skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 134423 Find in a Library
Title: Using Smart Cards -- A Smart Move
Journal: Security Management  Volume:36  Issue:1  Dated:(January 1992)  Pages:32,34,36
Author(s): J S Zimmerman
Date Published: 1992
Page Count: 3
Type: Report (Technical)
Format: Article
Language: English
Country: United States of America
Annotation: Smart card systems will expand the access control marketplace to provide security applications that previously did not exist.
Abstract: Smart card access control systems provide three key benefits: (1) central controller computers are not required; (2) the information on the access cards is more secure; and (3) the access cards make a broad variety of additional applications possible. Smart card systems use a design known as a totally distributed data base which makes it unnecessary to maintain an access data file. A smart card looks like an ordinary credit card and is a miniature computer packaged inside a plastic, card-sized container. When inserting a smart card into a reader at a protected access point, the reader determines if the card is valid, if it has expired, and if there is authorization for entry through a particular access point at a certain date and time. Information kept on smart cards is highly secure; no one can read the information contained in the card's memory without going through the smart card operating system. The widespread use of smart cards will promote better services and greater personal privacy.
Main Term(s): Personnel identification systems
Index Term(s): Computer aided operations; Computer privacy and security; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.