Contact us
Power IC and Copper Foil Welder Products
Address:601A, Jinmantang Building, Liutang Road, Xixiang Street, Bao’an District, Shenzhen, China
Tel : 0755-27959263
Tel : 0755-33662183 (spot welder)
Fax: 0755-27959173
E-mail :ds.johnson@qq.com
WEB: www.dcs-led.com
QQ: 706760594
Your location:Home > Industry news
Industry news
2018-04
10
Basic knowledge of smart CARDS.
Share to:

1. 1. Basic knowledge of smart card.

1. 1. 1 what is a smart card?
The name of the Smart card comes from the English word "Smart card", or Integrated Circuitcard, or IC card. It inlays an integrated circuit chip in a plastic substrate, encapsulated in the form of a card, similar to a magnetic card that covers a magnetic stripe.

IC card is the concept of 7 o s, Boolean (BULL) in France in 1976, the first to create the IC card products, and apply this technology to financial, transportation, medical, identification and other industries, it will hui electronic technology and computer technology together, to improve the modernization level of people's life and work.
IC card chip has the ability to write data and store data, and the contents of IC card memory can be externally read according to the requirements, which can be used for internal information processing and determination. According to the different integrated circuits embedded in the card, they can be divided into the following three categories:

1. The integrated circuit in memory card is an EEPROM(programmable read-only memory that can be erased electronically).
2. The integrated circuit in the logic encryption card has the encryption logic and the ZEPROM.

3. The integrated circuit in CPU card includes CPU of CPU, EEPROM, RAM of RAM, and the ChiPOperatingSystem (ChiPOperatingSystem) in ROM.
Strictly speaking, only the CPU card is the real smart card, but in this book, in order to discuss the comprehensive, more application needs, we will discuss the above three IC CARDS.

According to the application field, IC card has financial card and non-financial card.
The financial card also has the credit card (credtt card) and the debit card. Credit CARDS are mainly issued and managed by Banks, and cardholders use it as a payment tool for consumption and can use preset overdraft limit funds. Cash card can be used as electronic passbook and electronic wallet, not allowed to overdraft.

Non-financial CARDS often appear in various management and safety management places, such as identification, health records and employee attendance.
According to the form of card and external data transmission, there are contact IC CARDS and non-contact IC CARDS. Currently, contact IC CARDS are widely used. On this card, IC chip has 8 contacts to contact with the outside world. The integrated circuit of the non-contact IC card does not bring out the contact, so it has the rf transceiver circuit and its associated circuit besides the circuit of the three IC CARDS mentioned above.

In IC card before launch, on a world scale, magnetic card, has been widely used for the magnetic card smooth over to IC, but also for compatibility, on the IC card is retained the original function, that is still on the IC card with a magnetic strip, so the IC card can also be used as a magnetic card at the same time, the appearance of the IC card: the front on the left side of the small square in have eight contact, its below is convex type character, with a magnetic stripe on the back. The front can also print various patterns, even portraits. The size of the card, the position of the contacts, the position of the magnetic stripe and the data format are clearly defined.
Whether it's a magnetic card or an IC card, the card has a unique issuer and a cardholder's identification card, which is sometimes called a recognition card.

1. 1. IC card interface equipment.
In order to use the card, you also need to have an InterFace Device, or a reading and writing Device, that works with the IC card. IFD can is a microprocessor, keyboard, display and I/O interface independent of equipment, the interface device by means of the eight contact IC card well supplies power to the IC card and IC card exchange information. IFD can also be a simple interface circuit, which is connected to a general microcomputer by the IC card. Whether it is a magnetic card or IC card, the information stored on the card is always limited, so much of the information needs to be stored in an interface device or computer. When using credit card shopping, if the overdraft is allowed, the goods can be removed first and then settled later. If you need a large sum, you will need to confirm by the bank that the goods can be taken away from the store. Because Banks, credit card companies and shops are not in the same place, the process can be achieved through communication lines and computer connections.

For fast and reliable processing, the security and response time of computer network and communication line is the key.
1. 2. Application basis of financial card.

IC CARDS are mainly used as financial CARDS. The main functions of financial CARDS are to store data and process data.
1. 2. Information provided by IC card.

1. Printed on the card information available for people to read Identifies a sign of card issuers, service life, the customer name, account number and signature, etc., these information is card can be used as the basis of payment tool in financial transactions.
2. Machines can read the protruding characters on the data card to print the bill to provide transaction vouchers to the seller and the customer. The CARDS can also provide accounts for financial transactions.

3. Provides machine-readable authorization and data collection system identifiers.
1. 2. Example: make withdrawals at the ATM.

The following is illustrated by the ATM of ATM.
Automatic teller machine is a machine that is placed in a bank or shop floor for automatic withdrawals by customers (some atms and automatic deposit functions). It takes only a dozen seconds to perform the operation of extracting cash from ATM. In total, only four input actions are required:

1. Insert financial card;
2. Enter personal identification code (PIN);

3. Select the type of transaction (withdrawal);
4. The amount of the application is given.

Automatic output card and cash, and print credentials when the ATM checks no problems. Thus, ATM is a convenient information processing system, which can provide service 24 hours.
ATM is a computer system installed in the cabinet. It deals with the four media of CARDS, currency, receipts and envelopes, and can communicate with the connected remote computers. It has strict internal and reliable physical and logical security measures. Each transaction is generally accepted with the right authority and strict control, so the ATM system is both a simple system and a complex system.

ATM (card) on the magnetic stripe data, such as distribution and customer account identification number (used to retrieve information automatically authorize basis) by computer and communication lines and the issuing unit account to connect to the database to check the card number (check list), to prevent others from using has report the loss or theft to the ATM card, check the book records of customers at the same time, to find out the available amount, and according to the amount of trading and then update the book records chuhe ATM card with you next time. In addition, in order to avoid some possible disadvantages (such as blacklist has report the loss but not yet), but also restrict ATM card allowed to use the number of times in a day and a day to allow extraction of the total amount of cash. Most ATM machines need to enter a personal identifier PIN and send the PIN to the computer to check whether the card person is the owner of the card. Such as expressly transmission PIN in the telecommunication lines on the road, there is a danger of hacking, therefore need to encrypt the PIN, it will provide a encryption algorithm and the "key", let the PIN after encrypted transmission in the telecommunication lines on the road, at the receiving end, therefore at the receiving end puts forward the key management and protection.
1. 2. 3 IC card storage area distribution and function introduction.

IC CARDS are much larger than magnetic CARDS and generally have four storage areas.
1. Public (unclassified) storage areas contain public information, such as issuing identifiers, cardholders' accounts, etc.

2. External unreadable storage area for internal decision-making is the content of the storage, such as PIN value, the value is to be the time when card issuance personalized writing, after the user input the correct PIN value, allowed to enter the new PIN value changes, but in any case, do not allow will be stored in the card PIN value is transmitted to the world. Keys can also be stored in this storage area.
3. The confidential storage area contains the book balance, the type of service that allows the card to be used, and the limit. When the cardholder enters the correct PIN value, it is allowed to read the data in the storage area and write the correct data (such as the modified balance) according to the application.

4. The record area contains each transaction detail, called log, for query.
In addition to memory CARDS, there are logic circuits or emblems in other IC CARDS to provide secure and reliable services.

1. 2. 4. Brief introduction of interface device memory.
The interface device (or read-write device, card reader) used in conjunction with the smart card should provide additional memory and logic circuits, which may itself be a microcomputer.

The memory for the interface device in the store contains the following contents:
1. The transaction data contains each transaction record, and it is usually sent to the bank or the issuing bank for the transfer and clearing of the transaction details. The bank shall guarantee that the payment shall be deposited in the seller's account in time.

2. The illegal card list (or blacklist, stop payment list) lists all accounts that have been lost, stolen or overdrawn over the limit, and submitted to the bank each day for details of the transaction. At the same time, after the bank is consolidated, the revised blacklist should be provided to the seller. If the account or overdrawn account on the blacklist is to be traded, it shall be accepted by the commercial special telephone and the bank for further authorization verification. You can also refuse to deal with it or even confiscate it according to the actual situation.
3. The secret data key and the authorized telephone number are confidential data, and the key is used to generate the check code in case the transaction log is modified. As for authorization phone, clinch a deal the vendor hope some excess deal with it through to the user, Banks can be accepted only authorized by the bank, and if the telephone line is busy, so waiting for the authorization may be very long, even can make customers feel unable to tolerate, this will affect the application of ATM card. More advanced systems should be licensed by computer networks and communication lines.

Function.
1. 2. 5 use the smart card to complete the operation of shopping.

The operation sequence is as follows:
1. Customers come to the checkout with their financial CARDS and purchases. And insert the financial card into a small suspicious device that can enter the PIN.

2. The clerk entered the transaction amount through the keyboard he worked on.
3. The transaction amount is displayed on the display board of the keypad device.

4. The customer presses a specified key on the keypad to indicate the value of the transaction.
5. The display board of the small keyboard device instructs the customer to enter the PIN. The customer then enters the PIN. After the input, automatically compare with the PIN in the card, if consistent, open the financial card itself and prepare to accept the transaction.

6. Then interface equipment inside for a series of processing, such as check list, check whether the money enough, calculate the balance of the trade, it's one transaction logging in and calculate the security check code in the day forget record to ensure the security of data. The transaction is also recorded in the financial card. Finally, the customer prints the receipt.
7. The display board indicates the end of the transaction and the customer takes the goods and CARDS.

1. 2. Develop smart card and related factors.
Relevant aspects of the smart card operation are: cardholder or user, store, card issuer and sales department, card designer, seller and security maintenance.

1. Cardholder or user.
User requirements:

· easy to use: the location of the device, the time of use and the steps of the operation. When you operate, you learn.
· easy to enable procedures: easy to issue and to personalize the card based on the PIN number.

· speed up transaction time: make a transaction or authorize the waiting time to be shortened as far as possible.
· safe and reliable: every transaction is correct, the restart is convenient and reliable after the operation error, and the loss of the card, the replacement of the stolen and the PIN value are easy to handle.

· the operation prompt of the order: the card clearly shows the interface direction, the display screen is clear and easy to read, avoiding the use of computer terms and complex interactive operation.
2. The store

Store expectation:
· easy to develop personnel, easy to operate and exception handling.

Simple troubleshooting: fault handling including error after the restart, exceptions or trade is a moment of unique processing, as well as in the normal solution of failure, other alternative measures.
· safe and reliable: simple and safe handling of lost, stolen and unpaid CARDS, which are easy to detect for all kinds of unsafe factors.

3. Card issuer and sales department.
In addition to meeting the requirements of shops and users, the information exchange between the relevant parties (Banks, shops, users) should be done, and users should forget about the post-pin processing.

4. Designer, vendor and security maintenance.
The design objectives should meet the requirements of users and stores. Electronic devices should be able to work 24 hours a day without interruption, and it is easy to test whether smart CARDS work properly. Mechanical design ensures that equipment and parts work reliably. Design the exception handling method t and can quickly troubleshoot.

1. 2. 7 types of smart CARDS.
1. Credit card credit card in advance to establish the allowable overdraft limit, that is to preset the amount of funds that can be borrowed, the repayment of the credit card and the payment of interest. Depending on the creditworthiness of the cardholder, there are two types of credit CARDS: Mr. Kinka and Mr. Puj. The former overdraft limit is high.

2. The cash card (payment card) is used for the savings account and the funds used for the card are deposited in the bank.
3. ATM card can only be used in ATM card or credit card.

4. Prepaid CARDS are purchased on the basis of the value of the card, first purchased and then used, such as prepaid CARDS for telephone and public system, prepaid CARDS for electricity meters, etc.
In addition, there are also such as the use of the card inside the hotel, after the guests enter the hotel, the accommodation, dining, entertainment and so on can be accounted for by the card, leaving the hotel checkout.

1. 3. Security of smart card.
Smart card replacement in the field of circulation is the function of cash or check, with the use of smart card, use it for the act of fraud or cheating will also continue to increase, for the solution of the problem of unsafe in providing reasonable effect and the protection of the guarantee and the balance between the costs and investment needed, thus proposed a compromise solution.

1. 3. 1. Some basic problems affecting the security of smart CARDS.
Among the many smart card security problems, the following basic problems need to be solved:

1. The flow of information between the smart card and the interface device can be intercepted and analyzed so that it can be copied or inserted into false signals.
2. Analog smart CARDS (or fake smart CARDS) simulate the interest between the smart card and the interface device so that the interface device cannot determine whether it is legitimate or a simulated smart card.

3. In the transaction, the division replaces the smart card in the authorization process with the legal smart card, and before the transaction data is written, it is replaced with another card, so the transaction data is written to the substitution card.
4. Modify control in a credit card balance to update the date of the credit card need to input the date, when used for judging card is used for the first time in the day, whether it should be effective balance item updates as the highest authority balance (which is said before, to allow a day of withdrawal, the largest amount of), if you modify control balance updated date (Yun last used date), and put it in advance, and then enter the day after the date of interface equipment will be mistaken for the first time on the day of the withdrawals, and will update as the highest authority effectively balance balance, so the use of

Article keywords:
Share to: