Smart Cards Get Smarter

For years, campuses have used plastic cards as part of what were called “one card” solutions. Initially, these were plastic cards with magnetic strips on the back that encoded information about the student’s personal profile. This, coupled with a backend computer system, made it possible to replace physical keys, photo IDs, credit cards, and other entities with a single card. But these cards were easily lost, and nearly as easily reproduced by hackers with equipment that became readily obtainable. Advances in technology led to chip-embedded cards that could be read within proximity of a scanner through wireless communication; thus, the term “prox cards.” These were soon followed by ways of compromising the respective security on the cards. More recently, “smart cards” have gotten significantly smarter and, at least for now, more difficult to compromise and counterfeit.

Increasing Sophistication

Smart cards typically incorporate a combination of microprocessor and memory. The security employs current encryption technology and standards. Depending on the nature of the cards, they can store significant amounts of information such as identity, financial accounts, health records, access rights, and more. Alternatively, the cards store little more than authentication mechanisms that establish the identity of the owner, with information stored in secured servers for access and use as needed.

In the future, cards with sensory and intelligence capabilities sufficient to actively confirm that the holder is the owner will be common. Techniques are being developed to enable this function, with most involving biometric characteristics of the owner. For now, a fundamental requirement involves the use of two-factor authentication (2FA). The most common mechanism uses a PIN that should only be known to the card owner. We insert our smart cards and then are asked to enter a PIN, with ubiquitous and highly visible warnings to “protect your PIN.”

The most common form of chip-enabled cards are those that require insertion into a reader in which contacts on the card enable communication with a security device. A card could be lost or stolen, but as long as the other ways of confirming identification are used there is reasonable security. It’s possible for hackers to disassemble the cards or scan them with unauthorized equipment, but encryption makes compromise difficult for now. Ultimately, hackers will catch up to this technology as well.

Wireless Developments

A number of companies are developing ways to return to wireless communication between the card and the security scanner. Technologies, including near field communication (NFC), enable two properly equipped devices to be brought within the required distance, usually one to two inches, and the two devices then connect, authenticate, and complete the intended operations. Using a distance-limited technology such as NFC with these cards has benefits.

Smart cards are increasingly becoming part of comprehensive campus security programs. Among the uses are tracking access to campuses to reduce crime and risk, debit card maintenance and promoting easy purchases on and around the campus, facilities access, library resource and equipment checkout, attendance verification for compliance reporting, and numerous others. These systems not only know whether an individual has access to a research facility, but also on what days and times. Changing or removing access is nearly instantaneous. Although communication with backend servers is an important component of these systems, on-premises caching of information is often used in the event of communication or power failures until resynching and interactivity is restored.

The microprocessors built into leading cards today can execute software associated with the purpose of the card. For example, they can be programmed to detect anomalies that could indicate attempted theft or counterfeiting, and to then cease operation. In a set of predetermined circumstances, they could be configured to require separate methods of authentication by the holder—including prompting for additional information or even fingerprint verification—before conducting the transaction.

Excellent smart card systems are not cheap. On a total-cost-of-ownership basis and when incorporating a risk-benefit analysis, however, they are very good investments for campuses seeking to promote safety and security. Increasingly, smart cards can legitimately be called “one cards” because they consolidate numerous functions into a single technology-enabled solution that is more robust and secure than predecessors. This is yet another area where holding onto older, legacy solutions is misplaced. The benefits, including safety, security, and added functionality, more than outweigh the costs. At a minimum, smart cards should be in the planning stages at all institutions.

This article originally appeared in the College Planning & Management October 2018 issue of Spaces4Learning.

About the Author

David W. Dodd is vice president of Information Technology and CIO at the Stevens Institute of Technology in Hoboken, NJ. He can be reached at 201/216-5491 or [email protected].

Featured

  • Geometric abstract school illustration

    How Design Shapes Learning and Success

    Can the color of a wall, the curve of a chair, or the hum of fluorescent lights really affect how a student learns? More schools are beginning to think so.

  • Rhode Island Boarding School Completes Student Dorm Renovations

    St. George’s School in Middletown, R.I., recently announced the completion of a $26-million renovation project on Arden-Diman-Eccles Dormitory, according to a news release. The school partnered with Voith & Mactavish Architects (VMA) on the new space, which places a new focus on collaborative community spaces open to both boarding students and day students.

  • Image courtesy of Kahler Slater

    UW–Madison Announces Completion of Morgridge Hall

    The University of Wisconsin–Madison recently announced that construction is complete on Morgridge Hall, a new academic building, according to a news release. The facility opened September 3 at the start of the fall semester, consolidating the School of Computer, Data & Information Sciences into a single facility for the first time.

  • Kimball International Releases Curated Design Support Program

    Commercial furnishings company Kimball International recently announced the launch of a new end-to-end design support program, DesignSuite. According to a news release, its goal is to guide architecture & design professionals and dealer partners through the process from vision to specification.