You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/4105632

Multi-purpose student card system using smart card technology

Conference Paper · January 2004


DOI: 10.1109/ITHET.2004.1358229 · Source: IEEE Xplore

CITATIONS READS

14 5,975

2 authors, including:

Samir Omar

15 PUBLICATIONS   43 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Samir Omar on 18 December 2014.

The user has requested enhancement of the downloaded file.


Multi-Purpose Student Card System Using Smart
Card Technology :
S. Ornar, Member, IEEE, H. Djuhari
T h e University of New South Wales
UNSW, Sydney, NSW 2052, Australia
(omar, hdju784)@cse.unsw.edu.au~

Abstract - Smart cards have been around for a while now; it has institutes and abolish the current problem of having multiple
been mainly used to store some kind of monetary value. Currently cards with the same use.
smart cards can he seen in the transportation, telecommunication The next section will give background information on smart
and ietail sectors. This paper aims to design a student card system
~ cards and their advantages over. magnetic strip cards,
for an educational institute using smart card technology that can he Afterwards 3 highlights the motivation of this papperand
usable in the transportation, retail and educational sectors. The the benefits of adopting smart card technology.' ,Section 4
smart card will he used as means for identification, security and
cash. From there we can see the potential and power of smart describes the overall Of the system and Ihe
cards their versatility, practicality and usability. implementation of the student card and the applications. Finally
section S is the conclusion.
1. INTRODUCTION
11. SMART CARDS VS MAGNETIC STRIP CARDS
Currently student cards are implemented with either
magnetic strip or ordinary plastic cards which have very limited A Smart Card is a piece of plastic the size of a credit card
or no space to store data and most have one use,i.e. as an that has a computer chip embedded on or in it. The card can be
identification card. Smart cards have a great advantage over programmed to store data or information as well as to perform
magnetic strip cards in space, security, reliability and specific tasks. Smart cards have a greater use than their relatives
functionality [I].As mentioned above magnetic strip cards have the magnetic strip cards; they are designed to do greater things.
very low storage mainly a few bytes and in general smart cards Smart cards can be programmed to he used in more than one
can store hundred times more information than magnetic. With area e.g. as an identification card and cash card while magnetic
more space to store information, smart cards can have more use strips mostly has one use in addition to that smart cards can .he
and may be more versatile than magnetic cards, in addition to used in multiple industries.
being a student identification card it could also be used to store Although smart card's main use is the same as a magnetic
monetary values such as a cash card for retail and as an access strip cards they have certain advantages over them, these are:
card to login to computers and enter rooms. Smart cards have
the benefits of storing comprehensive records with the More reliable than a magnetic strip card
advantages of accuracy and reliability, in other words it can he Can store hundred'times more information than a magnetic
seen as a mobile d a t a h e . strip card
Currently smart card implementations can he seen around More secure or higher security
the world hut they are not unified i.e. each developer uses Disposable and reusable
different programming standards and data structures, therefore a Multiple functions over wide range of industries
variety of smart cards exist in our society today. An example Compatible with many consumer electronics
can be seen in Singapore where they have variety of smart card . .
for the same purpose i.e. storing monetary value. One called E 2 111. MOTIVATION
Link is used for their public transport system and is also usable
in some food courts while the other cash cards are used for their Take a look in your wallet and what do you find? Notes,
toll system ERP, parking and supermarkets. This is a problem coins, a driver's license, a library card and more cards. Soon all
that exists today and one that needs to be noted or fixed. these documents will he replaced by just two or three smart
Our,aim is to create a student card system'using sman card cards because they can store and protect relatively large amounts
technology that is to be implemented in educational institutes in of data. Smart cards are being used in a number of ways around
other words a card with many uses. This will enhance the the world, replacing a wallet's content bit by hit [2]. By
current student cards that can be seen in many educational adopting smart card technology one card can be used for all.

02'004 IEEE
0-7803-8596-9/04/$20.00 527
Many organizations including educational institutes such as A. Types <$Smart Cards
universities currently use magnetic strip cards as their means for Currently smart cards can be categorized as either contact or
identification and not many applications have been created or contactless. Contact smart cards are programmed using a reader
implemented that uses these particular cards. , There is that connects to the computer chip on the card. While
insufficient numbers of applications that work with the current contactless smart cards communicate through radio waves via a
student cards in universities which results in the benefits of the built in antenna to an external receiver similar to a reader
cards not being recognized or used, in addition to this problem mentioned before. Contact smart cards have an advantage over
the current implementation i.e. the magnetic strip cards are not contactless based on its cost but contactless are more efficient
secure, reliable, flexible nor versatile therefore there must be a and convenient for the users. Contact smart cards were chosen
reform in the current system. for this implementation since programming can be done with
Fig. 1, illustrates some uses of smart cards in an educational ease and its advantage on cost over contactless. Although in
institute, as seen below it will have some func!ionalities that you reality contactless would be more ideal for the student card
will recognize with a few extras. system.
Contact smart cards can thenibe broken into two groups one
that has both a microprocessor and a memory chip and one that
has only a mernory.chip with non-programmable logic. The
microprocessor cards are able to manipulate and alter the data
inside the card while a memory chip cards can only undertake
pre-defined operations, with that note microprocessor cards
would be better suited for the student card system.

With the reasons given above the microprocessor based contact


smart cards were used for the implementation.

Drh cud
B. File Structure
To manage all the data that is to be stored in the smart card,
Fig. I . Overview diagram ofthe Student Card System
they must be grouped or categorized so that data can be
retrieved, altered and managed easily and efficiently. Four files
The new student card system is designed’to benefit students as are necessary for this purpose, they are listed below:
well as the university. The system is intended to supersede the
old magnetic student.card system. .Although features of the old Identification - First name, Last name, Student ID &
magnetic student card system will carry on, new features will Degree code
also be implemented. As noted in section 2 smart cards have a Status - Card status (Enabled or Disabled), Student type,
huge advantage on magnetic strip cards in security, storage, Expired date
reliability, versatility and functionality. By using smart card Extras - Telephone & Address
technology the student card will be more powerful, more Transport - EnterExit, Time last used, Date last used,
versatile, more secure and more reliab]e.,,The student card will Transport ID (Route)
be used in the areas of security, retail and identification around Some smart cards which are microprocessor based already
the university and i n the sectors of transportation and retail in have an account data structure for managing monetary values
the general community. i.e. a file has already been created for this purpose and
transactions (account inquire, credit, debit) are done through the
IV. APPROACH card’s own internal commands. But if a particular smart card
does not have this feature. an extra file should be created to
The proposed system can be implemented in educational
manage the monetary funds that are to be stored i n the card.
organizations, the prototype created was to illustrate how the
Each file has different levels of access so that privacy of the
system operates and interact with the users so an environment
cardholder can be respected and security be implemented. For
had to he chosen, that environment is a university. Designing a
example the identification file will be able to be read by anyone
smart card system for a university requires the design of the card
since the data stored in file are not confidential and are used in
itself such as what card t use, what data it should store, what
nearly all applications but write access will only be given to card
security features to use and finally the applications that works
administrators to protect the consistency and accuracy of data.
with the card. ’
Reading and ,writing access will be protected by several secret
codes, the code must be submitted before any actions can he
performed.
C. Securit?; Fig. 2. shows the algorithm of how the student card is
Security is a big issue with smart cards as the cards can be initialized while the screenshot of the actual application is
used for manipulation and fraud; there is even a greater risk if illustrated in Fig. 3.
the card is to be used to store monetary values. To provide the
resources to identified users is quite important. thus in order to
protect these resources from any unauthorized access both user
authentication and access control are required for resource
protection in distributed computer systems [3]. Different cards
have different security features. The features that exist with the
cards used for the implementation includes authentication, single
and triple DES encryption, MAC checksums Qnd secret codes
such as PIN.

D. Application
This section will go through all the applications
implemented for the proposed student card system. Some
applications such as Login and Tutorial Attendances are meant
for educational organizations while Shop and Transport are
designed for the public arena. Altogether seven applications
were created.
Currently there are a few programming standards available
for smart cards, they are:
Personal Computer / Smart Cards (PC/SC)
JavaCard
OpenCard Framework (OCR. '
PC/SC was created by Microsoft and is a smart card
application interface for communicating with s m m cards from
window based platforms but it does not support other'platforms.
Building on' the same spirit as the original Java, Sun has
developed the lava Card API Specification, to facilitate the
concept of "write once, run on all cards". It allows Java applets
to run directly on the card and enables chip independent
Fig. 2. Flowchart to initialize student card
execution of different applications.
OpenCard Framework '(OCF) is a standard framework
announced by an Industry consortium that provides for inter-
operable smmt cards solutions across many hardware and
software platforms [4].
As I will be using lava for my implementation OCF would
be ideal since OCF itself is 100% lava so guarantees full
compatibility. OCF is also open source therefore would provide
great support and no fees. Finally it suppons both OCF and
PC/SC devices therefore more choice on hardware.
The OpenCard Framework will be used for the
communication between the application and smart card. All
applications were created with JAVA and OCF.

a. Initialize card
This application is basically to personalize and initialize the card
i.e. to create the student card. The application will initialize all Fig. 3. Screenshot of the Initialize card application
secret codes and references for authentication and. create the
necessary user data files. Once the user data files have been
created personal data can then be written to the card. Section
4.2 talks about these user data files.

529
h. . Login required to insert their card into the designated reader. The
Login as the name suggest is an application that allows application will then verify the id if the id exist appropriate
cardholders to access computers or any other accounts around records will besreated else the cardholder is denied to borrow
the university. It requires the cardholder to simply insert their the hooks.
student card into the designated reader once done the system c - - A -- - P - - - s
verities the id if the id exists the cardholder k t h e n asked to
submit the pin and,then verified: If the pin is correct access is
granted otherwise denied. As a ,security feature incorrect pins
can be entered only so many times, if the limit is exceeded the
card will he blocked. To logout or lock the, workstation the user
will be required to remove the student card when that action has
been completed then the student will have those options.
Fig. 4. shows the algorithm of how the student card can be
used to record attendances while screenshot of the actual
application is illustrated in Fig. S.

ii. Recharge cash card


Inylf.n,&*tcnd The Recharge Station is used to add value into the account
structure of the card. A limit is created so that a card may not he
abused. To start up the application the cardholder is required to
insert their card once done .the balance is displayed. The
cardholder then specifies the amount to be inserted if the new
balance exceeds. the maximum value an error is prompted else
the value will he added. To exit the session the user is required
to remove their card from the reader.
Fig. 7. shows'the algorithm of how the student card can be
used to record. attendances while screenshot of the actual,

application is illustrated in Fig. 6.

1 Ba.m:m -. ___..

Fig. 6 . Screenshot of Recharge Applicalion

iii. Shop
Fig. 4. Flowchart for Login Application' The ever increasing growth of virtual business world will
. . ,
lead to more and more electronic based payment systems [SI. In
i. Librurj' the future one or more cards will be used for a wide variety of
The Library-application works like any system found in a purposes, not only in electronic commerce [5]. The student card
Library but much simpler. Firstly all the hooks that are to he will nor only be used for identification hut will be adopted in the
borrowed are all entered into the system then the cardholder~is retail sectors as a method of electronic payment

530
. .
. .
Shop is basically an app:icatidn that can be used in shops of the smart card in this industry will try t o improve the
and food courts. The strticture is.?implc all the products being following [7]: . . ~

bought must firstly be entered it will.11m calculate the total and reducing fare abuse e.g. short payment'
asks the customer to insert :their card. t LC itF$icntioii will improving ridership data i.e. data generated from fares can
firstly check the balance.of the card if there is insufficient funds . .
be used as a mean for surveying
an error is prompted else the total will be deducted from the flexibility e.g. all cards will be usable in all routes
card. security e.g. ability to track transactions
convenience for customers: since the cards can be used for
all routes and customers will not have. to worry about
carrying the exact change

I v

,E3 Aadunhbi.ra

m#lyor.
b.hrnrnowrrril

Fig. 1.Flowchart for Recharge Application


Fig. 8. Flowchart for Tuturial Appliration

io. TuutoridAnr,zdmcr
The card can he used with applications to record
attendances in meetings, at work or in our situation to record all
-- -na.
)[.-&=,
-.
M- L
students that attended a particular class. I". ( I
"b'L19__J
Fig. 8. shows the algorithm of how the student card can be
used to record attendances while screenshot of the actual
application is illustrated in Fig. 9.
In many cases conventional means o f fare collection are
lahour intensive, insecure. and cause delays in both travel and
boarding and are relatively inflexible [6]. To solve this problem
the student cards are used as a means for calculating and
Fig. 9. Screenshot of Tutorial Application
collecting fares. By using smart cards collecting fares will be
more efficient and secure and by the flexibility of the card it will
bring convenience to the pessengers. The design and adoption

531
v. Transporr
Transport is an application that calculates and collects
transport fares. It requires passengers to insert their card when
entering and exiting the vehicle. The student card has a user file
Transport that contains data about the transportation details such
as the transport identification, entedexit flag and last date and
time the card was used.
Fig. IO. shows the algorithm of how rhe student card works
as a fare card while the screenshot of the actual application is
illustrated in Fig. 1 I .

Fig. I I . Screemhot of Transpon Application

v. CONCLUSION
The implementation is just the beginning of what could he
achieved with smart cards. As seen in the implementation smart
cards will improve security in general, efficiency caused by a
cashless society, data consistency and functionality of the
student card. Through the applications we can see how
versatile, practical and usable smart cards are and how they can
improve the environment they were introduced in. Education as
shown in the implementation is just one sector where smart
cards can he adopted others can also take on the adoption to
improve their functionality and usability.

REFERENCES

[I] Rinaldo Di Giorgio, :Smart cards: A primer”, JavaWorld


‘I -on i
December 1995, http://www.javaworld.com/javaworld/jw-l2-
1997/jw-12-javadev_p.html
[2] Carol Hovenga Fancher, “In Your Pocket: Smart Cards”,
IEEE Spectrum, February 1997
[3] Nam-Yih Lee, “Integrating Access Control With User
Fig. IO.Flowchart far Transporl Applicati?” Authentication Using Smart Cards”, IEEE Transactions on
Consumer Electronics, Vol46, No. 4, November 2000
As shown the application can also detect fare abuse and [41 Opencard Framework, “Opencard Framework 1.2 General
take the appropriate actions. Fares are deducted when exiting Information Web Document”, OpenCard Consortium, October
the vehicle and if a passenger ignores this step the application 1998
will be aware the next time the passenger enters another vehicle [ 5 ] Karin Schier, “Multifunctional Sman Cards For Electronic
since the previous transport information is recorded inside the Commerce - Application Of The Role and Task Based
card. When found out a fine will he given to the passenger, i.e. Security Model”, Computer Security Applications
the application will automatically deduct an amount from the Conference, December 1998
card. 161 Phil Blythe, “Integrating Ticketing - Smart Cards In
Transport”, IEEE Colloquium: Using ITS in Public Transport
and in Emergency Services, December 1998
[7] N. 0. Attoh-Okine, L. David .Shen, “Security Issues’ of
Emerging Smart Cards Fare Collection Application in Mass
Transit”, ‘Vehicle Navigation and Information Systems’
Conference. 1995. ‘A Ride into the Future’, July 1995

532

View publication stats

You might also like