Smart Card Applications: Design models for using and programming smart cards (Hardcover)
暫譯: 智慧卡應用:智慧卡使用與程式設計的設計模型 (精裝版)

Wolfgang Rankl

  • 出版商: Wiley
  • 出版日期: 2007-06-01
  • 售價: $1,596
  • 語言: 英文
  • 頁數: 236
  • 裝訂: Hardcover
  • ISBN: 047005882X
  • ISBN-13: 9780470058824
  • 相關分類: Java 程式語言物聯網 IoT
  • 下單後立即進貨 (約5~7天)

買這商品的人也買了...

相關主題

商品描述

Description

A practical guide to the specification, design, and programming of smart card systems for working applications.

More than 3 billion smartcards are produced every year. Generally defined as any pocket-sized card with embedded integrated circuits or chips, they have a huge number of applications including travel cards, chip and pin cards, pet tags, mobile phone SIMs and pallet trackers. Now with modern Smart Card technology such as Java Card and Basic Card it is possible for everyone to create his or her own applications on a smart card.

This book provides generic solutions for programming smart cards, enabling the creation of working applications and systems.

Key features:

  • Presents a comprehensive introduction to the topic of smart cards, explaining component elements and the smart card microcontrollers.
  • Sets out information on operating systems with case studies of a range of applications including credit card security, mobile phones and transport payment cards.
  • Gives detailed advice on the monitoring of smart card applications, recognizing potential attacks on security and improving system integrity.
  • Provides modules and examples so that all types of systems can be built up from a small number of individual components.
  • Offers guidelines on avoiding and overcoming design errors.

Ideal for practising engineers and designers looking to implement smart cards in their business, it is also a valuable reference for postgraduate students taking courses on embedded system and smart card design.

 

Table of Contents

Foreword.

Symbols and Notation.

Abbreviations.

1 Overview of Smart Cards.

1.1 Card Classification.

1.2 Card Formats.

1.3 Card Elements.

1.3.1 Printing and labelling.

1.3.2 Embossing.

1.3.3 Hologram.

1.3.4 Signature panel.

1.3.5 Tactile elements.

1.3.6 Magnetic stripe.

1.3.7 Chip module.

1.3.8 Antenna.

1.4 Smart Card Microcontrollers.

1.4.1 Processor.

1.4.2 Memory.

1.4.3 Supplementary hardware.

1.4.4 Electrical characteristics.

2 Smart Card Operating Systems.

2.1 FileManagement.

2.1.1 File types.

2.1.2 File names.

2.1.3 File structures.

2.1.4 File attributes.

2.1.5 File selection.

2.1.6 Access conditions.

2.1.6.1 State-based access conditions.

2.1.6.2 Rule-based access conditions.

2.1.7 File life cycle.

2.2 Commands.

2.3 Data Transmission.

2.3.1 Answer to Reset (ATR).

2.3.2 Protocol Parameter Selection (PPS).

2.3.3 Transmission protocols.

2.3.3.1 T=0 transmission protocol for contact cards.

2.3.3.2 T=1 transmission protocol for contact cards.

2.3.3.3 USB transmission protocol for contact cards.

2.3.3.4 Contactless transmission protocols.

2.3.4 SecureMessaging.

2.3.5 Logical channels.

2.4 Special Operating System Functions.

2.4.1 Cryptographic functions.

2.4.2 Atomic processes.

2.4.3 Interpreter.

2.4.4 Application management.

3 Application Areas.

3.1 Smart Card Systems.

3.2 Potential Uses.

3.3 Application Types.

3.3.1 Memory-based applications.

3.3.2 File-based applications.

3.3.3 Code-based applications.

4 Basic Patterns.

4.1 Data Protection.

4.1.1 Definition of terms.

4.1.2 General principles.

4.1.3 Recommendations for smart card systems.

4.1.4 Summary.

4.2 Export Control.

4.3 Cryptographic Regulation.

4.4 Standards.

4.4.1 Standards for card bodies.

4.4.2 Standards for operating systems.

4.4.3 Standards for data and data structuring.

4.4.4 Standards for computer interfaces.

4.4.5 Standards for applications.

4.5 Documents for Smart Card Systems.

4.5.1 Specification partitioning.

4.5.1.1 System specification.

4.5.1.2 Background system specification.

4.5.1.3 Smart card specification.

4.5.1.4 Terminal specification.

4.5.2 Elements of a typical card specification.

4.5.2.1 General information.

4.5.2.2 Smart card.

4.5.2.3 Smart card operating system.

4.5.2.4 Application.

4.5.3 Document distribution.

4.5.4 Document version numbering.

5 Architecture Patterns.

5.1 Data.

5.2 Data Coding.

5.3 Files.

5.3.1 Access conditions.

5.3.2 File names.

5.4 Log Files.

5.4.1 Data storage.

5.4.2 Assigning data to log files.

5.4.3 Invoking logging.

5.4.4 Access conditions for log files.

5.4.5 Logged data.

5.4.6 Consistency and authenticity of log data.

5.4.7 Log file size.

5.4.8 Logging process.

5.5 Pairing.

5.6 Protecting Transaction Data.

5.7 Reset-proof Counters.

5.8 Proactivity.

5.9 Authentication Counter.

5.10 Manual Authentication of a Terminal.

5.11 PIN Management.

5.12 One-time Passwords.

5.13 Key Management.

5.14 StateMachines for Command Sequences.

5.15 Speed Optimization.

5.15.1 Computing power.

5.15.2 Communication.

5.15.3 Commands.

5.15.4 Data and files.

6 Implementation Patterns.

6.1 Application Principles.

6.1.1 Programcode.

6.1.2 Commands.

6.1.3 Data.

6.1.4 Security.

6.1.5 Application architecture.

6.1.6 System.

6.2 Testing.

6.3 User–Terminal Interface.

6.4 Smart Card Commands.

6.4.1 Command structure.

6.4.2 Interruption of commands.

6.4.3 Command coding.

6.4.4 Parameterization.

6.4.5 Test commands.

6.4.6 Secret commands.

6.5 Java Card.

6.5.1 Data types.

6.5.2 Arithmetic operations.

6.5.3 Control structures.

6.5.4 Methods.

6.5.5 Applets.

7 Operation Patterns.

7.1 Initialization and Personalization.

7.2 Migration.

7.3 Monitoring.

7.3.1 System integrity.

7.3.2 Attack detection.

8 Practical Aspects of Smart Cards.

8.1 Acceptance.

8.2 Tell-tale Signs of Difficult Smart Card Systems.

8.2.1 Inappropriate use of smart cards.

8.2.2 Unclear specifications.

8.2.3 Abundant options.

8.2.4 Piggyback applications.

8.2.5 Economizing on testing.

8.2.6 Downloading applications.

8.2.7 Offline systems.

8.2.8 Intolerant smart cards and terminals.

8.2.9 Strict compatibility requirements.

8.2.10 Excessively stringent security requirements.

8.2.11 Exaggerated future-proofing.

8.3 Prerequisites for Easy Smart Card Systems.

8.3.1 Expert advice.

8.3.2 Foresighted design.

8.3.3 Prototyping.

8.3.4 Single-application smart cards.

8.3.5 Simple structures.

8.3.6 Robust design.

8.3.7 Centralized systems.

8.3.8 Staged deployment.

8.4 In-field Faults.

8.4.1 Fault classification.

8.4.2 Fault impact.

8.4.3 Actions in response to a fault.

8.4.4 Fault search procedure.

8.4.5 Fault remedies.

9 Illustrative Use Cases.

9.1 Monastery Card.

9.2 Access Card.

9.3 Telemetry Module.

9.4 Business Card.

9.5 Theft Protection Card.

9.6 Admission Pass.

9.7 PKI Card.

9.8 SIMCard.

Bibliography.

Index.

商品描述(中文翻譯)

**描述**
**一本實用指南,針對智能卡系統的規範、設計和編程,適用於實際應用。**
每年生產超過30億張智能卡。智能卡通常被定義為任何帶有嵌入式集成電路或晶片的口袋大小的卡片,擁有大量的應用,包括旅行卡、晶片和密碼卡、寵物標籤、手機SIM卡和托盤追蹤器。現在,隨著現代智能卡技術如Java Card和Basic Card,任何人都可以在智能卡上創建自己的應用程序。
本書提供了智能卡編程的通用解決方案,使得能夠創建實際的應用程序和系統。
**主要特點:**
- 提供智能卡主題的全面介紹,解釋組件元素和智能卡微控制器。
- 提供操作系統的信息,並附有多種應用案例研究,包括信用卡安全、手機和交通支付卡。
- 提供有關智能卡應用監控的詳細建議,識別潛在的安全攻擊並改善系統完整性。
- 提供模組和範例,以便從少量的單個組件構建各類系統。
- 提供避免和克服設計錯誤的指導。
本書非常適合希望在其業務中實施智能卡的實踐工程師和設計師,同時也是研究嵌入式系統和智能卡設計課程的研究生的寶貴參考資料。

**目錄**
- 前言
- 符號和標記
- 縮寫
- 1 智能卡概述
- 1.1 卡片分類
- 1.2 卡片格式
- 1.3 卡片元素
- 1.3.1 印刷和標籤
- 1.3.2 壓印
- 1.3.3 全息圖
- 1.3.4 簽名面板
- 1.3.5 觸覺元素
- 1.3.6 磁條
- 1.3.7 晶片模組
- 1.3.8 天線
- 1.4 智能卡微控制器
- 1.4.1 處理器
- 1.4.2 記憶體
- 1.4.3 補充硬體
- 1.4.4 電氣特性
- 2 智能卡操作系統
- 2.1 檔案管理
- 2.1.1 檔案類型
- 2.1.2 檔案名稱
- 2.1.3 檔案結構
- 2.1.4 檔案屬性
- 2.1.5 檔案選擇
- 2.1.6 存取條件
- 2.1.6.1 基於狀態的存取條件
- 2.1.6.2 基於規則的存取條件
- 2.1.7 檔案生命週期
- 2.2 命令
- 2.3 數據傳輸
- 2.3.1 重置應答 (ATR)
- 2.3.2 協議參數選擇 (PPS)
- 2.3.3 傳輸協議
- 2.3.3.1 接觸卡的T=0傳輸協議
- 2.3.3.2 接觸卡的T=1傳輸協議
- 2.3.3.3 接觸卡的USB傳輸協議
- 2.3.3.4 非接觸傳輸協議
- 2.3.4 安全消息傳遞
- 2.3.5 邏輯通道
- 2.4 特殊操作系統功能
- 2.4.1 密碼學功能
- 2.4.2 原子過程
- 2.4.3 解釋器
- 2.4.4 應用管理
- 3 應用領域
- 3.1 智能卡系統
- 3.2 潛在用途
- 3.3 應用類型
- 3.3.1 基於記憶體的應用
- 3.3.2 基於檔案的應用
- 3.3.3 基於代碼的應用
- 4 基本模式
- 4.1 數據保護
- 4.1.1 術語定義
- 4.1.2 一般原則
- 4.1.3 智能卡系統的建議
- 4.1.4 總結
- 4.2 出口控制
- 4.3 密碼學規範
- 4.4 標準
- 4.4.1 卡片本體的標準
- 4.4.2 操作系統的標準
- 4.4.3 數據和數據結構的標準
- 4.4.4 計算機介面的標準
- 4.4.5 應用的標準
- 4.5 智能卡系統的文件
- 4.5.1 規範劃分
- 4.5.1.1 系統規範
- 4.5.1.2 背景系統規範
- 4.5.1.3 智能卡規範
- 4.5.1.4 終端規範
- 4.5.2 典型卡片規範的元素
- 4.5.2.1 一般信息
- 4.5.2.2 智能卡
- 4.5.2.3 智能卡操作系統
- 4.5.2.4 應用
- 4.5.3 文件分發
- 4.5.4 文件版本編號
- 5 架構模式
- 5.1 數據
- 5.2 數據編碼
- 5.3 檔案
- 5.3.1 存取條件
- 5.3.2 檔案名稱
- 5.4 日誌檔案
- 5.4.1 數據存儲
- 5.4.2 將數據分配給日誌檔案
- 5.4.3 調用日誌
- 5.4.4 日誌檔案的存取條件
- 5.4.5 記錄的數據
- 5.4.6 日誌數據的一致性和真實性
- 5.4.7 日誌檔案大小
- 5.4.8 日誌過程
- 5.5 配對
- 5.6 保護交易數據
- 5.7 防重置計數器
- 5.8 主動性
- 5.9 認證計數器
- 5.10 終端的手動認證
- 5.11 PIN管理
- 5.12 一次性密碼
- 5.13 密鑰管理
- 5.14 命令序列的狀態機
- 5.15 速度優化
- 5.15.1 計算能力
- 5.15.2 通信
- 5.15.3 命令
- 5.15.4 數據和檔案
- 6 實施模式
- 6.1 應用原則
- 6.1.1 程式碼
- 6.1.2 命令
- 6.1.3 數據
- 6.1.4 安全性
- 6.1.5 應用架構
- 6.1.6 系統
- 6.2 測試
- 6.3 用戶-終端介面
- 6.4 智能卡命令
- 6.4.1 命令結構
- 6.4.2 命令的中斷
- 6.4.3 命令編碼
- 6.4.4 參數化
- 6.4.5 測試命令
- 6.4.6 秘密命令
- 6.5 Java Card
- 6.5.1 數據類型
- 6.5.2 算術運算
- 6.5.3 控制結構
- 6.5.4 方法
- 6.5.5 Applets
- 7 操作模式
- 7.1 初始化和個性化
- 7.2 遷移
- 7.3 監控
- 7.3.1 系統完整性
- 7.3.2 攻擊檢測
- 8 智能卡的實際方面
- 8.1 接受度
- 8.2 難以處理的智能卡系統的徵兆
- 8.2.1 不當使用智能卡
- 8.2.2 規範不清
- 8.2.3 選項過多
- 8.2.4 叠加應用
- 8.2.5 減少測試
- 8.2.6 下載應用
- 8.2.7 離線系統
- 8.2.8 不寬容的智能卡和終端
- 8.2.9 嚴格的相容性要求
- 8.2.10 過於嚴格的安全要求
- 8.2.11 過度的未來保障
- 8.3 簡易智能卡系統的前提條件
- 8.3.1 專家建議
- 8.3.2 具前瞻性的設計
- 8.3.3 原型設計
- 8.3.4 單一應用智能卡
- 8.3.5 簡單結構
- 8.3.6 穩健設計
- 8.3.7 集中系統
- 8.3.8 分階段部署
- 8.4 現場故障
- 8.4.1 故障分類
- 8.4.2 故障影響
- 8.4.3 對故障的應對行動
- 8.4.4 故障搜索程序
- 8.4.5 故障補救
- 9 示範用例
- 9.1 修道院卡
- 9.2 進入卡
- 9.3 遙測模組
- 9.4 名片
- 9.5 盜竊保護卡
- 9.6 入場通行證
- 9.7 PKI卡
- 9.8 SIM卡
- 參考文獻
- 索引