ZNs New CV
ZNs New CV
ZNs New CV
ZULKHARNAIN
Hno. 6-1-59 Gulshan amena, I floor back portion, Vishalnagar Hyderabad 500008 INDIA.
Page 1
1. Research paper on: Bluetooth -a failed technology for mobile payment
Author: Zulkhar Nain
Category IT and Computing
Abstract: any time anywhere delivery is the peculiarity of M-Commerce. It is a Wireless
Technology. Its is also a boosting technology of Commerce transactions, using
Wireless media. It also makes it complex. It is an application of Pervasive and
Ubiquitous Global computing. Bluetooth is a latest trend as a channel for M-Commerce
transaction. This paper explores the possibilities of latest trends in Bluetooth and its
feasibility with M-commerce.
4. Research paper on: Security for SIM card- International conference on Systemic,
Cybernetics and informatics -paper ID CC- 9.7 Hyderabad 2008.
5. Research paper on: RFID SMART CARD rhttp://www.rfidjournal.com/whitepapers/2/2.
Page 2
ABSTRACT OF PHD EARNED
Smart Cards represent one of the physically smallest, yet most widely
used applications for Embedded Microprocessors. Within a few square
millimeters of silicon, Smart Cards contain a complete microprocessor
system, including a processor (and often a coprocessor), volatile and non-
volatile memories, and input/output. Despite their small size, Smart Cards
also represent one of the most security-critical of all embedded
applications. Hundreds of millions of these tiny embedded systems are in
use today in applications such as SIM i.e., Subscriber Identity for mobile
telephone handsets, banking, fare systems for public transport, and
physical and network access systems.
This thesis is outcome of my work done under the Smart card project of
IDRBT, Hyderabad during 2003 to 2006. This thesis investigates the
Digital Security system by implementation of secure log file handling
mechanisms, using recent smart card improvements. Initially, we examine
how smart cards evolved from single application cards into true multi-
application cards. Additionally, we present the most recent architectures
(client application interfaces) that enable client applications to interface
with smart card applications. Previous proposals for maintaining log files
in smart cards are very limited and mostly theoretical. We examine those
most related to smart cards along with presenting the very few real world
examples of log files. We go on to examine the new events that require
logging along with the requirements of the entities involved.
Subsequently, we describe an ideal event-logging model for a multi-
application smart card environment. To meet the identified requirements,
we describe the details of a smart card entity that is responsible for
dynamically updating the smart card log files. In that context, along with
providing adequate log file space management, we propose a possible
standard log file format for smart cards. In the core part of the thesis we
describe three different smart card log file download protocols, the
selection of which depends on the requirements of the entities involved.
These protocols download audit data to another entity that does not suffer
from immediate storage restrictions. Finally, we describe implementation
details and performance measurements of both the log file download
protocol and the standard log file format in two of the most advanced
multi application smart cards. Here a case study is made for secure bank
transaction using MiFare contactless smart card.
Nowadays Indian banks are using Magnetic stripe cards for ATM
transactions, and they are not safe as they can be easily cloned. Smart
cards are well known for their digital security, and they are very secure,
comparatively. Some international banks have recently started using
smart card, but some cases have been reported of hacking them, making
use of data leakage from them. This thesis is an attempt to overcome the
problems of data leakage by making use of secure logging system, which
can be implemented, by not allowing the data to leak, moreover the
architecture proposed here is made more stronger to withstand the
attacks and by further designing can help self-destroy when attempt is
made to crack it. This system has been simulated on Java Cards and then
tested practically on contact type SR90 smart card system as well as
Page 3
contactless SR90c MiFare models. Henceforth we propose this architecture
for secure bank transaction as well as for authentication systems involving
smart cards, like internet access USB Dongles, Mobiles, Authenticated
Door entry, etc.,
Page 4