SearchSecuritySecurity Token and Smart Card TechnologyGet Started Sear dịch - SearchSecuritySecurity Token and Smart Card TechnologyGet Started Sear Việt làm thế nào để nói

SearchSecuritySecurity Token and Sm


SearchSecurity
Security Token and Smart Card Technology
Get Started Search the TechTarget Network

Home Security Token and Smart Card Technology Network security smart card definition

smart card definition

Posted by: Margaret Rouse WhatIs.com

Contributor(s): John Meckley
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Currently or soon, you may be able to use a smart card to:

Download Your Guide to the ISACA CISM Certification


Take a closer look at the ISACA Certified Information Security Manager certification, including the value it provides security professionals, how it compares to other security professionals, and what the CSX program offers


By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.


Dial a connection on a mobile telephone and be charged on a per-call basis
Establish your identity when logging on to an Internet access provider or to an online bank
Pay for parking at parking meters or to get on subways, trains, or buses
Give hospitals or doctors personal data without filling out a form
Make small purchases at electronic stores on the Web (a kind of cybercash)
Buy gasoline at a gasoline station
Over a billion smart cards are already in use. Currently, Europe is the region where they are most used. Ovum, a research firm, predicts that 2.7 billion smart cards will be shipped annually by 2003. Another study forecasts a $26.5 billion market for recharging smart cards by 2005. Compaq and Hewlett-Packard are reportedly working on keyboards that include smart card slots that can be read like bank credit cards. The hardware for making the cards and the devices that can read them is currently made principally by Bull, Gemplus, and Schlumberger.

How Smart Cards Work

A smart card contains more information than a magnetic stripe card and it can be programmed for different applications. Some cards can contain programming and data to support multiple applications and some can be updated to add new applications after they are issued. Smart cards can be designed to be inserted into a slot and read by a special reader or to be read at a distance, such as at a toll booth. Cards can be disposable (as at a trade-show) or reloadable (for most applications).

PRO+
Content
Find more PRO+ content and other member only offers, here.
E-Zine
Swiss Army knife security? How to vet cybersecurity tools suites
E-Handbook
How to ensure a secure API
E-Handbook
The best endpoint security approach in this interconnected age
An industry standard interface between programming and PC hardware in a smart card has been defined by the PC/SC Working Group, representing Microsoft, IBM, Bull, Schlumberger, and other interested companies. Another standard is called OpenCard. There are two leading smart card operating systems: JavaCard and MULTOS.

This was first published in September 2005
Related Terms

Chameleon Card
The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, ... See complete definition
key fob
A key fob is a type of security token: a small hardware device with built-in authentication mechanisms. See complete definition
tokenization
Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ... See complete definition
Dig Deeper on Security Token and Smart Card Technology

ALL
NEWS
GET STARTED
EVALUATE
MANAGE
PROBLEM SOLVE
What do merchants need to know about PCI tokenization guidelines?
RSA responds to SecurID attack, plans security token replacement
tokenization
Survey finds users re-evaluating two-factor authentication options
Load More
0 commentsOldest
Send me notifications when other members comment.
Register or Login

E-Mail


Username / Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
-ADS BY GOOGLE



File Extensions and File Formats

ABCDEFGHIJKLMNOPQRS
TUVWXYZ#
Powered by:
Latest TechTarget resources
CLOUD SECURITY
NETWORKING
CIO
CONSUMERIZATION
ENTERPRISE DESKTOP
CLOUD COMPUTING
COMPUTER WEEKLY
SearchCloudSecurity
Dropbox abused by APT group for spear phishing campaign
FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against ...

How the cloud access security broker space is evolving
The cloud access security broker space is accelerating at a fast clip, but expert Rob Shapland explains some obstacles for ...

About UsContact UsPrivacy PolicyVideosPhoto StoriesGuidesAdvertisersBusiness PartnersMedia KitCorporate SiteExpertsShon Harris CISSP trainingReprintsArchiveSite MapEventsE-Products
All Rights Reserved, Copyright 2000 - 2015, TechTarget

0/5000
Từ: -
Sang: -
Kết quả (Việt) 1: [Sao chép]
Sao chép!
SearchSecuritySecurity Token and Smart Card TechnologyGet Started Search the TechTarget NetworkHome Security Token and Smart Card Technology Network security smart card definitionsmart card definitionPosted by: Margaret Rouse WhatIs.com Contributor(s): John MeckleyA smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Currently or soon, you may be able to use a smart card to:Download Your Guide to the ISACA CISM CertificationTake a closer look at the ISACA Certified Information Security Manager certification, including the value it provides security professionals, how it compares to other security professionals, and what the CSX program offersBy submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. Dial a connection on a mobile telephone and be charged on a per-call basisEstablish your identity when logging on to an Internet access provider or to an online bankPay for parking at parking meters or to get on subways, trains, or busesGive hospitals or doctors personal data without filling out a formMake small purchases at electronic stores on the Web (a kind of cybercash)Buy gasoline at a gasoline stationOver a billion smart cards are already in use. Currently, Europe is the region where they are most used. Ovum, a research firm, predicts that 2.7 billion smart cards will be shipped annually by 2003. Another study forecasts a $26.5 billion market for recharging smart cards by 2005. Compaq and Hewlett-Packard are reportedly working on keyboards that include smart card slots that can be read like bank credit cards. The hardware for making the cards and the devices that can read them is currently made principally by Bull, Gemplus, and Schlumberger.How Smart Cards WorkA smart card contains more information than a magnetic stripe card and it can be programmed for different applications. Some cards can contain programming and data to support multiple applications and some can be updated to add new applications after they are issued. Smart cards can be designed to be inserted into a slot and read by a special reader or to be read at a distance, such as at a toll booth. Cards can be disposable (as at a trade-show) or reloadable (for most applications).PRO+ContentFind more PRO+ content and other member only offers, here.E-ZineSwiss Army knife security? How to vet cybersecurity tools suitesE-HandbookHow to ensure a secure APIE-HandbookThe best endpoint security approach in this interconnected ageAn industry standard interface between programming and PC hardware in a smart card has been defined by the PC/SC Working Group, representing Microsoft, IBM, Bull, Schlumberger, and other interested companies. Another standard is called OpenCard. There are two leading smart card operating systems: JavaCard and MULTOS.This was first published in September 2005Related TermsChameleon CardThe Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, ... See complete definitionkey fobA key fob is a type of security token: a small hardware device with built-in authentication mechanisms. See complete definitiontokenizationTokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ... See complete definitionDig Deeper on Security Token and Smart Card TechnologyALLNEWSGET STARTEDEVALUATEMANAGEPROBLEM SOLVEWhat do merchants need to know about PCI tokenization guidelines?RSA responds to SecurID attack, plans security token replacementtokenizationSurvey finds users re-evaluating two-factor authentication optionsLoad More 0 commentsOldest Send me notifications when other members comment.Register or LoginE-MailUsername / Password By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy-ADS BY GOOGLE File Extensions and File FormatsABCDEFGHIJKLMNOPQRSTUVWXYZ#Powered by:Latest TechTarget resourcesCLOUD SECURITYNETWORKINGCIOCONSUMERIZATIONENTERPRISE DESKTOPCLOUD COMPUTINGCOMPUTER WEEKLYSearchCloudSecurityDropbox abused by APT group for spear phishing campaignFireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against ...How the cloud access security broker space is evolvingThe cloud access security broker space is accelerating at a fast clip, but expert Rob Shapland explains some obstacles for ...About UsContact UsPrivacy PolicyVideosPhoto StoriesGuidesAdvertisersBusiness PartnersMedia KitCorporate SiteExpertsShon Harris CISSP trainingReprintsArchiveSite MapEventsE-ProductsAll Rights Reserved, Copyright 2000 - 2015, TechTarget
đang được dịch, vui lòng đợi..
 
Các ngôn ngữ khác
Hỗ trợ công cụ dịch thuật: Albania, Amharic, Anh, Armenia, Azerbaijan, Ba Lan, Ba Tư, Bantu, Basque, Belarus, Bengal, Bosnia, Bulgaria, Bồ Đào Nha, Catalan, Cebuano, Chichewa, Corsi, Creole (Haiti), Croatia, Do Thái, Estonia, Filipino, Frisia, Gael Scotland, Galicia, George, Gujarat, Hausa, Hawaii, Hindi, Hmong, Hungary, Hy Lạp, Hà Lan, Hà Lan (Nam Phi), Hàn, Iceland, Igbo, Ireland, Java, Kannada, Kazakh, Khmer, Kinyarwanda, Klingon, Kurd, Kyrgyz, Latinh, Latvia, Litva, Luxembourg, Lào, Macedonia, Malagasy, Malayalam, Malta, Maori, Marathi, Myanmar, Mã Lai, Mông Cổ, Na Uy, Nepal, Nga, Nhật, Odia (Oriya), Pashto, Pháp, Phát hiện ngôn ngữ, Phần Lan, Punjab, Quốc tế ngữ, Rumani, Samoa, Serbia, Sesotho, Shona, Sindhi, Sinhala, Slovak, Slovenia, Somali, Sunda, Swahili, Séc, Tajik, Tamil, Tatar, Telugu, Thái, Thổ Nhĩ Kỳ, Thụy Điển, Tiếng Indonesia, Tiếng Ý, Trung, Trung (Phồn thể), Turkmen, Tây Ban Nha, Ukraina, Urdu, Uyghur, Uzbek, Việt, Xứ Wales, Yiddish, Yoruba, Zulu, Đan Mạch, Đức, Ả Rập, dịch ngôn ngữ.

Copyright ©2025 I Love Translation. All reserved.

E-mail: