Anda di halaman 1dari 17

e -WALLET

(The Future Of Cards)

A seminar report submitted to


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, Anantapur
In partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING

Submitted by

B.Rushendra Kumar
(07BP1A0440)

DEPARTMENT
OF
ELECTRONICS AND COMMUNICATION ENGINEERING

VAISHNAVI INSTITUTE OF TECHNOLOGY


(Approved by AICTE, New Delhi & Affiliated to JNTU, Anantapur)
Tanapalli (V), Kuntrapakam (P),
TIRUPATI – 517561, A.P.
MARCH-2011
VAISHNAVI INSTITUTE OF TECHNOLOGY
(Approved by AICTE, New Delhi & Affiliated to JNTU, Anantapur)
Tanapalli (V), Kuntrapakam (P),
TIRUPATI – 517561, A.P.

CERTIFICATE

This is to certify that the seminar report “e-WALLET” based on “EMBEDDED


SYSTEM” is being submitted by Mr.B.Rushendra Kumar bearing Roll
No.07BP1A0440 in partial fulfillment for the award of Bachelor of Technology in the
discipline Electronics & Communication Engineering is a bonafide record work carried
out by him during the period of 2010 - 2011 under our supervision.

Prof. G. Ramakrishna., M.Tech. (Ph.D) Mrs.A.Kusuma Kumari.,B.Tech,


Head of The Department Assistant Professor of ECE
Seminar In-charge

Seminar held on ……………………………..

Prof. G. Ramakrishna., M.Tech. (Ph.D) Mrs.A.Kusuma Kumari.,B.Tech,


Head of The Department Assistant Professor of ECE
Seminar In-charge
ACKNOWLEDGEMENT

Successful completion of any project cannot be done without proper guidance and
encouragement of any people. This acknowledgement transcends the reality. Hence, I
would like to express my deep gratitude to all those who helped me directly or indirectly

to transform an idea “e-WALLET” based on “EMBEDDED SYSTEM”.

I express my thanks to Professor Dr. P. NANDA KUMAR, Principal for providing


all the necessary facilities during the Course of study.

I would like to express my great fullness and sincere thanks to


Mr.G.RAMAKRISHNA, Assistant Professor, Head of the Department of
ELECTRONICS AND COMMUNICATION ENGINEERING, for his kind help and
encouragement during the course of my study and in the successful completion of the
seminar report.

I thankful to my guide Mrs. A.KUSUMA KUMARI for her valuable guidance


and encouragement. Her helping attitude and suggestions have helped me in the
successful completion of the seminar.

I would like to thank my parents and friends, who have the greatest contributions
in all my achievements, for the great care and blessings in making as successful in all my
endeavors.

B.Rushendra Kumar
CONTENTS

Chapter No Title Page No

Abstract
Chapter 1 Introduction 1
Chapter 2 About e-Wallet 3

2.1 Salient Features Of e-Wallet


Chapter 3 Transaction Procedure 4
Chapter 4 Card Designing 5
4.1 Application Specific Integrated Circuit
4.2 Internal Architecture of FPGA
4.3 Field Programmable Gate Array (FPGA)
Chapter 5 Operation 8
Chapter 6 Features of e-Wallet 9

Chapter 7 Advantages of e-Wallet 10


Conclusion 11
Bibliography 12
Abstract

Using the basic concepts of Embedded Systems, an idea for changing the future of Cards
(Banking, Petro, Health, Televoice, etc.) is proposed in this paper. Requirement of a
special card reader, limited lifetime, acceptance being the main disadvantages of today’s
traditional cards, led to the design of e-Wallet.
The main objective of e-Wallet is to make paperless money transaction easier.
The main idea behind this paper is to bring in a cheaper, more versatile and much more
easily usable kind of a card. Using this e-Wallet the transaction procedure can be as
simple as: the customer goes to the point of sale (POS), does the purchasing and when it
comes to the payment, the customer submits his e-Wallet to vender who connects it to his
terminal (PC).The vender displays the billing information to the customer who finalizes
it. The amount in the e-Wallet is updated accordingly. Later at periodic intervals, the
vender intimates the bank (in case of credit cards) which transfers the amount from the
customer’(s) account to his.
The advantages of e-Wallet are its ease of use (doesn’t require a separate card
reader), ease of maintenance, flexibility, safety, being the primary ones. The designing of
the card is similar to any other embedded card. The designing cost of the card (e-Wallet)
being as low as the price of a pizza. There are ample enhancements to this application
from credit cards to televoice cards. Unlike traditional cards which are application
oriented, all the applications’ software can be embedded into this e-Wallet which
provides multi-functionality.
CHAPTER 1

INTRODUCTION

With the advent of computers many technologies are taking this world by a surprise.
These include Embedded Systems (ES), Artificial Intelligence (AI), Neural Networks
(NN), Fuzzy Logic, Bluetooth and many more are upcoming. This paper deals with
Embedded Systems in a new perspective.

In easy terms, Embedded Systems can be viewed as a combination of hardware and


software components, in which the software is implanted into the hardware to do the
specific job. These ES were implemented in various fields from Battery chargers to
Aviation Systems besides Cell phones (GSM, GPRS, CDMA, etc.). These ES are being
developed in ‘leaps and bounds’. The never-ending efforts of many scientists in the field
of ES led to the evolution of Smart Technology (ST).

Using the basic concept of ES, an idea for changing the future of Cards (Banking,
Petro, Health etc.) is proposed in this paper. To interpret this idea, it is first needed to
know the pros & cons of today’s ‘traditional’ cards. Consider the example of banking:

The magnetic stripe cards used for transactions are as simple as visiting cards, with a
magnetic tape to hold the user information. The basic advantages of these cards are:
 Ease of mobility  Ease of use
Coming to the disadvantages of these cards, few are listed here under:
 Easy Duplication  Limited lifetime
 Requires a special card reader  No particular user authentication
 Networking problems  Unsecured remote transaction
 No memory to hold the  Limited acceptance
current balance  Vulnerable to moisture, heat, dirt etc.
and the list goes on……
Keeping these pros & cons in view, the Smart Technology is introduced to develop a new
class of cards. This stream of Smart Technology can be termed as Smart Card
Technology (SCT). This smart card has a microprocessor or memory chip embedded in it
that, when coupled with a reader, has the processing power to serve many different
applications. Such cards can be referred to as e-Wallet (electronic Wallet).
CHAPTER 2
e-WALLET
The main objective of e-Wallet is to make paperless money transaction easier. The
electronic wallet (e-Wallet) is just like a leather wallet as it does the same, in terms of e-
cash. In today’s life where monetary value and security both, go hand in hand, it is
difficult to satisfy customers using the routine cards. The main idea behind this paper is
to bring in a cheaper, more versatile and much more easily usable kind of a card.

2.1 Salient features of e-Wallet are:


 More than 40 years of data  Polarity reversal indicator is pre-built
retention in our card.
 Firewall encrypted security  Reusability of our card is unlimited.
logic  Multiple card features are
 Compatible with many incorporated in the same card.
supporting hardware.  External complexities are less.
 No separate card reader is
required to access our card.
CHAPTER 3
TRANSACTION PROCEDURE

The e-Wallet cardholder goes to a point of sale (POS) location where the e-Wallet is
accepted. Having chosen the goods he wishes to buy, he goes to the cash desk. Here, the
merchant calculates the total value and enters it on the payment terminal using a keypad.
The terminal then displays the amount on a small screen facing the cardholder, who
confirms the amount by pressing an "OK" button. In less than a second, the value is
transferred from the e-Wallet to the terminal, and the value remaining in the e-Wallet is
adjusted. This is an off-line transaction. A message is displayed to both the cardholder
and the merchant saying that the payment has been accepted.
Periodically, the merchant connects the terminal to his bank to do a collection that
is to transfer the value collected in the terminal to his bank account. This is an on-line
transaction. The terminal sends a message for each transaction to the e-Wallet host
system, identifying the card number and issuer and the amount. The host system debits
the float account of the issuer and credits the merchant's account. This typically takes a
few seconds per transaction.
Merchants can program their terminals to automatically do collections each day,
week or month, or when a specified value of transactions is reached. If merchants have a
number of terminals (e.g. a vending machine operator, or a large supermarket) then they
can use the "shuttle collection" system, where terminals download their data onto a
special collection card, which in turn then downloads it into a central terminal, which is
then used to perform an on-line collection.
CHAPTER 4
CARD DESIGNING

4.1 Application Specific Integrated Circuit:


Most of the home friendly electronic oriented products works on custom specified
integrated circuit chips like electric oven, cellular phones, washing machines etc.
Following this global trend we are using FIELD PROGRAMABLE GATE ARRAY
(FPGA) belonging to the family of APPLICATION SPECIFIC INTEGRATED
CIRCUIT

4.2 Field Programmable Gate Array (FPGA):


FPGA is widely used in all consumer electronic devices because of its low cost
and better reliability. It can be easily programmed by the end user and used in any
applications. FPGA can be broadly classified into two types
1. Custom designed IC 2. General purpose IC
Custom design FPGA’s are developed by user specification from wafer level and final
output is obtained. It is only suitable for mass production systems with unique
programming .Another widely used one is general purpose FPGA’s which were supplied
by the vendor in IC form where the user has to program to his requirements with the help
of EDA tools (electronic device automation).
4.3 Internal Architecture of FPGA:
The internal blocks of FPGA IC are:

Embedded Microcontroller: The embedded microcontroller used here is ATMEL


AT40K. It has the overall system control and it interprets the encryption algorithm. A
dedicated logic is used for security measures such as personal identification number (pin)
authentication or challenge response. The voltage level is: VCC= 1.8 +/- 0.15V.
Crypto Coprocessor: This is a custom designed unit (Modular Exponential unit) to
implement encryption algorithm. Inside, it has a ROM to store the password used. It runs
independent of the microcontroller unit and it minimizes the delay in data encryption and
decryption. By using a crypto-coprocessor, the password in encrypted and stored and it
would be almost impossible for a hacker to crack the password.
Random Word Generator: The random word generator unit generates a random word
which replaces the password (correct password) in the buffers and other terminals with a
random word after the transaction is over. Hence it is almost impossible to replicate the
behavior of the ASIC and thereby obtain the encryption key or algorithm used.
On Chip Security Power Management: This unit protects the card (ASIC) against over
voltage or under voltage and over frequency or under frequency of the clock signals
given for operation.
Access Control: Access control unit protects the on chip memory. It provides address and
data bus scrambling and detects any non-standard attempt to acquire memory access.
Flash ROM / ROM: Flash ROM stores the instruction set for the microcontroller unit,
the necessary monitor routine programs and the application code. Here the flash ROM is
used because there are 32 available instructions sets for different applications. But only
one instruction set is used. If another instruction set is used the card can be used for only
the specific application.
EEPROM: EEPROM is used to store the processed data i.e. the balance amount in the
card. This part is of commercial importance as it holds the monetary information of the
card. Also the EEPROM sends the data to be read for establishing transaction
RAM: It provides the workspace for both the microcontroller unit and the crypto co-
processor. It’s where the actual comparison of the stored password (original password)
and the given password for transaction to take place. Only if the given password is the
actual password, the access is given to view the details of the card, deposition,
withdrawal are allowed.
Serial Interface: It has six valid pins CS-chip select, CLK-external clock, DI-data input,
D0-data input, VOC-voltage input, GND-ground. Actually a parallel printer port is used
for interface of the card with PC. But only the six required pins of the printer ports are
activated. Thus the advantages of parallel and serial communication are utilized. There is
no need for a separate USB.
RF Interface: This unit provides establishment of transaction using Blue tooth
technology, which is our future enhancement.
Internal 16 Bit Address/Data Bus:
This provides communication between different units inside ASIC chip. This
ASIC chip is built satisfying ISO 7816 standards.
CHAPTER 5
OPERATION

1. Once the card is given the power supply all the units are activated.
2. The password is sought and the password is sent. The first bit is chip select then
the start bit, two opcode bits, 6-address bits and 16 data bits.
The dedicated embedded microcontroller looks after this process.
3. Then the given password is sent to the RAM work space.
4. The password (original password) after decryption by the crypto processor is sent
to the RAM.
5. Here the passwords are compared by the microcontroller. Only if the both the
passwords are correct, the access control unit brings the flash ROM, EEPROM
units of low impedance state.
6. Otherwise the units are kept in high impedance state.
7. The on-chip security power management unit provides the correct voltage and
correct frequency (CLK signal) for functioning of the ASIC.
8. If the password is correct, then the microcontroller fetches the instructions from
the instruction set in the FLASH ROM.
9. The balance amount can be fetched form the EEPROM, through the D0 pin of the
serial interface.
10. After the transaction is over the balance amount is stored in the EEPROM through
D1 pin of the serial interface.
11. Once the transaction is over, the random word generator generates a random word
and sends it to the terminal ends and other buffers where the original password is
present.
This protects the original password from being hacked by hackers.
12. Thus the ASIC is designed for effective transaction with proper security to the
customers.
CHAPTER 6
FEATURES OF e–WALLET

 Refillable
 Infinite lifetime
 Current balance can be stored and read
 User authentication is provided
 Universal access
 Maximum possible cash
 Cannot be duplicated
CHAPTER 7
ADVANTAGES OF e-WALLET

Ease of use:
 Withdraw or deposit value by telephone  No signature required
 Pay the exact amount, no fiddling for  Immediate payment
change
In the future, access points may include mobile phones

Accessibility and convenience:


 Cash machines and telephones give more access points to funds in bank account
 Available 24 hours / 365 days
 Cash machines and telephones cannot run out of electronic cash

Flexibility:
 Transfer value by telephone  Multi-currency capability
 Pay person to person  No age limit, so suitable for all the
 For low or high values family

Safety and control:


 Spend only what you have  Keep track of what you have spent
 Read your balance and where

 Load value at home  Customer is traceable if a lost card is

 Lock your card or wallet found


CONCLUSION:

With all the above mentioned features it is definite that the future of cards is
definitely e-Wallet’s. Besides credit cards, this e-Wallet can also be extended into the
following fields, namely:
 Sim – card  Insurance – card
 Petro – card  Access – card
 Credit – card  ATM
 Health – card  Televoice card
 Intelligent web – surfing card

These are only the few to mention. Due to its ease of adaptability to its environment, this
e-Wallet would certainly change the way people transact (monetary transactions).
Bibliography:
www.way2students.com
www.jntuworld.com
http://www.microsoft.com/windowsmobile/activeync/default.mspx
http://awww.microsoft.com/windowsmobile/activeync/devicecenter.mspx
Newspaper article from: Herald-News (Joliet, IL)

Anda mungkin juga menyukai