Embedded Controller Based Smart Card Access

نویسنده

  • Durg Singh Chauhan
چکیده

The most common devices used to control access to private areas where sensitive work is being carried out or where data is held, are keys, badges and magnetic cards. These all have the same basic disadvantages: they can easily be duplicated and when stolen or passed on, they can allow entry by an unauthorized person. This paper proposed a low cost embedded controller based smart card which consists of contact less card and a card reader. This Card reader is ideal for applications such as access control, attendance monitoring etc.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Smart XML Access Right Controller for Mobile Applications

Chip-Secured XML Access (C-SXA) is a versatile XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of on-board personal data or to control the flow of data extracted from an external source. C-SXA addresses a broad range of applications, like secure portable folders, Digital Right Management, parental control or exchange of confidential in...

متن کامل

A Virtual Development Environment for Smart Card Applications

Virtual development environment increases efficiency of embedded system development because it enables developers to develop, execute, and verify an embedded system without real target hardware. This paper deals with an implementation of a virtual development environment for Smart Card applications. Usually application developments are performed with a evaluation kit that equipped with a hardwa...

متن کامل

Tamper-resistent ubiquitous data management

Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. ...

متن کامل

Sécurisation du contrôle d'accès pour des documents XML. (A Secure Access Controller for XML Documents)

The erosion of trust put in traditional database servers and in Database ServiceProviders and the growing interest for different forms of selective data dissemination aredifferent factors that lead to move the access control from servers to clients. Different dataencryption and key dissemination schemes have been proposed to serve this purpose. Bycompiling the access control rul...

متن کامل

Tamper-resistant ubiquitous data management

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008