Access the data on a smart card while using an application running on a Windows application server. Multi-factor and proximity authentication can and has been embedded into plastic smart card to increase the security of all services on the card. For example, a plastic smart card can be programmed to only allow a contactless transaction if it is also within range of another device like a uniquely paired mobile phone. Individuals have better security and more convenience with using smart cards that perform multiple services. For example, they only need to replace one card if their wallet is lost or stolen. The data storage on a card can reduce duplication, and even provide emergency medical information.
Plastic smart card have multiple functions which simultaneously can be an ID, a credit card, a stored-value cash card, and a repository of personal information such as telephone numbers or medical history. The card can be easily replaced if lost, and, the requirement for a PIN (or other form of security) provides additional security from unauthorized access to information by others.
At the first attempt to use it illegally, the card would be deactivated by the card reader itself. CXJ smart cards can be electronic key rings, giving the bearer ability to access information and physical places without need for online connections. Plastic smart card are very flexible in providing authentication at different level of the bearer and the counterpart. Finally, with the information about the user that smart cards can provide to the other parties, they are useful devices for customizing products and services. Getting a product from a plastic smart card manufacturer seems like it would be excessive.
Plastic smart card can be used in electronic commerce , over the Internet, though the business model used in current electronic commerce applications still cannot use the full potential of the electronic medium. A plastic smart card can contain a non-encrypted profile of the bearer, so that the user can get customized services even without previous contacts with the supplier. The usual goal is to expose private encryption keys and then read and manipulate secure data such as funds. Tamper-evident and audit features in a smart card system help manage the risks of compromised cards.
Once an attacker develops a non-invasive attack for a particular smart card model, he is typically able to perform the attack on other cards of that model in seconds, often using equipment that can be disguised as a normal smart card reader. The plastic smart card configuration is usually used on newer credit cards and on electronic security identification badges. Smaller smart cards make a frequent appearance as Subscriber Identity Module (SIM) cards in many cell phones. In addition to the security features smart cards present, properly equipped smart card users can scan smart card enabled credit cards for online payment. HP Smart Card security turns a smart card into an electronic key for a computer.