1. IC card refers to the integrated circuit card. The bus card we generally use is a type of IC card. Common IC cards use radio frequency technology to communicate with the IC card reader. IC There is a difference between cards and magnetic cards. IC cards store information through the integrated circuit in the card, while magnetic cards record information through the magnetism in the card. The cost of IC cards is generally higher than that of magnetic cards, but their confidentiality is better.
(1) Classification of IC cards.
①According to the communication method between the IC card and the card reader, IC cards can be divided into two types: contact IC cards and non-contact IC cards. The contact IC card is physically connected to the card reader through 8 metal contacts on the card surface to complete communication and data exchange. The contactless IC card communicates with the card reader through wireless communication. The contactless IC card does not need to be directly physically connected to the card reader during communication.
②According to whether it has a microprocessor or not, the card can be divided into two types: memory card and smart card. The memory card only contains a memory chip without a microprocessor, and general telephone IC cards fall into this category. A smart card is made by embedding a fingernail-sized large-scale integrated circuit with memory and microprocessor chips into a plastic substrate. Bank IC cards usually refer to smart cards. Smart cards are also called CPU (Central Processing Unit) cards. They have data reading, writing and processing functions, so they have outstanding advantages such as high security and the ability to operate offline. The so-called offline operation is relative to online operation, and it can be used on terminal devices that are not connected to the Internet. Offline operation not only greatly reduces communication time, but can also be used at mobile toll points (such as public transportation) or places where communication is not smooth.
③ According to application fields, IC cards can be divided into two types: financial cards and non-financial cards. Financial cards are further divided into credit cards and stored-value cash cards; non-financial cards refer to IC cards used in non-financial fields such as medical care, communications, and transportation.
(2) Advantages of IC cards. The appearance of an IC card is similar to a magnetic card. The difference between it and a magnetic card lies in the media used to store data. Magnetic cards store information through changes in the magnetic field of the magnetic strip on the card, while IC cards store data information through an electrically erasable programmable read-only memory integrated circuit chip (EEPROM) embedded in the card. Therefore, compared with magnetic cards, IC cards have the following advantages: .
① Large storage capacity. The storage capacity of a magnetic card is about 200 numeric characters; the storage capacity of an IC card varies depending on the model, ranging from a few hundred characters to millions of characters.
②Good security and confidentiality. The information on the IC card can be read, modified, and erased at will, but a password is required.
③The CPU card has data processing capabilities. When exchanging data with the card reader, the data can be encrypted and decrypted to ensure the accuracy and reliability of the exchanged data; magnetic cards do not have this function.
④Long service life.
(3) Main technology of IC card. The core of the IC card is an integrated circuit chip, which uses modern advanced microelectronics technology to embed a large-scale integrated circuit chip in a small plastic card. Its development and manufacturing technology is much more complex than that of magnetic cards. The main technologies of IC cards include hardware technology, software technology and related business technology. Hardware technology generally includes semiconductor technology, substrate technology, packaging technology, terminal technology and other component technologies; software technology generally includes application software technology, communication technology, security technology and system control technology.
①EEPROM technology. Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read Only Memory) is the core of IC card technology. This technology increases transistor density, improves performance, increases capacity, and achieves the purpose of storing a larger amount of data in the same area.
As a storage space for data or programs, EEPROM data can be retained for at least 10 years and can be erased and written more than 100,000 times. EEPROM technology also provides great flexibility. By setting unmodifiable flag bits, EEPROM cells can be converted into programmable read-only memory, read-only memory, or unreadable confidential storage cells.
The advancement of this technology has led to the rapid development and application of IC cards with secure memory.
For example, it has been widely used in various charging systems (public telephones, electricity meters, highway tolls, etc.) and access control. CPU cards with EEPROM as the core are also widely used in mobile phones, banking departments, multi-application cards and high-security applications that require public key algorithms.
②RFID technology. Radio Frequency Identification (RFID) technology is an identification method that uses electromagnetic waves for signal transmission. The object to be identified should itself have an electromagnetic wave receiving and transmitting device. The communication frequency band range used by the RFID system is <135kHz or >300MHz~GHz level.
Radio frequency identification IC card is an IC card that uses electromagnetic waves and non-contact points to communicate with terminals. When using this card, there is no need to insert the card into a specific reader/writer slot. Generally speaking, the communication distance is in the range of several centimeters to 1 meter. Radio frequency identification cards are widely used and have great development potential.
Radio frequency identification IC cards are divided into active and passive types. Active cards mean that the card needs to actively approach the card reader, and the user needs to wave the card over the card reader to complete the transaction; passive cards do not need to present the card, as long as they walk through the range of the card reader, the transaction can be completed.
The most advanced contactless IC card in the world currently uses unique RFID technology. It is expected that this technology will have great market potential.
③Encryption technology. The CPU card in the IC card uses special encryption technology, which can not only verify the correctness of the information, but also check the legitimacy of the identities of the communicating parties, thereby ensuring the security of information transmission. This is achieved through mutual verification between the bank key stored in the IC card and the bank key stored in the card reader and black box, thereby ensuring that both the cardholder itself and the card reader have legal identities. In short, the use of advanced encryption technology not only has high security and rigor, but also has the advantages of flexibility, convenience, and low cost.
In addition to the above-mentioned technologies, there are also new software and hardware technologies such as Java card technology, IC card ISO standardization technology, IC card biometric authentication technology and data compression technology. As the technical content of IC cards becomes higher and higher and their functions become more and more powerful, the application fields of IC cards continue to expand in depth.
(4) Main applications of IC cards. The development, research and application of IC cards is a systematic project, involving various technical disciplines in various product fields such as computers, communications, networks, software, card reading and writing equipment, and application machines. Therefore, the global IC card industry has developed rapidly in the competition of technology, market and application. IC cards have become one of the hot products in the international electronic information industry today. In addition to being widely used in non-financial fields such as commerce, medical care, insurance, transportation, energy, communications, security management, and identification, IC cards are also increasingly used in the financial field. Widespread and far-reaching impact.
Although IC cards entered our country relatively late, they have developed rapidly with the strong support of the government. At the end of 1995, the National Gold Card Office organized and drafted the (Gold Card Project Non-bank Card Application Master Plan) in order to coordinate and plan the application of IC cards nationwide. In order to ensure the healthy development of IC cards, under the leadership of the Golden Card Office of the State Council, various ministries and commissions such as the Ministry of Information Industry, the Ministry of Public Security, the Ministry of Health, and the State Administration for Industry and Commerce have formulated development plans for IC cards in the industry.
①Application of IC card in banking system. Bank cards are generally divided into two categories: credit cards and stored-value cards.
A credit card, that is, a credit card, has a micro-credit function, that is, it can be used for small overdrafts. It requires the cardholder to have a high credit rating and the overdraft money should be deposited in a timely manner.
Stored-value cards, that is, debit cards, do not require file creation, no guarantee, and cannot be overdrafted. They are generally used for small withdrawals or consumption. At present, most of the bank cards issued by domestic commercial banks are debit cards.
According to statistics, the cash circulation in developed countries only accounts for 8% of the circulation strength. Basically, credit cards and various financial cards dominate the financial market. The cash circulation in our country is as high as more than 25%. The "extracorporeal circulation" of large amounts of cash provides a living environment for the breeding of corruption and various economic crimes. It not only disrupts the economic order, but also seriously affects social stability and the value of the RMB. Value and credibility. The widespread application of electronic money or bank IC cards is an effective way to solve the above problems.
Most of the current bank cards are still magnetic cards, with magnetic stripes and embossed words on the plastic cards. Basic information such as account numbers and passwords are recorded on the magnetic strip, while the actual money is stored on the hard drive of the bank's computer connected to the network. The funds withdrawn or deposited by users are transferred between different bank accounts. The amount consumed by the user is carried forward and settled between the bank and the merchant. This kind of magnetic card needs to access the host account when using it, so it can only be used during online processing time. Its speed and stability depend on the quality of the communication line, and it cannot be used in places where the network cannot reach it.
my country’s policy for developing gold cards is to “use two cards simultaneously, transition to magnetic cards, and mainly develop IC cards.” The future development trend will be that IC cards will gradually replace magnetic cards.
IC cards can be issued by banks alone, or they can cooperate with various enterprises and institutions to issue co-branded cards. This co-branded card forms a dedicated wallet account for the bank's IC card. For example, special wallets for medical insurance are not allowed to make purchases or withdraw cash, and can only be used in designated hospitals and other places. Currently, co-branded cards mainly include insurance cards, finance and taxation cards, transportation cards, campus cards, etc. Because IC cards are convenient and fast, they have become quite popular in developed countries. During the Atlanta Olympics, a large number of IC card electronic wallets were used to pay for transportation, communications, taxes and other expenses.
②IC card charging system. It includes the collection of various consumer resource fees such as electricity bills, water bills, gas bills, and communication fees. This type of system can improve management efficiency and reliability. By charging in advance, the available funds of the management department can be increased, providing quality services to residents, and changing the unreasonable situation of consuming resources first and charging later. For users, IC card charging can eliminate the harassment of charging personnel entering the home and the worry of preparing cash change; at the same time, it also helps users plan their consumption according to their own electricity, water and gas consumption.
③IC card medical insurance system. With the reform of my country's medical system, residents use IC cards issued by insurance companies to go to hospitals for medical treatment, and the medical expenses will be paid by the insurance company. In addition to the payment function of medical expenses, the medical IC card can also store the patient's medical records. Patients can go to different hospitals for medical treatment, and doctors can quickly diagnose and treat based on the medical record information in the card.
④Bus management system. Passengers take the bus with a prepaid IC card issued by the public transportation management department. When boarding the bus, they only need to wave it in front of the toll machine at the door of the bus (active card), and the toll machine will automatically complete the payment. In this way, it can effectively reduce the time of getting on and off the vehicle, speed up vehicle turnover, improve management efficiency, and eliminate corruption and counterfeit currency.
Others include traffic police management systems, industrial and commercial management systems, IC card electronic door locks, IC card tax management systems, highway toll collection systems and other IC card application systems.
IC cards emerged with the development of semiconductor technology and large-scale integrated circuit chips, and will also develop rapidly with the rapid development of computer technology, network technology, etc. Continuously expanding the application fields of IC cards has become an inevitable demand for social development.
As competition in the global IC industry market becomes more intense, IC cards will inevitably develop towards a higher level. Such as the transfer from contact IC cards to non-contact IC cards, the development from low storage capacity IC cards to high storage capacity, the transformation from single-function IC cards to multi-function IC cards, and the transformation from single-system IC cards to multi-system IC cards. Transformation, from non-bank system to banking system application, from civilian to military use, from local area network to Internet, etc. New technologies are constantly emerging and there are many varieties of IC cards, which fully illustrates the strong vitality of IC cards. In the next few years, IC cards will increasingly penetrate into people's lives.
IC card security
As an electronic currency, IC cards record a large amount of important information. Security is very important. As an IC card application system developer, you must provide The system provides reasonable and effective security measures to ensure the data security of IC cards and their application systems.
The main ways that affect the security of IC cards and application systems are: using the user's lost or stolen IC card to pretend to be a legitimate user to enter the application system and obtain illegal benefits; using forged or blank cards to illegally copy data and enter the application system; using outside the system IC card reading and writing equipment, modify the data on the legal card, change the operation level, etc.; during the IC card transaction process, after completing the identity authentication with a normal card, the IC card is changed midway, so that the data stored on the card is inconsistent with the system Inconsistency in IC card; during IC card read and write operations, the information flow exchanged when the interface device communicates with the IC card is intercepted, modified, or even inserted into illegal information to obtain illegal benefits or damage the system. Commonly used security technologies include: identity authentication and IC card legality confirmation, message authentication technology, data encryption communication technology, etc. The adoption of these technologies can ensure the integrity, validity and authenticity of IC card data during storage and transaction processes, thereby effectively preventing illegal reading, writing and modification of IC cards. Generally speaking, the security of IC cards includes two aspects: physical security and logical security:
(1) Physical security
Physical security includes: the security of the physical characteristics of the IC card itself, Usually refers to the ability to prevent a certain degree of stress, chemical, electrical, and electrostatic effects; the ability to resist external physical attacks. It is required that the IC card should be able to prevent copying, tampering, forgery, or interception, etc. Commonly used measures include: using high-tech and expensive manufacturing processes to make them impossible to forge; during the manufacturing and distribution process, all parameters are kept strictly confidential; during production, a number of protective layers are added outside the memory to prevent the content from being analyzed, that is, it is difficult to decipher. ; Install a monitoring program in the card to prevent interception of the processor or memory data bus and address bus.
(2) Logical security
Commonly used logical security measures include: memory partition protection. Generally, the data in the memory in the IC card is divided into three basic areas: public area, work area and Confidential area; user authentication. User authentication is also called personal identity authentication. Generally, there are verification of user personal identification PIN, biometric authentication, and handwritten signature. The following only introduces one type of biometric identification technology - fingerprint identification technology:
Fingerprint identification technology uses the unique, unchangeable, unforgeable, portable and other characteristics of fingerprints and IC cards as personalized data The advantages of the carrier and large-capacity memory not only realize the true identity authentication of the person, but also meet the needs of various application systems for the data carrier to be carded and offline. It uses a combination of software and hardware to ensure information security, reliability and practicality. way.
Using IC cards to save key information such as fingerprint feature data, user information, and private keys, and authenticating the cardholder’s true identity through fingerprint recognition is the most effective way to solve the bottleneck of network information security. It is the most effective means for information security ( Software) The most effective supplement to authentication and key systems. It is not only a higher-level system innovation in IC card applications, but also a breakthrough in the field of user real identity authentication. The smart card reader verifies the validity of the card, followed by fingerprint authentication, to ensure system security and reliability through double verification.
Fingerprint information can be stored in the IC card as needed. By inputting the user's living fingerprint information and comparing it with the fingerprint data in the card, the user's true identity authentication and various applications of the IC card can be realized. Fingerprint data can also be stored in a computer or network system. By inputting the user's living fingerprint information and comparing it with the stored fingerprint information, the user's true identity can be authenticated, which has great flexibility.
Fingerprint IC card identification technology can be widely used in network communications, database management, permission setting, data access, key management, etc. in e-commerce and electronic payment. Including the identity authentication of administrators in computer systems, the Internet, e-commerce systems, government, and enterprise LAN systems, the authorization management of important systems and department employees in finance, insurance, securities, and other industries, and the identities of stock exchanges, credit card users, and insurance beneficiaries. Certification and security industry applications.
The ID card is a THRC12/13 read-only contactless card. It is powered by the induction of the card reader and reads out the unique card number stored in the EEPROM of the chip. The card number is written once before sealing the card. It cannot be changed after being carded. Passive and contact-free are the two most prominent features of this chip. The radio frequency interface circuit is the key core technology. It receives radio frequency energy from the card reader, generates power and clock for the chip, and uses phase shift keying and loading amplitude modulation, etc. Technology enables wireless communication between cards and card readers.
Contactless ID cards have outstanding advantages such as easy operation, fastness and reliability, and have been widely used.
(1) The main features of the ID card:
The carrier frequency is 125KHZ (THRC12) or 13.56MHZ (THRC13); the modulation method used by the card to transmit data to the card reader is loaded amplitude modulation ;
The data encoding in the card adopts the BPSK phase shift keying method with strong anti-interference ability;
The data transmission rate from the card to the card reader is 3.9kbps (THRC12) or 6.62kbps ( THRC13);
Data storage uses EEPROM, and the data storage time is more than 10 years; Data storage capacity is 64 bits, including manufacturer, issuer and user codes;
The card number is in It cannot be changed after being written before sealing the card, absolutely ensuring the uniqueness and security of the card number;
In addition to being packaged into a standard card shape, the THRC13 chip can also be packaged into chips and other types according to application needs
p>
Shape.
(2) Working principle of ID card:
The system consists of a card, a card reader and a background controller. The working process is as follows:
The card reader sends the carrier signal outward through the antenna;
After the card enters the working area of ??the card reader, the resonance composed of the inductor coil and capacitor in the card The loop receives the carrier signal transmitted by the card reader, and the radio frequency interface module of the chip in the card generates the power supply voltage, reset signal and system clock from this signal to "activate" the chip;
The chip reading control module will The data in the memory is modulated on the carrier after phase modulation encoding, and is sent back to the card reader through the antenna in the card;
The card reader demodulates and decodes the received card return signal and sends it to Backend computer; The backend computer performs corresponding processing and control for different applications based on the legality of the card number.
(3) Types of ID cards:
Thick ID card: 1.8mm thick, standard card size, currently the most economical radio frequency IC card, with ID number. With a portable hole, LOGO text information can be screen-printed;
Standard thin card: thickness 0.8mm, standard card size, can be offset printed, screen printed, and photos printed;
< p> Non-standard thin card: thickness 1.05mm, standard card size can be offset printed, screen printed, photo printed;(4) ID card application scope:
Contact with Compared with conventional IC cards, contactless ID cards do not require the insertion or removal of cards, thus avoiding various failures caused by poor mechanical contact. Therefore, they have outstanding advantages such as convenient operation, fastness, reliability, and long life. They are especially suitable for places with a large flow of people. occasion. Typical applications: canteen meal sales systems, patrol systems, attendance systems, access control systems, enterprise card systems and other radio frequency identification fields.
THRC12/13 contactless ID card can be mainly used in identity recognition and addressing control, such as access control, security, attendance, and other fields. It can also be extended to exhibitions, parks, hotels, restaurants, etc. Tickets for public places, discount cards, etc. As well as many fields such as logistics, electronic labels, anti-counterfeiting signs, one-time tickets and other fields in the production process, postal parcels, air and rail transportation, product packaging, transportation and other departments. Although it is only a read-only card, by using the background computer to control and manage, even issues involving charge management can be applied to a certain extent, such as canteen dining charge management. For specific applications, the cardholder's personal information can be sent to the backend computer, a database can be established and the application software can be configured. During use, the read card number can be sent to the backend computer through a card reader, and the cardholder's personal information can be retrieved from the database. The data is then manipulated according to the specific application, so the range of applications is extremely broad.
3. IP card is a term for telecommunications business.
IP is the abbreviation of English Internet Protocol, and its Chinese meaning is "Internet Protocol".
IP telephony is a telephone application that can be implemented on the IP network through the TCP/IP protocol.
Such applications include PC-to-PC connections, PC-to-machine connections, and phone-to-machine connections, as well as voice services on the Internet or Intranet, fax services (real-time and store/forward), and services implemented on the Web. IVR (Interactive Voice Response), Unified messaging via WEB, etc.
IP phone card is an automatic password accounting long-distance direct dial telephone service developed using advanced IP technology. It has the characteristics of low price, good call quality and wide access range. It has been opened to all calls nationwide. Provinces, cities and regions and most international countries and regions (excluding maritime satellite phones). Users can make calls to more than 200 countries and regions and most domestic cities on public network fixed dual-tone phones (except public phones). Compared with traditional long-distance direct dial telephones, it has obvious price advantages and is more convenient and flexible to use.
Currently, telecommunications companies have four types of IP cards, 17900, 17901, 17908, and 17909. That is: the national cards include 17900 IP card and 17901 all-purpose IP card, and the provincial cards include Xiaoxiangxing 17908 IP card and 17909 China Telecom mobile phone IP card.