Вы находитесь на странице: 1из 16

CHAPTER 1 INTRODUCTION

With the advent of computers many technologies are taking this world by a surprise. These include Embedded Systems (ES), Artificial Intelligence (AI), Neural Networks (NN), Fuzzy Logic, Bluetooth and many more are upcoming. This paper deals with Embedded Systems in a new perspective. In easy terms, Embedded Systems can be viewed as a combination of hardware and software components, in which the software is implanted into the hardware to do the specific job. These ES were implemented in various fields from Battery chargers to Aviation Systems besides Cell phones (GSM, GPRS, CDMA, etc.). These ES are being developed in leaps and bounds. The never-ending efforts of many scientists in the field of ES led to the evolution of Smart Technology (ST). Using the basic concept of ES, an idea for changing the future of Cards (Banking, Petro, Health etc.) is proposed in this paper. To interpret this idea, it is first needed to know the pros & cons of todays traditional cards. Consider the example of banking: /The magnetic stripe cards used for transactions are as simple as visiting cards, with a magnetic tape to hold the user information. The basic advantages of these cards are: y y Ease of mobility Ease of use

Coming to the disadvantages of these cards, few are listed here under: y y y y y y Easy Duplication Requires a special card reader Networking problems No memory to hold the current balance Limited lifetime No particular user authentication

y y y

Unsecured remote transaction Limited acceptance Vulnerable to moisture, heat, dirt etc

Keeping these pros and cons in view, the Smart Technology is introduced to develop a new class of cards. This stream of Smart Technology can be termed as Smart Card Technology (SCT). This smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. Such cards can be referred to as e-Wallet (electronic Wallet).

Fig 1.1 Traditional ATM card

CHAPTER 2 E-WALLET
The main objective of e-Wallet is to make paperless money transaction easier. The electronic wallet (e-Wallet) is just like a leather wallet as it does the same, in terms of e-cash. In todays life where monetary value and security both, go hand in hand, it is difficult to satisfy customers using the routine cards. The main idea behind this paper is to bring in a cheaper, more versatile and much more easily usable kind of a card.

A digital wallet (also known as an e-wallet) allows users to make electronic commerce transactions quickly and securely. A digital wallet functions much like a physical wallet. The digital wallet was first conceived as a method of storing various forms of electronic money (e-cash), but with little popularity of such e-cash services, the digital wallet has evolved into a service that provides internet users with a convenient way to store and use online shopping information. An individuals bank account is usually linked to the digital wallet. They might also have their drivers license, health card, loyalty card(s) and other ID documents stored on the phone. The credentials can be passed to a merchants terminal. The system has already gained popularity in Japan, where digital wallets are known as Osaifu-Keitai or wallet mobiles.

Fig 2.1 E-Wallet card

2.1 Salient features of e-Wallet

More than 40 years of data retention y y y y y y y Firewall encrypted security logic Compatible with many supporting hardware. No separate card reader is required to access our card. Polarity reversal indicator is pre-built in our card. Reusability of our card is unlimited. Multiple card features are incorporated in the same card. External complexities are less.

CHAPTER 3 TRANSACTION PROCEDURE


The e-Wallet cardholder goes to a point of sale (POS) location where the e-Wallet is accepted. Having chosen the goods he wishes to buy, he goes to the cash desk. Here, the merchant calculates the total value and enters it on the payment terminal using a keypad. The terminal then displays the amount on a small screen facing the cardholder, who confirms the amount by pressing an "OK" button. In less than a second, the value is transferred from the e-Wallet to the terminal, and the value remaining in the e-Wallet is adjusted. This is an off-line transaction. A message is displayed to both the cardholder and the merchant saying that the payment has been accepted. Periodically, the merchant connects the terminal to his bank to do a collection that is to transfer the value collected in the terminal to his bank account. This is an on-line transaction. The terminal sends a message for each transaction to the e-Wallet host system, identifying the card number and issuer and the amount. The host system debits the float account of the issuer and credits the merchant's account. This typically takes a few seconds per transaction.

Merchants can program their terminals to automatically do collections each day, week or month, or when a specified value of transactions is reached. If merchants have a number of terminals (e.g. a vending machine operator, or a large supermarket) then they can use the "shuttle collection" system, where terminals download their data onto a special collection card, which in turn then downloads it into a central terminal, which is then used to perform an on-line collection.

CHAPTER 4 CARD DESIGNING


4.1 Application Specific Integrated Circuit
Most of the home friendly electronic oriented products work on custom specified integrated circuit chips like electric oven, cellular phones, washing machines etc. Following this global trend we are using FIELD PROGRAMABLE GATE ARRAY (FPGA) belonging to the family of APPLICATION SPECIFIC INTEGRATED CIRCUIT

4.2 Field Programmable Gate Array (FPGA)


FPGA is widely used in all consumer electronic devices because of its low cost and better reliability. It can be easily programmed by the end user and used in any applications. FPGA can be broadly classified into two types:

1. Custom design 2. General purpose design

Custom design FPGAs are developed by user specification from wafer level and final output is obtained. It is only suitable for mass production systems with unique programming .Another widely used one is general purpose FPGAs which were supplied by the vendor in IC form where the user has to program to his requirements with the help of EDA tools (electronic device automation).

4.3 Internal Architecture of FPGA

Field programmable gate array (FPGA) belonging to the family of application specific integrated circuit. FPGA is widely used in all consumer electronic devices

because of its low cost and better reliability. It can be easily programmed by the end user and used in any applications.

The internal blocks of FPGA IC are:

Embedded Microcontroller

The embedded microcontroller used here is ATMEL AT40K. It has the overall system control and it interprets the encryption algorithm. A dedicated logic is used for security measures such as personal identification number (pin) authentication or challenge response. The voltage level is: VCC= 1.8 +/- 0.15V.

Crypto Coprocessor

This is a custom designed unit (Modular Exponential unit) to implement encryption algorithm. Inside, it has a ROM to store the password used. It runs independent of the microcontroller unit and it minimizes the delay in data encryption and decryption. By using a crypto-coprocessor, the password in encrypted and stored and it would be almost impossible for a hacker to crack the password.

Random Word Generator

The random word generator unit generates a random word which replaces the password (correct password) in the buffers and other terminals with a random word after the transaction is over. Hence it is almost impossible to replicate the behavior of the ASIC and thereby obtain the encryption key or algorithm used.

On Chip Security Power Management

This unit protects the card (ASIC) against over voltage or under voltage and over frequency or under frequency of the clock signals given for operation.

Access Control

Access control unit protects the on chip memory. It provides address and data bus scrambling and detects any non-standard attempt to acquire memory access.

Flash ROM / ROM

Flash ROM stores the instruction set for the microcontroller unit, the necessary monitor routine programs and the application code. Here the flash ROM is used because there are 32 available instructions sets for different applications. But only one instruction set is used. If another instruction set is used the card can be used for only the specific application.

EEPROM

EEPROM is used to store the processed data i.e. the balance amount in the card. This part is of commercial importance as it holds the monetary information of the card. Also the EEPROM sends the data to be read for establishing transaction

RAM

It provides the workspace for both the microcontroller unit and the crypto coprocessor. Its where the actual comparison of the stored password (original password) and the given password for transaction to take place. Only if the given password is the actual password, the access is given to view the details of the card, deposition, withdrawal are allowed.

Serial Interface

It has six valid pins CS-chip select, CLK-external clock, DI-data input, D0-data input, VOC-voltage input, GND-ground. Actually a parallel printer port is used for interface of the card with PC. But only the six required pins of the printer ports are activated. Thus the advantages of parallel and serial communication are utilized. There is no need for a separate USB.

RF Interface

This unit provides establishment of transaction using Blue tooth technology, which is our future enhancement.

Internal 16 Bit Address/Data Bus

This provides communication between different units inside ASIC chip. This ASIC chip is built satisfying ISO 7816 standards.

Fig 4.1 Internal architecture of FPGA

CHAPTER 5 OPERATION
5.1 Operation of e-wallet
The operation of e-wallet is carried out as follows 1. Once the card is given the power supply all the units are activated. 2. The password is sought and the password is sent. The first bit is chip select then the start bit, two opcode bits, 6-address bits and 16 data bits. The dedicated embedded microcontroller looks after this process. 3. Then the given password is sent to the RAM work space. 4. The password (original password) after decryption by the crypto processor is sent to the RAM. 5. Here the passwords are compared by the microcontroller. Only if the both the passwords are correct, the access control unit brings the flash ROM, EEPROM units of low impedance state. 6. Otherwise the units are kept in high impedance state. 7. The on-chip security power management unit provides the correct voltage and correct frequency (CLK signal) for functioning of the ASIC. 8. If the password is correct, then the microcontroller fetches the instructions from the instruction set in the FLASH ROM. 9. The balance amount can be fetched form the EEPROM, through the D0 pin of the serial interface. 10. After the transaction is over the balance amount is stored in the EEPROM through D1 pin of the serial interface. 11. Once the transaction is over, the random word generator generates a random word and sends it to the terminal ends and other buffers where the original password is present. This protects the original password from being hacked by hackers. 12. Thus the ASIC is designed for effective transaction with proper security to the customers.

CHAPTER 6 FEATURES OF EWALLET


6.1 Features of e-wallet
Refillable: the data in e-wallet can be easily refillable. Data such as balance amount in credit card and other data can be refillable. y Infinite lifetime: the life of e-wallet is infinite. Unlike other cards such as credit cards, it has infinite life time. The data on e-wallet exists for infinite time. y y Current balance can be stored and read. User authentication: user authentication is one of the important features of ewallet. This feature includes validation of consumer before a transaction is made. That is it checks whether the consumer is legal authority to access the e-wallet. y y y Universal access: e-wallet can be accessed universally. It has no limitations. E-wallet supports maximum possible cash. An e-wallet cannot be duplicated.

CHAPTER 7 ADVANTAGES AND DISADVANTAGES OF E-WALLET

7.1 Advantages of e-wallet

7.1.1 Ease of use:

y y y y

Withdraw or deposit value by telephone Pay the exact amount, no fiddling for change No signature required Immediate payment

7.1.2 Accessibility and convenience

y y
y

Cash machines and telephones give more access points to funds in bank account Available 24 hours / 365 days Cash machines and telephones cannot run out of electronic cash

7.1.3 Flexibility: y y y y y Transfer value by telephone Pay person to person For low or high values Multi-currency capability No age limit, so suitable for all the family

7.1.4 Safety and control: y y Spend only what you have Read your balance

y y y
y

Load value at home Lock your card or wallet Keep track of what you have spent and where Customer is traceable if a lost card is found

7.2 Disadvantages of E-Wallet y Users must download the wallet form and software, after the download is complete; the wallet is installed as a plug-in or ActiveX control which is within a browser that must also be install browser. y Digital wallets and peer-to-peer (P-to-P) payment systems have failed to attract meaningful adoption for business to consumer (B-to-C) transactions. However, Pto-P payments have become common for consumer auctions, renewing hope that other payment-related offerings might yet succeed.

CHAPTER 8 FUTURE CHALLENGES

8.1 Key Challenges


There are three key challenges that must be overcome first.

8.1.1 Mass Market Appeal Ensuring a mass market appeal for the digital wallet is important to leverage scale economies and the network externality effect1. One way to increase the mass market appeal is to make the digital wallet usable for all day-to-day transactions. Hence it is important to support both point of sale transactions and peer-to-peer transactions between individuals. Both of these require support from financial institutions, retailers and government bodies : coordinating .Utility of the digital wallet is influenced by ones social network. If a majority of the participants in a persons network are not digital wallet ready, then one has to still use cash for monetary exchange these stake holders is a real challenge. It should be noted that the Korean and Japanese methods to increase mass market appeal may not work in Singapore due to differences in industrial organization and cultural preferences.

8.1.2 Stake Holder Dynamics Any successful digital wallet deployment will need the Cooperation of multiple stake holders such as banks, retailers, regulatory bodies, and consumer. This is a challenge because satisfying the business and strategic goals of multiple stake holders is difficult. For example, bank A may choose not to be a part of a consortium where competing banks play a leading role. In addition some stake holders may have already invested in alternative technologies and may not be in a position to make further investments. Achieving buy-in from all stake holders may require the support of the

government and regulatory bodies. Fortunately the Singaporean government is receptive towards digital wallet-type integration efforts.

8.1.3 Compelling user experience The third challenge is designing a digital wallet that consumers want to use. This requires a usable interface, and support for all financial transactions that a user may want to perform. We plan to reuse some of the user interfaces and design principles developed in Japan and South Korea. However there are many important features that still need to be created. These include comprehensive backup and restore solutions, integration of a large number of monetary and identification implements, and support for peer-to-peer cash transactions. For example, this is the most common payment mode when paying for taxi rides and when paying for food and drink. As such, consumers would resist using a digital wallet if they still had to carry a conventional wallet for cash transactions.

8.2 Conclusion
With all the above mentioned features it is definite that the future of cards is definitely e-Wallet. Besides credit cards, this e-Wallet can also be extended into the following fields, namely: y y y y y y y y y Sim card Petro card Credit card Health card Intelligent web surfing card Insurance card Access card ATM card Televoice card

Bibliography:

1. www.way2students.com

2. www.jntuworld.com

3. http://www.microsoft.com/windowsmobile/activeync/default.mspx

4. http://awww.microsoft.com/windowsmobile/activeync/devicecenter.mspx

Вам также может понравиться