Smart Cards Seminar Report
Smart Cards Seminar Report
Smart Cards Seminar Report
Introduction
Smart Card Basics
Overview & Applications
Why Smart Cards
Types of Chip Cards
Smart Card Form Factors
Integrated Circuits and Operating Systems
Smart Card Readers/Terminals
Smart Card Standards
System Planning & Deployment
Smart Card Information Security
Smart Card Data logging Security
Smart Card Data Security
Conclusions
References
Smart Card or Chip card technology is fast becoming commonplace in our culture and daily
lives. We hope that this site will bring you a little closer in your understanding of this
exciting technology and the benefits it can bring to your applications.
If you have specific questions regarding a specific technology discussed below feel free to
send us an email and the appropriate site sponsor will respond.
Overview & Applications
A smart card, a type of chip card, is a plastic card embedded with a computer chip that
stores and transacts data between users. This data is associated with either value or
information or both and is stored and processed within the cards chip, either a memory
or microprocessor. The card data is transacted via a reader that is part of a computing
system. Smart card-enhanced systems are in use today throughout several key
applications, including healthcare, banking, entertainment and transportation. To various
degrees, all applications can benefit from the added features and security that smart
cards provide. According to Eurosmart, worldwide smart card shipments will grow 10%
in 2010 to 5.455 billion cards. Markets that have been traditionally served by other
machine readable card technologies such as bar-code and magnetic stripe are
converting as the calculated return on investment is revisited by the each card issuer
year after year.
First introduced in Europe nearly three decades ago, smart cards debuted as a stored
value tool for pay phones to reduce theft. As smart cards and other chip-based cards
advanced, people found new ways to use them, including charge cards for credit
purchases and for record keeping in place of paper.
In the U.S., consumers have been using chip cards for everything from visiting libraries
to buying groceries to attending movies, firmly integrating them into our everyday lives.
Several U.S. states have chip card programs in progress for government applications
ranging from the Department of Motor Vehicles to Electronic Benefit Transfer (EBT).
Many industries have implemented the power of smart cards into their products such as
GSM digital cellular phones to TV-satellite decoders.
and POS systems, smart cards can centrally locate and track all data. The applications are
numerous, from transportation systems, including parking and laundry, to gaming, as well
as all retail and many entertainment uses.
Securing Digital Content and Physical Assets
In addition to information security, smart cards achieve greater security of services and
equipment, because the card restricts access to all but the authorized user(s). Information
and entertainment is being delivered via satellite or cable to the home DVR player or cable
box or cable-enabled PC. Home delivery of service is encrypted and decrypted via the
smart card per subscriber access. Digital video broadcast systems have already adopted
smart cards as electronic keys for protection. Smart cards can also act as keys to machine
settings for sensitive laboratory equipment and dispensers for drugs, tools, library cards,
health club equipment etc. In some environments, smart card enabled- SD and microSD
cards are protecting digital content as it is being delivered to the mobile hand-sets/ phones.
E-Commerce
Smart cards make it easy for consumers to securely store information and cash for
purchasing. The advantages they offer consumers are:
The card can carry personal account, credit and buying preference information that
can be accessed with a mouse click instead of filling out forms.
Cards can manage and control expenditures with automatic limits and reporting.
Internet loyalty programs can be deployed across multiple vendors with disparate
POS systems and the card acts as a secure central depository for points or rewards.
Micro Payments - paying nominal costs without transaction fees associated with
credit cards, or for amounts too small for cash, like reprint charges.
This is improving customer service. Customers can use secure smart cards for fast,
24-hour electronic funds transfers over the internet
Costs are reduced: transactions that normally would require a bank employees time
and paperwork can be managed electronically by the customer with a smart card
Healthcare Informatics
The explosion of health care data brings up new challenges to the efficiency of patient
care and privacy safeguards. Smart cards solve both challenges with secure, mobile
storage and distribution of everything from emergency data to benefits status. Many
socialized countries have already adopted smart cards as credentials for their health
Physical Access
Businesses and universities of all types need simple identity cards for all employees
and students. Most of these people are also granted access to certain data, equipment
and departments according to their status. Multifunction, microprocessor-based smart
cards incorporate identity with access privileges and can also store value for use in
various locations, such as cafeterias and stores. Many hotels have also adopted
ISO7816 type card readers into the hotel rooms for use by the staff.
All U.S. government and many corporations have now incorporated a contactless
reader as an access point to their facilities. Some companies have incorporated a
biometric component to this credential as well. The older systems deploy a simple
proximity card system as the gate keeper. But as the security requirements have
become stronger and the cost of ISO14443 standard systems have become cheaper,
the world is rapidly adopting this new standard. This market shift is partially driven by
the US governments adoption of the mandated Personal Identity Verification (PIV)
standard. There is a rich ecosystem of suppliers and integrators for this standard.
Card Construction
Mostly all chip cards are built from layers of differing materials, or substrates, that when
brought together properly gives the card a specific life and functionality. The typical card
today is made from PVC, Polyester or Polycarbonate. The card layers are printed first
and then laminated in a large press. The next step in construction is the blanking or die
cutting. This is followed by embedding a chip and then adding data to the card. In all,
there may be up to 30 steps in constructing a card. The total components, including
software and plastics, may be as many as 12 separate items; all this in a unified
package that appears to the user as a simple device.
Contact Cards
These are the most common type of smart card. Electrical contacts located on the
outside of the card connect to a card reader when the card is inserted. This connector is
bonded to the encapsulated chip in the card.
Typical smart card module
Typical Module
C1
C5
VCC
GRD
C2
NO
CONNE
NO
CONNE
C6
C3
CT
CT
C7
CLK
I/O
NO
CONNE
NO
CONNE
CT
CT
C4
C8
Card Contacts
*Image Courtesty of CardLogix
Increased levels of processing power, flexibility and memory will add cost. Single
function cards are usually the most cost-effective solution. Choose the right type of
smart card for your application by determining your required level of security and
evaluating cost versus functionality in relation to the cost of the other hardware
elements found in a typical workflow. All of these variables should be weighted against
the expected lifecycle of the card. On average the cards typically comprise only 10 to 15
percent of the total system cost with the infrastructure, issuance, software, readers,
training and advertising making up the other 85 percent. The following chart
demonstrates some general rules of thumb:
Memory Cards
Memory cards cannot manage files and have no processing power for data
management. All memory cards communicate to readers through synchronous
protocols. In all memory cards you read and write to a fixed address on the card. There
are three primary types of memory cards: 1). Straight, 2). Protected, and 3). Stored
Value. Before designing in these cards into a proposed system the issuer should check
to see if the readers and/or terminals support the communication protocols of the chip.
Most contactless cards are variants on the protected memory/ segmented memory card
idiom.
1) Straight Memory Cards
These cards just store data and have no data processing capabilities. Often made
with I2C or serial flash semiconductors, these cards were traditionally the lowest
cost per bit for user memory. This has now changed with the larger quantities of
processors being built for the GSM market. This has dramatically cut into the
advantage of these types of devices. They should be regarded as floppy disks of
varying sizes without the lock mechanism. These cards cannot identify themselves
to the reader, so your host system has to know what type of card is being inserted
into a reader. These cards are easily duplicated and cannot be tracked by on-card
identifiers
2) Protected / Segmented Memory Cards
These cards have built-in logic to control the access to the memory of the card.
Sometimes referred to as Intelligent Memory cards, these devices can be set to write
protect some or the entire memory array. Some of these cards can be configured to
restrict access to both reading and writing. This is usually done through a password
or system key. Segmented memory cards can be divided into logical sections for
planned multi-functionality. These cards are not easily duplicated but can possibly be
impersonated by hackers. They typically can be tracked by an on-card identifier.
without replacement of the installed base of cards, simplifying program changes and
reducing costs. For the card user, multifunction means greater convenience and
security, and ultimately, consolidation of multiple cards down to a select few that serve
many purposes.
There are many configurations of chips in this category, including chips that support
cryptographic PKI functions with on-board math co-processors or JavaCard with
virtual machine hardware blocks. As a rule of thumb - the more functions, the higher the
cost.
Contactless Cards
These are smart cards that employ a radio frequency (RFID) between card and reader
without physical insertion of the card. Instead, the card is passed along the exterior of
the reader and read. Types include proximity cards which are implemented as a readonly technology for building access. These cards function with a very limited memory
and communicate at 125 MHz. Another type of limited card is the Gen 2 UHF Card that
operates at 860 MHz to 960 MHz True read and write contactless cards were first used
in transportation for quick decrementing and re-loading of fare values where their lower
security was not an issue. They communicate at 13.56 MHz, and conform to the
ISO14443 standard. These cards are often protected memory types. They are also
gaining popularity in retail stored value, since they can speed-up transactions and not
lower transaction processing revenues (i.e. VISA and MasterCard), like traditional smart
cards.
Variations of the ISO14443 specification include A, B, and C, which specify chips from
either specific or various manufacturers. A=NXP-(Philips) B=Everybody else and
C=Sony only chips. Contactless card drawbacks include the limits of cryptographic
functions and user memory, versus microprocessor cards and the limited distance
between card and reader required for operation.
Multi-mode Communication Cards
These cards have multiple methods of communications, including ISO7816, ISO14443
and UHF gen 2. How the card is made determines if it is a Hybrid or dual interface card.
The term can also include cards that have a magnetic-stripe and or bar-code as well.
Hybrid Cards
Hybrid cards have multiple chips in the same card. These are typically attached to each
interface separately, such as a MIFARE chip and antenna with a contact 7816 chip in
Atmel
EM systems
Felicia
Infineon
Microchip
NXP
Renasas
Samsung
Sharp
Sony
ST Microelectronics
Many of the features that users have come to expect, such as specific encryption
algorithms, have been incorporated into the hardware and software libraries of the chip
architectures. This can often result in a card manufacturer not future-proofing their
design by having their card operating systems only ported to a specific device. Care
should be taken in choosing the card vendor that can support your project over time as
card operating system-only vendors come in and out of the market. The tools and
middleware that support card operating systems are as important as the chip itself. The
tools to implement your project should be easy to use and give you the power to deploy
your project rapidly.
1)Fixed File Structure
This type treats the card as a secure computing and storage device. Files and
permissions are set in advance by the issuer. These specific parameters are ideal and
economical for a fixed type of card structure and functions that will not change in the
near future. Many secure stored value and healthcare applications are utilizing this type
Interface
A contact reader is primarily defined by the method of its interface to a PC. These
methods include RS232 serial ports, USB ports, PCMCIA slots, floppy disk slots,
parallel ports, infrared IRDA ports and keyboards and keyboard wedge readers. Some
readers support more than one type of card such as the tri mode insert readers from
MagTek. These readers support magnetic stripe-contact and contactless read
operations all in one device.
From a technical perspective, the key is the APIs that are chosen. These layers of
software can enable effective application communication with smart cards and readers
from more than one manufacturer. Most terminal SDKs come with a customized API for
that platform. They are typically in some form of C, C++ or C # and will have the header
files included. Many smart card readers have specific drivers/APIs for memory cards.
For ISO7816 processor cards the PC/SC interface is often employed, but it has
limitations. This is especially important if you have both memory and microprocessor
cards that can are used in the same system. Some APIs give the software designer the
ability to select readers from multiple vendors.
The following are some of the function calls provided for transporting APDUs and their
functions:
Reader Select
Reader Connect
Reader Disconnect
Card Connect
Card Disconnect
Proprietary Commands for specific readers and cards
Allow ISO Commands to be passed to cards using standard ISO format
Allow ISO Commands to be sent to cards using a simplified or shortcut format
Applications Development
The development of PC applications for readers has been simplified by the Personal
Computer/Smart Card (PC/ SC) standard. This standard is supported by all major
operating systems. The problem with the PC/SC method is that it does not support all of
the reader functions offered by each manufacturer, such as LED control and card
latching/locking. When just using the drivers for each reader manufacturer, there is no
connection to the function of the cards.
The better choice is Application Programming Interfaces (APIs) that are part of readily
available in Software Development Kits (SDKs) that support specific manufacturers
card families.
Terminals
Unlike readers, terminals are more similar to a self contained PC, with most featuring
operating systems and development tools. Terminals are often specific to the use case
such as Security, Health Informatics or POS. Connectivity in the terminals is typically via
Transmission Control Protocol/Internet Protocol (TCP-IP) or GSM network. Many
terminals today feature regular OSs making deployment easier such as Datastrip with
windows CE or Exadigm with Linux.
ISO/IEC 7501 describes standards for machine-readable travel documents and has
made a clear recommendation on smart card topology.
ICAO
The International Civil Aviation Organization (ICAO) issues guidance on the standardization
and specifications for Machine Readable Travel Documents (MRTD) such as passports,
visas, and travel documents. ICAO has published the specification for electronic passports
using a contactless smart chip to securely store traveler data.
FIPS (Federal Information Processing Standards) Developed by the Computer Security
Division within the National Institute of Standards and Technology (NIST). FIPS standards
are designed to protect federal assets, including computer and telecommunications
systems. The following FIPS standards apply to smart card technology and pertain to digital
signature standards, advanced encryption standards, and security requirements for
cryptographic modules.
FIPS 140 (1-3): The security requirements contained in FIPS 140 (1-3) pertain to areas
related to the secure design and implementation of a cryptographic module, specifically:
cryptographic module specification; cryptographic module ports and interfaces; roles,
services, and authentication; finite state model; physical security; operational
environment;
cryptographic
key
management;
electromagnetic
interference/
FIPS 201: This specification covers all aspects of multifunction cards used in identity
management systems throughout the U.S. government.
EMV - Europay, MasterCard and Visa formed EMV Company, LLC and created the
Integrated Circuit Card Specifications for Payment Systems. These specifications are
related to ISO7816 and create a common technical basis for card and system
implementation of a stored value system. Integrated Circuit Card Specifications for
Payment Systems can be obtained from a Visa, MasterCard or Europay member bank.
PC/SC - A globally implemented standard for cards and readers, called the PC/SC
specification. This standard only applies to CPU contact cards. Version 2.0 also dictates
PIN pad to card communications. Apple, Oracle-Sun, Linux and Microsoft all support this
standard.
Microsoft has built PC/SC into their smart card services as a framework that supports many
security mechanisms for cards and systems. PC/SC is now a fairly common middleware
interface for PC logon applications. The standard is a highly abstracted set of middleware
components that allow for the most common reader card interactions.
CEN (Comite Europeen de Normalisation) and ETSI (European Telecommunications
Standards Institute) is focused on telecommunications, as with the GSM SIM for cellular
telephones. GSM 11.11 and ETSI300045. CEN can be contacted at Rue de Stassart, 36 B1050 Brussels, Belgium, attention to the Central Secretariat.
HIPAA - The Health Insurance Portability and Accountability Act adopts national standards
for implementing a secure electronic health transaction system in the U.S. Example
transactions affected by this include claims, enrollment, eligibility, payment and coordination
of benefits. Smart cards are governed by the requirements of HIPAA pertaining to data
security and patient privacy.
IC Communications Standards - These existed for non-volatile memories before the chips
were adopted for smart card use. This specifically applies to the I2C and SPI EEPROM
interfaces.
OpenCard Framework
(Obsolete standard: for information only)
The OpenCard Framework was a set of guidelines announced by IBM, Netscape, NCI, and
Sun Microsystems for integrating smart cards with network computers. The guidelines were
based on open standards and provided an architecture and a set of application program
interfaces (APIs) that enable application developers and service providers to build and
deploy smart card solutions on any OpenCard-compliant network computer. Through the
use of a smart card, an OpenCard- compliant system should have enabled access to
personalized data and services from any network computer and dynamically download from
the Internet all device drivers that are necessary to communicate with the smart card. By
providing a high-level interface which can support multiple smart card types, the OpenCard
Framework was intended to enable vendor-independent card interoperability. The system
incorporated Public Key Cryptography Standard (PKCS) - 11 and was supposed to be
expandable to include other
public key mechanisms.
Global Platform
GlobalPlatform (GP) is an international, non-profit association. Its mission is to establish,
maintain and drive adoption of standards to enable an open and interoperable
infrastructure for smart cards, devices and systems that simplifies and accelerates
development, deployment and management of applications across industries. The GP
standard has been adopted by virtually all the banks worldwide for JavaCard-based
loading of cryptographic data. The standard establishes mechanisms and policies that
enable secure channel communications with a credential.
Common Criteria
Common Criteria (CC) is an internationally approved security evaluation framework
providing a clear and reliable evaluation of the security capabilities of IT products, including
secure ICs, smart card operating systems, and application software. CC provides an
independent assessment of a products ability to meet security standards. Securityconscious customers, such as national governments, are increasingly requiring CC
certification in making purchasing decisions. Since the requirements for certification are
clearly established, vendors can target very specific security needs while providing broad
product offerings.
Biometric Standards
Many new secure ID system implementations are using both biometrics and smart cards to
improve the security and privacy of an ID system.
ANSI-INCITS 398, Common Biometric Exchange Formats Framework (CBEFF) (ISO/IEC 19785-1). The Common Biometric Exchange Formats Framework (CBEFF)
describes a set of data elements necessary to support biometric technologies and
exchange data in a common way. These data can be placed in a single file used to
exchange biometric information between different system components or between
systems. The result promotes interoperability of biometric-based application
1) Is there a clear business case? Including financial and consumer behavior factors?
2) Will the system be single or multi-application?
3) What type of information do I want to store in the cards (ie; data or value)?
4) How much memory is required for each application?
5) If multi-application, how will I separate different types of data?
6) Will card data be obtained from a database? Or loaded every time?
7) Will this data concurrently reside on a database?
8) How many cards will be needed?
9) Are card/infrastructure vendors identified? What are the lead times?
Security Planning
1) What are the security requirements?
2) Does all, or only some of the data need to be secure?
3) Who will have access to this information?
4) Who will be allowed to change this information?
5) In what manner shall I secure this data i.e. encryption, Host passwords, card
passwords/PINs or all of these?
6) Should the keys/PINs be customer or system-activated?
General Issuance
1) How many types of artwork will be included in the issuance?
2) Who will do the artwork?
3) What is needed on the card? For example signature panels, Magnetic-Stripe,
Embossing etc.
Multi-Application Card Systems
It is highly recommended that you graphically diagram the flow of information as shown.
Large distributed multifunction systems require lots of advance planning to make them
effective. Smart cards often act as the glue between disparate software applications and
use cases. Below is an example of a multifunction card that is issued by a large
enterprise or government. Everywhere you see a CD is a separate and distinct software
application that interacts with the data and service from the card.
3
1
4
5
?
15
17
7
16
The critical first step in this type of planning is to understand the data requirements on
the card as it relates to each disparate software application that your project will deploy.
Building a smart card system that stores value i.e. gift certificates, show tickets,
redemption points or cash equivalents requires an attention to detail not necessary in
other information management systems. The most important detail of a successful
stored value card is that the card and program are perceived by users as being
compelling, justifying the switch from other payment options.
User information and system wide training should be part of your budget. It is
recommended that you phase-in each feature set after the first one is working. Here is a
list of some questions that are pertinent to these systems in addition to the above
questions.
Deployment
As the minimum steps in deploying a stored value or multi-application system, establish
clear achievable program objectives;
1) Make sure the organization has a stake in the projects success and that
management buys into the project
2) Set a budget
3) Name a project manager
4) Assemble a project team and create a team vision
5) Graphically create an information - card and funds-flow diagram
6) Assess the card and reader options
Security Concern
Basis of business income.
Type of Access
Highly selective list of
Drug Formula
Competitor spying
executives
Relevant executives and
Accounting, Regulatory
Required by law
departments
Relevant executives and
Personnel Files
Employee piracy
departments
Employee ID
Non-employee access.
Inaccurate payroll,
benefits assignment
departments
Individuals per function and
Facilities
Access Authorization
clearance such
as customers, visitors, or
vendors
Outside emergency
All employees
response
3) Can I Confirm Receipt Of The Data And Sender Identity Back To The Sender?
(Non-Repudiation)
4) Can I Keep This Data Private? (Confidentiality) - Ensures only senders and
receivers access the data. This is typically done by employing one or more
encryption techniques to secure your data
5) Can I Safely Share This Data If I Choose? (Authorization and Delegation) You can
set and manage access privileges for additional users and groups
6) Can I Verify The That The System Is Working? (Auditing and Logging) Provides a
constant monitor and troubleshooting of security system function
7) Can I Actively Manage The System? (Management) Allows administration of your
security system
Ensures data uniqueness by checking that data is original, and not a copy of the
original. The sender attaches a unique identifier to the original data. This unique
identifier is then checked by the receiver of the data.
The original data may be in a human-readable form, such as a text file, or it may be in a
computer-readable form, such as a database, spreadsheet or graphics file. The original
data is called unencrypted data or plain text. The modified data is called encrypted data
or cipher text. The process of converting the unencrypted data is called encryption. The
process of converting encrypted data to unencrypted data is called decryption.
Data Security Mechanisms and their Respective Algorithms
In order to convert the data, you need to have an encryption algorithm and a key. If the
same key is used for both encryption and decryption that key is called a secret key and
the algorithm is called a symmetric algorithm. The most well-known symmetric algorithm
is DES (Data Encryption Standard).
The Data Encryption Standard (DES) was invented by the IBM Corporation in the
1970s. During the process of becoming a standard algorithm, it was modified according
to recommendations from the National Security Agency (NSA). The algorithm has been
studied by cryptographers for over 30 years. During this time, no methods have been
published that describe a way to break the algorithm, except for brute-force techniques.
DES has a 56-bit key, which offers 256 or 7 x 1016 possible variations. There are a very
small numbers of weak keys, but it is easy to test for these keys and they are easy to
avoid.
Triple-DES is a method of using DES to provide additional security. Triple-DES can be
done with two or with three keys. Since the algorithm performs an encrypt-decryptencrypt sequence, this is sometimes called the EDE mode.
If different keys are used for encryption and decryption, the algorithm is called an
asymmetric algorithm. The most well-known asymmetric algorithm is RSA, named after
its three inventors (Rivest, Shamir, and Adleman). This algorithm uses two keys, called
the private key. These keys are mathematically linked. Here is a diagram that illustrates
an asymmetric algorithm:
short key length symmetric algorithm. But because of their complexity they are used in
signing a message or a certificate. They not ordinarily used for data transmission
encryption.
encryption (Symmetric
Key Card)
Biometric Password
Card
Road Test: Attempt to hack your system; learn about weak spots, etc.
When analyzing the threats to your data an organization should look closely at two
specific areas: Internal attacks and external attacks. The first and most common
compromise of data comes from disgruntled employees. Knowing this, a good system
manager separates all back-up data and back-up systems into a separately partitioned
and secured space. The introduction of viruses and the attempted formatting of network
drives is a typical internal attack behavior. By deploying employee cards that log an
employee into the system and record the time, date and machine that the employee is
on, a company automatically discourages these type of attacks.
External attacks are typically aimed at the weakest link in a companys security armor.
The first place an external hacker looks at is where they can intercept the transmission
of your data. In a smart card-enhanced system this starts with the card.
The following sets of questions are relevant to your analysis. Is the data on the card
transmitted in the clear or is it encrypted? If the transmission is sniffed, is each session
secured with a different key? Does the data move from the reader to the PC in the
clear? Does the PC or client transmit the data in the clear? If the packet is sniffed, is
each session secured with a different key? Does the Operating System have a back
door? Is there a mechanism to upload and download functioning code? How secure is
this system? Does the OS provider have a good security track record? Does the card
manufacturer have precautions in place to secure your data? Do they understand the
liabilities? Can they provide other security measures that can be implemented on the
card and or module? When the card is subjected to Differential Power attacks and
Differential Thermal attacks does the OS reveal any secrets? Will the semiconductor
utilized meet this scrutiny? Do your suppliers understand these questions?
Other types of problems that can be a threat to your assets include:
Security Architectures
When designing a system a planner should look at the total cost of ownership this
includes:
Analysis
Delegated Services
Training
Management
Over 99% of all U.S.- based financial networks are secured with a Private Key
Infrastructure. This is changing over time, based on the sheer volume of transactions
managed daily and the hassles that come with private key management. Private Keybased systems make good sense if your expected user base is less than 500,000
participants.
Public Key Systems are typically cost effective only in large volumes or where the value
of data is so high that it is worth the higher costs associated with this type of
deployment. What most people dont realize is that Public Key systems still rely heavily
on Private Key encryption for all transmission of data. The Public Key encryption
algorithms are only used for non-repudiation and to secure data integrity. Public Key
infrastructures as a rule employ every mechanism of data security in a nested and
coordinated fashion to insure the highest level of security available today.
Conclusions
The smart cards improve the convenience and security of any transaction
where it can be either money transaction, bill payment, income tax, etc. It also provide
tamper-proof storage of user and account identity without being stolen or hacked by any
source It also protect against a full range of security threats.
References
http://www.iso.org
http://www.cardlogix.com
http://www.nist.gov
http://www.cioinsight.com
http://www.commoncriteriaportal.org
http://www.istpa.org
http://www.smartcardalliance.org
http://www.pcscworkgroup.com