SearchSecuritySecurity Token and Smart Card TechnologyGet Started Search the TechTarget NetworkHome Security Token and Smart Card Technology Network security smart card definitionsmart card definitionPosted by: Margaret Rouse WhatIs.com Contributor(s): John MeckleyA smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Currently or soon, you may be able to use a smart card to:Download Your Guide to the ISACA CISM CertificationTake a closer look at the ISACA Certified Information Security Manager certification, including the value it provides security professionals, how it compares to other security professionals, and what the CSX program offersBy submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. Dial a connection on a mobile telephone and be charged on a per-call basisEstablish your identity when logging on to an Internet access provider or to an online bankPay for parking at parking meters or to get on subways, trains, or busesGive hospitals or doctors personal data without filling out a formMake small purchases at electronic stores on the Web (a kind of cybercash)Buy gasoline at a gasoline stationOver a billion smart cards are already in use. Currently, Europe is the region where they are most used. Ovum, a research firm, predicts that 2.7 billion smart cards will be shipped annually by 2003. Another study forecasts a $26.5 billion market for recharging smart cards by 2005. Compaq and Hewlett-Packard are reportedly working on keyboards that include smart card slots that can be read like bank credit cards. The hardware for making the cards and the devices that can read them is currently made principally by Bull, Gemplus, and Schlumberger.How Smart Cards WorkA smart card contains more information than a magnetic stripe card and it can be programmed for different applications. Some cards can contain programming and data to support multiple applications and some can be updated to add new applications after they are issued. Smart cards can be designed to be inserted into a slot and read by a special reader or to be read at a distance, such as at a toll booth. Cards can be disposable (as at a trade-show) or reloadable (for most applications).PRO+ContentFind more PRO+ content and other member only offers, here.E-ZineSwiss Army knife security? How to vet cybersecurity tools suitesE-HandbookHow to ensure a secure APIE-HandbookThe best endpoint security approach in this interconnected ageAn industry standard interface between programming and PC hardware in a smart card has been defined by the PC/SC Working Group, representing Microsoft, IBM, Bull, Schlumberger, and other interested companies. Another standard is called OpenCard. There are two leading smart card operating systems: JavaCard and MULTOS.This was first published in September 2005Related TermsChameleon CardThe Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, ... See complete definitionkey fobA key fob is a type of security token: a small hardware device with built-in authentication mechanisms. See complete definitiontokenizationTokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ... See complete definitionDig Deeper on Security Token and Smart Card TechnologyALLNEWSGET STARTEDEVALUATEMANAGEPROBLEM SOLVEWhat do merchants need to know about PCI tokenization guidelines?RSA responds to SecurID attack, plans security token replacementtokenizationSurvey finds users re-evaluating two-factor authentication optionsLoad More 0 commentsOldest Send me notifications when other members comment.Register or LoginE-MailUsername / Password By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy-ADS BY GOOGLE File Extensions and File FormatsABCDEFGHIJKLMNOPQRSTUVWXYZ#Powered by:Latest TechTarget resourcesCLOUD SECURITYNETWORKINGCIOCONSUMERIZATIONENTERPRISE DESKTOPCLOUD COMPUTINGCOMPUTER WEEKLYSearchCloudSecurityDropbox abused by APT group for spear phishing campaignFireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against ...How the cloud access security broker space is evolvingThe cloud access security broker space is accelerating at a fast clip, but expert Rob Shapland explains some obstacles for ...About UsContact UsPrivacy PolicyVideosPhoto StoriesGuidesAdvertisersBusiness PartnersMedia KitCorporate SiteExpertsShon Harris CISSP trainingReprintsArchiveSite MapEventsE-ProductsAll Rights Reserved, Copyright 2000 - 2015, TechTarget
đang được dịch, vui lòng đợi..
