02B - MYSTIKO OΠΛΟ HAARP ΑΚΤΙΝΟΒΟΛΙΕΣ - EG
02B - MYSTIKO OΠΛΟ HAARP ΑΚΤΙΝΟΒΟΛΙΕΣ - EG
02B - MYSTIKO OΠΛΟ HAARP ΑΚΤΙΝΟΒΟΛΙΕΣ - EG
PANAGIOTIC LIAPIC
SECRET WEAPON
RADIATIONS
ATHENS 2010
Have you ever thought what accounts for the rapid deterioration of your
health; You rat, not the society that says the Communist Party, however,
but surely you do. Welcome to the nightmare of hidden
pragmatikotitas.Skeftikate what ever you are free to eftnomoumenig
democratic society, how many square meters ze'ite true; 100sq.m
apartment; Work 600; Come 1500 and put other places; Pass is all your
life in two acres of comfortable personal cell and die there; And everyone
else; Someone who will never see and die in his own ekainos
corresponding two acres or more with fewer amenities; And are they
really comforts or guards marksmen adeialeipta put on you; And what
these shooters; Those who worked hard to get close to ask you to name
a status symbol on the other prisoners, and eventually you normally
whipped until fall ikmada without power. Are your electrical appliances.
Did you ever go to any electrical appliances when we think that "die"
when not working?
• What happened to your old tileotasi; old microwave oven fly away; Your
first cell; The old your labtop;
Did you know ...
... Each device when the throw garbage charge save the environment
and our health in ways you never imagined?
Or that ...
- Each computer monitors are 1.36 to 3.6 pounds of lead and that lead
can cause damage to kidneys, liver, blood, dermatitis - allergies, damage
to lungs - permanent breathing problems and carcinogenesis. Leave
around your apartments snipers shoot you with their comfort and every
day to very accurately
- 22% of the mercury consumed each year worldwide is used in electrical
and electronic equipment. Mercury can be easily accumulated in living
organisms and into the food chain through fish. Causes chronic problems
and brain injuries.
- Asbestos found in electrical appliances (toaster, irons, electric coffee
maker) older technology - electric heaters and other heating devices, are
carcinogenic material, causing contamination of the gas horizon and a
strong toxicity when in contact with eyes - Skin Who came; Hello,
Eseis.Kalosirthate in your nightmare
Microchips-battery
The microchips require electricity to operate.
They are powered by battery life diminished
by them and made them virtually useless.
The team at MIT but has managed to create
microchip that works with the body heat. The
new construction is very low voltage and
battery can be recharged by the heat of the
body. Thus an implantable microchip will
have virtually unlimited operating time
Secret report shows how the Nazis planned fourth Reich (7 November
1944) ... The EU paper is old and fragile typing while they are highly
visible and fading. But the U.S. secret service documents EW-128 Pa
has kept cold, almost from the time drawn up in November 1944. The
document, also known as the Red House and a detailed report on the
balance of the secret meeting at the Maison Rouge Hotel in Strasbourg
on 10 Avgoustou1944. There, the Nazis talked to an elite group of
German industrialists plan for Germany after the war, and the
(preparation of the Nazis) to return to power, and work for a strong
German Empire. In other words, the Fourth Reich
* They have already sold 25,500 devices (16,650 at Athens) and the
adoption of new funds from K. Hatzidakis offered a "breath" in the
business and additional opportunities for consumers Column Chris
conditioners 20.000 Other new technology will have the opportunity
to get consumers Attica 35% subsidy given by the Ministry of
Development. The Minister Hatzidakis decision approved the
allocation of additional funds 5 million to cover most needs people
to replace old air conditioners with new appliances. "I change the C
goes very well," noted Mr. Hatzidakis announced the decision to
allocate more money. According to available data (through 17 June)
the agency administering the program have so far sold 25,500 air
conditioners nationwide, including 16,650 in Athens. In the eight
poorest regions (Thessaly, Crete, Epirus, Eastern Macedonia and
Thrace, North Aegean, Crete, Western Greece and the Peloponnese)
4618 devices sold in Central Macedonia, 2825, in St. Greece 1008, in
N. 297 Aegean Macedonia and D. 102. With the approval of
additional funds being offered a "breath" on the industry, and
additional opportunities for consumers who want to change their
old air conditioners advantage of the subsidy of 35%. Note that the
initial program's budget totaled 15 million, of which around at 5 to
5.5 million related to Attica. 80.000 In addition, before granting an
additional 5 million, estimates wanted to replace a total of 55,000 to
60,000 devices. So now the number climbs to 75,000 to 80,000.
option to allocate more money in Athens was because of increased
demand. Consumers across the benefit of the subsidy will be (35%
of the price and not more than 500 million) hitting the market air
inverter technology and energy-saving class from 31 to 140 per
year. Note that every citizen has the right to withdraw a grant of up
to two air conditioners and the necessary documents for
participation in the production of identity card and a copy of a
recent electricity bill. The consumer can choose and buy a new air
conditioner if it is:
* DC Inverter Power Class A / A for devices up to 16000 BTU.
* DC Inverter Power Class A / A A / B B / A B / B devices over 16000
BTU
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 20
But you know that freon containing carcinogenic. What happens
when you start diarrhea; And let you will not, or will you sleep;;
Many substances such as strong detergents, oils, pesticides, etc.
are directly toxic to several species and many of them causing
serious damage to ecosystems, contaminating air, water or soil.
Division of these substances are heavy metals (mercury, lead,
cadmium, etc.) and organic compounds (such as pesticides) that do
not biodegrade, but transferred through the food chain and
accumulate in higher consumer who belongs to the man. This
accumulation causes many problems as thin shells on the eggs of
birds, poisoning and even death in humans, etc. This phenomenon
is called bioaccumulation. But the phenomenon is on the rise in
recent years, reducing the amount of stratospheric ozone, is
directly related to household substances. Various sprays and
liquids in refrigerators and air conditioners contain freon, which
predominantly involved in this phenomenon. The reduction of the
ozone layer causes the increase of harmful ultraviolet radiation
reaching the earth and this is devastating for many single-cell
organisms and leads to increased incidents of skin cancers and eye
cataracts in humans.
Microwave
Direct effects
Indirect effects
When a person electrically insulated on the land lies within a
strong electric field and comes into contact with a grounded
object is displayed in the spark point of contact. If the electric field
(before the presence of humans) more than 5kV / m, is very likely
that this phenomenon is disturbing. Similarly, when a person
touches a large object ageioto presence of electric field is likely to
result in a spark. The size of the disturbance in these cases
depends on the size of the object.
Effects on pacemakers
Particularly important may be the interaction of electric and
magnetic fields with the operation implanted cardiac pacemakers
Effects on monitors
The magnetic fields, often affecting the picture quality on computer
screens of cathode ray tubes. This can occur in magnetic fields of
the order of IMT. The liquid crystal display, plasma and other
modern technologies do not exhibit such problems.
There are long-term effects of electric and magnetic fields of
extremely low frequency in humans?
To investigate the effects of electric and magnetic fields in the
human species out of many investigations (epidemiological,
laboratory, clinical). The results of these surveys are evaluated by
special committees of the competent international bodies like the
World Health Organization (WHO), the International Commission
on Non Ionizing Radiation, (ICNIRP), as well as national bodies
such as National Research Council (NRC) of the U.S. National
Radiological Protection Board (NRPB) of Great Britain etc. The
views of these converge on the following general conclusions
Epidemiological studies
In epidemiological studies considered exposure to magnetic fields,
people have become ill with a particular disease and compare with
the report of those who have become ill from the disease. These
investigations, as a whole, showed no link between exposure to
electric and magnetic fields, ELF and the induction of long-term
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 32
biological effects
other than childhood leukemia for which a patient appeared
statistical correlation for the magnetic field. Although in general the
exposure of children who became ill was the same as those who
are not ill, about 2% of children who became ill were exposed to
average magnetic field greater than AMT, while the percentage of
children who were not ill about 1%. This is interpreted as a
statistical doubling of the incidence of childhood leukemia in
children exposed to daily average values of magnetic field higher
than AMT. We obtained corresponding figures for adults or for
other long-term effects.
For the statistical correlation does not currently exist valid scientific
explanation. There may be other reasons, such as bias in the
selection of children or the existence of an unknown carcinogenic
agent which was used in the studies and distort the results. For
this reason, questioning the assumption that the relationship is
causal
If the causal relationship was what you meant for Greece?
Childhood leukemia is a rare disease. Annually appear about 4
new
cases of childhood leukemia per 100,000 children. Even if we
assume that magnetic fields with an average value above 0.4
mTprokalousan certainly a doubling of cases, this in a country like
Greece means that we also recorded about a new case every two
years.
The value of O, AMT is a level of protection?
The value of 0.4 MT in epidemiological studies showed a mean
exposure of children during a 24 hour basis. The distribution of
fields in space and time variation, it is very easy to find points
anywhere with magnetic fields larger than 0.4 MT. 0.4 MT are not,
say, a threshold or limit for the magnetic field, since even when the
mean exposure is much lower than 0.4 MT are several moments
during the day the report is greater than 0 , 4mT.
Sort by IARC
The International Committee for Research on Cancer (IARC),
World Health Organization has defined a classification system for
chemical and physical agents on the karkinogennitikotita them. In
June 2001 examined the static and ELF electric and magnetic
fields and concluded that ELF magnetic fields are classified as 2B
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 33
as "possibly carcinogenic" (possibly carcinogenic) to cause
childhood leukemia. Static and ELF electric fields and static
magnetic fields were placed in Category 3, "Unclassified" on the
karkinogennitikotita. The ELF magnetic fields were classified by
IARC in category "possibly carcinogenic" based on "limited"
evidence from epidemiological studies of childhood leukemia.
Epidemiological data on other cancers, and those from laboratory
studies in animal tissues and cells were considered "inadequate"
and thus the ELF magnetic fields are not classified in the
categories of the most dangerous players as "carcinogenic"
(carcinogenic), or "possibly carcinogenic" (probably carcinogenic).
As an indication that there are many other factors that have been
classified by IARC in the same category as the magnetic fields of
ELF. The most famous of these is coffee, gasoline exhaust and
vegetables preserved in brine
Exposure Limits
There are limits for safe exposure to electric and magnetic fields?
The International Commission on Non Ionizing Radiation,
(ICNIRP), issued the 1998 guidelines for human exposure. These
guidelines are based on the proven effects of electric and
magnetic fields in humans. Compared with the lengthy and
uncertain effects of magnetic fields above where no known
mechanism of creation, it is impossible to set limits on them.
The ICNIRP guidelines consist of basic restrictions and reference
levels.
A common characteristic of all electromagnetic waves is the
speed, 300,000 miles per second, while that which differentiate the
frequency (or wavelength). The frequency is practically the number
of waves passing a given point per second, and coincides with the
frequency of pulsing a dipole, which is the cause - a source of
electromagnetic waves. Generally any vibration caused by electric
charges produce electromagnetic waves of the same frequency.
The frequency, measured in Hertz (1Hz = 1kyklos per second) and
multiple KHz (= 1000 Hz, kilocycle per second), MHz (= 1.000.000
Hz, megacycle per second) and GHz (= 1.000.000.000 Hz) , is the
extent by which electromagnetic waves are classified into different
categories, ranging from industrial and small waves telephone
frequencies produced by moving electric charges (electric current)
to hard X-rays and c very high frequencies, produced by
IR radiation are the ovens, light bulbs heat, lasers and IR. This
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 44
radiation is perceived mainly by the heat created. So the skin and
eyes absorb infrared radiation as heat.
Visible radiation
Ο Sun is the major source, but the number and variety of light
bulbs, fluorescent lamps and is not insignificant. The different
frequencies of visible electromagnetic spectrum "as" our eyes as
different colors. Even the visible radiation, known as light, can
damage eyes and skin when it is strong.
Ultraviolet (UV) radiation
As I said mobile phones and base stations, emit radiation in the
range of frequencies. Given the widespread use of millions of
people (men, women, children) who are exposed to it, it is
appropriate detailed reference to them. Moreover, the effects of
mobile phone radiation on human health has occupied many
researchers for many years and not without reason, since no other
radiation is not the massiveness of this. In Greece there are more
active mobile phones from its citizens, while 80% of children under
12 years are users! All other radiation mainly small groups of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 46
people who assumed they will be aware and take protective
measures in the field report
Limits and standards of protection
Whether there are limits, above which there may be adverse
effects, relevant bodies to provide information and instructions are
mostly the ICNIRP, the World Health Organization and the
European Commission.
In our country the mobile broadcast at 900 MHz, 1800 MHz to
2100 MHz and to prevent interference between different radio, and
mobile phone companies operating in Greece is COSMOTE
(GSM900, DCS1800, UMTS), the Q -TELECOM (DCS1800), the
TIM (GSM900, DCS1800, UMTS) and VODAFONE (GSM900,
DCS1800, UMTS).
The following figure shows the level of risk the power density of
radiation, which has been adopted by international
Radiation soil
The radiation from the ground due to the phenomenon of natural
radioactivity is the spontaneous decay of unstable nuclei of some
radioactive elements, which are components of the earth's crust.
These are the radioactive elements radium, uranium, thorium,
potassium, radon, etc., which are found in soil, water, air, living
organisms in food and building materials. This physical radiation is
most intense in underground spaces such as caves, mines, and
the underground buildings. The main naturally occurring
radioactive isotope potassium-40 which has a half life of 1,28 • 109
years. That is an initial amount of potassium to leave the half must
pass 1280 billion years. This item 89% decays by emitting beta
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 58
radiation (electrons) metastoicheioumeno calcium, and 11%
initially decays by emitting beta + (antiilektronia) and subsequently
converted into gamma rays slow.
Potassium-40 is bananas, potatoes and carrots, and therefore also
in the human body, but in cement. Radiation is particularly
potassium, and the average temperature in the depths of the
oceans
Cosmic radiation
This electromagnetic and corpuscular radiation of high energy that
reaches the upper atmosphere coming mainly from the sun and
other celestial bodies. Therefore, the one in the intense activity of
the sun and this accentuated, while increases in height.
When it enters the atmosphere, cosmic rays interact with nuclei
people in it and cause secondary production of other fast-moving
particles (electrons protons, neutrons, mesons, muons, etc.),
which together with high energy electromagnetic radiation, reach
to the ground. During this interaction, cosmic radiation and
atmosphere, also produces radioactive nuclei of helium-3,
Beryllium-7, carbon-14, sodium-22, etc., which they contribute to
the increase of radiation affecting agencies and natural. However,
the cosmic radiation and passes through the layers of the
atmosphere is absorbed to some extent, the intensity decreased
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 59
gradually and finally it reaches the level where the surface of the
sea is hundreds of times weak.
As shown in the figure below the average dose rate from cosmic
radiation at sea level is 0.03 mSv / h to 15 km and reaches 10
mSv / hr. It is obvious that residents of cities and villages where
they are at high altitude absorb multiple doses of cosmic radiation,
although the residents of coastal areas. But the altitude of 10km,
where routine flights travel the radiation dose rate is about 5 mSv /
h, while the 15km when flying large aircraft, type Jumbo and the
Concord dose rate reaches 15 mSv / hr. Thus a traveler during a
long haul flight overseas absorb tens of mSv of cosmic radiation,
while the crew of the airlines apparently accepts major annual
installments, which is appreciable and should be checked. And
indeed there is a directive of the European Union (96/29), which
requires airlines to systematically measure the doses absorbed by
the air crew. It is understood that the cosmic rays are the strongest
out of the atmosphere, outer space, and therefore the dose
absorbed by astronauts are multiple, so it should be no special
X-rays
X-rays are invisible electromagnetic radiation of a wavelength
much smaller than that of visible light, and comparable with the
Υγιής Ασθενής
Ta bass new weapons are the first to grill the Police in the microwave
CERN
ON the EMV
To EMV global standard for debit and credit cards based on chip
technology. As Q1 2008, there are more than 730 million EMV-cards
using the chips that you are using for payments based on a
microprocessor, a guy from mikrokompiouter that [provides high security
and other features compared with traditional Magnetic Card Golden area
in front of the card is known like contact area. A microprocessor is
located just behind the golden touch protected by a capsule. (Collects
data) When you insert the card to the driver reading the chip in contact
with the reader. This contact activates the chip, which takes power and
make the transaction. (Electromagnetic NEFOS) This is called a chip
card technology. Another type A chip card is said card without contact.
Using your hand holding the card a few inches of the reader. The reader
activates the chip and receiving data wirelessly via RF without the card
removed apoo your hand. The investigation showed that this method of
cards from a distance is 53% faster than using a simple magnetic card
and 63% from cash you are using. The EMVCo created protokolo contact
your card from a distance (RAYS) EMV technology will relieve the
European banks the cost of fraud through plastic money, since the chip
ensures secure transactions. From the table on the progress of the
adjustment process appears to significantly delay the replacement of the
main debit and credit cards have countries like Italy, Spain, Portugal and
the Netherlands, and the situation appears better in terms of acceptance
machines plastic money. Greece is among the countries that have not
advanced in the integration of technology EMV, the replacement rate of
debit and credit cards be increased to 11% and 19% respectively, while
43% and 32% respectively formed the proportion of compatible the
technology EMV, ATM and POS
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 98
WHAT Hide on the chip
• that each transaction brings out a MINI X-ray. THE
RADIOSYCHNOTITES-radiation induces KARKINOUS
• THAT ALL REPORTED IN MEMORY TRANSACTIONS AND YOUR
MEMORY chip is huge.
• WHO IS THE MANUAL OF OPERATIONS;
• The chip sends DATA
• GO TO THE DATA SYLEGEI;
ATEBank RURAL
"What is: ATEbank Prepaid Card is your electronic wallet for secure
transactions anywhere, even on the internet! ... A unique gift for your
loved ones ...
The holder may charge the card with the amount each time it wishes to
use.
Use of the card:
Used 24 hours 24 hours anywhere in the world with the mark VISA, for:
• Shopping / payments / subscription via the Internet (without the physical
presence of the card)
• Purchase equipment to P.O.S. in shops and outlets in Greece and
abroad, especially in modern technology applied for the PIN, and no
additional authentication of the owner by dealer
• Telephone and mail order (without the physical presence of the card)
• Cash withdrawals at any ATM worldwide
• Cash withdrawals at any ATM for free ATEbank
Secured transactions:
The ATEbank Prepaid Card is a chip card technology and meets all
international safety standards and EMV. It is safe, since you have
available, only the amount you will use immediately. The "charge" with
money when you need it. Use it to shop, and then when you need it, the
"charge" again.
In this way the owner is not exposed to potential risks of card misuse by
others for large sums.
Continuous updating of the balance amount available and transactions
with the card
You will be contacted:
) For the balance of your card by the ATM network and our third site.
b) for the last ten transactions from your ATM in our network
Target
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 99
The card is designed for customers ATEbank and third parties.
Can be given as a gift to a friendly and loved ones or new even to minors
aged 14 not yet using deposit accounts and have no ability to use credit
cards, providing security without having to carry cash. Applicants must be
over 18 years.
Transaction limits
The total amount available with which they are charged a card with one
or more successive loads can not exceed the balance of € 2.500 €.
The maximum amount of each purchase can be up and available
whenever the amount of the card.
The maximum cash withdrawal through ATMs ATEbank up to € 1.500
(per transaction and per day) and limit each bank ATM withdrawals from
third parties.
If a concession card to a third party - bearer limits reduced to € 1.000 per
calendar year.
Card Issue
The Application for ATEbank Prepaid Card is in all stores before. You
receive the card immediately and you can "charge" to either store or via
Web Banking SA and use it the same time.
Invoice
FAQ
Useful Tips
Detailed instructions and more information is available from:
To Tele-Service Center ATEbank: 210.38.94.400 or stable at 30 801 11
5800 0, option 1.
Padiosychnotites
EMV chip technology has the potential to overcome many barriers, which
traditionally does not facilitate the use of payment cards for low value
transactions. Going one step further and combining EMV technology with
wireless technology, credit cards are able to offer a comprehensive and
workable solution that would replace cash. "Technology EMV, in
conjunction with the existing standard ISO 14443 Radio Frequency
Identification (RFID), ensures both the facilitation of the cardholder and
transaction security," he informs Visa. That would greatly facilitate the so-
called offline «contactless' transactions. More specifically, the issuing
bank should establish and monitor the maximum value of the transaction
and the aggregate expenditure through offline transactions. For example,
an issuing bank can personalize a card to enable the holder to perform
offline «contactless" transactions, where the maximum value of each
transaction up to 10 million when the aggregate of these transactions
does not exceed 50 euros. Each time the holder uses the card, an
integrated set of "Cash» (counters) calculate the aggregate value of all
the offline transactions.
(MIPOS ESTIMATE AND SO ON THE TAX TO BE FULLY; Ust VRE
from here!)
To facilitate instant payment, the PIN is not requested by the cardholder
payments low value (below the limit set). Once consumers reach the limit
set by the bank, this machine will require to fund the transaction to be
online with technology Chip and PIN, thus preventing the uncontrolled
use if the card is lost or stolen.
New applications
Meanwhile, Mastercard with a Nokia test pilot stage, even if the creation
of a mobile phone - credit card and Visa already was demonstrating a
solution "contactless" transactions using a mobile phone Nokia 3220
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 107
equipped with a special cap Nokia Near Field Communication (NFC). The
implementation of the Visa EMV technology is stored securely on a smart
card embedded in the jacket NFC and fully compatible with the card for
"contactless" transactions of Visa. To NFC enables interaction with a
touch among mobile phones and other commercial electronics. The
transaction is in the same way as on card payments. The only difference
is that instead of the implementation of EMV technology to be stored in
the card payment is stored in a secure chip in the mobile phone.
(WHY YOU torn On the pretext of TROMOATIA YOU ARE WHO HAS
THE DETAILS WHAT MOBILE. NET says the next line)
The NFC technology will facilitate the convergence of mobile phones to
credit cards, creating additional value, for both cardholders and
merchants.
H philosophy of "new stores"
According to the philosophy of "new store" will be available the following
sites:
Area self: The customer service is a clock, via ATM, Internet (e-banking)
and telephone (phone banking).
Funds: Should be readily accessible. Usually, once lined the entrance.
Customer Area: Area to accommodate the massive customer base but
also proupantisi those entering the store. The role of officials in this
region is important. First, they serve customers who do cash
transactions. Secondly, guide the customers exactly where to go. Thirdly,
'teach' customers to use alternative networks (ATM, Internet, telephone).
HOW DOES SAY TOKOGLYFOS COURSE;
Showcase banking: It's in the shop window, with the advertising and
promotional material.
Location advice: serve customers with high added value of experienced
executives who give advice.
Throughout the store there are strong marks and promotional messages.
Eidomen ...
1
Smart Card Technology: Applications
Academia
GI! RGIOS VERANIS
Master Thesis
Supervisor: Konstantinos Tarabanis
Examiner: Konstantinos Margaritis
0.P.M.S Information Systems
University of Macedonia
Thessalonica
January 2008
2
Copyright c George Terrace, 2008-01-13
All rights reserved. All rights reserved
The approval of the thesis by 9.P.M.S. in Information
Systems, University of Macedonia does not necessarily imply
accept the views of the author by the Department.
3
Summary
This thesis aims at the planning, analysis and
then the planning and implementation of an Information System
to enhance the quality of the services of a university
institution to the members that compose it.
Smart cards are a safe for personal data and are easy
the transfer as a tool. Their particularity is that it can
represent physical entities in electronic trading systems. The
applications implemented worldwide and the benefits
result is important for both the user and the provider
services.
In the first chapter is an introduction to the operation of smart cards
to give the reader an intimate knowledge of the technology and
1st Chapter
1.the is the smart card?
1.1 Introduction
Today there are millions of users of smart cards that use these
in their daily lives. The applications are many and these provide
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 113
advantage of security and confidentiality of the data holder.
The first cards have made their appearance in the early 50 ', where
first group Diners brought to market the first credit card.
These cards were more a kind of magnetic card (ancestor of
smart cards). The group succeeded in a short time to make
accepted the card from a set of retail chains that offer services
travel and accommodation, like this began to use and widely
Europe and America. In fact what made this card was to
replace the money in its current form, that is why the magnetic
cards are also known as plastic money. "
The first smart card was introduced in 1968 (Hansmann et al. 2002),
(Chen
2004), based on a patent of Juergen Dethloff and Helmut Groetrupp that
allow the introduction of a type circuit in a plastic card. 9rontas
independently Kunitaka Arimura Arimura Institute of Technology in 1970
has its own patent for the introduction of plastic circuits
cards. Yet real success (Chen 2004) for smart cards came
1974 and 1979 by Ronald Moreno, who had 47 patents related to smart
cards.
The first smart cards have the ability to store data in
Card example owner's data (name and password). The first
largely successful efforts to use smart cards launched in early
80s'. Between 1982 and 1984, the Carte Bancaire (the first
French banking group) ran a pilot program, which has seen
great success. The smart card industry grew and now
estimated stingermaniki banking market move over 52
million smart cards (GeldKarte). Recently, the technology of chip and
10
Modern cryptography has significant advantages of smart cards,
so thus strengthening their position in global technology. There is a
Today many uses such as: storing electronic money
replace money that is on paper, storage and security of personal
medical evidence, to preventing uncontrolled access to cable and
satellite, wireless phone safety, etc.
Fig 1. Java Smart Card multiple functions of IBM, in actual size
(Hansmann et al. 2002)
1.2. Benefits
Smart cards offer significant advantages for applications for
intended. The three keywords that specify full advantage of all the
advantages are security - Portability - ease of use. It is true that
processor, memory and support for I / O is a circuit
which is embedded in a plastic card. Before the 50s it
a science fiction today, more and more
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 114
States want to use people for the benefit of society
them. In modern cryptography, smart cards become more powerful
against hostile acts (Chen 2004).
The ease of use and portability have made them in countries such as
United States and Bahrain as "electronic wallets"
One can make use of smart cards for secure internet
markets as they would be bought with money or with a credit card
any information needed at the memory card and
elsewhere (Hansmann et al. 2002), (Chen 2004).
11
Also depending on the technology of each card there may be
stored on the card (no dependence on the memory card) in addition
a small-applications for corresponding applications that can be connected
Also suitable for secure data transmission between the card and
application.
3omes TVL
To encode the data into objects in smart cards in ASN.1 (
Abstract Syntax Notation One) BER TVLs are widespread. The
description
data in this way standardized in ISO 8824 and ISO 8825. Each
are described as "TVL", or "Tag-Length-Value", a label recognizes
object type, the length of content and data itself.
21
Figure 4. Example TVL structure.
2. Applications
Identified as laptops, having the ability to
store and process data with autonomy. It is known that
Their size is the same as credit cards, this allowed to
become widely accepted in the intended user. Smart cards
find application in a variety of industries directly related to the
technology.
Banking and financial sector thus finds application in
Secure credit card or deposit. It has many common properties with the
magnetic cards, but because they are not losing the information
after removal from an input device such ATMs have begun to
replace the global market. It is also more resistant than
magnetic and have the potential reuse by another client if
the necessary steps, so reducing the cost of banks in
hundreds of millions a year.
With the development of electronic commerce worldwide and the
insecurity are consumer markets for payment through
Internet is not slow to present the first applications for e-payment by
using smart cards. It's a move that finds an ally and banks
and thus reduces operating costs in relation to credit to
currently used (Chen 2004). But the idea extends beyond and in spite
goal is for consumers to obtain a so-called electronic wallet
a smart card. This means that all consumer purchasing power will
is a single card with the elements that would
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 122
permit to be in possession of such personal data. For banks
and business is an ideal solution to secure sales for
0x92
Airport
0x03
3 Bytes
"XWY"
Airport code for Wyoming
Tag Length Value
consumers a tool for better services.
Fig 4. Example of using smart cards in banking system (Elliot and
Loebbecke 1998).
Another industry where there is widespread application is the industry's
communication. From very early on started to use smart cards in
is in the form of prepaid cards for telephone services, known as
phonecards. The field of wireless communication is the best customer of
Companies that manufacture smart cards and this is due to the fact that
smart cards comply with safety technology GSM (global system
for mobile communication). Each SIM card is every mobile phone should
have the technology GSM. The SIM card identifying the user - owner and
only the right, always based on the characteristics which are set to
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 145
access to bibliographic sources, networks and computers. Yet there is
need for controlled access to services and procedures for all levels
of CP involved on. The safety but not be limited
Only the data card can be saved, but a better and more
efficient solution is proposed that the combination of databases in
conjunction
the data is in memory of the smart card. If
identify changes to the data card is then you should
accordingly notified the competent authorities and the user.
Culture & Policy:
The card will be given free for the first time students and employees.
If this is lost there will be relatively fine for the reissue. Also
fine will be imposed and if found "invasion" on the card
by the user. 9ynatotita Association card to bank accounts
below limits set by the user. Provide conversion program
swap users from outside the European Union. The system will
should be written in technologies that only Sun offers. Also should
The system supports the ISO 7816 for smart cards.
Then expressed relative to figure analysis of work
System (AS - IS) as it is in its present form.
57
4.2 _iagramma _rastiriotiton
The modeling of the AS-IS system helps us to significantly and optical
now distinguish the procedures exist but also to recognize
possible changes the system needs.
The procedures that have emerged are:
Students coming to the institution and there are two cases a) knows 9en
to go so close to people from various political parties or
seek information from the intelligence department of the institution, b)
knows that
contacted and directed that way.
If there are people willing to help the student,
help fill the requests and the accompanying literature.
In the Secretariat, the student submits his application for the granting of
student
identity. To be considered the record of completed application and
required
medical examinations if the student has given him the time the
application is completed and
enters a phase of treatment by competent workers to secretaries.
A worker checks the registry file of the application and if all
Full details are sending the application to the Head of Service for
signature. If the information is incomplete, the student shall be informed
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 146
by telephone. If
request the student has shown that counterfeit items then informed the
department of the Rector.
The Director signed the applications and return them to the workers.
Also at times want to send statistics and reports on
applications to the Rector.
If the process the Secretariat completed successfully then given to
student studying the book and informed by the responsible official for
actions must be done to remove the student of
identity. The student is required within 5 days to come to
Care Foundation. It is a service charge on a pass
and providing health insurance to students. The folding of the student in
conjunction
to book a course the student identity of each student. The
58
Brief Description: This use case describes the process by which the
library provides
items to students.
Trigger: The student wants to find and borrow bibliographic Library.
Type: External
Relationships:
Association: Library
Include: Authentication, Access to sources
Extend: Purchase of goods & services
Generalization:
Normal Flow of Events:
1. Introduces a special card reader
2. The student performs the use case «Authentication»
3. Select the tab for literature search
4. Access rights depending on the use of the card
5. Search - Search
If the books are finding success running subflow 1
If the book is unsuccessful finding out the subflow 2
6. Puts the books on a special automatic lending machine
If the machine does not work run the subflow 3
7. Were tested and displays the list of borrowed books
If no prior financial burden running subflow 4
8. The student confirms the decision of the machine
9. View list of books borrowed by a student
10. Demagnetize the books from the machine.
11. The student chooses to leave the system
12. Take the card and leaves.
SubFlows:
S-1: If your search is successful
The student is in the library books they want to borrow.
S-2: If a successful search
The student goes to stream 11.
S-3: If we do not operate the auto loan
The student is addressed to an official of the library
Run the flow 7.
S-4: If no prior financial burden
Asked the student to pay the fine and issued
Alternate / Exceptional Flows:
S-3: 1a The student pays the amount from the card after confirmation
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 153
2B, the student if there is money in the account of the then canceled
costs
68
Use Case Name: 9iacheirisi financial
requests
ID: 7 Importance Level:
High
Primary Actor: CP Bank Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to have an electronic wallet for all departments within the
institution
Registry - charge account where the student fees
CP Bank - updated for any size financial transactions of the student
Brief Description: This use case describes the process by which the bank
accepts CP
information on financial transactions
Trigger: Each half-hour SP Bank is informed of the movements of the
system
Foundation
Type: External
Relationships:
Association: CP Bank, Student
Include: Purchase of goods & services
Extend: 9iacheirisi accounts
Generalization:
Normal Flow of Events:
1. The SP receives notice of the bank to inform trading
2. The official bank codes entered into the system of bank
If the codes are correct running subflow1
If the codes are wrong running subflow2
3. Logging in the Bank
4. Start automatic updates alert on similar accounts
users
If an entry error caused running subflow3
5. Shipping movements in the user email account if they exceed an
amount
defined by the system
6. Output from the system staff
SubFlows
S-1: The codes are correct
Recorded in the system user who entered the system.
S-2: The code is wrong
Sought re-enter the codes
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 154
S-3: Incorrect update
Update service from which the requested change of account
The bill goes to state supervision by the banking system
Alternate / Exceptional Flows:
S-2, 1a. and in case of failure of third suspension of the account of the
user.
S-3, 1a If the system fails to meet bank, informed the SP
Computerization
69
Use Case Name: 9iacheirisi accounts ID: 8 Importance Level:
High
Primary Actor: Computerization CP Use Case Type: Detail, essential
Stakeholders and Interests:
Student - make correct documents for entry or modification of elements
of
Registry - Check documents for the educational purposes of the student
Library - information about changes to services has
SP Bank - Check best supporting economic
SP Computer - manage all accounts and is responsible for monitoring
these
Brief Description: This use case describes the process by which
management is
accounts of both new and existing, if
documents are correct.
Trigger: The MS Computer Science student record data
Type: External
Relationships:
Association: SP Computer
Include: Introduction to System
Extend: CP Bank, SP 9ioikisi
Generalization:
Normal Flow of Events:
1. Students arrive at the offices of the Computerization of the necessary
supporting
If the documents are incomplete running subflow 1
2. Part of the documents are sent to SP 9ioikisi Control
If the check is negative running subflow 2
3. An official SP Computer running use case «Introduction to System"
4. 9imiourgeitai tab of the student
If during the recording found an existing account is running a subflow 3
5. Insert the necessary data
6. Card issued by the student
7. Warn the student
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 155
SubFlows:
S-1: If the documents are incomplete
The request goes into standby mode
S-2: If the check is negative
The request is canceled and advised the student
S-3: If the student account is already
The request is canceled and advised the student
Alternate / Exceptional Flows:
1a. Students submit documents through the website of the institution.
S-3: 1a. If the student is notified in the same one that had the bill before it
canceled the first item (and card) and return the flow 4.
2a. If it is then sent notice to SP 9ioikisis the account goes into
idle.
70
Use Case Name: Set user rights ID: 9 Importance Level:
Medium
Primary Actor: SP 9ioikisis Use Case Type: Detail, essential
Stakeholders and Interests:
SP 9ioikisis - wants to decide on the rights of use according to the
documents
there are
MS Computer Science - wants to be informed about the changes
Brief Description: This use case describes the actions which change the
basis of the
rights to use the cards.
Trigger: Decision-making for information rights
Type: External
Relationships:
Association: SP 9ioikisis
Include:
Extend: MS Computer Science
Generalization:
Normal Flow of Events:
1. An official SP 9ioikitikou running use case «Authentication.
2. Student Search - Find
3. Processing request
If the request is checking of documents running subflow 1
If the request is cancel the card running subflow 2
4. Configuration using
5. 9inetai information on CP Computerization
6. Logoff
SubFlows:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 156
S-1: If the test is positive
SP informed Computerization
S-2: If the request is canceled card
The official checks for financial outstanding student in the institution
Alternate / Exceptional Flows:
71
Use Case Name: Access to sources ID: 10 Importance Level:
Medium
Primary Actor: Student Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to make entry into natural areas or networks.
Library - wants to know the status of a student to give similar access to
bibliographical sources.
SP 9ioikisis - wants to regulate use rights according to student status
Brief Description: This use case describes the process by which the
student is physically or
reasonable access to places and networks within the institution.
Trigger: The student wants to enter a physical or logical area
Type: External
Relationships:
Association: Student
Include: Authentication, provide evidence
Extend:
Generalization: Access to countryside, access to networks
Normal Flow of Events:
1. Introduces a special card reader
2. The student performs the use case «Authentication»
If the result is negative Authentication run subflow1
3. Take the student permission to use a logical or physical access
If the license is reasonably accessible to perform the subflow 2
If the license is for physical access to run the subflow 3
4. Use the source
5. Select Output
6. Take the card and leaves
SubFlows:
S - 1: If the result is negative Authentication
The student is notified of the outcome
SP informed the computerized energy.
S - 2: If the license agreement for reasonable access
The Library informed and provide access to sources of
SP informed the computerized energy
S - 3: If the license terms of physical access
SP informed the computerized energy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 157
Alternate / Exceptional Flows:
S - 2: 1a, if the student has financial obligations to the Library, advised
accordingly
and access to sources is limited to basic.
72
4.3.2. Calculation of person-hours using use case points
Use Case Point Estimation Worksheet
Unadjusted Actor Weighting Table
Actor
Type
Description Weighting
Factor
Number Result
Simple External System with welldefined
API
122
Average External System using a
protocol-based interface, e.g.,
HTTP, TCT / IP, or a database
236
Complex Human 3 1 3
Unadjusted Actor Weight Total (UAW) 11
Unadjusted Use Case Weighting Table
Use Case
Type
Description Weighting
Factor
Number Result
Simple 1 - 3 transactions 5 8 40
Average 4 - 7 transactions 10 2 20
Complex> 7 transactions 15 0 0
Unadjusted Use Case Weight Total (UUCW) 60
Unadjusted Use Case Points (UUCP) = UAW + UUCW
UUCP = 11 +60 = 71
Technical Complexity Factors
Factor
Number
Description Weight Assigned
Value (0 - 5)
Weighted
Value
Notes
T1 Distributed system 2 4 8.0
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 158
T2 Response time or
throughput
performance
objectives
1 4 4.0
T3 End-user online
efficiency
1 5 5.0
T4 Complex internal
processing
1 3 3.0
T5 Reusability of code 1 4 4.0
T6 Easy to install 0.5 3 1.5
T7 Ease of use 0.5 4 2.0
T8 Portability 2 3 6.0
T9 Ease of change 1 4 4.0
T10 Concurrency 1 2 2.0
T11 Special security
objectives included
1 5 5.0
T12 Direct access for third
parties
1 4 4.0
T13 Special User training 1 3 3.0
73
required
Technical Factor Value (Tfactor) 51.5
Technical Complexity Factor (TCF) = 0.6 + (0.01 * Tfactor)
TCF = 0.6 + (0.01 * 51.5) = 1.115
Environmental Factors
Factor
Number
Description Weight Assigned
Value (0 - 5)
Weighted
Value
Notes
E1 Familiarity with system
development process
being used
1.5 2 3.0
E2 Application experience 0.5 3 1.5
E3 Object-oriented
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 159
experience
1 3 3.0
E4 Lead analyst capability 0.5 2 1.0
E5 Motivation 1 5 5.0
E6 Requirements stability 2 3 6.0
E7 Part time staff -1 0 0.0
E8 Difficulty of
programming language
-1 -5.0 5
Environmental Factor Value (Efactor) 14.5
Environmental Factor (EF) = 1.4 + (-0.03 * Efactor)
EF = 1.4 + (-0.03 * 14.5) = 0.965
Adjusted Use Case Points (UCP) = UUCP * TCF * ECF
UCP = 71 * 1.115 * 0.965 = 76.394225
According to the algorithm is the RIM 28
Person Hours Multiplier (PHM) PHM = 28
Person Hours = UCP * PHM = 76.394225 * 28 = 2139.0383
Therefore concludes that the project is feasible and necessary
total of about 2139 man-hours. In this work, but must work
People who have experience developing similar environments and
have direct contact with new technologies.
Then give the class diagram for the entire Information System
as well as CRC cards obtained.
74
4.4 0omiki modeling
Figure 12: 9iagramma classes in Information System
75
4.4.1 CRC cards
The corresponding CRC Card diagram of classes are:
Front:
Class Name: Person Person ID: 1 Type: Concrete, Domain
Description: Describes the general people
system
Associated Use Cases:
Responsibilities
- Access to the system
Collaborators
Back:
Attributes:
Name (string)
Last Name (string)
Identity (char)
Relationships:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 160
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Officials
Foundation
ID: 2 Type: Concrete, Domain
Description: Describes the general staff of
Foundation
Associated Use Cases:
Responsibilities
Collaborators
Back:
Attributes:
Department (string)
Division staff (char)
Relationships:
Generalization (a-kind-of): Face - Room Service
Aggregation (has-parts):
Other Associations: Search
76
Front:
Class Name: Student ID: 3 Type: Concrete, Domain
Description: The person giving the
Services Foundation
Associated Use Cases: 4
Responsibilities
- Submit application
- Monitor application
- Take affidavits, certificates, business card
- Takes items (books, articles)
- Tucked sources (logical, physical)
- Buy products
- Vote in elections Foundation
Collaborators
Documents
Quest
Documents
Resources
Products Documents - Proof
Voting records;
Back:
Attributes:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 161
Registration (char)
Examinospoudon (integer)
Possession Card (boolean)
Relationships:
Generalization (a-kind-of): Face - Night
Aggregation (has-parts):
Other Associations: Search, Documents, Resources, Products
Front:
Class Name: 9iefthyntis ID: 4 Type: Concrete, Domain
Description: The person who supervises officers
Foundation
Associated Use Cases: 1
Responsibilities
- Sign writing
- Publishes statistics
- Police Information
Collaborators
- Employee, Documents
- Employee
- Control
Back:
Attributes:
Relationships:
Generalization (a-kind-of): Employee Foundation
Aggregation (has-parts):
Other Associations: Service and Documentation, Testing
77
Front:
Class Name: Employee
Service
ID: 5 Type: Concrete, Domain
Description: The person responsible for
number of services provided within the institution
Associated Use Cases: 4
Responsibilities
- 9imiourgei regulates accounts
- 9iacheirizetai rights
- 9aneizei presumption
- Make payments
- Prepares certificates
- Registers request
- Prepares report
- Inform students
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 162
Collaborators
- Documents
- Documents, Information
- Update
- Documents
- Documents
Back:
Attributes:
Relationships:
Generalization (a-kind-of): Officials of the institution
Aggregation (has-parts):
Other Associations: Documents, Control, Information, 9iefthyntis
Front:
Class Name: Bank ID: 6 Type: Concrete, Domain
Description: The agency informed
financial transactions card holders
Associated Use Cases: 1
Responsibilities
Inform user accounts
Collaborators
- Information, Documentation
Back:
Attributes:
Department (char)
Information officer (string)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documents, Information
78
Front:
Class Name: Verification ID: 7 Type: Concrete, Domain
Description: Total process serving
same action for other classes
Associated Use Cases: 3
Responsibilities
- Checks if conditions met
- Validity of evidence
- Control card
Collaborators
- Documents
- 9iefthyntis
- Employee service
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 163
Documents
Back:
Attributes:
Type of Control (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documentation, Employee Service, 9iefthyntis
Front:
Class Name: Media ID: 8 Type: Concrete, Domain
Description: set of procedures that serve
other classes with a focus on updating their
Associated Use Cases: 3
Responsibilities
Identifies the type of user
Send information
Collaborators
- Employee service
Bank
- Bank Employee
Service, Resources
Back:
Attributes:
Species Information (char)
Registration number (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Resources, Employee Service, Bank
79
Front:
Class Name: Find ID: 9 Type: Concrete, Domain
Description: Total processes that
joint actions in other classes
Associated Use Cases: 6
Responsibilities
Displays the search result
Collaborators
- Documents, Sources
Back:
Attributes:
Search Type (char)
Relationships:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 164
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documents, Resources, Student, Employee
Foundation
Front:
Class Name: Source ID: 10 Type: Concrete, Domain
Description: Provides access to people with physical
or logical areas of the institution
Associated Use Cases: 2
Responsibilities
- It records the movements
Collaborators
- Information, Student
Back:
Attributes:
Type (char)
9ikaiomata (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: News, Student, search
80
Front:
Class Name: Documents ID: 11 Type: Concrete, Domain
Description: Total items obtained as
derivatives of other actions of other classes
Associated Use Cases: 5
Responsibilities
- Audit rights
Collaborators
Control
Back:
Attributes:
Type (char)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Student, Search, 9iefthyntis, Bank, Check,
Products
Front:
Class Name: Reference ID: 12 Type: Concrete, Domain
Description: A document required to start
The account creation process
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 165
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Registration number (integer)
Status request (String)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts): 9ikaiologitika
Other Associations:
81
Front:
Class Name: 9ikaiologitika ID: 13 Type: Concrete, Domain
Description: Documents required for a
integrated application
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Type (char)
Number (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Certificate _______ID: 14 Type: Concrete, Domain
Description: A document that shows properties
are people within the institution
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Registration number (integer)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
82
Front:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 166
Class Name: Receipt ID: 14 Type: Concrete, Domain
Description: Type of financial document
showing payments made
Associated Use Cases:
Responsibilities
Collaborators
Back:
Attributes:
Number (integer)
Service (String)
Sum (float)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts): Fine
Other Associations:
Front:
Class Name: Fine ID: 15 Type: Concrete, Domain
Description: Type of evidence given when it
to pay the student specific services
Associated Use Cases: 2
Responsibilities
Collaborators
Back:
Attributes:
Date (date)
Reason (text)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
83
Front:
Class Name: Identity -
card
ID: 16 Type: Concrete, Domain
Description: Used by people within
foundation for actions.
Associated Use Cases: 8
Responsibilities
Collaborators
Back:
Attributes:
9ikaiomata use (integer)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 167
Sum (float)
Code (char)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Vote ID: 17 Type: Concrete, Domain
Description: Used for the election
Representatives
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Date (date)
Array (String)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
84
Front:
Class Name: Product ID: 18 Type: Concrete, Domain
Description: Goods may be purchased by student
Associated Use Cases: 2
Responsibilities
- Sale
Collaborators
- Documents - Proof
Back:
Attributes:
Type (String)
Price (float)
Product code (char)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Student, Documents
Front:
Class Name: Service ID: 19 Type: Concrete, Domain
Description: Description of general services
exist within the institution.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 168
Associated Use Cases: 3
Responsibilities
Collaborators
Back:
Attributes:
Name (String)
Number of employees (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts): Library, Computer, 9ioikisi
Other Associations:
85
Front:
Class Name: Library ID: 20 Type: Concrete, Domain
Description: Description of the Office of the Library
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
List (String)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: 9ioikisi ID: 21 Type: Concrete, Domain
Description: Description of the service 9ioikisis
Associated Use Cases: 1
Responsibilities
- Organisation of procedures
Collaborators
Back:
Attributes:
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Computer ID: 22 Type: Concrete, Domain
Description: Description of ypiresiatis
Computerization
Associated Use Cases: 1
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 169
Responsibilities
- 9iorthosi errors
- Error Logging
Collaborators
Back:
Attributes:
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
86
Then move on to diagrams of conduct to study the
use cases outlined above. The dynamic representation of
Chart helps us to reconstruct the different streams of messages
out over time.
Thus we have the following behavior diagrams for use cases.
4.5 Behavior Modeling
In diagrams visualized the flow behavior of use cases
and acquire a better view of what happens during
the system implemented. The sequence diagrams that
will be followed for all use cases analyzed in
previous sections. The diagrams describe the operational
procedures of the institution in terms of purpose. Until now, these
processes
have perigraftei level classes.
87
1st Case of use: Authentication.
Fig 13. Authentication
88
2nd Case of use: Purchase of goods and services.
Fig 14. Buying goods
89
3rd Case of use: Election of delegates.
Fig 15. Voting
90
4th Case of use: Monitoring tab.
Fig 16. Monitoring tab.
91
5th Case of use: 9iacheirisi student tab.
Fig 17. 9iacheirisi tab.
92
6th Case of use: Provide evidence.
Figure 18: evidence
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 170
93
7th Case of use: 9iacheirisi financial demands.
Fig 19. Financial claims
94
8th Case of use: 9iacheirisi accounts.
Fig 20. 9iacheirisi accounts
95
9th Case of use: Set user rights.
Fig 21. Setting Rights
96
10th Case of use: Access to sources.
Fig 22. Access to sources
97
We should at this point to mention that these diagrams
behavior because the user confirmation scenario repeated in almost
all the diagrams do not plan again after the first graph where
fully described. Was to simplify the diagrams and more
effective understanding of other shapes.
Then follow these diagrams and charts
statements. Charts situations are dynamic models show
different situations that an object can have during
interacting with life events, through its own activities (Dennis
A et al 2005).
The contents of a matrix of situations can only be one class,
but may include a set of classes or the whole
system.
So we have:
Fig 23. 9iagramma returns "the student buys products'
98
Fig 24. 9iagramma katastaseongia "the student has access to sources"
Eik.25. 9iagramma statements for the "student vote"
Eik.26. 9iagramma returns "the official handles requests"
99
Fig 27. 9iagramma returns "state application for a student
identity '
100
5th Chapter
5. Design
5.1. 0iagramma Packages and Strategy Development
Turning to the design phase, on an 9iagramma Packages and
Strategic Development implemented chart packages. This chart
Then, in the 9iefthynti Library. Also then
mentioned the most appropriate development strategy based on all
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 171
information
we had so far in our disposal. Graph special packages
interest was the grouping of different classes of procedures
levels (layers) and the separation of the computer system in three main
layers, HCI, PDL, DML and relations between them. Simplification of
Class diagram based on the logical grouping increased the ratio
understanding.
10. public static int hex2decimal (String s): This method converts a
hexadecimal number to decimal.
11. public static String convertToUnicodeString (String hexString):
Method
This converts a hex string to a unicode string.
File ProxyCard.java can be considered the heart of the application and all
actions to communicate with the card are made in this file. This file
has some similarities with the way it works is on - card
application, defined here as the CLA, INS and fixed to be structured
properly
APDU to be sent to the card. The command is always structured
according to the instructions
the Java Smart Card API.
Includes the following methods:
1. public void connect_card (): In this method made the connection with
the
card reader and selected the first in the list of available
devices. After the choice of opening a secure communication channel
card
2. public void selectAID (byte [] appletAID): In this method becomes the
selection of the AID of the applet on - card application. Here the
command is structured
always in accordance with the instructions provided by the manufacturer
card (Jurgensen T, Guthery S 2002).
3. public static byte [] toBinArray (String hexStr): Converts a hex String to
an array of byte.
4. public boolean verify_pin (char [] PIN): This method sends the
appropriate instruction to the card to "understand" that the card
132
is to perform the method verify, as we saw above in section
the on - card application. When orders are actually constructed a
byte table in which they enter as an argument to the object
CommandAPDU method to transmit. Related How can anyone
found in the JavaDoc version of OpenJDK 7. If the password is wrong
then
Card returns the error message SW_VERIFICATION_FAILED =
0x6300, which in the java API returns as an integer with
Appropriate tests may arise where the error messages
user.
5. public String getBalance (): 9omeitai command question about
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 191
card balance.
6. public String getName (): Similarly, the mandate for the username.
7. public String getID (): Similarly, the mandate for the number of the
user.
8. public String getLastName (): Ditto for the name of the user.
9. public void creditcard (String s): It is the method that meets the service
deposit money onto the card. This command builds the order entolietsi
answer method of credit on - card application. The amount
added first converted to type byte and then incorporated into
command.
10. public void debitcard (String s): It is the method that meets the
service
market products, structured command. The amount will be deducted from
SMART CARDS
Table of Contents
1
INTRODUCTION ................................................ .......................................
........... ........................... 4
1.1 General ............................................... 5
2 Clever
Cards ............................................... .................................................. .......
...... 8
2.1 GENERAL, DEFINITIONS ..............................................
.................................................. ................ 8
2.2 Background .............................................. Smart
Cards .................................................. .8
2.3 TYPES .............................................. Smart Cards
.................................................. ..... 9
2.4 APPLICATIONS ................................................
.................................................. .................... 10
Wallet 2.4.1 ............................................. ...............................................
10
2.4.2 Use of smart cards in
transport .......................................... ......................... 11
2.4.3 Card durability and customer service (loyalty cards ).........................
11
2.4.4 Control access to
buildings ........................................... ........................................ 12
2.4.5 Access to open or closed
networks ......................................... ........................... 12
2.4.6 Health and
Insurance ............................................ .................................................. ....
. 13
2.4.7 Advanced Electronic signatures on electronic
7
ANNEXES ................................................ ..................................................
............... 65
7.1 STANDARDS AND GUIDELINES FOR Clever
Cards ........................................... ............. 65
7.1.1
General .............................................. .................................................. .....
.................. 65
7.1.2 International Standards Organisation -
ISO .......................................... ........................... 65
7.1.3 Standards contactless cards - Contactless card
standards ................................ 67
7.1.4 Pilot / Check Card - Card
Testing ........................................ .................. 68
7.1.5 Protocols Messaging - Message Exchange Protocols ..................
69
7.1.6 Standards for Security Issues - Security Related
Standards .................... 69
7.1.7 European Organisation for Standardisation -
CEN .......................................... .................. 69
7.2 TERMINOLOGY INDEX Smart
Cards ............................................. ........................ 71
7.3 QUESTIONNAIRES FOR CONSULTATION Clever
Cards ......................................... 82
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 237
7.3.1 Questionnaire for consultation on smart cards with the "Public
Administration"
82
7.3.2 Questionnaire Consultation on Smart Cards to "Market & Research"
88
7.3.3 Questionnaire Consultation on Smart Cards with "Banks -
Telecommunications' ................................................ .................................
................. ................... 94
7.4 ORGANIZATIONS respondents
have ............................................ ................ 99
7.4.1 Questionnaire for consultation on smart cards with the "Market &
Research 99
7.4.2 Questionnaire Consultation on Smart Cards with "Banks -
Telecommunications' ................................................ .................................
................. ................. 102
7.5 WORKING GROUP meeting
notes ............................................. ................. 103
7.5.1 Proceedings of the 1st Meeting, 05 June
2002 ........................................ ................. 103
7.5.2 Proceedings of the 2nd Meeting, June 19,
2002 ........................................ ................... 103
7.5.3 Proceedings of the 3rd Meeting, July 9,
2002 ........................................ ..................... 104
7.5.4 Proceedings of the 4th Synantisis____________, August 27,
2002 ........................................ .............. 105
7.5.5 Proceedings of the 5th Meeting, September 10,
2002 ........................................ ........... 107
7.5.6 Proceedings of the 6th Meeting, October 2,
2002 ........................................ ............... 108
7.5.7 Proceedings of the 7th Meeting, October 9,
2002 ........................................ ............... 109
Deliverable Task C3 'Smart
Cards' 4 by 110 final
1 Introduction
1.1 General
Internationally, over the last decade, smart card technology used to
approach and solve problems of access, management and information
handling in almost all sectors of the economy and society. This is done
extensively in research and pilot projects on a smaller scale sectoral
projects in local or national scale, eg health card, identification, electronic
purse or card access to transport etc. It is now generally accepted that
smart card technology offers many operational advantages in
implementing modern electronic services. Their role is primarily focused
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 238
on developing and safeguarding the environment of trust in transactions
between citizens and service providers across all sectors of modern
economy. The main issues which impede the promotion and widespread
use of smart cards are the following: 1. lack of coordinated approach to
the utility and functionality of Smart Cards by all parties involved in both
decision making and the implementation of applications.
2. lack of widely accepted standards at all levels of smart card technology
(cards, card readers, software, packaging information, etc.) to ensure
interoperability (interoperability) between systems at sectoral,
intersectoral and transnational levels.
For the European Union, Smart Cards are one of the roteraiotites the
eEurope Action Plan in the development of secure and fast network and
support of e-business. The European Commission is promoting the issue
by organizing the summit on smart cards and identification of necessary
actions (trail-blazers) to achieve the objectives of eEurope. The trail-
blazers who initially
created are: Public Identity, Identification & Authedication, Certification &
Protection Profile, Generalized Card Reader, e-Payments, Contactless
Smart Cards, Multi-application Smart Cards. Then created additional four
other trail-blazers, relating to: User Interface-Consumer Issues, Public
Transport, Healthcare and e-Government. For the study themes of the
trail-blazer set up relevant working groups
consisting of representatives of social groups and service providers,
industry and academia and research space
The working groups dealing with issues of Public Identity, Identification &
Authedication, Certification & Protection Profile and Multi-application
Smart Cards are significantly active and produced the first results for
public consultation. The Greek participation in these working groups is
very limited.
Additionally, under the CSF III discussed or announced plans for various
smart card applications, such as health cards, welfare, education,
employment - insurance cards, stock cards, tax authorities, toll cards, etc.
The situation in our country and the mobility established at European and
international development issues smart card applications suggest the
setting up interdisciplinary working group on assessment of the Greek
situation, taking into account issues that either have arisen in other
countries, or have not been addressed yet. Deliverable Task C3 'Smart
Card 5 of 110 final
1.2 Objectives of the Working Group
Objectives of the Working Group is to assess the current situation in our
country, identifying the key problems of development smart card
applications and propose actions to address the basis of international
experience. It will focus its work in surveying and studying the various
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 239
approaches to smart card applications
studied in our country, to identify the critical factors of development
applications composing a framework of strategic and technological
choices that will contribute to the necessary inter-sectoral collaboration
and synergy. Specifically, this working group aims to:
• to capture the current situation in Greece with emphasis on mapping of
places - the views of all stakeholders in the design and implementation of
new services with the use of smart cards including collegiate society. The
fix would be to some extent complementary and comparative research
conducted on the requirements of the users on the trail-blazer - User
Interface & Consumer Issues.
• identify key barriers application development in our country and
proposed actions to address.
• studying the existing legal framework in our country
• identify actions to inform citizens and stakeholders in
designing and implementing new services using smart cards.
1.3 Composition of the Working Group
The composition of the Working Group was formed by people from the
following
locations:
Public Sector: 3 people
Academic - Research area: 10 people
Market: 23 people (IT companies, consultants and system integrators)
Banks: 2 people
Telecommunications: 3 people
Industry: 4 people
Other: 3 people
Further, the Working Group consists of the following:
ENTITY NAME COMPANY-E-MAIL
1. Georgiadis University of Athens
Panagiotis georgiad@di.uoa.gr
2. Mellon Technologies Karapetsas Stephen stefanos.karapetsis @
mellon.
Deliverable Task C3 'Smart
Card 6 of 110 final
com.gr
3. NTUA Karounos Royal karounou@netmode.ntua.gr
4. Lawyer Karntasiadou Life zoikard@spark.net.gr
5. Accenture Tsiambaos
Constantina dinats@yahoo.com
6. PLEFSIS Inc. Systems
Information
Charalampakis
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 240
John jchar@plefsis.com
7. Systema Informatics
SA Tsoronis Theodore Thodoris.Tsoronis @ systema
. Gr
8. OTE SA Chochliouros John ic152369@ote.gr
9. Head
Business & Product
Applied Technology
COSMOTE
Kapsoulakis John jkapsoulak@cosmote.gr
10. Alpha Bank Sotiris Kyriakos skyriakos@alpha.gr
11. Cytech Ltd Antoniadis Evangelos vanton@cytech.gr
12. INFORM P. WOLF cheese pieces Andreas a.tirakis @ lykos.gr
13.
INFORM P. WOLF Pantis Peter p.pantis @ lykos.gr
14. Intersys SA cock Dimitris D. Petinos @ intersys.gr
15. INTRACOM Bobolou George gbob@intracom.gr
16. Truth AE Mizara Claus vmizaras@truth.com.gr
17. Athens Bar Association Sioulas Chris CSioulis@interbank.gr
18. ASYK SA Karanasios
Constantine k.karanassios @ asyk.ase.gr
19. PAPASOTIRIOU SA Vavourakis John vavourakis@papasotiriou.gr
20. World Organization of
Greek Kyvernonafton
(P.O.T.E.K)
Chasapidis John yianni@4u.net
21. University of Athens Dimitris Gouskos d.gouscos @ e-gov.gr
22. University of Athens Maria Ioannou marias@mm.di.uoa.gr
23. University of Athens bumps
Panagiotis pkarou@e-gov.gr
24. University of Patras Vogiatzis Artemios bogart@ee.upatras.gr
Deliverable Task C3 'Smart
Card 7 of 110 final
25. University of Patras Dimitris Serpanos serpanos@ee.upatras.gr
26. Nikos Saridakis YPESDA ypesdda@gspa.gr
27. IS SA Drinos John ydrinis@ktpae.gr
28. APOLLO A.E. Kakoulidis George kakoulidis@apollo.gr
29. ENCODE SA Zoulovits Mina minazoulovits@hotmail.com
30. SIDCO S.A. Ghulam Dastgir Yama yamart@hellasnet.gr
31. NTUA George Rigopoulos grigop@epu.ntua.gr
32. INTRACOM SA cber@intracom.gr Chris Burson
33. Ideal Group Ioannis Giannoulis y.yiannoulis @ ideal.gr
34. OTE Vassilis Rigopoulos vrigopoul@ote.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 241
35. BSE Petalas Claus vpetalas@ath.forthnet.gr
36. Siemens Moustopoulos
Lycurgus
Lykourgos.Moustopoulos @ s
iemens.gr
37. Siemens Bogris Nicholas Nikolaos.Bogris @ siemens.g
r
38. GROUP D
Aggelopoulou
Psiropoulos
Panagiotis kossivas@angelopoulos.gr
39. Microsoft Hellas Draganidis Fotis fdragan@otenet.gr
40. INTRACOM Velidou Freedom ebel@intranet.gr
41. Mitrakas Andreas andreas.mitrakas @ globalsig
n.net
42. Microsoft Hellas Flouris Myron myron@microsoft.com
43. NTUA Royal Gogos vgogou@biomed.ntua.gr
44. IBS George Paschalidis ibs@kav.forthnet.gr
45. Prefecture
Pella China George kinasgeorg@pel.forthnet.gr
46. Aegean University Lambrinoudakis
Costas Clam@aegean.gr
47. Combank Kotsikopoulou
Basilica
kotsikopoulou.v @ combank.
gr
48. ARXIS ELECTRONICS Chtouris John info@arxis.gr
Deliverable Task C3 'Smart
Card 8 of 110 final
2 Smart Cards
2.1 General Definitions
Many of us already use one or more smart cards in our daily lives. For
example, smart card is a SIM card used in mobile system GSM. Smart
cards are essentially tiny computers, the size and form a credit card on
which is built an integrated circuit (chip), the front left side. The integrated
circuit containing the contact entry and exit, and can contain only memory
or microprocessor. The chip can provide a secure multi-level structure
and to enable hierarchical access, making it difficult to access the data
and the manipulation thereof to compute cryptographic functions
(cryptographic functions) and perceived attempts to access directly,
which is valid for as example, blocking the SIM card in case of import
wrong PIN more than three-times-typically the main feature of smart
cards is the ability to store and process information in a secure manner.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 242
The advantages of smart cards is to protect the data they contain,
portability and ease of use. In order to complete it can be used in
terminals or readers who do not have the size required for the import of
the entire card, allowing the production of cards with notches around the
full order was removed and placed in the terminal. Classic example cards
SIM.
2.2 History of smart cards
The ancestors of smart cards are credit cards issued by Diners Club
agency in the 1950s. These cards were the size of a business card
(business card) and had printed the name of the holder of the front. The
show was enough for the service provider (eg hotel or restaurant) to
provide credit to the holder. Thus facilitated business travel. Later the
name was printed in relief (for example, now on the cards to withdraw
money from ATMs of banks) to facilitate the recording of the name of the
holder. Some years later, the cards became a magnetic stripe (magnetic
stripe), which allow the mechanical recording of the data holder. In this
way the raw data could be made electronically, speeding
Deliverable Task C3 "Smart Cards" 9 out of 110 final
transactions. But still the problem of fraud, and anyone having the right
equipment could create fake cards.
We could say that smart cards are the result of the simultaneous
improvement of plastic cards and microchip. In 1969 occurred in France,
journalist Roland Moreno, a concept for an integrated circuit card. Thus
was born the smart card. Smart cards u954 developed independently in
Germany (1967)
Japan (1970) and the U.S. (1972). Smart cards flourished in the 1980s.
During 1982-84 the Cartes Bancaire (Banking Card Association of
France) ran the first pilot project for smart cards. The Union has worked
with companies Bull, Philips and Schlumberger doing tests in the French
cities of Blois, Caen, and Lyon. The
tests were a huge success and only minor problems. One improvement
that resulted from the pilot project was to integrate the magnetic strip in
order to maintain compatibility with the then existing systems.
After a very successful test, the French banks have introduced the use of
smart cards for banking operations to the public. The use is the first
example of a public function smart cards for banking operations. In
parallel, a large advertising campaign when it introduced the term "smart
card» (smart
card)
• Pay fare on Public Transportation
• Payment of tolls
• Rights of parking
• Booking air ticket reservations
hotels and baggage transport
• Documentation holder, electronic passport.
Of these, the most important application, consistent with the analysis
presented in this
document is public transport, although in some years can be considered
equally important and the implementation of toll collection. In addition, the
application for parking rights may be combined effectively with the toll
and / or public transport. Such a combination may authorize payments for
parking to be credited even if someone parked his car and continued his
journey by public transport. Yet air tickets booking service
can be made by a separate card or included in a general smart card for
citizens.
2.4.3 Card durability and customer service (loyalty cards)
Retailers have the option to use smart cards to how effectively serve their
customers and keep them loyal. For example, they know how to reward
their customers with some of the points in each market and to reward
them by giving them gifts to the redemption of these points when they
reach a certain level of points. The fact that the points are stored in the
chip offers two main advantages:
a. There is no need to network between offices to inform a
central database on the points of the customer.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 246
1 URL: http://www.mondex.com
2 URL: http://www.visa.com/pd/ewallet/main.html
Source: ITS International,
Deliverable Task C3 'Smart Cards' 12 by 110 final
b. The client directly reward the achievement of maximum points, giving
him extra incentive markets.
By doing this they keep their customers loyal while getting information
about their consumption habits, valuable information for both marketing
strategy and sales and to better serve customers.
2.4.4 Control access to buildings
A smart card can store the identification of an individual to control access
to buildings and non-high-security workplace and in universities, schools,
libraries and clubs. For higher security needs and access to specific
services or information, a smart card can be a device for storing
information such as images or other biometric features (eg fingerprints,
iris of the eye) of the user. The same card can then keep a record of the
identification of the individual
computer systems of the body. An example is the card Mcard, which
used than 110,000 members of the University of Michigan3 and that
there
information on the identity of each student and can be used
financial transactions, purchase food, books, photocopying and other
uses.
2.4.5 Access to open or closed networks
Smart cards can store digital certificates (digital certificates) and
other information to control user access rights to be
use computing and network systems safely.
The security here refers to both the authentication of the user, and in
creation of virtual private network (VPN) to access corporate systems
from
public networks, such as the trade Internet.Trapezikes
Large banks such as Visa and American Express view
Smart cards are already in the next step in banking, and offer
significant advantages over magnetic stripe cards.
For this reason the company has established EMVco (EUROPAY-
MASTECARD-VISA co) is
which process the EMV specifications which will be followed by all
parties (banks, card makers and equipment developers
software terminals and back office systems, etc.) to be
achieve EMV transactions. The newest version EMV specifications are
EMV2000.
The EMV cards will replace credit and debit cards, magnetic circuit,
while he could support and extra applications such as loyalty, electronic
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 247
purse
etc.
3 URL: http://www.mcard.umich.edu/
Deliverable Task C3 'Smart
Card 13 of 110 final
The EMV cards can also be used in banking transactions on
distance (internet banking, mobile banking), using electronic certificates
for
authentication of the user.
2.4.6 Health and Insurance
The smart card can be used for secure storage of identification,
Insurance and medical data of an individual or to store the location
data are medical records (pointer cards). In this way the information is
timely and accurate available to patients and physicians supporting and
facilitating
considerable freedom of movement for patients who can travel within and
abroad, bringing with them the insurance and their medical file.
Moreover, the smart cards in health care are used in applications
identification of the patient and health professionals (doctors, nurses,
etc.), electronic
signatures for integrity and authenticity of medical data
data is encrypted to ensure confidentiality (health professional
cards), secure access to health networks, etc.
2.4.7 Advanced electronic signatures in electronic documents
Smart cards, with the potential to create a pair of keys, and secure
storage of private keys and electronic certificates provide an
reliable part of "creation-devices" required by the European
Directive 93 of 1999 "for electronic signatures, and the corresponding
Greek Testament
150/2001- so their keepers, confirming their identity with "recognized
certificates (under PD) from an appropriate "Service Provider
Certification, be able to sign electronic documents with procedural value
equal to
that of handwritten signatures on paper documents.
By applying these involved three (3) distinct entities:
1. Certification Service Provider (¨ Tuesday Trusted Entity)
2. End entity (recipient's e-signature and certificate,
else "based party"), usually a service provider to secure network
customers (eg banks)
3. End user signatures (eg customer Bank)
2.4.8 GSM cards phonecards _____________kai
Smart cards have found application in many areas of everyday life. Two
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 248
of the
most successful applications are in the telecom sector and even the
simplest
them (prepaid phone card) and more complex (GSM cards) form.
Currently marketed worldwide billions and hundreds of phone cards
million SIM cards after the GSM phones is estimated at 500,000,000.
Deliverable Task C3 'Smart
Card 14 of 110 final
2.4.9 Other applications
Other applications of smart cards is their use in set-top boxes, Internet
access,
product tracking, driver's license (ideal for storage of penalty points and
immediate removal
diploma), etc.
Deliverable Task C3 'Smart
Cards' 15 by 110 final
Known and potential smart card applications by sector and type of card
Stored Value Cards Data / Information Files Identification /
Access / Security
Membership
cards
Bank
Sector
Wallet
Banking
Online Payments
Insurance application
Access to
This account
Security
using
internet from home
Credit
Cards
Debit
Cards
Telecom Prepaid phone card number Storage Cards SIM / GSM
Public Sector Account Manager
(Pensions, allowances, etc.)
Advanced electronic
signatures in electronic
documents
Passport
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 249
Identity
Driving
Transport Electronic Tickets
(Temporary validity contracts -
daily, monthly or annual
tickets)
Automatic toll payment
payment modes
electronic wallet
(Bus, taxi, train, etc.)
boarding pass - pass
free boarding
card right
vehicle access
controlled area
access
Card
compliance post
payment
contract
Health Payments Security Storage / recovery Health cards
Deliverable Task C3 'Smart
Cards' 16 by 110 final
Medical Payments
medical history
Storage Information
Donor
Other Hotel Reservations
Payroll Payments
staff
payment via TV
money transfers from person
a person
Program sustainability
and service (eg
prizes)
micro (eg sites
parking, phone calls,
etc.)
Information / background
staff
Academic
Information / Background
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 250
Storage Personal
Information
rental Archives
cars
Staff profile (eg
preferences for
service project
customers)
Express check in / out
Access Club House
Airport
(Lounge) / room
Departure
room in Keys
hotel
Internet Access
Access to buildings
Access Networks
Keys Rental
Car
Program
Frequent
traveler
Card
diatirisimot
itas &
Service
reviews
(Loyalty cards)
Deliverable Task C3 'Smart
Cards' 17 by 110 final
2.5 Safety and Benefits
A typical tolerance to malicious manipulation (tamper-resistant)
can detect and react to malicious manipulation (tamper-proof)
Ensomatonoun the rapid developments in semiconductor technology,
enabling continuous improvement of the characteristic
The majority are reprogrammable
feature calculation capabilities and operations (computing &
calculating)
feature logic and memory circuits
process data and store information
They can compare and manage complex information
usually used for high security applications (high security)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 251
allow off-line verification of data, as opposed to a card with magnetic
stripe
They option of what information the card can be accessed by different
applications
enable high security, and this is due to the complex cryptographic
techniques used to
decode the "movement" of information between smart cards and other
devices
offer high storage capacity information
m__________e is compatible portable electronics Προσφέρουν
Reducing financial crime
efficiency and effectiveness of sales
Business
Customer
Deliverable Task C3 'Smart
Cards' 18 by 110 final
3 Presentation of Existing Conditions
3.1 The Situation in Europe
For the European Union, Smart Cards are one of the
priorities of the eEurope Action Plan under development
safe and fast networks and strengthening of electronic services and
e-business.
A recent survey carried out by the company EDS Days
and with the cooperation of the trailblazer 10 eEurope Smart Card
Charter aimed
to capture and study the applications of smart cards in electronic
Governance cards - G2G (government-to-government), G2B
(government-tobusiness),
G2C (government-to-citizens) and e-Procurement in the public sector
showed that applications of smart cards implemented in Europe on
the following sections:
Electronic signature
Identification staff (civil servants, health professionals,
etc.)
Identification of companies and public administration
agencies
Electronic identity citizens
Electronic identity members
support services to relatively small areas (public transport,
recreation, etc.)
Specifically, the survey identified the following applications for each
member country
European Union.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 252
Country Project Name Description / Comments
Austria citizen card
(Bürgerkarte)
Common framework social security and other citizen
identity cards
belpic BELgian Personal Identity Card for citizens and civil
servants
Belgium
sis Social security card
fineid Finnish identity cards
satakunka Macro-pilot covering health and social security information.
Finland
North karelian
hospital district
Management and exchange of health data (FINEID card
used for authentication)
titre fondateur Common basis for electronic identity cards, potentially
covering: personal identity card, driver licence, other
specific cards
teleprocedures Tax teleprocedures
France
sesam vitale Identification of insured persons (social security)
Deliverable Task C3 'Smart
Card 19 of 110 final
Country Project Name Description / Comments
gip cps Health Professional Card s
adep A group of small and mid-sized towns to test usage of eprocedures
with the citizen and with the administrations
media @ komm Initiative for the development of e-procedures in
townships
and urban districts. The cities of Bremen, Nürnberg and
Esslingen are pilots.
Land of Baden-
Württenberg
Multifunctional cards to citizen and public e-procurement
Germany
beschaffungsamt e-procurement for administrations
Ireland public services
broker
Secure access to public services.
ieic Italian Electronic Identity Card
aes Advanced Electronic Signature based on IEIC
Italy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 253
msc Multi Services organisation Card based on IEIC
Netherlands pki overheid Government PKI for civil servants
- Digital Signature
- Health project (under development)
Norway
- National betting system (under development)
Spain national PKI Usage of smart cards in public sector's PKI based
applications: identification / authentication + e-sign for civil
servants.
Sweden ID CARD Multipurpose identity card
Internal use within the Administration: National Taxboard,
Social Insurance Board
e-tendering System to allow UK departments to exchange tendering
information (pilot stage)
dfee Connections card: a scheme for 16-19 year olds in
education, covering attendance monitoring, access to
facilities, credits, etc.
U.K.
SMARTCITIES Local services with the City of Southampton as first pilot
Source: study EDS - TA 10
This study suggests that the underlying problems - problems that have
arisen
the design and implementation of these projects may u948
summarized as follows:
lack of equipment (card reader) from individuals and small companies
an obstacle in implementing applications G2C
the normal composition of jobs (workstations) is not sufficient
and the number of users believe that the additional equipment required is
hundreds
• Company petrailoeidon distribution (fleet card) - Tens of thousands
• Secure cargo weighing AGET - Several hundred
3.3 Institutional Framework
3.3.1 Institutional framework 'directly' to 'smart cards'
Smart cards, given the recent emergence as a 'medium of exchange, but
and the emerging diversity in their use and applications
, does not have (at least yet), 'unchanged object' of a
regulation, both national and European level.
Feature is that the phrase 'Smart Cards' to our national
law occurs only once (according to data from the 'Bank Legal
Information, the Athens Bar Association, www.dsanet.gr) and that the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 259
Ministry
Decisions. 3227/31-1-2002 (FEK 23/13-02-02) of the Ministry of Foreign
Affairs, on
Publication of Decision 1382/2001 of the UN Security Council "as
product forms (conditional) to the embargo (sanctions) against Iraq!
Of course, smart cards (smart cards) referred to in many
'Preparatory texts' (ie texts not immediately mandatory)
European Union, such as announcements, resolutions,
recommendations,
opinions, etc., particularly in the context of the approved action plans
eEurope2002 (and, more recently, eEurope2005) which reflected the
intention
promotion and adoption of the medium as a key factor for
achieve the much sought safety in the "Information Society".
Also, identification, technical specifications, and creating relevant
'Technical standards' by standardization bodies (eg ETSI, CEN, ISO,
ITU,
etc.) or by various private consortiums (eg EMVCo)-specific
uses or otherwise, are not alone, institutional framework, the extent
however, there are no relevant laws, regulations or administrative
provisions that refer or refer them! (Since the 'standard'
even been published by 'approved bodies', not-from
themselves, required!)
3.3.2 Institutional framework related (indirectly) with "smart cards"
On the other hand, at least at European level (to the extent
in line with what our national legislation and national) have
establish a set of provisions (mainly European Parliament Directives
and the Council) on issues of specific applications
of 'smart cards'.
Thus, depending on the type of application that uses a smart card
can be made and features the following instruments:
Deliverable Task C3 'Smart
Cards' 26 by 110 final
Smart card as a 'device for conditional access' (in
'Protected services')
- Directive 98/84/EC "on the legal protection of services based
or consisting of, conditional access "
With this directive, measures against illicit devices
providing unauthorized access to protected services, and
will be protected (art. 3 § 2) 'the free movement of apparatus for
conditional access'.
The term "access device terms, given (No. 2, approx c) the following
definition:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 260
"Any equipment or software designed or adapted to
enabling access to a service in an intelligible form "and apparently
finds application in many cases the smart card is used as
(Part) of such equipment eg for decoding satellite television
labels for access to the network GSM (mobile phone), even
access to specific telematics services, such as system
'HERMES' the Athens Stock Exchange using smart cards
for identification of users!
Smart Card as (part of) the 'safe-creation device
(E) signature-
- Directive 99/93/EC "on a Community framework for electronic
signatures
With this directive (which has been incorporated into our national law by
presidential decree
150/2001), although not mentioned by name in 'smart cards', they offer
the basic
standards to be met by operators (not only) of private keys
("Signature-creation data ') end-users to ensure
the required level of safety to create (and if there
other conditions, such as the issue 'qualified certificates')
'Qualified electronic signature' (n 5 § 1 of the Directive, or 3 § 1 of the
Greek PD), which enjoys absolute equivalence to the corresponding
hand
signature.
Although as 'bodies of signature creation data' can be
use other means (eg USB tokens), the use of 'smart card'
(Which will keep the 'technical' and 'Standards' issued by the
European standardization organizations and specialize in custom-
relative 'epitropis'-the provisions of that Directive) as a key safe
means for storing private keys and an 'accredited
signatures', is given! (Due to those mentioned above for
approved action plan 'eEurope2005').
Smart Card as' electronic purse 'or, failing that, the' operator
credits'
Although specific applications of smart cards are already used in
pilot programs (eg BalcanCard) or practical applications (eg
known, calling cards, the prepaid units), but not yet
Deliverable Task C3 'Smart
Cards' 27 by 110 final
relevant legal framework and related (evidentiary) contracts are governed
entirely
the principle of freedom of contract "where users and providers
related services according to their own data and evidence
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 261
operation of the equipment they use!
Under the directive expected "for the distance marketing
consumer financial services "(see No. 11 of the Preamble
Directive, the e-commerce) are likely to settle on
issues and they are put some 'safety standards' in 'in' with
used for them.
However, it is assumed that the extent appropriate, apply for the 'smart
Cards any provisions governing the use and operation of analogue
instruments
payment '(eg' Decision of the Council on 28.5.2001
combating fraud and counterfeiting of means of payment
Non-cash ', OJ L 149, 2.6.2001, p. 1)
3.3.3 Other provisions indirectly related to "smart cards"
Other important provisions-related, but mainly how
development of applications using 'smart cards' and not directly
they themselves are numerous and apply as appropriate. For example:
Directives 95/46/EC and 97/66/EC on data protection
nature
Directive 97/7/EC on consumer protection in distance
contracts
00/31/EK Directive on electronic commerce.
Deliverable Task C3 'Smart
Cards' 28 by 110 final
4 Working Group Activities
The Working Group held four public consultation:
1st Public Consultation "Smart Cards in Public Administration
2nd Public Consultation "Smart Cards - Buy & Research
3rd Public Consultation - "Smart Cards & Banking -
Telecommunications'
4th Public Consultation - 'All stakeholders'
Furthermore, requested by the representatives of actors to fill
questionnaire for surveying services, products or applications
Smart cards offer, have implemented pilot or operating
production and future plans and views on technology
Smart Cards.
The sections below present the topics, participants,
conclusions of public consultation and the information obtained
4.2.3 Conclusions
Presentations by representatives of different companies and
research institutions showed that the smart card applications in real
production environment is very low compared with the hitherto
participation of companies and academics - research institutes
schetikaprogrammata research and development of the General
Secretariat for Research and Development and the European Union. As
key issues impeding the development of applications for smart cards in
our country, reported the following:
• High cost of development applications in relation to expected benefits -
high cost of terminal, non-cooperation between various agencies with
similar
applications.
• Delay in adoption of technology by public bodies in particular -
inadequate infrastructure
• Not familiar with the technology
• Lack of adequate standards on the part of the wider public sector
• Lack of mechanism for the transfer of results and know-how
research in production from all the attendees noted the need to create
frameworks for cooperation and search for new alternative business
models from large users - government bodies, semi-public Deliverable
Task C3 "Smart Cards" 38 110 final and the private sector to address
issues of cost
necessary infrastructure, and promote interoperability and infrastructure
applications. It also noted the need for our country a body (not profit) to
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 264
promote European - International standards and guidelines development
of interoperable applications, supporting both the public and the private
sector in planning and implementing smart card applications . A
significant number of attendees agreed to contribute financially to the
creation and operation of that institution.
4.2.4 Results Questionnaires Imprint Existing Situation
The Questionnaire for consultation on smart cards with the "Buy &
Research "were sent to 50 institutions of public and private partnerships
participate in research and development of the European Union, the
three companies manufacture cards in our country, in universities,
technical institutes and research centers participating in the National
Network for Research and Technology as well as links to IT Companies
in Greece and consulting firm to notify its members them.
Questionnaires completed by 24 institutions (see Annex - section
7.4.1). The table below shows the number of bodies
completed the questionnaire, depending on the type of business
activity.
Body Type * Number of responses
AEI Research Laboratory 4
8 Software Company
Consulting Firm 3
System Integrator 10
Company diathesisKarton 4
Unit production Karton3
Other 2
* Many organizations say more than one kind of business and thus
included in the above
one type of business
Deliverable Task C3 'Smart
Cards 39 110 final
The following table shows the entities by type
business activity and whether they provide or plan to develop products -
services smart card, respectively.
Type of Institution Number of agencies providing products -
Services Number of players who design products -
services;
Research Laboratory University 4 4
Software Company 5 8
Company Advisors 2 3
System Integrator 6 10
Company diathesisKarton 4 4
Card Production Unit 2 3
Other 1 2
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 265
* Includes entities that provide products - services and plan to continue
developing the business of
The completed questionnaires were relatively weak. Of the 20 questions
only 6 completed a sufficient number of operators and provide practical
information and specialization are:
Question 1: Describe the services, products or smart card applications
you deliver or offer.
The following responses were specific to each organization:
ADACOM S.A
SIM Cards - SIM APPLICATION TOOLKITS CARDS
EMV SMART CARDS
SMART CARD FOR E-GOVERNMENT APPLICATIONS (Electronic
Identity Card, Health Card, Digital Signature Card
SMART CARDS FOR LOYALTY SHEMES
(Expertnet), ICCS-NTUA
Services and smart card applications have been implemented at pilot
level in
part of the project La Mer. The project aims to provide a
Deliverable Task C3 'Smart
Cards' 40 of 110 final
practice-a mechanism for the development of electronic commerce in
developing countries to present a scalable business
experiment, which aims to secure interconnection of the chambers
developing countries of Southeast Europe, whereas
technical, legal and social issues positions and tactics.
The La Mer is determined by the use of smart cards in the infrastructure
of trusted third entities to provide additional privacy;
confidentiality. Smart cards used for secure authentication
access, storage media and multi-license applications
electronic commerce.
NETMODE-ICCS-NTUA
Develop pilot management u921 Medical History CSP using electronic
cards.
System Electronic Health Card for Diabetics and European
Research Project AIM - DIABCARD.
European Research Programme for Health Telematics - Cardlink II.
Participation in the Concerted Action EUROCARDS Project AIM
GREEK ORGANIZING (HOTech)
Study mask card Health, safety and production data
personalization software components and use the card
data encryption software for the production of phonecards
using SAM
management software to access and record keeping visitors using
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 266
visitor card
Develop an integrated monitoring system of production
connection with the machines, managing data security and
access to premises and personnel work, computerization of
quality assurance, information and statistics reports
Evaluation and costing
ID SYSTEMS CORPORATION
CONSTRUCTION - TRADE ELECTRONIC - Software APPLICATIONS
FOR CARDS WITH
CHIP - MAGNITIKIS Movie - Microprocessor (M-CPU) - Wireless card
(RFID)
ARCADIA TECHNOLOGIES SA
Production:
Chip module cards,
Deliverable Task C3 'Smart
Cards' 41 by 110 final
Prepaid scratch off cards,
Access cards,
Loyalty cards,
Electronic purse cards etc.
LYKOS GROUP
Cards recharge mobile
Banking cards visa classic / gold / electron - mastercard - maestro
Card loyalty: smart club shell
Cards internet connection
All types of membership cards (thermal, embossing, inkjet printed -
encoding
of magnetic stripe - printing of barcodes, pictures etc)
Mellon Technologies
Implementation of the European project CARDLINK II - Medical card -
Medical
File - Municipality of Maroussi
Implement access control system in the harbor DEPOT using
contactless smart card (contactless) - Thessaloniki Port Authority (Port
Authority
Thessaloniki)
Supply prepaid smart card, smart readers
cards and library (DLL) to integrate the card system
in automated fare collection system of toll - TEO (National Fund
Road)
software development, supply terminals and smart cards for
loyalty card stores PRESENTATION - Cooperation with
Ethnocarta
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 267
supply smart card readers and application development
personalization for the implementation of medical records on smart cards
-
Working with DATAMED - EDOEAP
Installing PKI infrastructure with the capacity to store
ensomato__________meni
private keys and certificates on smart cards - ASYK
card purchase of fuel for large oil companies. Development
software, data capture, procurement cards and terminals, personalization
applications.
In Europe and the U.S. and Japan, the responsible government agencies
Password
Padding
A method whereby one or more bit
add a message to acquire
size required
Passivation layer mattress hibernation. A material that
covers the
integrated circuit card to be
resilient to the effects of external environment
PCC (Proof-carrying code) code which includes
proof of compatibility with a given security policy
PC / SC Architecture communication terminals and smart
cards.
The PC / SC was proposed by Microsoft and others
Manufacturers of smart cards and PC
to standardize the interfaces and hardware
Software smart cards to communicate with
PC
PKCS (Public-Key Cryptography Standards) Informal
standards
relating to cryptography public kleidiou.Echoun
published by the company RSA Inc
PKI (Public Key Infrastructure) Public Key Infrastructure.
It shall apply in the case of asymmetric encryption
and refers to the existence of a pair of keys, the
public and private) for security.
Composed by appropriate software and hardware.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 302
Plug-In Smart Card with a small shape and arrangement
used
especially for mobile phones
Processor card SD. Microprocessor card
PVC (Polyvinyl Chloride) polyvinyl chloride. The plastic from
which made the body of the smart card
RAM (Random Access Memory) Random Access Memory
RISC (Reduced Instruction Set Computer) architecture A
Computer Design
Retry Counter Counter efforts. Meter, comprising
Deliverable Task C3 'Smart
Cards' 80 of 110 final
negative work / results and decide whether
any key will continue to be used. If
surveyor reached the maximum number of unsuccessful
u964 efforts since the key is disabled and can not
unusable
ROM (Read Only Memory) read-only memories. A type
memory, where data originally entered can
only be accessed
RSA (Rivest-Shamir-Adleman) encryption algorithm
public key, which takes its name from the three
inventor, the Rivest, Shamir and Adleman
SAM (Security Access Module) module, which is used
as part of a terminal for the safe storage
keys and algorithms
SDA (Static Data Authentication) The method of identifying a