Sherr, S., Durbeck, R.C., Suryn, W., Veillette, M. “Input and Output” The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000 89 Input and Output 89.1 Input Devices Keyboards ? Light Pen ? Data Tablet (Graphics, Digitizer) ? Mouse ? Trackball ? Joystick ? Touch Input ? Scanners ? Voice ? Summary ? Advantages and Disadvantages 89.2 Computer Output Printer Technologies Classification of Printer Technologies ? Page Printer Technologies ? Serial Nonimpact Printer Technologies ? Impact Printer Technologies 89.3 Smart Cards Hardware Architecture ? Contact ICC, Contactless ICC ? Operating Systems ? Standards ? Applications ? Readers ? Card-to-System Solutions?Trends 89.1 Input Devices 1 Solomon Sherr Input devices are those portions of computer, data processing, and information systems that perform the essential function of providing some means for entering commands and data into the system. Therefore, input devices are found in all such systems, but are treated here as a separate equipment group, independent of the total system configuration. However, the place of input devices in a representative computer system may be clarified by reference to Fig. 89.1(a), which shows the interface of the main input device categories in relation to the portions of the generalized system that accept the inputs. The categories and the devices listed in Table 89.1 are the subject of this section. Keyboards Keyboards are essentially electromechanical devices, and are still ubiquitous, in spite of the inroads of other input devices. The primary type of keyboard in use as an input device is the alphanumeric (A/N) form, well known in its typewriter application, but with various additions and expansions consisting of numeric and special function keys. This type of keyboard is shown in Fig. 89.1(b) with a standard QWERTY format, so named because of the layout of the top left alpha keys, for the A/N portion, a separate numeric set to the right, and a group of function keys at the top. Other layouts for the A/N portion have been proposed and at least one (Dvorak) accepted by the American National Standards Institute (ANSI), but it has not received much use in spite of its advantages in increased efficiency. At present, the overwhelming majority of system keyboards still use the QWERTY layout, and it is the only one considered here. As illustrated in Fig. 89.1, a keyboard consists of a number of keyswitches whose exact structure is of prime importance in keyboard design. The relevant characteristics of keyswitch operation are life, actuation force, travel distance, and feedback. Accepted values are shown in Table 89.2 for different keyswitch designs. The elastomer type is preferred to a limited extent over the other two when the electronic audio feedback is included. This indicates that some type of audio feedback is desirable. One form of keyswitch design using an elastomer 1 The material contained in this section is a shortened version of that which appears in Electronic Displays, 2nd ed., by Sol Sherr, Chapter 6, Section 6.1, 1993, published by John Wiley & Sons, Inc., and is reprinted here by permission. Solomon Sherr Westland Electronics Robert C. Durbeck IBM Corporation Witold Suryn Gemplus Michel Veillette Gemplus ? 2000 by CRC Press LLC ? 2000 by CRC Press LLC A RT OF C OMPILING S TATISTICS Herman Hollerith Patented January 8, 1889 #395,781 n excerpt from Herman Hollerith’s patent application: Having thus described my invention, what I claim as new is (1) The improvement in the art of compiling statistics, which consists in first preparing a series of separate record-cards, each card representing an indi- vidual or subject; second, applying to each card at predetermined intervals circuit-controlling index points arranged according to a fixed plan of distribution, to represent each item or characteristic of the individual or subject, and third, applying said separate record-cards successively to circuit-controlling devices acted upon by the index-points to designate each statistical item represented by one or more of said index-points, substantially as described. This patent, along with two others, describes a system for tabulating statistical items represented by holes punched in cards. The 1890 U.S. census was completed $5 million under budget and two years ahead of schedule because of Hollerith’s system. The punch card system with encoded holes (the code for representing alphanumeric characters with holes was named after Hollerith) was widely used for sorting, counting, and tabulating even into the 1980s. Hollerith’s original Tabulating Machine Company was the forerunner to the computer giant, IBM. (Copyright ? 1995, DewRay Products, Inc. Used with permission.) A TABLE 89.1 List of Input Devices Category Designation Operation Mode Keyboard Alphanumeric Electromechanical Keyboard Function Electromechanical Pointing Light pen Screen pointing Pointing Touchscreen Screen pointing Pointing Pen tablet Tablet pointing Coordinates Digitizer X-Y conversion Coordinates Data tablet X-Y location Cursor Mouse Movement Cursor Trackball Movement Cursor Joystick Movement Image Scanner Conversion Verbal Voice Conversion FIGURE 89.1 (a) Generalized display-system block diagram. (Source: After S. Sherr, Electronic Displays, New York: John Wiley & Sons, 1979.With permission.) (b) Alphanumeric keyboard. (Courtesy of Key tronic.) TABLE 89.2 Keyboard Parameter Values Parameter Snap Switch Elastomer Foam Pad Key travel 3.8 mm 3.2 mm 3.8 mm Force >60 gm >50 gm >30 gm Life 10 million cycles 10 million cycles 10 million cycles Feedback Audio mechanical Audio electric Tactile ? 2000 by CRC Press LLC or “molded boot” is shown in Fig. 89.2(a), in which the boot consists of two collapsible domes. In this design, the internal movement of the keyswitch is completely silent so that some source of sound must be added to achieve the desired audible feedback. The snap switch design shown in Fig. 89.2(b) has built-in sound and achieves a small reduction in insertion errors over the elastomer design with audio feedback. The life requirement is estimated on the basis of workstation users operating at approximately half the accepted rate of 20 million actuations per key used for electronic typewriters. The actual layout and content of the keyboard may vary greatly, ranging from the standard typewriter arrangement, through different com- binations of alphanumerics and symbols, to the special-function keyboards that contain legends and symbols specific to the particular application. However, the outputs of each type are the same in that they must contain coded signals that relate the action to be performed by the information system to that defined by the key being operated, in terms of the input code of the system. Thus, many of the keyboards output the ASCII code, and the system is usually designed so that it can accept this type of standard code. Incidentally, ASCII, the acronym for American Standard Code for Information Interchange, is the standard means for encoding alphanumerics and a group of selected symbols for transmission to a display system, among others. It is the standard code used in the United States and most other English-speaking countries and corresponds to the ISO seven-bit code. The seven-bit ASCII is usually used, and it should be noted that for serial data transmission an eighth bit is added for parity. Various keyboard arrangements are possible, and many variants are found in particular applications. The means for coding the key operation may be through magnetic reed relays, solid-state circuits, or more exotic devices such as Hall effect sensors. These device characteristics are only incidental to the operation and beyond the scope of this chapter. Similarly, we do not discuss the human-factors aspects of keyboard design, not because they are not important, but because, apart from the visual considerations, the other factors have to do with tactile and physical features best left to others. Light Pen The light pen initially was a very popular means for accomplishing manual input to the random deflection information display systems, but fell out of favor when raster systems became more popular due to its being FIGURE 89.2 (a) Elastomer-type keyswitch. (b) Snap switch. (Source: After H. Brunner et al., “Effects of key action design on keyboard preference and throughput performance,” Micro Switch. With permission.) ? 2000 by CRC Press LLC somewhat difficult to use with raster systems. This device goes by a misleading name, as it does not emit light and is not a pen other than being somewhat similar to one in its physical appearance, as shown in Fig. 89.3(a). However, when we consider its functional characteristics, the validity of the term becomes apparent, as it is used to cause the electron beam to “write” patterns on the cathode ray tube (CRT) that are defined by the motion of the light pen on the CRT faceplate. The light pen operates by sensing the existence or nonexistence of a pulse of light at the point on the screen of the CRT or surface of any other light-emitting device where the point of the pen is placed. This is accomplished by means of the circuit shown in Fig. 89.3(b), where the light pulse is collected and transmitted through the fiber optics to a light-sensitive device that converts the light pulse into an electrical pulse which is shaped by some form of electronics (of which a Schmitt trigger is one example). We need not concern ourselves with the exact form of the electronics except to note that this pulse is then sent to the computer, as shown in Fig. 89.4, and provides a complete, closed-loop system. As the electronic pulse occurs at the time when the light pulse passes under the light pen, the computer is informed of the location at which the designated operation is to be performed and may proceed accordingly. Thus, the light pen is a pointing device that designates a point on the display screen and can be used as an input device. Various light pen programs have been written to expand the capabilities of the original one, and it should be noted that the light pen is coming back into favor as improvements in accuracy, ease of operation, and reliability occur. There are two characteristics of light pen operation that affect the capabilities of this input device. The first is the sensitivity, given by FIGURE 89.3 (a) Light pen. (Courtesy of FTG Data Systems.) (b) Light pen schematic. (Source: After S. Sherr, Electronic Displays, New York: John Wiley & Sons, 1979, p. 388. With permission.) ? 2000 by CRC Press LLC S = E L m p A p A m m s m f t L (89.1) where E L = illuminance at photodetector, m p = photodetector sensitivity, A p = preamplifier gain, A m = main amplifier gain, m s = Schmitt trigger sensitivity, m f = flip-flop sensitivity, and t L = optical loss. Equation (89.1) may be used to calculate the light output required from the display surface, which may be a CRT or other light-emitting device, but with the limitation that most of the flat panel units are matrix driven and must track the drive sequence in order to know the location of the light pen from the drive pulse timing. When phosphors are involved as for the CRT, vacuum fluorescent displays (VFDs), thin-film electroluminescent (TFEL) units, and color liquid crystal displays (LCDs), the phosphor delays must be entered into the timing, and the total delay is given by E o = E i (1 – e – t/t) (89.2) where E o = voltage at triggering element, E i = voltage equivalent of phosphor light output, t = time, and t = sum of all delays. These delays set limits to the positional accuracy, as the computer tracking the signal will be in error by this amount. Other inaccuracies are due to the dimensions of the optical pickup surface, all of which somewhat negate the simplicity of operation. The result is the parameter values shown in Table 89.3. Data Tablet (Graphics, Digitizer) A very convenient means for data entry, retaining some of the ease of operation of the light pen but with much better accuracy, are the various forms of data tablets available. These tablets differ from the light pen in another significant way in that they do not require a moving spot of light to detect the location of the beam or direct it to a new location. This need for a moving light spot made the light pen difficult to use with the data tablets initially designed to overcome this limitation while still using a device with a pen-like input. The first successful example was the Rand tablet, a digital device that used an X–Y assembly from which a wand placed above some point on the X–Y wire matrix could pick up pulse generator output that fed X and Y electrical pulses into the matrix. By determining the number of pulses in a time period, the location of the wand is established. Another similar device used magnetostrictive rather than electrical signals to accomplish the same result, and this location is converted into display coordinates used to position a cursor on the CRT screen. The cursor may then be FIGURE 89.4 Block diagram of light pen computer system. (Source: S. Sherr, Electronic Displays, New York: John Wiley & Sons, 1979, p. 389. With permission.) TABLE 89.3Light Pen Data Field of View Response Time Sensitivity 0.02–0.08 in. 120–150 ns 0.02–0.04 ft.L ? 2000 by CRC Press LLC used as a visual feedback element so that the operator can correct the position of the wand until the cursor is properly placed. At this time the information from the tablet may also be transferred to either the host computer or the resident desktop or portable computer, as desired. Since the cursor is not used to signal its position to a pickup device, as is the case with the light pen, it may be used with any type of display system, including the non-light-emitting flat panel displays. Another advantage of the tablet is that it may be used to position cursors in the blank areas of the display, where no light pulses are available unless they are specially generated by the light pen. There have been numerous improvements and new developments using a variety of technologies that include magnetostrictive, electromagnetic, electrostatic or capacitive, scanned X–Y grid, resistive, and sonic. Of these, electromagnetic tablets dominate the digitizer market, and sonic is of interest because it does not require a tablet, but most of the other technologies are essentially restricted to touch input devices covered later. As noted previously, electromagnetic is the most popular technology for high-performance digitizer tablets. Operation is based on transformer principles, whereby a conductor carrying ac creates a magnetic field around it that induces a current in a second conductor. The digitizer tablet uses the amplitude and phase of the induced current to determine digitizing data. The tablet contains an X–Y pattern of conductors beneath its surface, in a manner similar to the Rand Tablet, but instead of counting pulses in a time period a circular conductor is used as the pick-up element for the induced current. This coil is placed on the tablet surface, and its position is determined by measuring the phase and amplitude of the current in the coil. Its center is interpolated by sweeping through the X–Y grid lines and demodulating the signal in the coil to determine the phase reversal point, or by calculating this point using digitized data fed into a microprocessor. The X–Y coordinates may be resolved to better than 0.025 mm using either of these two techniques. Figure 89.5(a) is a photograph of a representative digitizer tablet. Another digitizer technology is the one that uses the measurement of the time required for sound waves to travel from a source to movable microphone pickups.This sonic technology has the advantage that no special digitizing board is required, and either a stylus or a cursor can be used as the digitizer. Two sonic sources are contained in an L frame so that both X and Y coordinates can be determined by calculating the time it takes for the sound wave to reach the microphones contained in the pickup device. This calculation is made on the basis of sound traveling at 345 m/s at 20°C, and the accuracy is dependent on stable ambient conditions. This tends to limit the resolution to about 300 lpi, and the accuracy to ±0.1%. The device may also be implemented with a single sonic source as the digitizing means and a pair of microphones located outside the digitizing area. In this case the location of the transducer is calculated by triangulation and converted into Cartesian coordinates. Digitizers are used primarily for inputting accurate coordinate data from maps and engineering drawings. Their high accuracy requirements have led to relatively high prices. Alternative means for inputting data are the data and graphics tablets that meet most input requirements at a lower cost and accuracy. The main technology is still electromagnetic, and the units are essentially the same as the digitizers, but with lower accuracies. However, several of the other technologies have also been used to achieve lower costs. Most successful among them are the capacitive and resistive versions, which may also be used as digitizers. The capacitive units, also termed electrostatic, use capacitive coupling where the coupling between the tablet and the cursor or stylus is determined by the capacitance made up of the tablet surface as one plate and the pickup element as the other. In this case, the capacitance is given by C = f (eA/d) (89.3) where C = capacitance, e = permittivity of dielectric, A = relative area of two plates, d = distance between plates, and f = proportionality factor. A scanned grid approach is used to determine the location of the cursor. As in the electromagnetic tablet, an X–Y grid of conductors is embedded in the tablet, with semiconductor switches on each line providing contact on a scanned basis. The charge flowing from each capacitance is summed through a summing amplifier as shown in Fig. 89.5(b). The resultant voltage peaks twice, once for the X and once for the Y lines, as they are scanned. The peak positions are digitized by means of a counter that starts at the beginning of the scan, and runs at some multiple of the scan rate. The digital values represent the coordinates of the cursor location. ? 2000 by CRC Press LLC Mouse The mouse has gone a long way from its original invention by Engelbart in 1965, through its redesign at Xerox and introduction by Apple as a main input device, and its general acceptance by computer users as an important addition to the group of input devices. It should be noted, in passing, that the mouse is essentially an upside- down trackball, although the latter is now being referred to as an upside-down mouse. However, the trackball came first and is described further in the next section. FIGURE 89.5 (a) Digitizer tablet. (Courtesy of Numonics.) (b) Capacitive technology. (Source: After T. E. Davies et al., “Digitizers and input tablets,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, p. 186. With permission.) ? 2000 by CRC Press LLC Mice contain motion-sensing elements and are operated by moving mechanical or optical elements. One form uses wheels and shafts to drive the sensing elements, as shown schematically in Fig. 89.6. The angular velocity (w) of the wheel and shaft is given by w = V r /R rad/s (89.4) where V r = velocity of wheel and R = wheel radius. The rotation angle (q) is given by (q) = X/R rad (89.5) where X = distance moved. This type of mouse has two sets of wheels and shafts, one for horizontal and the other for vertical motion. A more popular type of mechanical mouse is the one that uses a ball for the motion sensing device, as shown in Fig. 89.7. Again, the velocity of the ball circumference equals the velocity of the mouse, and the angular velocity is given by w = V/R 1 rad/s (89.6) where R 1 = shaft radius. The smaller the shaft the more rapid its rotation for a given mouse velocity. Another form of the ball-and-shaft mouse is the one that uses an optical interrupter, as shown in Fig. 89.8. In this form, the light from the light-emitting diodes (LEDs) is interrupted by the coded disks that are rotated by the shafts, and is then picked up by the phototransistors and converted into the digital signal that represents the disk rotation. An optical interrupter is also used for the optomechanical mouse, and here the interrupter contains a set of slots; as the inter- rupter rotates quadrature signals are created that correspond to the shaft rotation. In addition to the shaft and optomechanical mice, an early form of mouse used multiturn potentiometers connected to the wheels, and the output voltage that represented the motion varied in direct proportion to the mouse motion. The voltage was then converted by means of an analog-to-digital converter into digital form for input to the computer. Finally, there are the true optical mice that use a special surface that is printed with a set of geometric shapes, usually a grid of lines or dots, that are illuminated and focused on a light detector. The most common form uses a grid made up of orthogonal lines, with the vertical and horizontal lines printed in different colors. These colors absorb light at different frequencies so that the optical detectors can differentiate between horizontal FIGURE 89.6Wheel showing velocities and slip angle. (Source: After C. Goy, “Mice,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, p. 225. With permission.) FIGURE 89.7Ball and shaft. (Source: C. Goy, “Mice,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988. With permission.) ? 2000 by CRC Press LLC and vertical movement of the mouse. If such a structure is used as the mouse, then the photodetector will pick up a series of light-dark impulses consisting of the reflections from the mirror surface and the grid lines and convert them into square waves. A second LED and photodetector that is mounted orthogonally to the first is used to detect motion in the orthogonal direction, and the combination of the two inks avoids confusion between the two directions of motion. The system then counts the number of impulses created by the mouse motion and converts the result into motion information for the cursor. This type of mouse has the advantage that no mechanical elements are required. Trackball As noted previously, the trackball uses technology similar to the mouse, but preceded it as an input device. Thus, the comment that it is an upside-down mouse should be reversed. The movable element is housed in an assembly as is shown in Fig. 89.9, and the assembly remains stationary so that much less desk space is required than for the mouse. In addition, the trackball may be mounted on a keyboard so that very little additional desk space is needed. The movable element can be the same as used in the mouse, and the output can be a set of bits corresponding to the coordinates to which the cursor should be driven, or where the command should be carried out. The output format is essentially equivalent to that used for the mouse, and the same protocols are used. The typical trackball has an X and Y optical encoder that generates a pulse for each 0.76 mm of incremental motion of the ball. This means that the pulse train may range from 10 to 2500 pulses per second (pps), depending on how fast the ball is rotated. This is much more rapid than required for satisfactory updates, which need not be greater than about 100 times per second. This can easily be accomodated by the RS-232 protocol using an eight-bit word. Thus, the trackball is an excellent alternative for the mouse, and is rapidly returning to a preferred position as an input device. Joystick The joystick has not achieved much acceptance as an input device for electronic display systems, except for video games, although it has been the preferred control for many types of aircraft. However, it can be used to some extent in display systems other than those used in video games, and therefore warrants inclusion in this section. There are two basic types of joysticks, termed “displacement” and “force-operated”. A typical displace- ment joystick is shown in Fig. 89.10, and may have two or three degrees of freedom. The activating means may vary from as few as four switches mounted 90 degrees apart, to full potentiometers for analog output, and optical encoders for digital output. A third axis may be added by allowing the handle to rotate and drive a third potentiometer. Spring forces of 5 to 10 lbs. are usual for the other two axes, and displacements go from 6 to 30 degrees. FIGURE 89.8Optical interrupter. (Source: C. Goy, “Mice,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, p. 229. With permission.) ? 2000 by CRC Press LLC The force joystick operates by responding to pressure on the handle to generate the X–Y coordinates. It may be either a two- or three-dimensional version, with the same types of handles as for the displacement joysticks. However, it is difficult to use a rotating handle for the third dimension because some force is usually transmitted to the other dimensions causing crosstalk. Therefore, a separate lever is preferred. The force is detected by means of piezoelectric sensors that are bonded to the handle rod, and a voltage source is applied across the network, as shown in Fig. 89.11. The output is taken from the strain gauge and the analog voltage will be proportional to the amount of force. The same type of protocol and output circuitry may be used as for the displacement unit, and both can generate either position or rate data. An exponential curve with a dead zone threshhold is preferred for pulse rates in order to avoid starting pulse rate uncertainties, with the first pulse starting as soon as the threshhold is exceeded. Touch Input Touch input devices come in two basic forms, either placed directly on the display surface, or as a separate panel attached to the computer system. In its second form it is essentially a data tablet differing mainly in that it acts as another display unit with some form of a touch-sensitive surface. In this implementation it is the FIGURE 89.9Trackball. (Courtesy of CH Products,Vista, Calif.) FIGURE 89.10Three-axis displacement joystick. (Courtesy of CH Products, Vista, Calif.) FIGURE 89.11Schematic connections in a force joystick. (Source: After D. Doran, “Trackballs and joysticks,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, p. 260. With permission.) ? 2000 by CRC Press LLC same as the Touchscreen input device, and this discussion concentrates on the technologies used for Touch- screens. There are five different technologies used for touch input devices, which are capacitive or resistive overlays, piezoelectric, light beam interruption, and surface acoustic wave. The system may be divided into the sensor unit, which senses the location of the pointing element, and the controller that interfaces with the sensor and communicates the location information to the system computer. Since the controller is an electronic device that does not use technology different from the computer it is not covered here. The main differences among the different touch input devices are due to the choice of sensor technology, and the discussion concentrates on these technologies. Capacitive. Capacitive overlay technology is illustrated in Fig. 89.12 where a transparent metallic coating is placed over the display screen and the finger or stylus capacitance is sensed to determine the touch location. The overlay may consist of a group of separate sections etched into the surface with each separate section connected to the controller, or a continuous surface con- nected at the four corners. The first form is termed discrete capac- itive, and touch location is determined by having each section sequentially connected to an oscillator circuit where the frequency of oscillations is affected by the pointing device. The oscillation frequency is measured and compared to a stored reference fre- quency. If the frequency difference is large enough then it is rec- ognized as a touch at that location. It is a simple system, but suffers from low resolution and slow response so that it is only practical for menu selection. The analog capacitive system uses the same metallic overlay, but the metallic surface is continuous rather than etched. The connec- tions at the four ends are each connected to a separate oscillator, and the frequency of each is measured and stored. Then when the overlay is touched the change in capacitance will have a different effect on the frequency of each oscillator. These are measured and the differences are used to determine the coordinates of the touch by means of an algorithm. This technique is capable of much higher resolution (250 ′ 250) than the digital approach and is preferred for graphics or other high-density displays. Resistive.Resistive overlay technology requires a more complex assembly consisting of two layers, as illustrated in Fig. 89.13. The layers both contain transparent metallic surfaces and are separated by spacers so that an air gap exists between the layers in the absence of any pressure on the touch panel. The metallic layers face each other and when the outer panel is pressed the metallic layers make contact and form a conductive path at the point of contact. When a voltage is applied between the top of the outer layer and the bottom of the inner layer, the two layers act as a voltage divider, and the voltage at the point of contact may be measured in the X and Y directions by applying the voltage in first one and then the other direction. The measured voltages are then transmitted to the controller where they are converted into coordinates which are then sent to the computer. The panel may be discrete, in which the conductive coating on the top layer is etched in one direction and that on the bottom layer in the other direction, or analog, where the conductive coatings in both layers are continuous. In the discrete case, the panel then acts as an X–Y matrix, and the resolution is determined by the number of etched lines. The analog configuration requires the addition of linearization networks on each edge of the panel so that a large-area resistor is created with a voltage drop in one direction. Other linearization techniques are also possible, but only the four-element system is described here as shown in Fig. 89.14. In this arrangement, one of the layers acts as the large-area resistor and the other as a voltage probe where either can function in either role. For the Y coordinate value the top layer is the voltage probe, and the voltage is applied by the controller to the bottom layer. Similarly, the X coordinate is found by connecting the voltage to the top layer and making the bottom layer into the voltage probe. In either type of system, the resolution can be very high, but the transmissivity is reduced to under 80% due to the multiple layers. FIGURE 89.12Capacitive overlay technology. (Source: After A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.30, 1987. With permission. Courtesy Society for Information Display.) ? 2000 by CRC Press LLC Piezoelectric. The piezoelectric technology uses pressure-sensitive transducers as the means for determining the location of the touch, as shown in Fig. 89.15. The sensor is a glass plate with transducers connected to the four corners. Pressure on the plate causes readings to occur at each of the transducers, which depend on the location of the pressure. Thus, the controller can measure the readings and obtain the coordinates by means of a proper algorithm. This technique allows a high-transmissivity plate to be used that can be curved to follow the CRT face plate curvature, but it allows only a limited number of touch points to be used. Light Beam Interruption.This is a fairly straightforward technology that requires a matrix of light sources and detectors facing each other in the X and Y directions. When the beams from the X and Y light sources are interrupted, this is sensed by the facing light detectors and the signals are sent to the controller. The light beams FIGURE 89.13Resistive overlay technology. (Source: After A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.31, 1987. With permission. Courtesy Society for Information Display.) FIGURE 89.14Four-wire analog resistive. (Source: A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.32, 1987. With permission. Courtesy Society for Information Display.) FIGURE 89.15Piezoelectric technology. (Source: A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.34, 1987. With permission. Courtesy Society for Information Display.) ? 2000 by CRC Press LLC are turned on sequentially by pulsing the LEDs and thus create a full matrix of light beams without requiring each of them to be on continuously. This system does not reduce the screen transmissivity as there is no obstruction of the screen output, but it is limited in resolution to the number of LED detector pairs that can be placed on the periphery of the screen. Another approach to light interruption is to use a rotating beam of light, which has the advantage that only one light source and detector pair is required. This technology is depicted in Fig. 89.16 and consists of a LED and a light detector placed inside a rotating drum which has a slit that allows light to be transmitted outside the drum. The light is swept across the surface and strikes the retroreflectors that sends it back directly to the detector. The beam scan is sampled 256 times on each scan, and Fig. 89.16 shows how two angles of interruption are created, angle B by direct interruption, and angle C by mirror reflection interruption. The result is that the location of the interruption can be calculated by comparing the two angles. Again, there is no obstruction of the screen but a moving element must be added, and parallax errors may occur. Pen-Based Computing.This is an application for touch input devices that is growing at a rapid rate. The input device comes in several forms, each of which can recognize hand printing with the special operating system and software recognizing this type of input. The pen-based input device comes in several forms, of which the one termed TouchPen? can function both as a digitizer with a touch tablet, and as the touch input device with a touch input pen-based computer system. A second one is that developed by Wacom, Inc., primarily for the GO Systems computer, but used by other pen-based systems as well. Finally, a third unit is that made by Scriptel Corp. and used by Wang Laboratories in its system. TouchPen? was developed by Microtouch Systems, Inc., initially for use in GridPad made by the Grid Systems Corp. It is essentially a high-resolution digitizer consisting of an all-glass tablet that can be used with a number of stylus input operating systems to digitize handwriting. It is basically a touch input device using resistive techniques to digitize the handwriting appearing on the display surface of pen-based computer systems. The glass tablet is placed on the display surface and the system pen is used to transmit the digitized data to the computer. As noted previously, the tablet may also be used as a standard touch input device. The second form of pen-based input device is one that uses electromagnetic technology and consists of a grid of wires that transmit radio waves that are picked up by a tuned circuit in the stylus. This circuit resonates at its own frequency and transmits that signal back to the wires at the grid location it is touching. The pen also transmits its signal to the computer, which turns off the grid transmission, and locates the position of the pen by determining which of the grid wires pick up the pen signal. The pen does not need to actually touch the display surface and does not require any power, which is an advantage somewhat counteracted by the higher cost. Finally, the Scriptel unit is similar to that made by Microtouch, but differs in that it uses electrostatic technology and is also similar to the capacitive touch panel. FIGURE 89.16 Rotating infrared beam technology. (Source: A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.34, 1987. With permission. Courtesy Society for Information Display.) ? 2000 by CRC Press LLC Surface Acoustic Wave (SAW). This technology is more recent than the others and has not received wide acceptance as yet. It is based on the transmission through the glass of SAWs generated by transducers mounted on the glass overlay. These waves are detected by receivers also mounted on the glass, and the time of arrival of the waves at the receivers is known because the wave velocity is known. The placing of a finger on the glass weakens the signal and the location of the finger can be deter- mined by the difference in its effect on the SAW. There are two types of SAW systems in use, namely those using reflective techniques and those using atten- uation as the source of position information. The reflec- tive systems are similar to sonar where the time from the source to the pointing finger and then from the finger to the receiver is measured to arrive at finger location. The attenuation technology is illustrated in Fig. 89.17 and consists of two transducers, two receivers, and four reflector strips, all mounted on a glass substrate. One transducer-receiver pair is used for X and the other for Y location. Figure 89.17 shows the X axis pair, and the transducer transmits a burst of acoustic energy in a hor- izontal wave. The wave is partially reflected by the top reflector strips and travels down to the bottom strip where the reflectors are at an angle such that it is reflected to the lower left corner receiver. The wave now has a long rectangular shape, and each point in time corresponds to a specific vertical path across the substrate. The Y axis is scanned in the same fashion after the X wave dies out. Then, when the finger touches the substrate, its water content absorbs some of the energy in the wave, and the wave is attenuated. The dip in the wave amplitude corresponds to the amount of absorbed energy, and the time of the lowest point can be determined, allowing the location of the finger to be calculated. Finally, in addition to the X and Y coordinates, a Z coordinate can be determined, depending on how hard the user presses. This depends on surface contact, which affects the amount of attenuation. The advantages of this system are high resolution, speed of transmission, and the availability of a Z axis component. Its main disadvantages are the variation in moisture content in fingers and sensitivity to local moisture on the substrate. However, it is being used in developmental units and should be considered as another input device technology. Scanners Scanners are a means for inputting text and/or images directly into the computer system, thus avoiding the need for retyping and redrawing information contained in other sources. It is a relatively convenient way to avoid repetition if the data to be entered already exist in readable form. This is done by special image-recognition software that accompanies the scanning hardware, and can transfer an entire image containing both text and illustrations, but without the capability to modify the image. However, the addition of optical character recognition (OCR) software allows the entered text to be modified as if it were entered by typewriter. This can greatly simplify entering and editing text from some preexistent source and has resulted in a proliferation of devices that can perform this function. These devices come in two main forms, hand-held and page scanners, with or without OCR software in addition to the standard image-recognition software. A typical hand-held scanner is shown in Fig. 89.18 and it consists of a light source, a light-sensitive device such as a charge-coupled device (CCD) array, and the electronics to actuate the elements of the array sequentially under software control. The scanner window is placed over the page, and is moved down or across the page so that the window covers as much of the page as falls within the capability of the software. The light source is reflected from the page to the CCD and the charge in the CCD is modified by the reflectivity of the printed material. FIGURE 89.17Attenuation SAW technology. (Source: A. B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lecture Notes, p. 15.35, 1987. With permission. Courtesy Society for Information Display.) ? 2000 by CRC Press LLC The window area ranges from 4 to 5 in. in width by 0.5 in. in height and may be moved through 14 to 20 in., so that a fairly large area may be covered in a single manual scan. Images wider than the maximum window may be scanned in two passes, and the OCR software can stitch the two scans together into a single image, although this procedure requires considerable care in scanning so that the scans line up properly. Therefore, when images wider than the window of the hand-held scan- ner are to be scanned, it is advisable to use a flatbed scanner of the type shown in Fig. 89.19 which can handle a full 8.5 in. by 11 in. page, or some of the larger scanners than can accept large drawings and input them into the computer system. Resolutions of 400 dpi and higher, with up to 250 levels of gray and 24 bits of color resolution are available. Thus, scanners offer a wide variety of choice and performance capabil- ities, and are powerful input devices when prepared data in visual form is to be entered into the computer system. Voice Voice input is an intriguing approach to data input, with particular attractiveness to managers who want a simple and direct means for inputting data and commands. For many years, this technology tended to promise more than it could achieve, but recent developments have brought it to the point where it can be considered as a viable input means. This has been due to new developments in software that make it possible to minimize the amount of training required and increase the success rate to close to 100%. One basic approach to speech recognition is represented by the block diagram shown in Fig. 89.20. This is a system that is built around a special chip developed by Texas Instruments. This system uses templates and special algorithms for recognizing the input speech patterns. The system is speaker dependent, with the capability of storing up to 32 word templates and user-defined phrases. The output portion may be superfluous when the system is used only for inputting data and commands, but can be a useful adjunct to the visual response. Other techniques such as speaker-independent and phoneme-recognition systems are also available. Vocabularies range from 50 to 5000 active words, and both isolated and connected words can be recognized, although the larger numbers tend to be associated with isolated word systems. In general, it seems feasible that a combination of speech input and pen-based computing may find a viable market. FIGURE 89.18Hand-held scanner. (Courtesy of Logitech, Freemont, Calif.) FIGURE 89.19Page scanner. (Cour- tesy of Chinon, Torrance, Calif.) ? 2000 by CRC Press LLC Summary The multiplicity of input devices that are available makes it difficult to determine which is most suitable for any specific set of requirements. However, the limited functional comparison of the input devices covered in this section shown in Table 89.4 may be of some use, and in any event is a starting point in this evaluation. It should be noted that what appears best at one time may become unpopular or obsolete at a later time, as occurred for light pens and trackballs, both of which have come back into favor. In addition to the generalized evaluation shown in Table 89.4, it is also of interest to examine representative performance parameters. These are shown in Table 89.5 and while representative do not necessarily cover the range of performance parameters offered. More data may be obtained from the vendors of these devices. Advantages and Disadvantages Input devices make up one of the functional groups of the display systems, and their technical characteristics are covered in some detail at the beginning of this chapter, with performance information provided in Table 89.5 containing characteristic parameter values for each type, as available. The following material expands somewhat on that information by placing these devices in the context of a full graphics display system and evaluating the functions that the various types of input devices perform in that type of system in terms of their advantages and disadvantages. It is of some interest to compare the advantages and disadvantages of each type at this point, as listed in Table 89.6. This is an imposing list and may be used to aid in choosing the best input devices for specific applications. It also concludes this section on input devices. FIGURE 89.20Block diagram of speech recognition and synthesis chip. (Source: After M. Leonard, “Speech poised to join man-machine interface,” Electronic Design, pp. 43–48, September 26, 1991. With permission.) TABLE 89.4Input Device Functional Evaluation Function Input Device Control Data/Text Data/Graphics Total Keyboard E E P 9 Light Pen G G E 10 Tablet E G E 11 Mouse E F E 11 Trackball E G E 11 Joystick F F G 5 Touchscreen G F G 8 Scanner F E G 9 Voice G F P 6 Total 29 23 28 80 E = Excellent = 5; G = Good = 4; F = Fair = 3; P = Poor = 2 ? 2000 by CRC Press LLC Defining Terms Data tablet/digitizer: A device consisting of a surface, usually flat, and incorporating means for selecting a specific location on the surface of the device and transmitting the coordinates of this location to a computer or other data processing unit that can use this information for moving a cursor on the screen of the display unit. Joystick: An input device somewhat in the form of the navigation control device found in early aircraft and operating in a somewhat similar manner by generating series of pulses whose frequency or number depend on how far, with what force, and in what direction the control stick is moved from the central position. Keyboards: Electromechanical devices consisting of sets of keys labeled with alphanumeric, numeric, and functional designations that enable the user to describe and define the operation to be performed. Light pen: Neither a pen or a light source but rather an input device in the shape of a pen that operates by sensing the existence or nonexistence of light pulses at specific locations on the surface of a display device and uses this information to signal the computer as to the location of the pen. Mouse: An input device based on a much older type known as a trackball and fancifully named because it bears only a casual resemblance to a mouse. It consists of a roller ball that is moved on a flat surface and causes orthogonal potentiometers or other types of X–Y-position signal generators to move and produce electrical signals defining the desired coordinates of the cursor on the screen so that the cursor can be moved to that position. TABLE 89.5 Representative Performance Parameters Input Device Parameter Value Light pen Response time 150–500 ns Spectral response 4200–9500 A Luminous sensitivity 0.03–0.7 nts Field of view 0.02–0.1 in. Ambient rejection 350 nts Data tablet (digitizers) Resolution (l/in.) 100–2000 Accuracy (in.) 0.0005–0.02 Active area (in.) 12 ′ 12–60 ′ 120 Active height (in.) 0.02–2.5 Digitizing rate (pps) 100–350 Transducers Stylus, puck, cursor Mouse Resolution 10–1000 dpi Speed 1–20 in./s Accuracy 25–1000 dpi Trackball Resolution 100–1000 cpi Speed 1200–9600 BPS Accuracy 100–1000 dpi Ball diameter 1.5–2.5 in. Joystick Travel 25–30° Accuracy 5–10% Repeatability 1% Touchscreen Resolution 256 ′ 256–4096 ′ 4096 Transmissivity 60–100% Viewing area (in.) 3 ′ 4.5–15 ′ 20 Speed 80–200 touch pts./s Scanner Resolution (dpi) 75–1600 Scan rate (in./s) 0.5–2.0 Scanning width (in.) 4.1–36 gray shades 32–256 Scan time (s/page) 1–30 Voice Active vocabulary 13–5000 words ? 2000 by CRC Press LLC Scanners: Means for converting hard copy into electrical signals that can be entered into a computer or data processing system. The usual means for accomplishing such conversion is to move a light beam over the surface containing the data either by hand or automatically and using arrays of light-sensitive devices to convert the reflected light into electrical pulses. Touch input: A means for selecting a location on the surface of the display unit using a variety of technologies that can respond to the placing of a finger or other pointing device on the surface. These are essentially data panels placed either on the display surface or between the user and the display surface. Trackball: The earliest version of an input device using a roller ball, differing from the mouse in that the ball is contained in a unit that can remain in a fixed position while the ball is rotated. It is sometimes referred to as an upside-down mouse, but the reverse is more appropriate as the trackball came first. Voice: Means for enabling a computer or data processing system to recognize spoken commands and input data and convert them into electrical signals that can be used to cause the system to carry out these commands or accept the data. Various types of algorithms and stored templates are used to achieve this recognition. Related Topic 89.2 Computer Output Printer Technologies TABLE 89.6 Input Devices—Advantages and Disadvantages Device Advantages Disadvantages Keyboard Simple operation Requires many keys Well known Requires training Standard interface No graphics Light pen Eye-hand coordination Arm fatigue Low cost models Limited resolution No desk space required May block display Graphic tablet Natural hand movements Eye-hand conflict Screen not blocked Requires desk space No parallax Breakable stylus Good for graphics Poor for A/N entry Mouse Small space needed Some space needed Low cost Slow transmission Screen viewing Low resolution Any surface may be used Grid for optical (Optical) noiseless Mechanical noise Trackball High resolution Poor for A/N input Fixed desk space Slow transmission Screen viewing Mechanical noise Tactile feedback 3-D difficult Joystick Fixed desk space Low accuracy Low fatigue Low resolution Low cost No A/N input Touchscreen Eye-hand coordination Arm fatigue Minimal training May block display Minimum input errors Varied resolution User acceptance Parallax No special commands Slow data entry Scanner Full A/N page input Hand scanner width Color scan input High cost for color High resolution Slow input OCR software Compatibility Voice Ease of use Limited words Minimal training Machine training No special devices Graphics difficult ? 2000 by CRC Press LLC References H. Brunner et al., “Effects of key action design on keyboard preference and throughput performance,” Micro Switch. A.B. Carrell and J. Carstedt, “Touch input technology,” SID Sem. Lec. Notes, pp. 15.30–15.35, 1987. T.E. Davies et al., “Digitizers and input tablets,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, p. 186. D. Doran, “Trackballs and joysticks,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, pp. 251–262. C. Goy, “Mice,” in Input Devices, S. Sherr, Ed., New York: Academic Press, 1988, pp. 225–232. M. Leonard, “Speech poised to join man-machine interface,” Elec. Des., pp. 43–48, Sept. 26, 1991. S. Sherr, Electronic Displays, New York: Wiley, 1979, pp. 323, 388–389. Further Information Electronic Displays, 2nd ed., by Sol Sherr and published by John Wiley & Sons, Inc., contains an extensive and detailed discussion of other aspects of display systems and technology, as well as a somewhat expanded version of this section. In addition, Input Devices, edited by Sol Sherr, and Output Hardcopy Devices, edited by Robert C. Durbeck and Sol Sherr, both published by Academic Press, include extensive discussions of a wide variety of devices. The Society for Information Display (SID) sponsors a yearly symposium at which a large amount of information on new developments in information display as well as tutorials and seminars on basic information display topics are presented and made available in published form. In addition, it publishes two journals, namely, Proceedings of the Society for Information Display and Information Display. Other relevant meetings and publications are those sponsored by the Computer Society and Electron Devices groups of the IEEE, the SIGGRAPH group of the Association for Computing Machines (ACM), and the National Computer Graphics Association (NCGA). 89.2 Computer Output Printer Technologies Robert C. Durbeck Electronic printers for computer output represent a very important part of the computer industry. They range from small, inexpensive printers for personal computers and workstations to very large and fast page printers used for bulk printing output for large-scale computer systems. The technologies employed for this wide scope of printing requirements are diverse: some based on “impact” methods to transfer ink from a sheet or ribbon to paper, others based on more sophisticated “nonimpact” methods. Today, there is no single technology which completely dominates. A wide range of user needs has led to the present proliferation of printer technologies. The most prevalent are discussed in the following. Classification of Printer Technologies Table 89.7 illustrates the two main classifications of printer technologies and also the wide range of extant technologies. Those technologies listed under line impact and page printing are used for large computer system printing; by far the most popular are fully formed character and electrophotographic (so-called laser printers). The most common printing technologies used for personal/workstation computer systems are electrophoto- graphic, ink jet, and serial wire matrix. Emphasis in the following is directed to these favored technologies, with brief descriptions of the others included. Page Printer Technologies By far the most important page printer technology is electrophotography (EP). EP, as well as the much less employed ionographic and magnetographic technologies, uses “powder toning” development of an intermediate ? 2000 by CRC Press LLC “image” created in the process. Liquid toners are also used to develop electrostatic images. Thermal page printers employ a full-page-width linear array of thin-film heater elements to melt and transfer ink from a ribbon to the paper or to mark special thermal-sensitive paper. Electrophotographic Printing EP printers use essentially the same technology found in most “plain paper” copiers, the major exception being the printhead. Instead of using page- or line-imaging optics as in a copier, the printhead utilizes a solid-state laser (usually GaAlAs) or gas laser (typically HeNe) to scan across and expose a photoconductor drum or belt to create a “latent image” (see below). A few EP printers use stitched arrays of light-emitting GaAs 1–x P x diodes (LEDs) with Selfoc? glass fiber optics or an array of liquid crystal shutters, the latter to modulate light from a bright line light source. Other possibilities are electroluminescent, magnetooptic or electrooptic arrays, but these have not been commercialized to any extent. There are basically six major steps employed in the EP printing process (see Fig. 89.21): (1) uniform charging of the photoconductor (PC) electrostatically; (2) exposing the PC to the image light pattern, which results in selective discharge of the area charge created in Step 1, creating an electrostatic image; (3) developing the PC by bringing electrostatically charged toner particles (black or colored) to the surface of the PC where they selectively adhere to appropriately charged regions; (4) electrostatically transferring the toned image from the PC to the final medium (usually paper); (5) thermal fusing of the toner to the paper; and (6) cleaning residual toner from the surface of the PC to allow reinitiation of the six step cycle. TABLE 89.7Types of Printer Technologies Impact Nonimpact Line impact Page printing Fully formed character Electrophotographic Dot band matrix Ionographic Shuttle hammer matrix Magnetographic Electrostatic Thermal Serial impact Serial nonimpact Fully formed character Ink-jet Serial wire matrix Continuous Piezoelectric/impulse Thermal/bubble-jet Thermal Direct (thermal paper) Thermal transfer Resistive ribbon Figure 89.21The six basic electrophotographic printer process steps: charge, image, develop, transfer, fuse, and clean. ? 2000 by CRC Press LLC Step 1—Charging the PC.The most common approach used is corona charging. One or more thin corona wires (typically tungsten) are supported directly above the PC and are energized to 5–8 kV. The resultant high electric field surrounding the wire causes electrons in the immediate region to be accelerated to energies sufficient to ionize local air molecules. Either positive or negative ions are then attracted to the outer surface of the PC (which, when unexposed to light, acts for a short period of time as an insulator) depending on the sign of the potential difference. At the same time, a counter-image charge is formed on the inner side of the PC. The two corona structures most commonly used are the corotron and the scorotron (see Fig. 89.22). The grid on the scorotron is used to more precisely control the resultant voltage charge level on the PC (approximates the grid voltage). Both dc and ac designs are used; the latter usually include a glass sleeve around the corona wire to reduce localized high-emission spots on the wire due to contaminants. To save on cost for very low- cost EP printers and to reduce corona by-products (e.g., ozone), a lower-voltage conductive elastomer charge roll in direct contact with the PC has also been used in place of the corona wire. Step 2—Exposing the PC.The wavelength of the exposing light source must match the spectral sensitivity of the PC. If the PC is discharged in areas that will be printed white, the overall process is termed charge area development (CAD); if the discharged area will be printed black (or color), the process is called discharge area development (DAD). Both CAD and DAD processes are used in EP printers but CAD is the only common process used in copiers. Selective discharge of the PC involves two steps: (1) photogeneration of electron-hole pairs and (2) transport of the electrons and holes in opposite directions under the influence of a high-dc bias field, locally dissipating the surface charges created in Step 1 (see Fig. 89.23). Both organic and inorganic PC materials are used (see Fig. 89.24). A variety of charge-generation and charge- transport material systems have been developed for organic PCs; most use separate layers for charge generation and charge transport. Examples of efficient organic charge-generation materials sensitive at both GaAlAs (7800 ?) and HeNe (6328 ?) wavelengths include squarylium and thiopyridium dyes in an appropriate binder layer (?0.5 mm thick). The charge-transport layer (CTL) consists of a thicker layer (20–30 mm) of a charge-transport Figure 89.22Two types of coronas for charging the photoconductor: the scorotron and the corotron. Figure 89.23Light is used to selectively discharge the photoconductor. Electron-hole pairs are photogenerated in the charge-generation layer, followed by charge transport under a dc bias field and then selective neutralization of the surface charges, thereby creating an electrostatic image. ? 2000 by CRC Press LLC molecule dispersed in an inert binder, or simply a good charge-transporting polymer (e.g., polyvinylcarbazole). Since most polymer transport materials are essentially hole-transport materials, this requires that the PC surface charge produced in Step 1 be negative. The CTL must be transparent at the imaging wavelength. Examples of inorganic PC materials include amorphous chalcogenide alloys such as a-Se, a-As 2 Se 3 and Te- doped Se. Most do not have a high sensitivity at GaAlAs wavelength, but a-Si does. a-Si also offers other desirable properties (e.g., durability and lack of fatigue), but is quite expensive to produce. The laser beam is scanned linearly over the PC in a direction orthogonal to the PC motion; the combined motions covering a “page”. The most common gas laser scanning technique employs a high-speed rotating polygon mirror along with beam-expanding optics, an acoustic-optic modulator (not required for solid-state lasers) and an f-q imaging lens. To produce a quality image, the multifaceted scanning mirror system must be essentially free of facet defects, up-and-down wobble, variations in polygon rotational velocity and lack of synchronization with the pixel clock. Some nonplanarity of the facet surfaces can be corrected with anamorphic optics. LED arrays and liquid crystal shutter systems do not have these same technical challenges but, so far, they are more expensive to produce. Step 3—Developing the PC. There are basically three development techniques: dual component, monocom- ponent and liquid development. The first two use powder toner. Until the advent of EP printers for personal and workstation computers, the most common method of development was dual component, where polymer- coated magnetic carrier beads are mixed with the toner particles and development is done with a “magnetic brush.” This technique is still prevalent in high-end printers. With this approach, the 5–20 mm toner particles (consisting mainly of resin plus carbon particles or colorant) are triboelectrically charged by repeated contacts during mixing with the much larger (60–250 mm) magnetic carrier beads. The toner particles then electrostat- ically adhere to the opposite-sign charged carrier beads. Charge control agents (e.g., complex organometallic salts) are often included in the toner composition to control the charge level, rate of charging, and consistency of charge. The mix is mechanically directed to a nonmagnetic rotating shell which has fixed magnets located within its core, adjacent to the gap between the PC and the shell (see Fig. 89.25). The gap is typically 0.5 to 6 mm, depending on the specific system. As the shell rotates, the mixture is carried to the gap, and chains of carrier beads (coated with toner—the “magnetic brush”!) form along the local magnetic field lines. These field lines are approximately perpendicular to the shell at the smallest gap. In addition, a development voltage (200–500 V) is applied between the PC and shell. This provides a high field in the gap whose local value is determined by the applied voltage, gap dimension and the electrical properties of the material mix in the gap. Figure 89.24Spectral absorption characteristics of several photoconductor materials: (a) squarylium dye, (b) SeTe, (c) As 2 Se 3 , and (d) a-Si. ? 2000 by CRC Press LLC The electric field at the end of the last carrier bead (next to the PC) in a chain may be up to 50 times the nominal unfilled gap field, the value being greatest with uncoated carrier beads. It can be shown that for coated carrier beads, the mass of toner per unit area developed on the PC is approximately (89.7) where v r /v p is the surface speed ratio between the developer roll (shell) and the PC surface, V the voltage across the gap L g , C m the toner charge-to-mass ratio, e 0 the permittivity of free space, r c the carrier bead radius, r t the toner radius, k the dielectric constant of the bulk toner, and d c the thickness of the carrier polymer coating. Monocomponent development is used almost exclusively for low-end printers because this process does not require carrier beads, toner concentration sensors or toner replenishment hardware, resulting in much lower manufacturing costs. This approach has also allowed the use of replaceable toner/developer cartridges which, although more costly on a supplies cost-per-page basis, adds greatly to the user-perceived reliability of the system (if it fails—just replace the cartridge!). A rotating donor/development roll with appropriate charging properties is employed to charge the toner by touch-and-rubbing contacts (see Fig. 89.26). The toner electro- statically adheres to the donor roll and is transported to contact the PC at the nip. Here, in the presence of a development bias field, the toner is selectively transferred to those areas on the PC with opposite sign charge. Liquid development employs a high-resistivity hydrocarbon dispersion of very fine toner particles (<1 mm) that are charged naturally in the solvate. Mechanical means are used to bring the liquid into contact with the PC, and the toner is then electrophoretically transferred to the latent image areas on the PC. Color can be accomplished by using multiple development stations, one each for the subtractive colors (cyan, yellow and magenta) plus black. Toners are colored by either dyes or pigments. The four-colored images may Figure 89.25Dual-component magnetic brush developer. Toner particles, adhering electrostatically to much larger mag- netic carrier beads, are transported into the photoconductor-developer gap to tone the electrostatic image. (Source: R. C. Durbeck and S. Sherr, Eds., Output Hardcopy Devices, San Diego, Calif.: Academic Press, 1988, p. 242. With permission.) m A V LC rr vv gm ct c rp =+× p kd e 0 2 {}/[(/) ] /** ? 2000 by CRC Press LLC be accumulated on the PC (see Fig. 89.27) or alternatively on an intermediate belt or drum, or even on the paper itself. A wide range of colors and the visual illusion of gray scale can be achieved by the use of laser pulse- width modulation and the use of “super-pixels” consisting of N 3 M arrays of binary pixels to provide digital half-toning. Step 4—Transfer of Toner to Paper.Here a corona is used to charge the back side of the paper and the toner is transferred from the PC to the paper. Typically, some small fraction of the toner usually has a charge of the wrong sign. It is at this step where most of this wrong-sign toner is removed, minimizing “background” on the page, since primarily only toner with the correct sign gets transferred. Step 5—Fusing Toner on the Paper. After transfer the toner is only loosely held (electrostatically) onto the paper; it must be fixed by fusing. There are several fusing techniques: (1) hot-roll using hot fuser rolls under pressure, (2) cold-roll, (3) solvent vapor, (4) flash lamp, and (5) radiant heating. Hot-roll fusing is predomi- nantly used but all five techniques have been commercialized. The most efficient approach is hot-roll but all Figure 89.26Monocomponent developer system. Figure 89.27Four developers are used to produce color plus black. Four photoconductor drum rotations are needed to accumulate the four-color toner images. ? 2000 by CRC Press LLC of the thermal approaches require 0.5–2.0 J/cm 2 energy at the paper surface. The energy required is determined by the contact duration (related to the nip compliance and roll speed), pressure, paper water content, and the melt-flow rheological characteristics of the toner. Flash fusing has only been used in mid-range to high-end printers because expensive power supplies and capacitor banks are needed. A xenon flash lamp is typically pulsed for a few milliseconds to provide the required energy. Thermal efficiency improves with very short pulses, but undesired toner degradation volatiles increase with the higher temperatures produced. Care must be taken with radiant fusing to insure that excessive paper overheating does not occur if the paper is stopped under the incandescent lamp. Step 6—Cleaning the PC. To restart the overall EP process, the PC must be cleaned of residual toner and contaminants. Fiber brushes, scraper blades, and “magnetic-brush” cleaners are used. For low-end printers, scraper blades suffice and are replaced (in some systems) with each new cartridge. Rotating soft-fiber brushes with air flow collection are used commonly in mid-range to high-end printers. Magnetic-brush cleaning is very similar to magnetic-brush development (see above). Ionographic Printing Ionographic printer devices also use powder toner technology and the overall technology is very similar to EP. One major difference, however, is the creation of the electrostatic image for subsequent toner development. The ionographic process uses an ion source (high-voltage drive electrode) and a page-wide array of control and screen electrodes to gate ions directed toward a drum coated with a thin-film dielectric material (e.g., Al 2 O 3 ), thus creating a charged image on the drum. In present commercial ionographic printers, the transfer and fuse steps of EP are also replaced with a “transfix” process where the paper sheet is squeezed between the toner-developed dielectric drum and a compliant cold pressure roll. The ionographic technology has two fewer process steps (vis-à-vis EP) but the ion printhead represents significant technical challenges (cost and lifetime). Magnetographic Printing Magnetographic printing is also similar to EP but employs magnetic powder toner and a magnetic printhead. The magnetic head is an array of individually addressable magnetic write gaps, each representing a pixel location on a line across the page. The head writes a magnetic “image” on a belt or drum coated with a magnetic material such as g-Fe 2 O 3 , Co:P or Co:Cr. Toner is attracted to those areas on the drum where flux reversals (and, hence, magnetic fields external to the the magnetic media) are present. The other process steps are essentially the same as used with EP but toner charge levels must be kept under control to ensure that electrostatic forces do not dominate over magnetic forces. Electrostatic Printing There are two basic approaches that have been developed: (1) one using a special dielectric paper, and (2) the other using plain paper. In the first approach, a page-wide linear array of electrode discharge pins are inde- pendently pulsed to charge the surface of a moving, conductive-base, dielectric-coated paper. Both powder and liquid toners may be used to develop the image; thermal fusing of the image is required for powder toner. With the plain paper version, either a precharged or uncharged dielectric drum or belt can be used depending on whether the array of electrode pins are used to charge or discharge the media surface. The other process steps are essentially the same as with the nominal EP printing process. Cost savings can be realized by multiplexing the electrode driver lines because there is a process threshold of hundreds of volts. This requires, however, that segmented counter electrodes be positioned behind the receiving surface (drum, belt, or paper). Thermal Page Printing Thermal transfer page printing is accomplished by using a stationary page-wide linear array of thermal heating elements coupled with a page-wide transfer ribbon roll (see Serial Thermal Printing below for discussion of thermal printhead technologies). The ribbon is positioned between the printhead and the receiving paper. The ribbon typically consists of a polycarbonate or polyester film substrate (10–20 mm) coated with a waxy ink layer. Heat from the thermal printhead elements must penetrate through the substrate to heat (melt) the dye/wax coating. The melted ink layer is pressed into the paper surface by printhead pressure, and after the paper and ribbon move together away from the printhead, the partially cooled ink layer adheres better to the paper than ? 2000 by CRC Press LLC to the ribbon substrate. The ribbon is then peeled away from the paper, leaving the desired image on the paper. Considerable energy must be applied to melt the ink layer (e.g., 2–4 J/cm 2 ) which does restrict speed. Also, comparably smooth paper (£50–100 ml/min Sheffield roughness) is required for quality printing with minimal gaps or voids. Print resolution of better than 8 pixels/mm can be achieved with smooth paper. Sublimable transfer dyes have been used for high-quality colored images since the amount of dye transferred can be controlled somewhat by the energy supplied to the head heater elements. Also, since the sublimable dyes tend to penetrate into the paper sizing and fibers, a less smooth paper can be used than with waxy materials. The energy required for dye transfer is similar to that required for waxy ribbons. Serial Nonimpact Printer Technologies Ink-jet and thermal printers represent the two major classes of serial nonimpact technologies used for personal and workstation computer printer output. As shown in Table 89.7, the ink-jet technologies can be subclassified as continuous, piezoelectric, and thermal/bubble-jet. The thermal technologies can be subdivided into direct thermal, thermal transfer, and resistive ribbon. Serial Ink-Jet Printing Ink-jet technologies have evolved over the last two decades with continuous ink-jet being the first to be developed, followed by piezoelectric and then thermal or bubble-jet technologies. All three have been commer- cialized, although bubble-jet is by far the most popular today and continuous ink-jet is used primarily for speciality page printer or high-quality color graphics and image applications. Both piezoelectric and bubble- jet are “drop-on-demand” or “impulse” technologies, i.e., a drop is ejected from the printhead only when desired. With continuous ink-jet, a continuous stream of droplets is generated by the printhead and undesired drops are deflected electrostatically away from the paper (or vice versa). Ink requirements for these technologies are very demanding and the development of appropriate inks is as important (and difficult) as the development of the printer and printhead hardware. Demands on the ink are both extensive and conflicting, and include the requirements of nonclogging in the nozzle but fast dry time on the paper, water-based but water-resistant after drying on the paper, and quality printing on a wide range of papers (requires minimal feathering and controlled spot size). Nonaqueous solid inks have also been used; the ink is solid at room temperature but is liquid at an elevated head temperature. Continuous Ink-Jet Printing.With this technology, ink is continuously jetted from a small-diameter nozzle under pressure (see Fig. 89.28). Although the resultant jet stream will naturally break into small drops, this phenomenon is assisted and stabilized by the inclusion of a piezoelectric perturbation transducer, driven at the desired drop rate. Lord Rayleigh was the first to determine that the dimensionless instability factor (89.8) (where g r is the growth rate of jet instability, s the surface tension, r the fluid density, and d the jet diameter) is maximized for l/d = 4.51, where l is the perturbation wavelength. Operation at this design point produces Figure 89.28(a) Continuous drop ink-jet, and (b) continuous spray ink-jet technologies. g d r (/) / sr 312 ? 2000 by CRC Press LLC very consistent drop breakoff and diameter. Operation at frequencies in excess of 100 kHz is possible with drop velocities of typically 25 m/s with a 50-mm nozzle diameter. Because the drops must be electrostatically charged at the breakoff point, conductive ink must be used. The ink source is typically grounded and a controllable voltage electrode is placed at the breakoff point (usually surrounding the jet stream). The charge level on each drop is then proportional to the applied voltage. Each charged drop can then be deflected by parallel downstream deflection plates with a field of typically 10 kV/cm. This deflection (assuming parallel plates and a uniform electric field between the plates) can be approximated by: (89.9) where d l is the deflection length, q the drop charge, m the drop mass, E the electric field, v the drop velocity, l p the deflection plate length, and l z the distance from the upstream end of the deflection plates to the paper. Drop deflection can be either binary or analog. With the former, the drop either reaches the paper or is directed into a collection gutter. With analog deflection, the drop may be deflected linear (e.g., any position over the height of a printed character). Smaller satellite drops may be also produced between the primary drops. To eliminate their effect, the excitation system is designed to produce forward-merging satellites as these charge simultaneous with the preceding drop; thus the forward-merging (through “drafting”) and subsequent drop coalescence will not alter the charge-to-mass ratio of the augmented drop. Compensation must be provided for both aerodynamic and electrostatic interactions. Two primary examples are that (1) the first drop in a sequence of drops encounters much greater aerodynamic drag than subsequent drops, and (2) the charge on a drop is influenced by the charge on the previous few drops. One approach to greatly reduce electrostatic drop interaction and to stabilize merging effects is to include noncharged drops between charged drops. This obviously reduces the effective drop rate by a factor of two and requires a design configuration where only charged drops reach the paper. Charging electrode voltage adjustment algorithms based on voltages applied to prior drops are also used to reduce the electrostatic interaction. An alternate approach is the continuous spray design where a smaller nozzle (10–20 mm) is used. Much smaller drops are produced at higher velocities (?40 m/s). It is often called the Hertz method [see Fig. 89.28(b)]. As with the continuous drop approach, a controlled voltage electrode is positioned around the breakoff point of the jet stream, a conductive ink is used, and the smaller droplets are charged proportionally to the applied voltage. The stream of droplets is directed to the paper when no voltage is applied. When a voltage is applied, the resulting electrostatic charge on the droplets produces strong mutual repulsion forces and the stream transforms into a spray, the cone angle of which is determined by the applied voltage. The spray is intercepted by a collecting surface surrounding the collection orifice which allows only uncharged or low-charged droplets through to the paper. With analog voltage control, the amount of spray that passes through the orifice can be varied, thus providing gray-scale capability. This approach (with multiple orifices) has been commercialized for very high-quality color image and graphics applications. Piezoelectric Ink-Jet Printing. Piezoelectric ceramic transducers are employed with this technology. These materials (e.g., lead zirconate titanate and barium titanate), when polarized, change their physical dimensions when subject to an electric field—usually applied through surface electrodes. Deflections of several angstroms per volt are typical. When the transducer is pulsed with a voltage, the deflection generates a pressure wave in an adjacent ink chamber, resulting in the ejection of a single drop—hence the descriptors, “impulse” or “drop- on demand”. Four implementations are shown in Fig. 89.29. Often arrays of these devices are integrated into a serial printhead which allows the printing of a one-character-high-per-head pass across the paper. Color printing can be accomplished by assigning one or more nozzles per color. Only a very small (100–1000 ?) deflection of the piezoelectric transducer is needed to create the ink chamber pressure wave if the displacement is very rapid (10–100 ms). Hence, these devices are very efficient; only a few microjoules per drop are required for robust operation. Drop ejection rates of over 20 kHz have been demonstrated in the laboratory but commercial devices are typically designed for the 5–10 kHz range. Drops that produce a d l qE mv ll l p zp = ? è ? ? ? ÷ × 2 2 2 (–) ? 2000 by CRC Press LLC spot size of 150–200 mm on paper can be achieved with an orifice diameter of about 50 mm. Even greater device efficiency can be obtained by synchronizing the arrival of a direct wave and a reflected wave at the nozzle (e.g., a negatively reflected wave caused by an initial expansion pulse plus the direct wave from a following compres- sion pulse). These two waves can be made to reinforce one another at the time and place of drop ejection. Figure 89.29(a) shows a piezoelectric/membrane laminate design with a disk-shaped piezoelectric transducer which, upon being pulsed, deforms (assumes a finite radius of curvature) and thus creates a pressure wave in the ink chamber. Figure 89.29(b) illustrates an “oil-can” version of the laminate approach. In Figure 89.29(c), a tubular transducer is used to squeeze the ink chamber. Figure 89.29(d) represents a push-rod or piston design where the piezoelectric material is used in the extensional mode. Attempts have also been made to use modern semiconductor planar/etching processing techniques to create low-cost arrays of devices. Bubble-Jet Printing.This technology has also been called thermal-jet. With this approach, very small thermal resistors on the ink chamber wall are electrically pulsed. Joule heating of the resistor causes the temperature of the ink adjacent to the heater to rise to 350–400°C (see Fig. 89.30). Because the ink becomes locally superheated, nucleation of tiny bubbles takes place on the surface over the heater. These bubbles coalesce and very rapidly form a single expanding bubble which, by displacement (like a piston), propels a single drop of ink out at the orifice. The electrical pulse must be short (typically 3–6 ms) to insure low conductive heat losses; however, the power density is extremely high (~500 MW/m 2 ). The energy applied per drop is 30–50 mJ but only a small fraction (a few percent) represents the kinetic energy of the drop. The remaining energy is thermally dissipated in the ink and device structure. When the thermal energy in the superheated layer is depleted, the bubble begins to collapse. The total cycle (nucleation plus bubble growth and collapse) is normally complete in about 20 ms. Drop rate, however, is typically limited to less than 10 kHz, mainly because of the limits of thermal dissipation. Cavitation damage can occur to the heater structure if the bubble collapse is too violent. Proper design of the ink chamber geometry can provide the necessary damping and minimize this problem. Heater element materials used for this tech- nology include HfB 2 , ZrB 2 , Ta 2 Al and TaN. Passivation over-layers (e.g., SiC, SiO 2 , Si 3 N 4 , plus certain metals such as tantalum) are deposited on top of the thin-film heaters to provide protection from chemical and mechanically enhanced corrosion. Materials, structures and thin-film deposition processes must be carefully Figure 89.29Four approaches to piezoelectric drop-on-demand ink-jet technology: (a) piezoelectric/membrane laminate design, (b) “oil-can” version of (a), (c) piezoelectric squeeze-tube approach, and (d) piezoelectric push-rod method. ? 2000 by CRC Press LLC designed to allow billions of heater pulse cycles without failure at a local power density of 500 MW/m 2 . Also, very special ink must be used so that very minimal chemistry occurs at the hot interface layer, e.g., so that the chemicals in the ink do not break down and form a thick carbonaceous film over the heater. These carbonaceous films, when more than a few hundred angstroms thick, destroy the device velocity and thermal efficiency characteristics. The ink must also not etch the overcoats. Very low-cost, compact, low-power printers have been developed based on this technology because energy requirements are very low and the printhead can be made inexpensively using semiconductor-like planar processing techniques. A proliferation of these printer products (many with color) have appeared in the market over the past five years. Serial Thermal Printing Thermal technologies have been used in many low-cost serial printer applications. There are three basic approaches: (1) use of a heat-sensitive special paper, (2) thermal transfer of ink from a ribbon to paper, and (3) a variant on (2) with a special ribbon structure and printhead that improve thermal efficiency and allow printing on a wide range of standard papers (including the relatively rough office bond papers). Direct Thermal Printing. The key aspects to this technology are the thin-film resistive serial printhead and the special paper required. A typical array structure (see Fig. 89.31) consists of photolithographically defined and deposited heater material (e.g., Ta 2 N or TaAl) on a contoured insulating substrate. One or more protective layers (e.g., SiO 2 , Ta 2 O 5 or SiC) are deposited on top of the heater layer for abrasion resistance and electrical insu- lation. Contours (raised areas or bumps) on the surface under the heater areas are constructed by a raised glass “glaze” of about 40 mm and provide both improved contact with the paper and short time constant thermal insulation to the substrate. This structure is often called the thin-film head structure. Alternates include (1) the silicon mesa technology, where a two-dimensional array of silicon mesas is fabricated from monolithic silicon, and (2) the thick-film technology. With the former, each mesa contains its own resistor-transistor/diode on the base of the silicon chip. Joule heating occurs when voltage is applied to the resistor via the transistor/diode. With the thick-film approach, a resistor Figure 89.30Thermal-jet device showing one heater-nozzle package. Joule heating of the thin-film heater causes nucleate boiling in the ink adjacent to the heater. A bubble forms and pushes a drop of ink out of the nozzle. Figure 89.31Thin-film thermal head struc- ture. (Source: R.C. Durbeck and S. Sherr, Eds., Output Hardcopy Devices, San Diego, Calif.: Academic Press, 1988, p. 282. With permission.) ? 2000 by CRC Press LLC paste is typically screened onto a ceramic substrate. Materials for the resistor paste include borosilicate glass and lanthanum glass-ruthenium oxide. The elements are typically 25 mm thick and slowly wear down by contact with the paper. Since, with each approach, the resistive elements must be allowed to cool before the head is ready to “write” the next pixel position on the paper, the heating and cooling time constants of the head primarily determine the attainable print speed. Special thermal paper typically has a coating with a leuco dye plus a phenol developer in a polymer binder which react at the elevated temperature provided by the printhead to form a colored species. The resulting optical density is a function of the temperature reached so that some gray-scale capability is possible. Energy density requirements are in the range of 2–6 J/cm 2 . Thermal Transfer Printing.The desire to eliminate costly special thermal papers even for low-cost serial printers led to the development of the thermal transfer printing technology where a separate transfer ribbon is interposed between the thermal printhead and the paper (see Thermal Page Printing above for discussion of ribbon technology). Resistive Ribbon Printing. This technology grew from the need to provide quality thermal printing at higher speeds and on a wide range of papers, including standard office bonds. With this technology, the heating function is repositioned from within the printhead into the ribbon itself. The ribbon (see Fig. 89.32) includes an additional aluminum conductive and heating thin-film layer, sandwiched between the “standard” thermo- plastic ink layer and the ribbon substrate. The substrate is made conductive (350–900 V/M) by the incorpo- ration of sufficient (20–30%) carbon black in the polycarbonate film. Joule heating occurs as current flows from the addressable head pixel-size electrodes through the aluminum layer to the large single-ground return electrode. Current density is maximum directly beneath the addressable electrodes so that temperatures there (but not elsewhere) are sufficient to cause ink layer melt and transfer. In addition, a thin release layer can be added between the ink layer and the aluminum heating layer to provide enhanced and smooth-edged pixels; Figure 89.32Resistive ribbon head and ribbon system. ? 2000 by CRC Press LLC this provides sharp character edges and allows more detail in images. This technology allows (1) 2–3 speed increase (vis-à-vis conventional thermal transfer printing) because printhead thermal time constants are much less of a factor, (2) very high-resolution printing (up to 40 pixels/mm), and (3) printing on office-quality bond papers. Also, already deposited ink can be selectively lifted off the paper by reducing the printhead power and using a fresh ribbon area. Offsetting these advantages is the fact that the ribbon is more complex and costly than conventional transfer ribbons. Impact Printer Technologies The earliest electronic printing technologies were impact devices employed on the early plug-board program- mable accounting machines that used punched-card input. Before that there were typewriters and teleprinters. Line impact printers are used on mid-range to high-end computer systems; their continuing appeal is based first on the ability to print multipart forms, and secondly on lower cost of printing and greater reliability (as compared with electrophotographic printers). Serial impact printers historically represent the greatest sales volume for all computer printer technologies by a wide margin. By far the largest volume has been for personal computer output applications. Their appeal stems from products offering very low cost (device and supplies), high reliability and, again, multipart forms. More recently, however, thermal ink-jet and low-end EP printers have largely supplanted these impact products. Line Impact Printer Technologies As shown in Table 89.7, there are three distinct technology approaches for line impact printers: (1) fully formed character, (2) dot band matrix, and (3) shuttle hammer matrix. The first method dominates in high-end computer applications. The other two approaches are primarily used with mid-range computer systems. Fully Formed Character Printing.Various line printer technologies have evolved over the past but the most popular extant technology makes use of a band of etched engraved characters (plus timing and position marks) in a continuously moving loop configuration (see Fig. 89.33). This band is positioned between a page-wide bank (typically 132) of hammers-actuators and the paper/ribbon set. With timing and position marks, the location of the characters (replicated several times on the band loop) can be easily tracked and the appropriate hammers can be asynchronously fired to provide a full line of print in tens of milliseconds. A limit to the throughput P r (lines per minute [lpm]) of such a printer may be approximated by: (89.10) where V b is the band velocity (in./min), T i the time to increment the paper to the next print line position (min), P c the character pitch (in.), and N c the number of characters in the character string. This relation assumes that the hammer settle-out time is less than the paper advance time, the latter normally not the limiting speed factor. The usual limiting speed factor is related to print quality, i.e., well-registered, sharp-edged, high-optical- density characters. In addition, because not all lines on a page are usually printed, with line skipping the actual throughput may be significantly faster than indicated above. Several factors are important to achieve high-quality print characters. First, the hammer-actuator must provide enough impact force and energy to produce optically dense print. Second, it must impact the ribbon/paper set at Figure 89.33Line impact printer mechanism. (Source: R.C. Durbeck and S. Sherr, Eds., Output Hardcopy Devices, San Diego, Calif.: Academic Press, 1988, p. 130. With permission.) P V VTPN r b bi cc = + ? 2000 by CRC Press LLC just the right instant to provide good character registration. Third, it must have a short impact time. The impact force and energy are determined by the kinetic energy transferred by the hammer; this is the main factor in determining the amount of ink transfer to the paper. The hammer energy is typically 4–8 mJ. The total time from electronic print impulse to impact with the ribbon/paper set must be closely controlled to achieve good character registration, increasing in importance with band loop speed. The flight time variance must not be more than 1.7 ms to yield a print registration error of no greater than 0.05 mm with a loop speed of 30 m/s. This can best be done by automatically and periodically measuring the time to impact (using a piezoelectric impact bar) and then making microcode/electronic impulse delay adjustments. To minimize “slur” (i.e., the blurring of a character caused by lateral relative motion between the engraved character and the ribbon/paper set during impact), short impact time is important. It may be shown that this impact time is inversely proportional to the square root of the hammer mass (for given hammer kinetic energy), and inversely propor- tional to the hammer velocity (for given ribbon/paper set thickness and compliance). For a given amount of acceptable slur, the hammer velocity must increase proportional to the band loop velocity, and the hammer mass (for fixed kinetic energy) must decrease—inversely proportional to the square of the band loop velocity. Hammer-actuator systems have been designed with one, two and even three moving piece components. With the one-piece design, the mass impacting the paper is largest, limiting this design to slower printers (£650 lpm). To have less mass in the hammer impacting the ribbon/paper set, separate parts are used for the armature and the impacting hammer (two-piece design). In this case, most of the kinetic energy from the pivoting armature is transferred to the hammer without the large mass handicap of the ferromagnetic armature. Of course, the residual energy in the arma- ture must be absorbed and dissipated within the print- head. Further design improvements are possible by interposing a push rod between the the armature and the hammer pieces (see Fig. 89.34). Since the lengths of adjacent push rods can be made alternately short and long, close packing of these actuator assemblies having a single pivot axis is possible. With the most efficient designs, printing speeds of over 5000 lpm are possible. Both moving-coil and stored-energy actuators are used, the latter using a “bucking” coil and a stored-energy flexible spring. The bucking coil, when energized, cancels the magnetic flux from a permanent magnet, holding the actuator in the “cocked” position, and thus converts the stored spring energy to kinetic energy. Dot Band Matrix Printing.This technology has been employed on some printers used for mid-range com- puter systems, and, in a sense, is a hybrid technology combining attributes of high-end line band printers with features found in serial wire matrix printers (see below). Present designs also use a moving metal band but incorporate pixel-size raised bumps instead of etched characters. These bumps (typically 120 on a band) are positioned at the apex of chevron-shaped springs etched into the band (see Fig. 89.35). Also, timing/position slots are etched into the band above the spring slots. Instead of one full line of characters being printed in one cycle, one full line of dots is printed with this technology. Also, each hammer covers typically three character positions across the page; thus, 45 hammers can cover a page-width of 135 character positions. Hammer cycle time is typically 1.2 ms and the band speed can be 0.28 m/s or higher. After a line of dots is printed, the paper is advanced N times until a full character height is achieved. This technology is much less expensive than typical engraved band technology, and allows the use of a faster draft mode using fewer dots per character; however, normal throughput (lpm) is generally much less. Shuttle Hammer Matrix Printing. Transverse shuttling a reduced number of horizontally spaced hammers to cover a full print line is another way to implement matrix line printing. Here, a pixel-size raised bump is Figure 89.34 Three-piece hammer-actuator design. (Source: R.C. Durbeck and S. Sherr, Eds., Output Hardcop Devices, San Diego, Calif.: Academic Press, 1988, p. 143. With permission.) ? 2000 by CRC Press LLC incorporated into the strike surface of each hammer. One design includes 33 hammers (each spaced 1 cm from its neighbor) covering 132 character positions. With an oscillatory shuttle motion of 1 cm, all line dot positions are covered, and the shuttle return time can be used for paper advance. Moderate printing speeds (600–900 lpm) can be accomplished with 1 / 4 -cm hammer spacing; 300 lpm is possible with 1-cm spacing. Opposite moving counterweights have been employed to reduce shuttle vibration. Serial Impact Printing There are two classes of technologies presently employed for serial impact printing: fully formed character and wire matrix. The former category includes both daisywheel and typeball technologies, the latter now in little use for computer output except for a few dedicated word processing applications. Daisywheel technology is used in many dedicated word processing systems and for some personal computer systems. With these two technologies, font change can be implemented by simply changing a wheel or ball, but all-points-addressable printing for image and graphics is basically not possible. Serial wire matrix technology has for years been the most popular output device for personal computers, but has now lost most of its market share to low-end laser printers and thermal ink-jet. Daisywheel Printing. This technology makes use of a “petal-like” rotating print wheel with typically 96 spring- like fingers or “petals” radiating outward from a central core. An engraved raised character is present at the end of each petal. The wheel is rotated by a dc servomotor to the desired character. A single hammer-actuator then impacts the back side of the petal, forcing the raised character into the ribbon/paper set. The simplest designs have a constant carriage speed and a fixed time delay to allow for up to 180° rotation of the wheel between strokes. These systems are typically limited to about 30 characters per second (cps). More modern designs have incorporated microcode logic which slow down the carriage motor when the next character position is more than, for example, 30° away. This can increase the net average speed to as high as 60 cps. Variants on this design use thimble- and cup-like rotary devices with petals bent parallel to the axis of rotation. This lowers the rotational inertia and allows for more petals (and hence more characters—up to 128). Typeball Printing. Typeball technology was first developed for typewriters in the 1950s, but has also been used for low-speed, correspondence-quality printers. The golf ball-size sphere, rotated and tilted to reach the Figure 89.35 Dot band printer technology. (Source: R.C. Durbeck and S. Sherr, Eds., Output Hardcopy Devices, San Diego, Calif.: Academic Press, 1988, p. 198. With permission.) ? 2000 by CRC Press LLC desired character position, has four rows of 11 characters, repeated on both hemispheres, making a total of 88 character positions. The usual operating speed is 10 cps but up to 15 cps has been achieved. Serial Wire Matrix Printing.This technology employs an array of guided wires (often tungsten) that are individually driven into the ribbon/paper set (see Fig. 89.36). The array may form a single-row configuration at the plane of ribbon impact, may have two in-line rows, or may have two staggered rows. Nine wire designs became very popular in the 1980s for low-cost personal computer systems, but the demand for higher print quality has moved the “standard” design point to 24 wires. Early technology limited wire cycle repetition rates to about 500 Hz. More advanced designs can perform at 2500 Hz, but most available products operate in the 1000–1500 Hz range. Actuators to drive these wires are quite robust and can print through many layers (up to 6) of a multipart form. The kinetic energy needed to print through 4–6 layers is normally about 0.5 mJ for 200-mm diameter wires, 1.0 mJ for 300-mm wires. For 2-layer forms, these energies drop to about 0.3 mJ and 0.45 mJ, respectively. There are two common approaches to driving the guided wires. One is a pivot-type actuator and the other is a direct solenoid design (see Fig. 89.37). The magnetic circuit in all cases must be designed to maximize either (1) the moving wire kinetic energy in the case of a free flight wire configuration or (2) the kinetic energy of the combined armature and moving wire in the case where these two components are either permanently connected or remain in contact during the drive cycle. Other actuator designs use a stored energy approach where a preloaded leaf spring is held by a permanent magnet until released by a “bucking coil” to counteract the static flux. Also, experimental stacked piezoelectric transducers have been investigated using high lever ratios (e.g., 30:1) which have operated at 3 kHz and above. Synthetic ruby or ceramic wire guide holes are sometimes used to combat wear. Several hundred million cycles lifetime operation for each wire is typically required for today’s devices. Figure 89.36Wire matrix serial printhead. (Source: R.C. Durbeck and S. Sherr, Eds., Output Hardcopy Devices, San Diego, Calif.: Academic Press, 1988, p. 187. With permission.) Figure 89.37Solenoid and pivot-type actuators for serial wire matrix printing. ? 2000 by CRC Press LLC Higher draft-quality speed (e.g., 200 cps) can be achieved without decreasing wire cycle time by simply increasing the carriage speed. Higher than normal print quality can be accomplished by both slowing down the carriage and interlacing horizontal rows of dots. This near letter-quality printing is usually at greatly reduced speed (e.g., 48 cps). Most printers also print during the carriage return. Color can be produced by shifting four-color ribbons. Defining Terms Line printing: A printer prints one full line width of characters or dots at a time. The paper is then moved into the next print line position, ready for the next line of characters or dots. The printer may pause or stop between lines. Printing speed is often given in units of lines per minute (lpm). Page printing: The information to be printed on a page is electronically composed and stored before shipping to the printer. The printer then prints the full page nonstop. Printing speed is usually given in units of pages per minute (ppm). Pixel: The nominal printed spot area or “picture element” addressed by a particular printing device. It is sometimes called “pel.” Serial printing: Printing is done one character at a time. The print head must move across the entire page to print a line of characters. The printer may pause or stop between characters. Printing speed is usually given in units of characters per second (cps). Related Topic 89.1 Input Devices References R.C. Durbeck and S. Sherr, Eds., Output Hard Copy Devices, San Diego, Calif.: Academic Press, 1988. J. Heinzel and C.H. Hertz, Advances in Electronics and Electron Physics, vol. 65, P.W. Hawkes, Ed., San Diego, Calif.: Academic Press, 1985, pp. 91–285. L.B. Schein, Electrophotography and Development Physics, Berlin: Springer-Verlag, 1988. J.M. Sturge et al., Eds., Imaging Processes and Materials, New York: Van Nostrand Reinhold, 1989. D. Winkelmann et al., Ullmann’s Encyclopedia of Industrial Chemistry, vol. A13, Weinheim, Germany: VCH Publishers, 1989, pp. 571–660. Further Information Proceedings of the SPSE and IS&T International Congresses on Nonimpact Printing, published by the Society for Imaging Sciences & Technology, 7003 Kilworth Lane, Springfield, VA 22151. Proceedings of the Society for Information Display, 1980–1996, published by The Society for Information Display, 1526 Brookhollow Drive, Suite 82, Santa Ana, CA 92705–5421. 89.3 Smart Cards Witold Suryn and Michel Veillette The smallest laptop in the world. That is the frequently used expression describing intelligent chip cards. The word “intelligent” plays an important role, as there are also other, very popular chip cards that can hardly be named that way — memory cards containing defined amounts of available memory and some access control logic. One can find them today as the most consumed commodity articles: prepaid services cards. A good example would be a telephone card, preloaded with some electronic “money” when manufactured, debited each time one makes a phone call and, finally, thrown out when emptied. Even if interesting as technology solution this type of card won’t be a subject of next chapters as this article is rather dedicated to intelligent members of chip card’s family — Smart Cards. ? 2000 by CRC Press LLC The history of this device is long with plenty of defeats. Invented in 1974 by Roland Moreno in France (there were also earlier announcements: in 1968 in Germany and 1970 in Japan), it was refused any right of recognition as a “usable invention.” These years the world was dominated successfully by a still-new fashion — plastic cards with a magnetic stripe. The very important questions are: did such a status quo change? Where? And why? Depending on the region of the world, smart cards replaced magnetic-stripe cards more or less successfully. In Europe, you could hardly find a single magnetic stripe card in use, while in America, intelligent chip cards (ICC) still experience their childhood. The reason for such a worldly footprint of ICC technology is due to the market’s demand for security measures as well as for diverse functionality. Last, but not least, the costs of on- line telecommunication services should be mentioned. Magnetic stripe offers about 140 bytes of available memory, almost nonexistent security, and in most cases, requires costly on-line service while ICC may be used in both on- and off-line environments, grants a very high, sophisticated level of secure operation and, finally, allows multifunctionality. Could it be explained more vividly? Yes, if you make comparison between a piece of magnetic tape and a computer. Because a smart card is a computer. In following chapters, we will attempt to present to the reader a complete overview of the world of smart cards. Beginning with internal hardware architecture through card software applications and ending by complete system solutions, we hope to prove the exceptionality of ICC technology both from technical and applicability points of view. Hardware Architecture Year 1998 state of the art recognizes two main hardware architectures of the ICC: 8-bit and 32-bit microcon- trollers. Why not 16-bit? Because silicon chip technology goes faster than “bits-and-bytes” maturity fights of smart card software developers. 16-bit did not catch its historical moment, however, from time to time there are successful attempts to re-use this technology. This statement may sound strange for nowadays’ software programmers used to easy “consumption” of megabytes of memory but for those who began their developer careers in early 1980s, the mastership of putting every required functionality in magic “64k” number of bytes must sound familiar. 8-bit Microcontroller Based ICC The architecture presented in Fig. 89.39 is one of the most obvious schemas known in computer science. Things become less obvious when put in ICC context. What are the roles of blocks forming ICC when compared to “full-blooded” computer? ? Microprocessor is a typical CISC (Complete Instruction Set Computer) 8-bit unit driven by an external clock of 3.57 MHz frequency you might find in early standalone systems. ? I/O — typical input/output serial communication device. ? RAM — the same memory you find today in any type of a machine. FIGURE 89.38 Pocket computer — Smart Card (courtesy of Gemplus Corporation). ? 2000 by CRC Press LLC ? ROM — system kernel in ICC, BIOS in PC (observe the difference). ? EEPROM — ICC’s hard disk. It may happen that some readers now feel a bit surprised, but the surprise will become bigger when we look at “numbers.” By default, 8-bit processor maximum memory space is 64 kilobytes (2 16 ), but in most manufactured ICCs that space is not fully used. Why so, if even 64k seems to be today less than nothing? The answer is simple: price. The device being sold yearly in hundreds of millions must be cheap, but memory forms a considerable part of the overall cost of the chip. So, as much software as possible is needed in as little memory as a developer can possibly accept. Let’s then come back to numbers: ROM — average 8k, RAM — 256 to 1024 bytes (no, we did not forget “kilo”), EEPROM — 4 to 32k (we can imagine the ironical smile of the reader — 32 kb of hard disk). And that’s the whole wealth that the developer has for his needs. Now, dear reader you can understand why developers fight for every bit. Sometimes even for a half of it. And why the ICC software world is so specific, closed and exacting. The last important feature of chips being used is the voltage of power supply (Vcc). The most commonly used voltages are 5V and 3V, however, lower (1V, 0.5V) voltages are being strongly considered. Let’s have a quick look at the industry. Most of manufactured ICCs are based on one of two industrial patterns: Intel’s I8051 microcontroller and Motorola’s 6805 one. These patterns were broadly accommodated by the world’s biggest hardware manufacturers like Siemens, Hitachi, SGS Thomson, Texas Instruments and of course — Motorola. These five names are the leaders of the smart card industry. 32-bit Microcontroller Based ICC Thirty-two bit microcontrollers are the discovery of the past year. Still new and fresh, they attract card manufacturers’ attention by its potential processing power and much larger memory space. FIGURE 89.39 The general hardware architecture of 8-bit ICC, where: Vcc — +5V power supply line Gnd — 0V (ground) line I/O — bi-directional communication line Clk — external clock line RST — external reset signal line RAM — random access memory ROM — read only memory EEPROM — electrically erasable programmable ROM ? 2000 by CRC Press LLC The internal structure of the chip is very similar to this shown in the Fig. 89.39, however, some differences may be observed: ? Microprocessor is 32-bit RISC (Reduced Instruction Set Computer) type. ? EEPROM may be replaced by faster and easier to re-program Flash ROM. ? Two I/O lines. ? In newest releases, ordinary RAM is being replaced by FeRAM (20 times quicker if used in 8-bit chip, several hundred times in 32-bit chip). ? Clock rate is 33MHz (for Vcc = 5V). ? Memory is split into Banks (pages). Now again numbers: ROM — average 56kb, RAM — 2kb, EEPROM — up to 64kb. The first impression we might have is that such a machine should give the output several tens of times better than its 8-bit sister. Surprise! The recent benchmarking based on Java Card applications (Java Card will be discussed later) have shown that the performances of both cards may be comparable, but not the price, as the 32-bit card is several times more expensive. So why go in this direction? There are many reasons among which some are crucial. Although the 8-bit solution has almost reached its top performance, that does not mean that it’ll vanish overnight. As in the world of cars, there are fans of Rolls Royce, Cadillac, and Geo Metro which exactly reflect the future of 8-bit cards. Many existing and incoming applications will still be satisfied by an 8-bit solution, offering to card issuers and clients something fulfilling their needs and at the same time remaining affordable. The second crucial reason is 32-bit technology maturity being on its learning curve. In certain, software developers as well as chip manufacturers will reach the level of expertise high enough to push prices from the “Cadillac” level to the “Geo Metro” level. The 8-bit card shall survive even if in the “bicycle” position. The market continuously creates a third important factor: multi- application requirement. Today most of us have his/her wallet filled up with dozens of credit and/or debit cards, ID cards, healthcare cards, loyalty program cards, etc. Card issuers try to attract their customers by a vision of merged functionalities installed on one card, requiring a need for more sophisticated technology. The perception today of such a solution directs issuers’ as well as card manufacturers’ interest toward 32-bit technology. There is still a future for now since there are few 32-bit chip manufacturers known: NEC, Philips, Siemens, and Hitachi, however, the rest of world’s biggest players are close to launching their modern products. Contact ICC, Contactless ICC The distinction of contact and contactless cards brings us on the next level of smart card technology. “Contact” or “contactless” define the method in which the card communicates with the external world. There are cards combining both methods sometimes called “combi” cards. Contact ICC (Fig. 89.38) is equipped with a small field of ohmic contacts to which all necessary signals are being applied. To operate such a card, a reader would have to possess the ability of physical touch. Contacless ICC uses “untouchable” media such as microwave transmission, optical transmission, capacitive coupling and inductive coupling, but — due to physical constraints — the latter one is most commonly accommodated. Before we proceed further, two facts should be strongly expressed: there is no power supply on board the card and the transmission is unidirectional (terminal to card). In such a case, four problems arise: ? How to power up the card. ? How to transmit clock. ? How to transmit data to the card. ? How to transmit data from the card. From a purely electrical point of view, the solution seems to be simple: both card and terminal are equipped with coupling loops (electrical coils) allowing transmission of energy similar to a coreless transformer (Fig. 89.40). The card’s loop is embedded in a plastic body to avoid getting destroyed or touched. The main carrier is a sinusoidal magnetic field (f = 4.9152MHz) that transmits the power supply to the card. To transmit the data/clock to the card, the terminal uses frequency modulation of the main carrier, being easily ? 2000 by CRC Press LLC filtered and decoded by the card’s I/O device. Transmission of the data from the card to the terminal is based on the passive amplitude modulation of the main carrier, which is executed by changing the card’s I/O circuit impedance differently for “0” and “1.” To read the information, a reader must be able to detect a potential drop in the impedance in its internal AC generator. Inside the contactless type of cards there are two sub-groups recognized: close coupling cards and remote coupling cards. The distinction between the two is based on the distance terminal-card and the power that may be transmitted to the card. Regardless of which communication carrier is used, the transmission speed between the card and the terminal is, in most cases, one of the following: 9600 bit/s, 19,200 bit/s, or 115 kbit/s. Operating Systems Operating system (OS) is the next layer of technology that makes the microprocessor card a smart card. The term operating system applied to a smart card is in some sense misleading as in many cases even highly experienced programmer/analysts would not be able to find a clear borderline between “system” and “applica- tive” layers. Due to continuous memory constraints smart card software designers chose the formula of “nested functionalities” that finally resulted in placing real functionality inside OS services (or the opposite, depending on your point of view). Each card manufacturer has its own family of operating systems offering different dedicated functionalities to the user that are characteristic of the specific manufacturer. That type of OS forms a vast group of software products called proprietary OS. In the mid-1990s, another approach to smart card OS emerged: open OS. By its definition the open OS is quite similar to familiar DOS with the exception of being placed in the card’s ROM instead of the computer’s hard disk. For either of them some principles apply: ? The stable part of software application is placed in ROM during the masking (chip manufacturing) process. For proprietary OS, it makes all the functions regardless of whether “system” or “applicative” form the basic dedicated platform. For open OS, in most cases ROM keeps, at a minimum, basic OS. ? The changeable part of software application is always loaded to EEPROM. In both cases, EEPROM keeps “add-ins” stored in ROM. For proprietary OS, this is the “filter” consisting of either additional func- tionalities or corrective patches. For open OS, real functional software is stored. EEPROM contents may be loaded to the card during personalization process (when a real, customer-dedicated card is manu- factured) or in any moment of a card’s life cycle. ? RAM is used to store only temporary data during transaction time. No application code is allowed to be loaded to RAM for a card may be withdrawn from the terminal at any moment causing a permanent loss of important code. ? Communication with the external world is processed by means of specific interpreted code structures called APDU (Application Protocol Data Unit) and data exchange (for further details see [1–3]). ? The way in which a card performs required functions is based on strictly-defined rules concerning memory file structure, data structure and format, file management, data management, access rights (read/write/exe- cute control), execution control, and atomic (backup) methods (for further details see [1–3]). FIGURE 89.40 Card-terminal communication principle. ? 2000 by CRC Press LLC ? Of the pair, the terminal-card card is always a “slave.” Such a situation results from the simple fact that it’s the terminal that “wakes up” a card by applying power and reset signals to the card. In response, the card sends back ATR (Answer To Reset) APDU which identifies itself to a terminal. From this moment on the real session starts. The session may be terminated either by a card or by a terminal. In the following two sections, we will try to present both types of OS and discuss their pros and cons. Proprietary Operating Systems Proprietary OS is always targeted to fulfill a defined scope of ded- icated functionalities. The general, however specific, structure of the proprietary OS is shown on the Fig. 89.41. Such a structure may give the impression that proprietary OS is created in a “fuzzy” manner. This is incorrect. All the memory is perfectly structured, with areas storing data, application code, and basic OS functions as well as native functions (procedures perform- ing most basic functions as I/O protocol, DES algorithm, basic math, atomic functions, etc.). What are not that well-structured are functionalities performed by the card. Let’s take the example of an electronic purse. From the user’s point of view, the card should perform at minimum the following functions: ? User authenticate (user proves to the card that he/she is the owner of the card). ? Credit the card within pre-defined limit. ? Debit the card within pre-defined limits. ? Disable any attempt to break into the contents of the card. In “nested” OS, none of the above functions are standalone. All of them are, in great part or even totally, performed by OS. In most cases, the reader may find in an application area “script(s)” per- forming needed function(s) by calling necessary subroutines within OS, but rather rarely a standalone block of software per- forming an independently new function. What are the pros and cons of such a structure? Let’s investigate: PROS ? High “density” of the software or, in other words, good functionality/memory consumption ratio, ? Good functionality/price ratio, ? Good functionality/performance (speed) ratio, ? Good way to build a stable relationship between the card issuer and card manufacturer (watch the interpretation of this point in CONS). CONS ? Applications are not portable, sometimes even within the same family of operating systems. ? Debugging process requires tremendous efforts as, in the worst case, the entire card software has to be verified. ? There are only two ways to correct found bugs: add the “filter” in EEPROM (not always possible, but always temporary) or remask the chip. Specifically, the second possibility in some cases may be called the disaster as when the bug is found in the card that has been deployed into the market in 100 million volume. ? Good relationship created by a chain Card Manufacturer → Functionality → Card Issuer is more and more often perceived as a master-slave relationship. Card issuers prefer to be supplier independent. The conclusion drawn is somewhat obvious: proprietary OS is a handicapped solution, but there are hundreds of millions of such cards issued each year that imply the message: more flexible technologies are still to come. FIGURE 89.41 Proprietary OS structure. ? 2000 by CRC Press LLC Open Operating Systems Smart Card open operating systems (OOS) are being developed continuously since the early 1990s reaching the position today of emerging technology. The basic assumptions for OOS development are: ? Portability of applications. ? Application load/delete function. ? Multi-application ability. ? Upward/downward compatibility of OOS within the family. ? Development environment similar to or being a subset of “full-blooded” computer software development environment. ? High-level programming language. ? High level of security, both inside the application and outside (firewalls). ? Shorter development time (time to market). The general structure of OOS smart card is presented on Fig. 89.42. How much clearer is such a structure when compared to proprietary OS? The OOS forms a well-defined group of layers over which the real applications reside. Bottom-up direction shows higher and higher levels of abstraction of consecutive layers: ? Native functions and system resources — all the basic functions that are time critical (I/O subroutines, basic cryptographic functions, atomicity, basic file management) developed in assembly language. ? Virtual Machine — on-card interpreter of bytecodes. ? API — application programming interface — set of generic libraries. ? Specific API — nonmandatory API dedicated to specific card functionalities. ? Card Executive — file and application manager (loading/removing applications). ? Applications — developed in high-level languages, stored on the card in bytecode format. Applications developed for such a type of the card are commonly called applets or, better, cardlets. Usually, the cardlet is developed on the PC using one of several higher-level languages in a not necessarily dedicated development environment. Dedicated environment comes on the stage in the moment of the first compilation FIGURE 89.42 General structure of OOP Smart Card, where: Appl1,2,..n — card applications, API — application programming interface ? 2000 by CRC Press LLC and debugging. What is important to observe as the difference between PC-dedicated compilation and card- dedicated compilation is the result: for PC you may obtain the executable file (*.exe), for card it’s always bytecode (*.cap) as the card interprets application code by code. Debugging of the cardlet may be done in a simulated, PC-based environment as well as in a natural card environment. Ideally, during card life cycle, cardlets may be downloaded, added, or removed changing the profile of the card. All three possibilities generate immediate problems of a different nature: ? Co-existence of two or more cardlets requires high security measures to firewall cardlets against cross- corruption in any form as well as raises the needs of re-usability of common objects. ? Any type of manipulation of the cardlets creates responsibility/legal issues to be solved in the near future such as Who’s got the right to manipulate cardlets? Card issuer (bank?), card manufacturer, or card user? How to maintain cardlets and their life cycle, etc. There are more issues of both a technical and legal nature, to be answered, so those interested in smart card technology may get closer to it by observing the works of international standard bodies (e.g., ISO), industry associations (e.g., SCIA) or international forums (best known is Smart Card Forum). PROS ? Any developer knowing higher-level programming languages may develop an application. No “bits-and- bytes” fighter knowledge necessary. ? Development environment is PC-like or purely PC. ? Debugging may be off-card as well as on-card. ? Development time is incomparably shorter than this for proprietary OS. ? As applications are loaded by default to EEPROM, any in-the-field bug may be fixed by simply reloading the cardlet. ? Time to market dramatically shorter. ? Portability of applications. ? The customer is supplier independent. CONS ? Technology still not mastered, both in hardware and software domains. ? Development/debugging tools in a childhood phase. ? Performance still low (due to interpretation mode of operation and slow hardware). ? Due to evolution phase of standards, portability of cardlets merely applicable. ? High cost of cards. The conclusion might be: first steps are always the heaviest, but to explode, OOS technology needs more maturity rather than technical improvements. Next five years are forecasted as the real startup for OOS smart cards. Standards Smart card is one of the best standard-guarded pieces of equipment. The set of ISO 7816 regulations defines all the aspects of smart card technology and life cycle. Most of them are stable, however, due to continuous software and hardware technological improvements all of them are being amended. The complete list of applicable standards is presented below: ? ISO 7816-1 — Identification cards — Integrated circuit(s) cards with contacts — Part 1: Physical characteristics. Defines physical characteristics of cards as well as tests to be applied. ? ISO 7816-2 — Identification cards — Integrated circuit(s) cards with contacts — Part 2: Dimensions and location of the contacts. Defines dimensions and locations of contacts and magnetic stripe as well as tests to be applied. ? ISO 7816-3 — Identification cards — Integrated circuit(s) cards with contacts — Part 3: Electronic signals and transmission protocols. Defines basic electronic characteristics of ICCs, power supply, data elements in ATR and transmission protocol T = 0. ? 2000 by CRC Press LLC ? ISO 7816-4 — Identification cards — Integrated circuit(s) cards with contacts — Part 4: Interindustry command for interchange. Defines internal software structure of ICCs, security requirements, formats of APDUs, communication codes. ? ISO 7816-5 — Identification cards — Integrated circuit(s) cards with contacts — Part 5: Numbering system and registration procedure for application identifiers. Defines system for clear identification of national and international applications in ICC. ? ISO 7816-6 — Identification cards — Integrated circuit(s) cards with contacts — Part 6: Interindustry data elements. Defines data elements and structures used in retrieval of data from ICC. ? ISO 7816-7 — Identification cards — Integrated circuit(s) cards with contacts — Part 7: Enhanced interindustry commands. Defines additional commands added to Part 4 for SQL access, encryption, secure messaging. ? ISO 7816-8 — Identification cards — Integrated circuit(s) cards with contacts — Part 8: Interindustry security architecture. Defines security architecture of ICCs. ? ISO 7816-9 — Identification cards — Integrated circuit(s) cards with contacts — Part 9: Additional interindustry commands and security attributes. Describes coding of the life cycle of the cards and related objects, coding of security attributes of card related objects; functions and syntax of interindustry commands not defined in other parts of ISO/IEC 7816; data elements associated with these commands; and a mechanism for initiating card-initiated messages. ? ISO 7816-10 — Identification cards — Integrated circuit(s) cards with contacts — Part 10: Electronic signals and Answer To Reset for synchronous cards. Defines basic electronic characteristics, power supply, data elements in ATR for synchronous cards. ? ISO 7816-11 — Identification cards — Integrated circuit(s) cards with contacts — Part 11: Card structure and enhanced functions for multi-application use. Defines an enhanced logical structure for multi-appli- cation cards to support security with applications loaded after issuance, prerequisites for loading of an application after issuance, a mechanism to support an application life cycle independent of the card life cycle, interapplication security issues, including storage partitioning. For more details you may refer either directly to International Standards Organization or to ISO Web site: www.iso.org. Applications The purpose of this chapter is mostly descriptive, aiming to show the wealth and diversity of existing and upcoming applications deployed all over the world. The smart card industry is formed by a few big manufacturers covering practically all of the world’s needs (Gemplus, Schlumberger, Motorola, Orga, De La Rue, Gisecke&Devrient, and Oberthur). Each of them offers either applications, platforms, or both. The short overview of possible applications will be more persuasive if done by market sectors: ? Banking: credit/debit card, electronic purse, loyalty programs, individual financial programs. ? Retail: loyalty programs, retailers’ credit cards. ? Healthcare: personal medical treatment databases (medical files). ? Wireless communication: SIM (Subscriber Identity Module) card, OTA (Over The Air) services, e-mail services. ? IT (Information Technology): security access to IT systems, encrypting/decrypting files, securing e-mail, Internet transactions (e-wallet, e-commerce). ? Universities: multi-functional ID cards (credit, electronic purse). ? Government and agencies: ID cards, internal electronic purse, time control. ? Physical access: ID cards, zone access control. ? Manufacturing: electronic tags. ? Transportation: ticketing, air-miles programs, driving licenses. Most of the above-mentioned applications are based on a proprietary OS, however, OOS early birds are also observed. The first steps on the way to commercial OOS have been recently done by some of the industry ? 2000 by CRC Press LLC leaders. The joint efforts of Sun Microsystems, Gemplus, and VISA-created Java-based Visa Open Platform (VOP), Schlumberger has created its Java-based Open Platform — Cyberflex, Gemplus has its Java-based GemXpresso and its own OOS — Nucleos, and last but not least, MULTOS — OOS created by consortium MAOSCO/Mondex. Though still not matured, all of these OOSs have already provoked the chain reaction: creating cardlets’ development industry. Readers A smart card is of no use if you cannot communicate with it and the reader is the element that will give life to this hand-held device. The market offers several kinds of readers. Readers are categorized in three classes: standalone, peripheral, and contactless. Standalone Readers Standalone readers are modules that offer a complete interface to operate and communicate with the smart card. That kind of reader can be a part of a complex machine such as an automatic teller machine or presented as a hand-held device. For an application such as an automated bank teller, the smart card reader is then a programmable device integrated into a larger system with several peripherals such as display, keyboard, real- time clock, and printers. In many cases, the complete system also includes several security mechanisms from protected housings to sensors for detecting attacks and security modules. A security module is a smart card that holds the terminal secret keys, which are used to create card-specific keys. A standalone reader usually has a communication link to operate as a peripheral of a larger transaction server that will verify the user identi- fication and take charge of the information transmission, reconciliation of transactions, etc. Other applications require a reader that will participate in a secure information exchange transaction between participants. Thus, desktop systems are smaller and have their use in business application to provide secured services. Along with security modules, some readers will accept several cards to authenticate, for instance, the owner and the receiver of a confidential information. In healthcare application, the patient will authorize access to his files while the doctor will provide the proof that he has the right to access this kind of information. Several security modules will ensure security and protection for different applications executed through the same reader, treated separately one from another. Other suitable applications for those readers are payment transactions, electronic purses, and loyalty programs. The integration of the keyboard and the display to the security of the process ensures that the user’s PIN and exchanged information are not tapped by another software. Hand-held systems offer the flexibility of mobile systems. Integrated with telecommunication devices and hand-held computer technology, these systems can present touchscreen interfaces and provide facilities such as gaming, fax, e-mail, telephone, e-purse, loyalty, healthcare or driver’s license programs, security, authenti- cation, identification, electronic payment, secure access to networks, secure data transfer over those networks, etc. GSM is gaining more popularity by using the cell phone as a mobile reader to personalize your phone and provide the user with facilities such as e-mail and prepaid services. Peripheral Readers A peripheral reader provides a communication interface between a larger system and a smart card. Using standard interfaces, the reader is usually coupled to a control system that will send commands to the reader. A peripheral reader can be integrated into a larger peripheral, such as payphones, a vending machine, or a card personalization device. Peripheral readers are often attached to a computer to add functionality for card-aware applications. The market offers several types of connections for peripheral devices. Serial connections are suitable for most desktop computers and are standard and affordable. PC Card connections (pcmcia) are mainly for laptop computers. Although slow, keyboard readers, using the PS/2 connection, provide better security, mainly for the PIN management. When entering a pin, the reader intercepts the characters from the keyboard and replaces them with a neutral character that is sent to the system. This way no resident software can intercept the PIN. A keyboard reader can be integrated to the keyboard itself or added to the PS2 connector of the keyboard. USB readers are now coming into the market and will compensate for any deficiency of the serial reader. Some ? 2000 by CRC Press LLC attempts are also done to integrate a reader into a mouse or floppy disk. This last solution offers the user the possibility to use a smart card without adding new hardware to his machine. Finally, one can find specialized peripheral readers combining the functionality of other device types. For instance, a smart card reader and modem were combined to secure network access in Internet communication, electronic commerce, and home banking. Also, a smart card reader and a television signal processing module were combined for conditional access, electronic program guides, interactive applications, home shopping, and payment systems. The use of peripheral readers is an emerging market with the recent deployment of application for the electronic commerce, home banking, online gaming, health care, network security on the Internet, and tele- communications. Readers with biometrics interfaces have begun their introduction on the markets. Fingerprints are used instead of a PIN to authenticate the user. Contactless Reader A contactless reader (also called proximity reader) needs no physical contact between the card and the reader to exchange data. The card goes immediately into action when it is within a few inches of the reader. Trans- mission details were described earlier. Using a hard-wired algorithm and random number generation, it is possible to provide high-level security. The reader and the card use a mutual authentication and a stream ciphering. Such system must also provide anticollision management to operate with multiple cards in the communication field. Contactless smart card readers are perfectly suited for physical access control and smart tracking applications. The use of Smart Labels (or tags) injected or embedded into a product allows the identification and tracking of product for either authentication or automated manipulation. Since data can also be written into a contactless card, payment functions can be implemented for fare collection in public transportation, for instance. When the distance between communications is a concern, systems using intelligent transponders enable the payment of tolls from equipped vehicles travelling on motorways at normal speed. Card-to-System Solutions Naturally, communication with a smart card would be impossible without several software layers that transform the request of the user into a sequence of bits transmitted to the device. At the lowest level, the drivers provide the basic functionality by transferring a sequence of bytes to the reader. Then layers of software are built over the driver to form application program interfaces (APIs). API offers to the application developer functions that combine basic operations to hide specificity of a particular device and to ease the development. Drivers To communicate with a reader, the basic transmission is handled by three protocol layers: the physical layer, the transport layer, and the command layer. The physical layer is related to the data transmission itself through the physical port (serial, pcmcia, usb, etc.). The transport layer specifies the transmission type, the message addressing, and handles the message validation. It defines how each byte transmitted by the physical layer is interpreted and ensures that it forms a consistent and valid message. Finally, the command layer specifies commands that are transmitted to the reader to execute a set of functions. These functions will allow the communication with a smart card and the management of events such as insertion and removal of the card. In the communication process, the driver is a piece of software that hides the treatment related to the physical and the transport layers. With documented interfaces, the user can use the command layer to send commands to the reader and to communicate with the card. Usually, the operating system integrates drivers that take charge of the physical layer. The device vendor will then write a filter driver that is placed over the other one to wrap up the transport layer, transmitting commands into well-defined packages. The driver will allow basic commands to the reader: setting parameters of the readers (communication speed, voltage levels, card type used), setting communication parameters between reader and card (protocol, speed), power on, power off, transmitting bytes to the card. Moreover, the driver must manage the events coming from the system and control the states of the device. For instance, the insertion or the removal of the reader involves some processes of initialization of the communication and registration of the connection. The driver must also allow the sharing ? 2000 by CRC Press LLC of the resource by multiple applications or threads. Security issues regarding those accesses must be considered. One must preserve access to the information on the card from the application that was not allowed. With only the driver, the development of an application requires the knowledge of the command format to send to the card and of the mapping of the smart card. To ease and speed up his development, a programmer needs tools that hide specificity of cards and readers. API and middleware are coming to his rescue. APIs and Middleware Application program interfaces (API, also called middleware) usually take the form of libraries that provide the user with high-level functions to ease the development and to hide disparities between different technologies. Basic APIs try to hide the command layer to the user and regroup under common interfaces the communication with different readers. At a higher lever, an API hides the smart card operating system particularities, providing the user with card services and with abstract concepts that ease the use of the information on the card. Thus, card services will allow the user to select a file, to read, write, and erase objects on the card, and to authenticate the user. API can also regroup specialized functions such as cryptographic functions, purse functions, etc. Usually, APIs are proposed by smart card vendors to offer an easy-to-use environment for the development of applications on their products. It offers a wide variety of commands and responses. However, it makes the developer dependent of a product and of the support of these API. Efforts were made to standardize some API. PKCS#11[5] is an example of cryptographic libraries. This standard API is defined by RSA (RSA Data Security, Inc.) and permits the use of data objects in the form of tag-length-value. Standardizing Approach With the lack of interoperability between operating systems, API, readers, and smart cards, some efforts were made to offer more compatibility and harmonization. PC/SC and the OpenCard Framework are the main stream. PC/SC PC/SC[4] is an effort to provide interoperability of the smart card technology in the personal computer environment. The aims of PC/SC is to simplify the development of application by defining high-level program- ming interfaces that reduce the dependency of application on proprietary implementation. To achieve its goals, PC/SC distinguishes three layers between the hardware device and the application level: The IFDHandler Layer, the resource manager layer, and the service provider layer. The IFDHandler allows access to the smart card reader. It is the driver level and the hardware manufacturer that will normally provide it. PC/SC defines the interfaces that the IFDHandler must expose to take place in the structure. The IFDHandler is the implementation of the functionality required by the exposed functions to transmit commands to the reader and/or the card. The IFDHandler maps the native capabilities of the smart card reader to the IFDHandler interface. All distinctions between smart cards based on ISO protocol handling, whether synchronous or asynchronous, are hidden. Once installed, the IFDhandler registers itself to the Resource Manager. The Resource Manager is a key component of the PC/SC architecture. It is responsible for managing the other resources (such as service providers) within the system and for controlling access to the smart card readers and to the card itself. The Resource Manager is provided by the operating system vendor. Thus, the Resource Manager is responsible for identification and tracking of resources. This includes the tracking of the readers, of the smart cards, of the service providers, of the supported interfaces and of the smart card insertion and removal events. Thus, the Resource Manager can list the available resources to each application. The Resource Manager is also responsible for controlling the allocation of readers and across multiple applications with shared or exclusive modes of operations. Finally, it supports transaction primitives to allow multiple commands to be executed without interruption, ensuring that intermediate state information is not corrupted. The Service Provider regroups a set of functions exposed by a specific smart card and makes it accessible through high-level programming interfaces. The common functionalities are related to file access, authentica- tion, and cryptographic services. However, these interfaces may be extended to meet the needs of specific domains. ? 2000 by CRC Press LLC PC/SC divides the Service Provider into two independent components: the Smart Card Service Provider (SCSP) and the Cryptographic Service Provider (CSP). The CSP regroups cryptographic functionality through high-level programming interfaces. This distinction was brought to deal with security issues and with interna- tional laws regarding cryptographic devices. The Answer To Reset (ATR) string is used to perform the binding between a card and an interface. Thus, when a service provider is installed on a system, it registers itself to the Resource Manager with the ATR of cards it can serve. An application can define at run-time which Service Provider will be used since the Resource Manager enumerates the list of the available interfaces when the card is inserted. Although PC/SC is platform neutral, to date, Microsoft did the only implementation of this standard on Windows platform (even now the implementation still lacks of some features: “plug and play” and power management). Card services are exposed to an application through Component Objet Model (COM) interface. PS/SC v.1.0 supports only T = 0 and T = 1 cards and optionally T = 14 (protocols of communication between a card and a reader. For details see [1–3]). Next release of this standard will consider memory card and multiple interfaces readers such as keyboard, display, multiple cards, and SAM modules. OpenCard Framework OpenCard Framework (OCF) [6] objective is to offer to the programmer a transparency with regard to smart card operating systems, card terminals, and card issuers. To achieve this, OCF has defined a provision of functions to support installation, removal, enumeration, selection of applications on the card and of functions to perform name resolution for data files on the card. Several mechanisms allow a user to develop an application without knowing where the card issuer placed his applications. OpenCard Framework based its architecture on two main parts: the CardTerminal layer and the CardService layer. The CardTerminal layer plays the role of the driver and the reader manufacturer should provide it. It offers an interface that enables the seamless integration of the reader in the OCF environment. With OCF-compliant interfaces, a specific card terminal gives access to the reader and the smart card. A CardTerminal can also act as a bridge to provide a transparent access to a reader through the PCSC interface to take advantage of the existing components. The CardService layer is defined as a high-level application programming interface that hides the character- istics of a particular provider’s components (specific to a type of smart card and/or smart card reader) from the application and service developers. Card services are standard APIs regrouping functions to access resources of a card operating system. Thus, a card issuer will provide the users with a card services allowing access to the files (FileAccessCardService), to the signature functions (SignatureCardService), to PKCS#11 functions, to the ISO7816 file system, and to purse functions. Between those two layers, a specific card service, the application management card service, manages the card resident applications. The application management component lists the applications that a card can support, locates them or even installs or removes them from the card. It is a special card service, also provided by the card issuer, that can manage multiple applications on the same smart card. OCF essentially was created for the Java programming environment and the world of network computing. Because of this, it claims all the advantages that the Java language provides. Basically, any platform that is capable of running JAVA can exploit OCF right away. Moreover, OCF offers mechanisms to allow one to download from the network missing components for a particular card at hand and plug them into the framework. As it is for Java, OCF targets embedded systems such as automatic teller machines, point-of-sales terminals, and hand-held devices (phone, electronic agenda). Applications Developing an application is made easier and more flexible when based over standard API and middleware products. The challenge remains, however, to respond to the new needs of the industry. Applications must integrate security schemes to avoid holes and prevent piracy of a system. To secure their system, applications developers must be aware of the complete structure of the operating system they are using. For instance, the market proposes new software to protect access to a computer and to encrypt files on computers. Such a system requires low level control of the resources of a computer to block unexpected entry. Also, sensitive information must not be exposed. Encryption keys are never kept clearly in memory to prevent software attack. ? 2000 by CRC Press LLC Applications are also confronted with the Internet challenge. Security systems are facing new offensives and new security schemes that must be put in place. The Internet not only broadcasts the information at the speed of light; it represents to hackers a tremendous power for parallel computing. Competitions are organized on the net to break encryption keys: each participant downloads the required software and adds its contribution to the computing effort. Key size is lengthened, consequently. Secure transactions over the net also bring new problems. Applications are distributed, client-server schemes become more important, the number of trans- actions are growing and, consequentially, we do not know who is on the other side. For an electronic wallet application, this is crucial because nobody wants to give his credit card number without some credentials. Third party certificates are there to authenticate your invisible partner and mechanisms are set to establish a confidence path between all involved parties of a transaction. Trends Trends in smart card industry may, but rather should not be, seen only from an ICC perspective. The reason is amazingly simple: the most powerful, super fast and multi-functional card is nothing more than a piece of plastic and silicon if there is no IT system able to use it. That’s why the trends will be discussed in two groups: card technology and complete solutions. The general challenges driving card technology trends may be defined by four simple words: faster, cheaper, more, easier. Technical solutions to come should allow multi-application (more), flexible functional profile i.e., easy changeable dedicated applications (easier), shorter, nonspecific technology-tied development cycle (faster), shorter time to market (more, cheaper), higher security level (easier). All of the above points to a generally named card open OS solution. How serious this trend is depends upon industry reactions. Hardware manufacturers design more powerful chips dedicated to operate with higher clock speeds, offering larger memory space, in some cases injecting specific commands into the processor’s command list (Siemens’s picoJava concept encapsulating specific Java- Card commands in processor design), and adding specialized coprocessors (cryptographic functions). Card manufacturers improve their OOSs to meet multi-application requirements by adding new features up to recently imminent to pure IT (multi-thread, COM, firewalls, add/load/delete), system integrators adapt their solutions to absorb specific card management systems (CMS) allowing control over the live cycle of applications (and cards), card issuers design multi-applicative programs for their customers, and finally, software develop- ment companies begin to create competitive, cutting edge competence in smart card OOS-dedicated applica- tions development. The recent entry into the industry includes the software giant — Microsoft with its Smart Card for Windows (SCW). This entry establishes the seriousness of the smart card trend. To penetrate new markets, the smart card industry must now develop value-added solutions by enhancing the functionality of the conventional card. To be attractive to customers, the same card should be used for access control, securing transactions on the net, and for payment. This trend implies the coexistence of multiple applications on the same card. It also means the customization of the user card. The Java Card and, more recently, the Smart Card for Windows are supporting this stream where developers can download their own application into the card. Defining Terms APDU: Application Protocol Data Unit is a set of bytes forming a unitary “container” used to send to or receive data from a card. There are two types of APDUs: command APDU (sent to a card) and response APDU (sent by a card). Formats of both APDUs are different, however, no mismatch is possible as the communication between a card and the reader is ruled by a sequence: command (reader)-response (card). API: Application Programming Interface. In general terms, API is a set of functionalities (library) loadable or preloaded available for a programmer developing the application. In smart card technology, APIs are found on board the card (e.g., Java Card) as well as on the system side (reader APIs). The goal of creating API is to free the developer from card-related specific knowledge allowing him/her to develop on the higher level of abstraction. ? 2000 by CRC Press LLC ATR: Answer To Reset is a set of maximum 33 bytes returned by a card to a reader after RESET signal was applied. ATR consists of information necessary to authenticate a card to the system and the reader as well as to negotiate all communication parameters as protocol, transmission speed, etc. DES algorithm: Data Encryption Standard algorithm is the most popular encryption/decryption mathemat- ical engine. DES is being broadly applied in the security domain for encryption/decryption purposes, secure messaging, and authentication. Best known is 56-bit encryption/decryption key version. For more sophisticated security applications, 3DES (triple DES) is being applied. 3DES is a method using DES three consecutive times with a different encryption key used each time. Filter: Filter, in smart card technology, defines an additional block of code loaded to the card’s EEPROM whose function is to either enhance the existing card’s functionality or patch found bugs. In the first case, you can see it as the development “pilot” that allows the manufacturer to check new releases before its industrial launch. In the second case, a “filter” is the easiest way to debug and fix existing application or OS. When checked, verified, and approved, the “filter” is moved to ROM and remasked. Masking process: The masking process is the essential process of manufacturing the chip to be later embedded onto a card. The masked chip contains all the hardware components as well as all of the software stored in ROM. The remaining EEPROM and RAM are empty and not structured. Personalizing process: The personalizing process is performed by a card manufacturer. The goal is to make a masked chip card that the customer can use. The process covers loading onto the card all specific customer info (name, primary security keys, serial number) as well as building the internal memory structure (directories, file structures, file types). PC/SC: Personal Computer/Smart Card (PC/SC) is the “de facto” or industry standard introduced by Microsoft Corporation. The standard defines structure, functionality, and communication entries for smart card readers’ drivers being installed on all existing Windows platforms (95, 98, NT4, 2000). USB: Universal Serial Bus is the newest PC technology applied to serial communication solutions. The technology allows connecting to a PC several serial devices in a chain at the same time. The communi- cation protocol between PC and external serial devices is similar to this used in networking. USB becomes more and more in demand in PC-Smart Card solutions. References 1. Allen C., Barr W.J. Smart Card seizing strategic opportunity. Irvin, 1998. 2. Jurgensen T. Smart Card developer’s kit. Macmillan, 1998. 3. Rankl W., Effing W. Smart Card Handbook. John Wiley & Sons Ltd., 1995. 4. PC/SC Workgroup. Interoperability Specifications for ICCs and Personal Computer Systems. Revision 1.0, 1997, available electronically at: http://www.smartcardsys.com. 5. RSA Laboratories. PKCS#11: Cryptographic Token Interface Standard. RSA Laboratories technical notes, version 2.01, 1997, available electronically at: http://www.rsa.com. 6. OpenCard Consortium. OpenCard Framework 1.1 Programmer’s guide. 1998, available electronically at: http://www.opencard.org. Further Information Gemplus Web site (www.gemplus.com). ISO web site (www.iso.ch). ISO-IEC JTC1-SC17 Web site (www.funkster.com/ossian). Proceedings of CardTech/SecurTech 1998, CTST 1998. Smart Card Forum Web site (www.smartcrd.com). Smart Card Industry Association Web site (www.scia.org). ? 2000 by CRC Press LLC