M.O.S.T. Card® C7 Series
High Security Microprocessor Smart Card
Designed for High Security Identification and Multi-Functionality
- AES-128, AES-192, AES-256, 3DES Encryption
- SHA-1, SHA-256, HMAC Mutual Authentication/ Data Integrity
- Up to 144k Bytes User Memory
- Global PIN with block and unblock features
- Special transport keys for lifecycle control
- Forensic information command
- Cyclical, Purse and Linear Files
- E-Purse/ E-Payment functionality
- Extended file sizes that breaks the 32k Byte barrier set by ISO
- T=0 or T=1 protocols
|Our Price||Call for price
+1 949 380 1312
Call to purchase +1 949 380 1312
M.O.S.T. Card C7 Overview
The M.O.S.T. Card® C7 is a highly secure yet affordable microprocessor-based smart card with advanced security features and up to 144k bytes of EEPROM user memory. The M.O.S.T Card C7 is specially designed for high-security identification, multiple on-card applications and large on-card data management systems. Applications include National IDs, Civil IDs, Military IDs, Drivers Licenses, Voter IDs, sophisticated employee badges with Single Sign-On capability, multi-modal biometric credentials with e-signature functionality, and applications that require larger storage such as a health record card (EHR). The M.O.S.T. Card C7 offers an advanced smart card system while benefiting from rapid, easy and affordable smart card development thanks to powerful middleware, SDKs, and innovative personalization software. The M.O.S.T. card platform allows easy design of a smart card program that grows with your needs, supporting multiple functions, applications, and readers-all while maintaining the highest of security standards. The M.O.S.T. C7 family can be configured for high security identifiers, including biometrics and e-purse functions.
Advanced Security Features — Including SHA-256, HMAC and AES Encryption
The M.O.S.T. Card C7 is powered by CardLogix' proprietary M.O.S.T Card Operating System which supports a variety of security measures, including SHA-1 bi-directional/ mutual authentication, SHA-256, HMAC, AES 128, AES 192, AES 256, 3DES (triple DES), APP and CHV PIN/passwords, and internal random number generation for unique e-signatures and transaction sessions. The OS is built with an error detection code and security self-tests. The EAL certified silicon provides continuous encryption of all data and the virtualization of the data across the non-volatile memory. The M.O.S.T. OS also features built-in anti-tearing mechanisms to support heavy transactional environments.
Up to 144k of EEPROM User Memory
The M.O.S.T. Card C7 family offers up to 144k bytes of user memory. The large EEPROM increases available user memory and card functionality, enabling the creation of advanced security files and multiple applications on one card. The C7 family allows a user to safely store and transmit a large amount of personal and sensitive data, including biometrics — data too vulnerable to manage over a loosely protected network. The M.O.S.T. Card C7 is capable of managing card holders' and card issuers' data on the card so that physical access controls systems, loyalty, e-payment and strong national ID, civil ID and in-the-field military identification systems can benefit from a secure, closed system that does not depend on being connected to a network at all times.
PKI Security Features at Affordable Symmetric Key Card Prices
The M.O.S.T. Card C7 leverages high security features typically found in Public Key Infrastructures (PKI), such as transport keys, AES encryption, and HMAC-SHA 256 for authentication and data integrity. PKI cards are priced, on average, 300% more than symmetric key cards. With the M.O.S.T. Card C7 series, you can get PKI security at the price of a symmetric key card, saving you money without sacrificing reliability and security. The Advanced Encryption Standard (AES) and HMAC-SHA 256 are the strongest encryption/ authentication algorithms to date. With the M.O.S.T. Card C7 series, your data will remain 100% confidential no matter where it is exchanged, and you will be able to reliably identify the source of and ensure the integrity of the message through randomly generated e-signatures. In addition, special transport keys ensure that data is secure across locations and along the card's life cycle.
Injectable AES Keys with Admin Password — Ideal for Physical Access Control Systems
The M.O.S.T. C7 features an administration password with injectable AES keys that provide secure flexibility in applications that require password and system updates. With the M.O.S.T. Toolz™ Card Configuration Utility, the card issuer is able to create an administration password file, protected by a strong CHV password that cannot be accessed or changed once created. With the Admin Password File, an authorized security systems control manager can add injectable AES Keys if the door locks get changed or should any password modifications be needed. This allows the manager the scalability to safely update his or her physical access control system without having to re-issue cards.
Fast, Easy and Secure Smart Card Development
CardLogix has provided a complete line of user-friendly development tools to create both custom and pre-configured smart card applications. Project development for the M.O.S.T. Card C7 is supported by the PCSC API and the M.O.S.T. Toolz™ Card File Creation Utility SDK, including the powerful Winplex® API. The M.O.S.T. Toolz File Creation Utility features an intuitive user-interface that allows a card issuer the flexibility to design a M.O.S.T. Card file structure and set passwords that fit the needs of any custom smart card program. M.O.S.T. Toolz also provides intelligently constructed, pre-configured idblox™ applications, leveraging the M.O.S.T. Card Operating System. With this option, a card issuer's only job is to set up passwords. Smart card development could not get any easier.
Eliminate the need to hire a graphic designer by starting with one of CardLogix' professionally designed, pre-printed ReadyStart™ Secure Cards or Holofoil Cards, with embedded 2D holograms. Both use high security graphic printing technology that provides additional levels of physical security to your M.O.S.T. Card®
True Software and Hardware Interoperability
The M.O.S.T. Card C7 family is future-proofed, working on multiple silicon vendors' devices so that your projects are always supported. The card family is part of the idblox™ ecosystem which has attracted multiple vendors for compatible smart card readers, smart card terminals, smart card applications and all other smart card infrastructure components.
Seamless Biometric Enrollment with Raven™ Biometric Enrollment Platform
CardLogix is strategically partnered with Corvus Integration, Inc., experts in biometric enrollment and biometric verification technologies, to bring you the simplest way to register personnel's biometric information and load it onto a smart card within minutes. With Corvus' Micro Booking Station, GIERS, PIK biometric enrollment and verification kits, biometric data is easily captured and transferred to The Card Encoding Engine™ for instant smart card encoding. A biometrically enhanced smart card provides the highest security and protection of personnel, data and valuable assets. With the M.O.S.T. Card C7, your organization can benefit from this level of security without having to spend more money than it's worth.
Learn how Corvus Integration's Raven™ Biometric Enrollment Platform connects with the Card Encoding Engine™ to enable instant inline enrollment and personalization for a biometrically enhanced M.O.S.T. Card®
Rapid Smart Card Personalization and Encoding — No Programming Required
The M.O.S.T. Card family is supported by the latest innovation in smart card personalization — The Card Encoding Engine™. The Card Encoding Engine is the first of its kind to offer smart card encoding without requiring programming in order to do so. This revolutionary software engine is the cornerstone of idblox™, allowing inline creation of a smart eID card program from design to use without relying on programmers, integrators or system designers.
Learn more about the idblox™ ecosystem, the only smart card ecosystem with true interoperability that enables the fastest, easiest and most affordable creation of high-security smart card programs for any card application.
Multiple Applications on One Card
With the M.O.S.T. Card C7, your organization can benefit from the economies of scale achieved by using one card for multiple purposes. Why settle for a single-purpose memory card when a company can combine a physical access control system (PACS), customer loyalty program, multi-factor identification, e-payment system, single sign-on, and player/ customer tracking onto one company-branded M.O.S.T. Card for the same price or less as a memory card? Improve your organization's security by arming your employees with the M.O.S.T. Card to handle multi-factor authentication and non-refutable identification. Use the same card to control facility access rights, to institute an employee incentive program, and to protect classified or sensitive data. The application possibilities are endless, and the M.O.S.T. Card C7 can handle it all to meet any of your organization's needs.
M.O.S.T. Card C7 Options
The M.O.S.T. Card C7 Microprocessor Smart Card is available in the following sizes:
- CLXSU064KC7/AED (8k Bytes)
- CLXSU128KC7/AED (16k Bytes)
- CLXSU256KC7/AED (32k Bytes)
- CLXSU512KC7/AED (64k Bytes)
- CLXSU640KC7/AED (80k Bytes)
- CLXSU102MC7/AED (128k Bytes)
- CLXSU115MC7/AED (144k Bytes)
Cras eu cursus dolor. Vestibulum ornare libero felis, bibendum aliquam ipsum faucibus sed. In sed ornare orci, ornare dignissim nulla. In hac habitasse platea dictumst. Nunc volutpat et sem nec cursus. Proin in cursus sapien, vel aliquet odio. Aenean dapibus urna tellus, quis lacinia justo vestibulum ac.
Proin non egestas eros. Mauris cursus id dolor vitae feugiat. Maecenas pretium ante id tempus rhoncus. Proin ultricies ac libero at vestibulum. Suspendisse potenti. Etiam leo massa, adipiscing vel odio volutpat, interdum auctor ante. Aenean vitae enim nulla. Nam magna libero, feugiat vel vulputate ac, dapibus vel augue.
M.O.S.T. Card C7 Specifications
- Operating voltage range: 1.62V to 5.5V (ISO 7816 Class A, B, and C)
- CRC16 and CRC32 engines are compliant with ISO/IEC 3309
- Global unique card identifier system (GUID) is compliant with ASN.1 Object Identifier components (ITU-T Rec. X.667 | ISO/IEC 9834-8, and with IETF RFC 4122)
- Conforms to FIPS 197
- Authentication mechanisms are fully compliant to Secure Hash Standard (SHS) FIPS PUB 180-4
- Conforms to (HDLC) procedures ISO/IEC 13239:2002
- Programmable passwords for all access modes: read, write, update, invalidate and rehabilitate
- Data retention > 10 years
- Endurance: maximum of 16.5 million programming cycles at 25° C
- Electrostatic discharge protection > 6,000V
- Master File (MF)
- Directory File (DF)
- EF Transparent File
- EF Large File Size
- Linear, Cyclical, and Purse Files
- APP & CHV Password Files
- Master CHV File
- Admin Password with Injectable AES Keys
- Long File Name
- SHA-1, SHA-256
- DES, 3DES
- AES-128, AES-192, AES-256
- A wide variety of user memory sizes
- PC/SC compatible
- Negotiable communication speed (PTS)
- Rapid card development through M.O.S.T. Toolz™
- Multiple reader and terminal choices
- T= 0 or T= 1
- ISO 7816 1-4
Dedicated Semiconductor and Operating System Countermeasures Guard Against:
- Side channel attacks
- Advanced fault attacks
- Velocity checking
- Voltage attacks
- Frequency attacks
- Temperature glitch attacks
- Optical attacks
Custom Card Security Options
- Laser engraving/indenting
- Guilloche and rosettes
- Optically Variable Devices (OVDs) and holograms
- Hidden Card Validator™ graphics with lens viewer
- Ultraviolet (UV) ink
Learn more about CardLogix pre-printed 2400 DPI ReadyStart™ Secure Cards and pre-stamped Holofoil Cards.
M.O.S.T. Card C7 Applications
- Loyalty Cards
- Healthcare (EMR)
- Cashless Vending
- Public Transit
- Charging the money card (e-purse)
- Enterprise Badging
- e-Passport personalization & verification
- PKI (public-key infrastructure) Applications
- e-Commerce (online payment)
- Secure network access
- Electronic voting
- Computer security (log in access)
- Energy Management
- Border Crossing
- Access Control System
- Time and attendance System
- Hazmat Cards
- Set-Top Cards
- Debit Cards, ATM Cards, Credit Cards
- Driving License
- Petrol Card
- National ID Cards
- NFC Payment
M.O.S.T. Card C7 Support
About CardLogix Corporation
CardLogix is an ISO-certified smart card manufacturer, software developer, and the premier provider of smart card technology with a comprehensive line of SDKs and tools that enable easy and rapid development of high quality smart cards. Since 1998, CardLogix has supplied millions of cards and card components to over 42 countries around the world. As an expert in smart card and chip technology, card operating systems, card software, development tools, and middleware, CardLogix has continuously been at the forefront of smart card technology.
CardLogix' mission is to make highly secure, high quality smart card systems more widely available to customers in need. CardLogix strives to make data transactions more secure, personnel and assets more protected, and to turn otherwise complex and expensive smart card systems into simpler, more cost-effective, and easier-to-develop solutions for everyone.
Trust is the primary commodity that CardLogix trades in every day. CardLogix builds and maintains customers' confidence their products and processes, so that they can trust our cards to reliably protect personnel, sensitive data, and their most valuable assets. Starting with development software that's flexible and easy to use to uncompromising customer support, CardLogix delivers on the promise of trust that our service inspires and our cards guarantee. Our company culture breeds initiative, commitment, and follow-through. As a global supplier and active industry participant, CardLogix understands the importance of being a responsible global business. With recycling, energy conservation, and full RoHS compliance, the company meets its goals with the environment in mind.
- Experts in smart card technology with an understanding of what it takes to get a card project from A to Z
- Commitment to ISO, ICAO, and industry conformance to ensure performance and interoperability
- Extensive partnerships with companies that offer complementary smart card infrastructure components
- Innovative products and solutions that simplify smart card development
- Cutting edge technology, sophistication and differentiated quality at a fraction of competitors' costs
- Continuous customer support and involvement with evolving card projects
CardLogix manufactures high security and multi-functional ISO compliant smart cards, powered by CardLogix' own operating systems. CardLogix offers easy-to-use SDKs for programmers, powerful middleware and APIs, a variety of applications software, and innovative solutions that empower end-users to develop and personalize smart cards without requiring any user-programming. The company partners with key suppliers in software, biometric capture, readers, and printers to deliver complete, leading-edge solutions. CardLogix smart card platforms provide solutions for multiple applications to markets globally, such as national, civil, voter and enterprise identity; physical and logical access cards; stored value; loyalty and rewards programs; e-purse; gaming, healthcare and other solutions that use a combination of multiple applications onto one card.
- AES (Advanced Encryption Standard)
- A symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. The National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the algorithm, called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of five algorithms under consideration, including one called MARS from a large research team at IBM.
- A card feature which protects the contents of memory if the card is removed before the end of the transaction.
- API (Application programming interface)
- A source code interface that a computer system or program library provides to support requests for services to be made of it by a computer program. An API differs from an application binary interface in that it is specified in terms of a programming language that can be compiled when an application is built, rather than an explicit low level description of how data is laid out in memory.
- Cardholder Verification.
- DES (Data Encryption Standard)
- A widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. For each given message, the key is chosen at random from among this enormous number of keys. Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key.
- Electronic Health Record (EHR or EMR)
- An electronic health record is a collection of patient health information generated by one or more meetings in any care delivery setting. An EHR typically includes patient demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. It'ss said to streamline clinicians's workflow, and it has the ability to generate a complete record of a clinical patient encounter.
- E-purse (electronic purse)
- A smart card can be used to store a monetary value for small purchases. Card readers retrieve the amount currently stored, and subtract the amount for the goods or services being purchased. Groceries, transportation tickets, parking, laundromats, cafeterias, taxis and all types of vending machines are only some of the purchases that often do not reach amounts to justify the hassle of using a credit card (a cash card reader does not require a permanent phone connection with a host computer). Radio-read smart cards will allow the free flow of people through transportation systems, avoiding the need of ticketing machines or validation gates.
- FIPS (Federal Information Processing Standards)
- A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
- A memory chip that can be reprogrammed any number of times, as to correct bugs, by first clearing its contents with ultraviolet light.
- GUID (Global Unique Identifier)
- A unique reference number used as an identifier in computer software. The term GUID typically refers to various implementations of the universally unique identifier (UUID) standard. A smart card can register support for an interface through association with the interface's (GUID). This binding between a card and an interface is done at the time the card is first introduced to the system&emdash;typically when the SCSP is installed. Once the card is introduced to the system, applications can search for smart cards, based on a specific interface or GUID. For example, a cash card could make itself available to Windows-based applications by registering interfaces to access its purse scheme.
- HMAC stands for Hash-based MAC. It works by using an underlying hash function over a message and a key. Commonly used hash functions are MD5 and SHA-1. As computers become more and more powerful, increasingly complex hash functions will probably be used. Furthermore, there are several generations of SHA hashing functions (SHA-256, SHA-384, and SHA-512) which are currently available but not very widely used as their added security is not yet believed to be needed in everyday transactions.
- ISO (International Standardization Organization)
- An organization that sets standards in many businesses and technologies, including computing and communications.
- A chip that serves as the Central Processing Unit controlling a computer. It provides programmable intelligence.
- PC/SC (Personal Computer/Smart Card)
- A specification for smart-card integration into computing environments. Microsoft has implemented PC/SC in Microsoft Windows 200x/XP and makes it available under Microsoft Windows NT/9x. A free implementation of PC/SC, PC/SC Lite, is available for Linux and other Unixes; a forked version comes bundled with Mac OS X.
- PKI (Public key infrastructure)
- Enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.
- SHA-1 (Secure Hash Algorithm)
- A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm.
- SHA-256 (Secure Hash Algorithm)
- In cryptography, SHA-2 is a set of cryptographic hash functions in 224, 256, 384 or 512 bits designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard.
- SDK (Software Development Kit)
- A package of pre-written code that developers can re-use in order to minimize the amount of unique code that they need to develop themselves. SDKs can help to prevent unnecessary duplication of effort in a development community.
- A character-level transmission protocol, defined in ISO/IEC 7816-3. T=0 requires 2 request/response pairs per command (send command and get response saying got command, then a command to get the response and then the actual response).
- A block-level transmission protocol, defined in ISO/IEC 7816-3. T=1 is newer than T=0. The block-oriented T=1 protocol is a half-duplex protocol and works with error detection (EDC) at the end of block.
- 3DES (Triple DES)
- Triple DES is a minor variation of this standard. It is three times slower than regular DES but can be billions of times more secure if used properly. Triple DES enjoys much wider use than DES because DES is so easy to break with today's rapidly advancing technology. This just serves to illustrate that any organization with moderate resources can break through DES with very little effort these days.