Classification of (1)IC cards.
① According to the communication mode between IC card and card reader, IC card can be divided into contact IC card and contactless IC card. The contact IC card is physically connected with the card reader through eight metal contacts on the card surface to complete communication and data exchange. The contactless IC card communicates with the card reader through wireless communication, and there is no need for direct physical connection with the card reader.
② Bika can be divided into memory card and smart card according to whether there is a microprocessor. Memory cards only have memory chips and no microprocessors, and general telephone IC cards all belong to this category. Smart cards are made by embedding a fingernail-sized LSI with a memory and a microprocessor chip into a plastic substrate. The IC card of a bank usually refers to a smart card. Smart card, also known as CPU (Central Processing Unit) card, has the functions of reading, writing and processing data, so it has outstanding advantages such as high security and offline operation. The so-called offline operation is relative to online operation, and can be used on terminal equipment without networking. Offline operation not only greatly reduces communication time, but also can be used in mobile toll collection points (such as public transportation) or places with poor communication.
③ According to the application fields, IC cards can be divided into financial cards and non-financial cards. Financial cards are divided into credit cards and cash stored value cards; Non-financial cards refer to IC cards used in non-financial fields such as medical treatment, communication and transportation.
(2) 2) Advantages of IC card. The shape of ic card is similar to that of magnetic card, but the difference between IC card and magnetic card lies in the different media for storing data. Magnetic card stores information through the change of magnetic field of magnetic stripe on the card, while ic card stores data information through EEPROM embedded in the card. Therefore, compared with magnetic cards, ic cards have the following advantages:
① Large storage capacity. The storage capacity of magnetic card is about 200 digital characters; The storage capacity of IC cards varies according to different models, ranging from hundreds of characters to millions of characters.
② Good security and confidentiality. The information on the IC card can be read, modified and erased at will, but all of them need a password.
③CPU card has data processing capability. When exchanging data with the card reader, the data can be encrypted and decrypted to ensure the accuracy and reliability of the exchanged data; Magnetic cards do not have this function.
④ Long service life.
(3) The main technology of 3)IC card. The core of IC card is integrated circuit chip, which is embedded in a small plastic card by using modern advanced microelectronics technology. Its development and manufacturing technology is much more complicated than magnetic cards. The main technologies of IC card include hardware technology, software technology and related business technology. Hardware technology generally includes semiconductor technology, substrate technology, packaging technology, terminal technology and other parts technology; Software technology generally includes application software technology, communication technology, security technology and system control technology.
①EEPROM technology. Electrically erasable programmable read-only memory is the core of IC card technology. This technology increases transistor density, improves performance and capacity, and achieves the purpose of storing more data in the same area.
As a storage space for data or programs, EEPROM data can be stored for at least 10 years, and erased more than 65438+ million times. EEPROM technology also provides great flexibility. By setting the unmodifiable flag bit, EEPROM cells can be converted into programmable read-only memory, read-only memory or unreadable secret storage cells.
Advanced technology makes the secure storage IC card get rapid development and application. For example, it has been widely used in various toll collection systems (public telephones, electricity meters, highway toll collection, etc.). ) and access control. CPU cards with EEPROM as the core are also widely used in mobile phones, banking departments, multi-application cards and high-security applications that require public key algorithms.
②RFID technology. Radio frequency identification (RFID) technology is an identification method that uses electromagnetic waves to transmit signals, and the identified object itself should have devices for receiving and sending electromagnetic waves. The communication frequency band used by RFID system is < < 135kHz or > 300 MHz ~ GHz.
Radio frequency identification IC card is an IC card that uses electromagnetic waves to communicate with terminals in a non-contact manner. When using this card, it is not necessary to insert the card into a specific card reader slot. Generally speaking, the communication distance varies from a few centimeters to 1 meter. Radio frequency identification cards are widely used and have great development potential.
Radio frequency identification IC cards can be divided into active and passive types. Active card means that the card needs to approach the card reader actively, and the user needs to shake the card above the card reader to complete the transaction; The passive card does not need to show the card, just walk through the range of the card reader and complete the transaction.
At present, the most advanced contactless IC card in the world adopts unique RFID technology. It is expected that this technology will have great market potential.
③ Encryption technology. The CPU card in IC card adopts special encryption technology, which can not only verify the correctness of information, but also check the legitimacy of both parties' identities, thus ensuring the security of information transmission. This is achieved by mutually verifying the bank key stored in the IC card and the bank key stored in the black box of the card reader, thus ensuring that both the cardholder and the card reader have legal identities. In a word, the advanced encryption technology not only has high security and strictness, but also has the advantages of flexibility, convenience and low cost.
In addition to the above technologies, there are new software and hardware technologies such as Java card technology, IC card ISO standardization technology, IC card biometric authentication technology and data compression technology. Due to the increasingly high technical content and powerful functions of IC cards, the application fields of IC cards are constantly expanding in depth.
(4) The main application of IC card. The development, research and application of IC card is a systematic project, involving many technical disciplines in computer, communication, network, software, card reading and writing equipment, application computer and other product fields. Therefore, the global IC card industry is developing rapidly in the competition of technology, market and application. IC card has become one of the hot products in the international electronic information industry. Besides being widely used in non-financial fields such as commerce, medical care, insurance, transportation, energy, communication, safety management, identity identification, etc. , also widely used in the financial field, with far-reaching influence.
Although IC card entered our country late, it developed rapidly with the strong support of the government. At the end of 1995, the National Gold Card Office organized and drafted the Master Plan for the Application of Non-bank Cards in the Gold Card Project to make a master plan for the application of IC cards in China. In order to ensure the healthy development of ic cards, under the leadership of the State Council Golden Card Office, the Ministry of Information Industry, the Ministry of Public Security, the Ministry of Health, the State Administration for Industry and Commerce and other ministries and commissions have made development plans for IC cards in this industry.
① Application of IC card in banking system. Bank cards are roughly divided into two categories: credit cards and stored-value cards.
Credit card, that is, debit card, has the function of micro-credit, that is, small overdraft can be made. It requires cardholders to have a high degree of credibility, and overdraft money should be deposited in time.
Stored value cards, that is, debit cards, do not need to be filed, do not need guarantees, and cannot be overdrawn. They are generally used for small withdrawals or consumption. At present, most bank cards issued by domestic commercial banks are debit cards.
According to statistics, the cash circulation in developed countries only accounts for 8% of the circulation strength. Basically, credit cards and various financial cards dominate the financial market. China's cash flow is as high as more than 25%. The "extracorporeal circulation" of a large amount of cash provides the breeding ground for corruption and various economic crimes, which not only disrupts the economic order, but also seriously affects social stability and the value and reputation of RMB. The wide application of electronic money or bank ic card is an effective way to solve the above problems.
At present, most bank cards are magnetic cards, and plastic cards have magnetic stripes and embossed characters. The magnetic stripe records basic information such as account number and password, while the actual money is stored on the hard disk of the bank computer connected to the network. Funds withdrawn or deposited by users are exchanged between different bank accounts. The money consumed by users is carried forward and liquidated between banks and merchants. This magnetic card needs to access the host account when it is used, so it can only be used in on-line processing time. Its speed and stability depend on the quality of communication lines, and it can't be used where the network can't reach.
The policy of developing gold card in China is "two cards are used together, magnetic card is in transition, and ic card is the main development". The future development trend is bound to be that IC cards will gradually replace magnetic cards.
IC cards can be issued separately by banks or jointly by enterprises and institutions. This co-branded card forms a special wallet account for the bank IC card. For example, the special wallet for medical insurance is not allowed to consume or withdraw cash, and can only be used in designated hospitals and other places. At present, co-branded cards mainly include insurance cards, tax cards, transportation cards and campus cards. Because IC card is convenient and fast, it has been quite popular in developed countries. During the Atlanta Olympic Games, ic card electronic wallets were widely used to pay for transportation, communication and taxes.
②IC card charging system. Including the collection of various consumption resources such as electricity, water, gas and communication fees. This system can improve management efficiency and reliability. By charging in advance, we can increase the available funds of management departments, provide quality services for residents, and change the unreasonable situation of consuming resources first and charging later. For users, IC card charging can avoid the harassment of toll collectors and the trouble of preparing cash change; At the same time, it is also beneficial for users to plan their consumption according to their own electricity, water and gas consumption.
③IC card medical insurance system. With the reform of China's medical system, residents go to hospitals with IC cards issued by insurance companies, and medical expenses will be paid by insurance companies. Medical IC card can not only pay medical expenses, but also store patients' medical records. Patients can go to different hospitals, and doctors can quickly diagnose and treat them according to the medical record information in the card.
④ Public transport management system. Passengers take the bus with prepaid IC cards issued by the bus management department. When they get on the bus, they just need to shake (the activity card) in front of the toll collector at the door, and the toll collector will automatically complete the charge. This can effectively reduce boarding time, speed up vehicle turnover, improve management efficiency, and put an end to corruption and counterfeit money.
Others include traffic police management system, industrial and commercial management system, ic card electronic door lock, ic card tax management system, highway toll collection system and other IC card application systems.
With the development of semiconductor technology and large-scale integrated circuit chips, IC cards will also develop rapidly with the rapid development of computer technology and network technology. Expanding the application field of IC card has become an inevitable demand of social development.
In the case of more fierce competition in the global IC industry market, IC cards will inevitably develop to a higher level. For example, from contact IC card to non-contact IC card, from low storage capacity IC card to high storage capacity IC card, from single-function IC card to multi-function IC card, from single-system IC card to multi-system IC card, from non-banking system to banking system application, from civilian to military, from local area network to Internet, etc. New technologies are constantly emerging, and there are many kinds of IC cards, which fully shows the strong vitality of IC cards. In the next few years, IC cards will penetrate into people's lives more and more.
IC card security
As a kind of electronic money, ic card records a lot of important information, and its security is very important. As the developer of IC card application system, it is necessary to provide reasonable and effective security measures for IC card system to ensure the data security of IC card and its application system. The main ways to affect the security of IC cards and application systems are: using the lost or stolen IC cards of users to impersonate legitimate users to enter the application system and obtain illegal benefits; Using forged or blank cards to illegally copy data and enter the application system; Use IC card reading and writing equipment outside the system to modify the data on the legal card and change the operation level; In the process of IC card transaction, after the identity authentication is completed with the normal card, the IC card is replaced halfway, so that the data stored on the card is inconsistent with the system; In the reading and writing operation of IC card, the information flow exchanged between interface equipment and IC card is intercepted, modified or even inserted with illegal information, in order to gain illegal benefits or destroy the system. Common security technologies include: identity authentication and validity confirmation of IC card, message authentication technology, data encryption communication technology, etc. The adoption of these technologies can ensure the integrity, validity and authenticity of IC card data in the process of storage and transaction, thus effectively preventing illegal reading, writing and modification of IC cards. Generally speaking, the security of IC cards includes physical security and logical security:
(1) personal safety
Physical security includes: the physical security of IC card itself, which usually refers to the ability to prevent stress, chemical, electrical and electrostatic effects to a certain extent; The ability to resist external physical attacks requires that IC cards should be able to prevent copying, tampering, forgery or interception. Common measures include: adopting high-tech and expensive manufacturing technology to make it impossible to forge; In the process of manufacturing and distribution, all parameters are kept strictly confidential; When making, several protective layers are added outside the memory to prevent the content from being analyzed, that is, it is difficult to decipher; Install a monitoring program in the card to prevent the data bus and address bus of the processor or memory from being intercepted.
(b) logical security
Common logical security measures include: memory partition protection, which generally divides the data in IC card memory into three basic areas: public area, working area and confidential area; User authentication, also known as personal identity authentication, usually includes verifying the user's personal identification number, biometric authentication and handwritten signature. The following only introduces one of the biometric technologies-fingerprint identification technology:
Fingerprint identification technology takes advantage of the uniqueness, immutability, unforgeability and portability of fingerprints and the advantages of IC card as personalized data carrier and mass storage, which not only realizes the real identity authentication of people, but also meets the requirements of various application systems for data carrier cards and offline. It is a way of combining software and hardware to ensure information security, reliability and practicality.
Use IC card to save key information such as fingerprint feature data, user information and private key. It is the most effective way to solve the bottleneck of network information security, and it is the most effective supplement to information security (software) authentication and key system. It is not only a higher-level institutional innovation of IC card application, but also a time and again in the field of user real identity authentication. The smart card reader verifies the validity of the card and then verifies the fingerprint identity. After double verification, the system is safe and reliable.
The fingerprint information can be stored in the IC card as needed, and the real identity authentication of the user and various applications of the IC card can be realized by comparing the input user's living fingerprint information with the fingerprint data in the card. Fingerprint information can also be stored in a computer or network system, and it is very flexible to authenticate the real identity of the user by comparing the input user's living fingerprint information with the stored fingerprint information.
Fingerprint IC card authentication technology can be widely used in network communication, database management, authority setting, data access and key management in e-commerce and electronic payment. Including the identity authentication of administrators in computer systems, Internet, e-commerce systems, government and enterprise local area network systems, the authorized management of employees in important systems and departments in finance, insurance, securities and other industries, the identity authentication of stock exchanges, credit card users and insurance beneficiaries, security industry and other applications.
The ID card is THRC 12/ 13 read-only contactless card, and the unique card number stored in the EEPROM of the chip is read by the card reader to sense the power supply. The card number is written before the card is sealed and cannot be changed after the card is sealed. Passivity and non-contact are the two most prominent characteristics of the chip, and RF interface circuit is the key core technology. It receives the RF energy of the card reader, generates power and clock for the chip, and realizes wireless communication between the card and the card reader by using technologies such as phase shift keying and load amplitude modulation. Contactless ID cards are widely used because of their outstanding advantages such as convenient operation, quickness and reliability.
(a) the main characteristics of the identity card:
The carrier frequency is 125KHZ(THRC 12) or13.56mhz (THRC13); The modulation mode of data transmission from card to card reader is loading amplitude modulation;
The data coding in the card adopts BPSK phase shift keying, which has strong anti-interference ability;
The data transmission rate from the card to the reader is 3.9kbps(THRC 12) or 6.62 kbps (THRC13);
EEPROM is used for data storage, and the data storage time exceeds 10 years. Data storage capacity ***64 bits, including manufacturer, publisher and user code;
The card number cannot be changed after it is written before the card is sealed, which absolutely ensures the uniqueness and security of the card number;
THRC 13 chips can be packaged into standard cards, chips and other chips according to application needs.
Shape.
(2) How the ID card works:
The system consists of card, card reader and background controller. The working process is as follows:
The card read sends out carry signals through an antenna;
After the card enters the working area of the card reader, the resonant circuit composed of the inductance coil and the capacitor in the card receives the carrier signal sent by the card reader, and the RF interface module of the chip in the card generates power supply voltage, reset signal and system clock from this signal, so that the chip is "activated";
The chip reading control module modulates the data in the memory to the carrier after phase modulation coding, and sends it back to the card reader through the antenna in the card;
The card reader demodulates and decodes the received card echo signal and sends it to the background computer; According to the legitimacy of the card number, the background computer makes corresponding processing and control for different applications.
(3) Types of ID cards:
ID thick card: the thickness is 1.8mm, which is the size of standard card. It is the most economical RF IC card at present, with ID number and a portable hole, which can screen print LOGO text information;
Standard thin card: the thickness is 0.8mm, and the standard card size can be offset printed, screen printed and printed;
Non-standard thin card: the thickness is 1.05mm, and the standard card size can be offset printed, screen printed and photo printed;
(4) The scope of application of the ID card:
Compared with the contact IC card, the contactless ID card does not need to plug in or out the card, which avoids all kinds of faults caused by poor mechanical contact, so it has the outstanding advantages of convenient operation, quickness and reliability, long service life and so on, and is especially suitable for occasions with large traffic. Typical applications: canteen food sales system, patrol system, attendance system, access control system, enterprise card system and other RFID fields.
THRC 12/ 13 contactless ID card can be mainly used for identity identification and addressing control, such as access control, security, attendance and so on. , but also can be extended to exhibitions, parks, hotels, restaurants and other public places tickets, discount cards. As well as the production process, postal parcels, air and railway transportation, product packaging, transportation and other departments of logistics, electronic labels, anti-counterfeiting labels, disposable tickets and many other fields. Although it is only a read-only card, it can be used in a certain range through the control and management of the background computer, even if it involves the management of expenses, such as the management of meals in the canteen. For specific applications, the cardholder's personal data can be sent to the background computer, a database can be established, and application software can be configured. When it is used, the card number can be transmitted to the background computer through the card reader, and the cardholder's personal data can be retrieved from the database, and then the operation can be carried out according to the specific application, so the application range is extremely wide.
3. Terminology of 3.IP card telecommunication service.
IP is the abbreviation of English Internet Protocol, which means "Internet Protocol" in Chinese.
IP telephone is a kind of telephone application that can be realized through TCP/IP protocol on IP network.
This application includes PC-to-PC connection, PC-to-PC connection and telephone-to-telephone connection, and also includes voice service on the Internet or intranet, fax service (real-time and store/forward), IVR (interactive voice response) on the WEB, unified messaging through the Web, and so on.
IP calling card is an automatic password charging long-distance direct dial telephone service developed by using advanced IP technology. It has the characteristics of low price, good call quality and wide access. At present, it has been opened in all provinces and cities in China and most countries and regions in the world (except maritime satellite phones). Users can dial more than 200 countries and regions and most cities in China on fixed two-tone telephones (except public telephones). Compared with the traditional long-distance direct dial telephone, it has obvious price advantage and is more convenient and flexible to use.
At present, there are four types of IP cards for telecom companies, 17900, 1790 1, 17908, 17909. That is, the national card has 17900IP card and 1790 1 general IP card, while the provincial card has Xiaoxiang Bank 17908IP card and China Telecom 17909 IP card.