Вы находитесь на странице: 1из 29

Your Logo Here E-Wallet By: J.

JYOTHI PRASAD 08M51A0436 1

Abstract Using the basic concepts of Embedded Systems, an idea for changing the future of Cards (Banking, Petro, Health, etc.) is proposed in this paper Requirement of a special card reader, limited lifetim e, acceptance being the main disadvantages of todays traditional cards, led to th e design of e-Wallet. The main objective of e-Wallet is to make paperless money transaction easier. The main idea behind this paper is to bring in a cheaper, mo re versatile and much more easily usable kind of a card. 2

Introduction Embedded Systems can be viewed as a combination of hardware and software components, in w hich the software is implanted into the hardware to do the specific job. These E S were implemented in various fields from Battery chargers to Aviation Systems b esides Cell phones (GSM, GPRS, CDMA, etc.).

Using the basic concept of ES, an idea for changing the future of Cards (Banking , Petro, Health etc.) is proposed in this paper 3

Pros and cons of todays cards Basic advantages: Ease of mobility Ease of use Disadvantages: Easy Duplication Re quires a special card reader Networking problems Limited lifetime Limited accepta nce 4

E-WALLET The main objective of e-Wallet is to make paperless money transaction easier The electronic wallet (e-Wallet) is just like a leather wallet as it does the same, in terms of ecash. It is a cheaper, more versatile and much more easily usable kind of card. 5

Features of E-Wallet More than 40 years of data retention Firewall encrypted security logic Compatible with many supporting hardware. No separate card reader is required to access our card Polarity reversal indicator is pre-built in our card. Reusability of our car d is unlimited. Multiple card features are incorporated in the same card. External complexities are less. 6

Transaction procedure The e-Wallet cardholder goes to a point of sale (POS) location where the e-Wallet is accepted. Having chosen the goods he wishes to buy, he goes to the cash desk. Here, the merchant calculates the total value and enters it on the payment terminal using a keypad. The terminal then displays the amount on a small screen facing the cardholder, who confirms the amount by pressing an "OK" button. In less than a second, the value is transferred from the eWallet to the terminal, and the value remaining in the e-Wallet is adjusted. 7

Transaction procedure This is an off-line transaction. A message is displayed to both the cardholder a nd the merchant saying that the payment has been accepted. Periodically, the merchant connects the terminal to his bank to do a collection that is to tra nsfer the value collected in the terminal to his bank account. This is an on-lin e transaction. 8

Transaction procedure The terminal sends a message for each transaction to the e-Wallet host system, i dentifying the card number and issuer and the amount. The host system debits the float account of the issuer and credits the merchant's account. This typically takes a few seconds per transaction. Merchants can program their terminals to au tomatically do collections each day, week or month, or when a specified value of transactions is reached. 9

Card design The first part of the process is to manufacture a substrate which contains the c hip. This is often called a COB (Chip On Board) and consists of a glass epoxy co nnector board on which the chip is bonded to the connectors. This may be done by scribing with a diamond tipped point and then pressure rolli ng the wafers so that it fractures along the scribe lines 10

Card design

Signals: VCC Power supply. RST Reset signal, used to reset the card's communicat ions. CLK Provides the card with a clock signal, from which data communications timing is derived. GND (reference voltage). VPP designated this as a programming voltage - an input for a higher voltage to program persistent memory (e.g., EEP ROM). I/O Serial input and output C4, C8 The two remaining contacts are AUX1 and AUX2 respectively, and used for USB interfaces and other uses. 11

Architecture of card 12

Architecture Embedded Microcontroller: The embedded microcontroller used here is ATMEL AT40K. It has the overall system control and it interprets the encryption algorithm. Crypto Coprocessor: This is a custom designed unit to implement encryption algorithm. Inside, it has a ROM to store the passwo rd used. It runs independent of the microcontroller unit and it minimizes the de lay in data encryption and decryption. 13

Architecture Random Word Generator: The random word generator unit generates a random word wh ich replaces the password (correct password) in the buffers and other terminals with a random word after the transaction is over.

On Chip Security Power Management: This unit protects the card (ASIC) against ov er voltage or under voltage and over frequency or under frequency of the clock s ignals given for operation. Access Control: Access control unit protects the on chip memory. It provides address and data bus scrambling and detects any nonstan dard attempt to acquire memory access. 14

Architecture Flash ROM / ROM: Flash ROM stores the instruction set for the microcontroller unit, the necessary monitor routine prog rams and the application code.

EEPROM: EEPROM is used to store the processed data i.e. the balance amount in th e card. RAM: It provides the workspace for both the microcontroller unit and the crypto co-processor. Its where the actual comparison of the stored password (ori ginal password) and the given password for transaction to take place. 15

Architecture Serial Interface: It has six valid pins CS-chip select, CLK-external clock, DI-data input, D0-data input, VOC-voltage input, GND -ground. RF Interface: This unit provides establishment of transaction using Blue tooth t echnology, which is our future enhancement. Internal 16 Bit Address/Data Bus: Th is provides communication between different units inside ASIC chip. 16

Programming the card

Smart cards contain an operating system which provides a platform to run applica tions. Commands can be passed to the card via the card reader and then the desir ed application can be accessed through the smart card. One of the most commonly used smart card operating systems is JavaCard. JavaCards enable secure and chipindependent execution of various applications. Any person can develop applicatio ns using Java programming language. The java programs can run independently on t he card 17

Communication with card reader The reader provides a path for an application to send and receive commands from the card. Each manufacturer provides a different protocol for communication wi th the reader. First, users have to communicate with the reader. Second, the r eader communicates with the card, acting as the intermediary before sending the data to the card. The card will process the data and return it to the reader, w hich will then return the data to its originating source. 18

operation

Once the card is given the power supply all the units are activated. The passwor d is sought and the password is sent. The first bit is chip select then the star t bit, two opcode bits, 6-address bits and 16 data bits. The dedicated embedded microcontroller looks after this process. Then the given password is sent to the RAM work space. The password (original password) after decryption by the crypto processor is sent to the RAM. 19

operation

Here the passwords are compared by the microcontroller. Only if the both the pas swords are correct, the access control unit brings the flash ROM, EEPROM units o f low impedance state. Otherwise the units are kept in high impedance state. The on-chip security power management unit provides the correct voltage and correct frequency (CLK signal) for functioning of the ASIC. If the password is correct, then the microcontroller fetches the instructions from the instruction set in t he FLASH ROM. 20

operation The balance amount can be fetched form the EEPROM, through the D0 pin of the ser ial interface. After the transaction is over the balance amount is stored in the EEPROM through D1 pin of the serial interface. Once the transaction is over, the random word generator generates a random word and sends it to the terminal ends and other bu ffers where the original password is present. This protects the original passwor d from being hacked by hackers. 21

Features of E-Wallet

Refillable: the data in e-wallet can be easily refillable. Data such as balance amount in credit card and other data can be refillable. Infinite lifetime: the l ife of e-wallet is infinite. Current balance can be stored and read. User authen tication: user authentication is one of the important features of e-wallet. This feature includes validation of consumer before a transaction is made. Universal access: e-wallet can be accessed universally. It has no limitations. E-wallet s upports maximum possible cash. An e-wallet cannot be duplicated. 22

Advantages & disadvantages Advantages: Ease of use Accessibility and convenience Flexibility Safety and con trol Disadvantages:

Users must download the wallet form and software 23

Future challenges Mass Market Appeal : One way to increase the mass market appeal is to make the digital wallet usable for all day-to-day trans actions. Stake Holder Dynamics : This is a challenge because satisfying the business and strategic goals of multiple stake holders is difficult. The third challenge is designing a digital wallet that consumers want to use. Th is requires a usable interface, and support for all financial transactions that a user may want to perform. 24

conclusion With all the above mentioned features it is definite that the future of cards is definitely e-Wallet. Besides credit cards, this e-Wallet can also be extended into the following fiel ds, namely: Sim card Petro card Credit card Health card 25

Bibliography 1. www.way2students.com 2. www.jntuworld.com 3.http://www.microsoft.com/ 4.http://awww.microsoft.com/ 26

27

QUERIES 28

Вам также может понравиться