Home > Articles > Hardware

  • Print
  • + Share This
This chapter is from the book

Summary

This chapter has hopefully provided you with a fairly extensive introduction into the structure of the smart card–side of a smart card–aware application. The most interesting facets of this environment are the security mechanisms that are defined through a set of international standards and which find themselves present on most smart cards in use today. Further, these same international standards establish a paradigm for smart card applications in the form of an on-card file system replete with an authentication and authorization mechanism that is firmly rooted in the use of cryptographic services to achieve the desired characteristics of security. A series of commands for manipulating this on-card file system forms the backbone of many smart card applications in use today.

  • + Share This
  • 🔖 Save To Your Account