Reading comprehensive tamper-proof and tapping process

  • Thread starter askingquestion
  • Start date
In summary, the conversation discusses the meaning of "tamper proof" and "tapping process" in relation to the invention of the smart card. This invention, first introduced by German engineer Helmut Grottrup in 1967, aimed to provide secure copy-protected keys for accessing fuel at unmanned gas stations. The term "tamper proof" means that the card cannot be imitated, faked, or broken, while "tapping process" refers to the transfer of fuel from a pump to a vehicle. The conversation also mentions the use of tamper-proof protection on medication bottles, which was implemented after the Tylenol poisoning cases in Chicago in 1982.
  • #1
askingquestion
5
0
I am not English native.

So what are the meaning of the underlined words:
The idea of incorporating an integrated cirucit chip onto a plastic card was first introduced by the German engineer Helmut Grottrup.. In February 1967, Grottrup filed the patents DE1574084 and DE1574075 in West Germany for a tamper-proof identification switch based on a semiconductor device and described contactless communication via inductive coupling. Its primary use was intended to provide individual copy-protected keys for releasing the tapping process at unmanned gas stations. In September 1968, Grottrup, together with Jurgen Dethloff as an investor, filed further patents for this identification switch, first in Austria and in 1969 as subsequent applications in the United States, Great Britain, West Germany and other countries.
 
Physics news on Phys.org
  • #2
From Wikipedia: smart card value
 
  • #3
Welcome to PF.

Wikipedia is different in different languages.
Please give the web link to the site you use.

"Tamper proof" = Cannot be imitated, faked, or broken.
"Tapping process" = access to fuel from the pump.
 
  • #6
An example of tamper-proof is the protective wrapper on an aspirin or Tylenol bottle. This came about after the Tylenol poisoning cases in the US in 1982 in Chicago.

https://en.wikipedia.org/wiki/Chicago_Tylenol_murders

When you unscrew the cap you have to break through the wrapper before you can dispense the caplets or pills.

It’s very hard to do so and once done it’s clear to anyone that someone has opened the bottle. Hence tamper-proof protection.
 
Last edited:

FAQ: Reading comprehensive tamper-proof and tapping process

```html

What is a tamper-proof reading process?

A tamper-proof reading process is a method designed to ensure that data or information being read cannot be altered or tampered with during the reading process. This is typically achieved through cryptographic techniques, secure hardware, and rigorous validation protocols.

How does a tapping process work in data security?

A tapping process in data security involves monitoring and capturing data as it is transmitted over a network or communication channel. This can be done for legitimate purposes, such as network diagnostics, or for malicious purposes, such as eavesdropping. Secure systems employ encryption and other safeguards to prevent unauthorized tapping.

What technologies are used to ensure tamper-proof data reading?

Technologies used to ensure tamper-proof data reading include cryptographic hash functions, digital signatures, secure hardware modules like TPMs (Trusted Platform Modules), and blockchain technology. These technologies work together to verify the integrity and authenticity of the data.

Why is tamper-proof reading important in cybersecurity?

Tamper-proof reading is crucial in cybersecurity because it ensures that data remains unchanged and trustworthy from the point of creation to the point of consumption. This is essential for maintaining the integrity of sensitive information, such as financial records, legal documents, and personal data, thereby preventing fraud and unauthorized alterations.

Can tamper-proof and tapping prevention methods be combined?

Yes, tamper-proof and tapping prevention methods can be combined to create a more secure system. For example, data can be encrypted to prevent unauthorized access (tapping) and digitally signed to ensure that it has not been altered (tamper-proof). Combining these methods provides a comprehensive approach to data security.

```
Back
Top