wants to access business information will be requested by the biometric system to provide at least two biometric readings which undergo the process of verification prior to getting the right of entry in to information. This kind of verification can take place during the process of buying and paying for services and/or goods (Carter & Green, 2013). 

Government agencies also use smart card biometrics in order to tighten security at various market borders as a way of dealing with threats terrorist attack and pressures of immigration. In this case, biometric smart cards can be used to detect biological features like fingerprints as a way of telling whether an individual is citizen in the country (Caldwell, 2015). 

The schools and universities use smart card biometrics for the identification of sensitive information/data such as those associated with the health of students, facial appearance which helps to recognize the student’s race. Smart cards in schools and universities are also used for transparency which is significant where the system of biometric does not need the knowledge of student. Only the system of facial recognition, for example, can capture and make comparison between or among images without active participation of the person/student. They are also used for security where schools and universities ensure that there is no illegal access or disclosure of sensitive students’ information or administrative information. They can also be used for purposes of accuracy and privacy impact assessment. The private sectors such as private schools, private universities and businesses also use smartcard mainly for accuracy and security of sensitive information stored within the biometric system (Staff, 2012, Data protection commissioner, n.d). 

How Smart Card Technologies Function 

Different Smart Card Technologies 

The main categories of smart card technologies include contact cards, contactless cards and multi component cards. Contact cards are the most common and include memory cards like EEPROM that have protected and segmented memory. Another contact card type is the CPU/MPU that have symmetric public keys which are dynamic and with dual interfaces. The contactless cards also consists of CPU/MPU cards which is the same as that of contact ones and memory cards which are read only. The multi component cards include vault cards, fingerprint cards, one time password display card and the bio-Assaying Fluids Sensor cards (Smart card basics, 2010). 

Describe How Smart Card Technologies Function 

The contact smart cards have a contact pad which offers electrical connection when it is inserted within the card reader. While inside the reader, it acts as a communication medium amid the smart card and the computer system which can be the terminal for Point of Sale. The contactless smart card communicates and gets powered by the help of reader via the technology of radio frequency induction. The card uses an inductor to get the incident signal of radio frequency interrogation. It then rectifies the incident frequency and uses it in powering the card. The smart cards use PKI at times when authenticating the identity Akram, Markantonakis & Mayes, 2014). 

Describe Required Software and Systems 

The smart card use advanced card system with Win 7, Win 8.1, Win 10, Win XP, and Win Vista operating system software. Others include windows 2000, Win 98 and smart card proprietary operating system all used with different utility tools Akram, Markantonakis & Mayes, 2014).

Describe Enrollment Process 

The cards become enrolled after receiving suitable certificate signed by legal certificate authority. First, the card is inserted into the reader by the user on their workstation or computer system. The Enterprise Security Client then receives the event. The users’ desktop computer then displays the page for enrollment. The required details are then completed by the card users. The system of the user then links to the token of system processing (TPS) and the Certificate Authority. The smart card is then enrolled by the TPS by use of certificate that is signed by Certificate Authority ( Akram, Markantonakis & Mayes, 2014). 

Describe Various Cards and Readers Available 

The section III (A) above identifies different cards available in terms of technology. The card readers available include ISO7816 compliant card reader which is the most common, in-built smart card readers which come already integrated within the computer, ISO 14443 card readers, and ISO 15693 card readers. Others include desktop smart card readers, contactless smart card readers, PCMCIA port smart card reader which is used for mobile applications, smart card reader for ExpressedCard 54 port, smart card USB dongle used for SIM cards, and PC link smart card reader used for secure PIN entry. There is also smart card reader with integrated fingerprint scanner which is used for biometrics and for authentication purposes ( Akram, Markantonakis & Mayes, 2014). 

Disadvantages of Smart Card Technologies 

Cost 

The disadvantage in this case is that the costs of card readers are more expensive as compared to the memory cards themselves (Allen, 1996). 

Possibility for Lost Cards 

There is possibility that the cardholder can lose the smart card thus adding another concern of security. There is also the possibility that the contents/information within the card memory can be wiped out by failure of memory. This can lead to loss of sensitive information especially those of finances. The cards are also light just like the credit cards. This makes it easy to get lost (Allen, 1996, Clarke, 2012). 

Slow Adoption by Users 

The slow adoption of smart cards is because of the insufficient or lack of necessary hardware for use with the cards particularly in restaurants and stores. The technology is also expensive to generate and use, making it slow to adopt it (Clarke, 2012). 

D.     Public Perception of Smart Cards 

The degree to which people believe or perceive that smart cards are secure determines trustworthiness and the number of users who will enroll to use it (Allen, 1996). 

Implementing Policies & Procedures for Proper Use 

The policies and procedures for proper use of smart card needs to cover items such as card usage which defines the right way in which the holders are supposed to use it. The second item is the card issuing and revocation which should address who is responsible for card issuance and the conditions under which the card already issued can be revoked. The temporary cards is another necessary item of policy that should address how to handle circumstances in which workers happen to forget their smart badges in any given day. Other policy items that need to be considered include lost cards, card replacement, badges for visitors and so on (Brett, 2002). 

F. False Sense of Security 

Security is the major problem that faces smart cards. In this case, you realize that not every smart card is secure. The next issue to do with security is the perception of the public concerning the technology (Allen, 1996). 

V.      Conclusion 

This paper attempts to prove how various smart card technologies within access-control environments offer enhanced security, accessibility, and reliability. Smart card biometrics though has some limitations that slows down the [ace of their adoption, the advantages outweighs the disadvantages. In fact, some of the disadvantages according to the discussion above are just associated with human perception and not the actual truth about the safety of smart cards. The smart cards which are of various types such as contact, contactless and multi component cards are more secure, more accessible and more reliable that the credit or debit cards. However, the level of security continues to improve as technology also advances. The users have to enroll the cards which are signed by the legal certificate authority before the card is considered valid for use. Because of high level of information security, accessibility and reliability required, smart cards are needed for use in areas that deal with sensitive information such as business, corporations and government agencies among other places. 

References 

Akram, R. N., Markantonakis, K., & Mayes, K. (2014, March). Trusted platform module for smart cards. In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on (pp. 1-5). IEEE. 

Allen, C. (1996). Smart cards: disadvantages. Retrieved from http://web.mit.edu/ecom/Spring1997/gr12/4DISADV.HTM 

Caldwell, T. (2015). Market report: border biometrics. Biometric Technology Today , 2015 (5), 5-11. 

Carter, S. R., & Green, T. A. (2013). U.S. Patent No. 8,392,965 . Washington, DC: U.S. Patent and Trademark Office. 

Clarke, L. (2012). Advantages and Disadvantages of Using Smart Cards: Brief Overview of Smart Card Security & Uses. Retrieved from http://www.brighthub.com/computing/smb-security/articles/67274.aspx 

Kumari, S., & Khan, M. K. (2014). Cryptanalysis and improvement of ‘a robust smart ‐ card ‐ based remote user password authentication scheme’. International Journal of Communication Systems , 27 (12), 3939-3955. 

Randall Gamby, R. (2009). The pros and cons of implementing smart cards. Retrieved from http://searchsecurity.techtarget.com/answer/The-pros-and-cons-of-implementing-smart-cards 

Smart card basics.(2010). Types of smart cards. Retrieved from http://www.smartcardbasics.com/smart-card-types.html 

Jain, A., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media. 

Data protection commissioner .(nd). Biometrics in Schools, Colleges and other Educational Institutions. Retrieved from https://www.dataprotection.ie/docs/Biometrics-in-Schools,-Colleges-and-other-Educational-Institutions/409.htm 

Staff, C. J. (2012). ID Cards Aren’t Just for Access Control Any More - Campus Safety. Retrieved from http://www.campussafetymagazine.com/news/college-campus-id-cards-aren-t-just-for-access-control-any-more/ 

Cards Work In the Enterprise. Retrieved from https://www.sans.org/reading-room/whitepapers/authentication/making-smart-cards-work-enterprise-138 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Smart Card Technologies within the Access-Control Environment.
https://studybounty.com/smart-card-technologies-within-the-access-control-environment-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 158

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration