Summary
This chapter has hopefully provided you with a fairly extensive introduction into the structure of the smart cardside of a smart cardaware application. The most interesting facets of this environment are the security mechanisms that are defined through a set of international standards and which find themselves present on most smart cards in use today. Further, these same international standards establish a paradigm for smart card applications in the form of an on-card file system replete with an authentication and authorization mechanism that is firmly rooted in the use of cryptographic services to achieve the desired characteristics of security. A series of commands for manipulating this on-card file system forms the backbone of many smart card applications in use today.