...paper will focus on how it works in simple terms, and the pro’s and con’s of this technology. NFC is a wireless technology used by manufacturers such as Philips or Sony. It makes it possible to establish communication between two objects, for example a mobile device and a base that has been equipped with an ad hoc antenna. NFC is both a read and write technology. In each connection there must be one reader devide and one writer device so that the appropriate exchange of data can be established. In writer or “card emulator” mode, the device replaces physical cards – contactless or other - normally used. Examples being credit cards, smart cards, even SIM cards in your cell phone. In reader mode; holding the device near a compatible tag, it can retrieve information that enables you to access contextual information broadcasting services (Gizmodo). Several types of usages are possible with NFC technology. In “card-emulation” mode, the device can host virtual payment cards and enable the user to...
Words: 976 - Pages: 4
...Essay Week 2 Daniel Farella I.T.T. Technical Institute Author Note: This essay is being submitted on 5/9/2013 for Earl Robinson intorduction to security class. Essay week 2 * The remote access control policy consists of * Group membership * Type of connection * Time of day * Authentication methods * Advanced conditions: * Access server identity * Access client phone number or MAC address * Whether user account dial-in properties are ignored * Whether unauthenticated access is allowed After the connection is authorized, remote access policies can also be used to specify connection restrictions, including the following: * Idle timeout time * Maximum session time * Encryption strength * IP packet filters * Advanced restrictions: * IP address for PPP connections * Static routes Additionally, you can vary connection restrictions based on the following settings: * Group membership * Type of connection * Time of day * Authentication methods * Identity of the access server * Access client phone number or MAC address * Whether unauthenticated access is allowed On this network I recommend a WAN network . Because the wan network is great for going cities to cities or state to state plus there are more security features that can be recommended. The physical and logical access controls are as follows Authentication Identification is usually...
Words: 348 - Pages: 2
...AS Level Module 2 Information: Management and Manipulation Lecture One 11.1 Data Capture Lecturer: Deepak Gautam Email: gautamd@wolverhamptoncollege.ac.uk Room: 120, Wulfrun Campus Telephone: 01902 821133 Overview of Data Capture The process of collecting data in a form suitable for use in an information system is termed data capture. For example, before an electricity board can charge a customer for the use of electricity, the customer’s meter must be read and recorded, or captured, on a suitable form. The data must then be transferred into the computer system by means of an input device appropriate to the method of data capture. Sometimes the data capture form is directly readable by an input device, as, for example, in the case of mark sensitive forms which can be read by optical mark readers (OMRs). On other occasions, the data on the form must be first transferred to a suitable medium by a data entry person using a key-to-storage device. Sometimes the data to be captured is pre-recorded on an item to be sold, as with bar codes, so that a data recording form is not required at all, but in many instances, some sort of data capture form is required. The design of such forms is of great importance, since the clearer and more concise the form, the less chance there is of inaccurate data being recorded. Frequently it is necessary to use questionnaires or observation sheets to collect data for statistical...
Words: 2378 - Pages: 10
...are increasingly paying their bills through banks and using credit cards and other online transactions. In fact, sometimes some stores are becoming reluctant to accept cash. Does this mean that cash is about to disappear? Many people think so, but others maintain that notes and coins have too many advantages to disappear overnight. This essay will examine whether or not we are moving to a cashless society. However, notes and coins have been around for thousands of years because of their many advantages. One outstanding characteristic of cash is that it is very fast. There is no waiting for the transaction to take place. Furthermore cash is a universal language. Illiterate people can use it, and the best currencies can be used anywhere in the world. A third point is that cash does not require a highly developed infrastructure to support it. There is no need for telephone lines, internet connections, credit card reader machines, or other devices in an economy that depends on paper notes. This makes cash a very practical solution in poorer countries, where the bulk of the world’s population lives. A big advantage of cash is that the spender is able to spend only as much as he or she has. Contrast this with credit cards, where the user may spend far more than he or she has, and can even end up in debt. Some people expect that we will soon pay for everything from a microchip embedded in our hand or in an ID card, but there are many people who oppose such concentration of information...
Words: 502 - Pages: 3
...Development Strategy 12 Advertising & Promotion 12 Survey (25 People) 13 Rodgers 5 characteristics 15 Relative Advantages: 17 Compatibility: 18 Complexity: 19 Triability 19 Observability 20 Sources 21 EXECUTIVE SUMMARY Business Description Micro Life is an innovative, convenient all-in-one card for those who use to carry all their cards in their daily life. Because of Micro Life, consumers will not have to carry them around. Micro Life wants their customers to experience the new technology; they will be able to move around without having to worry about losing their IDs or Credit Card. This card can hold up to 10 pieces of information or transaction cards.. We have a contract with Chase, Bank of America, different hospitals and some retailers. By using the card, the consumer is able to pay, travel, get in his car or house as fast as he can say “Micro Life”! Our Mission Statement Designed to make your daily life easy, convenient and secure, Micro Life can be used in all stores, websites, banks partners. It allows you to take live your life without worrying about losing your important information, carrying your credit card or healthcare card. Micro Life, designed to make life easier. Designed to make your daily life easy, convenient and secure, Micro Life can be used in all stores, websites, banks partners. It...
Words: 3004 - Pages: 13
...NFC Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch (NFC 2011). Cell phone carriers, such as AT&T, use NFC capabilities in their cell phones as a selling point to the consumer. Some companies, like Samsung, use NFC TecTiles to help their consumers find what they need with just a simple glide of their phone. Major credit card companies use the NFC technology in their credit cards to make it simpler for customers to pay for merchandise without having to swipe there card. With the advancement of the first telephone to modern day smartphones, AT&T has been there. AT&T has always had a unique way of staying ahead and on track with the quick advancement of technology. Numerous smartphone application developers have tried to create software that will allow you to no longer worry about having your wallet. As long as you have your smartphone and the application, you still have the ability to pay for merchandise. With AT&T’s new application, ISIS, Near Field Communication technology is something they are continuing to move forward with. ISIS is a smartphone application that has been successfully designed to replace your wallet and put all your information in one program. Some people might say it sounds crazy, but Ben Spencer (2013) had done studies that have shown, “that cell phone users cannot...
Words: 1482 - Pages: 6
...to me; however, I remembered that I have ATM card on my wallet. I slip out my card from my wallet and gave it to the cashier. She courteously took the card from me and swiped it through a card reader. After a while, the lady on the cashier handed back my card with a receipt and gave me a generous smile while saying, “Thank you, Sir”. In that particular moment, I wondered or you may also wondered, “How did this transaction happen?” or “How can all information be stored on that card?” given the fact that it is just a plastic card. The answer on these questions lies on the back of our card. The black stripe, also known as the magnetic stripe, is what makes this possible. Magnetic stripe technology was invented Fritz Pfeulmer, a German-born audio engineer in 1928. Although it was invented that time, it was not until the early 1960s that the technology found its way to meet the demands of people in metropolitan area. It was then first installed by the London Transit Authority as a mean to aid the increasingly busy London Underground. Its success was spread across the Atlantic Ocean. More so, by the late 1960’s, San Francisco incorporated the technology into their Bay Area Rapid Transit transportation service. History of magnetic stripe technology tells us that it has really been used for a long period of time since the early 1960’s. The usage of the technology has been very common on the credit cards and debit cards. Credits cards were first issued in 1951 by Diners Club. However...
Words: 1322 - Pages: 6
...CONTENTS PREFACE ..........................................................................................................................5 FOREWORD ..........................................................................................................................7 INTRODUCTION ............................................................................................................... 11 ELECTRONIC CASH .......................................................................................................... 15 INTRODUCTION ................................................................................................... SMART CARDS/STORED VALUE CARDS........................................................ The Basics ..................................................................................................... Stored-Value Card Issuers ............................................................................ COMPUTER E-CASH ............................................................................................ The Basics ..................................................................................................... E-Cash Issuers ............................................................................................... REGULATORY POLICY ......................................................................................... SUMMARY OF ELECTRONIC CASH IN THE NEAR TERM ......................... 15 15 15 16 19 19 19 20 22 ELECTRONIC BANKING...
Words: 39311 - Pages: 158
...production capabilites expanded and price points kept dropping, Wal-Mart's implementation is now in full swing with most of their top suppliers delivering RFID tagged pallets and crates to all of Wal-Mart's distributions centers. RFID use has started to penetrate other corporate supply chains, but in many cases these implementions are closed loop systems. In other words, the RIFD is deployed within a particular corporation's supply chain, but not between them and their business trading partners. There are other applications which are also limited todeployment withing a single organization, such as tracking tools so they aren't left behind in the airplane after maintenance. 1ST ORGANIZATION TO LAUNCH RFID EMBEDDED CARDS: Chase Offers Contactless Cards in a Blink The global financial services firm will issue...
Words: 1562 - Pages: 7
...credit card services. They have intensely used advertisements as the main method of attracting customers using the message peace of mind to attract their customers to use their cards. However, recently many new entrants have entered the market to drive competition up and reduce the value of each Barclaycard credit cards. The following is a list of recommendations that Barclaycard should implement to remain competitive. 1. Barclaycard can introduce credit cards that have a lower APR to compete with the new entrants. 2. To encourage spending Barclaycard can introduce incentive programs to stimulate spending. For example, they can follow Novus® with a cash back program on spending. 3. Discourage consumers from using cash and a main method of payment. 4. Be the first mover again and introduce other programs that allow a consumer’s life to be easier. For example, they can start implementing services where a consumer can pay with their cell phones using the IR feature, or start emplacing smart card technology in retail outlets as this is seen as the next possible trend in the future. Introduce services that allow consumers to purchase things at home with a touch of a button (internet credit cards e.g. one time use cards) SWOT Analysis*[1] Strengths • Market leadership with a market share of 34% in terms of credit cards issued, and 27% in transaction value. * • Low cost production, resulting from accumulated experience as the first credit card issuer...
Words: 2232 - Pages: 9
...Use Cases As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service. Prepare a 5-6 page paper in which you: 1. Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM. 2. Illustrate the use case using Visio or a similar product. 3. Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product. 4. Describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product. 5. Identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system. 6. Research and cite at least three (3) authoritative academic sources Use case diagrams in ATM usage CIS210 Use case diagrams of an ATM system Use case diagrams are pictorial representations of different process involved during a specific operation. They are used in modeling real world interaction of system modules and the outside user during the systems analysis stage of software development. They are used mainly in the representation of how the software works in defining the requirements analysis. Use case diagrams in this field are used...
Words: 1140 - Pages: 5
...Smart Cards for Future Healthcare Systems Secure, efficient, reliable Card-based e-health networks: cutting costs and improving care All around the world, news paper headlines warn about the exploding costs of health care. Advanced medicines and technology are boosting life expectancy. As a result, people can now look forward to living past the age of 80 – twice as long as 100 years ago. This trend, however, has the side effect of driving up healthcare costs. As people get older, they need more frequent and more expensive care, causing the price of insurance to skyrocket. Clearly, something needs to be done to contain these costs. A number of countries have implemented conventional measures aimed at saving money. One of the most basic measures is the introduction of cardbased ehealth net works, which can help reduce costs remarkably. Card for physicians and phar macists, and a Card Application Management System (CAMS). Patient Data Card The Patient Data Card is a PINprotected smart card incor porating a microprocessor and protected by cryptographic functions. It contains adminis trative insurance information and entitles patients to seek medical treatment. In turn, the patients give their doctors access to their personal medical data, which is stored either on the card or in the ehealth network. The card can also hold information such as elec tronic prescriptions. How to cut healthcare costs 1. Reduce fraud 2. Streamline administration 3. Improve communication 4...
Words: 1254 - Pages: 6
...The Smart Card Detective: a hand-held EMV interceptor Omar S. Choudary University of Cambridge Computer Laboratory Darwin College June 2010 This dissertation is submitted for the degree of Master of Philosophy in Advanced Computer Science Declaration I Omar Salim Choudary of Darwin College, being a candidate for the M.Phil in Advanced Computer Science, hereby declare that this report and the work described in it are my own work, unaided except as may be specified below, and that the report does not contain material that has already been used to any substantial extent for a comparable purpose. The word count, including footnotes, bibliography and appendices is 14 978. Signed: Date: The Smart Card Detective: a hand-held EMV interceptor Omar Choudary Abstract Several vulnerabilities have been found in the EMV system (also known as Chip and PIN). Saar Drimer and Steven Murdoch have successfully implemented a relay attack against EMV using a fake terminal. Recently the same authors have found a method to successfully complete PIN transactions without actually entering the correct PIN. The press has published this vulnerability but they reported such scenario as being hard to execute in practice because it requires specialized and complex hardware. As proposed by Ross Anderson and Mike Bond in 2006, I decided to create a miniature man-in-the-middle device to defend smartcard users against relay attacks. As a result of my MPhil project work I created a hand-held...
Words: 10985 - Pages: 44
...problem associated with billing consumer living in isolated area and reduces deployment of manpower for taking meter readings. Every consumer can buy a memory card (is nothing but an EEPROM IC) with a password stored inside it using a MC program. The memory card is available at various ranges (ie. Rs 50, Rs 100, Rs 200 etc).In our project we have given the name for memory card as smart card. When the consumer insert a smart card into the card reader which is connected kit.Then the card reader will read the stored information and delete the information from the EEPROM IC(smart card) using the MC program. So that the smart card cannot be reused by others. Suppose if a consumer buy a card for Rs.50/- he / she can insert this amount through the card reader so that prepaid energy meter with tariff indicator kit will be activated. According to the power consumption the amount will be reduced. When the amount is over, the relay will automatically shutdown the whole system. In our project we also have a provision to give an alarm sound to consumer before the whole amount is reduced. You can also find the Card programmer circuit and program from the download. So that you can easily create your own cards. Here's the procedure to create the cards. How to program a new card. For making a unit price card for Rs 2.50 1. Insert the card into the Programmer 2. Dial 1*0250# The format is 1 for unit price * for start process - Higher digit of the unit price - lower digot of the unit price...
Words: 2185 - Pages: 9
...| Enhanced Security for Data Access | | Richard Edvalson 1/12/2014 | Contents I. Contents 1 II. Introduction 5 III. Access Control Layers 5 A. The Access Control Perimeter 5 B. Asset Containers 5 C. Workplace Perimeter 5 IV. Access Control Methods and Technical Strategies 5 A. Identification, Authentication, and Authorization 5 B. Logical Access Controls 5 1. Network Architecture Controls 5 2. Remote Network Access 5 3. Security Network Ports 5 4. Encryption 5 5. PKI Compliance Requirements 5 6. Passwords, Pins, and Other Forms of Access 5 C. Physical Access Controls 5 1. Classified Storage and Handling 5 2. Badges, Memory Cards, and Smartcards 5 3. Physical Tokens and Physical Intrusion Detection 5 V. Access Control Integration and Administrative Strategies 5 A. Biometric Systems 5 B. Separation of Duties 5 C. Protecting the Enrollment Process 6 D. Protecting the Verification Process 6 E. Cryptographic Controls 6 F. Integrating Access Control Methods 6 VI. Public Key Infrastructure 6 A. DoD-Approved PKI 6 B. Multi-factor Authentication 6 C. Identification and Authentication through Digit Signature of Challenge 6 D. Data Integrity through Digital Signature of the Information 6 E. Confidentiality through Encryption 6 F. Assists with Technical non-Repudiation through Digital Signatures 6 VII. Mitigating Risk in the User Domain 6 A. Interviewing and Background Screening...
Words: 590 - Pages: 3