993,088 research outputs found

    Card Sign Making System Design in the Village of Pamulang

    Full text link
    Villages located Pamulang in Tangerang Regency, which is doing its job, especially taking care services to the community. Besides the task also in terms of deal-making identity cards and also provide services for citizens who want to make a marriage certificate.In conjunction with the task of all to note that the Village of Pamulang has supervisory duties towards its citizens. In order for these areas have demographic data on which these data are very important for the population census

    Credit card display system

    Full text link
    A card-oriented transaction system (10) is provided with the capability of communicating with the card user. Specifically, the system is provided with a user card (11) having a surface region (13) capable of receiving an erasable visual image, a card reader (14) capable of detecting the card and writing on the display surface, and a data processor (16) adapted for providing information to be written on the display surface. In a preferred embodiment, the erasable visual display surface (13) is a plastic film embedding droplets of oil containing reflecting magnetic flakes. The film can be laminated onto the user card and reset by a magnetic field in the plane of the major surface. Writing can be effected by application of a magnetic field perpendicular to the surface.Published versio

    Planetary camera control improves microfiche production

    Get PDF
    Microfiche is prepared using an automatic control system for a planetary camera. The system provides blank end-of-row exposures and signals card completion so the legend of the next card may by photographed

    Just forget it - The semantics and enforcement of information erasure

    Get PDF
    Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased once that purpose has been fulfilled. A familiar example is that of online credit card transactions: a customer typically provides credit card details to a payment system on the understanding that the following promises are kept: (i) Noninterference (NI): the card details may flow to the bank (in order that the payment can be authorised) but not to other users of the system; (ii) Erasure: the payment system will not retain any record of the card details once the transaction is complete. This example shows that we need to reason about NI and erasure in combination, and that we need to consider interactive systems: the card details are used in the interaction between the principals, and then erased; without the interaction, the card details could be dispensed with altogether and erasure would be unnecessary. The contributions of this paper are as follows. (i) We show that an end-to-end erasure property can be encoded as a “flow sensitive ” noninterference property. (ii) By a judicious choice of language construct to support erasur

    Modelling Smart Card Security Protocols in SystemC TLM

    No full text
    Smart cards are an example of advanced chip technology. They allow information transfer between the card holder and the system over secure networks, but they contain sensitive data related to both the card holder and the system, that has to be kept private and confidential. The objective of this work is to create an executable model of a smart card system, including the security protocols and transactions, and to examine the strengths and determine the weaknesses by running tests on the model. The security objectives have to be considered during the early stages of systems development and design, an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. The Unified Modeling Language (UML) 2.0 is used to model the smart card security protocol. The executable model is programmed in SystemC with the Transaction Level Modeling (TLM) extensions. The final model was used to examine the effectiveness of a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks on the current security protocol were modeled to examine the vulnerabilities. The executable model shows that the smart card system security protocols and transactions need further improvement to withstand different types of security attacks

    Smart Card Driving License System in Gujarat

    Get PDF
    Gujarat was the first state in India which introduced the smart card license system in 1999. It was the first place in the world which introduced this innovative system and, thus, its implementation was a real challenge. As of now, Gujarat Government has issued 5 million smart card driving licenses to its people. This card is basically a plastic card having ISO 7810 certification and integrated circuit,capable of storing and verifying information according to its programming. To avoid corruption and mismanagement of driving licence, in the year 1999,Gujarat State Government launched the smart card driving license system, which has become the success story for dif ferent states of India and overseas countries such as USA.Transport, Infrastructure,Urban

    The Case for National DNA Identification Cards

    Get PDF
    Foes of the United States have demonstrated their ability to strike at the heart of this country. Fear of renewed attacks and a desire for greater national security have now prompted many to call for improvements in the national personal identification system. In particular, the possibility of a national identification card containing the carrier\u27s DNA information is being seriously considered. However, this raises difficult questions. Would such a card system, and the extraction of individuals\u27 DNA it entails, violate the 4th Amendment of the Constitution? This article will show that such a card system could in fact be found to be constitutional under the law of privacy as it stands today

    An evaluation of the C-Card Scheme in Bradford District

    Get PDF
    NHS Bradford & Airedale Provider Services (formerly Bradford & Airedale Community Health Service) have established a district-wide C-Card (condom card) scheme to provide improved accessed to condoms and sexual health advice for young people. An existing condom distribution scheme currently distributes over 400,000 condoms per year through GP surgeries and other agencies in contact with young people. The C-Card scheme is initially being piloted over an 18 month period, alongside the existing scheme, to assess its feasibility. Prior to the C-Card pilot project a condom distribution scheme existed across the Bradford and Airedale district sexual health service. This condom distribution scheme was evaluated and, through this process, the staff involved in this scheme indicated that there needed to be a more rigorous system in place to keep track of what had taken place with young people. At the end of January 2010 funds became available to support a pilot project of the C-Card scheme, intended to eventually replace the old ‘ad hoc’ system of distributing condoms to young people

    Credit Card Fraud: A New Perspective On Tackling An Intransigent Problem

    Get PDF
    This article offers a new perspective on battling credit card fraud. It departs from a focus on post factum liability, which characterizes most legal scholarship and federal legislation on credit card fraud and applies corrective mechanisms only after the damage is done. Instead, this article focuses on preempting credit card fraud by tackling the root causes of the problem: the built-in incentives that keep the credit card industry from fighting fraud on a system-wide basis. This article examines how credit card companies and banks have created a self-interested infrastructure that insulates them from the liabilities and costs of credit card fraud. Contrary to widespread belief, retailers, not card companies or banks, absorb much of the loss caused by thieves who shop with stolen credit cards. Also, credit card companies and banks earn fees from every credit card transaction, including those that are fraudulent. In addressing these problems, this article advocates broad reforms, including legislation that would mandate data security standards for the industry, empower multiple stakeholders to create the new standards, and offer companies incentives to comply by capping bank fees for those that are compliant, while deregulating fees for those that are not compliant
    corecore