EE4215_t5-sol - EE4215 Tutorial 5 Solution 1. How magnetic...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 5 Solution 1. How magnetic information is stored? What is the maximum capacity? [Chapter 5 – slides 7, 8 ] 2. What are the common card fraud activities? [Chapter 5 – slides 9,10] 3. What are the common card fraud protection technologies? How these technologies can be counterfeited. [Chapter 5 – slides 12-14] 4. What is the concept of protection on appearance, access and data? Give one example for each type. [Chapter 5 – slides 16-27] 5. What are the features memory, CPU and Crypto-processor smart cards? Give one example for each type. [Chapter 5 – slides 30-32] 6. What is contact type and contactless type smart cards? Give one example for 7. Why the contactless type cannot be as powerful as contact type cards? What are the basic limitations? [Chapter 5 – slides 95 & 98 - No processor simple 8. Give examples of how smart cards are used in Hong Kong. [Chapter 5 – slides 40]
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.

Ask a homework question - tutors are online