DisCard – Mobile Application for Digitized Contactless Smart Cards Using Near Field Communication
DOI:
https://doi.org/10.61841/je0mpr59Keywords:
Contactless Card, Green Computing, Mobile Application, Near Field Communication, Radio Frequency IdentificationAbstract
This paper proposes an online account for storing digitized copies of physical smart cards on the cloud, that are otherwise used for access credentials, subscription to various services, or loyalty programs. Instead of needing to carry around multiple cards for different purposes, or installing multiple separate applications, they can all be accessed by logging into the DisCard application on your chosen mobile device, which will use NearField Communication technology in order to emulate the physical card when swiped and scanned. How this application will work is explained, and why the author believes it is better than the currently implemented solution, being physically carrying multiple separate plastic cards with embedded chips. Afterwards, a few papers on related topics are reviewed, with said relation to the application presented, discussed. Results of exploratory surveys indicating viability in the consumer market is analysed and discussed. Positive impacts of switching to digital cards rather than physical ones are then brought to light, such as reduction of plastic waste being beneficial to the environment. Future ideas on improvements as well as limitations of the current application proposed are shown
Downloads
References
[1] MarketsandMarkets, “Smart Card Market worth 21.57 billion USD by 2023,” 1 June 2018. [Online].
Available: https://www.marketsandmarkets.com/PressReleases/smart-card-market.asp. [Accessed 26 April
2019].
[2] International Organization for Standardization, “ISO/IEC 7810:2003 - Identification cards -- Physical
characteristics,” 2003. [Online]. Available: https://www.iso.org/standard/31432.html. [Accessed 26 April
2019].
[3] B. Ozdenizci, M. Alsadi, K. Ok and V. Coskun, “Classification of NFC Applications in Diverse Service
Domains,” International Journal of Computer and Communication Engineering, vol. 2, no. 5, pp. 614-620,
2013.
[4] I.R. Adeyemi and N. Bt. Ithnin, Users Authentication and Privacy control of RFID Card, 1 ed., Kuala
Lumpur: Universiti Teknologi Malaysia, 2012.
[5] T. Haver, Security and Privacy in RFID Applications, 1 ed., Trondheim: Norwegian University of Science
and Technology, 2006.
[6] J.K. Marci Meingast, “Security and Privacy,” Journal Of Communications, vol. 2, no. 7, pp. 36-48, 2007.
[7] C. Le Guern, “When The Mermaids Cry: The Great Plastic Tide,” Coastal Care, 1 March 2018.
[8] K. Finkenzeller, RFID Handbook: Fundamentals And Applications In Contactless Smart Cards, Radio
Frequency Identification And Near Field Communication, 1st ed., Chichester, West Sussex: John Wiley &
Sons, Ltd, 2010.
[9] TruCert Ltd, “Carbon Footprint of the Card Industry,” 20 June 2012. [Online]. Available:
http://www.icma.com/ArticleArchives/CarbonFootprint_SE2-12.pdf. [Accessed 29 April 2019].
[10] A. Géczy, G. Horváth, L. Dudás, L. Gál, I. Hajdu and G. Harsányi, “RFID cards on biodegradable
substrates - Realization aspects and future trends,” 2015 38th International Spring Seminar on Electronics
Technology (ISSE), vol. 1, no. 1, pp. 52-56, 2014
[11] The Star Online, “One card for all,” 1 February 2010. [Online]. Available:
https://www.thestar.com.my/lifestyle/features/2010/02/01/one-card-for-all/. [Accessed 26 April 2019].
[12] P.H. Yeow, W.H. Loo and S.C. Chong, “Accepting Multipurpose “Smart” Identity Cards in a Developing
Country,” Journal of Urban Technology, vol. 14, no. 1, pp. 23-50, 2007.
[13] A. Bodake, V. Baviskar, A. Bodake, S. Bhoite and N. J. Kulkarni, “Multipurpose Smartcard System,”
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1,
no. 9, pp. 175-178, 2012.
[14] J. Welikala, D. Fowler and P. Swatman, Introducing Multi-purpose, Multi-function Smart Cards to
Australian Universities, Melbourne, Australia: Monash University, 1999.
[15] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760, ISSN
Online: 2162-2086, DOI: 10.4236/tel.2019.94049, which is in B category of ABDC. List.
https://www.scirp.org/journal/Home.aspx?IssueID=12251
[16] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The
Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997, which is in C category of
ABDC List. http://www.eel.my100megs.com/volume-18-number-3.htm
[17] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International
Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014. URL: Https://Dl.Acm.Org/
Citation.Cfm?Id=2628938; DOI: 10.4018/ijbir.2014010105, which is in C category of ABDC List.
[18] P. Mary Jeyanthi, “Industry 4.O: The combination of the Internet of Things (IoT) and the Internet of People
(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-
9785.
[19] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An
Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN
Online: 2350-1111 (Online). URL: http://www.i3cpublications.org/M-IJTS-061801.pdf
[20] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in
Financial Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, ISSN 2319-
8702(Print), ISSN 2456-7574(Online). URL: http://vips.edu/wp-content/uploads/2016/09/Special-IssueVJR-conference-2018.pdf Page no: 159-164.
[21] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization
Approach”, International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.
[22] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision
Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-
2013. URL: https://www.ijert.org/browse/volume-2-2013/august-2013-edition?start=140
[23] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic
Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and
Communication Engineering, Volume 3, Issue 3, March-2014. URL: https://ijarcce.com/wpcontent/uploads/2012/03/IJARCCE7F-a-mary-prem-A-NEW-IMPLEMENTATION.pdf
[24] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical
Study”, International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.
URL: http://www.hindex.org/2015/p1258.pdf
[25] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud
Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)
[26] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment
generation in the field of UPVC widows” (ICSMS2019).
[27] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across
emerging countries”, International Conference on Sustainability Management and Strategy”
(ICSMS2018).
[28] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International
Conference on Business Management and Information Systems” (ICBMIS2015).
[29] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International
Conference on Mathematics in Engineering & Business Management (ICMEB 2012)
[30] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear
Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering
& Business Management (ICMEB 2012).
[31] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision
Making”, 2011 IEEE International Conference on Computational Intelligence and Computing Research
(2011 IEEE ICCIC).
[32] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome
the Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing
Research (2011 IEEE ICCIC).
[33] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing
and Communication Technologies. (SCCT-2015)
[34] Dr.P. Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm
for Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019
[35] Dr.P.Mary Jeyanthi, “Customer Value Management (CVM) – Thinking Inside the box” – ISBN: 978-93-
87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.
[36] Jeyanthi, P.M., & Shrivastava, S.K. (2019). The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.